Sample records for environmental security issues

  1. Secrecy vs. the need for ecological information: challenges to environmental activism in Russia.

    PubMed

    Jandl, T

    1998-01-01

    This article identifies the lessons learned from the Nikitin case study in Russia. The Nikitin case involves the analysis of sources of radioactive contamination in several Russian counties and in the Russian Northern Fleet. Norway was interested in the issue due to proximity to the storage sites. The issue involved national security and environmental protection. It was learned that mixing national security issues with environmental issues offers dangerous and multiple challenges. Environmental groups must build relationships with a wide audience. International security policy must include the issues of globalization of trade and the spread of environmental problems into the global commons (oceans and atmosphere). The risk of an environmentally dangerous accident as a consequence of Cold War activities is greater than the risk of nuclear war. Secrecy in military affairs is not justified when there is inadequate storage of nuclear weapons and contaminated materials. In Russia, the concern is great due to their economic transition and shortages of funds for even the most basic needs, which excludes nuclear waste clean up. The Bellona Foundation studied the extent of nuclear pollution from military nuclear reactors in the Kola peninsula of northwest Russia, in 1994 and 1996. Russian security police arrested one of the report authors for alleged national security violations. A valuable lesson learned was that local Russian environmental groups needed international support. The military nuclear complex poses an enormous hazard. Limiting inspections is an unacceptable national security risk. The new Russian law on state secrets is too broad.

  2. Laser applications to chemical, security, and environmental analysis: introduction to the feature issue.

    PubMed

    Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna

    2017-04-10

    This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.

  3. Environmental Security: United Nations Doctrine for Managing Environmental Issues in Military Actions. Volume 2. Selected International Treaties, Conventions and Protocols that Address Environment-Related Issues. Selected International Organizations Relevant to Environmental Security

    DTIC Science & Technology

    2000-07-01

    Poverty; growing gap between rich and poor 30. Increasing intensive use of chemical fertilizer, pesticides and detergents 31. Destruction of coral reefs ... oceans 24. Fishery depletion due to over-fishing 25. Forest fires like those in Indonesia, Australia, Amazonian and Mediterranean countries 26...to abate eutrophication and acidification , as well as pollution of the marine environment, in particular coastal areas, from land-based sources

  4. Clinton administration forging population-foreign policy links.

    PubMed

    De Sherbinin, A

    1994-12-01

    In the US, the Clinton administration has renewed the link between global population and national security issues. These so-called "soft security issues" receive attention from the Under-Secretary of State for Global Affairs, Tim Wirth, and the senior director of the Global Environmental Affairs branch of the National Security Council, Eileen Claussen. Wirth and Claussen draft the US response to soft security issues such as environmental security, refugee and migration movements, political instability, and religious and ethnic conflict as well as the other nonmilitary threats of illegal drug trafficking, terrorism, and international organized crime. Population was first considered a foreign policy concern in the 1960s. By 1965, President Johnson decided that the US would provide family planning supplies and technical assistance to any country which asked for help. The initial justification for assuming a leading role in developing innovative population strategies for less developed countries was a humanitarian desire to forward economic development, the self-interest of maintaining access to resources, and concern that rapid growth produced more communists. Today the US remains concerned about resource access and economic development and is also wary of spill-over environmental effects, economic migration, diminished US trade opportunities, political asylum seekers and refugees, and increasing demand for US peacekeepers. It is also believed that rapid population growth leads to political destabilization. Critics of these views blame the development difficulties of less developed countries on poor governing decisions (inadequate institutions, trade barriers, or indifference). Women's reproductive rights advocates fear that using security as a rationale for population assistance could lead to restrictions on women's rights to choose the number and spacing of births. Despite such objections, the belief that population growth is an underlying problem in imploding states like Haiti, Rwanda, and Somalia has turned the attention of US policy-makers to these soft security issues.

  5. Worldwide Emerging Environmental Issues Affecting the U.S. Military. January 2010 Report

    DTIC Science & Technology

    2010-01-01

    key farmland in Africa on a long-term basis. The report notes that it is critical to ensure that such contracts promote shared food security ...Technological Advances with Environmental Security Implications………………..4 6.1 New Detection and Cleanup Techniques…………………………………………...…4 6.2...Regulatory Regime might be adjusted to Include Nanomaterials…..6 7.2 Monopoly over Rare Earth Elements Raises Security and Environmental Concerns…..7

  6. Application of laser-wakefield-based x-ray source to global food security issues

    NASA Astrophysics Data System (ADS)

    Kieffer, J. C.; Fourmaux, S.; Hallin, E.; Arnison, P.; Brereton, N.; Pitre, F.; Dixon, M.; Tran, N.

    2017-05-01

    We present the development of a high throughput phase contrast screening system based on LWFA Xray sources for plant imaging. We upgraded the INRS laser-betatron beam line and we illustrate its imaging potential through the innovative development of new tools for addressing issues relevant to global food security. This initiative, led by the Global Institute of Food Security (GIFS) at the U of Saskatchewan, aims to elucidate that part of the function that maps environmental inputs onto specific plant phenotypes. The prospect of correlating phenotypic expression with adaptation to environmental stresses will provide researchers with a new tool to assess breeding programs for crops meant to thrive under the climate extremes.

  7. Environmental Security Cooperation USARPAC’s: Defense Environmental and International Cooperation (DEIC) Conference (Center of Strategic Leadeship Issue Paper, Volume 07-03, September 2003)

    DTIC Science & Technology

    2003-09-01

    infrastructure, and providing consequence management and mitigation of man-made and natural disasters. The United States Army, Pacifi c (USARPAC), the Offi...Terrorism, Disaster Response and Consequence Management , and Medical Aspects of Environmental Security. The conference brought together military and...consequence management in maintaining governmental legitimacy, and examine salient military roles in preventing, responding to, and mitigating natural

  8. U.S.-China Relations: Policy Issues

    DTIC Science & Technology

    2010-03-12

    China (PRC) include promoting U.S. trade and investment, protecting national security interests, addressing global environmental and climate change...influence and natural resources. Other U.S. concerns include the bilateral trade deficit with China and allegations of PRC unfair trade practices, PRC...with the PRC include promoting U.S. trade and investment, protecting national security interests, addressing global environmental and climate change

  9. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support formore » domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.« less

  10. 78 FR 50052 - Chief of Engineers Environmental Advisory Board; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-16

    ... environmentally sustainable manner. Discussions and presentations during this meeting will include flow management...., drivers license, state- issued photo ID, or passport), and pass through the security screening station...

  11. Science and Strategic - Climate Implications

    NASA Astrophysics Data System (ADS)

    Tindall, J. A.; Moran, E. H.

    2008-12-01

    Energy of weather systems greatly exceeds energy produced and used by humans. Variation in this energy causes climate variability potentially resulting in local, national, and/or global catastrophes beyond our ability to deter the loss of life and economic destabilization. Large scale natural disasters routinely result in shortages of water, disruption of energy supplies, and destruction of infrastructure. The resulting unforeseen and disastrous events occurring beyond national emergency preparation, as related to climate variability, could insight civil unrest due to dwindling and/or inaccessible resources necessary for survival. Lack of these necessary resources in impacted countries often leads to wars. Climate change coupled with population growth, which exposes more of the population to potential risks associated with climate and environmental change, demands faster technological response. Understanding climate/associated environmental changes, the relation to human activity and behavior, and including this in national and international emergency/security management plans would alleviate shortcomings in our present and future technological status. The scale of environmental change will determine the potential magnitude of civil unrest at the local, national, and/or global level along with security issues at each level. Commonly, security issues related to possible civil unrest owing to temporal environmental change is not part of a short and/or long-term strategy, yet recent large-scale disasters are reminders that system failures (as in hurricane Katrina) include acknowledged breaches to individual, community, and infrastructure security. Without advance planning and management concerning environmental change, oncoming and climate related events will intensify the level of devastation and human catastrophe. Depending upon the magnitude and period of catastrophic events and/or environmental changes, destabilization of agricultural systems, energy supplies, and other lines of commodities often results in severely unbalanced supply and demand ratios, which eventually affect the entire global community. National economies potentially risk destabilization, which is especially important since economics plays a major role in strategic planning. This presentation will address these issues and the role that science can play in human sustainability and local, national, and international security.

  12. 75 FR 77919 - Carolina Power & Light Company Shearon Harris Nuclear Power Plant, Unit 1; Environmental...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-14

    ... involves important physical modifications to the HNP, Unit 1 security system. There are several issues... in which some important security modifications are planned. A direct outside access route to the... implementation deadline, the licensee currently maintains a security system acceptable to the NRC and that will...

  13. Energy and Environmental Insecurity (Joint Force Quarterly, Issue 55, 4th Quarter 2009)

    DTIC Science & Technology

    2009-01-01

    Energy and Environmental Insecurity By r i c h a r D B . a n D r e s Dr. Richard B. Andres is Energy and Environment Security and Policy Chair in...security, they are as likely referring to carbon emissions as to energy self -reliance and affordable oil. Moreover, the solutions that the international...2009 4. TITLE AND SUBTITLE Energy and Environmental Insecurity 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  14. Stonework or Sandcastle? Asia’s Regional Security Forum.

    DTIC Science & Technology

    1995-07-01

    security without equal security for all," and "with the growing interdependence of states, the differences in economic and social systems, ideologies... social integration, and historical background . . . [W]e cannot directly apply a European model to the different security environment of the Asia...contentious issue of human rights, a prominent theme in CSCE, along with pressures from Western countries on social , political and environmental

  15. Worldwide Emerging Environmental Issues Affecting the U.S. Military. September 2008 Report

    DTIC Science & Technology

    2008-09-01

    Anticipation and Response System…………………………………………..1 Item 3. First EU-Central Asia Security Forum Included Environmental Security………….2 Item 4. Indonesian ...back seat at EU-Central Asia talks http://euobserver.com/9/26778/?rk=1 Item 4. Indonesian Navy to Tighten Security in Sea Border Areas The... Indonesian Navy announced that it will tighten security in its eastern and western sea border areas to support law enforcement efforts at sea for

  16. The nature of international health security.

    PubMed

    Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N

    2009-01-01

    Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.

  17. The impact of globalisation, free trade and technology on food and nutrition in the new millennium.

    PubMed

    McMichael, P

    2001-05-01

    The millennium promises a dramatic politicisation of the food question. In addition to the prominent issues of food security, hunger and nutrition, bioengineering, food safety and quality, there are related issues of environmental sustainability, power, sovereignty and rights. All these issues are deeply implicated in the current corporate form of globalisation, which is transforming historic global arrangements by subordinating public institutions and the question of food security to private solutions. The present paper questions the self-evident association between globalisation and nutritional improvement.

  18. Worldwide Emerging Environmental Issues Affecting the U.S. Military

    DTIC Science & Technology

    2010-08-01

    Brazil protecting non-Amazonian tropical forests . A summary of the consultations across the region are presented in the UNDP LAC Regional...North-American Environmental Integration……..13 6.6 World’s Humid Tropical Forests to Suffer Considerable Biodiversity Change by 2100….…13 6.7 Latin...35456&Cr=sanitation&Cr1 Item 2. Food Security Concerns Increase Around the World The Food Security Risk Index 2010 reveals that the countries most

  19. Worldwide Emerging Environmental Issues Affecting the U.S. Military. Summarizing Environmental Security Monthly Scanning May 2005 - May 2006

    DTIC Science & Technology

    2006-05-01

    breed of ‘refugee’ within international frameworks,” while Dr. Bogardi, Director of UNU’s Institute for Environment and Human Security in Bonn...Modified Organisms (GMOs) Continues FAO calls for an international framework for GM trees GM Crops Created Superweed Europe to Redouble Efforts to...avoid eventual damages to their crops , to protection of endangered species that need special habitat conditions. Enviromatics could impact

  20. The Soviet Region, The Environment, and U.S. National Security

    DTIC Science & Technology

    1992-04-01

    environmental pollution is an international problem requiring international solutions. Second, environmental issues are integral to the prospect of economic vitality. Third, the Soviet Union has a history of environmental abuse and is now paying an economic and social price which must be reversed. And finally, since regional

  1. Environmental influences on food security in high-income countries.

    PubMed

    Gorton, Delvina; Bullen, Chris R; Mhurchu, Cliona Ni

    2010-01-01

    Food security is a fundamental human right yet many people are food insecure, even in high-income countries. Reviewed here is the evidence for the physical, economic, sociocultural, and political environmental influences on household food security in high-income countries. The literature was evaluated using the ANGELO framework, which is a lens developed for understanding the environmental factors underpinning the obesity pandemic. A review of the literature identified 78 articles, which mostly reported on cross-sectional or qualitative studies. These studies identified a wide range of factors associated with food security. Foremost among them was household financial resources, but many other factors were identified and the complexity of the issue was highlighted. Few studies were prospective and even fewer tested the use of interventions other than the supplemental nutrition assistance program to address food security. This indicates a solution-oriented research paradigm is required to identify effective interventions and policies to enhance food security. In addition, comprehensive top-down and bottom-up interventions at the community and national levels are urgently needed.

  2. Water security-National and global issues

    USGS Publications Warehouse

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  3. Energy and technology review

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Quirk, W.J.; Canada, J.; de Vore, L.

    1994-04-01

    This issue highlights the Lawrence Livermore National Laboratory`s 1993 accomplishments in our mission areas and core programs: economic competitiveness, national security, energy, the environment, lasers, biology and biotechnology, engineering, physics, chemistry, materials science, computers and computing, and science and math education. Secondary topics include: nonproliferation, arms control, international security, environmental remediation, and waste management.

  4. Challenge theme 7: Information support for management of border security and environmental protection: Chapter 9 in United States-Mexican Borderlands: Facing tomorrow's challenges through USGS science

    USGS Publications Warehouse

    Parcher, Jean W.; Page, William R.

    2013-01-01

    Historically, international borders were located far from the major political and economic capitals of their countries and rarely received adequate planning or infrastructure development. Today, as a result of global economics and increased movement of goods between nations, border regions play a much greater role in commerce, tourism, and transportation. For example, Mexico is the second largest destination for United States exports (Woodrow Wilson Center Mexico Institute, 2009). The rapid population and economic growth along the United States–Mexican border, undocumented human border crossings, and the unique natural diversity of resources in the Borderlands present challenges for border security and environmental protection. Assessing risks and implementing sustainable growth policies to protect the environment and quality of life greatly increase in complexity when the issues cross an international border, where social services, environmental regulations, lifestyles, and cultural beliefs are unique for each country. Shared airsheds, water and biological resources, national security issues, and disaster management needs require an integrated binational approach to assess risks and develop binational management strategies.

  5. 44 CFR 10.9 - Preparation of environmental assessments.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Preparation of environmental assessments. 10.9 Section 10.9 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY... quickly; (4) Likelihood of meaningful public comment; (5) National security classification issues; (6...

  6. Worldwide Emerging Environmental Issues Affecting the U.S. Military. November 2008 Report

    DTIC Science & Technology

    2008-11-01

    Anglia‘s Nathan Gillet. A report by the Dirección General de Aguas de Chile , the country‘s official water authority, warned that the Echaurren...population displacement in central Chile . Millennium Project, WFUNA International Environmental Security Issues––November 2008

  7. Report: EPA Needs to Assess the Quality of Vulnerability Assessments Related to the Security of the Nation’s Water Supply

    EPA Pesticide Factsheets

    Report #2003-M-00013, September 24, 2003. In connection with our ongoing evaluation of the Environmental Protection Agency’s (EPA’s) activities to enhance the security of the Nation’s water supply, we noted an issue that requires your immediate attention.

  8. Environmental Sustainability as a Generative Concern: An Exploratory Study of the Narrative Identities of Leaders in the Environmental Sustainability Movement

    ERIC Educational Resources Information Center

    Chan, Tiffany Simons

    2009-01-01

    Environmental sustainability is one of the most pressing concerns of the twenty-first century, and working toward sustainability will require broad lifestyle and cultural shifts, particularly in industrialized societies. Yet despite a growing recognition of the importance of issues such as climate change, food security, transportation, and…

  9. 78 FR 78338 - Japan-U.S. Decommissioning and Remediation Fukushima Recovery Forum Tokyo, Japan February 18-19...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-26

    ... nuclear energy research and development, the decommissioning of the Fukushima Dai-ichi Nuclear Power Station, environmental management, emergency management, nuclear security, and safety and regulatory issues. The Decommissioning and Environmental Management Working Group (DEMWG) under the Bilateral...

  10. The DISAM Journal of International Security Assistance Management. Volume 29, Number 4, December 2007. Building Partnership Capacity

    DTIC Science & Technology

    2007-12-01

    Media Issues in Combating Terrorism • International Approaches • Ethics and Combating Terrorism • Restructuring the Security Sector for...Terrorism • Organized Crime and Terrorism • Civil-Military Cooperation and Terrorism • Ethics and Combating Terrorism • Border Control • Consequence...Simon. “Confl ict, Ecology and the Politics of Envrionmental Security.” Global Environmental Politics 2, No. 4 (November 2002): pp 25-130. 28

  11. Toward a Pedagogy of Ecological Responsibility: Learning to Reinhabit the Earth.

    ERIC Educational Resources Information Center

    Mische, Patricia M.

    1992-01-01

    Environmental damage harms the rights of future generations. Peace and disarmament are environmental issues necessitating rethinking of national security. Coevolutionary ethics involve balancing the individual with the common good and establishing equilibrium among the biosphere, technosphere, sociosphere, and the sphere of mind and spirit. (SK)

  12. Communication Security for Control Systems in Smart Grid

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    As an example of Control System, Supervisory Control and Data Acquisition systems can be relatively simple, such as one that monitors environmental conditions of a small office building, or incredibly complex, such as a system that monitors all the activity in a nuclear power plant or the activity of a municipal water system. SCADA systems are basically Process Control Systems, designed to automate systems such as traffic control, power grid management, waste processing etc. Connecting SCADA to the Internet can provide a lot of advantages in terms of control, data viewing and generation. SCADA infrastructures like electricity can also be a part of a Smart Grid. Connecting SCADA to a public network can bring a lot of security issues. To answer the security issues, a SCADA communication security solution is proposed.

  13. The Greening of Global Security: The U.S. Military and International Environmental Security

    DTIC Science & Technology

    1993-12-16

    the Cold War . Issues virtually ignored only five years ago now exhibit a new luster, a new importance, a new resonance among countries of the world ...America 283 298 363 0.8 Europe 511 515 516 0.2 Oceania 28 31 39 1.2 World 5420 6292 8545 1.7 Environmental problems are now causing sizable cutbacks in...direct participation and intercession can become blurred. With NATO’s new focus in today’s Post Cold War world --i.e., low intensity peacekeeping

  14. Worldwide Emerging Environmental Issues Affecting the U.S. Military. Summarizing Environmental Security Monthly Scanning January 2008 - June 2008

    DTIC Science & Technology

    2008-06-01

    yearly, billion $, various years, 2003–2007) Protecting the Environment Due to Its Inherent Moral Value Plant and animal species are being...a liability and redress regime concerning potential damage caused by the movements of GMOs , which will be further discussed in October 2010 at the...risk management issues of GMOs . UNESCO‘s Man and the Biosphere network is expanding, comprising now 529 sites in 105 countries. The UN notes that

  15. Water-Energy-Food Nexus in Asia-Pacific Ring of Fire

    NASA Astrophysics Data System (ADS)

    Taniguchi, M.; Endo, A.; Gurdak, J. J.; Allen, D. M.; Siringan, F.; Delinom, R.; Shoji, J.; Fujii, M.; Baba, K.

    2013-12-01

    Climate change and economic development are causing increased pressure on water, energy and food resources, presenting communities with increased levels of tradeoffs and potential conflicts among these resources. Therefore, the water-energy-food nexus is one of the most important and fundamental global environmental issues facing the world. For the purposes of this research project, we define human-environmental security as the joint optimization between human and environmental security as well as the water-energy-food nexus. To optimize the governance and management within these inter-connected needs, it is desirable to increase human-environmental security by improving social managements for the water-energy-food nexus. In this research project, we intend to establish a method to manage and optimize the human-environmental security of the water-energy-food nexus by using integrated models, indices, and maps as well as social and natural investigations with stakeholder analyses. We base our approach on the viewpoint that it is important for a sustainable society to increase human-environmental security with decreasing risk and increasing resilience by optimizing the connections within the critical water-energy and water-food clusters. We will take a regional perspective to address these global environmental problems. The geological and geomorphological conditions in our proposed study area are heavily influenced by the so-called 'Ring of Fire,' around the Pacific Ocean. Within these areas including Japan and Southeast Asia, the hydro-meteorological conditions are dominated by the Asia monsoon. The populations that live under these natural conditions face elevated risk and potential disaster as negative impacts, while also benefitting from positive ecological goods and services. There are therefore tradeoffs and conflicts within the water-energy-food nexus, as well as among various stakeholders in the region. The objective of this project is to maximize human-environmental security (minimize the risk) by choosing management structures and policies that optimize both the water-food-energy nexus in Asia-Pacific coastal regions. We define joint security approach as optimized policy. Optimal policies will develop joint security approaches for human-environmental security in the coastal region of the Ring of Fire, including stakeholders and decision-makers.

  16. Nuclear Power: The Fifth Horseman. Worldwatch Paper 6.

    ERIC Educational Resources Information Center

    Hayes, Denis

    This publication is the sixth in a series of papers on global environmental issues. This paper evaluates the future of nuclear power, subjecting it to several tests: (1) economics; (2) safety; (3) adequacy of fuel supplies; (4) environmental impact; and (5) both national and international security. Section headings include: (1) The nuclear fuel…

  17. Worldwide Emerging Environmental Issues Affecting the U.S. Military. January 2009

    DTIC Science & Technology

    2009-01-01

    islands as a consequence of climate change effects. Coastal residents of Fiji were instructed to move to higher ground to avoid storms and flooding...environmental matters from energy security to international cooperation for addressing climate change . [See Appendix for more detail]. Military...military environmental programs could receive higher profiles. Since climate change is a new top priority, the military should identify all its resources

  18. Environmental Security: What Environmental Issues Impact Regional Stability and Affect United States Foreign Policy with Mexico?

    DTIC Science & Technology

    1997-03-01

    extraregional sponsor of Alianza para el Desarrollo Sostenible (Sustainable Development Alliance - ALIDES), along with United States and Canada. ALIDES is...more stable the government the better the country will be able to solve its environmental problems. 42 Glossary ALIDES Alianza para el Desarrollo ... Sostenible (Sustainable Development Alliance) C Centigrade CFCs Chlorofluorocarbons BECC Border Environment Cooperation Commission BNC Binational

  19. 78 FR 4879 - Nine Mile Point 3 Nuclear Project, LLC and UniStar Nuclear Operating Services, LLC Combined...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-23

    ... Analysis Report (FSAR). On December 1, 2009, UniStar Nuclear Energy (UNE), acting on behalf of the COL... Exclusion From Environmental Review With respect to the exemption's impact on the quality of the human... relation to security issues. Therefore, the common defense and security is not impacted by this exemption...

  20. Dual mode vehicle and infrastructure alternatives analysis

    DOT National Transportation Integrated Search

    2008-04-01

    The United States has a transportation challenge that requires addressing four issues simultaneously: traffic congestion, environmental pollution, safety, and energy security. A potential solution to these transportation challenges is the concept of ...

  1. Environmental agreements, EIA follow-up and aboriginal participation in environmental management: The Canadian experience

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O'Faircheallaigh, Ciaran

    2007-05-15

    During the last decade a number of environmental agreements (EAs) have been negotiated in Canada involving industry, government and Aboriginal peoples. This article draws on the Canadian experience to consider the potential of such negotiated agreements to address two issues widely recognised in academic and policy debates on environmental impact assessment (EIA) and environmental management. The first relates to the need to secure indigenous participation in environmental management of major projects that affect indigenous peoples. The second and broader issue involves the necessity for specific initiatives to ensure effective follow-up of EIA. The Canadian experience indicates that negotiated environmental agreementsmore » have considerable potential to address both issues. However, if this potential is to be realized, greater effort must be made to develop structures and processes specifically designed to encourage Aboriginal participation; and EAs must themselves provide the financial and other resource required to support EIA follow-up and Aboriginal participation.« less

  2. Cooperative monitoring and its role in regional security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Biringer, K.; Olsen, J.; Lincoln, R.

    1997-03-01

    Cooperative monitoring systems can play an important part in promoting the implementation of regional cooperative security agreements. These agreements advance the national security interests of the United States in a post Cold War environment. Regional issues as widely varying as nuclear nonproliferation, trade and environmental pollution can be the source of tensions which may escalate to armed conflict which could have global implications. The Office of National Security Policy Analysis at the US Department of Energy (DOE) has an interest in seeking ways to promote regional cooperation that can reduce the threats posed by regional conflict. DOE technologies and technicalmore » expertise can contribute to developing solutions to a wide variety of these international problems. Much of this DOE expertise has been developed in support of the US nuclear weapons and arms control missions. It is now being made available to other agencies and foreign governments in their search for regional security and cooperation. This report presents two examples of interest to DOE in which monitoring technologies could be employed to promote cooperation through experimentation. The two scenarios include nuclear transparency in Northeast Asia and environmental restoration in the Black Sea. Both offer the potential for the use of technology to promote regional cooperation. The issues associated with both of these monitoring applications are presented along with examples of appropriate monitoring technologies, potential experiments and potential DOE contributions to the scenarios.« less

  3. DESERTIFICATION IN THE MEDITERRANEAN REGION. A SECURITY ISSUE

    EPA Science Inventory

    Desertification (representing soil degradation) is one of the three nature-induced (climate change, hydrological cycle) and of three primarily human-induced challenges (population growth, urbanisation and food) of global environmental change. These six components closely interact...

  4. Worldwide Emerging Environmental Issues Affecting the U.S. Military. Summarizing Environmental Security Monthly Scanning, July 2006-June 2007

    DTIC Science & Technology

    2007-06-01

    if used on the battlefield. Clarification of what chemicals will be allowed under the treaty’s exception is needed. “The biological weapons threat... biological , and chemical weapons countermeasures include: • adoption of amendments to the Convention on the Physical Protection of Nuclear Material...to Increase Enforcement of Environmental Regulations and Public Participation Sixth Review Conference of the Biological Weapons Convention Kyoto

  5. Peace and security in Northeast Asia: The nuclear issue and the Korean Peninsula

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kihl, Y.W.; Hayes, P.; Scalapino, R.A.

    1996-01-01

    Korean security was the focus of world-wide attention and concern in 1993--95 with North Korea's 'suspected' nuclear weapons program. Dubbed by some as the first post-Cold War nuclear crisis, it was triggered by the United Nations Security Council's move to impose economic sanctions on North Korea. Although the immediate crisis was defused diplomatically, the nuclear time bomb continues to tick on the Korean peninsula, and the issues remain under close international surveillance. This important book examines North Korea's nuclear controversy from a variety of perspectives, including nuclear reactor technology and technology transfer, economic sanctions and incentives, strategic calculus and confidence-buildingmore » measures, the major powers, and environmental challenges that a nuclear-free zone in Korea will present.« less

  6. Rising India: The Political and Economic Effects on the Future of Nepal

    DTIC Science & Technology

    2010-06-11

    the international system. 36 33Namita Bhandare, ed., India: The Next Global Power? (New Delhi: Lotus ...an invasion of Nepal would inevitably threaten the safety of India. 60 58Prithvi Narayan Shah...settled issues on water rights, environmental issues, energy and food security.99 By working through SAARC, India hopes to retain its status as an

  7. Ukraine’s Defense Dilemma

    DTIC Science & Technology

    1992-08-25

    Ukraine has made environmental issues a top priority in any national security equation. The Chernobyl disaster of April 1986 is estimated to have...investment in Ukraine and in other former Soviet republics may be jeopardized by another environmental disaster of Chernobyl proportions. As an energy...adequate nuclear plants nor ailternative energy sources beyond coal to substitute for nuclear generated electricity. Some 16 Chernobyl -type graphite

  8. The DHS Directorate of Science and Technology: Key Issues for Congress

    DTIC Science & Technology

    2009-06-22

    recently under the authority of the Homeland Security Act. Environmental Measurements Laboratory The Environmental Measurements Laboratory ( EML ) in...Historically, the focus of EML was detection and monitoring of low-level radiation releases. The transfer of EML to the S&T Directorate required a realignment...debated whether EML is most appropriately positioned in 7 EML realignment and related

  9. Using a Prediction Model to Manage Cyber Security Threats.

    PubMed

    Jaganathan, Venkatesh; Cherurveettil, Priyesh; Muthu Sivashanmugam, Premapriya

    2015-01-01

    Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.

  10. Using a Prediction Model to Manage Cyber Security Threats

    PubMed Central

    Muthu Sivashanmugam, Premapriya

    2015-01-01

    Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization. PMID:26065024

  11. Global water risks and national security: Building resilience (Invited)

    NASA Astrophysics Data System (ADS)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere, and (3) Identify preventable risks, public leadership and private innovation needed for developing adaptive water resource management institutions that take advantage of climate and hydrologic information and changes. The presentation will conclude with a preliminary framework for assessing and implementing water security measures given insecure conditions introduced by a changing climate and in the context of national security.

  12. Demonstration of an Environmentally Benign and Reduced Corrosion Runway Deicing Fluid

    DTIC Science & Technology

    2011-01-01

    ADDRESS(ES) Enviromental Security Technology Certification Program: 901 North Stuart Street, Suite 303, Arlington, Virginia 22203 10. SPONSOR...IMPLEMENTATION ISSUES Users may express concern because the Battelle-RDF is new and they may have reservations because of its potential damage to...several drivers for implementing a new , more environmentally friendly RDF. 1.3.1 Water Pollution Reduction The Clean Water Act (CWA) and its

  13. Satellite Power Systems (SPS) laser studies. Volume 1: Laser environmental impact study

    NASA Technical Reports Server (NTRS)

    Beverly, R. E., III

    1980-01-01

    The environmental impact of space to Earth power transmission using space borne laser subsystems is emphasized. A laser system is defined, estimates of relevant efficiencies for laser power generation and atmospheric transmission are developed, and a comparison is made to a microwave system. Ancillary issues, such as laser beam spreading, safety and security, mass and volume estimates and technology growth are considered.

  14. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network.

    PubMed

    Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing

    2016-12-30

    Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods.

  15. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network

    PubMed Central

    Pirbhulal, Sandeep; Zhang, Heye; E Alahi, Md Eshrat; Ghayvat, Hemant; Mukhopadhyay, Subhas Chandra; Zhang, Yuan-Ting; Wu, Wanqing

    2016-01-01

    Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches for several applications, including smart homes, healthcare, environmental monitoring, and homeland security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT) for connecting everyday life objects to the internet. Hence, major challenges of WSNs include: (i) how to efficiently utilize small size and low-power nodes to implement security during data transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh and complex environmental conditions during data transmission over a long coverage range. In this study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi were included in WSNs with the Internet to develop a novel IoT-based smart home which could provide secure data transmission among several associated sensor nodes in the network over a long converge range. The developed IoT based system has outstanding performance by fulfilling all the necessary security requirements. The experimental results showed that the proposed TBSA algorithm consumed less energy in comparison with some existing methods. PMID:28042831

  16. US Naval Facilities Engineering Service Center Environmental Program on Climate Change

    DTIC Science & Technology

    2008-09-01

    of environmental issues related to climate change . There is a growing recognition that the Navy will need to perform its national security mission in... climate change -related technology work at the Naval Facilities Engineering Service Center (NAVFAC ESC) in Port Hueneme, California. NAVFAC ESC...categorized technologies that can be applied to climate change as mitigation, adaptation, and intervention. An essential element of the Navy’s response to

  17. 7 CFR 1469.6 - Enrollment criteria and selection process.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION SECURITY PROGRAM... ground water quality to degradation; (ii) Potential of soil to degradation; (iii) Potential of grazing land to degradation; (iv) State or national conservation and environmental issues e.g., location of air...

  18. 7 CFR 1469.6 - Enrollment criteria and selection process.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION SECURITY PROGRAM... ground water quality to degradation; (ii) Potential of soil to degradation; (iii) Potential of grazing land to degradation; (iv) State or national conservation and environmental issues e.g., location of air...

  19. 7 CFR 1469.6 - Enrollment criteria and selection process.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION SECURITY PROGRAM... ground water quality to degradation; (ii) Potential of soil to degradation; (iii) Potential of grazing land to degradation; (iv) State or national conservation and environmental issues e.g., location of air...

  20. Biofuels: Report to Congress

    EPA Science Inventory

    Section 204 of the Energy Independence and Security Act of 2007 (EISA 2007) requires EPA to assess and report to Congress on the impacts to date and likely future impacts of the increased use of biofuels as required by the Clean Air Act, section 211(0). Environmental issues (...

  1. Policy and effective action for soil security: a need for reframing the soil story

    NASA Astrophysics Data System (ADS)

    Bouma, Johan

    2015-07-01

    Soil science is a vital scientific discipline producing cutting-edge research in its various sub-disciplines. Its role in studying major environmental issues, often defined as food security, water and energy availability, climate change and biodiversity loss, is, however, less obvious to stakeholders, policy makers and the public at large. It deserves better. Reframing the soil story by taking a pro-active interdisciplinary approach in demonstrating the role of soils when studying these issues is advocated in the context of the ten Sustainable Development Goals. Soil change matters not only in a negative way when referring to erosion and degradation but also, and particularly, to soil improvement. But only successfully completed programs in practice will be convincing and that's why an active role of soil researchers and soil scientists, acting as knowledge brokers, is advocated in transdisciplinary programs. This includes more emphasis on preparation and implementation than is allowed in current programs. A case study is presented and a narrative is used to link the five major environmental issues in a logical sequence, showing their interdependence. Current soil research and education programs should reflect demands made by inter- and transdisciplinary approaches and need a new, fresh approach.

  2. Assessment of ecological security based on soil and water conservation: a case study from Gansu Province, China

    NASA Astrophysics Data System (ADS)

    Li, Z. J.; Tian, Q.; Song, L. L.

    2016-08-01

    In this study, the analytic hierarchy process (ahp), ecological security index(S) and PSR model were used to evaluate Gansu's ecological security based on the large number of survey data. The results indicated that Gansu's ecological security index increased from 0.31 in 1986 to 0.66 in 2013, which reflected ecological security was in sensitive state (0.7༞S≥⃒0.5). The main reason was that national policy on protecting the ecological environment has played a crucial role, especially the national project of returning farmland to forest and grass carried out in recent years. Moreover, the environmental issues such as the higher PM2.5, sand storms and climate extremes, had significantly improved people's environmental awareness in the study area. The regional difference of ecological security index was significant in Gansu Provinces, and the part of Yangtze river basin was higher than the part of Yellow River basin, whiles the in-land river basin was the lowest value. In a world, Gansu's ecological security had improved in recent years, but there was strong need for paying more attention to policy for ecological environment protection and increasing the propaganda to ensure the Gansu's ecological security in the future. This study will provide a scientific basis for the sustainable development of regional social economy and ecological environment.

  3. Learning That Makes a Difference: Pedagogy and Practice for Learning Abroad

    ERIC Educational Resources Information Center

    Benham Rennick, Joanne

    2015-01-01

    Society faces significant new challenges surrounding issues in human health; global security; environmental devastation; human rights violations; economic uncertainty; population explosion and regression; recognition of diversity, difference and special populations at home and abroad. In light of these challenges, there is a great opportunity, and…

  4. Status of STEM High Schools and Implications for Practice

    ERIC Educational Resources Information Center

    Gubbins, E. Jean; Villanueva, Merzili; Gilson, Cindy M.; Foreman, Jennifer L.; Bruce-Davis, Micah N.; Vahidi, Siamak; Callahan, Carolyn M.; Tofel-Grehl, Colby

    2013-01-01

    As a nation, society benefits from an educated populace. At a time when economic, environmental, social, and security issues are the focus of many conversations in businesses, industries, government offices, schools, and homes, policymakers turn their attention to the further development of human capital. Educators acknowledge that they have key…

  5. Environmental Measurements Laboratory 1994 annual report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chieco, N.A.; Krey, P.W.; Beck, H.L.

    1995-08-01

    This report summarizes the activities of the Environmental Measurements Laboratory (EML) for the calendar year 1994 and it serves as an annual report to the Director of the Office of Energy Research (ER), the Associate Director and staff of the Office of Health and Environmental Research (OHER), the manager and staff of the Chicago Field Office, and the authors colleagues. Emphasized are the progress and accomplishments of the year, rather than future plans or expectations. The technical summaries are grouped according to the following seven general program areas: environmental radiation and radioactivity; radiation transport and dosimetry; environmental radon, thoron, andmore » related aerosols; atmospheric and surface pollutant studies related to global climate change; atmospheric chemistry; metrology, consultation, and emergency response; environmental management. EML`s mission is to address important scientific questions concerning human health and environmental impacts. Through its multidisciplinary staff, EML conducts experimental and theoretical research on radioactive and other energy-related pollutants, and provides DOE and other federal agencies with the in-house capability to respond effectively and efficiently with regard to quality assurance activities, environmental issues and related national security issues.« less

  6. United States and environmental security: Deforestation and conflict in southeast Asia. Master's thesis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greenwald, P.T.

