A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms
NASA Astrophysics Data System (ADS)
Hassan, Ahmed A.; Bahgat, Waleed M.
2010-01-01
Security policies have different components; firewall, active directory, and IDS are some examples of these components. Enforcement of network security policies to low level security mechanisms faces some essential difficulties. Consistency, verification, and maintenance are the major ones of these difficulties. One approach to overcome these difficulties is to automate the process of translation of high level security policy into low level security mechanisms. This paper introduces a framework of an automation process that translates a high level security policy into low level security mechanisms. The framework is described in terms of three phases; in the first phase all network assets are categorized according to their roles in the network security and relations between them are identified to constitute the network security model. This proposed model is based on organization based access control (OrBAC). However, the proposed model extend the OrBAC model to include not only access control policy but also some other administrative security policies like auditing policy. Besides, the proposed model enables matching of each rule of the high level security policy with the corresponding ones of the low level security policy. Through the second phase of the proposed framework, the high level security policy is mapped into the network security model. The second phase could be considered as a translation of the high level security policy into an intermediate model level. Finally, the intermediate model level is translated automatically into low level security mechanism. The paper illustrates the applicability of proposed approach through an application example.
6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”
Code of Federal Regulations, 2011 CFR
2011-01-01
... a high level of security risk.â 27.205 Section 27.205 Domestic Security DEPARTMENT OF HOMELAND... Program § 27.205 Determination that a chemical facility “presents a high level of security risk.” (a... a high level of security risk based on any information available (including any information...
6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Determination that a chemical facility âpresents a high level of security risk.â 27.205 Section 27.205 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security...
O'Campo, Patricia; Hwang, Stephen W; Gozdzik, Agnes; Schuler, Andrée; Kaufman-Shriqui, Vered; Poremski, Daniel; Lazgare, Luis Ivan Palma; Distasio, Jino; Belbraouet, Slimane; Addorisio, Sindi
2017-08-01
Individuals experiencing homelessness are particularly vulnerable to food insecurity. The At Home/Chez Soi study provides a unique opportunity to first examine baseline levels of food security among homeless individuals with mental illness and second to evaluate the effect of a Housing First (HF) intervention on food security in this population. At Home/Chez Soi was a 2-year randomized controlled trial comparing the effectiveness of HF compared with usual care among homeless adults with mental illness, stratified by level of need for mental health services (high or moderate). Logistic regressions tested baseline associations between food security (US Food Security Survey Module), study site, sociodemographic variables, duration of homelessness, alcohol/substance use, physical health and service utilization. Negative binomial regression determined the impact of the HF intervention on achieving levels of high or marginal food security over an 18-month follow-up period (6 to 24 months). Community settings at five Canadian sites (Moncton, Montreal, Toronto, Winnipeg and Vancouver). Homeless adults with mental illness (n 2148). Approximately 41 % of our sample reported high or marginal food security at baseline, but this figure varied with gender, age, mental health issues and substance use problems. High need participants who received HF were more likely to achieve marginal or high food security than those receiving usual care, but only at the Toronto and Moncton sites. Our large multi-site study demonstrated low levels of food security among homeless experiencing mental illness. HF showed promise for improving food security among participants with high levels of need for mental health services, with notable site differences.
ERIC Educational Resources Information Center
Lafo, Joseph; Robillard, Marc
2001-01-01
Explains how high-rise residence halls can provide high-level safety and security at colleges and universities. Boston University is used to illustrate high-rise security and fire protection issues. (GR)
High-security communication by coherence modulation at the photon-counting level.
Rhodes, William T; Boughanmi, Abdellatif; Moreno, Yezid Torres
2016-05-20
We show that key-specified interferometer path-length difference modulation (often referred to as coherence modulation), operating in the photon-counting regime with a broadband source, can provide a quantifiably high level of physics-guaranteed security for binary signal transmission. Each signal bit is associated with many photocounts, perhaps numbering in the thousands. Of great importance, the presence of an eavesdropper can be quickly detected. We first review the operation of key-specified coherence modulation at high light levels, illustrating by means of an example its lack of security against attack. We then show, using the same example, that, through the reduction of light intensities to photon-counting levels, a high level of security can be attained. A particular attack on the system is analyzed to demonstrate the quantifiability of the scheme's security, and various remaining research issues are discussed. A potential weakness of the scheme lies in a possible vulnerability to light amplification by an attacker.
Pangalos, George
2001-01-01
Background The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. Objective To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. Methods We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. Results We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. Conclusions The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a specific implementation environment. When implemented in specific environments, these principles and guidelines must also be complemented by measures, which are more specific. Even when a High Level Security Policy already exists in an institution, it is advisable that the management of the Health Care Establishment periodically revisits it to see whether it should be modified or augmented. PMID:11720956
Ilioudis, C; Pangalos, G
2001-01-01
The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a specific implementation environment. When implemented in specific environments, these principles and guidelines must also be complemented by measures, which are more specific. Even when a High Level Security Policy already exists in an institution, it is advisable that the management of the Health Care Establishment periodically revisits it to see whether it should be modified or augmented.
Verification of Security Policy Enforcement in Enterprise Systems
NASA Astrophysics Data System (ADS)
Gupta, Puneet; Stoller, Scott D.
Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aderholdt, Ferrol; Caldwell, Blake A.; Hicks, Susan Elaine
High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges formore » the use of shared infrastructure in HPC environments. This report details current state-of-the-art in virtualization, reconfigurable network enclaving via Software Defined Networking (SDN), and storage architectures and bridging techniques for creating secure enclaves in HPC environments.« less
The effects of environmental resource and security on aggressive behavior.
Ng, Henry Kin Shing; Chow, Tak Sang
2017-05-01
Exposure to different environments has been reported to change aggressive behavior, but previous research did not consider the underlying elements that caused such an effect. Based on previous work on environmental perception, we examined the role of environmental resource and security in altering aggression level. In three experiments, participants were exposed to environments that varied in resource (High vs. Low) and security (High vs. Low) levels, after which aggression was measured. The environments were presented through visual priming (Experiments 1-2) and a first-person gameplay (Experiment 3). We observed a consistent resource-security interaction effect on aggression, operationalized as the level of noise blast (Experiment 1) and number of unpleasant pictures (Experiments 2-3) delivered to strangers by the participants. High resource levels associated with higher aggression in insecure conditions, but lower aggression in secure conditions. The findings suggest that the adaptive value of aggression varies under different environmental constraints. Implications are discussed in terms of the effects of adverse environments on aggression, and the nature's effects on social behavior. Aggr. Behav. 43:304-314, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.
Marital Biography, Social Security Receipt, and Poverty.
Lin, I-Fen; Brown, Susan L; Hammersmith, Anna M
2017-01-01
Increasingly, older adults are unmarried, which could mean a larger share is at risk of economic disadvantage. Using data from the 2010 Health and Retirement Study, we chart the diverse range of marital biographies, capturing marital sequences and timing, of adults who are age eligible for Social Security and examine three indicators of economic well-being: Social Security receipt, Social Security benefit levels, and poverty status. Partnereds are disproportionately likely to receive Social Security and they enjoy relatively high Social Security benefits and very low poverty levels. Among singles, economic well-being varies by marital biography and gender. Gray divorced and never-married women face considerable economic insecurity. Their Social Security benefits are relatively low, and their poverty rates are quite high (over 25%), indicating Social Security alone is not sufficient to prevent these women from falling into poverty. By comparison, gray widoweds are the most advantaged singles.
Marital Biography, Social Security Receipt, and Poverty
Lin, I-Fen; Brown, Susan L.; Hammersmith, Anna M.
2017-01-01
Increasingly, older adults are unmarried, which could mean a larger share is at risk of economic disadvantage. Using data from the 2010 Health and Retirement Study, we chart the diverse range of marital biographies, capturing marital sequences and timing, of adults who are age eligible for Social Security and examine three indicators of economic well-being: Social Security receipt, Social Security benefit levels, and poverty status. Partnereds are disproportionately likely to receive Social Security and they enjoy relatively high Social Security benefits and very low poverty levels. Among singles, economic well-being varies by marital biography and gender. Gray divorced and never-married women face considerable economic insecurity. Their Social Security benefits are relatively low, and their poverty rates are quite high (over 25%), indicating Social Security alone is not sufficient to prevent these women from falling into poverty. By comparison, gray widoweds are the most advantaged singles. PMID:28181867
Dolan, Mairead; Blattner, Regine
2010-09-29
Structured Professional Judgment (SPJ) approaches to violence risk assessment are increasingly being adopted into clinical practice in international forensic settings. The aim of this study was to examine the predictive validity of the Historical Clinical Risk -20 (HCR-20) violence risk assessment scale for outcome following transfers from high to medium security in a United Kingdom setting. The sample was predominately male and mentally ill and the majority of cases were detained under the criminal section of the Mental Health Act (1986). The HCR-20 was rated based on detailed case file information on 72 cases transferred from high to medium security. Outcomes were examined, independent of risk score, and cases were classed as "success or failure" based on established criteria. The mean length of follow up was 6 years. The total HCR-20 score was a robust predictor of failure at lower levels of security and return to high security. The Clinical and Risk management items contributed most to predictive accuracy. Although the HCR-20 was designed as a violence risk prediction tool our findings suggest it has potential utility in decisions to transfer patients from high to lower levels of security.
Gross anatomy of network security
NASA Technical Reports Server (NTRS)
Siu, Thomas J.
2002-01-01
Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.
McCue, M J; Thompson, J M; Dodd-McCue, D
Using a resource dependency framework and financial theory, this study assessed the market, mission, operational, and financial factors associated with the level of cash and security investments in hospitals. We ranked hospitals in the study sample based on their cash and security investments as a percentage of total assets: hospitals in the high cash/security investment category were in the top 25th percentile of all hospitals; those in the low cash/security investment group were in the bottom 25th percentile. Findings indicate that high cash/security investment hospitals are under either public or private nonprofit ownership and have greater market share. They also serve more complex cases, offer more technology services, generate greater profits, incur a more stable patient revenue base, and maintain less debt.
Morone, Piergiuseppe; Camacho Cuena, Eva; Kocur, Ivo; Banatvala, Nicholas
2014-05-01
This article empirically evaluates advocacy in low- and middle-income countries as a key tool for raising policy priority and securing high-level decision maker support in eye health. We used a unique data set based on a survey conducted by World Health Organization in 2011 on eye care and prevention of blindness in 82 low- and middle-income countries. The theoretical framework derives from the idea that a plethora of stakeholders at local and global level pressure national governments, acting in economic and the political spheres. Previously, eye care has not been investigated in such a framework. We found structural differences across countries with different income levels and proposed policy recommendations to secure high-level decision makers' support for promoting eye health. Three case studies suggest that, in order to secure more support and resources for eye health, domestic and international stakeholders must strengthen their engagement with ministries of health at political and above all economic levels.
Science of Security Lablet - Scalability and Usability
2014-12-16
mobile computing [19]. However, the high-level infrastructure design and our own implementation (both described throughout this paper) can easily...critical and infrastructural systems demands high levels of sophistication in the technical aspects of cybersecurity, software and hardware design...Forget, S. Komanduri, Alessandro Acquisti, Nicolas Christin, Lorrie Cranor, Rahul Telang. "Security Behavior Observatory: Infrastructure for Long-term
Trust-Based Security Level Evaluation Using Bayesian Belief Networks
NASA Astrophysics Data System (ADS)
Houmb, Siv Hilde; Ray, Indrakshi; Ray, Indrajit; Chakraborty, Sudip
Security is not merely about technical solutions and patching vulnerabilities. Security is about trade-offs and adhering to realistic security needs, employed to support core business processes. Also, modern systems are subject to a highly competitive market, often demanding rapid development cycles, short life-time, short time-to-market, and small budgets. Security evaluation standards, such as ISO 14508 Common Criteria and ISO/IEC 27002, are not adequate for evaluating the security of many modern systems for resource limitations, time-to-market, and other constraints. Towards this end, we propose an alternative time and cost effective approach for evaluating the security level of a security solution, system or part thereof. Our approach relies on collecting information from different sources, who are trusted to varying degrees, and on using a trust measure to aggregate available information when deriving security level. Our approach is quantitative and implemented as a Bayesian Belief Network (BBN) topology, allowing us to reason over uncertain information and seemingly aggregating disparate information. We illustrate our approach by deriving the security level of two alternative Denial of Service (DoS) solutions. Our approach can also be used in the context of security solution trade-off analysis.
Protection of data carriers using secure optical codes
NASA Astrophysics Data System (ADS)
Peters, John A.; Schilling, Andreas; Staub, René; Tompkin, Wayne R.
2006-02-01
Smartcard technologies, combined with biometric-enabled access control systems, are required for many high-security government ID card programs. However, recent field trials with some of the most secure biometric systems have indicated that smartcards are still vulnerable to well equipped and highly motivated counterfeiters. In this paper, we present the Kinegram Secure Memory Technology which not only provides a first-level visual verification procedure, but also reinforces the existing chip-based security measures. This security concept involves the use of securely-coded data (stored in an optically variable device) which communicates with the encoded hashed information stored in the chip memory via a smartcard reader device.
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-04-12
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.
Sensor data security level estimation scheme for wireless sensor networks.
Ramos, Alex; Filho, Raimir Holanda
2015-01-19
Due to their increasing dissemination, wireless sensor networks (WSNs) have become the target of more and more sophisticated attacks, even capable of circumventing both attack detection and prevention mechanisms. This may cause WSN users, who totally trust these security mechanisms, to think that a sensor reading is secure, even when an adversary has corrupted it. For that reason, a scheme capable of estimating the security level (SL) that these mechanisms provide to sensor data is needed, so that users can be aware of the actual security state of this data and can make better decisions on its use. However, existing security estimation schemes proposed for WSNs fully ignore detection mechanisms and analyze solely the security provided by prevention mechanisms. In this context, this work presents the sensor data security estimator (SDSE), a new comprehensive security estimation scheme for WSNs. SDSE is designed for estimating the sensor data security level based on security metrics that analyze both attack prevention and detection mechanisms. In order to validate our proposed scheme, we have carried out extensive simulations that show the high accuracy of SDSE estimates.
Sensor Data Security Level Estimation Scheme for Wireless Sensor Networks
Ramos, Alex; Filho, Raimir Holanda
2015-01-01
Due to their increasing dissemination, wireless sensor networks (WSNs) have become the target of more and more sophisticated attacks, even capable of circumventing both attack detection and prevention mechanisms. This may cause WSN users, who totally trust these security mechanisms, to think that a sensor reading is secure, even when an adversary has corrupted it. For that reason, a scheme capable of estimating the security level (SL) that these mechanisms provide to sensor data is needed, so that users can be aware of the actual security state of this data and can make better decisions on its use. However, existing security estimation schemes proposed for WSNs fully ignore detection mechanisms and analyze solely the security provided by prevention mechanisms. In this context, this work presents the sensor data security estimator (SDSE), a new comprehensive security estimation scheme for WSNs. SDSE is designed for estimating the sensor data security level based on security metrics that analyze both attack prevention and detection mechanisms. In order to validate our proposed scheme, we have carried out extensive simulations that show the high accuracy of SDSE estimates. PMID:25608215
Worry about terror among young adults living in ongoing security uncertainty.
Peleg, Ora; Mass-Friedman, Michelle
2013-01-01
The aim of the current study was to investigate worry about terror as a mediating variable, with the exogenous variables being media viewing, differentiation of self, and trait anxiety, and the endogenous variables being somatic symptoms and perceptions of security-related stress. Participants were divided into two groups by age/academic level: 248 high school students and 191 university students. A pathway correlation model was used to investigate worry about terror as a mediating variable. The central finding was that worry about terror was a significant mediating variable in the relationship between the extent of media viewing following terror events and the level of perception of security-related stress. That is, young people who said they worried a lot reported a high level of stress relating to the terror events they saw covered in the media. In addition, trait anxiety was found to have an effect on stress perception only via the level of worry about terror. This means that high levels of stress are not experienced by all highly trait-anxious people, but only by those who suffer from higher levels of worry about terror.
NASA Astrophysics Data System (ADS)
Moia, Franco
2002-04-01
With linear photo-polymerization (LPP) ROLIC has invented a photo-patternable technology enabling to align not only conventional liquid crystals but also liquid crystals polymers (LCP). ROLIC's optical security device technology derives from its LPP/LCP technology. LPP/LCP security devices are created by structured photo-alignment of an LPP layer through phot-masks, thus generating a high resolution, photo-patterned aligning layer which carries the aligning information of the image to be created. The subsequent LCP layer transforms the aligning information into an optical phase image with low and/or very high information content, such as invisible photographic pictures. The building block capability of the LPP/LCP technology allows the manufacturing of cholesteric and non-cholesteric LPP/LCP devices which cover 1st and/or 2nd level applications. Apart from black/white security devices colored information zones can be integrated. Moreover, we have developed an LPP/LCP security device which covers all three- 1st, 2nd and 3rd- inspection levels in one and the same authentication device: besides a color shift by tilting the device (1st level) and the detection of normally hidden information by use of a simple sheet polarizer (2nd level) the new device contains encrypted hidden information which can be visualized only by superimposing an LPP/LCP inspection tool (key) for decryption (3rd level). This optical key is also based on the LPP/LCP technology and is itself a 3rd level security device.
Foundational Security Principles for Medical Application Platforms* (Extended Abstract)
Vasserman, Eugene Y.; Hatcliff, John
2014-01-01
We describe a preliminary set of security requirements for safe and secure next-generation medical systems, consisting of dynamically composable units, tied together through a real-time safety-critical middleware. We note that this requirement set is not the same for individual (stand-alone) devices or for electronic health record systems, and we must take care to define system-level requirements rather than security goals for components. The requirements themselves build on each other such that it is difficult or impossible to eliminate any one of the requirements and still achieve high-level security goals. PMID:25599096
Fragmentation in social security old-age benefit provision in China.
Chen, Tianhong; Turner, John A
2015-01-01
Currently, in many countries most workers are covered by a national social security benefits program that applies equally in all parts of the country. In China, however, social security old-age benefits are provided in a highly fragmented manner. This article documents the high degree of fragmentation. It discusses both why that has occurred and the effects of the fragmentation on participants. It examines effects of the fragmentation on benefit levels, focusing on variations in the generosity of benefit formulas but also considering other measures of benefit adequacy. Fragmentation is seen to cause differences in benefit levels even within a single city. While the new National Rural Pension Scheme is a major improvement in the provision of retirement security for rural workers, important differences still exist in the social security programs for urban and rural workers.
All-optical video-image encryption with enforced security level using independent component analysis
NASA Astrophysics Data System (ADS)
Alfalou, A.; Mansour, A.
2007-10-01
In the last two decades, wireless communications have been introduced in various applications. However, the transmitted data can be, at any moment, intercepted by non-authorized people. That could explain why data encryption and secure transmission have gained enormous popularity. In order to secure data transmission, we should pay attention to two aspects: transmission rate and encryption security level. In this paper, we address these two aspects by proposing a new video-image transmission scheme. This new system consists in using the advantage of optical high transmission rate and some powerful signal processing tools to secure the transmitted data. The main idea of our approach is to secure transmitted information at two levels: at the classical level by using an adaptation of standard optical techniques and at a second level (spatial diversity) by using independent transmitters. In the second level, a hacker would need to intercept not only one channel but all of them in order to retrieve information. At the receiver, we can easily apply ICA algorithms to decrypt the received signals and retrieve information.
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-01-01
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866
A comparison of offenders with intellectual disability across three levels of security.
Hogue, Todd; Steptoe, Lesley; Taylor, John L; Lindsay, William R; Mooney, Paul; Pinkney, Lisa; Johnston, Susan; Smith, Anne H W; O'Brien, Gregory
2006-01-01
A number of authors have described, with disparate results, the prevalence of people with intellectual disability and their characteristics, in a range of offender cohorts defined by service use. These have included high security, a range of criminal justice services and community services. There is a need for research comparing cohorts of offenders with intellectual disabilities across different settings. AIM AND HYPOTHESIS: To conduct such a comparison and test the hypothesis that severity of characteristics measured will be highest in highest levels of residential security. A clinical-record-based comparison a offenders with intellectual disability in high security (n = 73), medium/low security (n = 70), and a community service (n = 69). Groups were similar in age and tested IQ levels. Early psychiatric service contact had been more likely in the lower security groups. In line with the hypothesis, more complex presentations, in particular comorbid personality disorder, was more likely in the highest security group. Both fatal and non-fatal interpersonal violence convictions were significantly related to group, with more in the high security group sustaining a conviction both at the index offence and prior to that. Over 50% of all groups had at least one conviction for a sexual offence. A regression model accounting for 78% of the variance was made up largely of disposal variables (Mental Health Act status and probation) and indications of antisocial traits (criminal damage, lifetime conviction for murder and ICD-10 personality disorder classification). The authors show that context of sampling affects most relationships between intellectual disability (ID) and offending when the methods for measuring ID are held constant. The results also present several questions on the relationship between risk, services available in an area and referral to higher security.