    In the post Cold War era, the East-West conflict may be succeeded by a new confrontation which pits an industrialized North against a developing South. In June 1992, world attention was fixed on the Earth Summit in Rio de Janeiro. This event marked a milestone in global environmental awareness; but just as the end of the Cold War has provided new opportunities for the US, the world is now faced with new sources of conflict which have advanced to the forefront of the national security debate. Among the new sources of conflict, environmental problems are rapidly becoming preeminent. Within nationalmore » security debates, those environmental problems which respect no international boundary are of particular concern. Worldwide deforestation, and the related issues of global warming and the loss of biodiversity, represent a clear threat to national security. Two percent of the Earth's rainforests are lost each year; one 'football field' is lost each second. Deforestation has already led to conflict and instability within several regions of the world including Southeast Asia. The United States must recognize the character and dynamics of these new sources of conflict in order to successfully realize its policy aims in national security. The US should preempt conflict through cooperation and develop a shared concern for the environment throughout the world. The US military may play a key role in this effort. Rainforest, Deforestation, Tropical timber, Logging, Southeast Asia, Philippines, Malaysia, Indonesia, Thailand, Burma, Laos, Japan Cambodia, Vietnam, Human rights, Plywood, Pulp, Paper, World Bank, U.S. Agency for International Development.« less

  7. Worldwide Emerging Environmental Issues Affecting the U.S. Military. Summarizing Environmental Security Monthly Scanning. July 2008 - June 2009

    DTIC Science & Technology

    2009-06-01

    difficulties for the fuel cell economy is efficiently producing pure hydrogen. Mercouri G. Kanatzidis , a chemist at Northwestern University, has...flooding, with an estimated 3 million people in need of assistance “such that only the Army can handle it,” said Parshuram Rai , director, Centre for...polluters, levied heavy fines on one factory, and threatened criminal prosecutions. The country is having a hard time, however, in balancing the

  8. [Principles and methodology for ecological rehabilitation and security pattern design in key project construction].

    PubMed

    Chen, Li-Ding; Lu, Yi-He; Tian, Hui-Ying; Shi, Qian

    2007-03-01

    Global ecological security becomes increasingly important with the intensive human activities. The function of ecological security is influenced by human activities, and in return, the efficiency of human activities will also be affected by the patterns of regional ecological security. Since the 1990s, China has initiated the construction of key projects "Yangtze Three Gorges Dam", "Qinghai-Tibet Railway", "West-to-East Gas Pipeline", "West-to-East Electricity Transmission" and "South-to-North Water Transfer" , etc. The interaction between these projects and regional ecological security has particularly attracted the attention of Chinese government. It is not only important for the regional environmental protection, but also of significance for the smoothly implementation of various projects aimed to develop an ecological rehabilitation system and to design a regional ecological security pattern. This paper made a systematic analysis on the types and characteristics of key project construction and their effects on the environment, and on the basis of this, brought forward the basic principles and methodology for ecological rehabilitation and security pattern design in this construction. It was considered that the following issues should be addressed in the implementation of a key project: 1) analysis and evaluation of current regional ecological environment, 2) evaluation of anthropogenic disturbances and their ecological risk, 3) regional ecological rehabilitation and security pattern design, 4) scenario analysis of environmental benefits of regional ecological security pattern, 5) re-optimization of regional ecological system framework, and 6) establishment of regional ecosystem management plan.

  9. Guide to Population Issues for Students and Teachers [and] Curriculum Guide.

    ERIC Educational Resources Information Center

    Facing the Future, Lopez Island, WA.

    As the world grapples with increasing environmental, social, and security problems, population is rarely considered a cause or contributing factor. The relationship of population to the human condition, and to the condition of the Earth, is often subtle and complex. But population growth affects almost every aspect of life from education to…

  10. Transnational architecting for homeland defense

    NASA Astrophysics Data System (ADS)

    O'Brien, Thomas W.

    2002-07-01

    The homeland security interests of a many nations are being increasingly threatened by the proliferation of weapons of mass destruction, drug trafficking, mass migration, global terrorism, environmental concerns, international crime and other global issues. This paper presents the case for development of such a transnational ballistic missile defense architecture for homeland defense and specifically addresses the architecture methodology and process, as well as the potential benefits and the top-level architecture trade issues that would have to be addressed if the community should decide to seriously pursue such an approach.

  11. State-of-the-art in biosafety and biosecurity in European countries.

    PubMed

    Bielecka, Anna; Mohammadi, Ali Akbar

    2014-06-01

    The terms biosafety and biosecurity are widely used in different concepts and refer not only to protection of human beings and their surrounding environment against hazardous biological agent, but also to global disarmament of weapons of mass destruction. As a result, the biosafety and biosecurity issues should be considered interdisciplinary based on multilateral agreements against proliferation of biological weapons, public health and environmental protection. This publication presents information on both, international and national biosafety and biosecurity legislation. Status of national implementation of the Biological and Toxin Weapons Convention, penalization issues and measures to account for and secure production, use, storage of particularly dangerous pathogens or activities involving humans, plants and animals where infection may pose a risk have been analyzed. Safety and security measures in laboratories have been studied. Moreover, dual-use technology and measures of secure transport of biohazard materials have been also taken into account. In addition, genetic engineering regulations, biosecurity activities in laboratories and code of conducts have been investigated, as well.

  12. Worldwide Emerging Environmental Issues Affecting the U.S. Military. December 2008 Report

    DTIC Science & Technology

    2008-12-01

    Environmental Security Implications……………..…3 7.1 New Protection for Plastic Electronics……………………………………………….3 7.2 Reusable Hydrogels Detect and Remove...www.nanowerk.com/spotlight/spotid=8555.php 7.2 Reusable Hydrogels Detect and Remove Heavy Metals from Contaminated Water Scientists at the...Department of Chemistry, University of California at Berkeley developed a group of low cost protein-cross-linked hydrogels , incorporating pea

  13. Worldwide Emerging Environmental Issues Affecting the U.S. Military. May 2007 Report

    DTIC Science & Technology

    2007-05-01

    Change…………………………….…….4 6.2 Nuclear Nonproliferation Treaty Stalemate Continues…………………………..…..5 6.3 Stockholm Convention on POPs Adopts Evaluation but...cooperation and implementation of the Convention on Desertification; and strengthen international cooperation in scientific research and technology transfer...Environmental Security Issues––May 2007 5 AC/UNU Millennium Project 6.3 Stockholm Convention on POPs Adopts

  14. Information Security Management - Part Of The Integrated Management System

    NASA Astrophysics Data System (ADS)

    Manea, Constantin Adrian

    2015-07-01

    The international management standards allow their integrated approach, thereby combining aspects of particular importance to the activity of any organization, from the quality management systems or the environmental management of the information security systems or the business continuity management systems. Although there is no national or international regulation, nor a defined standard for the Integrated Management System, the need to implement an integrated system occurs within the organization, which feels the opportunity to integrate the management components into a cohesive system, in agreement with the purpose and mission publicly stated. The issues relating to information security in the organization, from the perspective of the management system, raise serious questions to any organization in the current context of electronic information, reason for which we consider not only appropriate but necessary to promote and implement an Integrated Management System Quality - Environment - Health and Operational Security - Information Security

  15. Security Vulnerability Profiles of NASA Mission Software: Empirical Analysis of Security Related Bug Reports

    NASA Technical Reports Server (NTRS)

    Goseva-Popstojanova, Katerina; Tyo, Jacob P.; Sizemore, Brian

    2017-01-01

    NASA develops, runs, and maintains software systems for which security is of vital importance. Therefore, it is becoming an imperative to develop secure systems and extend the current software assurance capabilities to cover information assurance and cybersecurity concerns of NASA missions. The results presented in this report are based on the information provided in the issue tracking systems of one ground mission and one flight mission. The extracted data were used to create three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified the software bugs that are security related and classified them in specific security classes. This information was then used to create the security vulnerability profiles (i.e., to determine how, why, where, and when the security vulnerabilities were introduced) and explore the existence of common trends. The main findings of our work include:- Code related security issues dominated both the Ground and Flight mission IVV security issues, with 95 and 92, respectively. Therefore, enforcing secure coding practices and verification and validation focused on coding errors would be cost effective ways to improve mission's security. (Flight mission Developers issues dataset did not contain data in the Issue Category.)- In both the Ground and Flight mission IVV issues datasets, the majority of security issues (i.e., 91 and 85, respectively) were introduced in the Implementation phase. In most cases, the phase in which the issues were found was the same as the phase in which they were introduced. The most security related issues of the Flight mission Developers issues dataset were found during Code Implementation, Build Integration, and Build Verification; the data on the phase in which these issues were introduced were not available for this dataset.- The location of security related issues, as the location of software issues in general, followed the Pareto principle. Specifically, for all three datasets, from 86 to 88 the security related issues were located in two to four subsystems.- The severity levels of most security issues were moderate, in all three datasets.- Out of 21 primary security classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, these classes contributed from around 80 to 90 of all security issues in each dataset. This again proves the Pareto principle of uneven distribution of security issues, in this case across CWE classes, and supports the fact that addressing these dominant security classes provides the most cost efficient way to improve missions' security. The findings presented in this report uncovered the security vulnerability profiles and identified the common trends and dominant classes of security issues, which in turn can be used to select the most efficient secure design and coding best practices compiled by the part of the SARP project team associated with the NASA's Johnson Space Center. In addition, these findings provide valuable input to the NASA IVV initiative aimed at identification of the two 25 CWEs of ground and flight missions.

  16. Environmental Measurements Laboratory, annual report 1995

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Krey, P.W.; Heit, M.

    1996-07-01

    This report summarizes the activities of the Environmental Measurements Laboratory (EML) for the calendar year 1995 and serves as an annual report to the Director of the Office of Energy Research (ER), the Associate Director and staff of the Office of Health and Environmental Research (OHER), the Manager and staff of the Chicago Operations Office, and our colleagues. Emphasized are the progress and accomplishments of the year, rather than future plans or expectations. The technical summaries are grouped according to the following seven research program areas: (1) Environmental Radiation and Radioactivity; (2) Radiation Transport and Dosimetry; (3) Environmental Radon, Thoron,more » and Related Aerosols; (4) Atmospheric and Surface Pollutant Studies Related to Global Climate Change; (5) Atmospheric Chemistry; and (6) Metrology, Consultation, and Emergency Response Environmental Management The mission of EML is to address important scientific questions concerning human health and environmental impacts. Through its multidisciplinary staff, EML conducts experimental and theoretical research on radioactive and other energy-related pollutants and provides DOE and other federal agencies with the in-house capability to respond effectively and efficiently with regard to quality assurance activities, environmental issues, and related national security issues.« less

  17. The peanut genome consortium and peanut genome sequence: Creating a better future through global food security

    USDA-ARS?s Scientific Manuscript database

    The competitiveness of peanuts in domestic and global markets has been threatened by losses in productivity and quality that are attributed to diseases, pests, environmental stresses and allergy or food safety issues. The U.S. Peanut Genome Initiative (PGI) was launched in 2004, and expanded to a gl...

  18. A Qualitative Examination of Success Factors for Tenure-Track Women Faculty in Postsecondary Agricultural Education

    ERIC Educational Resources Information Center

    Murphrey, Theresa Pesl; Odom, Summer F.; McKee, Valerie; Wilkens, Carley Christiansen

    2016-01-01

    With the growing need for agricultural institutions to provide solutions to global concerns, environmental issues, food security and sustainable agriculture, competent individuals are needed to lead in excellence and innovation. The role of gender in determining success in the workplace has been studied from many perspectives. The purpose of this…

  19. The Impact of Personality and Test Conditions on Mathematical Test Performance

    ERIC Educational Resources Information Center

    Hayes, Heather; Embretson, Susan E.

    2013-01-01

    Online and on-demand tests are increasingly used in assessment. Although the main focus has been cheating and test security (e.g., Selwyn, 2008) the cross-setting equivalence of scores as a function of contrasting test conditions is also an issue that warrants attention. In this study, the impact of environmental and cognitive distractions, as…

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Greenberg, Raymond; Wright, Kyle A.; McCaw, Erica E.

    The Global Threat Reduction Initiative (GTRI) reduces and protects vulnerable nuclear and radiological material located at civilian sites worldwide. Internationally, over 40 countries are cooperating with GTRI to enhance the security of these materials. The GTRI program has worked successfully with foreign countries to remove and protect nuclear and radioactive materials, including orphaned and disused high-activity sources. GTRI began cooperation with the Republic of Colombia in April 2004. This cooperation has been a resounding success by securing forty high-risk sites, consolidating disused/orphan sources at an interim secure national storage facility, and developing a comprehensive approach to security, training, and sustainability.more » In 2005 the Colombian Ministry of Mines and Energy requested the Department of Energy’s support in the construction of a new Central Storage Facility (CSF). In December 2005, the Ministry selected to construct this facility at the Institute of Geology and Mining (Ingeominas) site in Bogota. This site already served as Colombia’s national repository, where disused sources were housed in various buildings around the complex. The CSF project was placed under contract in May 2006, but environmental issues and public protests, which led to a class action lawsuit against the Colombian Government, forced the Ministry to quickly suspend activities, thereby placing the project in jeopardy. Despite these challenges, however, the Ministry of Mines and Energy worked closely with public and environmental authorities to resolve these issues, and continued to be a strong advocate of the GTRI program. In June 2008, the Ministry of Mines and Energy was granted the construction and environmental licenses. As a result, construction immediately resumed and the CSF was completed by December 2008. A commissioning ceremony was held for the new facility in January 2009, which was attended by representatives from the Department of Energy, U.S. Embassy, and the Ministry of Mines and Energy, including the Minister and Vice Minister.« less

  1. Lessons Learned: Tribal Community Engagement, Remediation and Restoration of a Uranium Mine Tailings Site, Navajo Nation - 12484

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wadsworth, Donald K.; Hicks, Allison H.

    2012-07-01

    In May, 2011 New World Environmental Inc. was awarded a contract by the Navajo Nation Environmental Protection Agency to remediate an illegal radioactive waste disposal site located in the Navajo Nation. The initial scope included the excavation and shipment of an estimated 3,000 cubic yards of Uranium mine tailings and associated industrial waste. In this instance Stakeholders were supportive of the project, remediation and restoration, yet the movement of residual radioactive materials through tribal communities was a controversial issue. Other Stakeholder issues included site security, water sources for remediation activities, local residents' temporary re-location and care of livestock, right ofmore » way permissions and local workforce development. This presentation recaps the technical and non-technical issues encountered in the remediation and restoration the seven acre site and the outreach to surrounding communities. Cultural and equity issues resulting from historical problems associated with this and other sites in the immediate area and education and training. (authors)« less

  2. Issues and options in addressing the environmental consequences of livestock sector's growth.

    PubMed

    Gerber, P J; Vellinga, T V; Steinfeld, H

    2010-02-01

    The growth of the livestock sector is being achieved at substantial environmental costs. Today, livestock are a major stressor of the global environmental, occupying a quarter of emerged land (including a third of arable land), contributing close to a fifth of the anthropogenic greenhouse gas emissions, using eight percent of all water resources and threatening a wide range of endangered species. At the same time, livestock are also a crucial engine of rural growth and a tool for improving food security. Policies are required to guide the sector in achieving sometimes conflicting development objectives. Potential pathways include encouraging resource use efficiency, correcting for environmental externalities and accelerating technological change.

  3. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  4. Strategic planning for national security: Lessons from business experience. Interim report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bracken, P.

    1990-02-01

    United States defense planning is at a crossroads and it is therefore useful to review not only discrete issues, but even basic concepts of strategic planning. This Note reviews concepts used in the business world to build insights about how to view current and prospective problems, opportunities, and choices. The author draws upon the business literature for both ideas and metaphors. He observes that U.S. national security planning could profit greatly from an approach that distinguishes among core, environmental, and hedging strategies, and that considers security analogs to such business concepts as defining the business, dealing with new competitors, controllingmore » the intensity of competition, entry and exit barriers, and the need to redeploy assets and restructure the organization. He then relates these concepts to specific problems of national security interest.« less

  5. Environmental security in the Czech Republic: Status and concerns in the post Communist era

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Valley, P.J.

    1998-10-01

    The Czech Republic has made great strides toward reconciling its political and economic development with environmental protection and security issues since its recent democratization. Although new technological and legislative efforts continue to work at reducing emissions from automobiles, industries, power plants and coal mining, the Republic is committed to continuing its battle against air and water pollution, poor waste management, and needless destruction of nature. Shifting the structure of primary energy sources to qualitatively better fuels, along with the introduction of less energy-consuming technologies and the activation of new nuclear reactors, would eventually replace most of the output of coalmore » burning power plants. However, the use of nuclear power has been opposed by several political and environmental activists groups. At the international level, Austria`s opposition to the Temelin Nuclear Power plant is of great concern since Austria, as a non-nuclear state, propagates negative information about nuclear power to its citizens and other countries.« less

  6. Worldwide Emerging Environmental Issues Affecting the U.S. Military. November 2009 Report

    DTIC Science & Technology

    2009-11-01

    091106_Climate_Change.doc.htm Climate Change and Food Security in the Pacific ftp://ftp.fao.org/docrep/fao/012/i1262e/i1262e00. pdf Food security in the...2009/en/ pdf /EN_SOWP09. pdf Women Central to Efforts to Deal With Climate Change , Says New UNFPA Report http://www.unfpa.org/public/News/pid/4259...Announce Climate Change Goals…………………………………….1 Item 2. Changes to War Crimes Proposed for the International Criminal Court…..………1 Item 3. Increased

  7. Environmental Lessons from China: Finding Promising Policies 
in Unlikely Places

    PubMed Central

    Zhang, Junfeng

    2011-01-01

    Background: Alongside the major health risks posed by environmental pollution in China are recent achievements on several environmental issues that have affluent Western nations racing to catch up. The country has propelled itself to a position of leadership in clean energy and efficiency, for instance, with important consequences for public health. Objectives: We comment on China’s challenges and recent accomplishments in addressing environmental problems from domestic pollution to global climate change. We compare China’s commitment to clean energy technology with that of other leading nations and discuss key achievements in other areas, including vehicle efficiency standards and transportation policy. Discussion: We discuss policy directions that would secure much-needed improvements to environmental quality and health in China, along with actions that could motivate global action on issues of energy conservation and pollution reduction. Conclusions: A comprehensive regulatory and institutional framework for environmental policy is within reach in China but will require addressing major hurdles such as the lack of an independent monitoring mechanism and the need for greater transparency and enforcement in environmental matters. Meanwhile, China can continue to set important examples by investing in renewable energy, improving energy efficiency, and limiting greenhouse gas emissions. PMID:21402514

  8. Security and health research databases: the stakeholders and questions to be addressed.

    PubMed

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.

  9. Worldwide Emerging Environmental Issues Affecting the U.S. Military. Summarizing Environmental Security Monthly Scanning July 2007 - December 2007

    DTIC Science & Technology

    2007-12-01

    times more livelihoods are devastated by natural disasters than by war worldwide, at the moment, and this is going to be much worse, the way the...Act of 2007––that would require cleaner fuels and engines in all ocean- going vessels calling at U.S. ports––was introduced in the Senate (SB 1499) and...to multi-walled carbon nanotubes ( MWCNT ) in mouse embryonic stem cells. The methodology used is highly versatile for testing genotoxicity and hence

  10. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE... the screening threshold quantity by security issue. (a) General. In calculating whether a facility...

  11. Current frontiers and future directions of telecoupling research

    NASA Astrophysics Data System (ADS)

    Liu, J.

    2016-12-01

    The world has been increasingly interconnected over long distances though processes such as international trade, migration, telecommunication, and disease spread. However, previous studies often focused on socioeconomic or environmental issues of distant processes. While these studies have generated useful information for individual disciplines, integrating socioeconomic and environmental information is essential for holistic understanding of complex global challenges and unbiased decision making to address the challenges. To advance integrated research, the framework of telecoupling (socioeconomic and environmental interactions over distances) has been developed to explicitly address both socioeconomic and environmental issues simultaneously. Although the framework is relatively new, it has already been applied to tackle a variety of globally important issues, such as food security, water resources, energy sustainability, land use, international trade (e.g., food, forest products, energy, wildlife, industrial products), species invasion, investment, ecosystem services, conservation, information dissemination, and tourism. These applications have identified many important research gaps (e.g. spillover systems) and hidden linkages (e.g. feedbacks) among distant areas of the world with profound implications for sustainable development, ecosystem health, and human well-being. While working with telecoupling presents more challenges than focusing only on disciplinary issues, support from funding agencies has helped accelerate research on telecoupling and more efforts are being aimed at framework quantification and operationalization. The presenter will provide an overview of the current frontiers, discuss future research directions, and highlight emerging opportunities and challenges in telecoupling research and governance.

  12. How issue frames shape beliefs about the importance of climate change policy across ideological and partisan groups

    PubMed Central

    2017-01-01

    We use an experiment to examine whether the way in which climate change is framed affects individuals’ beliefs about its importance as a policy issue. We employ frames that emphasize national security, human rights, and environmental importance about the consequences of climate change. We find no evidence that issue frames have an overall effect on opinions about the importance of climate change policy. We do find some evidence that the effect of issue frames varies across ideological and partisan groups. Most notably, issue frames can lead Republicans and those on the political right to view climate change policy as less important. We conclude by discussing our findings relative to extant literature and considering the implications of our findings for those who seek to address the issue of climate change. PMID:28727842

  13. How issue frames shape beliefs about the importance of climate change policy across ideological and partisan groups.

    PubMed

    Singh, Shane P; Swanson, Meili

    2017-01-01

    We use an experiment to examine whether the way in which climate change is framed affects individuals' beliefs about its importance as a policy issue. We employ frames that emphasize national security, human rights, and environmental importance about the consequences of climate change. We find no evidence that issue frames have an overall effect on opinions about the importance of climate change policy. We do find some evidence that the effect of issue frames varies across ideological and partisan groups. Most notably, issue frames can lead Republicans and those on the political right to view climate change policy as less important. We conclude by discussing our findings relative to extant literature and considering the implications of our findings for those who seek to address the issue of climate change.

  14. Implications of Postharvest Food Loss/Waste Prevention to Energy and Resources Conservation

    NASA Astrophysics Data System (ADS)

    Cai, X.; Shafiee-Jood, M.

    2015-12-01

    World's growing demand for food is driven by population and income growth, dietary changes, and the ever-increasing competition between food, feed and bioenergy challenges food security; meanwhile agricultural expansion and intensification threats the environment by the various detrimental impacts. Researchers have attempted to explore strategies to overcome this grand challenge. One of the promising solutions that have attracted considerable attention recently is to increase the efficiency of food supply chain by reducing food loss and waste (FLW). According to recent studies conducted by Food and Agriculture Organization (FAO), United Nation, almost one third of the food produced for human consumption globally is lost or wasted along the food supply chain. This amount of food discarded manifests a missing, yet potential, opportunity to sustainably enhance both food security and environmental sustainability. However, implementing the strategies and technologies for tackling FLW does not come up as an easy solution since it requires economic incentives, benefit and cost analysis, infrastructure development, and appropriate market mechanism. In this presentation I will provide a synthesis of knowledge on the implications of postharvest food loss/waste prevention to energy and resource conservation, environmental protection, as well as food security. I will also discuss how traditional civil and environmental engineering can contribute to the reduction of postharvest food loss, an important issue of sustainable agriculture.

  15. At the crossroads: new paradigms of food security, public health nutrition and school food.

    PubMed

    Ashe, Leah M; Sonnino, Roberta

    2013-06-01

    Public health nutrition sits at the nexus of a global crisis in food, environmental and health systems that has generated - along with numerous other problems - an urgent and changing problem of food insecurity. The 'new' food insecurity, however, is different from the old: it is bimodal, encompassing issues of both under- and over-consumption, hunger and obesity, quantity and quality; it has assumed a decidedly urban dimension; and it implicates rich and poor countries alike. The complexity of the expressions of this challenge requires new approaches to public health nutrition and food policy that privilege systemic, structural and environmental factors over individual and mechanistic ones. In this context, the current paper argues that school food systems rise with buoyant potential as promising intervention sites: they are poised to address both modes of the food security crisis; integrate systemic, structural and environmental with behavioural approaches; and comprise far-reaching, system-wide efforts that influence the wider functioning of the food system. Based on a discussion of Bogotá and other pioneering policies that explicitly aim to create a broader food system with long-term foundations for good public health and food security, the paper suggests a new research and action agenda that gives special attention to school food in urban contexts.

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weldu, Yemane W., E-mail: ywweldem@ucalgary.ca; Assefa, Getachew; Athena Chair in Life Cycle Assessment in Design

    A roadmap for a more sustainable energy strategy is complex, as its development interacts critically with the economic, social, and environmental dimensions of sustainable development. This paper applied an impact matrix method to evaluate the environmental sustainability and to identify the desirable policy objectives of biomass-based energy strategy for the case of Alberta. A matrix with the sustainability domains on one axis and areas of environmental impact on the other was presented to evaluate the nexus effect of policy objectives and bioenergy production. As per to our analysis, economic diversification, technological innovation, and resource conservation came up as the desirablemore » policy objectives of sustainable development for Alberta because they demonstrated environmental benefits in all environmental impact categories, namely climate change, human health, and ecosystem. On the other hand, human health and ecosystem impacts were identified as trade-offs when the policy objectives for sustainability were energy security, job creation, and climate change. Thus, bioenergy can mitigate climate change but may impact human health and ecosystem which then in turn can become issues of concern. Energy strategies may result in shifting of risks from one environmental impact category to another, and from one sustainable domain to another if the technical and policy-related issues are not identified.« less

  17. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Freund, M.T.; Wise, J.A.; Ulibarri, C.A.

    This paper addresses US energy security in the post-Cold War era for a conference on energy security jointly sponsored by the Department of Energy and the National Defense University. It examines the evolving nature of energy security based on analysis of past crisis-inducing events and-discusses potentially important geopolitical, environmental, regulatory, and economic developments during the next twenty-five years. The paper steps beyond the traditional economic focus of energy security issues to examine the interplay between fundamental economic and technical drivers on the one hand, and political, environmental, and perceptual phenomena, on the other hand, that can combine to create crisesmore » where none were expected. The paper expands on the premise that the recent demise of the Soviet Union and other changing world conditions have created a new set of energy dynamics, and that it is imperative that the United States revise its energy security perspective accordingly. It proceeds by reviewing key factors that comprise the concepts of ``energy security`` and ``energy crisis`` and how they may fit into the new world energy security equation. The study also presents a series of crisis scenarios that could develop during the next twenty-five years, paying particular attention to mechanisms and linked crisis causes and responses. It concludes with a discussion of factors that may serve to warn analysts and decision makers of impending future crises conditions. The crisis scenarios contained in this report should be viewed only as a representative sample of the types of situations that could occur. They serve to illustrate the variety of factors that can coalesce to produce a ``crisis.``« less

  18. Environmental Security: Evolution of a New Concept in Security Studies

    DTIC Science & Technology

    1999-04-01

    vi ENVIRONMENTAL IMPACT OF POPULATION...1970�s. Environmental security and its direct impact on national and international security has not gone unnoticed by our nation�s leaders. Former...understanding of the �where and under what circumstances� environmental degradation, scarcity, and conflict occur and how they will impact U.S. environmental

  19. Maritime security report number 3. September 1996 [U.S. Coast Guard issues passenger vessel and terminal security inspection regulations; international perspectives on maritime security; first Inter-American course on port security

    DOT National Transportation Integrated Search

    1996-09-01

    While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...

  20. Humanitarian assistance and disaster relief: changing the face of defense.

    PubMed

    Laraby, Patrick R; Bourdeaux, Margaret; Casscells, S Ward; Smith, David J; Lawry, Lynn

    2009-01-01

    The US Department of Defense (DOD) is evolving to meet new security challenges in the twenty-first century. Today's challenges result from growing political, environmental, and economic instability in important areas of the globe that threaten national and global security. Immediate outreach to foreign nations in times of violent instability or natural disaster fosters security and stability both for the affected country and for the United States. Foreign humanitarian assistance (FHA) is a rapidly evolving military mission that addresses conflict prevention, conflict, postconflict, and natural disasters. With DOD's extensive global medical resources, it is often uniquely qualified to execute a critical role in relief and/or public health efforts. When and how the American military will act in FHA and disaster relief is a still evolving doctrine with three issues deserving particular attention: aligning operations with host government leadership, preserving humanitarian space, and tailoring the US military's unique resources to the specific political and medical situation at hand. The DOD's response to a large-scale earthquake in Peru suggests useful approaches to these three issues, provides a template for future FHA mission, and points to strategic decisions and operational capabilities that need further development to establish the FHA mission firmly within DOD's repertoire of security engagement activities.

  1. Incentive Issues in Information Security Management

    ERIC Educational Resources Information Center

    Lee, Chul Ho

    2012-01-01

    This dissertation studies three incentive issues in information security management. The first essay studies contract issues between a firm that outsources security functions and a managed security service provider (MSSP) that provides security functions to the firm. Since MSSP and firms cannot observe each other's actions, both can suffer…

  2. Participatory environmental diagnosis and of health risks from the surrounding communities the Petrochemical Complex of Rio de Janeiro, Brazil.

    PubMed

    Moniz, Marcela de Abreu; Sabóia, Vera Maria; Carmo, Cleber Nascimento do; Hacon, Sandra de Souza

    2017-11-01

    The aim of this study was to diagnose the priority socio environmental problems and the health risks from the surrounding communities the Petrochemical Complex of Rio de Janeiro. Characterized by a participatory approach, the action research has led to the application of interviews, focal groups, meetings and workshop with social actors of Porto das Caixas and Sambaetiba districts, located in Itaboraí city/RJ from November 2013 to December 2014. A structural analysis of the problems prioritized by the communities (water supply, sewage treatment and risk of transmissible diseases; risk of air pollution and respiratory diseases; absence of public security and risk of violence) sketched out the cause-effect-intervention relationship, on the basis of the Protocol for Assessing Community Excellence in Environmental Health. The process revealed the absence of representativity of the social actors of the studied localities in spaces of decision-making on the environmental issue. Educational actions with professionals and inhabitants that aim to promote the formation of collective movements urge, indispensable to guarantee the rights of mitigation of situations of contamination of air and access to sanitation services and public security and thus of conditions of lower risk to health.

  3. Food safety/food security aspects related to the environmental release of pharmaceuticals.

    PubMed

    Brambilla, Gianfranco; Testa, Cecilia

    2014-11-01

    The environmental presence of pharmaceuticals in top soil and in water where extensive animal farming occurs may represent an involuntary source of residues in food that might affect both food safety and food security. We modelled the presence of residues in animal matrices from the inventoried environmental concentration of selected drugs in surface waters (range: 0.1-10μgL(-1)) and agriculture soils (range: 1-100μgkg(-1) dry weight), accounting for animal production parameters (i.e., forages, water intake and milk and egg production) and drug pharmacokinetics. The results indicate that the contamination of tetracyclines in top soil may represent a major issue both for the compliance with maximum residue levels in food (100-300ngg(-1)) and for the claim of organic products. via surface water, animals may be vulnerable to the intake of anabolics and growth-promoting agents, such as 17-beta estradiol and clenbuterol, only under a worst-case scenario. Their identification, which is currently achievable at a pgg(-1) level in animal specimens, is considered proof of illegal treatment and can lead to the prosecution of farmers. The Environmental Quality Standards that have been proposed for priority substances in surface waters may also be considered protective in terms of food security/food safety; however, a broad-spectrum characterisation of drugs within the agriculture context could be envisaged to refine the uncertainties in the risk assessment and for combined intakes. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. Is Seeing Believing? Training Users on Information Security: Evidence from Java Applets

    ERIC Educational Resources Information Center

    Ayyagari, Ramakrishna; Figueroa, Norilyz

    2017-01-01

    Information Security issues are one of the top concerns of CEOs. Accordingly, information systems education and research have addressed security issues. One of the main areas of research is the behavioral issues in Information Security, primarily focusing on users' compliance to information security policies. We contribute to this literature by…

  5. Global Environmental Change: What Can Health Care Providers and the Environmental Health Community Do About It Now?

    PubMed Central

    Schwartz, Brian S.; Parker, Cindy; Glass, Thomas A.; Hu, Howard

    2006-01-01

    The debate about whether global environmental change is real is now over; in its wake is the realization that it is happening more rapidly than predicted. These changes constitute a profound challenge to human health, both as a direct threat and as a promoter of other risks. We call on health care providers to inform themselves about these issues and to become agents of change in their communities. It is our responsibility as clinicians to educate patients and their communities on the connections between regressive policies, unsustainable behaviors, global environmental changes, and threats to health and security. We call on professional organizations to assist in educating their members about these issues, in helping clinicians practice behavior change with their patients, and in adding their voices to this issue in our statehouses and Congress. We call for the development of carbon- and other environmental-labeling of consumer products so individuals can make informed choices; we also call for the rapid implementation of policies that provide tangible economic incentives for choosing environmentally sustainable products and services. We urge the environmental health community to take up the challenge of developing a global environmental health index that will incorporate human health into available “planetary health” metrics and that can be used as a policy tool to evaluate the impact of interventions and document spatial and temporal shifts in the healthfulness of local areas. Finally, we urge our political, business, public health, and academic leaders to heed these environmental warnings and quickly develop regulatory and policy solutions so that the health of populations and the integrity of their environments will be ensured for future generations. PMID:17185267

  6. Global environmental change: what can health care providers and the environmental health community do about it now?

    PubMed

    Schwartz, Brian S; Parker, Cindy; Glass, Thomas A; Hu, Howard

    2006-12-01

    The debate about whether global environmental change is real is now over; in its wake is the realization that it is happening more rapidly than predicted. These changes constitute a profound challenge to human health, both as a direct threat and as a promoter of other risks. We call on health care providers to inform themselves about these issues and to become agents of change in their communities. It is our responsibility as clinicians to educate patients and their communities on the connections between regressive policies, unsustainable behaviors, global environmental changes, and threats to health and security. We call on professional organizations to assist in educating their members about these issues, in helping clinicians practice behavior change with their patients, and in adding their voices to this issue in our statehouses and Congress. We call for the development of carbon and other environmental-labeling of consumer products so individuals can make informed choices; we also call for the rapid implementation of policies that provide tangible economic incentives for choosing environmentally sustainable products and services. We urge the environmental health community to take up the challenge of developing a global environmental health index that will incorporate human health into available "planetary health" metrics and that can be used as a policy tool to evaluate the impact of interventions and document spatial and temporal shifts in the healthfulness of local areas. Finally, we urge our political, business, public health, and academic leaders to heed these environmental warnings and quickly develop regulatory and policy solutions so that the health of populations and the integrity of their environments will be ensured for future generations.

  7. 75 FR 65437 - Defense Federal Acquisition Regulation Supplement; Defense Cargo Riding Gang Members (DFARS Case...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... Document issued under 46 U.S.C., chapter 73, or a transportation security card issued under section 70105.... Merchant Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued... Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued under...

  8. Making US Soil Taxonomy more scientifically applicable to environmental and food security issues.

    NASA Astrophysics Data System (ADS)

    Monger, Curtis; Lindbo, David L.; Wysocki, Doug; Schoeneberger, Phil; Libohova, Zamir

    2017-04-01

    US Department of Agriculture began mapping soils in the 1890s on a county-by-county basis until most of the conterminous United States was mapped by the late 1930s. This first-generation mapping was followed by a second-generation that re-mapped the US beginning in the 1940s. Soil classification during these periods evolved into the current system of Soil Taxonomy which is based on (1) soil features as natural phenomena and on (2) soil properties important for agriculture and other land uses. While this system has enabled communication among soil surveyors, the scientific applicability of Soil Taxonomy to address environmental and food security issues has been under-utilized. In particular, little effort has been exerted to understand how soil taxa interact and function together as larger units—as soil systems. Thus, much soil-geomorphic understanding that could be applied to process-based modeling remains unexploited. The challenge for soil taxonomists in the United States and elsewhere is to expand their expertise and work with modelers to explore how soil taxa are linked to each other, how they influence water, nutrient, and pollutant flow through the landscape, how they interact with ecology, and how they change with human land use.

  9. A wireless sensor tag platform for container security and integrity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Amaya, Ivan A.; Cree, Johnathan V.; Mauss, Fredrick J.

    Cargo containers onboard ships are widely used in the global supply chain. The need for container security is evidenced by the Container Security Initiative launched by the U.S. Bureau of Customs and Border Protection (CBP). One method of monitoring cargo containers is using low power wireless sensor tags. The wireless sensor tags are used to set up a network that is comprised of tags internal to the container and a central device. The sensor network reports alarms and other anomalies to a central device, which then relays the message to an outside network upon arrival at the destination port. Thismore » allows the port authorities to have knowledge of potential security or integrity issues before physically examining the container. Challenges of using wireless sensor tag networks for container security include battery life, size, environmental conditions, information security, and cost among others. PNNL developed an active wireless sensor tag platform capable of reporting data wirelessly to a central node as well as logging data to nonvolatile memory. The tags, operate at 2.4 GHz over an IEEE 802.15.4 protocol, and were designed to be distributed throughout the inside of a shipping container in the upper support frame. The tags are mounted in a housing that allows for simple and efficient installation or removal prior to, during, or after shipment. The distributed tags monitor the entire container volume. The sensor tag platform utilizes low power electronics and provides an extensible sensor interface for incorporating a wide range of sensors including chemical, biological, and environmental sensors.« less

  10. A wireless sensor tag platform for container security and integrity

    NASA Astrophysics Data System (ADS)

    Amaya, Ivan A.; Cree, Johnathan V.; Mauss, Fredrick J.

    2011-04-01

    Cargo containers onboard ships are widely used in the global supply chain. The need for container security is evidenced by the Container Security Initiative launched by the U.S. Bureau of Customs and Border Protection (CBP). One method of monitoring cargo containers is using low power wireless sensor tags. The wireless sensor tags are used to set up a network that is comprised of tags internal to the container and a central device. The sensor network reports alarms and other anomalies to a central device, which then relays the message to an outside network upon arrival at the destination port. This allows the port authorities to have knowledge of potential security or integrity issues before physically examining the container. Challenges of using wireless sensor tag networks for container security include battery life, size, environmental conditions, information security, and cost among others. PNNL developed an active wireless sensor tag platform capable of reporting data wirelessly to a central node as well as logging data to nonvolatile memory. The tags, operate at 2.4 GHz over an IEEE 802.15.4 protocol, and were designed to be distributed throughout the inside of a shipping container in the upper support frame. The tags are mounted in a housing that allows for simple and efficient installation or removal prior to, during, or after shipment. The distributed tags monitor the entire container volume. The sensor tag platform utilizes low power electronics and provides an extensible sensor interface for incorporating a wide range of sensors including chemical, biological, and environmental sensors.