Zhang, Li; Chen, Ying; Wang, Shu-tao; Men, Ming-xin; Xu, Hao
2015-08-01
Assessment and early warning of land ecological security (LES) in rapidly urbanizing coastal area is an important issue to ensure sustainable land use and effective maintenance of land ecological security. In this study, an index system for the land ecological security of Caofeidian new district was established based on the Pressure-State-Response (P-S-R) model. Initial assessment units of 1 km x 1 km created with the remote sensing data and GIS methods were spatially interpolated to a fine pixel size of 30 m x 30 m, which were combined with the early warning method (using classification tree method) to evaluate the land ecological security of Caofeidian in 2005 and 2013. The early warning level was classed into four categories: security with degradation potential, sub-security with slow degradation, sub-security with rapid degradation, and insecurity. Result indicated that, from 2005 to 2013, the average LES of Caofeidian dropped from 0.55 to 0.52, indicating a degradation of land ecological security from medium security level to medium-low security level. The areas at the levels of insecurity with rapid degradation were mainly located in the rapid urbanization areas, illustrating that rapid expansion of urban construction land was the key factor to the deterioration of the regional land ecological security. Industrial District, Shilihai town and Nanpu saltern, in which the lands at the levels of insecurity and sub-security with rapid degradation or slow degradation accounted for 58.3%, 98.9% and 81.2% of their respective districts, were at the stage of high early warning. Thus, land ecological security regulation for these districts should be strengthened in near future. The study could provide a reference for land use planning and ecological protection of Caofeidian new district.
OS friendly microprocessor architecture: Hardware level computer security
NASA Astrophysics Data System (ADS)
Jungwirth, Patrick; La Fratta, Patrick
2016-05-01
We present an introduction to the patented OS Friendly Microprocessor Architecture (OSFA) and hardware level computer security. Conventional microprocessors have not tried to balance hardware performance and OS performance at the same time. Conventional microprocessors have depended on the Operating System for computer security and information assurance. The goal of the OS Friendly Architecture is to provide a high performance and secure microprocessor and OS system. We are interested in cyber security, information technology (IT), and SCADA control professionals reviewing the hardware level security features. The OS Friendly Architecture is a switched set of cache memory banks in a pipeline configuration. For light-weight threads, the memory pipeline configuration provides near instantaneous context switching times. The pipelining and parallelism provided by the cache memory pipeline provides for background cache read and write operations while the microprocessor's execution pipeline is running instructions. The cache bank selection controllers provide arbitration to prevent the memory pipeline and microprocessor's execution pipeline from accessing the same cache bank at the same time. This separation allows the cache memory pages to transfer to and from level 1 (L1) caching while the microprocessor pipeline is executing instructions. Computer security operations are implemented in hardware. By extending Unix file permissions bits to each cache memory bank and memory address, the OSFA provides hardware level computer security.
Cramm, Jane M; Nieboer, Anna P
2014-07-01
To determine whether the neighborhood attributes solidarity and security positively affect the well-being of community-dwelling older people in the Netherlands after accounting for individual characteristics, and to test if a higher level of security in combination with a stronger sense of neighborhood solidarity results in a higher level of well-being. The study sample for the cross-sectional study consisted of 869 out of 2212 (39% response rate) independently-living older adults (aged >70 years) in 92 neighborhoods of Rotterdam. We fitted a hierarchical random-effects model to account for the structure of the study design: 869 older people (level 1) nested in 92 neighborhoods (level 2) in 10 districts (level 3). Neighborhood security and solidarity among neighbors varied significantly among the 10 districts. Univariate analyses showed that education, income, neighborhood security and solidarity within neighborhoods (all P ≤ 0.001) were significantly related to the well-being of community-dwelling older people. Multilevel analyses showed neighborhood security and solidarity within neighborhoods predicted the well-being of community-dwelling older people. Furthermore, a positive interaction effect was found between neighborhood security and solidarity within neighborhoods, and well-being of community-dwelling older people. Neighborhood security and solidarity among neighbors are important for the well-being of community-dwelling older people. Furthermore, neighborhoods with high levels of perceived security in combination with stronger solidarity among neighbors are especially beneficial to the well-being of community-dwelling older people. © 2013 Japan Geriatrics Society.
Framework for Flexible Security in Group Communications
NASA Technical Reports Server (NTRS)
McDaniel, Patrick; Prakash, Atul
2006-01-01
The Antigone software system defines a framework for the flexible definition and implementation of security policies in group communication systems. Antigone does not dictate the available security policies, but provides high-level mechanisms for implementing them. A central element of the Antigone architecture is a suite of such mechanisms comprising micro-protocols that provide the basic services needed by secure groups.
Krasnyanskaya, T M; Tylets, V G
The present work was designed to address the problem of ensuring the psychological security in the framework of organization of the rehabilitative treatment based at the spa and health resort facilities. We undertook the questionnaire study for which 650 subjects were recruited among those attending spa and health resort facilities of the cities of Essentuki and Kislovodsk. The participants were asked to estimate the level of their personal security and the quality of the provided means for the rehabilitative treatment and general health improvement. It was found that as many as 43% of the respondents reported the moderate level of psychological security whereas about 30% of them estimated the level of their psychological security as low. Overall, the attitude toward the available means for health improvement and rehabilitation proved extremely variable. The factorial analysis has demonstrated the highly subjective opinions of the responders as regards the provided services categorized in terms of therapeutic (mineral water, preformed physical factors, peloid and dietary therapy), health improvement (herbal medicine, therapeutic physical training, therapy, bioclimatic therapy), and recreational (animation, excursion and touristic activities) factors. The value of these factors was perceived differently by the vacationers with different feelings of psychological security. Those reporting the high level of psychological security demonstrated the positive attitude toward all factors and circumstances available for the general improvement of the health status whereas the holidaymakers reporting the moderate level of personal psychological security exhibited the non-equivalent attitude toward the provided services; namely, they highly estimated the available therapeutic factors but either underestimated the value of the constituent components of the health improving and recreational factors or demonstrated the very selective attitude toward their assessment. Generally speaking, the feeling of personal psychological security in the participants of the study reflected their subjective approach to structuralization and differentiation of the factors underlying the effectiveness, final outcome, and psychological security of the spa and health resort-based rehabilitative treatment. The results of the present study give evidence of the paramount importance of personal psychological security as a most important factor contributing to the solution of problems facing the practice of the rehabilitation treatment based at the spa and health resort facilities. This work should be organized taking into consideration the necessity to ensure the feeling of personal security and psychological comfort in the holidaymakers as an indispensable prerequisite for the successful rehabilitative treatment of the vacationers and meeting the requirements of the holidaymakers.
Design, Development, and Automated Verification of an Integrity-Protected Hypervisor
2012-07-16
mechanism for implementing software virtualization. Since hypervisors execute at a very high privilege level, they must be secure. A fundamental security...using the CBMC model checker. CBMC verified XMHF?s implementation ? about 4700 lines of C code ? in about 80 seconds using less than 2GB of RAM. 15...Hypervisors are a popular mechanism for implementing software virtualization. Since hypervisors execute at a very high privilege level, they must be
Asia-Pacific Center for Security Studies Annual Report 2010
2010-01-01
focused symposium in the Maldives on combating terrorism involving officials from five South Asia nations; • A series of discussion periods in China on U.S...priorities and best practices among high-level security officials from the Republic of the Philippines, Sri Lanka, the Maldives and Mongolia; • A...international security featured as prominently in 2010 in so wide a range of security-related discussions: whether traditional security ( sinking of the
Völlm, Birgit A; Edworthy, Rachel; Huband, Nick; Talbot, Emily; Majid, Shazmin; Holley, Jessica; Furtado, Vivek; Weaver, Tim; McDonald, Ruth; Duggan, Conor
2018-01-01
Background: Many patients experience extended stays within forensic care, but the characteristics of long-stay patients are poorly understood. Aims: To describe the characteristics of long-stay patients in high and medium secure settings in England. Method: Detailed file reviews provided clinical, offending and risk data for a large representative sample of 401 forensic patients from 2 of the 3 high secure settings and from 23 of the 57 medium secure settings in England on 1 April 2013. The threshold for long-stay status was defined as 5 years in medium secure care or 10 years in high secure care, or 15 years in a combination of high and medium secure settings. Results: 22% of patients in high security and 18% in medium security met the definition for "long-stay," with 20% staying longer than 20 years. Of the long-stay sample, 58% were violent offenders (22% both sexual and violent), 27% had been convicted for violent or sexual offences whilst in an institutional setting, and 26% had committed a serious assault on staff in the last 5 years. The most prevalent diagnosis was schizophrenia (60%) followed by personality disorder (47%, predominantly antisocial and borderline types); 16% were categorised as having an intellectual disability. Overall, 7% of the long-stay sample had never been convicted of any offence, and 16.5% had no index offence prompting admission. Although some significant differences were found between the high and medium secure samples, there were more similarities than contrasts between these two levels of security. The treatment pathways of these long-stay patients involved multiple moves between settings. An unsuccessful referral to a setting of lower security was recorded over the last 5 years for 33% of the sample. Conclusions: Long-stay patients accounted for one fifth of the forensic inpatient population in England in this representative sample. A significant proportion of this group remain unsettled. High levels of personality pathology and the risk of assaults on staff and others within the care setting are likely to impact on treatment and management. Further research into the treatment pathways of longer stay patients is warranted to understand the complex trajectories of this group.
Völlm, Birgit A.; Edworthy, Rachel; Huband, Nick; Talbot, Emily; Majid, Shazmin; Holley, Jessica; Furtado, Vivek; Weaver, Tim; McDonald, Ruth; Duggan, Conor
2018-01-01
Background: Many patients experience extended stays within forensic care, but the characteristics of long-stay patients are poorly understood. Aims: To describe the characteristics of long-stay patients in high and medium secure settings in England. Method: Detailed file reviews provided clinical, offending and risk data for a large representative sample of 401 forensic patients from 2 of the 3 high secure settings and from 23 of the 57 medium secure settings in England on 1 April 2013. The threshold for long-stay status was defined as 5 years in medium secure care or 10 years in high secure care, or 15 years in a combination of high and medium secure settings. Results: 22% of patients in high security and 18% in medium security met the definition for “long-stay,” with 20% staying longer than 20 years. Of the long-stay sample, 58% were violent offenders (22% both sexual and violent), 27% had been convicted for violent or sexual offences whilst in an institutional setting, and 26% had committed a serious assault on staff in the last 5 years. The most prevalent diagnosis was schizophrenia (60%) followed by personality disorder (47%, predominantly antisocial and borderline types); 16% were categorised as having an intellectual disability. Overall, 7% of the long-stay sample had never been convicted of any offence, and 16.5% had no index offence prompting admission. Although some significant differences were found between the high and medium secure samples, there were more similarities than contrasts between these two levels of security. The treatment pathways of these long-stay patients involved multiple moves between settings. An unsuccessful referral to a setting of lower security was recorded over the last 5 years for 33% of the sample. Conclusions: Long-stay patients accounted for one fifth of the forensic inpatient population in England in this representative sample. A significant proportion of this group remain unsettled. High levels of personality pathology and the risk of assaults on staff and others within the care setting are likely to impact on treatment and management. Further research into the treatment pathways of longer stay patients is warranted to understand the complex trajectories of this group. PMID:29713294
A First Step Towards Network Security Virtualization: From Concept to Prototype
2015-10-01
ec2 security groups. http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network- security.html. [3] Jeffrey R. Ballard, Ian Rae, and Aditya...20] Matthew L. Meola Michael J. Freedman Jennifer Rexford Nate Foster, Rob Harrison and David Walker. Frenetic: A High-Level Langauge for OpenFlow
Secure distribution for high resolution remote sensing images
NASA Astrophysics Data System (ADS)
Liu, Jin; Sun, Jing; Xu, Zheng Q.
2010-09-01
The use of remote sensing images collected by space platforms is becoming more and more widespread. The increasing value of space data and its use in critical scenarios call for adoption of proper security measures to protect these data against unauthorized access and fraudulent use. In this paper, based on the characteristics of remote sensing image data and application requirements on secure distribution, a secure distribution method is proposed, including users and regions classification, hierarchical control and keys generation, and multi-level encryption based on regions. The combination of the three parts can make that the same remote sensing images after multi-level encryption processing are distributed to different permission users through multicast, but different permission users can obtain different degree information after decryption through their own decryption keys. It well meets user access control and security needs in the process of high resolution remote sensing image distribution. The experimental results prove the effectiveness of the proposed method which is suitable for practical use in the secure transmission of remote sensing images including confidential information over internet.
Security architecture for health grid using ambient intelligence.
Naqvi, S; Riguidel, M; Demeure, I
2005-01-01
To propose a novel approach of incorporating ambient intelligence in the health grid security architecture. Security concerns are severely impeding the grid community effort in spreading its wings in health applications. In this paper, we have proposed a high level approach to incorporate ambient intelligence for health grid security architecture and have argued that this will significantly improve the current state of the grid security paradigm with an enhanced user-friendly environment. We believe that the time is right to shift the onus of traditional security mechanisms onto the new technologies. The incorporation of ambient intelligence in the security architecture of a grid will not only render a security paradigm robust but also provide an attractive vision for the future of computing by bringing the two worlds together. In this article we propose an evolutionary approach of utilizing smart devices for grid security architecture. We argue that such an infrastructure will impart unique features to the existing grid security paradigms by offering fortified and relentless monitoring. This new security architecture will be comprehensive in nature but will not be cumbersome for the users due to its typical characteristics of not prying into their lives and adapting to their needs. We have identified a new paradigm of the security architecture for a health grid that will not only render a security mechanism robust but will also provide the high levels of user-friendliness. As our approach is a first contribution to this problem, a number of other issues for future research remain open. However, the prospects are fascinating.
A Fast lattice-based polynomial digital signature system for m-commerce
NASA Astrophysics Data System (ADS)
Wei, Xinzhou; Leung, Lin; Anshel, Michael
2003-01-01
The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprise's server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRU's Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.
NASA Astrophysics Data System (ADS)
Thiel, M.; Flachenecker, G.; Schade, W.; Gorecki, C.; Thoma, A.; Rathje, R.
2017-11-01
Optical seals consisting of waveguide Bragg grating sensor structures in ultra thin glass transparencies have been developed to cover security relevant objects for detection of unauthorized access. For generation of optical signature in the seals, femtosecond laser pulses were used. The optical seals were connected with an optical fiber to enable external read out of the seal. Different attack scenarios for getting undetected access to the object, covered by the seal, were proven and evaluated. The results presented here, verify a very high level of security. An unauthorized detaching and subsequent replacement by original or copy of the seals for tampering would be accompanied with a very high technological effort, posing a substantial barrier towards an attacker. Additionally, environmental influences like temperature effects have a strong but reproducible influence on signature, which in context of a temperature reference database increases the level of security significantly.
Information Systems at Enterprise. Design of Secure Network of Enterprise
NASA Astrophysics Data System (ADS)
Saigushev, N. Y.; Mikhailova, U. V.; Vedeneeva, O. A.; Tsaran, A. A.
2018-05-01
No enterprise and company can do without designing its own corporate network in today's information society. It accelerates and facilitates the work of employees at any level, but contains a big threat to confidential information of the company. In addition to the data theft attackers, there are plenty of information threats posed by modern malware effects. In this regard, the computational security of corporate networks is an important component of modern information technologies of computer security for any enterprise. This article says about the design of the protected corporate network of the enterprise that provides the computers on the network access to the Internet, as well interoperability with the branch. The access speed to the Internet at a high level is provided through the use of high-speed access channels and load balancing between devices. The security of the designed network is performed through the use of VLAN technology as well as access lists and AAA server.
Smart photonic networks and computer security for image data
NASA Astrophysics Data System (ADS)
Campello, Jorge; Gill, John T.; Morf, Martin; Flynn, Michael J.
1998-02-01
Work reported here is part of a larger project on 'Smart Photonic Networks and Computer Security for Image Data', studying the interactions of coding and security, switching architecture simulations, and basic technologies. Coding and security: coding methods that are appropriate for data security in data fusion networks were investigated. These networks have several characteristics that distinguish them form other currently employed networks, such as Ethernet LANs or the Internet. The most significant characteristics are very high maximum data rates; predominance of image data; narrowcasting - transmission of data form one source to a designated set of receivers; data fusion - combining related data from several sources; simple sensor nodes with limited buffering. These characteristics affect both the lower level network design and the higher level coding methods.Data security encompasses privacy, integrity, reliability, and availability. Privacy, integrity, and reliability can be provided through encryption and coding for error detection and correction. Availability is primarily a network issue; network nodes must be protected against failure or routed around in the case of failure. One of the more promising techniques is the use of 'secret sharing'. We consider this method as a special case of our new space-time code diversity based algorithms for secure communication. These algorithms enable us to exploit parallelism and scalable multiplexing schemes to build photonic network architectures. A number of very high-speed switching and routing architectures and their relationships with very high performance processor architectures were studied. Indications are that routers for very high speed photonic networks can be designed using the very robust and distributed TCP/IP protocol, if suitable processor architecture support is available.
Plant security during decommissioning; challenges and lessons learned from German phase out decision
DOE Office of Scientific and Technical Information (OSTI.GOV)
Renner, Andrea; Esch, Markus
2013-07-01
Purpose of this paper is to point out the security challenges that may occur during the decommissioning, based on the issues and lessons learned from the German phase out decision. Though national regulations may be different in other countries the basic problems and issues will be the same. Therefore presented solutions will be applicable in other countries as well. The radioactive material remaining at the NPP during decommissioning has the most influence on how the security measures have to be designed. The radioactive material defines the risk potential of the plant and this determines the needed security level. The followingmore » aspects have been challenging in Germany: - Scenarios varying from those, used for plants in operation, due to changed operating conditions - Spent fuel will stay in the spent fuel pool for a quite long period before it can be removed from the plant. Risk potential of the plant stays high and requires a high level of security measures - Security measures according to the existing operating license have to stay in place as they are, unless the first license for decommissioning is given respective the spent fuel is removed from the plant site. This even led to the question if improvements of security measures, planned and announced with focus on a plant remaining in operation for another couple of years, need to be done although they will not be required after removing the spent fuel from the plant. A further important aspect for the security design is the fact that a plant under decommissioning has completely different and strongly varying operating procedures, compared to the stable ones of an operating plant. This leads to different needs concerning workspace, infrastructure on plant site, access to buildings etc. An optimized and highly flexible security concept is needed to ensure an adequate level of security as well as an efficient decommissioning. A deep analysis of the vital plant functions, depending on the different decommissioning stages, is required to determine the vital equipment, its location and its need for protection. (authors)« less
Torres, Nuno; Maia, Joana; Veríssimo, Manuela; Fernandes, Marilia; Silva, Filipa
2012-01-01
The present work analyses differences in the attachment representations of institutionalized children as compared with children from low and high educational level living with their natural families. Participants were 91 Portuguese children, 52% girls, aged 48-96 months. There were three different groups: 19 institutionalized children, 16 low educational level families' children and 56 from high educational level families'. Attachment representations were assessed for Security of the narratives of the Attachment Story Completion Task (ASCT). Psychopathological symptoms were assessed using the Child Behaviour Checklist for parents and caretakers. Verbal skills were assessed using the Wechsler Preschool and Primary Scale of Intelligence--Revised. Results show that institutionalized children have significantly lower security of attachment representations, less verbal skills and higher aggressive behaviour than the other two groups. Attachment representations were associated with social/withdrawal and aggression, independently of age, verbal skills and parents' education. The main effect of institutionalization on externalizing aggressive behaviour was completely mediated by the security of attachment representations. Copyright © 2010 John Wiley & Sons, Ltd.
Successful practices in the use of secure e-mail.
Johnson, Laura W; Garrido, Terhilda; Christensen, Kate; Handley, Matt
2014-01-01
Physician use of secure e-mail with patients is anticipated to increase under Stage 2 Meaningful Use requirements, but little is known about how physicians can successfully incorporate it into daily work. We interviewed 27 "super user" physicians at Kaiser Permanente and Group Health who were identified by leaders as being technologically, operationally, and clinically adept and as having high levels of secure e-mail use with patients. They highly valued the use of secure e-mail with patients, despite concerns about a lack of adequate time to respond, and provided tips for using it successfully. They identified benefits that included better care and improved relationships with their patients.
Cost and effectiveness analysis on unmanned aerial vehicle (UAV) use at border security
NASA Astrophysics Data System (ADS)
Yilmaz, Bahadır.