  11. Urban public health assessment and pattern analysis: comparison of four cities in different countries

    NASA Astrophysics Data System (ADS)

    Su, Meirong; Chen, Chen; Lu, Weiwei; Liu, Gengyuan; Yang, Zhifeng; Chen, Bin

    2013-06-01

    Urban public health is an important global issue, and receives extensive attention. It is necessary to compare urban public health status among different cities, so that each city can define its own health patterns and limiting factors. The following assessment indicators were established to evaluate urban public health status: living conditions, physical health, education and culture, environmental quality, and social security. A weighted-sum model was used in combination with these indicators to compare the urban public health status in four cities—Beijing, New York, London, and Tokyo—using data for 2000-2009. Although the urban public health level of Beijing was lower than that of the other cities, it showed the greatest increase in this level over the study period. Different patterns of urban public health were identified: London had the most balanced, steady pattern (almost all factors performed well and developed stably); New York and Tokyo showed balanced, but unsteady patterns (most factors remained high, though social security and environmental quality fluctuated); Beijing had the most unbalanced, unsteady pattern (the different factors were at different levels, and education and culture and social security fluctuated). For enhanced urban public health status, environmental quality and education and culture clearly need to be improved in Beijing. This study demonstrates that a comparison of different cities is helpful in identifying limiting factors for urban public health and providing an orientation for future urban development.

  12. 17 CFR 240.3a12-10 - Exemption of certain securities issued by the Resolution Funding Corporation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... securities issued by the Resolution Funding Corporation. 240.3a12-10 Section 240.3a12-10 Commodity and... Exemptions § 240.3a12-10 Exemption of certain securities issued by the Resolution Funding Corporation. Securities that are issued by the Resolution Funding Corporation pursuant to section 21B(f) of the Federal...

  13. An evaluation of the ecological and environmental security on China's terrestrial ecosystems.

    PubMed

    Zhang, Hongqi; Xu, Erqi

    2017-04-11

    With rapid economic growth, industrialization, and urbanization, various ecological and environmental problems occur, which threaten and undermine the sustainable development and domestic survival of China. On the national scale, our progress remains in a state of qualitative or semi-quantitative evaluation, lacking a quantitative evaluation and a spatial visualization of ecological and environmental security. This study collected 14 indictors of water, land, air, and biodiversity securities to compile a spatial evaluation of ecological and environmental security in terrestrial ecosystems of China. With area-weighted normalization and scaling transformations, the veto aggregation (focusing on the limit indicator) and balanced aggregation (measuring balanced performance among different indicators) methods were used to aggregate security evaluation indicators. Results showed that water, land, air, and biodiversity securities presented different spatial distributions. A relatively serious ecological and environmental security crisis was found in China, but presented an obviously spatial variation of security evaluation scores. Hotspot areas at the danger level, which are scattered throughout the entirety of the country, were identified. The spatial diversities and causes of ecological and environmental problems in different regions were analyzed. Spatial integration of regional development and proposals for improving the ecological and environmental security were put forward.

  14. Climate change and environmental impacts on maternal and newborn health with focus on Arctic populations.

    PubMed

    Rylander, Charlotta; Odland, Jon Ø; Sandanger, Torkjel M

    2011-01-01

    In 2007, the Intergovernmental Panel on Climate Change (IPCC) presented a report on global warming and the impact of human activities on global warming. Later the Lancet commission identified six ways human health could be affected. Among these were not environmental factors which are also believed to be important for human health. In this paper we therefore focus on environmental factors, climate change and the predicted effects on maternal and newborn health. Arctic issues are discussed specifically considering their exposure and sensitivity to long range transported contaminants. Considering that the different parts of pregnancy are particularly sensitive time periods for the effects of environmental exposure, this review focuses on the impacts on maternal and newborn health. Environmental stressors known to affects human health and how these will change with the predicted climate change are addressed. Air pollution and food security are crucial issues for the pregnant population in a changing climate, especially indoor climate and food security in Arctic areas. The total number of environmental factors is today responsible for a large number of the global deaths, especially in young children. Climate change will most likely lead to an increase in this number. Exposure to the different environmental stressors especially air pollution will in most parts of the world increase with climate change, even though some areas might face lower exposure. Populations at risk today are believed to be most heavily affected. As for the persistent organic pollutants a warming climate leads to a remobilisation and a possible increase in food chain exposure in the Arctic and thus increased risk for Arctic populations. This is especially the case for mercury. The perspective for the next generations will be closely connected to the expected temperature changes; changes in housing conditions; changes in exposure patterns; predicted increased exposure to Mercury because of increased emissions and increased biological availability. A number of environmental stressors are predicted to increase with climate change and increasingly affecting human health. Efforts should be put on reducing risk for the next generation, thus global politics and research effort should focus on maternal and newborn health.

  15. 49 CFR 1554.103 - Security Directives.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... necessary to respond to a threat assessment or to a specific threat against civil aviation, TSA issues a..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT REPAIR STATION SECURITY Security Measures... each Security Directive TSA issues to the repair station within the time prescribed. Each repair...

  16. Secure environment for real-time tele-collaboration on virtual simulation of radiation treatment planning.

    PubMed

    Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S

    2003-01-01

    A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.

  17. Broad Overview of Energy Efficiency and Renewable Energy Opportunities for Department of Defense Installations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anderson, E.; Antkowiak, M.; Butt, R.

    The Strategic Environmental Research and Developmental Program (SERDP)/Environmental Security Technology Certification Program (ESTCP) is the Department of Defense?s (DOD) environmental science and technology program focusing on issues related to environment and energy for the military services. The SERDP/ESTCP Office requested that the National Renewable Energy Laboratory (NREL) provide technical assistance with strategic planning by evaluating the potential for several types of renewable energy technologies at DOD installations. NREL was tasked to provide technical expertise and strategic advice for the feasibility of geothermal resources, waste-to-energy technology, photovoltaics (PV), wind, microgrids, and building system technologies on military installations. This technical report ismore » the deliverable for these tasks.« less

  18. Reconciling traditional knowledge, food security, and climate change: experience from Old Crow, YT, Canada.

    PubMed

    Douglas, Vasiliki; Chan, Hing Man; Wesche, Sonia; Dickson, Cindy; Kassi, Norma; Netro, Lorraine; Williams, Megan

    2014-01-01

    Because of a lack of transportation infrastructure, Old Crow has the highest food costs and greatest reliance on traditional food species for sustenance of any community in Canada's Yukon Territory. Environmental, cultural, and economic change are driving increased perception of food insecurity in Old Crow. To address community concerns regarding food security and supply in Old Crow and develop adaptation strategies to ameliorate their impact on the community. A community adaptation workshop was held on October 13, 2009, in which representatives of different stakeholders in the community discussed a variety of food security issues facing Old Crow and how they could be dealt with. Workshop data were analyzed using keyword, subject, and narrative analysis techniques to determine community priorities in food security and adaptation. Community concern is high and favored adaptation options include agriculture, improved food storage, and conservation through increased traditional education. These results were presented to the community for review and revision, after which the Vuntut Gwitchin Government will integrate them into its ongoing adaptation planning measures.

  19. 17 CFR 230.488 - Effective date of registration statements relating to securities to be issued in certain business...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... statements relating to securities to be issued in certain business combination transactions. 230.488 Section... REGULATIONS, SECURITIES ACT OF 1933 Investment Companies; Business Development Companies § 230.488 Effective date of registration statements relating to securities to be issued in certain business combination...

  20. 6 CFR 27.204 - Minimum concentration by security issue.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Minimum concentration by security issue. 27.204 Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by...

  1. 6 CFR 13.6 - Prerequisites for issuing a Complaint.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Prerequisites for issuing a Complaint. 13.6 Section 13.6 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.6 Prerequisites for issuing a Complaint. (a) The Reviewing Official may issue a...

  2. Changing Homeland Security: The Year in Review - 2008

    DTIC Science & Technology

    2009-01-01

    new opportunities for terrorist safe havens. The specter of homegrown terrorism has not abated. Naturalized citizens of Somali descent traveled to...34 • The Nature of Homeland Security: Now a Second Tier Policy Issue? • Organizing for Homeland Security: Possible Futures, Emerging Issues • The...emerging definitions of the homeland security mission space in 2009. The Nature of Homeland Security: Now a Second Tier Policy Issue? Has the bar

  3. U.S.-MEXICO TECHNOLOGY TRANSFER; BILATERAL TECHNICAL EXCHANGES FOR SUSTAINABLE ECONOMIC GROWTH IN THE BORDER REGION

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jimenez, Richard, D., Dr.

    2007-10-01

    The U.S. Department of Energy (DOE) maintains a strong commitment to transfer the results of its science and technology programs to the private sector. The intent is to apply innovative and sometimes advanced technologies to address needs while simultaneously stimulating new commercial business opportunities. Such focused “technology transfer” was evident in the late 1990s as the results of DOE investments in environmental management technology development led to new tools for characterizing and remediating contaminated sites as well as handling and minimizing the generation of hazardous wastes. The Department’s Office of Environmental Management was attempting to reduce the cost, accelerate themore » schedule, and improve the efficacy of clean-up efforts in the nuclear weapons complex. It recognized that resulting technologies had broader world market applications and that their commercialization would further reduce costs and facilitate deployment of improved technology at DOE sites. DOE’s Albuquerque Operations Office (now part of the National Nuclear Security Administration) began in 1995 to build the foundation for a technology exchange program with Mexico. Initial sponsorship for this work was provided by the Department’s Office of Environmental Management. As part of this effort, Applied Sciences Laboratory, Inc. (ASL) was contracted by the DOE Albuquerque office to identify Mexico’s priority environmental management needs, identify and evaluate DOE-sponsored technologies as potential solutions for those needs, and coordinate these opportunities with decision makers from Mexico’s federal government. That work led to an improved understanding of many key environmental challenges that Mexico faces and the many opportunities to apply DOE’s technologies to help resolve them. The above results constituted, in large part, the foundation for an initial DOE-funded program to apply the Department’s technology base to help address some of Mexico’s challenging environmental issues. The results also brought focus to the potential contributions that DOE’s science and technology could make for solving the many difficult, multi-generational problems faced by hundreds of bi-national communities along the 2,000-mile shared border of the United States and Mexico. Efforts to address these U.S.-Mexico border issues were initially sponsored by the DOE’s Albuquerque and Carlsbad offices. In subsequent years, the U.S. Congress directed appropriations to DOE’s Carlsbad office to address public health, safety and security issues prevalent within U.S.-Mexico border communities. With ASL’s assistance, DOE’s Albuquerque office developed contacts and formed partnerships with interested U.S and Mexican government, academic, and commercial organizations. Border industries, industrial effluents, and public health conditions were evaluated and documented. Relevant technologies were then matched to environmental problem sets along the border. Several technologies that were identified and subsequently supported by this effort are now operational in a number of U.S.-Mexico border communities, several communities within Mexico’s interior states, and in other parts of Latin America. As a result, some serious public health threats within these communities caused by exposure to toxic airborne pollutants have been reduced. During this time, DOE’s Carlsbad office hosted a bilateral conference to establish a cross-border consensus on what should be done on the basis of these earlier investigative efforts. Participating border region stakeholders set an agenda for technical collaborations. This agenda was supported by several Members of Congress who provided appropriations and directed DOE’s Carlsbad office to initiate technology demonstration projects. During the following two years, more than 12 private-sector and DOE-sponsored technologies were demonstrated in partnership with numerous border community stakeholders. All technologies were well received and their effectiveness at addressing health, safety and security issues was successfully demonstrated. Several of these technologies, including those noted above and demonstrated under this effort, are now operational. Furthermore, a number of public and national security issues unique to the U.S.-Mexico border were brought to the attention of the federal government and are now being addressed, largely through the efforts of the U.S. Department of Homeland Security. Program results demonstrated the value and effectiveness of the program’s process for technology exchanges. Opportunities now exist to transition the program from its successful initial stage to one where it can more effectively address a broader spectrum of multi-disciplinary problems that impact millions of U.S. and Mexican citizens. Substantial benefits would accrue to both sides of the U.S.-Mexico border were the two countries to continue this collaboration.« less

  4. Women's Marginalization, Economic Flows, and Environmental Flows: A Classroom Approach.

    ERIC Educational Resources Information Center

    O'Lear, Shannon

    1999-01-01

    Discusses environmental security, focusing on the meaning of "security." Defines the global economy as a process in which the security of groups is sought, maintained, or threatened. Illustrates connections among environmental security, the global economy, and abuse of women and children in less economically developed places,…

  5. The environmental implications of intensified land use in developing countries

    PubMed Central

    Tinker, P. B.

    1997-01-01

    The major agricultural intensifications in the developed world over the last half century have produced a range of important environmental problems. These include pollution, damage to wildlife and landscape and other issues, both on- and off-site. These are largely being controlled by scientific investigation and Government regulation. As developing countries increase agricultural production over the next 30 years, this may also cause even more serious environmental damage.
    The paper distinguishes between production-related on-site damage, and off-site and more extensive effects. Both may involve soil and water effects, such as soil erosion, salinization, siltation, eutrophication and loss of water quality. The use of more agrochemicals can damage water quality, health, wildlife and biodiversity. Loss of habitat from the extension of farming is particularly damaging to biodiversity. A developing off-site problem is the production of greenhouse gases by farming systems, including the conversion of forests to farmland. In the future the introduction of genetically engineered species of plants, animals or microbes will need secure control.
    Work, probably on a catchment basis, is necessary to understand and control these problems. The three main requirements are much better environmental information from the developing world; the selection of environmental indicators to be monitored; and the support of local farmers in protecting the environment. There are encouraging indications of farmer concern and action over obvious on-site damage, but this may not extend to extensive off-site issues. The main danger is that developing food scarcity would cause the environmental issues to be ignored in a race for production.

  6. An integrated water-energy-food-livelihoods approach for assessing environmental livelihood security

    NASA Astrophysics Data System (ADS)

    Biggs, E. M.; Duncan, J.; Boruff, B.; Bruce, E.; Neef, A.; McNeill, K.; van Ogtrop, F. F.; Haworth, B.; Duce, S.; Horsley, J.; Pauli, N.; Curnow, J.; Imanari, Y.

    2015-12-01

    Environmental livelihood security refers to the challenges of maintaining global food security and universal access to freshwater and energy to sustain livelihoods and promote inclusive economic growth, whilst sustaining key environmental systems' functionality, particularly under variable climatic regimes. Environmental security is a concept complementary to sustainable development, and considers the increased vulnerability people have to certain environmental stresses, such as climatic change. Bridging links between the core component concepts of environmental security is integral to future human security, and in an attempt to create this bridge, the nexus approach to human protection has been created, where water resource availability underpins food, water and energy security. The water-energy-food nexus has an influential role in attaining human security, yet little research has made the link between the nexus and livelihoods. In this research we provide a critical appraisal of the synergies between water-energy-food nexus framings and sustainable livelihoods approaches, both of which aim to promote sustainable development. In regions where livelihoods are dependent on environmental conditions, the concept of sustainable development is critical for ensuring future environmental and human security. Given our appraisal we go on to develop an integrated framework for assessing environmental livelihood security of multiscale and multi-level systems. This framework provides a tangible approach for assessing changes in the water-energy-food-livelihood indicators of a system. Examples of where system applications may occur are discussed for the Southeast Asia and Oceania region. Our approach will be particularly useful for policy-makers to inform evidence-based decision-making, especially in localities where climate change increases the vulnerability of impoverished communities and extenuates environmental livelihood insecurity.

  7. America’s Security Role in a Changing World: A Global Strategic Assessment

    DTIC Science & Technology

    2009-04-01

    actually three interrelated crises: a global warming crisis, fuel crisis, and diplomatic crisis. Global warming threatens to create an environmental...which is a diplomatic crisis, particularly for the United States. Global warming is already being used as a dip- lomatic wedge issue against America...mitigating or stopping transnational threats 4 INSS Proceedings April 7–8, 2009 actors, and effects of global warming . A result of these increasing

  8. Biological Diversity: The Economy of Investing in Ecology for National Security

    DTIC Science & Technology

    1995-01-01

    patent protection and pnvate ownerstip of new crop varieties, along with protechorusm by the European common market , Japan, and others, have fueled...mate change. Strategres dealing W&I environmental issues of thus magmtude will require partnersmps . . ..and a comnutment to a strategcally...the BaZance noted m the case that follows The Case Of Brazil Most US pohcy has focused on Brazrl because rt 1s vrewed as the most pronusmg market

  9. Tooth-to-Tail Greening: Energy and Climate Leadership and Policy Change at the Department of Defense

    DTIC Science & Technology

    2016-10-24

    66 Tooth-to-Tail Greening Energy and Climate Leadership and Policy Change at the Department of Defense Rebecca Pincus Abstract: For decades, the...awareness of climate change emerged at the end of the twentieth century, this environmental concern was added to such longstanding issues as...therefore more likely to effect institutional change . Keywords: climate , energy, carbon footprint, security, military, green fleet, or- ganizational culture

  10. Worldwide Emerging Environmental Issues Affecting the U.S. Military. March 2007 Report

    DTIC Science & Technology

    2007-03-01

    some existent climate regions (mainly in tropical mountain areas, Amazon and Indonesian rainforests , and towards the poles) and the prospects of...ice sheets and floating sea ice. Military Implications: In view of the increasing importance of the Arctic in military planning and the oil reserves...95080 4.2 Malacca Straits Need Increased Protection from Various Security Threats The Malacca Strait, one of the most important shipping lanes in the

  11. JPRS Report: Environmental Issues

    DTIC Science & Technology

    1993-05-28

    foreign trade and public security as well as and the Changjiang Water Conservancy Commission of the press in dealing with severe illegal cases. (Xinhua) the...to less risky productions, to be sure. bilities had to be examined. He said an agreement is to Air and water pollution as well as unsafe nuclear plants...350,000 households in Finland that depend on their in Central and Northern Finland; Nitrate Levels Pro- own wells for water . duced by Nitrogen

  12. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... in which auctioned Treasury securities may be issued? There are three book-entry securities systems... marketable Treasury securities. We maintain and transfer securities in these three book-entry systems at... inflation. Securities may be transferred from one system to the other, unless the securities are not...

  13. Biofuels and the Environment: the First Triennial Report to ...

    EPA Pesticide Factsheets

    EPA announced the release of the final report,Biofuels and the Environment: The First Triennial Report to Congress (EPA/600/R-10/183F), prepared by the National Center for Environmental Assessment (NCEA) within EPA’s Office of Research and Development, as the first EPA report published on this issue. The 2007 Energy Independence and Security Act (EISA) mandates increased production of biofuels (fuels derived from organic materials) from 9 billion gallons per year in 2008 to 36 billion gallons per year by 2022. Additionally, EISA (Section 204) also requires that the U.S. Environmental Protection Agency (EPA) assess and report to Congress every three years on the current and potential future environmental and resource conservation impacts associated with increased biofuel production and use. Produce report to Congress that addresses the environmental impact associated with current and future biofuel production and use.

  14. Biofuels and the Environment: The First Triennial Report to ...

    EPA Pesticide Factsheets

    The Biofuels and the Environment: The First Triennial Report to Congress (External Review Draft) (EPA/600/R-10/183A) report, prepared by the National Center for Environmental Assessment (NCEA) within EPA’s Office of Research and Development, is the first report published on this issue. The 2007 Energy Independence and Security Act (EISA) mandates increased production of biofuels (fuels derived from organic materials) from 9 billion gallons per year in 2008 to 36 billion gallons per year by 2022. Additionally, EISA (Section 204) also requires that the U.S. Environmental Protection Agency (EPA) assess and report to Congress every three years on the current and potential future environmental and resource conservation impacts associated with increased biofuel production and use. Produce report to Congress that addresses the environmental impact associated with current and future biofuel production and use.

  15. 77 FR 72278 - Sale and Issue of Marketable Book-Entry Treasury Bills, Notes, and Bonds

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-05

    ... whether it would be more important to issue a new floating rate security each month. Maturities: We intend.... SUMMARY: The Department of the Treasury (``Treasury'') intends to issue a new type of marketable security... security. We also invite other comments relevant to the issuance of this new security. DATES: Submit...

  16. Sustainable Food Security in the Mountains of Pakistan: Towards a Policy Framework.

    PubMed

    Rasul, Golam; Hussain, Abid

    2015-01-01

    The nature and causes of food and livelihood security in mountain areas are quite different to those in the plains. Rapid socioeconomic and environmental changes added to the topographical constraints have exacerbated the problem of food insecurity in the Hindu Kush-Himalayan (HKH) region. In Pakistan, food insecurity is significantly higher in the mountain areas than in the plains as a result of a range of biophysical and socioeconomic factors. The potential of mountain niche products such as fruit, nuts, and livestock has remained underutilized. Moreover, the opportunities offered by globalization, market integration, remittances, and non-farm income have not been fully tapped. This paper analyzes the opportunities and challenges of food security in Pakistan's mountain areas, and outlines a framework for addressing the specific issues in terms of four different types of area differentiated by agro-ecological potential and access to markets, information, and institutional services.

  17. 17 CFR 250.52 - Exemption of issue and sale of certain securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... business of the subsidiary company; and (2) The interest rates and maturity dates of any debt security... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of issue and sale of certain securities. 250.52 Section 250.52 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...

  18. 6 CFR 27.204 - Minimum concentration by security issue.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by security issue. (a) Release Chemicals—(1) Release-Toxic Chemicals. If a release-toxic chemical of interest...

  19. A framework for the analysis of the security of supply of utilising carbon dioxide as a chemical feedstock.

    PubMed

    Fraga, Eric S; Ng, Melvin

    2015-01-01

    Recent developments in catalysts have enhanced the potential for the utilisation of carbon dioxide as a chemical feedstock. Using the appropriate energy efficient catalyst enables a range of chemical pathways leading to desirable products. In doing so, CO2 provides an economically and environmentally beneficial source of C1 feedstock, while improving the issues relating to security of supply that are associated with fossil-based feedstocks. However, the dependence on catalysts brings other supply chains into consideration, supply chains that may also have security of supply issues. The choice of chemical pathways for specific products will therefore entail an assessment not only of economic factors but also the security of supply issues for the catalysts. This is a multi-criteria decision making problem. In this paper, we present a modified 4A framework based on the framework suggested by the Asian Pacific Energy Research centre for macro-economic applications. The 4A methodology is named after the criteria used to compare alternatives: availability, acceptability, applicability and affordability. We have adapted this framework for the consideration of alternative chemical reaction processes using a micro-economic outlook. Data from a number of sources were collected and used to quantify each of the 4A criteria. A graphical representation of the assessments is used to support the decision maker in comparing alternatives. The framework not only allows for the comparison of processes but also highlights current limitations in the CCU processes. The framework presented can be used by a variety of stakeholders, including regulators, investors, and process industries, with the aim of identifying promising routes within a broader multi-criteria decision making process.

  20. [Research progress on remote sensing of ecological and environmental changes in the Three Gorges Reservoir area, China].

    PubMed

    Teng, Ming-jun; Zeng, Li-xiong; Xiao, Wen-fa; Zhou, Zhi-xiang; Huang, Zhi-lin; Wang, Peng-cheng; Dian, Yuan-yong

    2014-12-01

    The Three Gorges Reservoir area (TGR area) , one of the most sensitive ecological zones in China, has dramatically changes in ecosystem configurations and services driven by the Three Gorges Engineering Project and its related human activities. Thus, understanding the dynamics of ecosystem configurations, ecological processes and ecosystem services is an attractive and critical issue to promote regional ecological security of the TGR area. The remote sensing of environment is a promising approach to the target and is thus increasingly applied to and ecosystem dynamics of the TGR area on mid- and macro-scales. However, current researches often showed controversial results in ecological and environmental changes in the TGR area due to the differences in remote sensing data, scale, and land-use/cover classification. Due to the complexity of ecological configurations and human activities, challenges still exist in the remote-sensing based research of ecological and environmental changes in the TGR area. The purpose of this review was to summarize the research advances in remote sensing of ecological and environmental changes in the TGR area. The status, challenges and trends of ecological and environmental remote-sensing in the TGR area were further discussed and concluded in the aspect of land-use/land-cover, vegetation dynamics, soil and water security, ecosystem services, ecosystem health and its management. The further researches on the remote sensing of ecological and environmental changes were proposed to improve the ecosystem management of the TGR area.

  1. Perceptions of Accounting Practitioners and Educators on E-Business Curriculum and Web Security Issues

    ERIC Educational Resources Information Center

    Ragothaman, Srinivasan; Lavin, Angeline; Davies, Thomas

    2007-01-01

    This research examines, through survey administration, the perceptions of accounting practitioners and educators with respect to the multi-faceted security issues of e-commerce payment systems as well as e-business curriculum issues. Specific security issues explored include misuse/theft of personal and credit card information, spam e-mails,…

  2. Brookhaven National Laboratory Institutional Plan FY2001--FY2005

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davis, S.

    Brookhaven National Laboratory is a multidisciplinary laboratory in the Department of Energy National Laboratory system and plays a lead role in the DOE Science and Technology mission. The Laboratory also contributes to the DOE missions in Energy Resources, Environmental Quality, and National Security. Brookhaven strives for excellence in its science research and in facility operations and manages its activities with particular sensitivity to environmental and community issues. The Laboratory's programs are aligned continuously with the goals and objectives of the DOE through an Integrated Planning Process. This Institutional Plan summarizes the portfolio of research and capabilities that will assure successmore » in the Laboratory's mission in the future. It also sets forth BNL strategies for our programs and for management of the Laboratory. The Department of Energy national laboratory system provides extensive capabilities in both world class research expertise and unique facilities that cannot exist without federal support. Through these national resources, which are available to researchers from industry, universities, other government agencies and other nations, the Department advances the energy, environmental, economic and national security well being of the US, provides for the international advancement of science, and educates future scientists and engineers.« less

  3. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...

  4. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...

  5. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...

  6. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...

  7. Failure to engage the public in issues related to inland fishes and fisheries: strategies for building public and political will to promote meaningful conservation.

    PubMed

    Cooke, S J; Lapointe, N W R; Martins, E G; Thiem, J D; Raby, G D; Taylor, M K; Beard, T D; Cowx, I G

    2013-10-01

    Generating awareness of environmental conservation issues among the public is essential if there is an expectation of them to alter their behaviour, facilitate informed decisions and engage governments or regulatory authorities to take action. There are, however, exceedingly few public engagement success stories related to inland fishes and fisheries policy and resource allocation decisions. Inland aquatic resources and their associated fisheries provide employment, recreation, culture and, in developing regions, a considerable proportion of human nutrition and food security. Freshwater fishes are incredibly diverse but are among the most endangered organisms globally. Many threats to inland fisheries are driven largely by externalities to inland fisheries. The purpose of this paper is to draw attention to the role and plight of inland fishes and fisheries, and the need to generate the public and political will necessary to promote meaningful conservation. With this paper, the extent to which the scientific and environmental management communities have failed to engage the public in issues related to inland fishes and fisheries is characterized. Next, the barriers or factors that serve as the basis for the problem with public engagement are identified. The paper concludes by identifying strategies, including those focused on environmental education initiatives, for building the public and political will necessary to promote meaningful conservation of inland fishes and fisheries in developed and developing countries. Scientists, environmental managers, non-governmental organizations, politicians, regulatory authorities and the media all have important roles to play in overcoming challenges to inland fisheries. Failure to engage the public in freshwater conservation and management issues will impede efforts to stem the loss of freshwater habitats, fisheries and aquatic biodiversity. Thankfully, there are opportunities to learn from success stories related to other environmental issues and initiatives that have been successful in marine fish conservation. © 2013 The Fisheries Society of the British Isles.

  8. 17 CFR 270.2a-7 - Money market funds.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...

  9. 17 CFR 270.2a-7 - Money market funds.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...

  10. 17 CFR 270.2a-7 - Money market funds.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit Security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal Issuer means...

  11. 17 CFR 270.2a-7 - Money market funds.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...

  12. 17 CFR 450.4 - Custodial holdings of government securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... appropriate regulatory agency that expressly govern securities lending practices. (b)(1) Except as otherwise... security (or the amount of each issue of a government security issued in book-entry form) held for the.... (d) Counts of government securities held for customers in both definitive and book-entry form shall...

  13. The Russian Armed Forces at the Dawn of the Millennium

    DTIC Science & Technology

    2000-12-01

    several top civilian officials.) The “civilian” view was that the military had to learn to live with the resources available and stop dreaming ...military provided a military scenario and then asked the research units, in competition with each other, to dream up ideas that would put them ahead...p. 7. 42. Odelia Funke, “Environmental Issues and Russian Security, in the present volume.” 307 43. Eric Hyer, “ Dreams and Nightmares: Chinese

  14. 2007 Report to Congress of the U.S.- China Economic and Security Review Commission

    DTIC Science & Technology

    2007-11-01

    the $3 billion stake it took in the New York-based private equity firm The Blackstone Group. Some worry that the new fund may be used to capture more...pollution of surrounding riverbanks and other ecological harm. Pollution from Coal Mining Air pollution is not the only environmental consequence of Chi...technology firms and human rights organizations was formed to discuss the establishment of an international code of ethics on issues related to

  15. Worldwide Emerging Environmental Issues Affecting the U.S. Military. April 2006 Report

    DTIC Science & Technology

    2006-04-01

    Knowledge and Security Some of the most prominent discussions are as follows: - Dissolving coral reef shells are explained by greater increases in CO2...levels within oceanic waters. Especially vulnerable are cold sea corals and recently discovered planktonic organisms. Increases of CO2 reduce pH...leading to acidification . The panelists at the EGU Assembly suggested that 1/3 of all CO2 is absorbed into oceans and that it has recently been

  16. The Marysville, Montana Geothermal Project

    NASA Technical Reports Server (NTRS)

    Mcspadden, W. R.; Stewart, D. H.; Kuwada, J. T.

    1974-01-01

    Drilling the first geothermal well in Montana presented many challenges, not only in securing materials and planning strategies for drilling the wildcat well but also in addressing the environmental, legal, and institutional issues raised by the request for permission to explore a resource which lacked legal definition. The Marysville Geothermal Project was to investigate a dry hot rock heat anomaly. The well was drilled to a total depth of 6790 feet and many fractured water bearing zones were encountered below 1800 feet.

  17. Virtual special issue on catalysis at the U.S. Department of Energy's National Laboratories

    DOE PAGES

    Pruski, Marek; Sadow, Aaron D.; Slowing, Igor I.; ...

    2016-04-21

    Here the catalysis research at the U.S. Department of Energy's (DOE's) National Laboratories covers a wide range of research topics in heterogeneous catalysis, homogeneous/molecular catalysis, biocatalysis, electrocatalysis, and surface science. Since much of the work at National Laboratories is funded by DOE, the research is largely focused on addressing DOE's mission to ensure America's security and prosperity by addressing its energy, environmental, and nuclear challenges through transformative science and technology solutions.

  18. Worldwide Emerging Environmental Issues Affecting the U.S. Military. October 2009

    DTIC Science & Technology

    2009-10-01

    nuclear arms. Deliberations will take at least until May 2010. Belgium has already banned cluster and depleted uranium munitions. [Related item: UN...dissolve in cold water than warm. Research carried out in the archipelago of Svalbard revealed that seawater could reach corrosive levels within 10 years... corrosively acidic by 2018; 50% by 2050; and entirely by the end of the century. 6.8.2 Food and Water Security The number of hungry people in the

  19. 17 CFR 270.12d3-1 - Exemption of acquisitions of securities issued by persons engaged in securities related businesses.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... securities issued by persons engaged in securities related businesses. 270.12d3-1 Section 270.12d3-1... in securities related businesses. (a) Notwithstanding section 12(d)(3) of the Act, a registered... securities related business, the determination required by paragraph (b) of this section shall be made as...

  20. Security issues in healthcare applications using wireless medical sensor networks: a survey.

    PubMed

    Kumar, Pardeep; Lee, Hoon-Jae

    2012-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.

  1. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

    PubMed Central

    Kumar, Pardeep; Lee, Hoon-Jae

    2012-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs. PMID:22368458

  2. Environmental security as related to scale mismatches of disturbance patterns in a panarchy of social-ecological landscapes

    Treesearch

    Giovanni Zurlini; Irene Petrosillo; Nicola Zaccarelli; Kurt Riitters

    2008-01-01

    Environmental security, as the opposite of environmental fragility (vulnerability), is multilayered, multi-scale and complex, existing in both the objective realm of biophysics and society, and the subjective realm of individual human perception. For ecological risk assessments (ERAs), the relevant objects of environmental security are social-ecological landscapes (...

  3. The 2015 National Security Strategy: Authorities, Changes, Issues for Congress

    DTIC Science & Technology

    2016-04-05

    Strategy: Authorities, Changes, Issues for Congress Congressional Research Service 3  reverse the spread of nuclear and biological weapons and...secure nuclear materials;  advance peace, security, and opportunity in the greater Middle East;  invest in the capacity of strong and capable...and norms on issues ranging from maritime security to trade and human rights.” 6 On Russia, the document says, “... we will continue to impose

  4. Toxic disputes and the rise of environmental justice in Australia.

    PubMed

    Lloyd-Smith, Mariann E; Bell, Lee

    2003-01-01

    The paper examines the rise of environmental justice issues in Australia, evident in two toxic disputes; the first, in a Perth outer suburb in Western Australia where residents faced both a hazardous waste dump and the nation's biggest chemical fire; and the second, in the Sydney suburb of Botany where residents were confronted with the destruction of what is thought to be, the world's largest stockpile of hazardous hexachlorobenzene (HCB) waste. The paper reviews the range of factors that impacted the local communities' fight for environmental justice. It explores the limitations of risk assessment and risk-based policies, as well as the problematic role of the expert and the communication of risk. The informational inequity and resource disparities so evident in toxic disputes are highlighted. The case studies confirmed the inequitable distribution of chemical risk as a failure to secure environmental justice for all Australians.

  5. Linking community programs in environment to programs in population: towards sustainable communities that sustain sanctuaries.

    PubMed

    Cincotta, R P

    1994-01-01

    This article briefly reviews several nongovernmental organization (NGO) programs that address environmental and population issues. A framework is constructed that identifies how linked programs are supposed to work. The potential for sustainable communities is explored. It is concluded that sanctuaries in developing countries will not survive unless population in surrounding communities is stabilized and the economic and ecological relationships between the community and the sanctuary ecosystem are sustainable. In developed countries resource needs must be identified in regional planning in order for environmental protection to occur. The author finds that NGOs can be instrumental in securing community participation in environmental protection. NGOs operating in Chiapas, Mexico, provide management assistance and public health and family planning awareness to displaced indigenous farmers and conservative professionals. Another NGO outside the Ranthambhore National Park in Rajasthan, India, works to promote alternative fuel and grazing sources among local farmers. Near Chautara, in Nepal, farmers are aided by NGOs in laying sanitary water pipes, which reduces the amount of women's time required for fetching water and increases the amount of time women can spend gardening or getting involved in environmental projects. NGO efforts that reduce women's time absorbed by domestic burdens help women fulfill family planning desires and allow for greater investment in the education of children. Environmental sustainability will be dependent on family planning and other population-related processes and on the awareness that public health is an environmental issue. Opposition to integrated environment and population programs stems from donor opposition, opposition to investment in low-density areas, and a priority on biodiversity issues over development of public health services near sanctuaries. This paper was presented at an international forum at the George Washington University before the 1994 Cairo conference.

  6. Reforestation strategies amid social instability: lessons from Afghanistan.

    PubMed

    Groninger, John W

    2012-04-01

    Foreign and domestic government agencies and other international organizations pursue reforestation programs in rural upper watershed areas of Afghanistan over the past decade to alleviate poverty, combat the insurgency and rehabilitate a depleted forest resource base. Popular programs incorporate cash-for-work to conduct hillside terracing, check dam construction and tree-planting for nut production, fuel wood, timber, dune stabilization, and erosion abatement. Programmatic approaches have varied as a function of accessibility, security and local objectives. Uncertain land tenure and use rights, weak local environmental management capacity, and a focus on agricultural production to meet immediate needs limit interest, nationally and locally. Unreliable security, a lack of high quality tree planting stock, limited technical knowledge and coordination among government agencies, and poor security hamper program expansion. Reforestation success would be most likely where these issues are least acute. The Afghan government should focus on supporting community based natural resource management, developing and disseminating improved conservation tree nursery strategies, and promoting watershed management schemes that incorporate forestry, range management and agronomic production. Reforestation practitioners could benefit from the human and material resources now present as part of the international war effort. Successes and failures encountered in Afghanistan should be considered in order to address similar problems in insecure regions elsewhere when reforestation may help reverse environmental degradation and contribute to broader social stabilization efforts.

  7. Reforestation Strategies Amid Social Instability: Lessons from Afghanistan

    NASA Astrophysics Data System (ADS)

    Groninger, John W.

    2012-04-01

    Foreign and domestic government agencies and other international organizations pursue reforestation programs in rural upper watershed areas of Afghanistan over the past decade to alleviate poverty, combat the insurgency and rehabilitate a depleted forest resource base. Popular programs incorporate cash-for-work to conduct hillside terracing, check dam construction and tree-planting for nut production, fuel wood, timber, dune stabilization, and erosion abatement. Programmatic approaches have varied as a function of accessibility, security and local objectives. Uncertain land tenure and use rights, weak local environmental management capacity, and a focus on agricultural production to meet immediate needs limit interest, nationally and locally. Unreliable security, a lack of high quality tree planting stock, limited technical knowledge and coordination among government agencies, and poor security hamper program expansion. Reforestation success would be most likely where these issues are least acute. The Afghan government should focus on supporting community based natural resource management, developing and disseminating improved conservation tree nursery strategies, and promoting watershed management schemes that incorporate forestry, range management and agronomic production. Reforestation practitioners could benefit from the human and material resources now present as part of the international war effort. Successes and failures encountered in Afghanistan should be considered in order to address similar problems in insecure regions elsewhere when reforestation may help reverse environmental degradation and contribute to broader social stabilization efforts.