2013-06-01
Drones and Remotely Piloted Vehicles are types of Unmanned Aerial Vehicles. UAVs began to be used with the war of Vietnam, they had a great interest when Israel used them in Bekaa Valley Operations of 1982. UAVs have been used by different countries with different aims with the help of emerging technology and investments. In this article, in the context of areas of UAV usage in national security, benefits and disadvantages of UAVs are put forward. Particularly, it has been evaluated on the basis of cost-effectiveness by focusing the use of UAV in the border security. UAVs have been studied by taking cost analysis, procurement and operational costs into consideration. Analysis of effectiveness has been done with illegal passages of people and drugs from flight times of UAVs. Although the procurement cost of the medium-level UAVs is low, its operational costs are high. For this reason, the idea of less costly alternative systems have been revealed for the border security. As the costs are reduced to acceptable level involving national security and border security in future with high-technology products in their structure, it will continue to be used in an increasing proportion.
Securely and Flexibly Sharing a Biomedical Data Management System
Wang, Fusheng; Hussels, Phillip; Liu, Peiya
2011-01-01
Biomedical database systems need not only to address the issues of managing complex data, but also to provide data security and access control to the system. These include not only system level security, but also instance level access control such as access of documents, schemas, or aggregation of information. The latter is becoming more important as multiple users can share a single scientific data management system to conduct their research, while data have to be protected before they are published or IP-protected. This problem is challenging as users’ needs for data security vary dramatically from one application to another, in terms of who to share with, what resources to be shared, and at what access level. We develop a comprehensive data access framework for a biomedical data management system SciPort. SciPort provides fine-grained multi-level space based access control of resources at not only object level (documents and schemas), but also space level (resources set aggregated in a hierarchy way). Furthermore, to simplify the management of users and privileges, customizable role-based user model is developed. The access control is implemented efficiently by integrating access privileges into the backend XML database, thus efficient queries are supported. The secure access approach we take makes it possible for multiple users to share the same biomedical data management system with flexible access management and high data security. PMID:21625285
Environmental influences on food security in high-income countries.
Gorton, Delvina; Bullen, Chris R; Mhurchu, Cliona Ni
2010-01-01
Food security is a fundamental human right yet many people are food insecure, even in high-income countries. Reviewed here is the evidence for the physical, economic, sociocultural, and political environmental influences on household food security in high-income countries. The literature was evaluated using the ANGELO framework, which is a lens developed for understanding the environmental factors underpinning the obesity pandemic. A review of the literature identified 78 articles, which mostly reported on cross-sectional or qualitative studies. These studies identified a wide range of factors associated with food security. Foremost among them was household financial resources, but many other factors were identified and the complexity of the issue was highlighted. Few studies were prospective and even fewer tested the use of interventions other than the supplemental nutrition assistance program to address food security. This indicates a solution-oriented research paradigm is required to identify effective interventions and policies to enhance food security. In addition, comprehensive top-down and bottom-up interventions at the community and national levels are urgently needed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects ofmore » biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation around the following five axes/dimensions: Adapt to the change to global, market-driven dynamics; Address the land, water and resource implications of biofuel policies; Foster the transition from biofuels to comprehensive food-energy policies; Promote research and development; and, Develop methods and guidelines for coordinated food, Biofuels, and bio-energy policies at national and international levels.« less
NASA Astrophysics Data System (ADS)
Leihong, Zhang; Zilan, Pan; Luying, Wu; Xiuhua, Ma
2016-11-01
To solve the problem that large images can hardly be retrieved for stringent hardware restrictions and the security level is low, a method based on compressive ghost imaging (CGI) with Fast Fourier Transform (FFT) is proposed, named FFT-CGI. Initially, the information is encrypted by the sender with FFT, and the FFT-coded image is encrypted by the system of CGI with a secret key. Then the receiver decrypts the image with the aid of compressive sensing (CS) and FFT. Simulation results are given to verify the feasibility, security, and compression of the proposed encryption scheme. The experiment suggests the method can improve the quality of large images compared with conventional ghost imaging and achieve the imaging for large-sized images, further the amount of data transmitted largely reduced because of the combination of compressive sensing and FFT, and improve the security level of ghost images through ciphertext-only attack (COA), chosen-plaintext attack (CPA), and noise attack. This technique can be immediately applied to encryption and data storage with the advantages of high security, fast transmission, and high quality of reconstructed information.
Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium.
Somasundaram, M; Sivakumar, R
2015-01-01
Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security.
Huber, Anna; McMahon, Catherine A; Sweller, Naomi
2015-01-01
Circle of Security is an attachment theory based intervention that aims to promote secure parent-child attachment relationships. Despite extensive uptake of the approach, there is limited empirical evidence regarding efficacy. The current study examined whether participation in the 20-week Circle of Security intervention resulted in positive caregiver-child relationship change in four domains: caregiver reflective functioning; caregiver representations of the child and the relationship with the child; child attachment security, and attachment disorganization. Archived pre- and postintervention data were analyzed from 83 clinically referred caregiver-child dyads (child age: 13-88 months) who completed the Circle of Security intervention in sequential cohorts and gave permission for their data to be included in the study. Caregivers completed the Circle of Security Interview, and dyads were filmed in the Strange Situation Procedure before and after the intervention. Results supported all four hypotheses: Caregiver reflective functioning, caregiving representations, and level of child attachment security increased after the intervention, and level of attachment disorganization decreased for those with high baseline levels. Those whose scores were least optimal prior to intervention showed the greatest change in all domains. This study adds to the evidence suggesting that the 20-week Circle of Security intervention results in significant relationship improvements for caregivers and their children. © 2015 Michigan Association for Infant Mental Health.
Mazidi, Mohsen; Vatanparast, Hassan
2018-03-07
In the current study we aimed to assess whether the food security is associated with serum trans-fatty acids (TFAs) and dietary fat. Analyses were restricted to participants (from the US National Health and Nutrition Examination Survey) with data available on serum and diet TFAs and food security status from 2009 to 2010. All statistical analyses (analysis of covariance and linear regression) accounted for the survey design and sample weights. We included 3876 participants, overall (48.6%) participants were men, and (51.4%) were women, generally (69.0%) had high food security. Subjects with higher food security had a higher level of education as well (p < 0.001). Age-adjusted, sex-adjusted, race-adjusted, education-adjusted mean of trans 9-octadecenoic acid and trans-9, trans-12-octadecadienoic acid were higher in plasma of participants with lower food security (all p < 0.001), moreover in same model there was a significant positive association between plasma level of trans-11-octadecenoic acid, trans-9-octadecenoic acid and trans-9, trans-12-octadecadienoic acid and score of food security. Further, age, sex, race, education, and energy intake adjusted mean of dietary fatty acids show that total polyunsaturated fatty acids are higher in subjects with higher food security (p = 0.026) while, cholesterol consumption is higher in subjects with lower food security (p = 0.039). Our findings provide more evidence on the association between food insecurity and the higher level of TFAs in serum and different type of fat in the diet.
Successful Practices in the Use of Secure E-mail
Johnson, Laura W; Garrido, Terhilda; Christensen, Kate; Handley, Matt
2014-01-01
Physician use of secure e-mail with patients is anticipated to increase under Stage 2 Meaningful Use requirements, but little is known about how physicians can successfully incorporate it into daily work. We interviewed 27 “super user” physicians at Kaiser Permanente and Group Health who were identified by leaders as being technologically, operationally, and clinically adept and as having high levels of secure e-mail use with patients. They highly valued the use of secure e-mail with patients, despite concerns about a lack of adequate time to respond, and provided tips for using it successfully. They identified benefits that included better care and improved relationships with their patients. PMID:24937149
2011-01-01
Background The assessment of those presenting to prison in-reach and court diversion services and those referred for admission to mental health services is a triage decision, allocating the patient to the appropriate level of therapeutic security. This is a critical clinical decision. We set out to improve on unstructured clinical judgement. We collated qualitative information and devised an 11 item structured professional judgment instrument for this purpose then tested for validity. Methods All those assessed following screening over a three month period at a busy remand committals prison (n = 246) were rated in a retrospective cohort design blind to outcome. Similarly, all those admitted to a mental health service from the same prison in-reach service over an overlapping two year period were rated blind to outcome (n = 100). Results The 11 item scale had good internal consistency (Cronbach's alpha = 0.95) and inter-rater reliability. The scale score did not correlate with the HCR-20 'historical' score. For the three month sample, the receiver operating characteristic area under the curve (AUC) for those admitted to hospital was 0.893 (95% confidence interval 0.843 to 0.943). For the two year sample, AUC distinguished at each level between those admitted to open wards, low secure units or a medium/high secure service. Open wards v low secure units AUC = 0.805 (95% CI 0.680 to 0.930); low secure v medium/high secure AUC = 0.866, (95% CI 0.784 to 0.949). Item to outcome correlations were significant for all 11 items. Conclusions The DUNDRUM-1 triage security scale and its items performed to criterion levels when tested against the real world outcome. This instrument can be used to ensure consistency in decision making when deciding who to admit to secure forensic hospitals. It can also be used to benchmark admission thresholds between services and jurisdictions. In this study we found some divergence between assessed need and actual placement. This provides fertile ground for future research as well as practical assistance in assessing unmet need, auditing case mix and planning care pathways. PMID:21410967
Earned-secure attachment status in retrospect and prospect.
Roisman, Glenn L; Padrón, Elena; Sroufe, L Alan; Egeland, Byron
2002-01-01
Past research with the Berkeley Adult Attachment Interview demonstrates that retrospectively defined earned-secures (who coherently describe negative childhood experiences) parent as effectively as do continuous-secures (who coherently describe positive childhood experiences), but manifest liabilities in the form of depressive symptomatology. This article presents data from a 23-year longitudinal study that replicate and extend prior research, testing a key premise that earned-secures so defined actually have a history of insecure attachments that change over time and/or endure consistently harsh or ineffective parenting in their youth. Discrepant with assumptions, retrospective earned-secures were not more likely than continuous-secures to have been anxiously attached in infancy and were observed in childhood and adolescence to have encountered among the most supportive and structured maternal parenting in a high-risk sample. Prospectively defined earned-secures (operationalized using participants' infant attachment classifications) did indeed go on to have success in their close relationships, many without reporting relatively high levels of internalizing distress in adulthood.
Marketing and reputation aspects of neonatal safeguards and hospital-security systems.
Smith, Alan D
2009-01-01
Technological advancements have migrated from personal-use electronics into the healthcare setting for security enhancements. Within maternity wards and nurseries, technology was seen as one of best way to protect newborns from abduction. The present study is a focus on what systems and methods are used in neonatal security, the security arrangements, staff training, and impacts outside the control of the hospital, customer satisfaction and customer relations management. Through hypothesis-testing and exploratory analysis, gender biases and extremely high levels of security were found within a web-enabled and professional sample of 200 respondents. The factor-based constructs were found to be, in order of the greatest explained variance: security concerns, personal technology usage, work technology applications, and demographic maturity concerns, resulting in four factor-based scores with significant combined variance of 61.5%. It was found that through a better understanding on the importance and vital need for hospitals to continue to improve on their technology-based security policies significantly enhanced their reputation in the highly competitive local healthcare industry.
Materials for Adaptive Structural Acoustic Control. Volume 1
1993-04-06
FOLLOWING PAGE 14. SUBJECT TERMS 15. NUMBER OF PAGES 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20...375 Rubber is a highly nonlinear clastic medium. In the unstressed compliant state, the molecules ate coiled and tangled . but under stress the molecules...one-dimensional system, \\\\here tangle (solid dots) and the oblique (open circle) states are the shaded area represents the level of thermal energy
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-12
... unique aspects of nuclear safety and security, and to note the Commission's expectations that all NRC... health and safety and the common defense and security when carrying out licensed activities. The comment...) development of high-level [[Page 1657
GEMSS: privacy and security for a medical Grid.
Middleton, S E; Herveg, J A M; Crazzolara, F; Marvin, D; Poullet, Y
2005-01-01
The GEMSS project is developing a secure Grid infrastructure through which six medical simulations services can be invoked. We examine the legal and security framework within which GEMSS operates. We provide a legal qualification to the operations performed upon patient data, in view of EU directive 95/46, when using medical applications on the GEMSS Grid. We identify appropriate measures to ensure security and describe the legal rationale behind our choice of security technology. Our legal analysis demonstrates there must be an identified controller (typically a hospital) of patient data. The controller must then choose a processor (in this context a Grid service provider) that provides sufficient guarantees with respect to the security of their technical and organizational data processing procedures. These guarantees must ensure a level of security appropriate to the risks, with due regard to the state of the art and the cost of their implementation. Our security solutions are based on a public key infrastructure (PKI), transport level security and end-to-end security mechanisms in line with the web service (WS Security, WS Trust and SecureConversation) security specifications. The GEMSS infrastructure ensures a degree of protection of patient data that is appropriate for the health care sector, and is in line with the European directives. We hope that GEMSS will become synonymous with high security data processing, providing a framework by which GEMSS service providers can provide the security guarantees required by hospitals with regard to the processing of patient data.
Automatic public access to documents and maps stored on and internal secure system.
NASA Astrophysics Data System (ADS)
Trench, James; Carter, Mary
2013-04-01
The Geological Survey of Ireland operates a Document Management System for providing documents and maps stored internally in high resolution and in a high level secure environment, to an external service where the documents are automatically presented in a lower resolution to members of the public. Security is devised through roles and Individual Users where role level and folder level can be set. The application is an electronic document/data management (EDM) system which has a Geographical Information System (GIS) component integrated to allow users to query an interactive map of Ireland for data that relates to a particular area of interest. The data stored in the database consists of Bedrock Field Sheets, Bedrock Notebooks, Bedrock Maps, Geophysical Surveys, Geotechnical Maps & Reports, Groundwater, GSI Publications, Marine, Mine Records, Mineral Localities, Open File, Quaternary and Unpublished Reports. The Konfig application Tool is both an internal and public facing application. It acts as a tool for high resolution data entry which are stored in a high resolution vault. The public facing application is a mirror of the internal application and differs only in that the application furnishes high resolution data into low resolution format which is stored in a low resolution vault thus, making the data web friendly to the end user for download.
Security culture for nuclear facilities
NASA Astrophysics Data System (ADS)
Gupta, Deeksha; Bajramovic, Edita
2017-01-01
Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.
Secure communications of CAP-4 and OOK signals over MMF based on electro-optic chaos.
Ai, Jianzhou; Wang, Lulu; Wang, Jian
2017-09-15
Chaos-based secure communication can provide a high level of privacy in data transmission. Here, we experimentally demonstrate secure signal transmission over two kinds of multimode fiber (MMF) based on electro-optic intensity chaos. High-quality synchronization is achieved in an electro-optic feedback configuration. Both 5 Gbit/s carrier-less amplitude/phase (CAP-4) modulation and 10 Gbit/s on-off key (OOK) signals are recovered efficiently in electro-optic chaos-based communication systems. Degradations of chaos synchronization and communication system due to mismatch of various hardware keys are also discussed.
Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium
Somasundaram, M.; Sivakumar, R.
2015-01-01
Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security. PMID:26759829
Chandler, Felicity; Dissanayake, Cheryl
2014-07-01
Previous research has investigated caregiver attachment relationships in children with autism during early childhood, with few differences found from matched control groups. However, little is known of this relationship during middle childhood (ages 8-12 years). In this study, the aim was to establish whether there are differences in the security of attachment in children with high-functioning autism compared to typically developing children. A secondary aim was to establish whether caregivers' perceptions of their child's attachment to them accorded with the children's own reports. Twenty-one children with high-functioning autism and 17 typically developing children were administered the Kerns Security Scale and the Inventory of Parent and Peer Attachment-Revised, and caregivers completed the same questionnaires from the viewpoint of their child. There were no differences between the groups in the children's and parents' reports of attachment security. Parents' and children's reports were moderately correlated on the Kerns Security Scale but were not correlated on the Inventory of Parent and Peer Attachment-Revised. The results indicate that levels of attachment security in children with high-functioning autism are not different from those in typically developing children. © The Author(s) 2013.
Integrated homeland security system with passive thermal imaging and advanced video analytics
NASA Astrophysics Data System (ADS)
Francisco, Glen; Tillman, Jennifer; Hanna, Keith; Heubusch, Jeff; Ayers, Robert
2007-04-01
A complete detection, management, and control security system is absolutely essential to preempting criminal and terrorist assaults on key assets and critical infrastructure. According to Tom Ridge, former Secretary of the US Department of Homeland Security, "Voluntary efforts alone are not sufficient to provide the level of assurance Americans deserve and they must take steps to improve security." Further, it is expected that Congress will mandate private sector investment of over $20 billion in infrastructure protection between 2007 and 2015, which is incremental to funds currently being allocated to key sites by the department of Homeland Security. Nearly 500,000 individual sites have been identified by the US Department of Homeland Security as critical infrastructure sites that would suffer severe and extensive damage if a security breach should occur. In fact, one major breach in any of 7,000 critical infrastructure facilities threatens more than 10,000 people. And one major breach in any of 123 facilities-identified as "most critical" among the 500,000-threatens more than 1,000,000 people. Current visible, nightvision or near infrared imaging technology alone has limited foul-weather viewing capability, poor nighttime performance, and limited nighttime range. And many systems today yield excessive false alarms, are managed by fatigued operators, are unable to manage the voluminous data captured, or lack the ability to pinpoint where an intrusion occurred. In our 2006 paper, "Critical Infrastructure Security Confidence Through Automated Thermal Imaging", we showed how a highly effective security solution can be developed by integrating what are now available "next-generation technologies" which include: Thermal imaging for the highly effective detection of intruders in the dark of night and in challenging weather conditions at the sensor imaging level - we refer to this as the passive thermal sensor level detection building block Automated software detection for creating initial alerts - we refer to this as software level detection, the next level building block Immersive 3D visual assessment for situational awareness and to manage the reaction process - we refer to this as automated intelligent situational awareness, a third building block Wide area command and control capabilities to allow control from a remote location - we refer to this as the management and process control building block integrating together the lower level building elements. In addition, this paper describes three live installations of complete, total systems that incorporate visible and thermal cameras as well as advanced video analytics. Discussion of both system elements and design is extensive.
Threats to information security of real-time disease surveillance systems.
Henriksen, Eva; Johansen, Monika A; Baardsgaard, Anders; Bellika, Johan G
2009-01-01
This paper presents the main results from a qualitative risk assessment of information security aspects for a new real-time disease surveillance approach in general, and for the Snow surveillance system in particular. All possible security threats and acceptable solutions, and the implications these solutions had to the design of the system, were discussed. Approximately 30 threats were identified. None of these got an unacceptable high risk level originally, but two got medium risk level, of which one was concluded to be unacceptable after further investigation. Of the remaining low risk threats, some have severe consequence, thus requiring particular assessment. Since it is very important to identify and solve all security threats before real-time solutions can be used in a wide scale, additional investigations are needed.
ERIC Educational Resources Information Center
Kennedy, Mike
2012-01-01
Outbreaks of violence at education institutions typically do not rise to the horrific levels of Virginia Tech, Columbine High School, or Oikos University. But incidents that threaten school security--bullying, hazing, online harassment--take place in every month of the year and may occur in any classroom or campus from coast to coast. Schools and…
Shared Solar. Current Landscape, Market Potential, and the Impact of Federal Securities Regulation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feldman, David; Brockway, Anna M.; Ulrich, Elaine
2015-04-07
This report provides a high-level overview of the current U.S. shared solar landscape, the impact that a given shared solar program’s structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.
Shared Solar. Current Landscape, Market Potential, and the Impact of Federal Securities Regulation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feldman, David; Brockway, Anna M.; Ulrich, Elaine
2015-04-01
This report provides a high-level overview of the current U.S. shared solar landscape and the impact that a given shared solar program’s structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.
High-Dimensional Circular Quantum Secret Sharing Using Orbital Angular Momentum
NASA Astrophysics Data System (ADS)
Tang, Dawei; Wang, Tie-jun; Mi, Sichen; Geng, Xiao-Meng; Wang, Chuan
2016-11-01
Quantum secret sharing is to distribute secret message securely between multi-parties. Here exploiting orbital angular momentum (OAM) state of single photons as the information carrier, we propose a high-dimensional circular quantum secret sharing protocol which increases the channel capacity largely. In the proposed protocol, the secret message is split into two parts, and each encoded on the OAM state of single photons. The security of the protocol is guaranteed by the laws of non-cloning theorem. And the secret messages could not be recovered except that the two receivers collaborated with each other. Moreover, the proposed protocol could be extended into high-level quantum systems, and the enhanced security could be achieved.
Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.
Bernik, Igor; Prislan, Kaja
Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.
Epithelial perturbation by inhaled chlorine: Multi-scale mechanistic modeling in rats and humans
Chlorine is a high-production volume, hazardous air pollutant and irritant gas of interest to homeland security. Thus, scenarios of interest for risk characterization range from acute high-level exposures to lower-level chronic exposures. Risk assessment approaches to estimate ...
Shalowitz, M U; Eng, J S; McKinney, C O; Krohn, J; Lapin, B; Wang, C-H; Nodine, E
2017-05-15
Successful Type 2 diabetes management requires adopting a high nutrient-density diet made up of food items that both meet dietary needs and preferences and can be feasibly obtained on a regular basis. However, access to affordable, nutrient-dense foods often is lacking in poorer neighbourhoods. Therefore, low food security should directly impair glucose control, even when patients have full access to and utilize comprehensive medical management. The present study sought to determine whether food security is related longitudinally to glucose control, over-and-above ongoing medication management, among Type 2 diabetes patients receiving comprehensive care at a Midwestern multi-site federally qualified health centre (FQHC). In this longitudinal observational study, we completed a baseline assessment of patients' food security (using the US Household Food Security Module), demographics (via Census items), and diabetes history/management (using a structured clinical encounter form) when patients began receiving diabetes care at the health centre. We then recorded those patients' A1C levels several times during a 24-month follow-up period. Three hundred and ninety-nine patients (56% with low food security) had a baseline A1c measurement; a subsample of 336 (median age=52 years; 56% female; 60% Hispanic, 27% African American, and 9% White) also had at least one follow-up A1c measurement. Patients with lower (vs higher) food security were more likely to be on insulin and have higher A1c levels at baseline. Moreover, the disparity in glucose control by food security status persisted throughout the next 2 years. Although results were based on one multi-site FQHC, potentially limiting their generalizability, they seem to suggest that among Type 2 diabetes patients, low food security directly impairs glucose control-even when patients receive full access to comprehensive medical management-thereby increasing their long-term risks of high morbidity, early mortality, and high health-care utilization and cost.
Regulation of IAP (Inhibitor of Apoptosis) Gene Expression by the p53 Tumor Suppressor Protein
2005-05-01
adenovirus, gene therapy, polymorphism, 31 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20...averaged results of three inde- pendent experiments, with standard error. Right panel: Level of p53 in infected cells using the antibody Ab-6 (Calbiochem...with highly purified mitochondria as described in (2). The arrow marks oligomerized BAK. The right _ -. panel depicts the purity of BMH CrosIinked Mito
Implementing healthcare information security: standards can help.
Orel, Andrej; Bernik, Igor
2013-01-01
Using widely spread common approaches to systems security in health dedicated controlled environments, a level of awareness, confidence and acceptance of relevant standardisation is evaluated. Patients' information is sensitive, so putting appropriate organisational techniques as well as modern technology in place to secure health information is of paramount importance. Mobile devices are becoming the top priorities in advanced information security planning with healthcare environments being no exception. There are less and less application areas in healthcare without having a need for a mobile functionality which represents an even greater information security challenge. This is also true in emergency treatments, rehabilitation and homecare just to mention a few areas outside hospital controlled environments. Unfortunately quite often traditional unsecured communications principles are still in routine use for communicating sensitive health related information. The security awareness level with users, patients and care professionals is not high enough so potential threats and risks may not be addressed and the respective information security management is therefore weak. Standards like ISO/IEC 27000 ISMS family, the ISO/IEC 27799 information security guidelines in health are often not well known, but together with legislation principles such as HIPAA, they can help.
The Operations Security Concept for Future ESA Earth Observation Missions
NASA Astrophysics Data System (ADS)
Fischer, D.; Bargellini, P.; Merri, M.
2008-08-01
Next-generation European earth observation missions will play a critical role in public safety and security infrastructures. This makes it necessary for ESA to protect the communication infrastructure of these missions in order to guarantee their service availability. In this paper, we discuss the development process for a generic earth observation security concept. This concept has been developed as part of a GMES Flight Operation Segment security study with the objective to analyse and select a number of high level security requirements for the missions. Further, we studied the impact of an implementation for these requirements on the operational infrastructure of current earth observation missions.
Is Provider Secure Messaging Associated With Patient Messaging Behavior? Evidence From the US Army.
Wolcott, Vickee; Agarwal, Ritu; Nelson, D Alan
2017-04-06
Secure messaging with health care providers offers the promise of improved patient-provider relationships, potentially facilitating outcome improvements. But, will patients use messaging technology in the manner envisioned by policy-makers if their providers do not actively use it? We hypothesized that the level and type of secure messaging usage by providers might be associated with messaging initiation by their patients. The study employed a dataset of health care and secure messaging records of more than 81,000 US Army soldiers and nearly 3000 clinicians with access to a patient portal system. We used a negative binomial regression model on over 25 million observations to determine the adjusted association between provider-initiated and provider-response messaging and subsequent messaging by their patients in this population over a 4-year period. Prior provider-initiated and response messaging levels were associated with new patient messaging when controlling for the patient's health care utilization and diagnoses, with the strongest association for high provider-response messaging level. Patients whose providers were highly responsive to the messages of other patients initiated 334% more secure messages (P<.001) than patients with providers who did not personally respond to other patients' messages. Our results indicate that provider messaging usage levels and types thereof predict their patients' subsequent communication behavior. The findings suggest the need for more study into the factors associated with provider messaging to fully understand the mechanisms of this relationship. ©Vickee Wolcott, Ritu Agarwal, D. Alan Nelson. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 06.04.2017.
An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment
Dorairaj, Sudha Devi; Kaliannan, Thilagavathy
2015-01-01
Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party's premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions. PMID:26258165
An Adaptive Multilevel Security Framework for the Data Stored in Cloud Environment.
Dorairaj, Sudha Devi; Kaliannan, Thilagavathy
2015-01-01
Cloud computing is renowned for delivering information technology services based on internet. Nowadays, organizations are interested in moving their massive data and computations into cloud to reap their significant benefits of on demand service, resource pooling, and rapid elasticity that helps to satisfy the dynamically changing infrastructure demand without the burden of owning, managing, and maintaining it. Since the data needs to be secured throughout its life cycle, security of the data in cloud is a major challenge to be concentrated on because the data is in third party's premises. Any uniform simple or high level security method for all the data either compromises the sensitive data or proves to be too costly with increased overhead. Any common multiple method for all data becomes vulnerable when the common security pattern is identified at the event of successful attack on any information and also encourages more attacks on all other data. This paper suggests an adaptive multilevel security framework based on cryptography techniques that provide adequate security for the classified data stored in cloud. The proposed security system acclimates well for cloud environment and is also customizable and more reliant to meet the required level of security of data with different sensitivity that changes with business needs and commercial conditions.
Security of attachment and quality of mother-toddler social interaction in a high-risk sample.
Haltigan, John D; Lambert, Brittany L; Seifer, Ronald; Ekas, Naomi V; Bauer, Charles R; Messinger, Daniel S
2012-02-01
The quality of children's social interactions and their attachment security with a primary caregiver are two widely studied indices of socioemotional functioning in early childhood. Although both Bowlby and Ainsworth suggested that the parent-child interactions underlying the development of attachment security could be distinguished from other aspects of parent-child interaction (e.g., play), relatively little empirical research has examined this proposition. The aim of the current study was to explore this issue by examining concurrent relations between toddler's attachment security in the Strange Situation Procedure and quality of mother-child social interaction in a high-risk sample of toddlers characterized by prenatal cocaine exposure and low levels of maternal education. Analyses of variance suggested limited relations between attachment security and quality of social interaction. Further research examining the interrelations among various components of the parent-child relationship is needed. Copyright © 2011 Elsevier Inc. All rights reserved.
Information Security Considerations for Applications Using Apache Accumulo
2014-09-01
Distributed File System INSCOM United States Army Intelligence and Security Command JPA Java Persistence API JSON JavaScript Object Notation MAC Mandatory... MySQL [13]. BigTable can process 20 petabytes per day [14]. High degree of scalability on commodity hardware. NoSQL databases do not rely on highly...manipulation in relational databases. NoSQL databases each have a unique programming interface that uses a lower level procedural language (e.g., Java
Bio-Inspired Human-Level Machine Learning
2015-10-25
extensions to high-level cognitive functions such as anagram solving problem. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...extensions to high-level cognitive functions such as anagram solving problem. We expect that the bio-inspired human-level machine learning combined with...numbers of 1011 neurons and 1014 synaptic connections in the human brain. In previous work, we experimentally demonstrated the feasibility of cognitive
ERIC Educational Resources Information Center
Mattsson, Christer; Säljö, Roger
2018-01-01
Currently, threats to societal security from extremist groups are high on the political agenda in many countries. Politicians, policymakers at various levels and communities are searching for methods to counteract recruitment to violent organizations. These efforts are often referred to as Prevention of Violent Extremism (PVE-programmes). One of…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-24
... focuses on the unique aspects of nuclear safety and security and highlights the Commission's expectations... safety culture and (2) high level descriptions or traits of areas important to safety culture. The... NRC headquarters. Please allow time at both locations to register with building security upon entering...
Security Recommendations for mHealth Apps: Elaboration of a Developer's Guide.
Morera, Enrique Pérez; de la Torre Díez, Isabel; Garcia-Zapirain, Begoña; López-Coronado, Miguel; Arambarri, Jon
2016-06-01
Being the third fastest-growing app category behind games and utilities, mHealth apps are changing the healthcare model, as medicine today involves the data they compile and analyse, information known as Big Data. However, the majority of apps are lacking in security when gathering and dealing with the information, which becomes a serious problem. This article presents a guide regarding security solution, intended to be of great use for developers of mHealth apps. In August 2015 current mobile health apps were sought out in virtual stores such as Android Google Play, Apple iTunes App Store etc., in order to classify them in terms of usefulness. After this search, the most widespread weaknesses in the field of security in the development of these mobile apps were examined, based on sources such as the "OWASP Mobile Security Project, the initiative recently launched by the Office of Civil Rights (OCR), and other articles of scientific interest. An informative, elemental guide has been created for the development of mHealth apps. It includes information about elements of security and its implementation on different levels for all types of mobile health apps based on the data that each app manipulates, the associated calculated risk as a result of the likelihood of occurrence and the threat level resulting from its vulnerabilities - high level (apps for monitoring, diagnosis, treatment and care) from 6 ≤ 9, medium level (calculator, localizer and alarm) from 3 ≤ 6 and low level (informative and educational apps) from 0 ≤ 3. The guide aims to guarantee and facilitate security measures in the development of mobile health applications by programmers unconnected to the ITC and professional health areas.
SPCC- Software Elements for Security Partition Communication Controller
NASA Astrophysics Data System (ADS)
Herpel, H. J.; Willig, G.; Montano, G.; Tverdyshev, S.; Eckstein, K.; Schoen, M.
2016-08-01
Future satellite missions like Earth Observation, Telecommunication or any other kind are likely to be exposed to various threats aiming at exploiting vulnerabilities of the involved systems and communications. Moreover, the growing complexity of systems coupled with more ambitious types of operational scenarios imply increased security vulnerabilities in the future. In the paper we will describe an architecture and software elements to ensure high level of security on-board a spacecraft. First the threats to the Security Partition Communication Controller (SPCC) will be addressed including the identification of specific vulnerabilities to the SPCC. Furthermore, appropriate security objectives and security requirements are identified to be counter the identified threats. The security evaluation of the SPCC will be done in accordance to the Common Criteria (CC). The Software Elements for SPCC has been implemented on flight representative hardware which consists of two major elements: the I/O board and the SPCC board. The SPCC board provides the interfaces with ground while the I/O board interfaces with typical spacecraft equipment busses. Both boards are physically interconnected by a high speed spacewire (SpW) link.
Military veterans and Social Security.
Olsen, Anya
There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.
[The comparative evaluation of level of security culture in medical organizations].
Roitberg, G E; Kondratova, N V; Galanina, E V
2016-01-01
The study was carried out on the basis of clinic “Medicine” in 2014-2015 concerning security culture. The sampling included 465 filled HSPSC questionnaires. The comparative analysis of received was implemented. The “Zubovskaia district hospital” Having no accreditation according security standards and group of clinics from USA functioning for many years in the system of patient security support were selected as objects for comparison. The evaluation was implemented concerning dynamics of security culture in organization at implementation of strategies of security of patients during 5 years and comparison of obtained results with USA clinics was made. The study results demonstrated that in conditions of absence of implemented standards of security in medical organization total evaluation of security remains extremely low. The study of security culture using HSPSC questionnaire is an effective tool for evaluating implementation of various strategies of security ofpatient. The functioning in the system of international standards of quality, primarily JCI standards, permits during several years to achieve high indices of security culture.
2016-12-16
Construction workers wearing safety harnesses and tethered lines assist with the installation of the second half of the B-level work platforms, B north, for NASA’s Space Launch System (SLS) rocket, high up in the Vehicle Assembly Building (VAB) at NASA’s Kennedy Space Center in Florida. They are securing the large bolts that hold the platform securely in place on the north side of High Bay 3. The B platforms are the ninth of 10 levels of work platforms that will surround and provide access to the SLS rocket and Orion spacecraft for Exploration Mission 1. The Ground Systems Development and Operations Program is overseeing upgrades and modifications to VAB High Bay 3, including installation of the new work platforms, to prepare for NASA’s Journey to Mars.
Attachment and prejudice: The mediating role of empathy.
Boag, Elle M; Carnelley, Katherine B
2016-06-01
In two studies, we examined the novel hypothesis that empathy is a mechanism through which the relationship between attachment patterns and prejudice can be explained. Study 1 examined primed attachment security (vs. neutral prime), empathy, and prejudice towards immigrants. Study 2 examined primed attachment patterns (secure, avoidant, anxious), empathy subscales (perspective taking, empathic concern, personal distress), and prejudice towards Muslims. Across both studies, empathy mediated the relationship between primed attachment security and low prejudice levels. The findings suggest that enhancing felt security and empathic skills in individuals high in attachment-avoidance may lead to reduced prejudice. © 2015 The British Psychological Society.
Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation
2016-01-01
Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model—ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it’s recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes. PMID:27655001
1992-01-01
multiversioning scheme for this purpose was presented in [9]. The scheme guarantees that high level methods would read down object states at lower levels that...order given by fork-stamp, and terminated writing versions with timestamp WStamp. Such a history is needed to implement the multiversioning scheme...recovery protocol for multiversion schedulers and show that this protocol is both correct and secure. The behavior of the recovery protocol depends
A Method for Evaluating Information Security Governance (ISG) Components in Banking Environment
NASA Astrophysics Data System (ADS)
Ula, M.; Ula, M.; Fuadi, W.
2017-02-01
As modern banking increasingly relies on the internet and computer technologies to operate their businesses and market interactions, the threats and security breaches have highly increased in recent years. Insider and outsider attacks have caused global businesses lost trillions of Dollars a year. Therefore, that is a need for a proper framework to govern the information security in the banking system. The aim of this research is to propose and design an enhanced method to evaluate information security governance (ISG) implementation in banking environment. This research examines and compares the elements from the commonly used information security governance frameworks, standards and best practices. Their strength and weakness are considered in its approaches. The initial framework for governing the information security in banking system was constructed from document review. The framework was categorized into three levels which are Governance level, Managerial level, and technical level. The study further conducts an online survey for banking security professionals to get their professional judgment about the ISG most critical components and the importance for each ISG component that should be implemented in banking environment. Data from the survey was used to construct a mathematical model for ISG evaluation, component importance data used as weighting coefficient for the related component in the mathematical model. The research further develops a method for evaluating ISG implementation in banking based on the mathematical model. The proposed method was tested through real bank case study in an Indonesian local bank. The study evidently proves that the proposed method has sufficient coverage of ISG in banking environment and effectively evaluates the ISG implementation in banking environment.
Security systems engineering overview
NASA Astrophysics Data System (ADS)
Steele, Basil J.
1997-01-01
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at 70 billion dollars in direct costs and up to 300 billion dollars in indirect costs. Health insurance fraud alone is estimated to cost American businesses 100 billion dollars. Theft, warranty fraud, and counterfeiting of computer hardware totaled 3 billion dollars in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies; industrial espionage detection and prevention; security barrier technology.
Zhao, Hong-Bo; Ma, Yan-Ji
2014-02-01
According to the cultivated land ecological security in major grain production areas of Northeast China, this paper selected 48 counties of Jilin Province as the research object. Based on the PSR-EES conceptual framework model, an evaluation index system of cultivated land ecological security was built. By using the improved TOPSIS, Markov chains, GIS spatial analysis and obstacle degree models, the spatial-temporal pattern of cultivated land ecological security and the obstacle factors were analyzed from 1995 to 2011 in Jilin Province. The results indicated that, the composite index of cultivated land ecological security appeared in a rising trend in Jilin Province from 1995 to 2011, and the cultivated land ecological security level changed from being sensitive to being general. There was a pattern of 'Club Convergence' in cultivated land ecological security level in each county and the spatial discrepancy tended to become larger. The 'Polarization' trend of cultivated land ecological security level was obvious. The distributions of sensitive level and critical security level with ribbon patterns tended to be dispersed, the general security level and relative security levels concentrated, and the distributions of security level scattered. The unstable trend of cultivated land ecological security level was more and more obvious. The main obstacle factors that affected the cultivated land ecological security level in Jilin Province were rural net income per capita, economic density, the proportion of environmental protection investment in GDP, degree of machinery cultivation and the comprehensive utilization rate of industrial solid wastes.
Follett, Peter A; Hennessey, Michael K
2007-04-01
Quarantine measures including treatments are applied to exported fruit and vegetable commodities to control regulatory fruit fly pests and to reduce the likelihood of their introduction into new areas. Nonhost status can be an effective measure used to achieve quarantine security. As with quarantine treatments, nonhost status can stand alone as a measure if there is high efficacy and statistical confidence. The numbers of insects or fruit tested during investigation of nonhost status will determine the level of statistical confidence. If the level of confidence of nonhost status is not high, then additional measures may be required to achieve quarantine security as part of a systems approach. Certain countries require that either 99.99 or 99.9968% mortality, as a measure of efficacy, at the 95% confidence level, be achieved by a quarantine treatment to meet quarantine security. This article outlines how the level of confidence in nonhost status can be quantified so that its equivalency to traditional quarantine treatments may be demonstrated. Incorporating sample size and confidence levels into host status testing protocols along with efficacy will lead to greater consistency by regulatory decision-makers in interpreting results and, therefore, to more technically sound decisions on host status.
Safe and Secure Schools Assessment. Public School Information. Legislative Report, 2008
ERIC Educational Resources Information Center
Idaho State Department of Education, 2008
2008-01-01
As a result of high profile shootings and critical incidents in schools on a national level, combined with the lack of a cohesive, standardized approach to safety and security in Idaho Schools, Superintendent Tom Luna requested an appropriation to address this issue and the Legislature allocated 5150.000 in FY 2008 for the Safe and Secure…
School Security Measures and Extracurricular Participation: An Exploratory Multi-Level Analysis
ERIC Educational Resources Information Center
Mowen, Thomas J.; Manierre, Matthew J.
2017-01-01
Although delinquency in US schools is near historic lows, concern over delinquency in US schools remains a pressing issue among school officials, parents, and policy-makers. Many scholars argue that the current approach to discipline in the United States is highly punitive. While some projects have assessed the effect of punitive security on…
Bible, J; Emery, R J; Williams, T; Wang, S
2006-11-01
Limited permanent low-level radioactive waste (LLRW) disposal capacity and correspondingly high disposal costs have resulted in the creation of numerous interim storage facilities for either decay-in-storage operations or longer term accumulation efforts. These facilities, which may be near the site of waste generation or in distal locations, often were not originally designed for the purpose of LLRW storage, particularly with regard to security. Facility security has become particularly important in light of the domestic terrorist acts of 2001, wherein LLRW, along with many other sources of radioactivity, became recognized commodities to those wishing to create disruption through the purposeful dissemination of radioactive materials. Since some LLRW materials may be in facilities that may exhibit varying degrees of security control sophistication, a security vulnerabilities assessment tool grounded in accepted criminal justice theory and security practice has been developed. The tool, which includes dedicated sections on general security, target hardening, criminalization benefits, and the presence of guardians, can be used by those not formally schooled in the security profession to assess the level of protection afforded to their respective facilities. The tool equips radiation safety practitioners with the ability to methodically and systematically assess the presence or relative status of various facility security aspects, many of which may not be considered by individuals from outside the security profession. For example, radiation safety professionals might not ordinarily consider facility lighting aspects, which is a staple for the security profession since it is widely known that crime disproportionately occurs more frequently at night or in poorly lit circumstances. Likewise, the means and associated time dimensions for detecting inventory discrepancies may not be commonly considered. The tool provides a simple means for radiation safety professionals to assess, and perhaps enhance in a reasonable fashion, the security of their interim storage operations. Aspects of the assessment tool can also be applied to other activities involving the protection of sources of radiation as well.