  8. The Use of Space Technology for Environmental Security, Disaster Rehabilitation and Sustainable Development in Afghanistan and Iraq

    NASA Astrophysics Data System (ADS)

    Lovett, Kian

    Since the dawn of time, humans have engaged in war. In the last 5,600 years of recorded history 14,600 wars have been waged1. The United Nations has sought to save succeeding generations from the scourge of war and to foster peace. Wars have recently taken place in Afghanistan and Iraq. Both countries are now faced with a range of complex problems. In-depth country assessments reveal significant shortcomings in the areas of water, sanitation, health, security and natural resource management. These are key factors when examining environmental security, sustainable development and trans-boundary problems, all of which are issues relevant to the Middle East and Central Asian states. Space technology can be applied to support the reconstruction and development plans for Afghanistan and Iraq; however, there needs to be an investigation and open discussion of how these resources can best be used. Already, agencies within the United Nations possess considerable expertise in the use of space technologies in the area of disaster management. If this capability is to be used, there will need to be inter-agency coordination, not to mention a further expansion and development of the United Nations role in both Afghanistan and Iraq.

  9. Report: EPA’s Office of Environmental Information Should Improve Ariel Rios and Potomac Yard Computer Room Security Controls

    EPA Pesticide Factsheets

    Report #12-P-0879, September 26, 2012. The security posture and in-place environmental control review of the computer rooms in the Ariel Rios and Potomac Yard buildings revealed numerous security and environmental control deficiencies.

  10. Cyber security issues in online games

    NASA Astrophysics Data System (ADS)

    Zhao, Chen

    2018-04-01

    With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.

  11. 76 FR 26996 - Notice of Intent To Prepare an Environmental Impact Statement for New Corporate Average Fuel...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-10

    ...Pursuant to the National Environmental Policy Act (NEPA), NHTSA plans to prepare an Environmental Impact Statement (EIS) to analyze the potential environmental impacts of the agency's Corporate Average Fuel Economy program for passenger automobiles (referred to herein as ``passenger cars'') and non-passenger automobiles (referred to herein as ``light trucks''). The EIS will consider the potential environmental impacts of new fuel economy standards for model years 2017-2025 passenger cars and light trucks that NHTSA will be proposing pursuant to the Energy Independence and Security Act of 2007. This notice initiates the NEPA scoping process by inviting comments from Federal, State, and local agencies, Indian tribes, and the public to help identify the environmental issues and reasonable alternatives to be examined in the EIS. This notice also provides guidance for participating in the scoping process and additional information about the alternatives NHTSA expects to consider in its NEPA analysis. In preparing this notice, NHTSA has shared the document with the Council on Environmental Quality (CEQ), the Environmental Protection Agency (EPA), and the Department of Energy (DOE).

  12. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...

  13. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...

  14. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...

  15. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...

  16. 17 CFR 240.19c-4 - Governing certain listing or authorization determinations by national securities exchanges and...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...

  17. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-4, for registration of securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239.34 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE...

  18. 77 FR 63380 - Self-Regulatory Organizations; NYSE Arca, Inc.; Order Granting Approval of Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-16

    ... purchase fixed income securities issued by U.S. or foreign corporations \\6\\ or financial institutions... also may purchase securities issued or guaranteed by the U.S. Government or foreign governments... (``CMOs'').\\8\\ The Fund may purchase or sell securities on a when issued, delayed delivery or forward...

  19. Defining Information Security.

    PubMed

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  20. Science and Technology Resources on the Internet: Computer Security.

    ERIC Educational Resources Information Center

    Kinkus, Jane F.

    2002-01-01

    Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…

  1. School Violence: Physical Security.

    ERIC Educational Resources Information Center

    Utah State Office of Education, Salt Lake City.

    This booklet provides an overview of security technology product areas that might be appropriate and affordable for school applications. Topics cover security concepts and operational issues; security issues when designing for new schools; the role of maintenance; video camera use; walk-through metal detectors; duress alarm devices; and a partial…

  2. Strengthening Multidisciplinary Research on Climate and Environmental Change

    NASA Astrophysics Data System (ADS)

    Beer, Tom; Li, Jianping; Alverson, Keith

    2014-08-01

    The difficulty with multidisciplinary research is finding common ground for scientists, whose approach to a particular scientific problem can differ radically. For example, there is agreement between the geophysical community and the food science and technology community that food security is an important issue. However, the climate change community sees possible solutions coming from more detailed studies on the links between climate change and agriculture, whereas the food science community sees possible solutions emerging from studies of food logistics and supply chains.

  3. Risk assessment for sustainable food security in China according to integrated food security--taking Dongting Lake area for example.

    PubMed

    Qi, Xiaoxing; Liu, Liming; Liu, Yabin; Yao, Lan

    2013-06-01

    Integrated food security covers three aspects: food quantity security, food quality security, and sustainable food security. Because sustainable food security requires that food security must be compatible with sustainable development, the risk assessment of sustainable food security is becoming one of the most important issues. This paper mainly focuses on the characteristics of sustainable food security problems in the major grain-producing areas in China. We establish an index system based on land resources and eco-environmental conditions and apply a dynamic assessment method based on status assessments and trend analysis models to overcome the shortcomings of the static evaluation method. Using fuzzy mathematics, the risks are categorized into four grades: negligible risk, low risk, medium risk, and high risk. A case study was conducted in one of China's major grain-producing areas: Dongting Lake area. The results predict that the status of the sustainable food security in the Dongting Lake area is unsatisfactory for the foreseeable future. The number of districts at the medium-risk range will increase from six to ten by 2015 due to increasing population pressure, a decrease in the cultivated area, and a decrease in the effective irrigation area. Therefore, appropriate policies and measures should be put forward to improve it. The results could also provide direct support for an early warning system-which could be used to monitor food security trends or nutritional status so to inform policy makers of impending food shortages-to prevent sustainable food security risk based on some classical systematic methods. This is the first research of sustainable food security in terms of risk assessment, from the perspective of resources and the environment, at the regional scale.

  4. Population, environment and security: a new trinity.

    PubMed

    Hartmann, B

    1998-10-01

    This paper critically examines the literature on the interaction between population, the environment, and development. It posits that population pressure and resource scarcities are unfairly blamed for internal conflicts in Africa, Asia, and Latin America. Internal conflicts are, in fact, affected by underlying economic and political causes (international companies, development assistance agencies, and military). This reasoning implies that the national security threats are environmental groups, poor women, and social change groups, which in fact should be integrated within solutions to poverty, environmental destruction, and violence. The US military's focus on "neutralizing environmental consequences that could lead to instability" and promoting sustainable development is misspecified and falls within the domain of civilian agencies. Use of military satellites by the US Central Intelligence Agency in environmental surveillance raises questions about the management of secret archives. The scarcity-conflict model has an indirect role in misshaping public opinion, legitimizes population control as a top priority, neglects gender issues, and dehumanizes refugees. Evidence indicates that the conflicts in Rwanda were the result of institutional failure and ethnic divisions. Homer-Dixon's model fails due to weak definitions of scarcity, ignorance of the role of colonial history and economic inequities, idealized views of the state, and neglect of external factors. The scarcity-conflict model is popular due to opportunism and political pragmatism. For the military, it provides new rationales for a huge budget.

  5. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    NASA Astrophysics Data System (ADS)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  6. Beyond Conflict and Kinetics: Airpower Strategy for Human Security Operations

    DTIC Science & Technology

    2014-08-26

    America to a leadership role of the international community while dramatically altering its security environment. After World War II, American security...health, environmental, personal, community , and political security. At the same time it stopped short of providing a finite definition, instead...seven areas of human security are economic, food, health, environmental, personal, community and political security. These components are a “universal

  7. Survey of cyber security issues in smart grids

    NASA Astrophysics Data System (ADS)

    Chen, Thomas M.

    2010-04-01

    The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.

  8. Transportation Security: Issues for the 111th Congress

    DTIC Science & Technology

    2009-05-15

    results of covert testing of airport security checkpoints demonstrating deficiencies in detecting improvised explosives and incendiary devices...34 A key issue in the debate over aviation security immediately following September 11, 2001, was whether airport security screeners should be...intentional wrongdoing on the part of airport security screeners, whether they be federal or private. Nonetheless, while the pilot program airports

  9. Global Security Contingency Fund: Summary and Issue Overview

    DTIC Science & Technology

    2014-04-04

    Diplomacy and Development Review (QDDR), Washington, D.C., December 2010, p. 203; Gordon Adams and Rebecca Williams, A New Way Forward: Rebalancing ...Williams, A New Way Forward: Rebalancing Security Assistance Programs and (continued...) Global Security Contingency Fund: Summary and Issue Overview...a large security assistance portfolio . But others may point to the State Department’s creation of new programs under the Security Assistance

  10. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... government and international agencies and foreign central banks. In their accounts, depository institutions... BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS... Direct®—into which we issue marketable Treasury securities. We maintain and transfer securities in these...

  11. The “geotoxicology” of airborne particulate matter: implications for public health, public policy, and environmental security (Invited)

    NASA Astrophysics Data System (ADS)

    Plumlee, G. S.; Morman, S. A.

    2009-12-01

    Exposures to airborne particulate matter (PM) have been documented and hypothesized as the cause of a wide variety of adverse health effects. Most attention has focused on potential health effects of occupational and environmental exposures to many types of anthropogenic PM, such as mineral dusts or combustion byproducts of fossil fuels. However, geogenic PM (produced from the Earth by natural processes) and geoanthropogenic PM (produced from natural sources but modified by human activities) are also increasingly of concern as potential agents of toxicity and disease, via both environmental and occupational exposures. Geotoxicology can be defined as the study of the toxicological characteristics and potential health effects of geogenic and geoanthropogenic earth materials. Acute exposures to high PM concentrations are associated with exacerbated asthma, other pulmonary inflammatory responses, cardiovascular problems, and other issues. Some diseases can result from inhalation of dust-borne pathogens. PM can contain bioaccessible (readily dissolved in the body’s fluids) contaminants that, if absorbed in sufficient doses, can trigger toxicity. Acutely bioreactive PM, such as alkaline wildfire ash or acidic volcanic fog, can trigger acute irritation or damage of the respiratory tract, eyes, and skin. Biodurable PM such as asbestos fibers and crystalline silica are poorly cleared by lung macrophages, do not readily dissolve in the fluids lining the lungs, and can therefore persist in the lungs for decades. In sufficient dose, pneumoconioses can result from exposure to biodurable minerals, and chronic fluid-mineral reactions in the body (such as redox cycling and formation of free radicals) are thought to help promote cancers such as lung cancer and (in the case of asbestos) mesothelioma. Many key research questions remain, such as the exact mechanisms by which many types of PM cause disease, or the levels of exposure above which various types of PM begin to pose a substantial public health risk. PM is at the core of diverse policy issues related to air quality, public health, and environmental security, at scales from local to global. Interdisciplinary earth and health science investigations are crucial to the development of effective policy. For example, earth science input will be key for understanding and managing potential risks associated with living on or near asbestos-containing rocks. Particularly in dry climates, a better understanding of the roles of geogenic PM versus anthropogenic PM as triggers of disease is needed in the development of appropriate air quality regulations at local to regional scales; this issue will only increase in importance in the future as human inhabitation increases in some arid regions, and as arid regions expand or shift due to climate change or human-induced stresses. Over the last decade, it has been recognized that dusts can transport contaminants and pathogens between continents. Hence, human practices and policies that influence dust generation in one continent or country may ultimately have an impact on public health, policy, and environmental security in distant downwind countries.

  12. [A mobile sensor for remote detection of natural gas leakage].

    PubMed

    Zhang, Shuai; Liu, Wen-qing; Zhang, Yu-jun; Kan, Rui-feng; Ruan, Jun; Wang, Li-ming; Yu, Dian-qiang; Dong, Jin-ting; Han, Xiao-lei; Cui, Yi-ben; Liu, Jian-guo

    2012-02-01

    The detection of natural gas pipeline leak becomes a significant issue for body security, environmental protection and security of state property. However, the leak detection is difficult, because of the pipeline's covering many areas, operating conditions and complicated environment. A mobile sensor for remote detection of natural gas leakage based on scanning wavelength differential absorption spectroscopy (SWDAS) is introduced. The improved soft threshold wavelet denoising was proposed by analyzing the characteristics of reflection spectrum. And the results showed that the signal to noise ratio (SNR) was increased three times. When light intensity is 530 nA, the minimum remote sensitivity will be 80 ppm x m. A widely used SWDAS can make quantitative remote sensing of natural gas leak and locate the leak source precisely in a faster, safer and more intelligent way.

  13. Web Services Security - Implementation and Evaluation Issues

    NASA Astrophysics Data System (ADS)

    Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis

    Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.

  14. 17 CFR 239.23 - Form N-14, for the registration of securities issued in business combination transactions by...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... registration of securities issued in business combination transactions by investment companies and business development companies. 239.23 Section 239.23 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... companies and business development companies. This form shall be used by a registered investment company or...

  15. 76 FR 34920 - Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-15

    ... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 230, 240 and 260 [Release Nos. 33-9222; 34-64639; 39-2474; File No. S7-22-11] RIN 3235-AL16 Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies AGENCY: Securities and Exchange Commission. ACTION: Proposed rules. SUMMARY: We are...

  16. 78 FR 42989 - Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-18

    ... Important Notice of the availability of the comparison service for when-issued corporate securities.\\5\\ \\5... scheduled to be implemented for corporate when-issued securities and NSCC would submit a rule filing to the... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69980; File No. SR-NSCC-2013-09] Self...

  17. Federal Agency biodefense funding, FY2011-FY2012.

    PubMed

    Franco, Crystal; Sell, Tara Kirk

    2011-06-01

    Since 2001, the United States government has spent substantial resources on preparing the nation against a bioterrorist attack. Earlier articles in this series have analyzed civilian biodefense funding by the federal government for fiscal years (FY) 2001 through proposed funding for FY2011. This article updates those figures with budgeted amounts for FY2012, specifically analyzing the budgets and allocations for biodefense at the Departments of Health and Human Services, Defense, Homeland Security, Agriculture, Commerce, and State; the Environmental Protection Agency; and the National Science Foundation. This article also includes an updated assessment of the proportion of biodefense funding provided for programs that address multiple scientific, public health, healthcare, national security, and international security issues in addition to biodefense. The FY2012 federal budget for civilian biodefense totals $6.42 billion. Of that total, $5.78 billion (90%) is budgeted for programs that have both biodefense and nonbiodefense goals and applications, and $637.6 million (10%) is budgeted for programs that have objectives solely related to biodefense.

  18. Federal agency biodefense funding, FY2013-FY2014.

    PubMed

    Sell, Tara Kirk; Watson, Matthew

    2013-09-01

    Since 2001, the United States government has spent substantial resources on preparing the nation against a bioterrorist attack. Earlier articles in this series have analyzed civilian biodefense funding by the federal government for fiscal years (FY) 2001 through proposed funding for FY2013. This article updates those figures with budgeted amounts for FY2014, specifically analyzing the budgets and allocations for biodefense at the Departments of Health and Human Services, Defense, Homeland Security, Agriculture, Commerce, Veterans Affairs, and State; the Environmental Protection Agency; and the National Science Foundation. This article also includes an updated assessment of the proportion of biodefense funding provided for programs that address multiple scientific, public health, healthcare, national security, and international security issues in addition to biodefense. The FY2014 federal budget for civilian biodefense totals $6.69 billion. Of that total, $5.86 billion (88%) is budgeted for programs that have both biodefense and nonbiodefense goals and applications, and $835 million (12%) is budgeted for programs that have objectives solely related to biodefense.

  19. Federal agency biodefense funding, FY2010-FY2011.

    PubMed

    Franco, Crystal; Sell, Tara Kirk

    2010-06-01

    Since 2001, the United States government has spent substantial resources on preparing the nation against a bioterrorist attack. Earlier articles in this series have analyzed civilian biodefense funding by the federal government for fiscal years (FY) 2001 through FY2010. This article updates those figures with budgeted amounts for FY2011, specifically analyzing the budgets and allocations for biodefense at the Departments of Health and Human Services, Defense, Homeland Security, Agriculture, Commerce, and State; the Environmental Protection Agency; and the National Science Foundation. This article also includes an updated assessment of the proportion of biodefense funding provided for programs that address multiple public health, healthcare, national security, and international security issues in addition to biodefense. The FY2011 federal budget for civilian biodefense totals $6.48 billion. Of that total, $5.90 billion (91%) is budgeted for programs that have both biodefense and nonbiodefense goals and applications, and $577.9 million (9%) is budgeted for programs that deal strictly with biodefense.

  20. Federal Agency Biodefense Funding, FY2013-FY2014

    PubMed Central

    Watson, Matthew

    2013-01-01

    Since 2001, the United States government has spent substantial resources on preparing the nation against a bioterrorist attack. Earlier articles in this series have analyzed civilian biodefense funding by the federal government for fiscal years (FY) 2001 through proposed funding for FY2013. This article updates those figures with budgeted amounts for FY2014, specifically analyzing the budgets and allocations for biodefense at the Departments of Health and Human Services, Defense, Homeland Security, Agriculture, Commerce, Veterans Affairs, and State; the Environmental Protection Agency; and the National Science Foundation. This article also includes an updated assessment of the proportion of biodefense funding provided for programs that address multiple scientific, public health, healthcare, national security, and international security issues in addition to biodefense. The FY2014 federal budget for civilian biodefense totals $6.69 billion. Of that total, $5.86 billion (88%) is budgeted for programs that have both biodefense and nonbiodefense goals and applications, and $835 million (12%) is budgeted for programs that have objectives solely related to biodefense. PMID:23906009

  1. 78 FR 32696 - China Environmental Protection, Inc., Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-31

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Environmental Protection, Inc., Order of Suspension of Trading May 29, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Environmental Protection, Inc. because it has not filed any periodi...

  2. Position of the American Dietetic Association: Addressing world hunger, malnutrition, and food insecurity.

    PubMed

    Struble, Marie Boyle; Aomari, Laurie Lindsay

    2003-08-01

    It is the position of the American Dietetic Association (ADA) that access to adequate amounts of safe, nutritious, and culturally appropriate food at all times is a fundamental human right. Hunger continues to be a worldwide problem of staggering proportions. The Association supports programs and encourages practices that combat hunger and malnutrition, produce food security, promote self-sufficiency, and are environmentally and economically sustainable. The Association is aware that hunger exists in a world of plenty and that poverty, gender inequity, ethnocentrism, racism, and the lack of political will are key constraints to solving the problems of global hunger and malnutrition. Recognizing that simplistic approaches are inadequate, the ADA identifies sustainable development as the long-term strategy to ending world hunger and achieving food security. Sustainable development requires political, economic, and social changes that include empowering the disenfranchised, widening access to assets and other resources, narrowing the gap between rich and poor, and adjusting consumption patterns so as to foster good stewardship of nature. Additionally, because the health status of future generations is related to the well-being of their mothers, achieving food security will also require increased access for women to education, adequate health care and sanitation, and economic opportunities. This position paper reviews the complex issues of global food insecurity and discusses long-term solutions for achieving world food security. Achieving the end of world hunger has been and is now within our grasp. There is sufficient food to feed everyone, and solutions can be realized now that will benefit all of humanity. As noted in the paper, most people who examine the costs of ending versus not ending world hunger are bewildered by the question of why humanity did not solve the problem a long time ago. The Association supports programs and encourages practices that combat hunger and malnutrition, produce food security, promote self-sufficiency, respect local cultures, and are environmentally and economically sustainable. The ADA recognizes that decisions and actions that dietetics professionals make as practitioners and consumers can help reduce the extent of poverty and hunger both here and abroad. This paper provides information, resources, and strategies to assist dietetics professionals in improving the public's understanding of key issues, becoming advocates of the poor, and influencing the political will to end world hunger.

  3. U.S. Presidential Candidate camps debate sciences issues

    NASA Astrophysics Data System (ADS)

    Showstack, Randy

    2000-10-01

    While budget surpluses, social security, and tax cut proposals have been major focuses during the U.S. presidential campaign between Texas Governor George W Bush and Vice President Al Gore, the candidates also have staked out a number of important issues related to Earth sciences and the environment. Two recent debates between representatives of the Bush and Gore camps have helped to clarify these positions. The Washington Science Policy Alliance presented a candidates forum on science and technology policy on October 5 at the American Association for the Advancement of Science (AAAS), in Washington, D.C. On September 26, the non-profit National Environmental Policy Institute (NEPI) held a debate on presidential politics and the environment at the National Press Club, also in Washington, D.C.

  4. Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library

    ERIC Educational Resources Information Center

    McMullen, Karen D.; Kane, Laura Townsend

    2008-01-01

    In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…

  5. 17 CFR 239.25 - Form S-4, for the registration of securities issued in business combination transactions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form S-4, for the registration of securities issued in business combination transactions. 239.25 Section 239.25 Commodity and... business combination transactions. This form may be used for registration under the Securities Act of 1933...

  6. Close the Gate, Lock the Windows, Bolt the Doors: Securing Library Computers. Online Treasures

    ERIC Educational Resources Information Center

    Balas, Janet

    2005-01-01

    This article, written by a systems librarian at the Monroeville Public Library, discusses a major issue affecting all computer users, security. It indicates that while, staying up-to-date on the latest security issues has become essential for all computer users, it's more critical for network managers who are responsible for securing computer…

  7. Food concerns and support for environmental food policies and purchasing.

    PubMed

    Worsley, Anthony; Wang, Wei C; Burton, Melissa

    2015-08-01

    Consumer support for pro environmental food policies and food purchasing are important for the adoption of successful environmental policies. This paper examines consumers' views of food policy options as their predisposition to purchase pro environmental foods along with their likely demographic, educational and cognitive antecedents including food and environmental concerns and universalism values (relating to care for others and the environment). An online survey to assess these constructs was conducted among 2204 Australian adults in November 2011. The findings showed strong levels of support for both environmental food policies (50%-78% support) and pro environmental food purchasing (51%-69% intending to purchase pro environmental foods). Confirmatory factor analysis and structural equation modelling showed that different cognitive mediators exist along pathways between demographics and the two outcome variables. Support for food policy was positively related to food and environment concerns (std. Beta = 0.25), universalism (0.41), perceived control (0.07), and regulatory issues (0.64 but negatively with food security issues (-0.37). Environment purchasing intentions were positively linked to food and nutrition concerns (0.13), food and environment concerns (0.24), food safety concerns (0.19), food and animal welfare concerns (0.16), universalism (0.25), female gender (0.05), education (0.04), and perceived influence over the food system (0.17). In addition, health study in years 11 and 12 was positively related to the beginning of both of these pathways (0.07 for each). The results are discussed in relation to the opportunities that communications based on the mediating variables offer for the promotion of environmental food policies and purchasing. Copyright © 2015 Elsevier Ltd. All rights reserved.

  8. Mitigating Climate Change at the Carbon Water Nexus: A Call to Action for the Environmental Engineering Community

    PubMed Central

    Clarens, Andres F.; Peters, Catherine A.

    2016-01-01

    Abstract Environmental engineers have played a critical role in improving human and ecosystem health over the past several decades. These contributions have focused on providing clean water and air as well as managing waste streams and remediating polluted sites. As environmental problems have become more global in scale and more deeply entrenched in sociotechnical systems, the discipline of environmental engineering must grow to be ready to respond to the challenges of the coming decades. Here we make the case that environmental engineers should play a leadership role in the development of climate change mitigation technologies at the carbon-water nexus (CWN). Climate change, driven largely by unfettered emissions of fossil carbon into the atmosphere, is a far-reaching and enormously complex environmental risk with the potential to negatively affect food security, human health, infrastructure, and other systems. Solving this problem will require a massive mobilization of existing and innovative new technology. The environmental engineering community is uniquely positioned to do pioneering work at the CWN using a skillset that has been honed, solving related problems. The focus of this special issue, on “The science and innovation of emerging subsurface energy technologies,” provides one example domain within which environmental engineers and related disciplines are beginning to make important contributions at the CWN. In this article, we define the CWN and describe how environmental engineers can bring their considerable expertise to bear in this area. Then we review some of the topics that appear in this special issue, for example, mitigating the impacts of hydraulic fracturing and geologic carbon storage, and we provide perspective on emergent research directions, for example, enhanced geothermal energy, energy storage in sedimentary formations, and others. PMID:28031695

  9. Mitigating Climate Change at the Carbon Water Nexus: A Call to Action for the Environmental Engineering Community.

    PubMed

    Clarens, Andres F; Peters, Catherine A

    2016-10-01

    Environmental engineers have played a critical role in improving human and ecosystem health over the past several decades. These contributions have focused on providing clean water and air as well as managing waste streams and remediating polluted sites. As environmental problems have become more global in scale and more deeply entrenched in sociotechnical systems, the discipline of environmental engineering must grow to be ready to respond to the challenges of the coming decades. Here we make the case that environmental engineers should play a leadership role in the development of climate change mitigation technologies at the carbon-water nexus (CWN). Climate change, driven largely by unfettered emissions of fossil carbon into the atmosphere, is a far-reaching and enormously complex environmental risk with the potential to negatively affect food security, human health, infrastructure, and other systems. Solving this problem will require a massive mobilization of existing and innovative new technology. The environmental engineering community is uniquely positioned to do pioneering work at the CWN using a skillset that has been honed, solving related problems. The focus of this special issue, on "The science and innovation of emerging subsurface energy technologies," provides one example domain within which environmental engineers and related disciplines are beginning to make important contributions at the CWN. In this article, we define the CWN and describe how environmental engineers can bring their considerable expertise to bear in this area. Then we review some of the topics that appear in this special issue, for example, mitigating the impacts of hydraulic fracturing and geologic carbon storage, and we provide perspective on emergent research directions, for example, enhanced geothermal energy, energy storage in sedimentary formations, and others.

  10. Sustainable Food Security Measurement: A Systemic Methodology

    NASA Astrophysics Data System (ADS)

    Findiastuti, W.; Singgih, M. L.; Anityasari, M.

    2017-04-01

    Sustainable food security measures how a region provides food for its people without endangered the environment. In Indonesia, it was legally measured in Food Security and Vulnerability (FSVA). However, regard to sustainable food security policy, the measurement has not encompassed the environmental aspect. This will lead to lack of environmental aspect information for adjusting the next strategy. This study aimed to assess Sustainable Food security by encompassing both food security and environment aspect using systemic eco-efficiency. Given existing indicator of cereal production level, total emission as environment indicator was generated by constructing Causal Loop Diagram (CLD). Then, a stock-flow diagram was used to develop systemic simulation model. This model was demonstrated for Indonesian five provinces. The result showed there was difference between food security order with and without environmental aspect assessment.

  11. Food security for infants and young children: an opportunity for breastfeeding policy?

    PubMed

    Salmon, Libby

    2015-01-01

    Increased global demand for imported breast milk substitutes (infant formula, follow-on formula and toddler milks) in Asia, particularly China, and food safety recalls have led to shortages of these products in high income countries. At the same time, commodification and trade of expressed breast milk have fuelled debate about its regulation, cost and distribution. In many economies suboptimal rates of breastfeeding continue to be perpetuated, at least partially, because of a failure to recognise the time, labour and opportunity costs of breast milk production. To date, these issues have not figured prominently in discussions of food security. Policy responses have been piecemeal and reveal conflicts between promotion and protection of breastfeeding and a deregulated trade environment that facilitates the marketing and consumption of breast milk substitutes. The elements of food security are the availability, accessibility, utilization and stability of supply of nutritionally appropriate and acceptable quantities of food. These concepts have been applied to food sources for infants and young children: breastfeeding, shared breast milk and breast milk substitutes, in accordance with World Health Organization (WHO)/United Nations Children's Fund (UNICEF) guidelines on infant feeding. A preliminary analysis indicates that a food security framework may be used to respond appropriately to the human rights, ethical, economic and environmental sustainability issues that affect the supply and affordability of different infant foods. Food security for infants and young children is not possible without high rates of breastfeeding. Existing international and national instruments to protect, promote and support breastfeeding have not been implemented on a wide scale globally. These instruments need review to take into account the emerging trade environment that includes use of the internet, breast milk markets and globalised supply chains for breast milk substitutes. New approaches are required to handle the long-standing policy conflicts that surround infant and young child feeding. Placing breastfeeding in a food security framework may achieve the political attention and policy co-ordination required to accelerate breastfeeding rates in a range of economies.

  12. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  13. Design and Development of Layered Security: Future Enhancements and Directions in Transmission.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-06

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  14. Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security

    NASA Astrophysics Data System (ADS)

    Mahmadi, FN; Zaaba, ZF; Osman, A.

    2016-11-01

    Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.

  15. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System.more » Selected papers were processed separately for inclusion in the Energy Science and Technology Database.« less

  16. Security Deposits

    DTIC Science & Technology

    1987-04-01

    security deposit action is described in the regulation as follows: h. Security Deposits (DACF and DACA ). (1) Issue. PCS moves create financial hardships...General Wickham, The Army Chief of Staff, specified a philosophy toward the family in the Army Family White Paper. General Wickham’s action was in...security deposits arose. 1 The Army’s action to the issue of security deposits will be thoroughly discussed in this paper. The Army’s action comes now

  17. Western Mineral and Environmental Resources Science Center--providing comprehensive earth science for complex societal issues

    USGS Publications Warehouse

    Frank, David G.; Wallace, Alan R.; Schneider, Jill L.

    2010-01-01

    Minerals in the environment and products manufactured from mineral materials are all around us and we use and come into contact with them every day. They impact our way of life and the health of all that lives. Minerals are critical to the Nation's economy and knowing where future mineral resources will come from is important for sustaining the Nation's economy and national security. The U.S. Geological Survey (USGS) Mineral Resources Program (MRP) provides scientific information for objective resource assessments and unbiased research results on mineral resource potential, production and consumption statistics, as well as environmental consequences of mining. The MRP conducts this research to provide information needed for land planners and decisionmakers about where mineral commodities are known and suspected in the earth's crust and about the environmental consequences of extracting those commodities. As part of the MRP scientists of the Western Mineral and Environmental Resources Science Center (WMERSC or 'Center' herein) coordinate the development of national, geologic, geochemical, geophysical, and mineral-resource databases and the migration of existing databases to standard models and formats that are available to both internal and external users. The unique expertise developed by Center scientists over many decades in response to mineral-resource-related issues is now in great demand to support applications such as public health research and remediation of environmental hazards that result from mining and mining-related activities. Western Mineral and Environmental Resources Science Center Results of WMERSC research provide timely and unbiased analyses of minerals and inorganic materials to (1) improve stewardship of public lands and resources; (2) support national and international economic and security policies; (3) sustain prosperity and improve our quality of life; and (4) protect and improve public health, safety, and environmental quality. The MRP supports approximately 40 USGS research specialists who utilize cooperative agreements with universities, industry, and other governmental agencies to support their collaborative research and information exchange. Scientists of the WMERSC study how and where non-fuel mineral resources form and are concentrated in the earth's crust, where mineral resources might be found in the future, and how mineral materials interact with the environment to affect human and ecosystem health. Natural systems (ecosystems) are complex - our understanding of how ecosystems operate requires collecting and synthesizing large amounts of geologic, geochemical, biologic, hydrologic, and meteorological information. Scientists in the Center strive to understand the interplay of various processes and how they affect the structure, composition, and health of ecosystems. Such understanding, which is then summarized in publicly available reports, is used to address and solve a wide variety of issues that are important to society and the economy. WMERSC scientists have extensive national and international experience in these scientific specialties and capabilities - they have collaborated with many Federal, State, and local agencies; with various private sector organizations; as well as with foreign countries and organizations. Nearly every scientific and societal challenge requires a different combination of scientific skills and capabilities. With their breadth of scientific specialties and capabilities, the scientists of the WMERSC can provide scientifically sound approaches to a wide range of societal challenges and issues. The following sections describe examples of important issues that have been addressed by scientists in the Center, the methods employed, and the relevant conclusions. New directions are inevitable as societal needs change over time. Scientists of the WMERSC have a diverse set of skills and capabilities and are proficient in the collection and integration of

  18. Inter-organizational future proof EHR systems. A review of the security and privacy related issues.

    PubMed

    van der Linden, Helma; Kalra, Dipak; Hasman, Arie; Talmon, Jan

    2009-03-01

    Identification and analysis of privacy and security related issues that occur when health information is exchanged between health care organizations. Based on a generic scenario questions were formulated to reveal the occurring issues. Possible answers were verified in literature. Ensuring secure health information exchange across organizations requires a standardization of security measures that goes beyond organizational boundaries, such as global definitions of professional roles, global standards for patient consent and semantic interoperable audit logs. As to be able to fully address the privacy and security issues in interoperable EHRs and the long-life virtual EHR it is necessary to realize a paradigm shift from storing all incoming information in a local system to retrieving information from external systems whenever that information is deemed necessary for the care of the patient.

  19. LANL continuity of operations plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Senutovitch, Diane M

    2010-12-22

    The Los Alamos National Laboratory (LANL) is a premier national security research institution, delivering scientific and engineering solutions for the nation's most crucial and complex problems. Our primary responsibility is to ensure the safety, security, and reliability of the nation's nuclear stockpile. LANL emphasizes worker safety, effective operational safeguards and security, and environmental stewardship, outstanding science remains the foundation of work at the Laboratory. In addition to supporting the Laboratory's core national security mission, our work advances bioscience, chemistry, computer science, earth and environmental sciences, materials science, and physics disciplines. To accomplish LANL's mission, we must ensure that the Laboratorymore » EFs continue to be performed during a continuity event, including localized acts of nature, accidents, technological or attack-related emergencies, and pandemic or epidemic events. The LANL Continuity of Operations (COOP) Plan documents the overall LANL COOP Program and provides the operational framework to implement continuity policies, requirements, and responsibilities at LANL, as required by DOE 0 150.1, Continuity Programs, May 2008. LANL must maintain its ability to perform the nation's PMEFs, which are: (1) maintain the safety and security of nuclear materials in the DOE Complex at fixed sites and in transit; (2) respond to a nuclear incident, both domestically and internationally, caused by terrorist activity, natural disaster, or accident, including mobilizing the resources to support these efforts; and (3) support the nation's energy infrastructure. This plan supports Continuity of Operations for Los Alamos National Laboratory (LANL). This plan issues LANL policy as directed by the DOE 0 150.1, Continuity Programs, and provides direction for the orderly continuation of LANL EFs for 30 days of closure or 60 days for a pandemic/epidemic event. Initiation of COOP operations may be required to support an allhazards event, including a national security emergency, major fire, catastrophic natural disaster, man-made disaster, terrorism event, or technological disaster by rendering LANL buildings, infrastructure, or Technical Areas unsafe, temporarily unusable, or inaccessible.« less

  20. Privacy, Security, and Patient Engagement: The Changing Health Data Governance Landscape.

    PubMed

    Holmes, John H

    2016-01-01

    The rapid emergence of new technologies support collection and use of a wide variety of data from clinical, genomic, social and behavioral, environmental, and financial sources, and have a great impact on the governance of personal health information. The papers in this special issue on governance touch on the topic from a variety of focuses, including leadership perspectives, local and federal case studies, and the future importance of patient engagement. This special issue focuses on three major themes-that data governance is growing in importance and presenting new challenges that must be addressed, that health care organizations must prioritize governance design, implementation, and functions as a priority, and that governance seems to be naturally converging on an archetype as described by this set of papers. In order to deal with issues such as data de- and re-identification, data governance must be studied as its own field.

  1. 17 CFR 210.3-16 - Financial statements of affiliates whose securities collateralize an issue registered or being...

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... aggregate principal amount, par value, or book value of the securities as carried by the registrant, or the...

  2. 17 CFR 210.3-16 - Financial statements of affiliates whose securities collateralize an issue registered or being...

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... aggregate principal amount, par value, or book value of the securities as carried by the registrant, or the...

  3. Local Area Network (LAN) Compatibility Issues

    DTIC Science & Technology

    1991-09-01

    September, 1991 Thesis Advisor: Dr. Norman Schneidewind Approved for public release; distribution is unlimited 92 303s246 Unclassified SECURITY ...CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE Ia. REPORT SECURITY CLASSIFICATION 1 b. RESTRICTIVE MARKINGS unclassified 2a. SECURITY CLASSIFICATION...Work UiNt ACCeLUOn Number 11. TITLE (Include Security Classification) LOCAL AREA NETWORK (LAN) COMPATIBILITY ISSUES 12. PERSONAL AUTHOR(S) Rita V

  4. Privacy, Security, and Patient Engagement: The Changing Health Data Governance Landscape

    PubMed Central

    Holmes, John H.