Lemonaki, Elena; Manstead, Antony S R; Maio, Gregory R
2015-09-01
In the present research, we examine the ways in which exposure to hostile sexism influences women's competitive collective action intentions. Prior to testing our main model, our first study experimentally induced high versus low levels of security-comfort with the aim of providing experimental evidence for the proposed causal link between these emotions and intentions to engage in social competition. Results showed that lower levels of security-comfort reduced women's readiness to compete socially with men. Experiment 2 investigated the effect of hostile sexism on women's emotional reactions and readiness to engage in social competition. Consistent with the proposed model, results showed that exposure to hostile beliefs about women (1) increased anger-frustration and (2) decreased security-comfort. More specifically, exposure to hostile sexism had a positive indirect effect on social competition intentions through anger-frustration, and a negative indirect effect through security-comfort. © 2015 The British Psychological Society.
Gao, Yuan; Zhang, Chuanrong; He, Qingsong; Liu, Yaolin
2017-06-15
Ecological security is an important research topic, especially urban ecological security. As highly populated eco-systems, cities always have more fragile ecological environments. However, most of the research on urban ecological security in literature has focused on evaluating current or past status of the ecological environment. Very little literature has carried out simulation or prediction of future ecological security. In addition, there is even less literature exploring the urban ecological environment at a fine scale. To fill-in the literature gap, in this study we simulated and predicted urban ecological security at a fine scale (district level) using an improved Cellular Automata (CA) approach. First we used the pressure-state-response (PSR) method based on grid-scale data to evaluate urban ecological security. Then, based on the evaluation results, we imported the geographically weighted regression (GWR) concept into the CA model to simulate and predict urban ecological security. We applied the improved CA approach in a case study-simulating and predicting urban ecological security for the city of Wuhan in Central China. By comparing the simulated ecological security values from 2010 using the improved CA model to the actual ecological security values of 2010, we got a relatively high value of the kappa coefficient, which indicates that this CA model can simulate or predict well future development of ecological security in Wuhan. Based on the prediction results for 2020, we made some policy recommendations for each district in Wuhan.
Secure FAST: Security Enhancement in the NATO Time Sensitive Targeting Tool
2010-11-01
designed to aid in the tracking and prosecuting of Time Sensitive Targets. The FAST tool provides user level authentication and authorisation in terms...level authentication and authorisation in terms of security. It uses operating system level security but does not provide application level security for...and collaboration tool, designed to aid in the tracking and prosecuting of Time Sensitive Targets. The FAST tool provides user level authentication and
An Agile Enterprise Regulation Architecture for Health Information Security Management
Chen, Ying-Pei; Hsieh, Sung-Huai; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie
2010-01-01
Abstract Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital. PMID:20815748
An agile enterprise regulation architecture for health information security management.
Chen, Ying-Pei; Hsieh, Sung-Huai; Cheng, Po-Hsun; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie
2010-09-01
Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital.
2013-01-01
Introduction Little is known about the relationship between food security status and predicted 10-year cardiovascular disease risk. The objective of this study was to examine the associations between food security status and cardiovascular disease risk factors and predicted 10-year risk in a national sample of US adults. Methods A cross-sectional analysis using data from 10,455 adults aged 20 years or older from the National Health and Nutrition Examination Survey 2003–2008 was conducted. Four levels of food security status were defined by using 10 questions. Results Among all participants, 83.9% had full food security, 6.7% had marginal food security, 5.8% had low food security, and 3.6% had very low food security. After adjustment, mean hemoglobin A1c was 0.15% greater and mean concentration of C-reactive protein was 0.8 mg/L greater among participants with very low food security than among those with full food security. The adjusted mean concentration of cotinine among participants with very low food security was almost double that of participants with full food security (112.8 vs 62.0 ng/mL, P < .001). No significant associations between food security status and systolic blood pressure or concentrations of total cholesterol, high-density lipoprotein cholesterol, or non-high-density lipoprotein cholesterol were observed. Participants aged 30 to 59 years with very low food security were more likely to have a predicted 10-year cardiovascular disease risk greater than 20% than fully food secure participants (adjusted prevalence ratio, 2.38; 95% CI, 1.31–4.31). Conclusion Adults aged 30 to 59 years with very low food security showed evidence of increased predicted 10-year cardiovascular disease risk. PMID:24309090
Ford, Earl S
2013-12-05
Little is known about the relationship between food security status and predicted 10-year cardiovascular disease risk. The objective of this study was to examine the associations between food security status and cardiovascular disease risk factors and predicted 10-year risk in a national sample of US adults. A cross-sectional analysis using data from 10,455 adults aged 20 years or older from the National Health and Nutrition Examination Survey 2003-2008 was conducted. Four levels of food security status were defined by using 10 questions. Among all participants, 83.9% had full food security, 6.7% had marginal food security, 5.8% had low food security, and 3.6% had very low food security. After adjustment, mean hemoglobin A1c was 0.15% greater and mean concentration of C-reactive protein was 0.8 mg/L greater among participants with very low food security than among those with full food security. The adjusted mean concentration of cotinine among participants with very low food security was almost double that of participants with full food security (112.8 vs 62.0 ng/mL, P < .001). No significant associations between food security status and systolic blood pressure or concentrations of total cholesterol, high-density lipoprotein cholesterol, or non-high-density lipoprotein cholesterol were observed. Participants aged 30 to 59 years with very low food security were more likely to have a predicted 10-year cardiovascular disease risk greater than 20% than fully food secure participants (adjusted prevalence ratio, 2.38; 95% CI, 1.31-4.31). Adults aged 30 to 59 years with very low food security showed evidence of increased predicted 10-year cardiovascular disease risk.
2011-01-01
Background Moving a forensic mental health patient from one level of therapeutic security to a lower level or to the community is influenced by more than risk assessment and risk management. We set out to construct and validate structured professional judgement instruments for consistency and transparency in decision making Methods Two instruments were developed, the seven-item DUNDRUM-3 programme completion instrument and the six item DUNDRUM-4 recovery instrument. These were assessed for all 95 forensic patients at Ireland's only forensic mental health hospital. Results The two instruments had good internal consistency (Cronbach's alpha 0.911 and 0.887). Scores distinguished those allowed no leave or accompanied leave from those with unaccompanied leave (ANOVA F = 38.1 and 50.3 respectively, p < 0.001). Scores also distinguished those in acute/high security units from those in medium or in low secure/pre-discharge units. Each individual item distinguished these levels of need significantly. The DUNDRUM-3 and DUNDRUM-4 correlated moderately with measures of dynamic risk and with the CANFOR staff rated unmet need (Spearman r = 0.5, p < 0.001). Conclusions The DUNDRUM-3 programme completion items distinguished significantly between levels of therapeutic security while the DUNDRUM-4 recovery items consistently distinguished those given unaccompanied leave outside the hospital and those in the lowest levels of therapeutic security. This data forms the basis for a prospective study of outcomes now underway. PMID:21722396
Hybrid architecture for building secure sensor networks
NASA Astrophysics Data System (ADS)
Owens, Ken R., Jr.; Watkins, Steve E.
2012-04-01
Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.
Open source system OpenVPN in a function of Virtual Private Network
NASA Astrophysics Data System (ADS)
Skendzic, A.; Kovacic, B.
2017-05-01
Using of Virtual Private Networks (VPN) can establish high security level in network communication. VPN technology enables high security networking using distributed or public network infrastructure. VPN uses different security and managing rules inside networks. It can be set up using different communication channels like Internet or separate ISP communication infrastructure. VPN private network makes security communication channel over public network between two endpoints (computers). OpenVPN is an open source software product under GNU General Public License (GPL) that can be used to establish VPN communication between two computers inside business local network over public communication infrastructure. It uses special security protocols and 256-bit Encryption and it is capable of traversing network address translators (NATs) and firewalls. It allows computers to authenticate each other using a pre-shared secret key, certificates or username and password. This work gives review of VPN technology with a special accent on OpenVPN. This paper will also give comparison and financial benefits of using open source VPN software in business environment.
[Biological security confronting bioterrorism].
Suárez Fernández, Guillermo
2002-01-01
A review is made on Biosecurity at both local and global level in relationship with Bioterrorism as a real threat and its control and prevention. The function of the network of High Security Laboratories around the world able to make immediate diagnosis, research on vaccines, fundamental and urgent epidemiological studies, conform a steady basis to control natural infections and also the possible bioterrorism attacks.
Reasoning about Probabilistic Security Using Task-PIOAs
NASA Astrophysics Data System (ADS)
Jaggard, Aaron D.; Meadows, Catherine; Mislove, Michael; Segala, Roberto
Task-structured probabilistic input/output automata (Task-PIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framework for the universal composability paradigms of protocol security. One of their advantages is that that they allow one to distinguish high-level nondeterminism that can affect the outcome of the protocol, from low-level choices, which can't. We present an alternative approach to analyzing the structure of Task-PIOAs that relies on ordered sets. We focus on two of the components that are required to define and apply Task-PIOAs: discrete probability theory and automata theory. We believe our development gives insight into the structure of Task-PIOAs and how they can be utilized to model crypto-protocols. We illustrate our approach with an example from anonymity, an area that has not previously been addressed using Task-PIOAs. We model Chaum's Dining Cryptographers Protocol at a level that does not require cryptographic primitives in the analysis. We show via this example how our approach can leverage a proof of security in the case a principal behaves deterministically to prove security when that principal behaves probabilistically.
Fast Video Encryption Using the H.264 Error Propagation Property for Smart Mobile Devices
Chung, Yongwha; Lee, Sungju; Jeon, Taewoong; Park, Daihee
2015-01-01
In transmitting video data securely over Video Sensor Networks (VSNs), since mobile handheld devices have limited resources in terms of processor clock speed and battery size, it is necessary to develop an efficient method to encrypt video data to meet the increasing demand for secure connections. Selective encryption methods can reduce the amount of computation needed while satisfying high-level security requirements. This is achieved by selecting an important part of the video data and encrypting it. In this paper, to ensure format compliance and security, we propose a special encryption method for H.264, which encrypts only the DC/ACs of I-macroblocks and the motion vectors of P-macroblocks. In particular, the proposed new selective encryption method exploits the error propagation property in an H.264 decoder and improves the collective performance by analyzing the tradeoff between the visual security level and the processing speed compared to typical selective encryption methods (i.e., I-frame, P-frame encryption, and combined I-/P-frame encryption). Experimental results show that the proposed method can significantly reduce the encryption workload without any significant degradation of visual security. PMID:25850068
A novel encryption scheme for high-contrast image data in the Fresnelet domain
Bibi, Nargis; Farwa, Shabieh; Jahngir, Adnan; Usman, Muhammad
2018-01-01
In this paper, a unique and more distinctive encryption algorithm is proposed. This is based on the complexity of highly nonlinear S box in Flesnelet domain. The nonlinear pattern is transformed further to enhance the confusion in the dummy data using Fresnelet technique. The security level of the encrypted image boosts using the algebra of Galois field in Fresnelet domain. At first level, the Fresnelet transform is used to propagate the given information with desired wavelength at specified distance. It decomposes given secret data into four complex subbands. These complex sub-bands are separated into two components of real subband data and imaginary subband data. At second level, the net subband data, produced at the first level, is deteriorated to non-linear diffused pattern using the unique S-box defined on the Galois field F28. In the diffusion process, the permuted image is substituted via dynamic algebraic S-box substitution. We prove through various analysis techniques that the proposed scheme enhances the cipher security level, extensively. PMID:29608609
Tang, Jiawei; Liu, Anfeng; Zhang, Jian; Xiong, Neal N; Zeng, Zhiwen; Wang, Tian
2018-03-01
The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in Energy-Harvesting Wireless Sensor Networks (EHWSNs). The main contributions of a TBSR are (a) the source nodes send data and notification to sinks through disjoint paths, separately; in such a mechanism, the data and notification can be verified independently to ensure their security. (b) Furthermore, the data and notification adopt a dynamic probability of marking and logging approach during the routing. Therefore, when attacked, the network will adopt the traceback approach to locate and clear malicious nodes to ensure security. The probability of marking is determined based on the level of battery remaining; when nodes harvest more energy, the probability of marking is higher, which can improve network security. Because if the probability of marking is higher, the number of marked nodes on the data packet routing path will be more, and the sink will be more likely to trace back the data packet routing path and find malicious nodes according to this notification. When data packets are routed again, they tend to bypass these malicious nodes, which make the success rate of routing higher and lead to improved network security. When the battery level is low, the probability of marking will be decreased, which is able to save energy. For logging, when the battery level is high, the network adopts a larger probability of marking and smaller probability of logging to transmit notification to the sink, which can reserve enough storage space to meet the storage demand for the period of the battery on low level; when the battery level is low, increasing the probability of logging can reduce energy consumption. After the level of battery remaining is high enough, nodes then send the notification which was logged before to the sink. Compared with past solutions, our results indicate that the performance of the TBSR scheme has been improved comprehensively; it can effectively increase the quantity of notification received by the sink by 20%, increase energy efficiency by 11%, reduce the maximum storage capacity needed by nodes by 33.3% and improve the success rate of routing by approximately 16.30%.
Tang, Jiawei; Zhang, Jian; Zeng, Zhiwen; Wang, Tian
2018-01-01
The Internet of things (IoT) is composed of billions of sensing devices that are subject to threats stemming from increasing reliance on communications technologies. A Trust-Based Secure Routing (TBSR) scheme using the traceback approach is proposed to improve the security of data routing and maximize the use of available energy in Energy-Harvesting Wireless Sensor Networks (EHWSNs). The main contributions of a TBSR are (a) the source nodes send data and notification to sinks through disjoint paths, separately; in such a mechanism, the data and notification can be verified independently to ensure their security. (b) Furthermore, the data and notification adopt a dynamic probability of marking and logging approach during the routing. Therefore, when attacked, the network will adopt the traceback approach to locate and clear malicious nodes to ensure security. The probability of marking is determined based on the level of battery remaining; when nodes harvest more energy, the probability of marking is higher, which can improve network security. Because if the probability of marking is higher, the number of marked nodes on the data packet routing path will be more, and the sink will be more likely to trace back the data packet routing path and find malicious nodes according to this notification. When data packets are routed again, they tend to bypass these malicious nodes, which make the success rate of routing higher and lead to improved network security. When the battery level is low, the probability of marking will be decreased, which is able to save energy. For logging, when the battery level is high, the network adopts a larger probability of marking and smaller probability of logging to transmit notification to the sink, which can reserve enough storage space to meet the storage demand for the period of the battery on low level; when the battery level is low, increasing the probability of logging can reduce energy consumption. After the level of battery remaining is high enough, nodes then send the notification which was logged before to the sink. Compared with past solutions, our results indicate that the performance of the TBSR scheme has been improved comprehensively; it can effectively increase the quantity of notification received by the sink by 20%, increase energy efficiency by 11%, reduce the maximum storage capacity needed by nodes by 33.3% and improve the success rate of routing by approximately 16.30%. PMID:29494561
Amano, Tatsuya; Sutherland, William J
2013-04-07
Global biodiversity conservation is seriously challenged by gaps and heterogeneity in the geographical coverage of existing information. Nevertheless, the key barriers to the collection and compilation of biodiversity information at a global scale have yet to be identified. We show that wealth, language, geographical location and security each play an important role in explaining spatial variations in data availability in four different types of biodiversity databases. The number of records per square kilometre is high in countries with high per capita gross domestic product (GDP), high proportion of English speakers and high security levels, and those located close to the country hosting the database; but these are not necessarily countries with high biodiversity. These factors are considered to affect data availability by impeding either the activities of scientific research or active international communications. Our results demonstrate that efforts to solve environmental problems at a global scale will gain significantly by focusing scientific education, communication, research and collaboration in low-GDP countries with fewer English speakers and located far from Western countries that host the global databases; countries that have experienced conflict may also benefit. Findings of this study may be broadly applicable to other fields that require the compilation of scientific knowledge at a global level.
Secure steganography designed for mobile platforms
NASA Astrophysics Data System (ADS)
Agaian, Sos S.; Cherukuri, Ravindranath; Sifuentes, Ronnie R.
2006-05-01
Adaptive steganography, an intelligent approach to message hiding, integrated with matrix encoding and pn-sequences serves as a promising resolution to recent security assurance concerns. Incorporating the above data hiding concepts with established cryptographic protocols in wireless communication would greatly increase the security and privacy of transmitting sensitive information. We present an algorithm which will address the following problems: 1) low embedding capacity in mobile devices due to fixed image dimensions and memory constraints, 2) compatibility between mobile and land based desktop computers, and 3) detection of stego images by widely available steganalysis software [1-3]. Consistent with the smaller available memory, processor capabilities, and limited resolution associated with mobile devices, we propose a more magnified approach to steganography by focusing adaptive efforts at the pixel level. This deeper method, in comparison to the block processing techniques commonly found in existing adaptive methods, allows an increase in capacity while still offering a desired level of security. Based on computer simulations using high resolution, natural imagery and mobile device captured images, comparisons show that the proposed method securely allows an increased amount of embedding capacity but still avoids detection by varying steganalysis techniques.
Design of the national health security preparedness index.
Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M
2014-01-01
The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.
NASA Astrophysics Data System (ADS)
Radhakrishnan, A.; Gupta, J.
2017-12-01
Climate change and variability has added many atrociousness to India's food security challenges and the relationship between the asset components of farmers and climate change is always complex. In India, dairy farming substantially contributes towards the food security and always plays a supportive role to agriculture from the adversities. This study provides an overview of the socio economic and livelihood vulnerability of small holder dairy farmers of India to climate change and variability in three dimensions — sensitivity, exposure and adaptive capacity by combining 70 indicators and 12 major components. The livelihood and socio economic vulnerability of dairy farmers to climate change and variability is assessed at taluka level in India through detailed house hold level data of livelihoods of Western Ghats region of India collected by several levels of survey and through Participatory Rural Appraisal (PRA) techniques from selected farmers complemented by thirty years of gridded weather data and other secondary data sources. The index score of dairy based livelihoods of Maharashtra was highly negative compared to other states with about 50 percent of farmers having high level of vulnerability with significant tradeoff between milk productivity and health, food, natural disasters-climate variability components. It finds that ensuring food security in the scenario of climate change will be a dreadful challenge and recommends identification of different potential options depending on local contexts at grass root level, the adoption of sustainable agricultural practices, focusing on improving the adaptive capacity component, provision of livelihood security, preparing the extensionists of Krishi Vigyan Kendras (KVKs)- universities to deal with the risks through extensive training programmes, long-term relief measures in the event of natural disasters, workshops on climate science and communication and promoting farmer centric extension system.
Gao, Yuan; Zhang, Chuanrong; He, Qingsong; Liu, Yaolin
2017-01-01
Ecological security is an important research topic, especially urban ecological security. As highly populated eco-systems, cities always have more fragile ecological environments. However, most of the research on urban ecological security in literature has focused on evaluating current or past status of the ecological environment. Very little literature has carried out simulation or prediction of future ecological security. In addition, there is even less literature exploring the urban ecological environment at a fine scale. To fill-in the literature gap, in this study we simulated and predicted urban ecological security at a fine scale (district level) using an improved Cellular Automata (CA) approach. First we used the pressure-state-response (PSR) method based on grid-scale data to evaluate urban ecological security. Then, based on the evaluation results, we imported the geographically weighted regression (GWR) concept into the CA model to simulate and predict urban ecological security. We applied the improved CA approach in a case study—simulating and predicting urban ecological security for the city of Wuhan in Central China. By comparing the simulated ecological security values from 2010 using the improved CA model to the actual ecological security values of 2010, we got a relatively high value of the kappa coefficient, which indicates that this CA model can simulate or predict well future development of ecological security in Wuhan. Based on the prediction results for 2020, we made some policy recommendations for each district in Wuhan. PMID:28617348
High performance reconciliation for continuous-variable quantum key distribution with LDPC code
NASA Astrophysics Data System (ADS)
Lin, Dakai; Huang, Duan; Huang, Peng; Peng, Jinye; Zeng, Guihua
2015-03-01
Reconciliation is a significant procedure in a continuous-variable quantum key distribution (CV-QKD) system. It is employed to extract secure secret key from the resulted string through quantum channel between two users. However, the efficiency and the speed of previous reconciliation algorithms are low. These problems limit the secure communication distance and the secure key rate of CV-QKD systems. In this paper, we proposed a high-speed reconciliation algorithm through employing a well-structured decoding scheme based on low density parity-check (LDPC) code. The complexity of the proposed algorithm is reduced obviously. By using a graphics processing unit (GPU) device, our method may reach a reconciliation speed of 25 Mb/s for a CV-QKD system, which is currently the highest level and paves the way to high-speed CV-QKD.
Holben, David H; Taylor, Christopher A
2015-09-01
Food insecurity is a preventable health threat and may precipitate central obesity and metabolic syndrome in children and adolescents in the United States. To examine (1) health by household food security status; and (2) differences and prevalence of central obesity among persons aged 12 to 18 years in the United States. The National Health and Nutrition Examination Survey was administered to a cross-sectional sample of persons aged 12 to 18 years in 1999 to 2006. Controlling for age, race/ethnicity, and sex differences in mean obesity and chronic disease factors across levels of food insecurity (analysis of covariance [Bonferroni post hoc] and ORs [logistic regression analyses]) were examined, as were differences in the rates of risk factors (χ(2) statistics). A total of 7435 participants were analyzed. Those from marginally food secure (n=751) and low-food secure (n=1206) (population size estimate, 26,714,182) households were significantly more likely than their high-food secure counterparts (n=4831) to be overweight (P=.036) (OR, 1.44), and those from marginally food secure households were 1.3-times more likely to be obese (P=.036). Nearly 25% of respondents from marginally food secure, low-food secure, and very low-food secure (n=647) households reported central obesity (P=.002), which was 1.4 to 1.5 times more likely than those from high-food secure households. Participants from high-food secure households had significantly higher mean high-density lipoprotein values (P=.019). Risk factors indicative of metabolic syndrome were present in 3.1%. Household food insecurity was associated with an increased likelihood of being overweight and having central obesity. Limitations included the use of cross-sectional data and some self-reported data and the inability to control for all moderating variables in obesity and overall health status.
Firefly: an optical lithographic system for the fabrication of holographic security labels
NASA Astrophysics Data System (ADS)
Calderón, Jorge; Rincón, Oscar; Amézquita, Ricardo; Pulido, Iván.; Amézquita, Sebastián.; Bernal, Andrés.; Romero, Luis; Agudelo, Viviana
2016-03-01
This paper introduces Firefly, an optical lithography origination system that has been developed to produce holographic masters of high quality. This mask-less lithography system has a resolution of 418 nm half-pitch, and generates holographic masters with the optical characteristics required for security applications of level 1 (visual verification), level 2 (pocket reader verification) and level 3 (forensic verification). The holographic master constitutes the main core of the manufacturing process of security holographic labels used for the authentication of products and documents worldwide. Additionally, the Firefly is equipped with a software tool that allows for the hologram design from graphic formats stored in bitmaps. The software is capable of generating and configuring basic optical effects such as animation and color, as well as effects of high complexity such as Fresnel lenses, engraves and encrypted images, among others. The Firefly technology gathers together optical lithography, digital image processing and the most advanced control systems, making possible a competitive equipment that challenges the best technologies in the industry of holographic generation around the world. In this paper, a general description of the origination system is provided as well as some examples of its capabilities.
Evaluating the Security of Machine Learning Algorithms
2008-05-20
Two far-reaching trends in computing have grown in significance in recent years. First, statistical machine learning has entered the mainstream as a...computing applications. The growing intersection of these trends compels us to investigate how well machine learning performs under adversarial conditions... machine learning has a structure that we can use to build secure learning systems. This thesis makes three high-level contributions. First, we develop a
PREMIX: PRivacy-preserving EstiMation of Individual admiXture.
Chen, Feng; Dow, Michelle; Ding, Sijie; Lu, Yao; Jiang, Xiaoqian; Tang, Hua; Wang, Shuang
2016-01-01
In this paper we proposed a framework: PRivacy-preserving EstiMation of Individual admiXture (PREMIX) using Intel software guard extensions (SGX). SGX is a suite of software and hardware architectures to enable efficient and secure computation over confidential data. PREMIX enables multiple sites to securely collaborate on estimating individual admixture within a secure enclave inside Intel SGX. We implemented a feature selection module to identify most discriminative Single Nucleotide Polymorphism (SNP) based on informativeness and an Expectation Maximization (EM)-based Maximum Likelihood estimator to identify the individual admixture. Experimental results based on both simulation and 1000 genome data demonstrated the efficiency and accuracy of the proposed framework. PREMIX ensures a high level of security as all operations on sensitive genomic data are conducted within a secure enclave using SGX.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This report documents the research that has been undertaken as background for preparation of a marketing campaign for middle and high school students to increase interest in national security careers at the National Nuclear Security Administration. This work is a part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. Previous research on the development of a properly trained and skilled national security workforce has identified a lack of interest by k-12 students in the STEM (Science, Technology, Engineering, and Mathematics) fields. Further, participation in these careers by womenmore » and minority populations is limited and is not increasing. Added to this are low educational achievement levels in New Mexico, where the marketing campaign will be deployed.« less
Peter, Frank J.; Dalton, Larry J.; Plummer, David W.
2002-01-01
A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.
What Roles and Missions for Europe’s Military and Security Forces in the 21st Century?
2005-08-01
Studies Dr. John L. Clarke vi Executive Summary Are armies the dinosaurs of the 21st Century, soon to become extinct in the new security environment? What...and 40-year old weapons systems. Dr. John L. Clarke 6 For many reasons , Europe’s armed forces are in a long-term period of decline, and this trend is...in a reasonable period of time and on a high level of interoperability. The capability of carrying out sophisticated operations with a high operational
NASA Astrophysics Data System (ADS)
Lupo, Cosmo; Ottaviani, Carlo; Papanastasiou, Panagiotis; Pirandola, Stefano
2018-05-01
We present a rigorous security analysis of continuous-variable measurement-device-independent quantum key distribution (CV MDI QKD) in a finite-size scenario. The security proof is obtained in two steps: by first assessing the security against collective Gaussian attacks, and then extending to the most general class of coherent attacks via the Gaussian de Finetti reduction. Our result combines recent state-of-the-art security proofs for CV QKD with findings about min-entropy calculus and parameter estimation. In doing so, we improve the finite-size estimate of the secret key rate. Our conclusions confirm that CV MDI protocols allow for high rates on the metropolitan scale, and may achieve a nonzero secret key rate against the most general class of coherent attacks after 107-109 quantum signal transmissions, depending on loss and noise, and on the required level of security.
An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard
NASA Astrophysics Data System (ADS)
Fan, Yibo; Wang, Jidong; Ikenaga, Takeshi; Tsunoo, Yukiyasu; Goto, Satoshi
H.264/AVC is the newest video coding standard. There are many new features in it which can be easily used for video encryption. In this paper, we propose a new scheme to do video encryption for H.264/AVC video compression standard. We define Unequal Secure Encryption (USE) as an approach that applies different encryption schemes (with different security strength) to different parts of compressed video data. This USE scheme includes two parts: video data classification and unequal secure video data encryption. Firstly, we classify the video data into two partitions: Important data partition and unimportant data partition. Important data partition has small size with high secure protection, while unimportant data partition has large size with low secure protection. Secondly, we use AES as a block cipher to encrypt the important data partition and use LEX as a stream cipher to encrypt the unimportant data partition. AES is the most widely used symmetric cryptography which can ensure high security. LEX is a new stream cipher which is based on AES and its computational cost is much lower than AES. In this way, our scheme can achieve both high security and low computational cost. Besides the USE scheme, we propose a low cost design of hybrid AES/LEX encryption module. Our experimental results show that the computational cost of the USE scheme is low (about 25% of naive encryption at Level 0 with VEA used). The hardware cost for hybrid AES/LEX module is 4678 Gates and the AES encryption throughput is about 50Mbps.
A Hierarchical Security Architecture for Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Quanyan Zhu; Tamer Basar
2011-08-01
Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.
McElwain, Nancy L; Holland, Ashley S; Engle, Jennifer M; Wong, Maria S
2012-02-01
Child-mother attachment security, assessed via a modified Strange Situation procedure (Cassidy & Marvin, with the MacArthur Attachment Working Group, 1992), and parent-reported child proneness to anger were examined as correlates of observed child behavior toward mothers during a series of interactive tasks (N = 120, 60 girls). Controlling for maternal sensitivity and child gender and expressive language ability, greater attachment security, and lower levels of anger proneness were related to more child responsiveness to maternal requests and suggestions during play and snack sessions. As hypothesized, anger proneness also moderated several security-behavior associations. Greater attachment security was related to (a) more committed compliance during clean-up and snack-delay tasks for children high on anger proneness, (b) more self-assertiveness during play and snack for children moderate or high on anger proneness, and (c) more help-seeking during play and snack for children moderate or low on anger proneness. Findings further our understanding of the behavioral correlates of child-mother attachment security assessed during late toddlerhood via the Cassidy-Marvin system and underscore child anger proneness as a moderator of attachment-related differences in child behavior during this developmental period.
A Multifactor Secure Authentication System for Wireless Payment
NASA Astrophysics Data System (ADS)
Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip
Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.
Information Security Risk Assessment in Hospitals.
Ayatollahi, Haleh; Shagerdi, Ghazal
2017-01-01
To date, many efforts have been made to classify information security threats, especially in the healthcare area. However, there are still many unknown risks which may threat the security of health information and their resources especially in the hospitals. The aim of this study was to assess the risks threatening information security in the hospitals located in one of the northwest cities of Iran. This study was completed in 2014. The participants were information technology managers who worked in the hospitals (n=27). The research instrument was a questionnaire composed of a number of open and closed questions. The content validity of the questionnaire was confirmed, and the reliability of the closed questions was measured by using the test-retest method (r =0.78). The results showed that among the information security risks, fire found to be a high probability/high impact risk factor. Human and physical/environmental threats were among the low probability risk factors. Regarding the information security safeguards used in the hospitals, the results showed that the use of the technical safeguards was the most frequent one (n =22, 91.7%) compared to the administrative (n =21, 87.5%) and the physical safeguards (n =16, 66.7%). The high probability risk factors require quick corrective actions to be taken. Therefore, the underlying causes of such threats should be identified and controlled before experiencing adverse effects. It is also important to note that information security in health care systems needs to be considered at a macro level with respect to the national interests and policies.
A Study on the Security Levels of Spread-Spectrum Embedding Schemes in the WOA Framework.
Wang, Yuan-Gen; Zhu, Guopu; Kwong, Sam; Shi, Yun-Qing
2017-08-23
Security analysis is a very important issue for digital watermarking. Several years ago, according to Kerckhoffs' principle, the famous four security levels, namely insecurity, key security, subspace security, and stego-security, were defined for spread-spectrum (SS) embedding schemes in the framework of watermarked-only attack. However, up to now there has been little application of the definition of these security levels to the theoretical analysis of the security of SS embedding schemes, due to the difficulty of the theoretical analysis. In this paper, based on the security definition, we present a theoretical analysis to evaluate the security levels of five typical SS embedding schemes, which are the classical SS, the improved SS (ISS), the circular extension of ISS, the nonrobust and robust natural watermarking, respectively. The theoretical analysis of these typical SS schemes are successfully performed by taking advantage of the convolution of probability distributions to derive the probabilistic models of watermarked signals. Moreover, simulations are conducted to illustrate and validate our theoretical analysis. We believe that the theoretical and practical analysis presented in this paper can bridge the gap between the definition of the four security levels and its application to the theoretical analysis of SS embedding schemes.
Security systems engineering overview
DOE Office of Scientific and Technical Information (OSTI.GOV)
Steele, B.J.
Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, andmore » counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).« less
A security scheme of SMS system
NASA Astrophysics Data System (ADS)
Zhang, Fangzhou; Yang, Hong-Wei; Song, Chuck
2005-02-01
With the prosperous development and the use of SMS, more and more important information need to be transferred through the wireless and mobile networks by the users. But in the GSM/GPRS network, the SMS messages are transferred in text mode through the signaling channel and there is no integrality for SMS messages. Because of the speciality of the mobile communications, the security of signaling channel is very weak. So we need to improve and enhance the security and integrality of SMS. At present, developed investigation based on SMS security is still incomplete. The key distribution and management is not perfect to meet the usability in a wide area. This paper introduces a high-level security method to solve this problem. We design the Secure SMS of GSM/GPRS in order to improve the security of the important information that need to be transferred by the mobile networks. Using this method, we can improve the usability of E-payment and other mobile electronic commerce.
Improving the Automated Detection and Analysis of Secure Coding Violations
2014-06-01
eliminating software vulnerabilities and other flaws. The CERT Division produces books and courses that foster a security mindset in developers, and...website also provides a virtual machine containing a complete build of the Rosecheckers project on Linux . The Rosecheckers project leverages the...Compass/ROSE6 project developed at Law- rence Livermore National Laboratory. This project provides a high-level API for accessing the abstract syntax tree
Self Managing the Consequences of Major Limb Trauma
2007-03-01
rehabilitation to the community – whether that be in the military or 15. SUBJECT TERMS Self Management, Trauma, Online Learning 16. SECURITY...Task # 1). The Flash platform was chosen based on its high level of market penetration (greater than 98% in the U.S.A.), ease of integration with...management system to facilitate seamless transitions between lessons, online chats, message boards, and evaluation questionnaires using a single security
Study on the early warning mechanism for the security of blast furnace hearths
NASA Astrophysics Data System (ADS)
Zhao, Hong-bo; Huo, Shou-feng; Cheng, Shu-sen
2013-04-01
The campaign life of blast furnace (BF) hearths has become the limiting factor for safety and high efficiency production of modern BFs. However, the early warning mechanism of hearth security has not been clear. In this article, based on heat transfer calculations, heat flux and erosion monitoring, the features of heat flux and erosion were analyzed and compared among different types of hearths. The primary detecting elements, mathematical models, evaluating standards, and warning methods were discussed. A novel early warning mechanism with the three-level quantificational standards was proposed for BF hearth security.
Information Security Scheme Based on Computational Temporal Ghost Imaging.
Jiang, Shan; Wang, Yurong; Long, Tao; Meng, Xiangfeng; Yang, Xiulun; Shu, Rong; Sun, Baoqing
2017-08-09
An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.
Malka, Ariel; Soto, Christopher J; Inzlicht, Michael; Lelkes, Yphtach
2014-06-01
We examine whether individual differences in needs for security and certainty predict conservative (vs. liberal) position on both cultural and economic political issues and whether these effects are conditional on nation-level characteristics and individual-level political engagement. Analyses with cross-national data from 51 nations reveal that valuing conformity, security, and tradition over self-direction and stimulation (a) predicts ideological self-placement on the political right, but only among people high in political engagement and within relatively developed nations, ideologically constrained nations, and non-Eastern European nations, (b) reliably predicts right-wing cultural attitudes and does so more strongly within developed and ideologically constrained nations, and (c) on average predicts left-wing economic attitudes but does so more weakly among people high in political engagement, within ideologically constrained nations, and within non-Eastern European nations. These findings challenge the prevailing view that needs for security and certainty organically yield a broad right-wing ideology and that exposure to political discourse better equips people to select the broad ideology that is most need satisfying. Rather, these findings suggest that needs for security and certainty generally yield culturally conservative but economically left-wing preferences and that exposure to political discourse generally weakens the latter relation. We consider implications for the interactive influence of personality characteristics and social context on political attitudes and discuss the importance of assessing multiple attitude domains, assessing political engagement, and considering national characteristics when studying the psychological origins of political attitudes.
VAB Platform K(2) Lift & Install into Highbay 3
2016-03-07
Work is underway to secure the second half of the K-level work platforms for NASA’s Space Launch System (SLS) rocket in High Bay 3 inside the Vehicle Assembly Building at NASA's Kennedy Space Center in Florida. The platform is being secured into position on tower E, about 86 feet above the floor. The K work platforms will provide access to NASA's Space Launch System (SLS) core stage and solid rocket boosters during processing and stacking operations on the mobile launcher. The Ground Systems Development and Operations Program is overseeing upgrades and modifications to High Bay 3 to support processing of the SLS and Orion spacecraft. A total of 10 levels of new platforms, 20 platform halves altogether, will surround the SLS rocket and Orion spacecraft.
NASA Technical Reports Server (NTRS)
2002-01-01
When fully developed for NASA, Vanguard Enforcer(TM) software-which emulates the activities of highly technical security system programmers, auditors, and administrators-was among the first intrusion detection programs to restrict human errors from affecting security, and to ensure the integrity of a computer's operating systems, as well as the protection of mission critical resources. Vanguard Enforcer was delivered in 1991 to Johnson Space Center and has been protecting systems and critical data there ever since. In August of 1999, NASA granted Vanguard exclusive rights to commercialize the Enforcer system for the private sector. In return, Vanguard continues to supply NASA with ongoing research, development, and support of Enforcer. The Vanguard Enforcer 4.2 is one of several surveillance technologies that make up the Vanguard Security Solutions line of products. Using a mainframe environment, Enforcer 4.2 achieves previously unattainable levels of automated security management.
Parenreng, Jumadi Mabe; Kitagawa, Akio
2018-05-17
Wireless Sensor Networks (WSNs) with limited battery, central processing units (CPUs), and memory resources are a widely implemented technology for early warning detection systems. The main advantage of WSNs is their ability to be deployed in areas that are difficult to access by humans. In such areas, regular maintenance may be impossible; therefore, WSN devices must utilize their limited resources to operate for as long as possible, but longer operations require maintenance. One method of maintenance is to apply a resource adaptation policy when a system reaches a critical threshold. This study discusses the application of a security level adaptation model, such as an ARSy Framework, for using resources more efficiently. A single node comprising a Raspberry Pi 3 Model B and a DS18B20 temperature sensor were tested in a laboratory under normal and stressful conditions. The result shows that under normal conditions, the system operates approximately three times longer than under stressful conditions. Maintaining the stability of the resources also enables the security level of a network's data output to stay at a high or medium level.
Kitagawa, Akio
2018-01-01
Wireless Sensor Networks (WSNs) with limited battery, central processing units (CPUs), and memory resources are a widely implemented technology for early warning detection systems. The main advantage of WSNs is their ability to be deployed in areas that are difficult to access by humans. In such areas, regular maintenance may be impossible; therefore, WSN devices must utilize their limited resources to operate for as long as possible, but longer operations require maintenance. One method of maintenance is to apply a resource adaptation policy when a system reaches a critical threshold. This study discusses the application of a security level adaptation model, such as an ARSy Framework, for using resources more efficiently. A single node comprising a Raspberry Pi 3 Model B and a DS18B20 temperature sensor were tested in a laboratory under normal and stressful conditions. The result shows that under normal conditions, the system operates approximately three times longer than under stressful conditions. Maintaining the stability of the resources also enables the security level of a network’s data output to stay at a high or medium level. PMID:29772773
Food security assessment in the coastal area of Demak Regency
NASA Astrophysics Data System (ADS)
Harini, R.; Handayani, H. N.; Ramdani, F. R.
2018-04-01
Food security is an issue of national and global level. Food is a basic human need to live. Without food will threaten human life. This research was conducted in coastal area of Demak Regency. This research is to understand the potential of human resources, natural resources and assess the level of food security of coastal communities. The data used are primary data through interviews with the local community. Also used Secondary data from government agencies. Data analysis used qualitative and quantitative descriptive methods through graphs, tables and maps. The results showed that potential of human resources in Demak coastal area (Wedung, Purworejo, and Sidogemah villages) is low. It can be indicated from education level of respondents in Demak are elementary school and junior high school. Beside, total households income are about 2-4 million. This study found that the households sampled are 90% is food insecured households. The most of households in Demak coastal area are about 90% households include on insecurity food category.
A Performance Analysis of Public Expenditure on Maternal Health in Mexico.
Servan-Mori, Edson; Avila-Burgos, Leticia; Nigenda, Gustavo; Lozano, Rafael
2016-01-01
We explore the relationship between public expenditure, coverage of adequate ANC (including timing, frequent and content), and the maternal mortality ratio--adjusted by coverage of adequate ANC--observed in Mexico in 2012 at the State level. Additionally, we examine the inequalities and concentration of public expenditure between populations with and without Social Security. Results suggest that in the 2003-2011 period, the public expenditure gap between women with and without Social Security decreased 74%, however, the distribution is less equitable among women without Social Security, across the States. Despite high levels of coverage on each dimension of ANC explored, coverage of adequate ANC was lower among Social Security than non-Social Security women. This variability results in differences up to 1.5 times in State-adjusted maternal mortality rate at the same level of expense and maternal mortality rate, respectively. The increase in the economic resources is only a necessary condition for achieving improved health outcomes. Providing adequate health services and achieving efficient, effective and transparent use of resources in health, are critical elements for health systems performance. The attainment of universal effective coverage of maternal health and reducing maternal mortality in Mexico, requires the adjustment of policy innovations including the rules of allocation and execution of health resources. Health policies should be designed on a more holistic view promoting a balance between accessibility, effective implementation and rigorous stewardship.