    2016-01-01

    Context: The rapid emergence of new technologies support collection and use of a wide variety of data from clinical, genomic, social and behavioral, environmental, and financial sources, and have a great impact on the governance of personal health information. Papers in the special issue: The papers in this special issue on governance touch on the topic from a variety of focuses, including leadership perspectives, local and federal case studies, and the future importance of patient engagement. Themes: This special issue focuses on three major themes—that data governance is growing in importance and presenting new challenges that must be addressed, that health care organizations must prioritize governance design, implementation, and functions as a priority, and that governance seems to be naturally converging on an archetype as described by this set of papers. Future State of Governance: In order to deal with issues such as data de- and re-identification, data governance must be studied as its own field. PMID:27141525

  5. The Design and Implementation of a Low Cost and High Security Smart Home System Based on Wi-Fi and SSL Technologies

    NASA Astrophysics Data System (ADS)

    Xu, Chong-Yao; Zheng, Xin; Xiong, Xiao-Ming

    2017-02-01

    With the development of Internet of Things (IoT) and the popularity of intelligent mobile terminals, smart home system has come into people’s vision. However, due to the high cost, complex installation and inconvenience, as well as network security issues, smart home system has not been popularized. In this paper, combined with Wi-Fi technology, Android system, cloud server and SSL security protocol, a new set of smart home system is designed, with low cost, easy operation, high security and stability. The system consists of Wi-Fi smart node (WSN), Android client and cloud server. In order to reduce system cost and complexity of the installation, each Wi-Fi transceiver, appliance control logic and data conversion in the WSN is setup by a single chip. In addition, all the data of the WSN can be uploaded to the server through the home router, without having to transit through the gateway. All the appliance status information and environmental information are preserved in the cloud server. Furthermore, to ensure the security of information, the Secure Sockets Layer (SSL) protocol is used in the WSN communication with the server. What’s more, to improve the comfort and simplify the operation, Android client is designed with room pattern to control home appliances more realistic, and more convenient.

  6. Environmental Testing Campaign and Verification of Satellite Deimos-2 at INTA

    NASA Astrophysics Data System (ADS)

    Hernandez, Daniel; Vazquez, Mercedes; Anon, Manuel; Olivo, Esperanza; Gallego, Pablo; Morillo, Pablo; Parra, Javier; Capraro; Luengo, Mar; Garcia, Beatriz; Villacorta, Pablo

    2014-06-01

    In this paper the environmental test campaign and verification of the DEIMOS-2 (DM2) satellite will be presented and described. DM2 will be ready for launch in 2014.Firstly, a short description of the satellite is presented, including its physical characteristics and intended optical performances. DEIMOS-2 is a LEO satellite for earth observation that will provide high resolution imaging services for agriculture, civil protection, environmental issues, disasters monitoring, climate change, urban planning, cartography, security and intelligence.Then, the verification and test campaign carried out on the SM and FM models at INTA is described; including Mechanical test for the SM and Climatic, Mechanical and Electromagnetic Compatibility tests for the FM. In addition, this paper includes Centre of Gravity and Moment of Inertia measurements for both models, and other verification activities carried out in order to ensure satellite's health during launch and its in orbit performance.

  7. 76 FR 27642 - Department of Homeland Security; Transfer of Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-12

    ... Subjects Environmental protection, Business and industry, Government property, Security measures. Dated... Security; Transfer of Data AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: This... Cosmetic Act (FFDCA), including information that may have been claimed as Confidential Business Information...

  8. Iris Cryptography for Security Purpose

    NASA Astrophysics Data System (ADS)

    Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.

    2018-04-01

    In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.

  9. Clean and Secure Energy from Domestic Oil Shale and Oil Sands Resources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Spinti, Jennifer; Birgenheier, Lauren; Deo, Milind

    This report summarizes the significant findings from the Clean and Secure Energy from Domestic Oil Shale and Oil Sands Resources program sponsored by the Department of Energy through the National Energy Technology Laboratory. There were four principle areas of research; Environmental, legal, and policy issues related to development of oil shale and oil sands resources; Economic and environmental assessment of domestic unconventional fuels industry; Basin-scale assessment of conventional and unconventional fuel development impacts; and Liquid fuel production by in situ thermal processing of oil shale Multiple research projects were conducted in each area and the results have been communicated viamore » sponsored conferences, conference presentations, invited talks, interviews with the media, numerous topical reports, journal publications, and a book that summarizes much of the oil shale research relating to Utah’s Uinta Basin. In addition, a repository of materials related to oil shale and oil sands has been created within the University of Utah’s Institutional Repository, including the materials generated during this research program. Below is a listing of all topical and progress reports generated by this project and submitted to the Office of Science and Technical Information (OSTI). A listing of all peer-reviewed publications generated as a result of this project is included at the end of this report; Geomechanical and Fluid Transport Properties 1 (December, 2015); Validation Results for Core-Scale Oil Shale Pyrolysis (February, 2015); and Rates and Mechanisms of Oil Shale Pyrolysis: A Chemical Structure Approach (November, 2014); Policy Issues Associated With Using Simulation to Assess Environmental Impacts (November, 2014); Policy Analysis of the Canadian Oil Sands Experience (September, 2013); V-UQ of Generation 1 Simulator with AMSO Experimental Data (August, 2013); Lands with Wilderness Characteristics, Resource Management Plan Constraints, and Land Exchanges (March, 2012); Conjunctive Surface and Groundwater Management in Utah: Implications for Oil Shale and Oil Sands Development (May, 2012); Development of CFD-Based Simulation Tools for In Situ Thermal Processing of Oil Shale/Sands (February, 2012); Core-Based Integrated Sedimentologic, Stratigraphic, and Geochemical Analysis of the Oil Shale Bearing Green River Formation, Uinta Basin, Utah (April, 2011); Atomistic Modeling of Oil Shale Kerogens and Asphaltenes Along with their Interactions with the Inorganic Mineral Matrix (April, 2011); Pore Scale Analysis of Oil Shale/Sands Pyrolysis (March, 2011); Land and Resource Management Issues Relevant to Deploying In-Situ Thermal Technologies (January, 2011); Policy Analysis of Produced Water Issues Associated with In-Situ Thermal Technologies (January, 2011); and Policy Analysis of Water Availability and Use Issues for Domestic Oil Shale and Oil Sands Development (March, 2010)« less

  10. Data Mashups: Linking Human Health and Wellbeing with Weather, Climate and the Environment

    NASA Astrophysics Data System (ADS)

    Fleming, L. E.; Sarran, C.; Golding, B.; Haines, A.; Kessel, A.; Djennad, M.; Hajat, S.; Nichols, G.; Gordon Brown, H.; Depledge, M.

    2016-12-01

    A large part of the global disease burden can be linked to environmental factors, underpinned by unhealthy behaviours. Research into these linkages suffers from lack of common tools and databases for investigations across many different scientific disciplines to explore these complex associations. The MEDMI (Medical and Environmental Data-a Mash-up Infrastructure) Partnership brings together leading organisations and researchers in climate, weather, environment, and human health. We have created a proof-of-concept central data and analysis system with the UK Met Office and Public Health England data as the internet-based MEDMI Platform (www.data-mashup.org.uk) to serve as a common resource for researchers to link and analyse complex meteorological, environmental and epidemiological data in the UK. The Platform is hosted on its own dedicated server, with secure internet and in-person access with appropriate safeguards for ethical, copyright, security, preservation, and data sharing issues. Via the Platform, there is a demonstration Browser Application with access to user-selected subsets of the data for: a) analyses using time series (e.g. mortality/environmental variables), and b) data visualizations (e.g. infectious diseases/environmental variables). One demonstration project is linking climate change, harmful algal blooms and oceanographic modelling building on the hydrodynamic-biogeochemical coupled models; in situ and satellite observations as well as UK HAB data and hospital episode statistics data are being used for model verification and future forecasting. The MEDMI Project provides a demonstration of the potential, barriers and challenges, of these "data mashups" of environment and health data. Although there remain many challenges to creating and sustaining such a shared resource, these activities and resources are essential to truly explore the complex interactions between climate and other environmental change and health at the local and global scale.

  11. Environmental flows for rivers and economic compensation for irrigators.

    PubMed

    Sisto, Nicholas P

    2009-02-01

    Securing flows for environmental purposes from an already fully utilized river is an impossible task--unless users are either coerced into freeing up water, or offered incentives to do so. One sensible strategy for motivating users to liberate volumes is to offer them economic compensation. The right amount for that compensation then becomes a key environmental management issue. This paper analyses a proposal to restore and maintain ecosystems on a stretch of the Río Conchos in northern Mexico, downstream from a large irrigation district that consumes nearly all local flows. We present here estimates of environmental flow requirements for these ecosystems and compute compensation figures for irrigators. These figures are derived from crop-specific irrigation water productivities we statistically estimate from a large set of historical production and irrigation data obtained from the district. This work has general implications for river ecosystem management in water-stressed basins, particularly in terms of the design of fair and effective water sharing mechanisms.

  12. Live Fire Range Environmental Assessment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    1993-08-01

    The Central Training Academy (CTA) is a DOE Headquarters Organization located in Albuquerque, New Mexico, with the mission to effectively and efficiently educate and train personnel involved in the protection of vital national security interests of DOE. The CTA Live Fire Range (LFR), where most of the firearms and tactical training occurs, is a complex separate from the main campus. The purpose of the proposed action is to expand the LFR to allow more options of implementing required training. The Department of Energy has prepared this Environmental Assessment (EA) for the proposed construction and operation of an expanded Live Firemore » Range Facility at the Central Training Academy in Albuquerque, New Mexico. Based on the analysis in the EA, DOE has determined that the proposed action is not a major Federal action significantly affecting the quality of the human environment, within the meaning of the National Environmental Policy Act (NEPA) of 1969. Therefore, the preparation of an environmental impact statement is not required and DOE is issuing this Finding of No Significant Impact (FONSI).« less

  13. Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications

    NASA Astrophysics Data System (ADS)

    Meyerstein, Mike; Cha, Inhyok; Shah, Yogendra

    The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.

  14. Ethical management of food systems: plant based diet as a holistic approach.

    PubMed

    Chiu, Tina H T; Lin, Chin-Lon

    2009-01-01

    While improvement in agricultural technology had enabled the production of abundant food, it has thus far failed to eliminate hunger. Malnutrition is expected to reach an all time high. Evidences have suggested that animal based diet has put immense pressure on the already fragile food system, contributing to problems in terms of global food security, health security, and environmental sustainability. Plant based dietary approaches may therefore, target some of these problems from the roots, and may be a solution to improving ethical issues and equity in the current food system. This paper examines how meat production and consumption contributed to the current crises in the food system through the lens of ethics--the moral compass--to find directions on how the present generation should eat, and how the food system could be maintained for a better future.

  15. 75 FR 881 - Meeting of Advisory Committee on International Communications and Information Policy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-06

    ... development issues, international spectrum requirements and harmonization, cyber-security, and data protection... will discuss key issues of importance to U.S. communications policy interests including future... Bureau of Diplomatic Security to enhance the Department's security by tracking visitor traffic and to...

  16. Seeking and securing work: Individual-level predictors of employment of psychiatric survivors.

    PubMed

    Hall, Peter V; Montgomery, Phyllis; Davie, Samantha; Dickins, Kevin; Forchuk, Cheryl; Jeng, Momodou S; Kersey, Melissa; Meier, Amanda; Lahey, Pam; Rudnick, Abraham; Solomon, Michelle; Warner, Laura

    2015-01-01

    For people with mental illness (psychiatric survivors), seeking and securing employment involves personal, social, and environmental factors. In Canada, psychiatric survivors are under-represented in the workforce, and services can help by tailoring their supports to help make the most gains in employment. Determine whether individual socio-demographic and health factors predict seeking and securing employment among psychiatric survivors. A community sample of psychiatric survivors from a Southwestern Ontario region participated in this study. Stepwise logistic regression was used to analyze data from 363 participants who had completed a variety of questionnaires to ascertain individual characteristics and employment outcomes. Health service utilization, living circumstances, homelessness, substance use issues, general health, social integration, ethnicity, having children under 18, and being a student emerged as significant predictors of seeking and securing work. Other commonly accepted human capital indicators, such as education and age, were not predictive of employment search behavior and outcomes. Individual characteristics that predict employment search and success outcomes for psychiatric survivors include aspects related to treatment and living circumstances, which stands in contrast to predictors of employment for the general population, suggesting that employment support services may need to be tailored to psychiatric survivors specifically.

  17. Food and nutrition security in the Hindu Kush Himalayan region.

    PubMed

    Rasul, Golam; Hussain, Abid; Mahapatra, Bidhubhusan; Dangol, Narendra

    2018-01-01

    The status of food and nutrition security and its underlying factors in the Hindu-Kush Himalayan (HKH) region is investigated. In this region, one third to a half of children (<5 years of age) suffer from stunting, with the incidence of wasting and under-weight also being very high. The prevalence of stunting, wasting and under-weight in children is particularly high in some mountain areas such as Meghalaya state in India, the western mountains and far-western hills of Nepal, Balochistan province in Pakistan, eastern Afghanistan, and Chin state in Myanmar. Food habits in the HKH region are changing. This has led to a deterioration in traditional mountain food systems with a decline in agrobiodiversity. Factors such as high poverty and low dietary energy intakes, a lack of hygienic environments, inadequate nutritional knowledge, and climate change and environmental degradation are also influencing food and nutrition security in the HKH region. To achieve sustainable food and nutrition security in the mountains, this study suggests a multi-sectoral integrated approach with consideration of nutritional aspects in all development processes dealing with economic, social, agricultural and public health issues. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  18. The 2015 National Security Strategy: Authorities, Changes, Issues for Congress

    DTIC Science & Technology

    2016-02-26

    climate change ;  ensure access to shared spaces (expanding cyberspace and including outer space and air and maritime security); and  increase global...hand, one could conclude that these, along with confronting climate change , convey both a wider range of national security challenges in terms of...The 2015 National Security Strategy: Authorities, Changes , Issues for Congress Nathan J. Lucas, Coordinator Section Research Manager Kathleen

  19. Operating in the Gray Zone: An Alternative Paradigm for U.S. Military Strategy

    DTIC Science & Technology

    2016-04-01

    labeling, or re-labeling, may have been to draw the attention of busy policymakers to rapidly emerging security issues , it has evolved into something... issues affecting the national security community. The Peacekeeping and Stability Operations Institute provides subject matter expertise, technical...SSI) is part of the U.S. Army War College and is the strategic-level study agent for issues related to national security and military strategy with

  20. Health-based Provisional Advisory Levels (PALs) for homeland security.

    PubMed

    Adeshina, Femi; Sonich-Mullin, Cynthia; Ross, Robert H; Wood, Carol S

    2009-12-01

    The Homeland Security Presidential Directive #8 (HSPD-8) for National Emergency Preparedness was issued to " establish policies to strengthen the preparedness of the United States to prevent and respond to threatened or actual domestic terrorist attacks, major disasters, and other emergencies by requiring a national domestic all- hazards preparedness goal. "In response to HSPD-8 and HSPD-22 (classified) on Domestic Chemical Defense, the US Environmental Protection Agency (US EPA) National Homeland Security Research Center (NHSRC) is developing health-based Provisional Advisory Levels (PALs) for priority chemicals (including chemical warfare agents, pesticides, and toxic industrial chemicals) in air and drinking water. PALs are temporary values that will neither be promulgated, nor be formally issued as regulatory guidance. They are intended to be used at the discretion of risk managers in emergency situations. The PAL Program provides advisory exposure levels for chemical agents to assist in emergency planning and response decision-making, and to aid in making informed risk management decisions for evacuation, temporary re-entry into affected areas, and resumed-use of infrastructure, such as water resources. These risk management decisions may be made at the federal, state, and local levels. Three exposure levels (PAL 1, PAL 2, and PAL 3), distinguished by severity of toxic effects, are developed for 24-hour, 30-day, 90-day, and 2-year durations for potential exposure to drinking water and ambient air by the general public. Developed PALs are evaluated both by a US EPA working group, and an external multidisciplinary panel to ensure scientific credibility and wide acceptance. In this Special Issue publication, we present background information on the PAL program, the methodology used in deriving PALs, and the technical support documents for the derivation of PALs for acrylonitrile, hydrogen sulfide, and phosgene.

  1. A decade of plant proteomics and mass spectrometry: translation of technical advancements to food security and safety issues.

    PubMed

    Agrawal, Ganesh Kumar; Sarkar, Abhijit; Righetti, Pier Giorgio; Pedreschi, Romina; Carpentier, Sebastien; Wang, Tai; Barkla, Bronwyn J; Kohli, Ajay; Ndimba, Bongani Kaiser; Bykova, Natalia V; Rampitsch, Christof; Zolla, Lello; Rafudeen, Mohamed Suhail; Cramer, Rainer; Bindschedler, Laurence Veronique; Tsakirpaloglou, Nikolaos; Ndimba, Roya Janeen; Farrant, Jill M; Renaut, Jenny; Job, Dominique; Kikuchi, Shoshi; Rakwal, Randeep

    2013-01-01

    Tremendous progress in plant proteomics driven by mass spectrometry (MS) techniques has been made since 2000 when few proteomics reports were published and plant proteomics was in its infancy. These achievements include the refinement of existing techniques and the search for new techniques to address food security, safety, and health issues. It is projected that in 2050, the world's population will reach 9-12 billion people demanding a food production increase of 34-70% (FAO, 2009) from today's food production. Provision of food in a sustainable and environmentally committed manner for such a demand without threatening natural resources, requires that agricultural production increases significantly and that postharvest handling and food manufacturing systems become more efficient requiring lower energy expenditure, a decrease in postharvest losses, less waste generation and food with longer shelf life. There is also a need to look for alternative protein sources to animal based (i.e., plant based) to be able to fulfill the increase in protein demands by 2050. Thus, plant biology has a critical role to play as a science capable of addressing such challenges. In this review, we discuss proteomics especially MS, as a platform, being utilized in plant biology research for the past 10 years having the potential to expedite the process of understanding plant biology for human benefits. The increasing application of proteomics technologies in food security, analysis, and safety is emphasized in this review. But, we are aware that no unique approach/technology is capable to address the global food issues. Proteomics-generated information/resources must be integrated and correlated with other omics-based approaches, information, and conventional programs to ensure sufficient food and resources for human development now and in the future. © 2013 Wiley Periodicals, Inc.

  2. The Campus Executive's Role in Security and Liability Issues.

    ERIC Educational Resources Information Center

    Bromley, Max; Territo, Leonard

    1986-01-01

    Executives at institutions of higher education have become increasingly concerned about serious crimes being committed on their campuses. The liability issue, criminal activity information, physical security and design issues, student patrol escorts, crime prevention training, and task force development are discussed. (MLW)

  3. Managing Campus Security: Issues for Police Officers at Public Institutions.

    ERIC Educational Resources Information Center

    Dwyer, William O.; And Others

    1994-01-01

    To maximize the effectiveness of their campus security systems while minimizing the institution's exposure to liability, campus administrators must understand the legal context in which their police or security personnel are operating as agents of authority. Some of these policy and behavior issues are explained. (MSE)

  4. The Superpowers: Nuclear Weapons and National Security. National Issues Forums.

    ERIC Educational Resources Information Center

    Mitchell, Greg; Melville, Keith

    Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…

  5. School Security.

    ERIC Educational Resources Information Center

    Bete, Tim, Ed.

    1998-01-01

    Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…

  6. Caspian Sea International Environmental Security Game. Held at Carlisle Barracks, Pennsylvania on 16-17 November 1998

    DTIC Science & Technology

    1999-07-01

    Environmental Security . . . . . . . . . . . . . . . . . . . . 17 Robert E. Ebel Caspian Basin Oil and Gas: An Overview . . . . . . . . . . . 21 Brian R ...choke point near Baku, posing a threat to security of supply. 32 ENVIRONMENTAL BASELINE ANALYSIS OF THE CASPIAN SEA REGION BRIAN R . SHAW TERRY...up to 70% of the seasonal Caspian Sea level. Sources of water include runoff ( R ), precipitation (P), and groundwater flow (G); sink include

  7. Quality and security - They work together

    NASA Technical Reports Server (NTRS)

    Carr, Richard; Tynan, Marie; Davis, Russell

    1991-01-01

    This paper describes the importance of considering computer security as part of software quality assurance practice. The intended audience is primarily those professionals involved in the design, development, and quality assurance of software. Many issues are raised which point to the need ultimately for integration of quality assurance and computer security disciplines. To address some of the issues raised, the NASA Automated Information Security program is presented as a model which may be used for improving interactions between the quality assurance and computer security community of professionals.

  8. 12 CFR 1.130 - Type II securities; guidelines for obligations issued for university and housing purposes.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...

  9. 12 CFR 1.130 - Type II securities; guidelines for obligations issued for university and housing purposes.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...

  10. 12 CFR 1.130 - Type II securities; guidelines for obligations issued for university and housing purposes.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...

  11. 12 CFR 1.130 - Type II securities; guidelines for obligations issued for university and housing purposes.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...

  12. Homeland Security

    EPA Pesticide Factsheets

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  13. The Use of BS7799 Information Security Standard to Construct Mechanisms for the Management of Medical Organization Information Security

    NASA Astrophysics Data System (ADS)

    Liu, Shu-Fan; Chueh, Hao-En; Liao, Kuo-Hsiung

    According to surveys, 80 % of security related events threatening information in medical organizations is due to improper management. Most research on information security has focused on information and security technology, such as network security and access control; rarely addressing issues at the management issues. The main purpose of this study is to construct a BS7799 based mechanism for the management of information with regard to security as it applies to medical organizations. This study analyzes and identifies the most common events related to information security in medical organizations and categorizes these events as high-risk, transferable-risk, and controlled-risk to facilitate the management of such risk.

  14. DOD Security Cooperation: An Overview of Authorities and Issues

    DTIC Science & Technology

    2016-08-23

    Cooperation: An Overview of Authorities and Issues Congressional Research Service 13 DOD funds six Regional Centers for Security Studies , which...Expenses Necessary for Theater Security Cooperation.” Another Senate proposal would revamp DOD’s five regional centers for security studies (10 U.S.C...184) by eliminating two that are located in Washington, DC (the Africa Center for Strategic Studies and the Near East South Asia Center for Strategic

  15. 7 CFR 1951.210 - Environmental requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., assumptions, subordinations, sale or exchange of security property, and leasing of security will be reviewed for compliance with subpart G of part 1940 of this chapter. The appropriate environmental review will..., the completed environmental review will be included with other information submitted. ...

  16. Report: EPA’s Radiation and Indoor Environments National Laboratory Should Improve Its Computer Room Security Controls

    EPA Pesticide Factsheets

    Report #12-P-0847, September 21, 2012.Our review of the security posture and in-place environmental controls of EPA’s Radiation and Indoor Environments National Laboratory computer room disclosed an array of security and environmental control deficiencies.

  17. South Asia transboundary water quality monitoring workshop summary report.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Betsill, Jeffrey David; Littlefield, Adriane C.; Luetters, Frederick O.

    2003-04-01

    The Cooperative Monitoring Center (CMC) promotes collaborations among scientists and researchers in several regions as a means of achieving common regional security objectives. To promote cooperation in South Asia on environmental research, an international working group made up of participants from Bangladesh, India, Nepal, Pakistan, and the United States convened in Kathmandu, Nepal, from February 17-23,2002. The workshop was held to further develop the South Asia Transboundary Water Quality Monitoring (SATWQM) project. The project is sponsored in part by the CMC located at Sandia National Laboratories in Albuquerque, New Mexico through funding provided by the US. Department of State, Regionalmore » Environmental Affairs Office, American Embassy, Kathmandu, Nepal, and the National Nuclear Security Administration's (NNSA) Office of Nonproliferation and National Security. This report summarizes the SATWQM project, the workshop objectives, process and results. The long-term interests of the participants are to develop systems for sharing regional environmental information as a means of building confidence and improving relations among South Asian countries. The more immediate interests of the group are focused on activities that foster regional sharing of water quality data in the Ganges and Indus River basins. Issues of concern to the SATWQM network participants include studying the impacts from untreated sewage and industrial effluents, agricultural run-off, salinity increases in fresh waters, the siltation and shifting of river channels, and the environmental degradation of critical habitats such as wetlands, protected forests, and endangered aquatic species conservation areas. The workshop focused on five objectives: (1) a deepened understanding of the partner organizations involved; (2) garnering the support of additional regional and national government and non-government organizations in South Asia involved in river water quality monitoring; (3) identification of sites within the region at which water quality data are to be collected; (4) instituting a data and information collection and sharing process; and, (5) training of partners in the use of water quality monitoring equipment.« less

  18. Recent biosensing developments in environmental security.

    PubMed

    Wanekaya, Adam K; Chen, Wilfred; Mulchandani, Ashok

    2008-06-01

    Environmental security is one of the fundamental requirements of our well being. However, it still remains a major global challenge. Therefore, in addition to reducing and/or eliminating the amounts of toxic discharges into the environment, there is need to develop techniques that can detect and monitor these environmental pollutants in a sensitive and selective manner to enable effective remediation. Because of their integrated nature, biosensors are ideal for environmental monitoring and detection as they can be portable and provide selective and sensitive rapid responses in real time. In this review we discuss the main concepts behind the development of biosensors that have most relevant applications in the field of environmental monitoring and detection. We also review and document recent trends and challenges in biosensor research and development particularly in the detection of species of environmental significance such as organophosphate nerve agents, heavy metals, organic contaminants, pathogenic microorganisms and their toxins. Special focus will be given to the trends that have the most promising applications in environmental security. We conclude by highlighting the directions towards which future biosensors research in environmental security sector might proceed.

  19. Should the United Nations Framework Convention on Climate Change recognize climate migrants?

    NASA Astrophysics Data System (ADS)

    Gibb, Christine; Ford, James

    2012-12-01

    Climate change is expected to increase migration flows, especially from socially and environmentally vulnerable populations. These ‘climate migrants’ do not have any official protection under international law, which has implications for the human security of migrants. This work argues that the United Nations Framework Convention on Climate Change (UNFCCC) can and should recognize climate migrants, and is the most relevant international framework for doing so. While not legally binding, the acknowledgment of climate displacement, migration and planned relocation issues in the UNFCCC’s Cancun Adaptation Framework indicates a willingness to address the issue through an adaptation lens. Herein, the paper proposes a framework for setting the institutional groundwork for recognizing climate migrants, focusing on the most vulnerable, promoting targeted research and policy agendas, and situating policies within a comprehensive strategy.

  20. 32 CFR 989.4 - Initial considerations.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... national security interests while at the same time considering important environmental factors. (g... Under Secretary of Defense (Environmental Security). This coordination requirement does not apply to...

  1. Distributed electrochemical sensors: recent advances and barriers to market adoption.

    PubMed

    Hoekstra, Rafael; Blondeau, Pascal; Andrade, Francisco J

    2018-07-01

    Despite predictions of their widespread application in healthcare and environmental monitoring, electrochemical sensors are yet to be distributed at scale, instead remaining largely confined to R&D labs. This contrasts sharply with the situation for physical sensors, which are now ubiquitous and seamlessly embedded in the mature ecosystem provided by electronics and connectivity protocols. Although chemical sensors could be integrated into the same ecosystem, there are fundamental issues with these sensors in the three key areas of analytical performance, usability, and affordability. Nevertheless, advances are being made in each of these fields, leading to hope that the deployment of automated and user-friendly low-cost electrochemical sensors is on the horizon. Here, we present a brief survey of key challenges and advances in the development of distributed electrochemical sensors for liquid samples, geared towards applications in healthcare and wellbeing, environmental monitoring, and homeland security. As will be seen, in many cases the analytical performance of the sensor is acceptable; it is usability that is the major barrier to commercial viability at this moment. Were this to be overcome, the issue of affordability could be addressed. Graphical Abstract ᅟ.

  2. An examination on the influence of small and medium enterprise (SME) stakeholder on green supply chain management practices

    NASA Astrophysics Data System (ADS)

    Shahlan, M. Z.; Sidek, A. A.; Suffian, S. A.; Hazza, M. H. F. A.; Daud, M. R. C.

    2018-01-01

    In this paper, climate change and global warming are the biggest current issues in the industrial sectors. The green supply chain managements (GSCM) is one of the crucial input to these issues. Effective GSCM can potentially secure the organization’s competitive advantage and improve the environmental performance of the network activities. In this study, the aim is to investigate and examine how a small and medium enterprises (SMEs) stakeholder pressure and top management influence green supply chain management practices. The study is further advance green supply chain management research in Malaysia focusing on SMEs manufacturing sector using structural equation modelling. Structural equation modelling is a multivariate statistical analysis technique used to examine structural relationship. It is the combination of factor analysis and multi regression analysis and used to analyse structural relationship between measure variable and latent factor. This research found that top management support and stakeholder pressure is the major influence for SMEs to adopt green supply chain management. The research also found that top management is fully mediate with the relationship between stakeholder pressure and monitoring supplier environmental performance.

  3. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bazillian, Morgan; Pedersen, Ascha Lychett; Pless, Jacuelyn

    Shale gas resource potential in China is assessed to be large, and its development could have wide-ranging economic, environmental, and energy security implications. Although commercial scale shale gas development has not yet begun in China, it holds the potential to change the global energy landscape. Chinese decision-makers are wrestling with the challenges associated with bringing the potential to reality: geologic complexity; infrastructure and logistical difficulties; technological, institutional, social and market development issues; and environmental impacts, including greenhouse gas emissions, impacts on water availability and quality, and air pollution. This paper briefly examines the current situation and outlook for shale gasmore » in China, and explores existing and potential avenues for international cooperation. We find that despite some barriers to large-scale development, Chinese shale gas production has the potential to grow rapidly over the medium-term.« less

  4. 17 CFR 420.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... positions in the specific security issue: (1) Cash/immediate net settled positions; (2) Net when-issued... appropriate for monitoring the impact of concentrations of positions in Treasury securities. (h) “Reportable...

  5. A Semantic Based Policy Management Framework for Cloud Computing Environments

    ERIC Educational Resources Information Center

    Takabi, Hassan

    2013-01-01

    Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…

  6. 5 CFR 2640.102 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... is important to note that a mutual fund or employee benefit plan that is diversified for purposes of... 3(3) of the Employee Retirement Income Security Act of 1974, 29 U.S.C. 1002(3), and that has more... means a person who issues or proposes to issue any security, or has any outstanding security which it...

  7. Reviews on Security Issues and Challenges in Cloud Computing

    NASA Astrophysics Data System (ADS)

    An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.

    2016-11-01

    Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.

  8. Optimizing the use of breed types in developing country livestock production systems: a neglected research area.

    PubMed

    Marshall, K

    2014-10-01

    Developing country livestock production systems are diverse and dynamic, and include those where existing indigenous breeds are currently optimal and likely to remain so, those where non-indigenous breed types are already in common use, and systems that are changing, such as by intensification, where the introduction of new breed types represents significant opportunities. These include opportunities to improve the livelihood of the world's poor, increase food and nutrition security and enhance environmental sustainability. At present, very little research has focused on this issue, such that significant knowledge gaps in relation to breed-change interventions remain. The purpose of this study is to raise awareness of this issue and suggests strategic research areas to begin filling these knowledge gaps. Such strategic research would include (i) assessing the impact of differing breed types in developing country livestock productions systems, from a range of viewpoints including intrahousehold livelihood benefit, food and nutrition security at different scales, and environmental sustainability; (ii) identification of specific livestock production systems within developing countries, and the type of livestock keepers within these system, that are most likely to benefit from new breed types; and (iii) identification of new breed types as candidates for in-situ testing within these systems, such as through the use of spatial analysis to identify similar production environments combined with community acceptance studies. Results of these studies would primarily assist stakeholders in agriculture, including both policy makers and livestock keepers, to make informed decisions on the potential use of new breed types. © 2014 Blackwell Verlag GmbH.

  9. The Saskatchewan River Basin - a large scale observatory for water security research (Invited)

    NASA Astrophysics Data System (ADS)

    Wheater, H. S.

    2013-12-01

    The 336,000 km2 Saskatchewan River Basin (SaskRB) in Western Canada illustrates many of the issues of Water Security faced world-wide. It poses globally-important science challenges due to the diversity in its hydro-climate and ecological zones. With one of the world's more extreme climates, it embodies environments of global significance, including the Rocky Mountains (source of the major rivers in Western Canada), the Boreal Forest (representing 30% of Canada's land area) and the Prairies (home to 80% of Canada's agriculture). Management concerns include: provision of water resources to more than three million inhabitants, including indigenous communities; balancing competing needs for water between different uses, such as urban centres, industry, agriculture, hydropower and environmental flows; issues of water allocation between upstream and downstream users in the three prairie provinces; managing the risks of flood and droughts; and assessing water quality impacts of discharges from major cities and intensive agricultural production. Superimposed on these issues is the need to understand and manage uncertain water futures, including effects of economic growth and environmental change, in a highly fragmented water governance environment. Key science questions focus on understanding and predicting the effects of land and water management and environmental change on water quantity and quality. To address the science challenges, observational data are necessary across multiple scales. This requires focussed research at intensively monitored sites and small watersheds to improve process understanding and fine-scale models. To understand large-scale effects on river flows and quality, land-atmosphere feedbacks, and regional climate, integrated monitoring, modelling and analysis is needed at large basin scale. And to support water management, new tools are needed for operational management and scenario-based planning that can be implemented across multiple scales and multiple jurisdictions. The SaskRB has therefore been developed as a large scale observatory, now a Regional Hydroclimate Project of the World Climate Research Programme's GEWEX project, and is available to contribute to the emerging North American Water Program. State-of-the-art hydro-ecological experimental sites have been developed for the key biomes, and a river and lake biogeochemical research facility, focussed on impacts of nutrients and exotic chemicals. Data are integrated at SaskRB scale to support the development of improved large scale climate and hydrological modelling products, the development of DSS systems for local, provincial and basin-scale management, and the development of related social science research, engaging stakeholders in the research and exploring their values and priorities for water security. The observatory provides multiple scales of observation and modelling required to develop: a) new climate, hydrological and ecological science and modelling tools to address environmental change in key environments, and their integrated effects and feedbacks at large catchment scale, b) new tools needed to support river basin management under uncertainty, including anthropogenic controls on land and water management and c) the place-based focus for the development of new transdisciplinary science.

  10. Visions for a sustainable world: A conference on science, technology and social responsibility. Conference report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    This report summarizes the organization, activities, and outcomes of Student Pugwash USA`s 1992 International Conference, Visions for a Sustainable World: A Conference on Science, Technology and Social Responsibility. The conference was held June 14--20, 1992 at Emory University, and brought together 94 students and over 65 experts from industry, academe, and government. The conference addressed issues ranging from global environmental cooperation to the social impacts of the Human Genome Project to minority concerns in the sciences. It provided a valuable forum for talented students and professionals to engage in critical dialogue on many interdisciplinary issues at the juncture of science,more » technology and society. The conference challenged students -- the world`s future scientists, engineers, and political leaders -- to think broadly about global problems and to devise policy options that are viable and innovative. The success of the conference in stimulating interest, understanding, and enthusiasm about interdisciplinary global issues is clearly evident from both the participants` feedback and their continued involvement in Student Pugwash USA programs. Six working groups met each morning. The working group themes included: environmental challenges for developing countries; energy options: their social and environmental impact; health care in developing countries; changing dynamics of peace and global security; educating for the socially responsible use of technology; ethics and the use of genetic information. The conference was specifically designed to include mechanisms for ensuring its long-term impact. Participants were encouraged to focus on their individual role in helping resolve global issues. This was achieved through each participant`s development of a Personal Plan of Action, a plan which mapped out activities the student could undertake after the conference to continue the dialogue and work towards the resolution of global and local problems.« less

  11. 17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...

  12. 17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...

  13. 17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...

  14. 17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...

  15. 17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...

  16. Nevada National Security Site Environmental Report 2011

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cathy Wills, ed

    2012-09-12

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO). This and previous years reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmental Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NSO website at http://www.nv.energy.gov/library/publications/aser.aspx. This NNSSER was prepared to satisfy DOE Order DOE O 231.1B, 'Environment,more » Safety and Health Reporting.' Its purpose is to (1) report compliance status with environmental standards and requirements, (2) present results of environmental monitoring of radiological and nonradiological effluents, (3) report estimated radiological doses to the public from releases of radioactive material, (4) summarize environmental incidents of noncompliance and actions taken in response to them, (5) describe the NNSA/NSO Environmental Management System and characterize its performance, and (6) highlight significant environmental programs and efforts. This NNSSER summarizes data and compliance status for calendar year 2011 at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) and its two support facilities, the North Las Vegas Facility (NLVF) and the Remote Sensing Laboratory-Nellis (RSL-Nellis). It also addresses environmental restoration (ER) projects conducted at the Tonopah Test Range (TTR). Through a Memorandum of Agreement, NNSA/NSO is responsible for the oversight of TTR ER projects, and the Sandia Site Office of NNSA (NNSA/SSO) has oversight of all other TTR activities. NNSA/SSO produces the TTR annual environmental report available at http://www.sandia.gov/news/publications/environmental/index.html.« less

  17. A Hypertext-Based Computer Architecture for Management of the Joint Command, Control and Communications Curriculum

    DTIC Science & Technology

    1992-06-01

    Boards) Security, Privacy, and Freedom of Speech Issues 4.1.2 Understand the relationships between information processing and collection and...to-many (Mailing and discussion Lists) ... Many-to-Many (Bulletin Boards) Security, Privacy, and Freedom of Speech Issues 69 4.1.3 Understand the...Communication one-to-one (e-mail) °o° one-to-many (Mailing and discussion Lists) ... Many-to-Many (Bulletin Boards) oo Security, Privacy, and Freedom of Speech Issues

  18. Emerging Environmental Justice Issues in Nuclear Power and Radioactive Contamination.

    PubMed

    Kyne, Dean; Bolin, Bob

    2016-07-12

    Nuclear hazards, linked to both U.S. weapons programs and civilian nuclear power, pose substantial environment justice issues. Nuclear power plant (NPP) reactors produce low-level ionizing radiation, high level nuclear waste, and are subject to catastrophic contamination events. Justice concerns include plant locations and the large potentially exposed populations, as well as issues in siting, nuclear safety, and barriers to public participation. Other justice issues relate to extensive contamination in the U.S. nuclear weapons complex, and the mining and processing industries that have supported it. To approach the topic, first we discuss distributional justice issues of NPP sites in the U.S. and related procedural injustices in siting, operation, and emergency preparedness. Then we discuss justice concerns involving the U.S. nuclear weapons complex and the ways that uranium mining, processing, and weapons development have affected those living downwind, including a substantial American Indian population. Next we examine the problem of high-level nuclear waste and the risk implications of the lack of secure long-term storage. The handling and deposition of toxic nuclear wastes pose new transgenerational justice issues of unprecedented duration, in comparison to any other industry. Finally, we discuss the persistent risks of nuclear technologies and renewable energy alternatives.