A Performance Analysis of Public Expenditure on Maternal Health in Mexico
Servan-Mori, Edson; Avila-Burgos, Leticia; Nigenda, Gustavo; Lozano, Rafael
2016-01-01
We explore the relationship between public expenditure, coverage of adequate ANC (including timing, frequent and content), and the maternal mortality ratio -adjusted by coverage of adequate ANC- observed in Mexico in 2012 at the State level. Additionally, we examine the inequalities and concentration of public expenditure between populations with and without Social Security. Results suggest that in the 2003–2011 period, the public expenditure gap between women with and without Social Security decreased 74%, however, the distribution is less equitable among women without Social Security, across the States. Despite high levels of coverage on each dimension of ANC explored, coverage of adequate ANC was lower among Social Security than non-Social Security women. This variability results in differences up to 1.5 times in State-adjusted maternal mortality rate at the same level of expense and maternal mortality rate, respectively. The increase in the economic resources is only a necessary condition for achieving improved health outcomes. Providing adequate health services and achieving efficient, effective and transparent use of resources in health, are critical elements for health systems performance. The attainment of universal effective coverage of maternal health and reducing maternal mortality in Mexico, requires the adjustment of policy innovations including the rules of allocation and execution of health resources. Health policies should be designed on a more holistic view promoting a balance between accessibility, effective implementation and rigorous stewardship. PMID:27043819
Urban Household Characteristics and Dietary Diversity: An Analysis of Food Security in Accra, Ghana.
Codjoe, Samuel Nii Ardey; Okutu, David; Abu, Mumuni
2016-06-01
The world's population is increasingly becoming urbanized. If the current urban growth rate is to continue, new and unprecedented challenges for food security will be inevitable. Dietary diversity has been used to ascertain food security status albeit at the multicountry and country levels. Thus, household-level studies in urban settings, particularly in sub-Sahara African, are few. Yet, it is imperative that assessments of food security are undertaken particularly in urban settings, due to the projected fast rate of urbanization and the challenges of attaining food security. To examine household characteristics and dietary diversity. The study uses data from 452 households from the second round of the Regional Institute for Population Studies (RIPS) EDULINK urban poverty and health study. Bivariate and multivariate analyses are undertaken. Mean dietary diversity for all households is 6.8. Vegetables have the highest diversity, followed by cereal-based and grain products. Household characteristics that have statistically significant associations with dietary diversity include sex and level of education of household head, household wealth quintile, and source of food. There is high dietary diversity in the study communities of Accra but low consumption of foods rich in micronutrient, such as fruits and milk/dairy products. The study brings to fore issues related to resource-disadvantaged entities of the urban system, namely, females, poor households, and the non-educated who have food insecurity problems. © The Author(s) 2016.
A new method of enhancing telecommand security: the application of GCM in TC protocol
NASA Astrophysics Data System (ADS)
Zhang, Lei; Tang, Chaojing; Zhang, Quan
2007-11-01
In recent times, security has grown to a topic of major importance for the space missions. Many space agencies have been engaged in research on the selection of proper algorithms for ensuring Telecommand security according to the space communication environment, especially in regard to the privacy and authentication. Since space missions with high security levels need to ensure both privacy and authentication, Authenticated Encryption with Associated Data schemes (AEAD) be integrated into normal Telecommand protocols. This paper provides an overview of the Galois Counter Mode (GCM) of operation, which is one of the available two-pass AEAD schemes, and some preliminary considerations and analyses about its possible application to Telecommand frames specified by CCSDS.
Modeling, Simulation and Analysis of Public Key Infrastructure
NASA Technical Reports Server (NTRS)
Liu, Yuan-Kwei; Tuey, Richard; Ma, Paul (Technical Monitor)
1998-01-01
Security is an essential part of network communication. The advances in cryptography have provided solutions to many of the network security requirements. Public Key Infrastructure (PKI) is the foundation of the cryptography applications. The main objective of this research is to design a model to simulate a reliable, scalable, manageable, and high-performance public key infrastructure. We build a model to simulate the NASA public key infrastructure by using SimProcess and MatLab Software. The simulation is from top level all the way down to the computation needed for encryption, decryption, digital signature, and secure web server. The application of secure web server could be utilized in wireless communications. The results of the simulation are analyzed and confirmed by using queueing theory.
Securing health sensing using integrated circuit metric.
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-10-20
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.
Securing Health Sensing Using Integrated Circuit Metric
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-01-01
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250
A Network Access Control Framework for 6LoWPAN Networks
Oliveira, Luís M. L.; Rodrigues, Joel J. P. C.; de Sousa, Amaro F.; Lloret, Jaime
2013-01-01
Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. PMID:23334610
School Security: For Whom and with What Results?
ERIC Educational Resources Information Center
Servoss, Timothy J.; Finn, Jeremy D.
2014-01-01
This study utilized school-level data from several combined national databases to address two questions regarding school security policy: (1) What are the school characteristics related to levels of security? (2) How does security relate to school suspension, dropout, and college attendance rates? Among the predictors of school security, having a…
Emergency positioning system accuracy with infrared LEDs in high-security facilities
NASA Astrophysics Data System (ADS)
Knoch, Sierra N.; Nelson, Charles; Walker, Owens
2017-05-01
Instantaneous personnel location presents a challenge in Department of Defense applications where high levels of security restrict real-time tracking of crew members. During emergency situations, command and control requires immediate accountability of all personnel. Current radio frequency (RF) based indoor positioning systems can be unsuitable due to RF leakage and electromagnetic interference with sensitively calibrated machinery on variable platforms like ships, submarines and high-security facilities. Infrared light provide a possible solution to this problem. This paper proposes and evaluates an indoor line-of-sight positioning system that is comprised of IR and high-sensitivity CMOS camera receivers. In this system the movement of the LEDs is captured by the camera, uploaded and analyzed; the highest point of power is located and plotted to create a blueprint of crewmember location. Results provided evaluate accuracy as a function of both wavelength and environmental conditions. Research will further evaluate the accuracy of the LED transmitter and CMOS camera receiver system. Transmissions in both the 780 and 850nm IR are analyzed.
Information risk and security modeling
NASA Astrophysics Data System (ADS)
Zivic, Predrag
2005-03-01
This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.
NASA Astrophysics Data System (ADS)
Perry, William G.
2006-04-01
One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.
An Australian Land Force for Conflict in a World Without Precedent (Future Warfare Concept Paper)
2009-01-01
Michael B. Ryan, Australian Army Thesis: The current pace of change in the global security environment and information technology demands that, like...information) Wave societies.6 The current pace of change in the global security environment and information technology demands that, like all...Blue, downloaded from www.defence.gov.au/navy; La Franchi , Peter, “High Level Interoperability: Future Development of t Peter, “Development Role
Household food security status and associated factors among high-school students in Esfahan, Iran.
Mohammadzadeh, Assieh; Dorosty, Ahmadreza; Eshraghian, Mohammadreza
2010-10-01
The present study was designed to determine household food security status and factors associated with food insecurity among high-school students in Esfahan, Iran. Cross-sectional surveys. The present study was conducted in autumn 2008 in Esfahan, Iran. The samples were selected using systematic cluster sampling. Socio-economic questionnaires, food security questionnaires and FFQ were filled out during face-to-face interviews. In addition, data on participants' weights and heights were collected. A total of 580 students (261 boys and 319 girls) aged 14-17 years from forty high schools in Esfahan, Iran, were selected. The prevalence of household food insecurity according to the US Department of Agriculture food security questionnaire was 36.6 % (95 % CI 0.33, 0.40). Food insecurity was positively associated with number of members in the household (P < 0.05) and negatively associated with parental education level and job status and household economic status (P < 0.05). Moreover, students living in food-insecure households more frequently consumed bread, macaroni, potato and egg (P < 0.05), while they less frequently consumed rice, red meat, sausage and hamburger, poultry, fish, green vegetables, root and bulb (coloured) vegetables, melons, apples and oranges, milk and yoghurt (P < 0.05). Food insecurity was prevalent among households in Esfahan, Iran, and food security status was associated with socio-economic factors. Students who belonged to food-secure households more frequently consumed healthy foods (except sausage and hamburger), whereas those living in food-insecure households more frequently consumed cheap foods containing high energy per kilogram. The present study suggests that intervention programmes be designed and carried out.
Long, C G; Anagnostakis, K; Fox, E; Silaule, P; Somers, J; West, R; Webster, A
2011-07-01
Social climate has been measured in a variety of therapeutic settings, but there is little information about it in secure mental health services, or how it may vary along a gender specific care pathway. To assess social climate in women's secure wards and its variation by level of security and ward type, therapeutic alliance, patient motivation, treatment engagement and disturbed behaviour. Three-quarters (80, 76%) of staff and nearly all (65, 92%) of patients in the two medium-security wards and two low-security wards that comprised the unit completed the Essen Climate Evaluation Schema (EssenCES) and the California Psychotherapy Alliance Scale (CALPAS); patients also completed the Patient Motivation Inventory (PMI). Pre-assessment levels of disturbed behaviour and treatment engagement were recorded. Social climate varied according to ward type and level of security. EssenCES ratings indicative of positive social climate were associated with lower levels of security; such ratings were also associated with lower behavioural disturbance and with higher levels of motivation, treatment engagement and therapeutic alliance. This serial cross-sectional survey indicated that use of the EssenCES alone might be a good practical measure of treatment progress/responsivity. A longitudinal study would be an important next step in establishing the extent to which it would be useful in this regard. Copyright © 2010 John Wiley & Sons, Ltd.
Information Security Risk Assessment in Hospitals
Ayatollahi, Haleh; Shagerdi, Ghazal
2017-01-01
Background: To date, many efforts have been made to classify information security threats, especially in the healthcare area. However, there are still many unknown risks which may threat the security of health information and their resources especially in the hospitals. Objective: The aim of this study was to assess the risks threatening information security in the hospitals located in one of the northwest cities of Iran. Method: This study was completed in 2014. The participants were information technology managers who worked in the hospitals (n=27). The research instrument was a questionnaire composed of a number of open and closed questions. The content validity of the questionnaire was confirmed, and the reliability of the closed questions was measured by using the test-retest method (r =0.78). Results: The results showed that among the information security risks, fire found to be a high probability/high impact risk factor. Human and physical/environmental threats were among the low probability risk factors. Regarding the information security safeguards used in the hospitals, the results showed that the use of the technical safeguards was the most frequent one (n =22, 91.7%) compared to the administrative (n =21, 87.5%) and the physical safeguards (n =16, 66.7%). Conclusion: The high probability risk factors require quick corrective actions to be taken. Therefore, the underlying causes of such threats should be identified and controlled before experiencing adverse effects. It is also important to note that information security in health care systems needs to be considered at a macro level with respect to the national interests and policies. PMID:29204226
Statistical Models for Predicting Threat Detection From Human Behavior.
Kelley, Timothy; Amon, Mary J; Bertenthal, Bennett I
2018-01-01
Users must regularly distinguish between secure and insecure cyber platforms in order to preserve their privacy and safety. Mouse tracking is an accessible, high-resolution measure that can be leveraged to understand the dynamics of perception, categorization, and decision-making in threat detection. Researchers have begun to utilize measures like mouse tracking in cyber security research, including in the study of risky online behavior. However, it remains an empirical question to what extent real-time information about user behavior is predictive of user outcomes and demonstrates added value compared to traditional self-report questionnaires. Participants navigated through six simulated websites, which resembled either secure "non-spoof" or insecure "spoof" versions of popular websites. Websites also varied in terms of authentication level (i.e., extended validation, standard validation, or partial encryption). Spoof websites had modified Uniform Resource Locator (URL) and authentication level. Participants chose to "login" to or "back" out of each website based on perceived website security. Mouse tracking information was recorded throughout the task, along with task performance. After completing the website identification task, participants completed a questionnaire assessing their security knowledge and degree of familiarity with the websites simulated during the experiment. Despite being primed to the possibility of website phishing attacks, participants generally showed a bias for logging in to websites versus backing out of potentially dangerous sites. Along these lines, participant ability to identify spoof websites was around the level of chance. Hierarchical Bayesian logistic models were used to compare the accuracy of two-factor (i.e., website security and encryption level), survey-based (i.e., security knowledge and website familiarity), and real-time measures (i.e., mouse tracking) in predicting risky online behavior during phishing attacks. Participant accuracy in identifying spoof and non-spoof websites was best captured using a model that included real-time indicators of decision-making behavior, as compared to two-factor and survey-based models. Findings validate three widely applicable measures of user behavior derived from mouse tracking recordings, which can be utilized in cyber security and user intervention research. Survey data alone are not as strong at predicting risky Internet behavior as models that incorporate real-time measures of user behavior, such as mouse tracking.
Lawlis, Tanya; Islam, Wasima; Upton, Penney
2018-04-01
Food security is defined by four dimensions: food availability, access, utilisation and stability. Resettled refugees face unique struggles securing these dimensions and, thus, food security when moving to a new country. This systematic review aimed to identify the challenges Australian refugees experience in achieving the four dimensions of food security. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines were followed; the SPIDER tool was used to determine eligibility criteria. Three databases were searched using terms relating to food in/security and refugees from 2000 to 20 May 2017. Seven articles were retained for analysis. Studies were categorised against the four dimensions, with four studies identifying challenges against all dimensions. Challenges contributing to high levels of food insecurity in each dimension included: availability and cost of traditional foods, difficulty in accessing preferred food outlets, limited food knowledge and preparation skills and food stability due to low income and social support. Food insecurity adversely impacts refugee health and integration. Methodical research framed by the four dimensions of food security is imperative to address challenges to securing food security in refugee groups and assisting in the development of sustainable interventions. © 2017 Dietitians Association of Australia.
High-accurate optical fiber liquid level sensor
NASA Astrophysics Data System (ADS)
Sun, Dexing; Chen, Shouliu; Pan, Chao; Jin, Henghuan
1991-08-01
A highly accurate optical fiber liquid level sensor is presented. The single-chip microcomputer is used to process and control the signal. This kind of sensor is characterized by self-security and is explosion-proof, so it can be applied in any liquid level detecting areas, especially in the oil and chemical industries. The theories and experiments about how to improve the measurement accuracy are described. The relative error for detecting the measurement range 10 m is up to 0.01%.
Zeinali, Ali; Sharifi, Hassanpasha; Enayati, Mirsalahadine; Asgari, Parviz; Pasha, Gohlamreza
2011-09-01
The purpose of present study was to create and test a model that illustrates variables that influence the development of addiction susceptibility and determine how different styles of parenting may indirectly influence the addiction susceptibility of children through the mediators of attachment style and self-regulation. Using random cluster sampling, 508 adolescent high school boys and girls aged 14-19 years were enrolled. Data were analyzed using structural equations modeling (path analysis). The results showed that authoritative and permissive parenting styles were associated with secure attachment whereas authoritarian and neglectful parenting styles were associated with insecure attachment. Insecure attachment was associated with a low level of self-regulation whereas secure attachment was associated with a high level of self-regulation. We found that a low level of self-regulation increased the adolescent's addiction susceptibility whereas a high level of self-regulation decreased their addiction susceptibility. The findings of present study suggest the authoritative and permissive parenting styles as the most efficient styles and authoritarian and neglectful parenting styles as the most inefficient styles in terms of addiction susceptibility. Accordingly, efficient parenting style training to parents should be the main goal of drug demand reduction program.
Majumdar, Tapas; Haldar, Basudeb; Mallick, Arabinda
2017-02-20
A simple strategy is proposed to design and develop an intelligent device based on dual channel ion responsive spectral properties of a commercially available molecule, harmine (HM). The system can process different sets of opto-chemical inputs generating different patterns as fluorescence outputs at specific wavelengths which can provide an additional level of protection exploiting both password and pattern recognitions. The proposed system could have the potential to come up with highly secured combinatorial locks at the molecular level that could pose valuable real time and on-site applications for user authentication.
NASA Astrophysics Data System (ADS)
Majumdar, Tapas; Haldar, Basudeb; Mallick, Arabinda
2017-02-01
A simple strategy is proposed to design and develop an intelligent device based on dual channel ion responsive spectral properties of a commercially available molecule, harmine (HM). The system can process different sets of opto-chemical inputs generating different patterns as fluorescence outputs at specific wavelengths which can provide an additional level of protection exploiting both password and pattern recognitions. The proposed system could have the potential to come up with highly secured combinatorial locks at the molecular level that could pose valuable real time and on-site applications for user authentication.
[Psychiatric security units in Norway. Patients and activity].
Linaker, O M; Thoresen, R; Figenschou, L; Sølvberg, H; Refsnes, U; Jakobsen, D
1994-05-20
The authors briefly discuss past and present reasons for the psychiatric security unit system in Norway. They describe the patients in these units at the beginning of 1993 (N = 123). Of these patients, 16% were females, 78% had a main diagnosis of schizophrenia, and 12% were admitted because of personality disorders. Physical restraints had been used for 25%, pharmacological restraints for 17%, and forced pharmacological treatment had been necessary for 26% of the patients during the last six months. There were high rates of behaviour problems related to criminality, abuse, violence and auto-aggression. Nearly all the patients were committed involuntarily, and additional legal restrictions were imposed for one third of them. The majority (63%) of the patients had been in security units for more than one year. The highest levels of security within the security unit system were used for those with the most serious criminality or behaviour problems prior to admission.
Use of Computer-Generated Holograms in Security Hologram Applications
NASA Astrophysics Data System (ADS)
Bulanovs, A.; Bakanas, R.
2016-10-01
The article discusses the use of computer-generated holograms (CGHs) for the application as one of the security features in the relief-phase protective holograms. An improved method of calculating CGHs is presented, based on ray-tracing approach in the case of interference of parallel rays. Software is developed for the calculation of multilevel phase CGHs and their integration in the application of security holograms. Topology of calculated computer-generated phase holograms was recorded on the photoresist by the optical greyscale lithography. Parameters of the recorded microstructures were investigated with the help of the atomic-force microscopy (AFM) and scanning electron microscopy (SEM) methods. The results of the research have shown highly protective properties of the security elements based on CGH microstructures. In our opinion, a wide use of CGHs is very promising in the structure of complex security holograms for increasing the level of protection against counterfeit.
ERIC Educational Resources Information Center
Al-Smadi, Marwan Saleh; Qblan, Yahya Mohammed
2015-01-01
It is vital that colleges and universities monitor the satisfaction levels of their employees to secure high levels of their performance. The current study aimed to identify the impact of some variables (gender, Teaching experience and college type) on assessing the level of job satisfaction among faculty of Najran University. A survey was…
Angelow, Aniela; Schmidt, Matthias; Weitmann, Kerstin; Schwedler, Susanne; Vogt, Hannes; Havemann, Christoph; Hoffmann, Wolfgang
2008-07-01
In our report we describe concept, strategies and implementation of a central biosample and data management (CSDM) system in the three-centre clinical study of the Transregional Collaborative Research Centre "Inflammatory Cardiomyopathy - Molecular Pathogenesis and Therapy" SFB/TR 19, Germany. Following the requirements of high system resource availability, data security, privacy protection and quality assurance, a web-based CSDM was developed based on Java 2 Enterprise Edition using an Oracle database. An efficient and reliable sample documentation system using bar code labelling, a partitioning storage algorithm and an online documentation software was implemented. An online electronic case report form is used to acquire patient-related data. Strict rules for access to the online applications and secure connections are used to account for privacy protection and data security. Challenges for the implementation of the CSDM resided at project, technical and organisational level as well as at staff level.
Telemedicine with integrated data security in ATM-based networks
NASA Astrophysics Data System (ADS)
Thiel, Andreas; Bernarding, Johannes; Kurth, Ralf; Wenzel, Rudiger; Villringer, Arno; Tolxdorff, Thomas
1997-05-01
Telemedical services rely on the digital transfer of large amounts of data in a short time. The acceptance of these services requires therefore new hard- and software concepts. The fast exchange of data is well performed within a high- speed ATM-based network. The fast access to the data from different platforms imposes more difficult problems, which may be divided into those relating to standardized data formats and those relating to different levels of data security across nations. For a standardized access to the formats and those relating to different levels of data security across nations. For a standardized access to the image data, a DICOM 3.0 server was implemented.IMages were converted into the DICOM 3.0 standard if necessary. The access to the server is provided by an implementation of DICOM in JAVA allowing access to the data from different platforms. Data protection measures to ensure the secure transfer of sensitive patient data are not yet solved within the DICOM concept. We investigated different schemes to protect data using the DICOM/JAVA modality with as little impact on data transfer speed as possible.