  19. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  20. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  1. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  2. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  3. 17 CFR 210.3-16 - Financial statements of affiliates whose securities collateralize an issue registered or being...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... constitute a substantial portion of collateral if the aggregate principal amount, par value, or book value of...

  4. 17 CFR 250.47 - Exemption of public utility subsidiaries as to certain securities issued to the Rural...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Electrification Administration. (a) Exemption. Any public utility company which is a subsidiary company of a... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of public utility subsidiaries as to certain securities issued to the Rural Electrification Administration. 250.47 Section 250.47...

  5. Information Security Trends and Issues in the Moodle E-Learning Platform: An Ethnographic Content Analysis

    ERIC Educational Resources Information Center

    Schultz, Christopher

    2012-01-01

    Empirical research on information security trends and practices in e-learning is scarce. Many articles that have been published apply basic information security concepts to e-learning and list potential threats or propose frameworks for classifying threats. The purpose of this research is to identify, categorize and understand trends and issues in…

  6. Issues of Human Security and Educational Development in the Niger Delta Region of Nigeria

    ERIC Educational Resources Information Center

    Ololube, Nwachukwu Prince; Kpolovie, Peter James; Amaele, Samuel

    2013-01-01

    Drawing from documents, observation, interview and questionnaire, we highlighted the role of issues of human security and its impact on the educational development of the Niger Delta region as well as means of enhancing human security in Nigeria. This article is a conceptual and methodological breakthrough in Nigeria's academic landscape where…

  7. 31 CFR 306.25 - Presentation and surrender.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...

  8. 31 CFR 306.25 - Presentation and surrender.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...

  9. 31 CFR 306.25 - Presentation and surrender.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...

  10. 31 CFR 306.25 - Presentation and surrender.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...

  11. 31 CFR 306.25 - Presentation and surrender.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...

  12. 17 CFR 230.416 - Securities to be issued as a result of stock splits, stock dividends and anti-dilution provisions...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... to certain employee benefit plans. 230.416 Section 230.416 Commodity and Securities Exchanges... provisions and interests to be issued pursuant to certain employee benefit plans. (a) If a registration... pursuant to an employee benefit plan, including interests in such plan that constitute separate securities...

  13. 20 CFR 404.1287 - Exceptions to the time limitations on assessments-for wages paid prior to 1987.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... determination; or (iv) The Social Security Administration has not issued to the State a final audit statement on... assessments-for wages paid prior to 1987. 404.1287 Section 404.1287 Employees' Benefits SOCIAL SECURITY... complete; or (iii) The Social Security Administration is developing a coverage or wage issue which was...

  14. 20 CFR 404.1287 - Exceptions to the time limitations on assessments-for wages paid prior to 1987.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... determination; or (iv) The Social Security Administration has not issued to the State a final audit statement on... assessments-for wages paid prior to 1987. 404.1287 Section 404.1287 Employees' Benefits SOCIAL SECURITY... complete; or (iii) The Social Security Administration is developing a coverage or wage issue which was...

  15. Metering Best Practices, A Guide to Achieving Utility Resource Efficiency, Release 2.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sullivan, Greg; Hunt, W. D.; Pugh, Ray

    2011-08-31

    This release is an update and expansion of the information provided in Release 1.0 of the Metering Best Practice Guide that was issued in October 2007. This release, as was the previous release, was developed under the direction of the U.S. Department of Energy's Federal Energy Management Program (FEMP). The mission of FEMP is to facilitate the Federal Government's implementation of sound cost-effective energy management and investment practices to enhance the nation's energy security and environmental stewardship. Each of these activities is directly related to achieving requirements set forth in the Energy Policy Acts of 1992 and 2005, the Energymore » Independence and Security Act (EISA) of 2007, and the goals that have been established in Executive Orders 13423 and 13514 - and also those practices that are inherent in sound management of Federal financial and personnel resources.« less

  16. Making Our Buildings Safer: Security Management and Equipment Issues.

    ERIC Educational Resources Information Center

    Clark, James H.

    1997-01-01

    Discusses three major components of library security: physical security of the environment; operating procedures for library staff, the public, and security personnel; and a contract security force (or campus security in academic institutions.) Topics include risk management; maintenance; appropriate technology, including security systems and…

  17. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada.

    PubMed

    Fillion, Myriam; Laird, Brian; Douglas, Vasiliki; Van Pelt, Linda; Archie, Diane; Chan, Hing Man

    2014-01-01

    Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR), Northwest Territories (NWT), Canada. A qualitative study using group discussions during a workshop. A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS) and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a) capacity building within communities; (b) promotion of the use of traditional foods to address food security; (c) research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d) and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. The results of the planning workshop provide a blueprint for future research and intervention projects.

  18. Exploring the association of urban or rural county status and environmental, nutrition- and lifestyle-related resources with the efficacy of SNAP-Ed (Supplemental Nutrition Assistance Program-Education) to improve food security.

    PubMed

    Rivera, Rebecca L; Dunne, Jennifer; Maulding, Melissa K; Wang, Qi; Savaiano, Dennis A; Nickols-Richardson, Sharon M; Eicher-Miller, Heather A

    2018-04-01

    To investigate the association of policy, systems and environmental factors with improvement in household food security among low-income Indiana households with children after a Supplemental Nutrition Assistance Program-Education (SNAP-Ed) direct nutrition education intervention. Household food security scores measured by the eighteen-item US Household Food Security Survey Module in a longitudinal randomized and controlled SNAP-Ed intervention study conducted from August 2013 to April 2015 were the response variable. Metrics to quantify environmental factors including classification of urban or rural county status; the number of SNAP-authorized stores, food pantries and recreational facilities; average fair market housing rental price; and natural amenity rank were collected from government websites and data sets covering the years 2012-2016 and used as covariates in mixed multiple linear regression modelling. Thirty-seven Indiana counties, USA, 2012-2016. SNAP-Ed eligible adults from households with children (n 328). None of the environmental factors investigated were significantly associated with changes in household food security in this exploratory study. SNAP-Ed improves food security regardless of urban or rural location or the environmental factors investigated. Expansion of SNAP-Ed in rural areas may support food access among the low-income population and reduce the prevalence of food insecurity in rural compared with urban areas. Further investigation into policy, systems and environmental factors of the Social Ecological Model are warranted to better understand their relationship with direct SNAP-Ed and their impact on diet-related behaviours and food security.

  19. 78 FR 60998 - Proposed Collection: Information Collection Surrounding the Sale and Issue of Marketable Book...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-02

    ... Collection Surrounding the Sale and Issue of Marketable Book-Entry Securities ACTION: Notice and request for... Department of the Treasury is soliciting comments concerning the Sale and Issue of Marketable Book-Entry... Marketable Book-Entry Securities. OMB Number: 1535-0112. Abstract: The information is requested to ensure...

  20. 24 CFR 320.5 - Securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...

  1. 24 CFR 320.5 - Securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...

  2. 24 CFR 320.5 - Securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...

  3. 24 CFR 320.5 - Securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...

  4. Security Vulnerability Profiles of Mission Critical Software: Empirical Analysis of Security Related Bug Reports

    NASA Technical Reports Server (NTRS)

    Goseva-Popstojanova, Katerina; Tyo, Jacob

    2017-01-01

    While some prior research work exists on characteristics of software faults (i.e., bugs) and failures, very little work has been published on analysis of software applications vulnerabilities. This paper aims to contribute towards filling that gap by presenting an empirical investigation of application vulnerabilities. The results are based on data extracted from issue tracking systems of two NASA missions. These data were organized in three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified security related software bugs and classified them in specific vulnerability classes. Then, we created the security vulnerability profiles, i.e., determined where and when the security vulnerabilities were introduced and what were the dominating vulnerabilities classes. Our main findings include: (1) In IVV issues datasets the majority of vulnerabilities were code related and were introduced in the Implementation phase. (2) For all datasets, around 90 of the vulnerabilities were located in two to four subsystems. (3) Out of 21 primary classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, they contributed from 80 to 90 of vulnerabilities in each dataset.

  5. Worldwide Emerging Environmental Issues Affecting the U.S. Military. March 2009

    DTIC Science & Technology

    2009-03-01

    Efficiency 50% by 2050……………………………………………………....9 6.7 UK Could Seize Planes to Enforce European Emissions Trading Scheme………….9 6.8 ―Roving‖ Marine Protected...display a currently valid OMB control number. 1. REPORT DATE MAR 2009 2. REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND...energy security concerns. Current large lithium producers are Argentina (about 50% of current world production), Chile, China, and Australia

  6. Addressing the Economic Security Issues Facing Same-Sex Couples.

    ERIC Educational Resources Information Center

    Dolan, Elizabeth M.; Stum, Marlene S.; Rupured, Michael

    1999-01-01

    Provides educators and researchers with an awareness of the financial security issues faced by same-sex couples and offers suggestions for incorporating the discussion of these ideas into existing curricula and research. (Author/JOW)

  7. Security Encryption Scheme for Communication of Web Based Control Systems

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  8. Choices in International Conflict: With a Focus on Security Issues in Asia.

    ERIC Educational Resources Information Center

    Francis, Gregory; Mukai, Gary; Kim, Pearl; Leininger, James

    Many world leaders and scholars feel that the U.S.-Japan Security Alliance is essential for long-term peace, prosperity, and stability in Asia. The purpose of this curriculum unit is to examine this alliance by introducing students to case studies of international conflict, with a focus on security issues in Asia. Through each of the lessons…

  9. 75 FR 50845 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-027 The...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-18

    ... Policy, Department of Homeland Security, Washington, DC 20528. For privacy issues please contact: Mary...;Prices of new books are listed in the first FEDERAL REGISTER issue of each #0;week. #0; #0; #0; #0;#0...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--027 The History of...

  10. The fascinating side of dirt: Soil and the global environment course

    NASA Astrophysics Data System (ADS)

    Grand, S.; Krzic, M.; Crowley, C.; Lascu, G.; Rosado, J.

    2012-04-01

    Soil has recently been attracting some renewed public attention due to its inextricable link to current environmental challenges such as climate change, food security and water resource protection. It is increasingly acknowledged that the world's future will require a better understanding of soil science. Yet enrolment in soil related programs at universities in North America and around the world has been declining. One of the proposed causes for this drop is the tendency for soil science education to emphasize the agricultural side of soil science, while our increasingly urban and environmentally conscious student population is more interested in environmental sciences. To address this issue, in 2011 we created an on-line, first-year soil science course designed specifically to communicate the significance of soil science to global environmental questions. We propose that this type of course is an effective way to help increase interest in higher level soil courses and reverse the downward trend in enrolments. The course content was centered on prominent environmental issues, which were used to introduce basic concepts of soil science. Course materials emphasized integration with other natural resources disciplines such as ecology, biogeochemistry and hydrology. The online format allowed for a seamless integration of multimedia components and web content into course materials, and is believed to be appealing to technologically savvy new generations of students. Online discussion boards were extensively used to maintain strong student engagement in the course. Discussion topics were based on soil-related news stories that helped demonstrate the relevance of soils to society and illustrate the complex and often controversial nature of environmental issues. Students also made significant use of an online bulletin board to post information about environmental events and share news stories related to the course. This course was offered for the first time in term 1 of the 2011/12 academic year. Preliminary student feedback was very positive. In the presentation, we will evaluate the overall course performance in generating enthusiasm for soil. We will also present the lesson learned, particularly regarding facilitating student's transition from this introductory course to more quantitative soil science courses.

  11. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...

  12. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...

  13. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...

  14. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...

  15. 24 CFR 320.25 - Securities.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...

  16. Strategic Challenges during Changing Times: A Prioritized Research Program, 1994

    DTIC Science & Technology

    1994-04-01

    and planning. 14, SUBJECT T[RMS 15 NUMBER OF PAGES strategic assessments; domestic and global issues and 5 trends; peace operations; political...1994 or which, for a variety of reasons, will riot be published. 3 SECTION I TRANSREGIONAL SECURITY CONCERNS Regional Challenges, Global Issues . When...but global issues . Global security issues derive from three forms of connectivity. The first is economic. Today, there is truly a world economy. Markets

  17. Land cover, land use changes and air pollution in Asia: a synthesis

    NASA Astrophysics Data System (ADS)

    Vadrevu, Krishna; Ohara, Toshimasa; Justice, Chris

    2017-12-01

    A better understanding of land cover/land use changes (LCLUC) and their interactions with the atmospheric environment is essential for the sustainable management of natural resources, environmental protection, air quality, agricultural planning and food security. The 15 papers published in this focus issue showcase a variety of studies relating to drivers and impacts of LCLUC and air pollution in different South/Southeast Asian (S/SEA) countries. This synthesis article, in addition to giving context to the articles in this focus issue, also reviews the broad linkages between population, LCLUC and air pollution. Additionally, we identify knowledge gaps and research priorities that are essential in addressing air pollution issues in the region. We conclude that for effective pollution mitigation in S/SEA countries, quantifying drivers, sources and impacts of pollution need a thorough data analysis through ground-based instrumentation, models and integrated research approaches. We also stress the need for the development of sustainable technologies and strengthening the scientific and resource management communities through capacity building and training activities to address air pollution issues in S/SEA countries.

  18. Nevada National Security Site Environmental Report 2013

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wills, C.

    2014-09-09

    This report was prepared to meet the information needs of the public and the requirements and guidelines of the U.S. Department of Energy (DOE) for annual site environmental reports. It was prepared by National Security Technologies, LLC (NSTec), for the U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office (NNSA/NFO) (formerly designated as the Nevada Site Office [NNSA/NSO]). The new field office designation occurred in March 2013. Published reports cited in this 2013 report, therefore, may bear the name or authorship of NNSA/NSO. This and previous years’ reports, called Annual Site Environmental Reports (ASERs), Nevada Test Site Environmentalmore » Reports (NTSERs), and, beginning in 2010, Nevada National Security Site Environmental Reports (NNSSERs), are posted on the NNSA/NFO website at http://www.nv.energy.gov/library/publications/aser.aspx.« less

  19. Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference

    MedlinePlus

    ... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...

  20. One-Day Conference on School Safety & Security and Fair Dismissals Issues (Dayton, Ohio, June 24, 1999).

    ERIC Educational Resources Information Center

    Education Law Association, Dayton, OH.

    This booklet contains five chapters relating to issues in school safety and security, and fair dismissals: (1) "Ohio Legislation and Federal and State Decisions" (Richard J. Dickinson). Items of deliberation include financial matters, school safety issues, administrator and teacher contract matters, Title IX liability, school prayer, drug testing…

  1. Research and Development initiative of Satellite Technology Application for Environmental Issues in Asia Region

    NASA Astrophysics Data System (ADS)

    Hamamoto, K.; Kaneko, Y.; Sobue, S.; Oyoshi, K.

    2016-12-01

    Climate change and human activities are directly or indirectly influence the acceleration of environmental problems and natural hazards such as forest fires, drought and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these hazards and related phenomenon. However, there are still gaps between science and application of space technology in practical usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of space technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of space technology. The main activity of SAFE is SAFE prototyping. SAFE prototyping is a demonstration for end users and decision makers to apply space technology applications for solving environmental issues in Asia-Pacific region. By utilizing space technology and getting technical support by experts, prototype executers can develop the application system, which could support decision making activities. SAFE holds a workshop once a year. In the workshop, new prototypes are approved and the progress of on-going prototypes are confirmed. Every prototype is limited for two years period and all activities are operated by volunteer manner. As of 2016, 20 prototypes are completed and 6 prototypes are on-going. Some of the completed prototypes, for example drought monitoring in Indonesia were applied to operational use by a local official organization.

  2. Physical security and cyber security issues and human error prevention for 3D printed objects: detecting the use of an incorrect printing material

    NASA Astrophysics Data System (ADS)

    Straub, Jeremy

    2017-06-01

    A wide variety of characteristics of 3D printed objects have been linked to impaired structural integrity and use-efficacy. The printing material can also have a significant impact on the quality, utility and safety characteristics of a 3D printed object. Material issues can be created by vendor issues, physical security issues and human error. This paper presents and evaluates a system that can be used to detect incorrect material use in a 3D printer, using visible light imaging. Specifically, it assesses the ability to ascertain the difference between materials of different color and different types of material with similar coloration.

  3. 75 FR 5156 - Ariel Corp., Classica Group, Inc., Commodore Environmental Services, Inc., Dupont Direct...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-01

    ... Environmental Services, Inc., Dupont Direct Financial Holdings, Inc., New Paradigm Software Corp. (n/k/a Brunton... concerning the securities of Commodore Environmental Services, Inc. because it has not filed any periodic... accurate information concerning the securities of New Paradigm Software Corp. (n/k/a Brunton Vineyards...

  4. Medical image security in a HIPAA mandated PACS environment.

    PubMed

    Cao, F; Huang, H K; Zhou, X Q

    2003-01-01

    Medical image security is an important issue when digital images and their pertinent patient information are transmitted across public networks. Mandates for ensuring health data security have been issued by the federal government such as Health Insurance Portability and Accountability Act (HIPAA), where healthcare institutions are obliged to take appropriate measures to ensure that patient information is only provided to people who have a professional need. Guidelines, such as digital imaging and communication in medicine (DICOM) standards that deal with security issues, continue to be published by organizing bodies in healthcare. However, there are many differences in implementation especially for an integrated system like picture archiving and communication system (PACS), and the infrastructure to deploy these security standards is often lacking. Over the past 6 years, members in the Image Processing and Informatics Laboratory, Childrens Hospital, Los Angeles/University of Southern California, have actively researched image security issues related to PACS and teleradiology. The paper summarizes our previous work and presents an approach to further research on the digital envelope (DE) concept that provides image integrity and security assurance in addition to conventional network security protection. The DE, including the digital signature (DS) of the image as well as encrypted patient information from the DICOM image header, can be embedded in the background area of the image as an invisible permanent watermark. The paper outlines the systematic development, evaluation and deployment of the DE method in a PACS environment. We have also proposed a dedicated PACS security server that will act as an image authority to check and certify the image origin and integrity upon request by a user, and meanwhile act also as a secure DICOM gateway to the outside connections and a PACS operation monitor for HIPAA supporting information. Copyright 2002 Elsevier Science Ltd.

  5. Overview of Climate Confluence Security Issues

    NASA Astrophysics Data System (ADS)

    Reisman, J. P.

    2011-12-01

    Presentation will focus on an overview of the security perspectives based on the confluence considerations including energy, economics and climate change. This will include perspectives from reports generated by the Quadrennial Defense Review, Joint Forces Command, the Center for Strategic International Studies, MIT, the Inter-agency Climate Change Adaptation Task Force, the Central Intelligence Agency, the Center for Naval Analysis, and other relevant reports. The presentation will highlight the connections between resource issues and climate change which can be interpreted into security concerns. General discussion of global issues, contextual review of AR4 WGII may be included and any other report updates as applicable. The purpose of this presentation is to give a rounded view of the general qualitative and quantitative perspectives regarding climate related security considerations.

  6. Contemporary United States Foreign Policy Towards Indonesia

    DTIC Science & Technology

    2004-01-01

    regard to resolving a number of longstanding territorial disputes, and it has become a cornerstone for the promotion of economic and social development...and stability and security in the region. However, Indonesia is also faced with a variety of social , economic, and internal security issues, most...faced with significant social , economic, and security issues. Thesis Question The thesis question is: Does contemporary US policy promote US national

  7. On the Brink: Instability and the Prospect of State Failure in Pakistan

    DTIC Science & Technology

    2010-04-12

    unpredictable posture. Most importantly, these historical events, coupled with current political , economic, and security related issues, have created a...current political , economic, and security related issues, have created a fragile state with the propensity to fail. Therefore, this monograph highlights...hardships that have affected the state’s political stability, economic performance, and security. These unrelenting problems lie at the foundation

  8. Is the biggest security threat to medical information simply a lack of understanding?

    PubMed

    Williams, Patricia A H

    2011-01-01

    Connecting Australian health services and the e-health initiative is a major focus in the current health environment. Many issues are presented as key to its success including solving issues with confidentiality and privacy. However, the main problem may not be these issues in sharing information but the fact that the point of origin of such records is still relatively insecure. This paper highlights why this may be the case. Research into the security of medical information has shown that many primary healthcare providers are unable to create an environment with effective information security. Numerous factors contribute to this complex situation including a trustful environment, the resultant security culture and the capability of individual healthcare organisations. Further, the growing importance of new directions in the use of patient information is considered. This paper discusses these issues and positions them within the complex environment that is healthcare. In our current health system infrastructure, the points of origin of patient information are our most vulnerable. This entwined with progressively new uses of this information expose additional security concerns, such as re-identification of information, that require attention.

  9. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Contingency Measures § 1542.303 Security Directives and Information Circulars. (a) TSA may issue an... Security Directive by submitting data, views, or arguments in writing to TSA. TSA may amend the Security...

  10. Whither the RMA: Two Perspectives on Tomorrow’s Army

    DTIC Science & Technology

    1994-07-22

    HENRI (ROY) ALCALA heads a consulting firm, Alcala Enterprises, which specializes in national security and foreign policy issues . He retired from the...thinking about national security was too constrained by immediate issues . Downsizing of force structure, budget reductions, Bosnia, and other issues were all...these immediate issues as signposts of the future, even though little evidence existed to support such aI :use. From many years of experience in long

  11. Legal issues of the electronic dental record: security and confidentiality.

    PubMed

    Szekely, D G; Milam, S; Khademi, J A

    1996-01-01

    Computer-based, electronic dental record keeping involves complex issues of patient privacy and the dental practitioner's ethical duty of confidentiality. Federal and state law is responding to the new legal issues presented by computer technology. Authenticating the electronic record in terms of ensuring its reliability and accuracy is essential in order to protect its admissibility as evidence in legal actions. Security systems must be carefully planned to limit access and provide for back-up and storage of dental records. Carefully planned security systems protect the patient from disclosure without the patient's consent and also protect the practitioner from the liability that would arise from such disclosure. Human errors account for the majority of data security problems. Personnel security is assured through pre-employment screening, employment contracts, policies, and staff education. Contracts for health information systems should include provisions for indemnification and ensure the confidentiality of the system by the vendor.

  12. Environmental Threats to Security, Stability, and U.S. Interests in Southern Africa: Opportunity Knocks - Time for a Comprehensive Region Defense Environmental International Cooperation and Environmental Security Assistance Strategy

    DTIC Science & Technology

    2009-01-01

    Cattle raiding and the effects of poaching would likely intensify as well. Fisheries may be adversely impacted due to climatic effects on coral...organized crime to set roots in southern Africa during the early 1990s. Chinese gangs have since diversified into trafficking of poached rhino horn...charged with poaching rhino horn for shipment to China.90 Intelligence sources developed by Botswana security personnel for anti- poaching purposes

  13. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ratel, K.; Lee, R; Remien, J

    Brookhaven National Laboratory (BNL) prepares an annual Site Environmental Report (SER) in accordance with DOE Order 231.1A, Environment, Safety and Health Reporting of the U.S. Department of Energy. The report is written to inform the public, regulators, employees, and other stakeholders of the Laboratory's environmental performance during the calendar year in review. Volume I of the SER summarizes environmental data; environmental management performance; compliance with applicable DOE, federal, state, and local regulations; and performance in restoration and surveillance monitoring programs. BNL has prepared annual SERs since 1971 and has documented nearly all of its environmental history since the Laboratory's inceptionmore » in 1947. Volume II of the SER, the Groundwater Status Report, also is prepared annually to report on the status of and evaluate the performance of groundwater treatment systems at the Laboratory. Volume II includes detailed technical summaries of groundwater data and its interpretation, and is intended for internal BNL users, regulators, and other technically oriented stakeholders. A brief summary of the information contained in Volume II is included in Chapter 7, Groundwater Protection, of this volume. Both reports are available in print and as downloadable files on the BNL web page at http://www.bnl.gov/ewms/ser/. An electronic version on compact disc is distributed with each printed report. In addition, a summary of Volume I is prepared each year to provide a general overview of the report, and is distributed with a compact disc containing the full report. BNL is operated and managed for DOE's Office of Science by Brookhaven Science Associates (BSA), a partnership formed by Stony Brook University and Battelle Memorial Institute. For more than 60 years, the Laboratory has played a lead role in the DOE Science and Technology mission and continues to contribute to the DOE missions in energy resources, environmental quality, and national security. BNL manages its world-class scientific research with particular sensitivity to environmental issues and community concerns. The Laboratory's motto, 'Exploring Life's Mysteries...Protecting its Future,' and its Environmental, Safety, Security and Health Policy reflect the commitment of BNL's management to fully integrate environmental stewardship into all facets of its mission and operations.« less

  14. Environmental Security in the Danube River Basin: Policy Implications for the United States

    DTIC Science & Technology

    1999-01-01

    United Nations Environmental Programme and Centre for Human Settlements jointly formed a Balkans Task Force that has been conducting independent and...1199 V ACKNOWLEDGMENTS I would like to thank the United States Air Force Institute for National Security Studies (TNSS) and the Army Environmental...regularly scheduled course on Responsibilities of Military Forces in Environmental Protection. Mr. Robert Jarrett of AEPI provided valuable review

  15. Proposals for the mitigation of the environmental impact of clinical laboratories.

    PubMed

    Lopez, Joseph B; Badrick, Tony

    2012-03-24

    Laboratories should be aware of the carbon footprint resulting from their activities and take steps to mitigate it as part of their societal responsibilities. Once committed to a mitigation programme, they should announce an environmental policy, secure the support of senior management, initiate documentation, institute a staff training programme, schedule environmental audits and appoint an environmental manager. Laboratories may aspire to be accredited to one of the standards for environmental management, such as the ISO 14000. As environmental and quality issues are linked, the improvement in the environmental management of an organisation will ultimately lead to improved quality system performance. Indeed, environmental management could conceivably come under overall quality management. Although there will be initial costs, good environmental practices can bring savings. Environmental improvement should be based on the 3R concept to reduce, reuse and recycle. Several policy initiatives may be introduced. These include a green purchasing policy for equipment, laboratory furniture and reagents as well as the management of packaging wastes. There are several ways to reduce energy, water usage and wastage. A reduction of test numbers and collection tubes should be attempted. Paper management involves all aspects of 3R. The recycling of solvents and general wastes should be practised where feasible. The construction new laboratories or renovations to existing ones are opportunities to make them more environmentally-friendly. The advocacy of policies to associates and the inclusion of environmentally-friendly conditions on contractors are integral parts of the programme.

  16. Learning to See the Opportunities in Crisis and Catastrophe: A Decision Makers Guide to the Issue-Attention Cycle

    DTIC Science & Technology

    2015-09-01

    riots, Ferguson riots, AIDS, National Security Agency (NSA) leaks, childhood obesity , and social security. Thirteen issues make up this cluster...civil issues with low numbers of fatalities and economic impacts. Issues of this kind include childhood obesity (2.25 hearings per year); riots due...up the 25th to 50th percentile include those having only tangential impact to the public, including among others, global warming, childhood obesity

  17. Material efficiency: providing material services with less material production

    PubMed Central

    Allwood, Julian M.; Ashby, Michael F.; Gutowski, Timothy G.; Worrell, Ernst

    2013-01-01

    Material efficiency, as discussed in this Meeting Issue, entails the pursuit of the technical strategies, business models, consumer preferences and policy instruments that would lead to a substantial reduction in the production of high-volume energy-intensive materials required to deliver human well-being. This paper, which introduces a Discussion Meeting Issue on the topic of material efficiency, aims to give an overview of current thinking on the topic, spanning environmental, engineering, economics, sociology and policy issues. The motivations for material efficiency include reducing energy demand, reducing the emissions and other environmental impacts of industry, and increasing national resource security. There are many technical strategies that might bring it about, and these could mainly be implemented today if preferred by customers or producers. However, current economic structures favour the substitution of material for labour, and consumer preferences for material consumption appear to continue even beyond the point at which increased consumption provides any increase in well-being. Therefore, policy will be required to stimulate material efficiency. A theoretically ideal policy measure, such as a carbon price, would internalize the externality of emissions associated with material production, and thus motivate change directly. However, implementation of such a measure has proved elusive, and instead the adjustment of existing government purchasing policies or existing regulations— for instance to do with building design, planning or vehicle standards—is likely to have a more immediate effect. PMID:23359746

  18. Material efficiency: providing material services with less material production.

    PubMed

    Allwood, Julian M; Ashby, Michael F; Gutowski, Timothy G; Worrell, Ernst

    2013-03-13

    Material efficiency, as discussed in this Meeting Issue, entails the pursuit of the technical strategies, business models, consumer preferences and policy instruments that would lead to a substantial reduction in the production of high-volume energy-intensive materials required to deliver human well-being. This paper, which introduces a Discussion Meeting Issue on the topic of material efficiency, aims to give an overview of current thinking on the topic, spanning environmental, engineering, economics, sociology and policy issues. The motivations for material efficiency include reducing energy demand, reducing the emissions and other environmental impacts of industry, and increasing national resource security. There are many technical strategies that might bring it about, and these could mainly be implemented today if preferred by customers or producers. However, current economic structures favour the substitution of material for labour, and consumer preferences for material consumption appear to continue even beyond the point at which increased consumption provides any increase in well-being. Therefore, policy will be required to stimulate material efficiency. A theoretically ideal policy measure, such as a carbon price, would internalize the externality of emissions associated with material production, and thus motivate change directly. However, implementation of such a measure has proved elusive, and instead the adjustment of existing government purchasing policies or existing regulations-- for instance to do with building design, planning or vehicle standards--is likely to have a more immediate effect.

  19. 50 CFR 600.240 - Security assurances.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false Security assurances. 600.240 Section 600... ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Council Membership § 600.240 Security assurances. (a) DOC Office of Security will issue security assurances to Council members following completion...

  20. 50 CFR 600.240 - Security assurances.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false Security assurances. 600.240 Section 600... ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Council Membership § 600.240 Security assurances. (a) DOC Office of Security will issue security assurances to Council members following completion...

  1. 5 CFR 1312.31 - Security violations.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified Information § 1312.31 Security violations. (a) A security violation notice is issued by the United...

  2. 50 CFR 600.240 - Security assurances.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false Security assurances. 600.240 Section 600... ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Council Membership § 600.240 Security assurances. (a) DOC Office of Security will issue security assurances to Council members following completion...

  3. The effects of environmental resource and security on aggressive behavior.

    PubMed

    Ng, Henry Kin Shing; Chow, Tak Sang

    2017-05-01

    Exposure to different environments has been reported to change aggressive behavior, but previous research did not consider the underlying elements that caused such an effect. Based on previous work on environmental perception, we examined the role of environmental resource and security in altering aggression level. In three experiments, participants were exposed to environments that varied in resource (High vs. Low) and security (High vs. Low) levels, after which aggression was measured. The environments were presented through visual priming (Experiments 1-2) and a first-person gameplay (Experiment 3). We observed a consistent resource-security interaction effect on aggression, operationalized as the level of noise blast (Experiment 1) and number of unpleasant pictures (Experiments 2-3) delivered to strangers by the participants. High resource levels associated with higher aggression in insecure conditions, but lower aggression in secure conditions. The findings suggest that the adaptive value of aggression varies under different environmental constraints. Implications are discussed in terms of the effects of adverse environments on aggression, and the nature's effects on social behavior. Aggr. Behav. 43:304-314, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  4. Emerging Environmental Justice Issues in Nuclear Power and Radioactive Contamination

    PubMed Central

    Kyne, Dean; Bolin, Bob

    2016-01-01

    Nuclear hazards, linked to both U.S. weapons programs and civilian nuclear power, pose substantial environment justice issues. Nuclear power plant (NPP) reactors produce low-level ionizing radiation, high level nuclear waste, and are subject to catastrophic contamination events. Justice concerns include plant locations and the large potentially exposed populations, as well as issues in siting, nuclear safety, and barriers to public participation. Other justice issues relate to extensive contamination in the U.S. nuclear weapons complex, and the mining and processing industries that have supported it. To approach the topic, first we discuss distributional justice issues of NPP sites in the U.S. and related procedural injustices in siting, operation, and emergency preparedness. Then we discuss justice concerns involving the U.S. nuclear weapons complex and the ways that uranium mining, processing, and weapons development have affected those living downwind, including a substantial American Indian population. Next we examine the problem of high-level nuclear waste and the risk implications of the lack of secure long-term storage. The handling and deposition of toxic nuclear wastes pose new transgenerational justice issues of unprecedented duration, in comparison to any other industry. Finally, we discuss the persistent risks of nuclear technologies and renewable energy alternatives. PMID:27420080

  5. Framing Climate Change to Account for Values

    NASA Astrophysics Data System (ADS)

    Hassol, S. J.

    2011-12-01

    Belief, trust and values are important but generally overlooked in efforts to communicate climate change. Because climate change has often been framed too narrowly as an environmental issue, it has failed to engage segments of the public for whom environmentalism is not an important value. Worse, for some of these people, environmentalism and the policies that accompany it may be seen as a threat to their core values, such as the importance of personal freedoms and the free market. Climate science educators can improve this situation by more appropriately framing climate change as an issue affecting the economy and our most basic human needs: food, water, shelter, security, health, jobs, and the safety of our families. Further, because people trust and listen to those with whom they share cultural values, climate change educators can stress the kinds of values their audiences share. They can also enlist the support of opinion leaders known for holding these values. In addition, incorporating messages about solutions to climate change and their many benefits to economic prosperity, human health, and other values is an important component of meeting this challenge. We must also recognize that local impacts are of greater concern to most people than changes that feel distant in place and time. Different audiences have different concerns, and effective educators will learn what their audiences care about and tailor their messages accordingly.

  6. 40 CFR 11.5 - Procedures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Procedures. 11.5 Section 11.5 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS...” shall be directed to: Director, Security and Inspection Division, Environmental Protection Agency...

  7. Sandia National Laboratories: National Security Missions: International

    Science.gov Websites

    Programs Environmental Responsibility Environmental Management System Pollution Prevention History 60 ; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & ; Development Technology Deployment Centers Working With Sandia Working With Sandia Prospective Suppliers What

  8. A Survey on Cyber Security awareness among college students in Tamil Nadu

    NASA Astrophysics Data System (ADS)

    Senthilkumar, K.; Easwaramoorthy, Sathishkumar

    2017-11-01

    The aim of the study is to analyse the awareness of cyber security on college students in Tamil Nadu by focusing various security threats in the internet. In recent years cybercrime is an enormous challenge in all areas including national security, public safety and personal privacy. To prevent from a victim of cybercrime everyone must know about their own security and safety measures to protect by themselves. A well-structured questionnaire survey method will be applied to analyse the college student’s awareness in the area of cyber security. This survey will be going to conducted in major cities of Tamil Nadu by focusing various security threats like email, virus, phishing, fake advertisement, popup windows and other attacks in the internet. This survey examines the college students’ awareness and the level of awareness about the security issues and some suggestions are set forth to overcome these issues.

  9. 14 CFR 415.23 - Policy review.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... license application to determine whether it presents any issues affecting U.S. national security or... presents any issues affecting U.S. national security. (2) The FAA consults with the Department of State to...

  10. 14 CFR 431.55 - Payload reentry review.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ....55 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT... any issues that would adversely affect U.S. national security or foreign policy interests, would... reentry of a proposed payload presents any issues adversely affecting U.S. national security. (c) The FAA...

  11. 14 CFR 431.55 - Payload reentry review.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ....55 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT... any issues that would adversely affect U.S. national security or foreign policy interests, would... reentry of a proposed payload presents any issues adversely affecting U.S. national security. (c) The FAA...

  12. 14 CFR 431.55 - Payload reentry review.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....55 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT... any issues that would adversely affect U.S. national security or foreign policy interests, would... reentry of a proposed payload presents any issues adversely affecting U.S. national security. (c) The FAA...

  13. 14 CFR 431.55 - Payload reentry review.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ....55 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT... any issues that would adversely affect U.S. national security or foreign policy interests, would... reentry of a proposed payload presents any issues adversely affecting U.S. national security. (c) The FAA...

  14. 14 CFR 415.23 - Policy review.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... license application to determine whether it presents any issues affecting U.S. national security or... presents any issues affecting U.S. national security. (2) The FAA consults with the Department of State to...

  15. 14 CFR 415.23 - Policy review.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... license application to determine whether it presents any issues affecting U.S. national security or... presents any issues affecting U.S. national security. (2) The FAA consults with the Department of State to...

  16. Personal health record systems and their security protection.

    PubMed

    Win, Khin Than; Susilo, Willy; Mu, Yi

    2006-08-01

    The objective of this study is to analyze the security protection of personal health record systems. To achieve this we have investigated different personal health record systems, their security functions, and security issues. We have noted that current security mechanisms are not adequate and we have proposed some security mechanisms to tackle these problems.

  17. Enhancing security and improving interoperability in healthcare information systems.

    PubMed

    Gritzalis, D A

    1998-01-01

    Security is a key issue in healthcare information systems, since most aspects of security become of considerable or even critical importance when handling healthcare information. In addition, the intense need for information exchange has revealed interoperability of systems and applications as another key issue. Standardization can play an important role towards both these issues. In this paper, relevant standardization activities are briefly presented, and existing and emerging healthcare information security standards are identified and critically analysed. The analysis is based on a framework which has been developed for this reason. Therefore, the identification of gaps and inconsistencies in current standardization, the description of the conflicts of standards with legislation, and the analysis of implications of these standards to user organizations, are the main results of this paper.

  18. The role of food-security solutions in the protection of natural resources and environment of developing countries.

    PubMed

    Lashgarara, Farhad; Mirdamadi, Seyyed Mehdi; Hosseini, Seyyed Jamal Farajollah; Chizari, Mohammad

    2008-10-01

    The majority of the countries of the world, especially developing countries, face environmental problems. Limitations of basic resources (water and soil) and population growth have been the cause of these environmental problems that countries are confronted with. Developing countries have numerous problems, including destruction of forests, vegetable and animal species, and pollution of the environment. Damage to natural resources and the environment can influence the food-security situation. One of the main millennium development goals (MDGs) is protection of the environment and people's health. This cannot obtained unless there is ensured food security. Food security has been defined as a situation when all people, at all times, have physical and economic access to sufficient, safe, and nutritious food needed to maintain a healthy and active life. At the same time, with ensured food security, we can hope to protect the natural resources and environment. The methodology used is descriptive-analytical, and its main purpose is determining the importance and role of food-security solutions in the reduction of environmental hazards and improvement of natural resources and the environmental situation in developing countries. Therefore, some of the most important food-security solutions that can play an important role in this relation were discussed, including conventional research-based technology, biotechnology, information and communication technologies (ICTs), alternative energy sources, and food irradiation.

  19. Development of a strategic plan for food security and safety in the Inuvialuit Settlement Region, Canada

    PubMed Central

    Fillion, Myriam; Laird, Brian; Douglas, Vasiliki; Van Pelt, Linda; Archie, Diane; Chan, Hing Man

    2014-01-01

    Background Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. Objectives To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR), Northwest Territories (NWT), Canada. Design A qualitative study using group discussions during a workshop. Methods A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS) and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. Results The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a) capacity building within communities; (b) promotion of the use of traditional foods to address food security; (c) research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d) and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. Conclusions The results of the planning workshop provide a blueprint for future research and intervention projects. PMID:25147772

  20. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  1. 17 CFR 239.18 - Form S-11, for registration under the Securities Act of 1933 of securities of certain real estate...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... under the Securities Act of 1933 of securities of certain real estate companies. 239.18 Section 239.18... Securities Act of 1933 of securities of certain real estate companies. This form shall be used for registration under the Securities Act of 1933 of (a) securities issued by real estate investment trusts, as...

  2. 17 CFR 239.18 - Form S-11, for registration under the Securities Act of 1933 of securities of certain real estate...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... under the Securities Act of 1933 of securities of certain real estate companies. 239.18 Section 239.18... Securities Act of 1933 of securities of certain real estate companies. This form shall be used for registration under the Securities Act of 1933 of (a) securities issued by real estate investment trusts, as...

  3. Protecting the Ozone Shield: A New Public Policy

    DTIC Science & Technology

    1991-04-01

    Public Policy Issue; Alterna- 11 tives; Risk Management; Clean Air Act; Global Warming 16. PRICE CODE 17. SECURITY CLASSIFICATION 𔄂. SECURITY...pattern of global warming , commonly known as "the greenhouse effect. 1 OVERVIEW OF THE OZONE DEPLETION PUBLIC POLICY ISSUE In 1974, two atmospheric...inhabitants from the harmful effects of increased UVb radiation and global warming . Another dilemma surrounds this public policy issue since the first

  4. 17 CFR 240.11d1-1 - Exemption of certain securities from section 11(d)(1).

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... issued to the customer as a stockholder of the corporation issuing the security upon which credit is to... issued to the customer as a stockholder if he actually owned the stock giving rise to the right when such right accrued, even though such stock was not registered in his name; and in determining such fact the...

  5. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued or maintained?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What are the book-entry systems in... BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS... book-entry systems in which auctioned Treasury securities may be issued or maintained? There are three...

  6. State of security at US colleges and universities: a national stakeholder assessment and recommendations.

    PubMed

    Greenberg, Sheldon F

    2007-09-01

    In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.

  7. Environmental computing compendium - background and motivation

    NASA Astrophysics Data System (ADS)

    Heikkurinen, Matti; Kranzlmüller, Dieter

    2017-04-01

    The emerging discipline of environmental computing brings together experts in applied, advanced environmental modelling. The application domains address several fundamental societal challenges, ranging from disaster risk reduction to sustainability issues (such as food security on the global scale). The community has used an Intuitive, pragmatic approach when determining which initiatives are considered to "belong to the discipline". The community's growth is based on sharing of experiences and tools provides opportunities for reusing solutions or applying knowledge in new settings. Thus, limiting possible synergies by applying an arbitrary, formal definition to exclude some of the sources of solutions and knowledge would be counterproductive. However, the number of individuals and initiatives involved has grown to the level where a survey of initiatives and sub-themes they focus on is of interest. By surveying the project landscape and identifying common themes and building a shared vocabulary to describe them we can both communicate the relevance of the new discipline to the general public more easily and make it easier for the new members of the community to find the most promising collaboration partners. This talk presents the methodology and initial findings of the initial survey of the environmental computing initiatives and organisations, as well as approaches that could lead to an environmental computing compendium that would be a collaborative maintained shared resource of the environmental computing community.

  8. Environmental Problems: A Global Security Threat. Report of the United Nations of the Next Decade Conference (24th, Hamilton Parish, Bermuda, June 18-23, 1989).

    ERIC Educational Resources Information Center

    Stanley Foundation, Muscatine, IA.

    The world's political structure and many economic practices are out of harmony with nature. This disharmony threatens environmentally sustainable growth and human survival. United Nations (UN) conference participants discussed the degree of political acceptance of concepts such as environmental security and sustainable development. Their reading…

  9. Maritime Security in the Gulf of Guinea Subregion: Threats, Challenges and Solutions

    DTIC Science & Technology

    2011-03-16

    the GoG maritime domain. These threats adversely impact the socio-economic and political fabrics of most countries within the region. Poaching ...geographical location as well as environmental and demographic factors. Poaching , piracy, transnational crime, boundary disputes and environmental...and demographic factors. Poaching , piracy, transnational crime, boundary disputes and environmental degradation are common threats to security of the

  10. Caspian Sea Environmental Security Game: 16-17 November 1998

    DTIC Science & Technology

    1999-07-01

    17 Robert E. Ebel Caspian Basin Oil and Gas: An Overview . . . . . . . . . . . 21 Brian R . Shaw Environmental Baseline...threat to security of supply. 32 ENVIRONMENTAL BASELINE ANALYSIS OF THE CASPIAN SEA REGION BRIAN R . SHAW TERRY PALUSZKIEWICZ SUSAN A. THOMAS...Caspian Sea level. Sources of water include runoff ( R ), precipitation (P), and groundwater flow (G); sink include evaporation (E), and discharge of water

  11. Basic Information for EPA's Selected Analytical Methods for Environmental Remediation and Recovery (SAM)

    EPA Pesticide Factsheets

    Contains basic information on the role and origins of the Selected Analytical Methods including the formation of the Homeland Security Laboratory Capacity Work Group and the Environmental Evaluation Analytical Process Roadmap for Homeland Security Events

  12. 77 FR 49048 - Self-Regulatory Organizations; The Depository Trust Company; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-15

    ... to certain issues of securities in DTC's Fast Automated Securities Transfer program (``FAST''). For securities that are part of the FAST program, the transfer agents hold the securities registered in the name...

  13. Future Protein Supply and Demand: Strategies and Factors Influencing a Sustainable Equilibrium

    PubMed Central

    Henchion, Maeve; Hayes, Maria; Mullen, Anne Maria; Fenelon, Mark; Tiwari, Brijesh

    2017-01-01

    A growing global population, combined with factors such as changing socio-demographics, will place increased pressure on the world’s resources to provide not only more but also different types of food. Increased demand for animal-based protein in particular is expected to have a negative environmental impact, generating greenhouse gas emissions, requiring more water and more land. Addressing this “perfect storm” will necessitate more sustainable production of existing sources of protein as well as alternative sources for direct human consumption. This paper outlines some potential demand scenarios and provides an overview of selected existing and novel protein sources in terms of their potential to sustainably deliver protein for the future, considering drivers and challenges relating to nutritional, environmental, and technological and market/consumer domains. It concludes that different factors influence the potential of existing and novel sources. Existing protein sources are primarily hindered by their negative environmental impacts with some concerns around health. However, they offer social and economic benefits, and have a high level of consumer acceptance. Furthermore, recent research emphasizes the role of livestock as part of the solution to greenhouse gas emissions, and indicates that animal-based protein has an important role as part of a sustainable diet and as a contributor to food security. Novel proteins require the development of new value chains, and attention to issues such as production costs, food safety, scalability and consumer acceptance. Furthermore, positive environmental impacts cannot be assumed with novel protein sources and care must be taken to ensure that comparisons between novel and existing protein sources are valid. Greater alignment of political forces, and the involvement of wider stakeholders in a governance role, as well as development/commercialization role, is required to address both sources of protein and ensure food security. PMID:28726744

  14. Future Protein Supply and Demand: Strategies and Factors Influencing a Sustainable Equilibrium.

    PubMed

    Henchion, Maeve; Hayes, Maria; Mullen, Anne Maria; Fenelon, Mark; Tiwari, Brijesh

    2017-07-20

    A growing global population, combined with factors such as changing socio-demographics, will place increased pressure on the world's resources to provide not only more but also different types of food. Increased demand for animal-based protein in particular is expected to have a negative environmental impact, generating greenhouse gas emissions, requiring more water and more land. Addressing this "perfect storm" will necessitate more sustainable production of existing sources of protein as well as alternative sources for direct human consumption. This paper outlines some potential demand scenarios and provides an overview of selected existing and novel protein sources in terms of their potential to sustainably deliver protein for the future, considering drivers and challenges relating to nutritional, environmental, and technological and market/consumer domains. It concludes that different factors influence the potential of existing and novel sources. Existing protein sources are primarily hindered by their negative environmental impacts with some concerns around health. However, they offer social and economic benefits, and have a high level of consumer acceptance. Furthermore, recent research emphasizes the role of livestock as part of the solution to greenhouse gas emissions, and indicates that animal-based protein has an important role as part of a sustainable diet and as a contributor to food security. Novel proteins require the development of new value chains, and attention to issues such as production costs, food safety, scalability and consumer acceptance. Furthermore, positive environmental impacts cannot be assumed with novel protein sources and care must be taken to ensure that comparisons between novel and existing protein sources are valid. Greater alignment of political forces, and the involvement of wider stakeholders in a governance role, as well as development/commercialization role, is required to address both sources of protein and ensure food security.

  15. Review of Congressional Issues. News from Capitol Hill.

    ERIC Educational Resources Information Center

    Heinz, Ann Simeo

    2002-01-01

    Focuses on U.S. congressional issues in two categories: (1) enacted legislation, and (2) proposed legislation. Addresses topics such as the resolution related to Iraq, the Department of Homeland Security, Pledge of Allegiance, social security protection, elder justice, and women's rights. Includes learning activities. (CMK)

  16. 13 CFR 107.1505 - Liquidity requirements for Licensees issuing Participating Securities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Liquidity requirements for Licensees issuing Participating Securities. 107.1505 Section 107.1505 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees...

  17. A National Climate Change Adaptation Network for Protecting Water Security

    NASA Astrophysics Data System (ADS)

    Weaver, A.; Sauchyn, D.; Byrne, J. M.

    2009-12-01

    Water security and resource-dependent community-survival are being increasingly challenged as a consequence of climate change, and it is urgent that we plan now for the security of our water supplies which support our lives and livelihoods. However, the range of impacts of climate change on water availability, and the consequent environmental and human adaptations that are required, is so complex and serious that it will take the combined work of natural, health and social scientists working with industries and communities to solve them. Networks are needed that will identify crucial water issues under climate change at a range of scales in order to provide regionally-sensitive, solutions-oriented research and adaptation. We suggest national and supra-national water availability and community sustainability issues must be addressed by multidisciplinary research and adaptation networks. The work must be driven by a bottom-up research paradigm — science in the service of community and governance. We suggest that interdisciplinary teams of researchers, in partnership with community decision makers and local industries, are the best means to develop solutions as communities attempt to address future water demands, protect their homes from infrastructure damage, and meet their food, drinking water, and other essential resource requirements. The intention is to cover: the impact of climate change on Canadian natural resources, both marine and terrestrial; issues of long-term sustainability and resilience in human communities and the environments in which they are embedded; the making and moving of knowledge, be that between members of Indigenous and non-Indigenous communities, researchers of different disciplines, communities, industry, policymakers and the academy and the crucial involvement of the various orders of government in the response to water problems, under conditions of heightened uncertainty. Such an adaptation network must include a national communications strategy that will ensure widespread visibility of the network’s activities and findings and general public awareness-raising regarding water challenges and opportunities, including accessible web infrastructure and printed materials and communication with key organizations.

  18. Cloud Security: Issues and Research Directions

    DTIC Science & Technology

    2014-11-18

    4. Cloud Computing Security: What Changes with Software - Defined Networking ? Maur´ıcio Tsugawa, Andr´ea Matsunaga, and Jos´e A. B. Fortes 5...machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software - Defined ... Networking ( SDN ) is deployed within and across clouds. Chapters 5-9 are focused on the protection of data stored in the cloud. In Chapter 5, Wang et

  19. The Evolution of the Automated Continuous Evaluation System (ACES) for Personnel Security

    DTIC Science & Technology

    2013-11-12

    information. It applies business rules to the data, produces a report that flags issues of potential security concern, and electronically transmits...Form 86 (SF- 86) to check these data sources, verify what has been submitted, and collect more information. It applies business rules to the data...subject information. It applies business rules to analyze the data returned, produces a report that flags issues of potential security concern, and

  20. Strategic Response to Energy-Related Security Threats in the US Department of Defense

    DTIC Science & Technology

    2014-10-15

    generation in the United States are fossil fuels . These include coal, natural gas, and oil . In some cases solar, wind, geothermal, and hydroelectric...and findings. The research addressed engagement on climate change and energy security issues by DoD across various tiers and sectors of the...on climate change and energy security issues by DoD across various tiers and sectors of the organization. Specifically, a tripartite analysis

  1. The Impact of Visibility on Teamwork, Collaborative Communication, and Security in Emergency Departments: An Exploratory Study.

    PubMed

    Gharaveis, Arsalan; Hamilton, D Kirk; Pati, Debajyoti; Shepley, Mardelle

    2017-01-01

    The aim of this study was to examine the influence of visibility on teamwork, collaborative communication, and security issues in emergency departments (EDs). This research explored whether with high visibility in EDs, teamwork and collaborative communication can be improved while the security issues will be reduced. Visibility has been regarded as a critical design consideration and can be directly and considerably impacted by ED's physical design. Teamwork is one of the major related operational outcomes of visibility and involves nurses, support staff, and physicians. The collaborative communication in an ED is another important factor in the process of care delivery and affects efficiency and safety. Furthermore, security is a behavioral factor in ED designs, which includes all types of safety including staff safety, patient safety, and the safety of visitors and family members. This qualitative study investigated the impact of visibility on teamwork, collaborative communication, and security issues in the ED. One-on-one interviews and on-site observation sessions were conducted in a community hospital. Corresponding data analysis was implemented by using computer plan analysis, observation and interview content, and theme analyses. The findings of this exploratory study provided a framework to identify visibility as an influential factor in ED design. High levels of visibility impact productivity and efficiency of teamwork and communication and improve the chance of lowering security issues. The findings of this study also contribute to the general body of knowledge about the effect of physical design on teamwork, collaborative communication, and security.

  2. Evaluation of Ecological Environment Security in Contiguous Poverty Alleviation Area of Sichuan Province

    NASA Astrophysics Data System (ADS)

    Xian, W.; Chen, Y.; Chen, J.; Luo, X.; Shao, H.

    2018-04-01

    According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and protection, improve forest cover, control soil erosion, construct important ecological security barrier in poor areas, inhibit poverty alleviation through ecological security in this area from environmental damage to the vicious cycle of poverty. Obviously, the dynamic monitoring of ecological security in contiguous destitute areas of Sichuan province has a policy sense of urgency and practical significance. This paper adopts RS technology and GIS technology to select the Luhe region of Jinchuan county and Ganzi prefecture as the research area, combined with the characteristics of ecological environment in poor areas, the impact factors of ecological environment are determined as land use type, terrain slope, vegetation cover, surface water, soil moisture and other factors. Using the ecological environmental safety assessment model, the ecological environment safety index is calculated. According to the index, the ecological environment safety of the research area is divided into four levels. The ecological environment safety classification map of 1990 in 2009 is obtained. It can be seen that with the human modern life and improve their economic level, the surrounding environment will be destroyed, because the research area ecological environment is now in good, the ecological environment generally tends to be stable. We should keep its ecological security good and improve local economic income. The relationship between ecological environmental security and economic coordinated development in poor areas has very important strategic significance.

  3. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-04-21

    6 Intercity Passenger Rail Program (Amtrak) .....................................................................6... Intercity Bus Security Grant Program..............................................................................7 Trucking Security Program...continue security enhancements for its intercity rail services between high-risk urban areas. 20 U.S. Department of Homeland Security, Federal Emergency

  4. Computer Network Security: Best Practices for Alberta School Jurisdictions.

    ERIC Educational Resources Information Center

    Alberta Dept. of Education, Edmonton.

    This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…

  5. 75 FR 64643 - Reporting of Security-Based Swap Transaction Data

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-20

    ... information relating to pre-enactment security-based swaps to a registered security-based swap data repository... within 60 days after a registered security- based swap data repository commences operations to receive... repository,\\8\\ and security- based swap execution facility.\\9\\ The Commission has issued an advance notice of...

  6. 49 CFR 1548.19 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... CARRIER SECURITY § 1548.19 Security Directives and Information Circulars. (a) TSA may issue an Information... security measures are necessary to respond to a threat assessment, or to a specific threat against civil...

  7. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ...; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343-1717), Acting... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  8. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  9. A Security Checklist for ERP Implementations

    ERIC Educational Resources Information Center

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  10. The security concern on internet banking adoption among Malaysian banking customers.

    PubMed

    Sudha, Raju; Thiagarajan, A S; Seetharaman, A

    2007-01-01

    The existing literatures highlights that the security is the primary factor which determines the adoption of Internet banking technology. The secondary information on Internet banking development in Malaysia shows a very slow growth rate. Hence, this study aims to study the banking customers perception towards security concern and Internet banking adoption through the information collected from 150 sample respondents. The data analysis reveals that the customers have much concern about security and privacy issue in adoption of Internet banking, whether the customers are adopted Internet banking or not. Hence, it infers that to popularize Internet banking system there is a need for improvement in security and privacy issue among the banking customers.

  11. Smart Operations in Distributed Energy Resources System

    NASA Astrophysics Data System (ADS)

    Wei, Li; Jie, Shu; Zhang-XianYong; Qing, Zhou

    Smart grid capabilities are being proposed to help solve the challenges concerning system operations due to that the trade-offs between energy and environmental needs will be constantly negotiated while a reliable supply of electricity needs even greater assurance in case of that threats of disruption have risen. This paper mainly explores models for distributed energy resources system (DG, storage, and load),and also reviews the evolving nature of electricity markets to deal with this complexity and a change of emphasis on signals from these markets to affect power system control. Smart grid capabilities will also impact reliable operations, while cyber security issues must be solved as a culture change that influences all system design, implementation, and maintenance. Lastly, the paper explores significant questions for further research and the need for a simulation environment that supports such investigation and informs deployments to mitigate operational issues as they arise.

  12. Wireless smart meters and public acceptance: the environment, limited choices, and precautionary politics.

    PubMed

    Hess, David J; Coley, Jonathan S

    2014-08-01

    Wireless smart meters (WSMs) promise numerous environmental benefits, but they have been installed without full consideration of public acceptance issues. Although societal-implications research and regulatory policy have focused on privacy, security, and accuracy issues, our research indicates that health concerns have played an important role in the public policy debates that have emerged in California. Regulatory bodies do not recognize non-thermal health effects for non-ionizing electromagnetic radiation, but both homeowners and counter-experts have contested the official assurances that WSMs pose no health risks. Similarities and differences with the existing social science literature on mobile phone masts are discussed, as are the broader political implications of framing an alternative policy based on an opt-out choice. The research suggests conditions under which health-oriented precautionary politics can be particularly effective, namely, if there is a mandatory technology, a network of counter-experts, and a broader context of democratic contestation.

  13. 12 CFR 1.3 - Limitations on dealing in, underwriting, and purchase and sale of securities.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... security. (2) The aggregate par value of securities treated as investment securities under paragraph (i)(1... its own account, provided the aggregate par value of Type II securities issued by any one obligor held... may purchase and sell Type III securities for its own account, provided the aggregate par value of...

  14. 12 CFR 1.3 - Limitations on dealing in, underwriting, and purchase and sale of securities.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... security. (2) The aggregate par value of securities treated as investment securities under paragraph (i)(1... its own account, provided the aggregate par value of Type II securities issued by any one obligor held... may purchase and sell Type III securities for its own account, provided the aggregate par value of...

  15. Maritime security : progress made in implementing Maritime Transportation Security Act, but concerns remain : statement of Margaret Wrightson, Director, Homeland Security and Justice Issues

    DOT National Transportation Integrated Search

    2003-09-09

    After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...

  16. 31 CFR 306.23 - Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... TREASURY DIRECT Book-entry Securities System. 306.23 Section 306.23 Money and Finance: Treasury Regulations... Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System. (a) Eligible issues. The... conversion to the TREASURY DIRECT Book-entry Securities System. The notice shall specify the period during...

  17. Environmental security control of resource utilization of shale gas' drilling cuttings containing heavy metals.

    PubMed

    Wang, Chao-Qiang; Lin, Xiao-Yan; Zhang, Chun; Mei, Xu-Dong

    2017-09-01

    The overall objective of this research project was to investigate the heavy metals environmental security control of resource utilization of shale gas' drilling cuttings. To achieve this objective, we got through theoretical calculation and testing, ultimately and preliminarily determine the content of heavy metals pollutants, and compared with related standards at domestically and abroad. The results indicated that using the second Fike's law, the theoretical model of the release amount of heavy metal can be made, and the groundwater environmental risk as main point compared with soil. This study can play a role of standard guidance on environmental security control of drilling cuttings resource utilization by the exploration and development of shale gas in our country.

  18. Integrated assessment and scenarios simulation of urban water security system in the southwest of China with system dynamics analysis.

    PubMed

    Yin, Su; Dongjie, Guan; Weici, Su; Weijun, Gao

    2017-11-01

    The demand for global freshwater is growing, while global freshwater available for human use is limited within a certain time and space. Its security has significant impacts on both the socio-economic system and ecological system. Recently, studies have focused on the urban water security system (UWSS) in terms of either water quantity or water quality. In this study, water resources, water environment, and water disaster issues in the UWSS were combined to establish an evaluation index system with system dynamics (SD) and geographic information systems (GIS). The GIS method performs qualitative analysis from the perspective of the spatial dimension; meanwhile, the SD method performs quantitative calculation about related water security problems from the perspective of the temporal dimension. We established a UWSS model for Guizhou province, China to analyze influencing factors, main driving factors, and system variation law, by using the SD method. We simulated the water security system from 2005 to 2025 under four scenarios (Guiyang scenario, Zunyi scenario, Bijie scenario and combined scenario). The results demonstrate that: (1) the severity of water security in cities is ranked as follows: three cities are secure in Guizhou province, four cities are in basic security and two cities are in a situation of insecurity from the spatial dimension of GIS through water security synthesis; and (2) the major driving factors of UWSS in Guizhou province include agricultural irrigation water demand, soil and water losses area, a ratio increase to the standard of water quality, and investment in environmental protection. A combined scenario is the best solution for UWSS by 2025 in Guizhou province under the four scenarios from the temporal dimension of SD. The results of this study provide a useful suggestion for the management of freshwater for the cities of Guizhou province in southwest China.

  19. FORWARD: DESERTIFICATION IN THE MEDITERRANEAN REGION: A SECURITY ISSUE

    EPA Science Inventory

    The Workshop focused on two basic concepts: security and desertification and their linkages. Since the end of the Cold War, traditional security concepts based on national sovereignty and territorial security have increasingly been brought under review. Currently, a broader defin...

  20. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  1. Planning Considerations for Secure Network Protocols

    DTIC Science & Technology

    1999-03-01

    distribution / management ) requirements needed to support network security services are examined. The thesis concludes by identifying tactical user network requirements and suggests security issues to be considered in concert with network

  2. A threat intelligence framework for access control security in the oil industry

    NASA Astrophysics Data System (ADS)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  3. Corrective Action Decision Document/Closure Report for Corrective Action Unit 567: Miscellaneous Soil Sites - Nevada National Security Site, Nevada

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Matthews, Patrick

    2014-12-01

    This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 567: Miscellaneous Soil Sites, Nevada National Security Site, Nevada. The purpose of this Corrective Action Decision Document/Closure Report is to provide justification and documentation supporting the recommendation that no further corrective action is needed for CAU 567 based on the implementation of the corrective actions. The corrective actions implemented at CAU 567 were developed based on an evaluation of analytical data from the CAI, the assumed presence of COCs at specific locations, and the detailed and comparative analysis of the CAAs. The CAAs weremore » selected on technical merit focusing on performance, reliability, feasibility, safety, and cost. The implemented corrective actions meet all requirements for the technical components evaluated. The CAAs meet all applicable federal and state regulations for closure of the site. Based on the implementation of these corrective actions, the DOE, National Nuclear Security Administration Nevada Field Office provides the following recommendations: • No further corrective actions are necessary for CAU 567. • The Nevada Division of Environmental Protection issue a Notice of Completion to the DOE, National Nuclear Security Administration Nevada Field Office for closure of CAU 567. • CAU 567 be moved from Appendix III to Appendix IV of the FFACO.« less

  4. Security Classification Reform: The Waiting Agenda.

    ERIC Educational Resources Information Center

    Relyea, Harold C.

    1993-01-01

    Provides an overview of security classification reform for consideration by the Clinton administration and the 103rd Congress. Historical background and current issues related to the security classification of information, personnel security clearances, and industrial safeguarding of classified information are discussed. A checklist of basic…

  5. 10 CFR 712.16 - DOE security review.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... of the HRP process, the HRP certifying official must be notified and the security concern evaluated... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...

  6. Changes in Extreme Events and the Potential Impacts on National Security

    NASA Astrophysics Data System (ADS)

    Bell, J.

    2017-12-01

    Extreme weather and climate events affect human health by causing death, injury, and illness, as well as having large socio-economic impacts. Climate change has caused changes in extreme event frequency, intensity and geographic distribution, and will continue to be a driver for changes in the future. Some of the extreme events that have already changed are heat waves, droughts, wildfires, flooding rains, coastal flooding, storm surge, and hurricanes. The pathways connecting extreme events to health outcomes and economic losses can be diverse and complex. The difficulty in predicting these relationships comes from the local intricacies of societal and environmental factors that influences the level of exposure. The goal of this presentation is to discuss the national security implications of changes in extreme weather events and demonstrate how changes in extremes can lead to a host cascading issues. To illustrate this point, this presentation will provide examples of the various pathways that extreme events can increase disease burden and cause economic stress.

  7. Schweizer RU-38A Twin-Condor: covert surveillance aircraft

    NASA Astrophysics Data System (ADS)

    O'Toole, Michael J.; Schweizer, Paul H.

    1997-11-01

    The world order has changed and with it, governments are now faced with waging a new type of `ware.' Regional instability, drug trafficking, environmental issues, international terrorism, and illegal immigration are examples of escalating problems that cross international boundaries and threaten the security of nations. The first and most important element in coping with these illegal activities is the ability to detect and monitor events in a timely and secure fashion. Conventional means of gathering intelligence such as large airborne collection systems and satellites lack the flexibility, dwell times, and cost effectiveness to meet many of today's needs. There is a growing requirement for airborne platforms that can covertly perform surveillance missions during either day or night and in a cost effective manner. To meet this need, Schweizer Aircraft has recently developed the RU-38A twin-engine surveillance aircraft. This paper discusses the evolution and principle design concepts of this aircraft and how its unique performance enables the RU-38A to achieve new levels of surveillance capability.

  8. Life cycle evaluation of emerging lignocellulosic ethanol conversion technologies.

    PubMed

    Spatari, Sabrina; Bagley, David M; MacLean, Heather L

    2010-01-01

    Lignocellulosic ethanol holds promise for addressing climate change and energy security issues associated with personal transportation through lowering the fuel mixes' carbon intensity and petroleum demand. We compare the technological features and life cycle environmental impacts of near- and mid-term ethanol bioconversion technologies in the United States. Key uncertainties in the major processes: pre-treatment, hydrolysis, and fermentation are evaluated. The potential to reduce fossil energy use and greenhouse gas (GHG) emissions varies among bioconversion processes, although all options studied are considerably more attractive than gasoline. Anticipated future performance is found to be considerably more attractive than that published in the literature as being achieved to date. Electricity co-product credits are important in characterizing the GHG impacts of different ethanol production pathways; however, in the absence of near-term liquid transportation fuel alternatives to gasoline, optimizing ethanol facilities to produce ethanol (as opposed to co-products) is important for reducing the carbon intensity of the road transportation sector and for energy security.

  9. ERCMExpress. Volume 2, Issue 4

    ERIC Educational Resources Information Center

    US Department of Education, 2006

    2006-01-01

    This issue of ERCMExpress alerts readers of the All-Hazard NOAA weather radio (NWR) network upgrade. In 2004, The National Oceanic and Atmospheric Administration NOAA and the U.S. Department of Homeland Security (DHS) collaborated to enable DHS to disseminate homeland security-related information over the NWR network. DHS's goal was to produce an…

  10. Accounting Issues: An Essay Series Part VI--Investments in Securities

    ERIC Educational Resources Information Center

    Laux, Judy

    2008-01-01

    The sixth in a series of theory-based essays, this article presents accounting for investments in debt and equity securities along with some related conceptual and measurement issues. Additional coverage is devoted to potential ethical dilemmas and both theoretical and empirical literature related to this asset. (Contains 1 footnote.)

  11. 78 FR 17066 - Indirect Stock Transfers and Coordination Rule Exceptions; Transfers of Stock or Securities in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-19

    ... Indirect Stock Transfers and Coordination Rule Exceptions; Transfers of Stock or Securities in Outbound... issue of the Federal Register, the IRS and the Treasury Department are issuing temporary regulations... stock transfers for certain outbound asset reorganizations. The temporary regulations also modify the...

  12. Examining the Impact of Non-Technical Security Management Factors on Information Security Management in Health Informatics

    ERIC Educational Resources Information Center

    Imam, Abbas H.

    2013-01-01

    Complexity of information security has become a major issue for organizations due to incessant threats to information assets. Healthcare organizations are particularly concerned with security owing to the inherent vulnerability of sensitive information assets in health informatics. While the non-technical security management elements have been at…

  13. 12 CFR 151.40 - What definitions apply to this part?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... in these debt securities. Debt security does not include securities issued by an investment company registered under the Investment Company Act of 1940, 15 U.S.C. 80a-1, et seq. Government security means: (1... traded on one or more national securities exchanges; or (ii) For which quotations are disseminated...

  14. 12 CFR 151.40 - What definitions apply to this part?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... in these debt securities. Debt security does not include securities issued by an investment company registered under the Investment Company Act of 1940, 15 U.S.C. 80a-1, et seq. Government security means: (1... traded on one or more national securities exchanges; or (ii) For which quotations are disseminated...

  15. 12 CFR 551.40 - What definitions apply to this part?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... in these debt securities. Debt security does not include securities issued by an investment company registered under the Investment Company Act of 1940, 15 U.S.C. 80a-1, et seq. Government security means: (1... traded on one or more national securities exchanges; or (ii) For which quotations are disseminated...

  16. 28 CFR 700.24 - Security of systems of records.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Security of systems of records. 700.24... Records Under the Privacy Act of 1974 § 700.24 Security of systems of records. (a) The Office Administrator or Security Officer shall be responsible for issuing regulations governing the security of systems...

  17. 49 CFR 1520.15 - SSI disclosed by TSA or the Coast Guard.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.15 SSI disclosed by TSA or the Coast Guard. (a) In... allegations contained in a legal enforcement action document issued by TSA or the Coast Guard. (2) Security...

  18. Information Security Awareness On-Line Materials Design with Knowledge Maps

    ERIC Educational Resources Information Center

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  19. 31 CFR 344.4 - What are Time Deposit securities?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.4 What are Time Deposit securities? Time Deposit... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false What are Time Deposit securities? 344...? The issuer must fix the maturity periods for Time Deposit securities, which are issued as follows: (1...

  20. 31 CFR 344.4 - What are Time Deposit securities?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.4 What are Time Deposit securities? Time Deposit... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What are Time Deposit securities? 344...? The issuer must fix the maturity periods for Time Deposit securities, which are issued as follows: (1...

  1. 31 CFR 344.4 - What are Time Deposit securities?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.4 What are Time Deposit securities? Time Deposit... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false What are Time Deposit securities? 344...? The issuer must fix the maturity periods for Time Deposit securities, which are issued as follows: (1...

  2. 31 CFR 344.4 - What are Time Deposit securities?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... AND LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.4 What are Time Deposit securities? Time... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false What are Time Deposit securities? 344... periods? The issuer must fix the maturity periods for Time Deposit securities, which are issued as follows...

  3. 31 CFR 344.4 - What are Time Deposit securities?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.4 What are Time Deposit securities? Time Deposit... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false What are Time Deposit securities? 344...? The issuer must fix the maturity periods for Time Deposit securities, which are issued as follows: (1...

  4. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues

    PubMed Central

    Müthing, Jannis; Jäschke, Thomas

    2017-01-01

    Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. Objective The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Methods Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Results Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. Conclusions The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. PMID:29046271

  5. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues.

    PubMed

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-10-18

    Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. ©Jannis Müthing, Thomas Jäschke, Christoph M Friedrich. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 18.10.2017.

  6. Synthesis and review: Tackling the nitrogen management challenge: from global to local scales

    NASA Astrophysics Data System (ADS)

    Reis, Stefan; Bekunda, Mateete; Howard, Clare M.; Karanja, Nancy; Winiwarter, Wilfried; Yan, Xiaoyuan; Bleeker, Albert; Sutton, Mark A.

    2016-12-01

    One of the ‘grand challenges’ of this age is the anthropogenic impact exerted on the nitrogen cycle. Issues of concern range from an excess of fixed nitrogen resulting in environmental pressures for some regions, while for other regions insufficient fixed nitrogen affects food security and may lead to health risks. To address these issues, nitrogen needs to be managed in an integrated fashion, at a variety of scales (from global to local). Such management has to be based on a thorough understanding of the sources of reactive nitrogen released into the environment, its deposition and effects. This requires a comprehensive assessment of the key drivers of changes in the nitrogen cycle both spatially, at the field, regional and global scale and over time. In this focus issue, we address the challenges of managing reactive nitrogen in the context of food production and its impacts on human and ecosystem health. In addition, we discuss the scope for and design of management approaches in regions with too much and too little nitrogen. This focus issue includes several contributions from authors who participated at the N2013 conference in Kampala in November 2013, where delegates compiled and agreed upon the ‘Kampala Statement-for-Action on Reactive Nitrogen in Africa and Globally’. These contributions further underline scientifically the claims of the ‘Kampala Statement’, that simultaneously reducing pollution and increasing nitrogen available in the food system, by improved nitrogen management offers win-wins for environment, health and food security in both developing and developed economies. The specific messages conveyed in the Kampala Statement focus on improving nitrogen management (I), including the reduction of nitrogen losses from agriculture, industry, transport and energy sectors, as well as improving waste treatment and informing individuals and institutions (II). Highlighting the need for innovation and increased awareness among stakeholders (III) and the identification of policy and technology solutions to tackle global nitrogen management issues (IV), this will enable countries to fulfil their regional and global commitments.

  7. Report: Information Security Series: Security Practices Comprehensive Environmental Response, Compensation, and Liability Information System

    EPA Pesticide Factsheets

    Report #2006-P-00019, March 28, 2006. OSWER’s implemented practices to ensure production servers were being monitored for known vulnerabilities and personnel with significant security responsibility completed the Agency’s recommended security training.

  8. 78 FR 69433 - Executive Order 13650 Improving Chemical Facility Safety and Security Listening Sessions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-19

    ... Chemical Facility Safety and Security Listening Sessions AGENCY: National Protection and Programs... from stakeholders on issues pertaining to Improving Chemical Facility Safety and Security (Executive... regulations, guidance, and policies; and identifying best practices in chemical facility safety and security...

  9. 14 CFR 61.18 - Security disqualification.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 2 2014-01-01 2014-01-01 false Security disqualification. 61.18 Section 61...) AIRMEN CERTIFICATION: PILOTS, FLIGHT INSTRUCTORS, AND GROUND INSTRUCTORS General § 61.18 Security... issued under this part when the Transportation Security Administration (TSA) has notified the FAA in...

  10. 14 CFR 61.18 - Security disqualification.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 2 2012-01-01 2012-01-01 false Security disqualification. 61.18 Section 61...) AIRMEN CERTIFICATION: PILOTS, FLIGHT INSTRUCTORS, AND GROUND INSTRUCTORS General § 61.18 Security... issued under this part when the Transportation Security Administration (TSA) has notified the FAA in...

  11. 14 CFR 61.18 - Security disqualification.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Security disqualification. 61.18 Section 61...) AIRMEN CERTIFICATION: PILOTS, FLIGHT INSTRUCTORS, AND GROUND INSTRUCTORS General § 61.18 Security... issued under this part when the Transportation Security Administration (TSA) has notified the FAA in...

  12. Security Locks

    ERIC Educational Resources Information Center

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  13. Transportation Security : federal action needed to enhance security efforts : statement of Peter Guerrero, Director, Physical Infrastructure Issues

    DOT National Transportation Integrated Search

    2003-09-09

    Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...

  14. 76 FR 45548 - Draft Site-Wide Environmental Impact Statement for the Continued Operation of the Department of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-29

    ... geothermal energy demonstration project and research center. Reduced Operations Alternative The Reduced... DEPARTMENT OF ENERGY National Nuclear Security Administration Draft Site-Wide Environmental Impact Statement for the Continued Operation of the Department of Energy/National Nuclear Security Administration...

  15. Notification: Audit of the U.S. Environmental Protection Agency’s Compliance with the Federal Information Security Management Act

    EPA Pesticide Factsheets

    Project #OA-FY14-0135, February 10, 2014. The Office of Inspector General plans to begin fieldwork for an audit of the U.S. Environmental Protection Agency's compliance with the Federal Information Security Management Act (FISMA).

  16. Food sovereignty, food security and health equity: a meta-narrative mapping exercise.

    PubMed

    Weiler, Anelyse M; Hergesheimer, Chris; Brisbois, Ben; Wittman, Hannah; Yassi, Annalee; Spiegel, Jerry M

    2015-10-01

    There has been growing policy interest in social justice issues related to both health and food. We sought to understand the state of knowledge on relationships between health equity--i.e. health inequalities that are socially produced--and food systems, where the concepts of 'food security' and 'food sovereignty' are prominent. We undertook exploratory scoping and mapping stages of a 'meta-narrative synthesis' on pathways from global food systems to health equity outcomes. The review was oriented by a conceptual framework delineating eight pathways to health (in)equity through the food system: 1--Multi-Scalar Environmental, Social Context; 2--Occupational Exposures; 3--Environmental Change; 4--Traditional Livelihoods, Cultural Continuity; 5--Intake of Contaminants; 6--Nutrition; 7--Social Determinants of Health and 8--Political, Economic and Regulatory context. The terms 'food security' and 'food sovereignty' were, respectively, paired with a series of health equity-related terms. Combinations of health equity and food security (1414 citations) greatly outnumbered pairings with food sovereignty (18 citations). Prominent crosscutting themes that were observed included climate change, biotechnology, gender, racialization, indigeneity, poverty, citizenship and HIV as well as institutional barriers to reducing health inequities in the food system. The literature indicates that food sovereignty-based approaches to health in specific contexts, such as advancing healthy school food systems, promoting soil fertility, gender equity and nutrition, and addressing structural racism, can complement the longer-term socio-political restructuring processes that health equity requires. Our conceptual model offers a useful starting point for identifying interventions with strong potential to promote health equity. A research agenda to explore project-based interventions in the food system along these pathways can support the identification of ways to strengthen both food sovereignty and health equity. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine © The Author 2014; all rights reserved.

  17. Combating terrorism : linking threats to strategies and resources testimony

    DOT National Transportation Integrated Search

    2000-07-26

    This is the statement of Norman J. Rabkin, Director, National Security Preparedness Issues, National Security and International Affairs division before the Subcommittee on National Security, Veterans Affairs, and International Relations, Committee on...

  18. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    NASA Astrophysics Data System (ADS)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive literature in human security rarely applied in this context. This includes a brief review of human security and Sino-Myanmar relations, and is grounded in an empirical analysis of Chinese investment in Myanmar's hydropower and oil and gas sectors. Ultimately, this thesis argues that, while insightful, many traditional interpretations of Sino-Myanmar energy cooperation overlook the security interests of those worst affected. Furthermore, that the worst excesses of Chinese companies in Myanmar are not unique to China, but common across all investors in the regime, Western or otherwise.

  19. Privacy and security issues in teleradiology.

    PubMed

    White, Peter

    2004-10-01

    Teleradiology is now well established within healthcare in the USA, but ethico-legal concepts surrounding this innovation remain unclear. New legislation, the Health Insurance Portability and Accountability Act, as well as ethical guidelines and common law demonstrate the importance being placed on security of electronic data and the protection of patients' personal data. Radiologists need to be aware of the security, privacy, and confidentiality issues which relate to teleradiology, so that they can safeguard not only their own interests but also the best interests of their patients.

  20. Evaluation of Uncertainty in Constituent Input Parameters for Modeling the Fate of IMX 101 Components

    DTIC Science & Technology

    2017-05-01

    ER D C/ EL T R- 17 -7 Environmental Security Technology Certification Program (ESTCP) Evaluation of Uncertainty in Constituent Input...Environmental Security Technology Certification Program (ESTCP) ERDC/EL TR-17-7 May 2017 Evaluation of Uncertainty in Constituent Input Parameters...Environmental Evaluation and Characterization Sys- tem (TREECS™) was applied to a groundwater site and a surface water site to evaluate the sensitivity

  1. Draft secure medical database standard.

    PubMed

    Pangalos, George

    2002-01-01

    Medical database security is a particularly important issue for all Healthcare establishments. Medical information systems are intended to support a wide range of pertinent health issues today, for example: assure the quality of care, support effective management of the health services institutions, monitor and contain the cost of care, implement technology into care without violating social values, ensure the equity and availability of care, preserve humanity despite the proliferation of technology etc.. In this context, medical database security aims primarily to support: high availability, accuracy and consistency of the stored data, the medical professional secrecy and confidentiality, and the protection of the privacy of the patient. These properties, though of technical nature, basically require that the system is actually helpful for medical care and not harmful to patients. These later properties require in turn not only that fundamental ethical principles are not violated by employing database systems, but instead, are effectively enforced by technical means. This document reviews the existing and emerging work on the security of medical database systems. It presents in detail the related problems and requirements related to medical database security. It addresses the problems of medical database security policies, secure design methodologies and implementation techniques. It also describes the current legal framework and regulatory requirements for medical database security. The issue of medical database security guidelines is also examined in detailed. The current national and international efforts in the area are studied. It also gives an overview of the research work in the area. The document also presents in detail the most complete to our knowledge set of security guidelines for the development and operation of medical database systems.

  2. The Role of Latin America’s Land and Water Resources for Global Food Security: Environmental Trade-Offs of Future Food Production Pathways

    PubMed Central

    Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D.; Ringler, Claudia; Garrido, Alberto

    2015-01-01

    One of humanity’s major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC’s agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)—a global dynamic partial equilibrium model of the agricultural sector—to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths. PMID:25617621

  3. The role of Latin America's land and water resources for global food security: environmental trade-offs of future food production pathways.

    PubMed

    Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D; Ringler, Claudia; Garrido, Alberto

    2015-01-01

    One of humanity's major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC's agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)-a global dynamic partial equilibrium model of the agricultural sector-to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths.

  4. Best Practices for the Security of Radioactive Materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Coulter, D.T.; Musolino, S.

    2009-05-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studiesmore » suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.« less

  5. Water Security - National and Global Issues

    NASA Astrophysics Data System (ADS)

    Tindall, J. A.; Campbell, A. A.; Moran, E. H.

    2010-12-01

    Water is fundamental to human life. Disruption of water supplies by the Water Threats and Hazards Triad (WTHT) — man-made, natural, and technological hazards — could threaten the delivery of vital human services, endanger public health and the environment, potentially cause mass casualties, and threaten population sustainability, social stability, and homeland security. Water distribution systems extend over vast areas and are therefore vulnerable to a wide spectrum of threats — from natural hazards such as large forest fires that result in runoff and debris flow that clog reservoirs, and reduce, disrupt, or contaminate water supply and quality to threats from natural, man-made, or political extremist attacks. Our research demonstrates how devising concepts and counter measures to protect water supplies will assist the public, policy makers, and planners at local, Tribal, State, and Federal levels to develop solutions for national and international water-security and sustainability issues. Water security is an issue in which the entire global community is stakeholders.

  6. An Encryption Scheme for Communication Internet SCADA Components

    NASA Astrophysics Data System (ADS)

    Robles, Rosslin John; Kim, Tai-Hoon

    The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network. SCADA is considered a critical infrastructure, and connecting to the internet is putting the society on jeopardy, some operators hold back on connecting it to the internet. But since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Supervisory Control and Data Acquisition Systems (SCADA) through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.

  7. Security Metrics: A Solution in Search of a Problem

    ERIC Educational Resources Information Center

    Rosenblatt, Joel

    2008-01-01

    Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…

  8. How do the public and policy makers communicate their perceptions of environmental risk to academics?

    NASA Astrophysics Data System (ADS)

    Holden, Jennifer

    2010-05-01

    This paper investigates the ways that the public and policy makers talk about environmental risk to academics. The case study is heavy-metal contamination of food in Zambia, Southern Africa. In several localities in Zambia, urban agriculture is practised using heavy-metal contamination wastewater for irrigation. This leads to contaminated food crops that are subsequently consumed. One case study site where this occurs is Chunga, situated in the northwest of the Zambian capital: Lusaka. For members of the public, six focus groups were carried out at the Chunga, Zambia study site, involving a total of 48 participants. The participants were those involved in urban agriculture through cultivation, selling and consumption of food crops. Urban agriculturalist focus group participants were recruited through key field informants. Focus group discussion starter questions involved pollution awareness, health impacts of pollution in the area and who is responsible for communicating environmental contamination risks to the general population. For policy stakeholders, 39 semi-structured interviews were conducted with individuals from various organisations including government ministries, non-governmental organisations, community based organisations and international institutions. Semi-structured interviews investigated the perceived major health issues in Zambia, food safety, environmental contamination and specifically heavy-metal contamination. Policy stakeholders were identified through policy mapping and organisations mentioned in focus group discussions and other interviews. The results at the Chunga study site show that members of the public perceive: (i) heavy metal pollution is not an issue in Lusaka and for their irrigation practices, (ii) dirty food can cause illness, (iii) heavy metals in foods can cause illness but they are not present at the Chunga site. Amongst urban agriculturalists the quantity of food available is the greatest issue, with some saying that they do not have the luxury of thinking about the quality of food. Only two policy makers in the semi-structured interviews perceived there to be a possible health problems due to heavy metal contaminated food in Zambia. However, this was from personal experience and not a corporate view. Policy makers did not think that food safety was an issue in Zambia, with several interviewees stating that food security was more of a priority, reflecting the urban agriculture cultivators' views that quantity is the more important issue than quality of food. Risks due to environmental contamination are not high in the public and policy makers' priorities, even when asked directly about the issue. Both urban agriculturalists and policy stakeholders believe that academics have a key role to play in communicating the possible and actual risks to the affected populations and institutional stakeholders.

  9. ICS security in maritime transportation : a white paper examining the security and resiliency of critical transportation infrastructure

    DOT National Transportation Integrated Search

    2013-07-29

    The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...

  10. 49 CFR 1549.109 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... SCREENING PROGRAM Operations § 1549.109 Security Directives and Information Circulars. (a) TSA may issue an Information Circular to notify certified cargo screening facilities of security concerns. (b) When TSA...

  11. 49 CFR 1544.305 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.305 Security Directives and Information Circulars. (a) TSA may issue an Information Circular to notify aircraft operators of...

  12. 17 CFR 230.259 - Withdrawal or abandonment of offering statements.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Withdrawal or abandonment of offering statements. 230.259 Section 230.259 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation A-Conditional Small Issues...

  13. 12 CFR 615.5450 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... AND OPERATIONS, AND FUNDING OPERATIONS Book-Entry Procedures for Farm Credit Securities § 615.5450... the claimant for another person to hold, transfer, or deal with the security. (b) Book-entry security means a Farm Credit security issued or maintained in the Book-entry System. (c) Book-entry System means...

  14. Security mechanism based on Hospital Authentication Server for secure application of implantable medical devices.

    PubMed

    Park, Chang-Seop

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.

  15. Security Mechanism Based on Hospital Authentication Server for Secure Application of Implantable Medical Devices

    PubMed Central

    2014-01-01

    After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797

  16. 12 CFR 223.24 - What valuation principles apply to extensions of credit secured by affiliate securities?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... paragraphs (f)(1) and (5) of § 223.42. (c) Exclusion of eligible affiliated mutual fund securities—(1) The exclusion. Eligible affiliated mutual fund securities are not considered to be securities issued by an... extension of credit will be used to purchase the eligible affiliated mutual fund securities collateral or...

  17. 12 CFR 223.24 - What valuation principles apply to extensions of credit secured by affiliate securities?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... paragraphs (f)(1) and (5) of § 223.42. (c) Exclusion of eligible affiliated mutual fund securities—(1) The exclusion. Eligible affiliated mutual fund securities are not considered to be securities issued by an... extension of credit will be used to purchase the eligible affiliated mutual fund securities collateral or...

  18. Security Management in a Multimedia System

    ERIC Educational Resources Information Center

    Rednic, Emanuil; Toma, Andrei

    2009-01-01

    In database security, the issue of providing a level of security for multimedia information is getting more and more known. For the moment the security of multimedia information is done through the security of the database itself, in the same way, for all classic and multimedia records. So what is the reason for the creation of a security…

  19. Finite-Time Performance of Local Search Algorithms: Theory and Application

    DTIC Science & Technology

    2010-06-10

    security devices deployed at airport security checkpoints are used to detect prohibited items (e.g., guns, knives, explosives). Each security device...security devices are deployed, the practical issue of determining how to optimally use them can be difficult. For an airport security system design...checked baggage), explosive detection systems (designed to detect explosives in checked baggage), and detailed hand search by an airport security official

  20. Afghanistan: Key Oversight Issues

    DTIC Science & Technology

    2013-02-01

    2012. Afghan Security : Renewed Sharing of Biometric Data Could Strengthen U.S. Efforts to Protect U.S. Personnel from Afghan Security Force Attacks...SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 59 19a. NAME OF RESPONSIBLE PERSON...Afghanistan’s Security Environment 17 Enclosure II Transition of Lead Security to Afghan Security Forces 19 Enclosure III Future Cost and

  1. ENVIRONMENTAL RISK ASSESSMENTS OF OIL AND GAS ACTIVITIES USING NATIONAL SECURITY AND CIVILIAN DATA SOURCES

    EPA Science Inventory

    The national security systems (NSS) of Russia and the United States have been used for more than three decades to monitor each other's military and economic infrastructure. These high-resolution imaging systems can provide unique data for assessing a wide range of environmental i...

  2. 77 FR 12867 - Accreditation of ALTOL Chemical and Environmental Lab Inc., as a Commercial Laboratory

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-02

    ... accredited to test petroleum, petroleum products, organic chemicals and vegetable oils for customs purposes... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation of ALTOL Chemical..., Department of Homeland Security. ACTION: Notice of accreditation of Altol Chemical and Environmental Lab Inc...

  3. 77 FR 59427 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-27

    ...-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of a Proposed Rule Change To Amend Rule G-34 on CUSIP Numbers, New Issue, and Market Information Requirements September 21... consisting of amendments to Rule G-34 on CUSIP numbers, new issue, and market information requirements. The...

  4. The Causes of Poverty: Thinking Critically about a Key Economic Issue

    ERIC Educational Resources Information Center

    Otlin, Josh

    2008-01-01

    Economics is a central part of civic education. Students need to know about the Constitution and the party system, but active citizenship in the twenty-first century requires much more than the standard civics courses offer. Economic issues dominate public policy debates ranging from Social Security to immigration to international security. If…

  5. 77 FR 20536 - Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-05

    ... Markets Trends, Division of Corporation Finance, at (202) 551-3860, U.S. Securities and Exchange... exchange trading due to individual business needs of certain users. Those users should retain the ability... Corporation Finance issued a no-action letter that addressed the availability of these interim exemptions to...

  6. Assessing Community Readiness to Reduce Childhood Diarrheal Disease and Improve Food Security in Dioro, Mali.

    PubMed

    Borresen, Erica C; Stone, Cordelia; Boré, Abdoulaye; Cissoko, Alima; Maiga, Ababacar; Koita, Ousmane A; Ryan, Elizabeth P

    2016-06-08

    Diarrhea and malnutrition represent leading causes of death for children in Mali. Understanding a community's needs and ideas are critical to ensure the success of prevention and treatment interventions for diarrheal disease, as well as to improve food security to help reduce malnutrition. The objective of this study was to incorporate the Community Readiness Model (CRM) for the issues of childhood diarrheal disease and food security in Mali to measure baseline community readiness prior to any program implementation. Thirteen key respondents residing in Dioro, Mali were selected based on varied social roles and demographics and completed two questionnaires on these public health issues. The overall readiness score to reduce childhood diarrheal disease was 5.75 ± 1.0 standard deviation (preparation stage). The overall readiness score to improve food security was 5.5 ± 0.5 standard deviation (preparation stage). The preparation stage indicates that at least some of the community have basic knowledge regarding these issues, and want to act locally to reduce childhood diarrhea and improve food security and nutrition. Proposed activities to increase community readiness on these issues are provided and are broad enough to allow opportunities to implement community- and culturally-specific activities by the Dioro community.

  7. US/China Energy and Environmental Technology Center (EETC) international business development and technology transfer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hsieh, S.T.; Atwood, T.; Qiu Daxiong

    1997-12-31

    Since January 1997, the US/China Energy and Environmental Technology Center (EETC) in Beijing has been jointly operated by Tulane University and Tsinghua University. EETC is established to encourage the adoption of technologies for energy production with improved environmental performance which are essential for supporting economic growth and managing the Global Warming and Climate Change issues. International cooperation is critical to insure the environmental and energy security on a global basis. For example, the US has acquired a great deal of useful experience in clean coal technology which has been demonstrated with major utilities in commercial operations. The adaption of, andmore » the installation of, clean coal technology should be given high priority. Worldwide, the continuous exchange of information and technology between developed and developing nations relating to the current and future clean coal technologies is of great importance. Developed nations which possess environmental responsive technologies and financial resources should work closely with developing nations to facilitate technology transfer and trade of technologies. International cooperation will lower the cost of deploying clean coal technologies directed toward the clean production of energy. This paper presents the updated activities of EETC on facilitating technology transfer and promoting the clean use of coal to satisfy growing energy demand in China.« less

  8. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-09

    ...The National Maritime Security Advisory Committee (NMSAC) will meet on January 18-19, 2012 in Washington, DC to discuss various issues relating to national maritime security. This meeting will be open to the public.

  9. Climate change and food security.

    PubMed

    Gregory, P J; Ingram, J S I; Brklacich, M

    2005-11-29

    Dynamic interactions between and within the biogeophysical and human environments lead to the production, processing, distribution, preparation and consumption of food, resulting in food systems that underpin food security. Food systems encompass food availability (production, distribution and exchange), food access (affordability, allocation and preference) and food utilization (nutritional and societal values and safety), so that food security is, therefore, diminished when food systems are stressed. Such stresses may be induced by a range of factors in addition to climate change and/or other agents of environmental change (e.g. conflict, HIV/AIDS) and may be particularly severe when these factors act in combination. Urbanization and globalization are causing rapid changes to food systems. Climate change may affect food systems in several ways ranging from direct effects on crop production (e.g. changes in rainfall leading to drought or flooding, or warmer or cooler temperatures leading to changes in the length of growing season), to changes in markets, food prices and supply chain infrastructure. The relative importance of climate change for food security differs between regions. For example, in southern Africa, climate is among the most frequently cited drivers of food insecurity because it acts both as an underlying, ongoing issue and as a short-lived shock. The low ability to cope with shocks and to mitigate long-term stresses means that coping strategies that might be available in other regions are unavailable or inappropriate. In other regions, though, such as parts of the Indo-Gangetic Plain of India, other drivers, such as labour issues and the availability and quality of ground water for irrigation, rank higher than the direct effects of climate change as factors influencing food security. Because of the multiple socio-economic and bio-physical factors affecting food systems and hence food security, the capacity to adapt food systems to reduce their vulnerability to climate change is not uniform. Improved systems of food production, food distribution and economic access may all contribute to food systems adapted to cope with climate change, but in adopting such changes it will be important to ensure that they contribute to sustainability. Agriculture is a major contributor of the greenhouse gases methane (CH4) and nitrous oxide (N2O), so that regionally derived policies promoting adapted food systems need to mitigate further climate change.

  10. Climate change and food security

    PubMed Central

    Gregory, P.J; Ingram, J.S.I; Brklacich, M

    2005-01-01

    Dynamic interactions between and within the biogeophysical and human environments lead to the production, processing, distribution, preparation and consumption of food, resulting in food systems that underpin food security. Food systems encompass food availability (production, distribution and exchange), food access (affordability, allocation and preference) and food utilization (nutritional and societal values and safety), so that food security is, therefore, diminished when food systems are stressed. Such stresses may be induced by a range of factors in addition to climate change and/or other agents of environmental change (e.g. conflict, HIV/AIDS) and may be particularly severe when these factors act in combination. Urbanization and globalization are causing rapid changes to food systems. Climate change may affect food systems in several ways ranging from direct effects on crop production (e.g. changes in rainfall leading to drought or flooding, or warmer or cooler temperatures leading to changes in the length of growing season), to changes in markets, food prices and supply chain infrastructure. The relative importance of climate change for food security differs between regions. For example, in southern Africa, climate is among the most frequently cited drivers of food insecurity because it acts both as an underlying, ongoing issue and as a short-lived shock. The low ability to cope with shocks and to mitigate long-term stresses means that coping strategies that might be available in other regions are unavailable or inappropriate. In other regions, though, such as parts of the Indo-Gangetic Plain of India, other drivers, such as labour issues and the availability and quality of ground water for irrigation, rank higher than the direct effects of climate change as factors influencing food security. Because of the multiple socio-economic and bio-physical factors affecting food systems and hence food security, the capacity to adapt food systems to reduce their vulnerability to climate change is not uniform. Improved systems of food production, food distribution and economic access may all contribute to food systems adapted to cope with climate change, but in adopting such changes it will be important to ensure that they contribute to sustainability. Agriculture is a major contributor of the greenhouse gases methane (CH4) and nitrous oxide (N2O), so that regionally derived policies promoting adapted food systems need to mitigate further climate change. PMID:16433099

  11. Reducing the environmental impact of dietary choice: perspectives from a behavioural and social change approach.

    PubMed

    Joyce, Andrew; Dixon, Sarah; Comfort, Jude; Hallett, Jonathan

    2012-01-01

    Climate change is recognised as a significant public health issue that will impact on food security. One of the major contributors to global warming is the livestock industry, and, relative to plant-based agriculture, meat production has a much higher environmental impact in relation to freshwater use, amount of land required, and waste products generated. Promoting increased consumption of plant-based foods is a recommended strategy to reduce human impact on the environment and is also now recognised as a potential strategy to reduce the high rates of some chronic diseases such as cardiovascular disease and certain cancers. Currently there is a scant evidence base for policies and programs aiming to increase consumption of plant-based diets and little research on the necessary conditions for that change to occur and the processes involved in such a change. This paper reviews some of the environmental and health consequences of current dietary practices, reviews literature on the determinants of consuming a plant-based diet, and provides recommendations for further research in this area.

  12. Reducing the Environmental Impact of Dietary Choice: Perspectives from a Behavioural and Social Change Approach

    PubMed Central

    Joyce, Andrew; Dixon, Sarah; Comfort, Jude; Hallett, Jonathan

    2012-01-01

    Climate change is recognised as a significant public health issue that will impact on food security. One of the major contributors to global warming is the livestock industry, and, relative to plant-based agriculture, meat production has a much higher environmental impact in relation to freshwater use, amount of land required, and waste products generated. Promoting increased consumption of plant-based foods is a recommended strategy to reduce human impact on the environment and is also now recognised as a potential strategy to reduce the high rates of some chronic diseases such as cardiovascular disease and certain cancers. Currently there is a scant evidence base for policies and programs aiming to increase consumption of plant-based diets and little research on the necessary conditions for that change to occur and the processes involved in such a change. This paper reviews some of the environmental and health consequences of current dietary practices, reviews literature on the determinants of consuming a plant-based diet, and provides recommendations for further research in this area. PMID:22754580

  13. Interdisciplinary assessment of sea-level rise and climate change impacts on the lower Nile delta, Egypt.

    PubMed

    Sušnik, Janez; Vamvakeridou-Lyroudia, Lydia S; Baumert, Niklas; Kloos, Julia; Renaud, Fabrice G; La Jeunesse, Isabelle; Mabrouk, Badr; Savić, Dragan A; Kapelan, Zoran; Ludwig, Ralf; Fischer, Georg; Roson, Roberto; Zografos, Christos

    2015-01-15

    CLImate-induced changes on WAter and SECurity (CLIWASEC) was a cluster of three complementary EC-FP7 projects assessing climate-change impacts throughout the Mediterranean on: hydrological cycles (CLIMB - CLimate-Induced changes on the hydrology of Mediterranean Basins); water security (WASSERMed - Water Availability and Security in Southern EuRope and the Mediterranean) and human security connected with possible hydro-climatic conflicts (CLICO - CLImate change hydro-COnflicts and human security). The Nile delta case study was common between the projects. CLIWASEC created an integrated forum for modelling and monitoring to understand potential impacts across sectors. This paper summarises key results from an integrated assessment of potential challenges to water-related security issues, focusing on expected sea-level rise impacts by the middle of the century. We use this common focus to illustrate the added value of project clustering. CLIWASEC pursued multidisciplinary research by adopting a single research objective: sea-level rise related water security threats, resulting in a more holistic view of problems and potential solutions. In fragmenting research, policy-makers can fail to understand how multiple issues can materialize from one driver. By combining efforts, an integrated assessment of water security threats in the lower Nile is formulated, offering policy-makers a clearer picture of inter-related issues to society and environment. The main issues identified by each project (land subsidence, saline intrusion - CLIMB; water supply overexploitation, land loss - WASSERMed; employment and housing security - CLICO), are in fact related. Water overexploitation is exacerbating land subsidence and saline intrusion, impacting on employment and placing additional pressure on remaining agricultural land and the underdeveloped housing market. All these have wider implications for regional development. This richer understanding could be critical in making better policy decisions when attempting to mitigate climate and social change impacts. The CLIWASEC clustering offers an encouraging path for the new European Commission Horizon 2020 programme to follow. Copyright © 2014 Elsevier B.V. All rights reserved.

  14. Strategy to Enhance International Supply Chain Security

    DTIC Science & Technology

    2007-07-01

    airports as part of the effort to secure air passenger travel . The security assessment crew traveling by air, land or sea cannot be considered only a... travel security issue. The assessment of a container ship’s crew or of a driver moving a truck into the secure area of a port are also supply chain...threats through its traveler screening and worker credentialing programs. The strategy to secure the supply chain reflects the larger security

  15. The environmental virtual observatory pilot (EVOp): a cloud solution demonstrating effective science for efficient decisions

    NASA Astrophysics Data System (ADS)

    Gurney, R. J.; Emmett, B.; McDonald, A.

    2012-12-01

    Environmental managers and policy makers face a challenging future trying to accommodate growing expectations of environmental well-being, while subject to maturing regulation, constrained budgets and a public scrutiny that expects easier and more meaningful access to data and decision logic. To support such a challenge requires new tools and new approaches. The EVOp is an initiative from the UK Natural Environment Research Council (NERC) designed to deliver proof of concept for these new tools and approaches. A series of exemplar 'big catchment science questions' are posed and the prospects for their solution are assessed. These are then used to develop cloud solutions for serving data, models, visualisation and analysis tools to scientists, regulators, private companies and the public, all of whom have different expectations of what environmental information is important. Approaches are tested regularly with users using SCRUM. The VO vision encompasses seven key ambitions: i. being driven by the need to contribute to the solution of major environmental issues that impinge on, or link to, catchment science ii. having the flexibility and adaptability to address future problems not yet defined or fully clarified iii. being able to communicate issues and solutions to a range of audiences iv. supporting easy access by a variety of users v. drawing meaningful information from data and models and identifying the constraints on application in terms of errors, uncertainties, etc vi. adding value and cost effectiveness to current investigations by supporting transfer and scale adjustment thus limiting the repetition of expensive field monitoring addressing essentially the same issues in varying locations vii. promoting effective interfacing of robust science with a variety of end users by using terminology or measures familiar to the user (or required by regulation), including financial and carbon accounting, whole life or fixed period costing, risk as probability or as disability adjusted life years/ etc as appropriate Architectures pivotal to communicating these ambitions are presented. Cloud computing facilitates the required interoperability across data sets, models, visualisations etc. There are also additional legal, security, culrural and standards barriers that need to be solved before such a cloud becomes operational.

  16. ADVANCED CERAMIC MATERIALS FOR NEXT-GENERATION NUCLEAR APPLICATIONS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marra, J.

    2010-09-29

    Rising global energy demands coupled with increased environmental concerns point to one solution; they must reduce their dependence on fossil fuels that emit greenhouse gases. As the global community faces the challenge of maintaining sovereign nation security, reducing greenhouse gases, and addressing climate change nuclear power will play a significant and likely growing role. In the US, nuclear energy already provides approximately one-fifth of the electricity used to power factories, offices, homes, and schools with 104 operating nuclear power plants, located at 65 sites in 31 states. Additionally, 19 utilities have applied to the US Nuclear Regulatory Commission (NRC) formore » construction and operating licenses for 26 new reactors at 17 sites. This planned growth of nuclear power is occurring worldwide and has been termed the 'nuclear renaissance.' As major industrial nations craft their energy future, there are several important factors that must be considered about nuclear energy: (1) it has been proven over the last 40 years to be safe, reliable and affordable (good for Economic Security); (2) its technology and fuel can be domestically produced or obtained from allied nations (good for Energy Security); and (3) it is nearly free of greenhouse gas emissions (good for Environmental Security). Already an important part of worldwide energy security via electricity generation, nuclear energy can also potentially play an important role in industrial processes and supporting the nation's transportation sector. Coal-to-liquid processes, the generation of hydrogen and supporting the growing potential for a greatly increased electric transportation system (i.e. cars and trains) mean that nuclear energy could see dramatic growth in the near future as we seek to meet our growing demand for energy in cleaner, more secure ways. In order to address some of the prominent issues associated with nuclear power generation (i.e., high capital costs, waste management, and proliferation), the worldwide community is working to develop and deploy new nuclear energy systems and advanced fuel cycles. These new nuclear systems address the key challenges and include: (1) extracting the full energy value of the nuclear fuel; (2) creating waste solutions with improved long term safety; (3) minimizing the potential for the misuse of the technology and materials for weapons; (4) continually improving the safety of nuclear energy systems; and (5) keeping the cost of energy affordable.« less

  17. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-06-08

    Security Grant Program ...............................................................................6 Intercity Passenger Rail Program (Amtrak...6 Intercity Bus Security Grant Program...fy2009.pdf. 19 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services between high-risk

  18. Department of Homeland Security Assistance to States and Localities: A Summary and Issues for the 111th Congress

    DTIC Science & Technology

    2009-08-05

    Freight Rail Security Grant Program ...............................................................................6 Intercity Passenger Rail Program...Amtrak) .....................................................................6 Intercity Bus Security Grant Program...overview- fy2009.pdf. 19 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services

  19. 15 CFR 2008.16 - Security education program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 3 2010-01-01 2010-01-01 false Security education program. 2008.16... REPRESENTATIVE Safeguards § 2008.16 Security education program. (a) The Office of the Special Representative for... charged with the implementation of this security education program and shall issue detailed procedures for...

  20. 26 CFR 1.475(b)-4 - Exemptions-transitional issues.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...) Transitional identification—(1) Certain securities previously identified under section 1236. If, as of the close of the last taxable year ending before December 31, 1993, a security was identified under section 1236 as a security held for investment, the security is treated as being identified as held for...

  1. 31 CFR 344.10 - What are Special Zero Interest securities?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false What are Special Zero Interest...-STATE AND LOCAL GOVERNMENT SERIES Special Zero Interest Securities § 344.10 What are Special Zero Interest securities? Special zero interest securities were issued as certificates of indebtedness and notes...

  2. 31 CFR 344.10 - What are Special Zero Interest securities?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What are Special Zero Interest...-STATE AND LOCAL GOVERNMENT SERIES Special Zero Interest Securities § 344.10 What are Special Zero Interest securities? Special zero interest securities were issued as certificates of indebtedness and notes...

  3. 31 CFR 354.1 - Definitions of terms.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING BOOK-ENTRY SECURITIES OF THE... the claimant for another Person to hold, transfer, or deal with the Security. (b) Book-entry Sallie Mae Security means a Sallie Mae Security issued or maintained in the Book-entry System. (c) Book-entry...

  4. Computer-Based Testing: Test Site Security.

    ERIC Educational Resources Information Center

    Rosen, Gerald A.

    Computer-based testing places great burdens on all involved parties to ensure test security. A task analysis of test site security might identify the areas of protecting the test, protecting the data, and protecting the environment as essential issues in test security. Protecting the test involves transmission of the examinations, identifying the…

  5. 29 CFR 2509.75-3 - Interpretive bulletin relating to investments by employee benefit plans in securities of...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... Interpretive bulletin relating to investments by employee benefit plans in securities of registered investment.... That section provides that an investment by an employee benefit plan in securities issued by an...

  6. Issues of Falsifying Financial Statements in Terms of Economic Security

    ERIC Educational Resources Information Center

    Zhitlukhina, Olga G.; Rakutko, Svetlana Y.; Berezhnova, Elena I.; Selezneva, Elena Y.; Belik, Elena V.; Shalaeva, Nina I.; Denisevich, Elena I.; Belik, Natalia V.; Saenko, Zhanna E.; Sultanova, Alina A.

    2016-01-01

    The paper deals with problems of the country's economic security and entities, timely resolution of which influences directly the country's national security. The cornerstone of successful existence of any country, especially the Russian Federation, during such complicated period is the presence of effective national economic security system.…

  7. Security: Progress and Challenges

    ERIC Educational Resources Information Center

    Luker, Mark A.

    2004-01-01

    The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…

  8. Ergonomics issues in national identity card for homeland security.

    PubMed

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  9. Energy technology evaluation report: Energy security

    NASA Astrophysics Data System (ADS)

    Koopman, R.; Lamont, A.; Schock, R.

    1992-09-01

    Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.

  10. Aviation security : weaknesses in airport security and options for assigning screening responsibilities

    DOT National Transportation Integrated Search

    2001-09-21

    This is the statement of Gerald L. Dillingham, Director, Physical Infrastructure Issues before the Subcommittee on Aviation, Committee on Transportation and Infrastructure, House of Representatives regarding aviation safety and security. The statemen...

  11. 76 FR 18445 - Financial Market Utilities

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ... IOSCO jointly issued a set of minimum standards for securities settlement systems (the ``Recommendations for Securities Settlement Systems''). In 2004, the CPSS and IOSCO jointly published recommendations...,'' and collectively with the Recommendations for Securities Settlement Systems, the ``CPSS-IOSCO...

  12. 30 CFR 280.31 - Whom will MMS notify about environmental issues?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 30 Mineral Resources 2 2010-07-01 2010-07-01 false Whom will MMS notify about environmental issues... Obligations Under This Part Environmental Issues § 280.31 Whom will MMS notify about environmental issues? (a... submission for approval. (b) In cases where an environmental assessment is to be prepared, the Director will...

  13. Wireless physical layer security

    NASA Astrophysics Data System (ADS)

    Poor, H. Vincent; Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  14. Wireless physical layer security.

    PubMed

    Poor, H Vincent; Schaefer, Rafael F

    2017-01-03

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.

  15. MAC layer security issues in wireless mesh networks

    NASA Astrophysics Data System (ADS)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  16. Wireless physical layer security

    PubMed Central

    Schaefer, Rafael F.

    2017-01-01

    Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments. PMID:28028211

  17. Final report for the Integrated and Robust Security Infrastructure (IRSI) laboratory directed research and development project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hutchinson, R.L.; Hamilton, V.A.; Istrail, G.G.

    1997-11-01

    This report describes the results of a Sandia-funded laboratory-directed research and development project titled {open_quotes}Integrated and Robust Security Infrastructure{close_quotes} (IRSI). IRSI was to provide a broad range of commercial-grade security services to any software application. IRSI has two primary goals: application transparency and manageable public key infrastructure. IRSI must provide its security services to any application without the need to modify the application to invoke the security services. Public key mechanisms are well suited for a network with many end users and systems. There are many issues that make it difficult to deploy and manage a public key infrastructure. IRSImore » addressed some of these issues to create a more manageable public key infrastructure.« less

  18. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1981-11-09

    which have been prevented or deterred by airline and airport security procedures cannot be determined with certainty. The Federal Aviation Administration...finalized and issued. The new FAR Part 108, Air Carrier Security and complementary changes to FAR Part 107, Airport Security , and FAR Part 129, Operations...initiated audit of the claims and, if verified, action will be taken to seek funding for payment. Airport Security . Airport security measures continue to be

  19. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium.

    PubMed

    Somasundaram, M; Sivakumar, R

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security.

  20. Climate Change, Globalization and Geopolitics in the New Maritime Arctic

    NASA Astrophysics Data System (ADS)

    Brigham, L. W.

    2011-12-01

    Early in the 21st century a confluence of climate change, globalization and geopolitics is shaping the future of the maritime Arctic. This nexus is also fostering greater linkage of the Arctic to the rest of the planet. Arctic sea ice is undergoing a historic transformation of thinning, extent reduction in all seasons, and reduction in the area of multiyear ice in the central Arctic Ocean. Global Climate Model simulations of Arctic sea ice indicate multiyear ice could disappear by 2030 for a short period of time each summer. These physical changes invite greater marine access, longer seasons of navigation, and potential, summer trans-Arctic voyages. As a result, enhanced marine safety, environmental protection, and maritime security measures are under development. Coupled with climate change as a key driver of regional change is the current and future integration of the Arctic's natural wealth with global markets (oil, gas and hard minerals). Abundant freshwater in the Arctic could also be a future commodity of value. Recent events such as drilling for hydrocarbons off Greenland's west coast and the summer marine transport of natural resources from the Russian Arctic to China across the top of Eurasia are indicators of greater global economic ties to the Arctic. Plausible Arctic futures indicate continued integration with global issues and increased complexity of a range of regional economic, security and environmental challenges.

Top