Privacy preservation and authentication on secure geographical routing in VANET
NASA Astrophysics Data System (ADS)
Punitha, A.; Manickam, J. Martin Leo
2017-05-01
Vehicular Ad hoc Networks (VANETs) play an important role in vehicle-to-vehicle communication as it offers a high level of safety and convenience to drivers. In order to increase the level of security and safety in VANETs, in this paper, we propose a Privacy Preservation and Authentication on Secure Geographical Routing Protocol (PPASGR) for VANET. It provides security by detecting and preventing malicious nodes through two directional antennas such as forward (f-antenna) and backward (b-antenna). The malicious nodes are detected by direction detection, consistency detection and conflict detection. The location of the trusted neighbour is identified using TNT-based location verification scheme after the implementation of the Vehicle Tamper Proof Device (VTPD), Trusted Authority (TA) is generated that produces the anonymous credentials. Finally, VTPD generates pseudo-identity using TA which retrieves the real identity of the sender. Through this approach, the authentication, integrity and confidentiality for routing packets can be achieved. The simulation results show that the proposed approach reduces the packet drop due to attack and improves the packet delivery ratio.
Consequence Prioritization Process for Potential High Consequence Events (HCE)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Freeman, Sarah G.
2016-10-31
This document describes the process for Consequence Prioritization, the first phase of the Consequence-Driven Cyber-Informed Engineering (CCE) framework. The primary goal of Consequence Prioritization is to identify potential disruptive events that would significantly inhibit an organization’s ability to provide the critical services and functions deemed fundamental to their business mission. These disruptive events, defined as High Consequence Events (HCE), include both events that have occurred or could be realized through an attack of critical infrastructure owner assets. While other efforts have been initiated to identify and mitigate disruptive events at the national security level, such as Presidential Policy Directive 41more » (PPD-41), this process is intended to be used by individual organizations to evaluate events that fall below the threshold for a national security. Described another way, Consequence Prioritization considers threats greater than those addressable by standard cyber-hygiene and includes the consideration of events that go beyond a traditional continuity of operations (COOP) perspective. Finally, Consequence Prioritization is most successful when organizations adopt a multi-disciplinary approach, engaging both cyber security and engineering expertise, as in-depth engineering perspectives are required to recognize and characterize and mitigate HCEs. Figure 1 provides a high-level overview of the prioritization process.« less
A review of automated image understanding within 3D baggage computed tomography security screening.
Mouton, Andre; Breckon, Toby P
2015-01-01
Baggage inspection is the principal safeguard against the transportation of prohibited and potentially dangerous materials at airport security checkpoints. Although traditionally performed by 2D X-ray based scanning, increasingly stringent security regulations have led to a growing demand for more advanced imaging technologies. The role of X-ray Computed Tomography is thus rapidly expanding beyond the traditional materials-based detection of explosives. The development of computer vision and image processing techniques for the automated understanding of 3D baggage-CT imagery is however, complicated by poor image resolutions, image clutter and high levels of noise and artefacts. We discuss the recent and most pertinent advancements and identify topics for future research within the challenging domain of automated image understanding for baggage security screening CT.
Context aware adaptive security service model
NASA Astrophysics Data System (ADS)
Tunia, Marcin A.
2015-09-01
Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.
Specialized Binary Analysis for Vetting Android APPS Using GUI Logic
2016-04-01
the use of high- level reasoning based on the GUI design logic of an app to enable a security analyst to diagnose and triage the potentially sensitive...execution paths of an app. Levels of Inconsistency We have identified three- levels of logical inconsistencies: Event- level inconsistency A sensitive...operation (e.g., taking a picture) is not trigged by user action on a GUI component. Layout- level inconsistency A sensitive operation is triggered by
Re-designing the PhEDEx Security Model
DOE Office of Scientific and Technical Information (OSTI.GOV)
Huang, C.-H.; Wildish, T.; Zhang, X.
2014-01-01
PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintainingmore » code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.« less
Information security for compliance with select agent regulations.
Lewis, Nick; Campbell, Mark J; Baskin, Carole R
2015-01-01
The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as "select agents." While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts--still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment.
Re-designing the PhEDEx Security Model
NASA Astrophysics Data System (ADS)
C-H, Huang; Wildish, T.; X, Zhang
2014-06-01
PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.
Information Security for Compliance with Select Agent Regulations
Lewis, Nick; Campbell, Mark J.
2015-01-01
The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as “select agents.” While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts—still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment. PMID:26042864
Measures for assessing architectural speech security (privacy) of closed offices and meeting rooms.
Gover, Bradford N; Bradley, John S
2004-12-01
Objective measures were investigated as predictors of the speech security of closed offices and rooms. A new signal-to-noise type measure is shown to be a superior indicator for security than existing measures such as the Articulation Index, the Speech Intelligibility Index, the ratio of the loudness of speech to that of noise, and the A-weighted level difference of speech and noise. This new measure is a weighted sum of clipped one-third-octave-band signal-to-noise ratios; various weightings and clipping levels are explored. Listening tests had 19 subjects rate the audibility and intelligibility of 500 English sentences, filtered to simulate transmission through various wall constructions, and presented along with background noise. The results of the tests indicate that the new measure is highly correlated with sentence intelligibility scores and also with three security thresholds: the threshold of intelligibility (below which speech is unintelligible), the threshold of cadence (below which the cadence of speech is inaudible), and the threshold of audibility (below which speech is inaudible). The ratio of the loudness of speech to that of noise, and simple A-weighted level differences are both shown to be well correlated with these latter two thresholds (cadence and audibility), but not well correlated with intelligibility.
Using High-Dimensional Image Models to Perform Highly Undetectable Steganography
NASA Astrophysics Data System (ADS)
Pevný, Tomáš; Filler, Tomáš; Bas, Patrick
This paper presents a complete methodology for designing practical and highly-undetectable stegosystems for real digital media. The main design principle is to minimize a suitably-defined distortion by means of efficient coding algorithm. The distortion is defined as a weighted difference of extended state-of-the-art feature vectors already used in steganalysis. This allows us to "preserve" the model used by steganalyst and thus be undetectable even for large payloads. This framework can be efficiently implemented even when the dimensionality of the feature set used by the embedder is larger than 107. The high dimensional model is necessary to avoid known security weaknesses. Although high-dimensional models might be problem in steganalysis, we explain, why they are acceptable in steganography. As an example, we introduce HUGO, a new embedding algorithm for spatial-domain digital images and we contrast its performance with LSB matching. On the BOWS2 image database and in contrast with LSB matching, HUGO allows the embedder to hide 7× longer message with the same level of security level.
Hemmer, Alexander; Meier, Philipp; Reisch, Thomas
2017-01-01
The goal of the study was to compare the effectiveness of different suicide prevention measures implemented on bridges and other high structures in Switzerland. A national survey identified all jumping hotspots that have been secured in Switzerland; of the 15 that could be included in this study, 11 were secured by vertical barriers and 4 were secured by low-hanging horizontal safety nets. The study made an overall and individual pre-post analysis by using Mantel-Haenszel Tests, regression methods and calculating rate ratios. Barriers and safety nets were both effective, with mean suicide reduction of 68.7% (barriers) and 77.1% (safety nets), respectively. Measures that do not secure the whole hotspot and still allow jumps of 15 meters or more were less effective. Further, the analyses revealed that barriers of at least 2.3 m in height and safety-nets fixed significantly below pedestrian level deterred suicidal jumps. Secured bridgeheads and inbound angle barriers seemed to enhance the effectiveness of the measure. Findings can help to plan and improve the effectiveness of future suicide prevention measures on high structures. PMID:28060950
Tester, June M; Laraia, Barbara A; Leung, Cindy W; Mietus-Snyder, Michele L
2016-02-11
Low levels of food security are associated with dyslipidemia and chronic disease in adults, particularly in women. There is a gap in knowledge about the relationship between food security among youth and dyslipidemia and chronic disease. We investigated the relationship between food security status and dyslipidemia among low-income adolescents. We analyzed data from adolescents aged 12 to 18 years (N = 1,072) from households with incomes at or below 200% of the federal poverty level from the National Health and Nutrition Examination Survey (NHANES) 2003-2010. We used logistic regression to examine the relationship between household food security status and the odds of having abnormalities with fasting total cholesterol (TC), low-density lipoprotein cholesterol (LDL-C), serum triglycerides (TGs), high-density lipoprotein cholesterol (HDL-C), TG/HDL-C ratio, and apolipoprotein B (Apo B). Models included age, sex, race/ethnicity, smoking status, partnered status in the household, and maternal education, with additional adjustment for adiposity. Household food security status was not associated with elevated TC or LDL-C. Adolescents with marginal food security were more likely than food-secure peers to have elevated TGs (odds ratio [OR] = 1.86; 95% confidence interval [CI], 1.14-3.05), TG/HDL-C ratio (OR = 1.74; 95% CI, 1.11-2.82), and Apo B (OR = 1.98; 95% CI, 1.17-3.36). Female adolescents with marginal food security had greater odds than male adolescents of having low HDL-C (OR = 2.69; 95% CI, 1.14-6.37). No elevated odds of dyslipidemia were found for adolescents with low or very low food security. Adjustment for adiposity did not attenuate estimates. In this nationally representative sample, low-income adolescents living in households with marginal food security had increased odds of having a pattern consistent with atherogenic dyslipidemia, which represents a cardiometabolic burden above their risk from adiposity alone.
Laraia, Barbara A.; Leung, Cindy W.; Mietus-Snyder, Michele L.
2016-01-01
Introduction Low levels of food security are associated with dyslipidemia and chronic disease in adults, particularly in women. There is a gap in knowledge about the relationship between food security among youth and dyslipidemia and chronic disease. We investigated the relationship between food security status and dyslipidemia among low-income adolescents. Methods We analyzed data from adolescents aged 12 to 18 years (N = 1,072) from households with incomes at or below 200% of the federal poverty level from the National Health and Nutrition Examination Survey (NHANES) 2003–2010. We used logistic regression to examine the relationship between household food security status and the odds of having abnormalities with fasting total cholesterol (TC), low-density lipoprotein cholesterol (LDL-C), serum triglycerides (TGs), high-density lipoprotein cholesterol (HDL-C), TG/HDL-C ratio, and apolipoprotein B (Apo B). Models included age, sex, race/ethnicity, smoking status, partnered status in the household, and maternal education, with additional adjustment for adiposity. Results Household food security status was not associated with elevated TC or LDL-C. Adolescents with marginal food security were more likely than food-secure peers to have elevated TGs (odds ratio [OR] = 1.86; 95% confidence interval [CI], 1.14–3.05), TG/HDL-C ratio (OR = 1.74; 95% CI, 1.11–2.82), and Apo B (OR = 1.98; 95% CI, 1.17–3.36). Female adolescents with marginal food security had greater odds than male adolescents of having low HDL-C (OR = 2.69; 95% CI, 1.14–6.37). No elevated odds of dyslipidemia were found for adolescents with low or very low food security. Adjustment for adiposity did not attenuate estimates. Conclusion In this nationally representative sample, low-income adolescents living in households with marginal food security had increased odds of having a pattern consistent with atherogenic dyslipidemia, which represents a cardiometabolic burden above their risk from adiposity alone. PMID:26866948
McKinnon, Iain; Lewis, Thomas; Mehta, Naomi; Imrit, Shahed; Thorp, Julie; Ince, Chris
2018-02-01
Aims and method To assess the benefits of the introduction of routine vitamin D serum sampling for all patients admitted to a secure in-patient hospital in the North of England providing medium security, low security and rehabilitation services for offenders with intellectual and developmental disability. The vitamin D levels of 100 patients were analysed at baseline. Those with insufficient or deficient levels were offered treatment and retested after 1 year. Vitamin D levels were analysed in the context of level of security, seasonality of test and co-prescription of psychotropic medications. Eighty-three per cent of patients had suboptimal vitamin D levels at initial test (41% deficient and 42% insufficient). This was seen among established patients and new admissions. Regression analysis of baseline vitamin D levels revealed no differences for levels of security, seasonality, whether patients were taking antipsychotic or anticonvulsant medication, or length of stay. Patients with deficiency or insufficiency were all offered supplementation. Those who opted in had significantly higher vitamin D levels at follow-up, compared with those who declined treatment. Clinical implications Established and newly admitted patients in our secure mental health services had substantial levels of vitamin D insufficiency. In the light of the morbidities that are associated with deficient vitamin D levels, routine screening and the offer of supplementation is advisable. Declaration of interest None.
Socio-Personal Premises for Selecting and Securing an Occupation as Vocation
ERIC Educational Resources Information Center
Billett, Stephen; Newton, Jennifer; Ockerby, Cherene M.
2010-01-01
When individuals select a particular occupation, they, their families and the community invest significant resources in their preparing for, learning about, and effective participation in that occupation. Yet, given the high attrition rates during that preparation and high levels of early separation from occupations, selection of occupations is…
The Sources and Experience of Anxiety in Practice Teaching.
ERIC Educational Resources Information Center
Sinclair, Ken; Nicoll, Vivienne
For most student teachers, practice teaching is a difficult and anxiety-provoking experience. Anxiety arises when feelings of self-adequacy and security are threatened. A survey of 84 teacher education majors shows that anxiety levels are often high immediately prior to the internship; however, the anxiety level gradually declines by the middle of…
The Relation between the Level of Job Satisfaction and Types of Personality in High School Teachers
ERIC Educational Resources Information Center
Ayan, Sezer; Kocacik, Faruk
2010-01-01
Teachers are loaded important responsibilities in educational process. The productivity and effectiveness of them are influenced by promotion, charging, job security, technological level, course load and working schedule which all are determined mostly by their institutions and influenced by noncognitive characteristics such as age, gender, family…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-12
... plenary Joint Plenary [cir] Subgroup status reports [cir] Review schedule and decide on readiness of documents for Final Review and Comment [cir] Identify next steps 3:00 p.m. (1500) Wrap-Up, Adjourn...: Monday, May 13, 2013 Introductions High-level document status Review level of maturity of contributions...
NASA Astrophysics Data System (ADS)
Hossain, Kamrul
2016-09-01
The theory of securitization-the so-called Copenhagen school-centers the concept of security on various identified threats. Security based on the collective identity by which a society preserves its essential characteristics has been defined as community security, or societal security. The underlying principle of the Copenhagen school is that state-based, sovereignty-oriented security is ineffective unless the other components of security threats are addressed. The concept of human security, developed nearly simultaneously to that of securitization, identifies threat components at the sub-state level which are not traditionally understood as security concerns. Both schools of security thought are similar as they offer nontraditional approaches to understanding the concept of security. In this article, I explore securitization theory and the concept of human security to elaborate community perspectives in the understanding of security. In a case study, I investigate the security concerns of the indigenous peoples of the Arctic. The transformation of the Arctic by climate change and its impacts has resulted in new challenges and opportunities, so I explore how indigenous peoples in general and the Sámi in particular understand security which promotes their societal security. Although I show that this group of people deserves recognition and the ability to exercise greater authority, I conclude that diverse concepts of security do not by any means undermine the core traditional concept of security. These aspects of security remain subject to scrutiny by states and exist in a vertical structure. The Sámi, therefore, rely on affirmative actions by states to enjoy greater rights to maintain their community security.
49 CFR 1549.107 - Security coordinators.
Code of Federal Regulations, 2014 CFR
2014-10-01
... and designated alternate Security Coordinator appointed at the corporate level. In addition, each... corporate level, as well as the facility Security Coordinator and alternate, must be available on a 24-hour... 49 Transportation 9 2014-10-01 2014-10-01 false Security coordinators. 1549.107 Section 1549.107...
49 CFR 1549.107 - Security coordinators.
Code of Federal Regulations, 2010 CFR
2010-10-01
... and designated alternate Security Coordinator appointed at the corporate level. In addition, each... corporate level, as well as the facility Security Coordinator and alternate, must be available on a 24-hour... 49 Transportation 9 2010-10-01 2010-10-01 false Security coordinators. 1549.107 Section 1549.107...
49 CFR 1549.107 - Security coordinators.
Code of Federal Regulations, 2011 CFR
2011-10-01
... and designated alternate Security Coordinator appointed at the corporate level. In addition, each... corporate level, as well as the facility Security Coordinator and alternate, must be available on a 24-hour... 49 Transportation 9 2011-10-01 2011-10-01 false Security coordinators. 1549.107 Section 1549.107...
49 CFR 1549.107 - Security coordinators.
Code of Federal Regulations, 2012 CFR
2012-10-01
... and designated alternate Security Coordinator appointed at the corporate level. In addition, each... corporate level, as well as the facility Security Coordinator and alternate, must be available on a 24-hour... 49 Transportation 9 2012-10-01 2012-10-01 false Security coordinators. 1549.107 Section 1549.107...
49 CFR 1549.107 - Security coordinators.
Code of Federal Regulations, 2013 CFR
2013-10-01
... and designated alternate Security Coordinator appointed at the corporate level. In addition, each... corporate level, as well as the facility Security Coordinator and alternate, must be available on a 24-hour... 49 Transportation 9 2013-10-01 2013-10-01 false Security coordinators. 1549.107 Section 1549.107...
Food insecurity among Dutch food bank recipients: a cross-sectional study
Neter, Judith E; Dijkstra, S Coosje; Visser, Marjolein; Brouwer, Ingeborg A
2014-01-01
Objective To determine the prevalence of (very) low food security among Dutch food bank recipients, and to identify potential demographic, lifestyle and nutrition-related factors associated with (very) low food security. Setting 11 of 135 Dutch food banks were selected throughout the Netherlands. Participants 251 Dutch food bank recipients participated in the study (93 men and 158 women). Inclusion criteria for participation were: (1) at least 18 years of age, (2) sufficiently fluent in Dutch to participate in oral and written interviews, (3) recipient of a Dutch food bank for at least 1 month and (4) collect own food parcel at the food bank. A single member per household was included. Primary outcome Level of food security. Results The prevalence of food insecurity was 72.9% (N=183), of which 40.4% (N=74) reported very low food security. Of the very low food secure participants, 56.8% (N=42) reported they were ever hungry but did not eat because they could not afford enough food in the previous 3 months. Adjusted multinomial logistic regression analyses showed that households without children were less likely to experience low food security (OR 0.39 (95% CI 0.18 to 0.88)) and men (OR 0.24 (95% CI 0.11 to 0.51)) were less likely to experience very low food security, while low-educated recipients (OR 5.05 (95% CI 1.37 to 18.61)) were more likely to experience very low food security. Furthermore, recipients with high satisfaction with overall food intake (OR 0.46 (95% CI 0.27 to 0.78)), high perceived healthiness of overall food intake (OR 0.34 (95% CI 0.19 to 0.62)) or high self-efficacy of eating healthy (OR 0.62 (95% CI 0.40 to 0.96)) were less likely to experience very low food security. Conclusions Our study showed high prevalence rates of food insecurity among Dutch food bank recipients, and identified subgroups at increased risk of food insecurity. More research is urgently needed on the underlying determinants of food insecurity and the effectiveness of food assistance by food banks. PMID:24838723
Correlation Analysis of Cultural Development and Social Security in Iran
NASA Astrophysics Data System (ADS)
Habibi, K.; Alizadeh, H.; Meshkini, A.; Kohsari, M. J.
In recent years, politicians have paid more attention to planning methods considering environmental, economical, social and cultural potentials of place. According to general principles and experiences has been achieved by the developed countries, there is a direct link between social security and cultural development. Where the society and region is culturally more developed, social security level is higher and vice versa. Considering this leading point, this research aims to establish a rational correlation between the provinces of Iran considering cultural development ranking and social security levels using planning models and analysis. To reach this goal, different variables in various sectors such as physical, social, economical, etc. were classified leading to developmental indicators of the provinces in the related sectors. In addition to this, many variables concerning the social security levels in provinces such as homicide, robbery, suicide, etc. were also classified to identify the social security level in each province. According to the results, more culturally developed and wealthier provinces, like Tehran, Khorasan, Fars, have lower social security degree and less culturally developed provinces, like Sistan va Baloochestan, Kurdistan, Elam have higher social security level. In other words, the mentioned principle, the correlation between social security and cultural development, does not work in the same direction in Iranian context.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aderholdt, Ferrol; Caldwell, Blake A.; Hicks, Susan Elaine
High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges formore » the use of shared infrastructure in HPC environments. This report details current state-of-the-art in reconfigurable network enclaving through Software Defined Networking (SDN) and Network Function Virtualization (NFV) and their applicability to secure enclaves in HPC environments. SDN and NFV methods are based on a solid foundation of system wide virtualization. The purpose of which is very straight forward, the system administrator can deploy networks that are more amenable to customer needs, and at the same time achieve increased scalability making it easier to increase overall capacity as needed without negatively affecting functionality. The network administration of both the server system and the virtual sub-systems is simplified allowing control of the infrastructure through well-defined APIs (Application Programming Interface). While SDN and NFV technologies offer significant promise in meeting these goals, they also provide the ability to address a significant component of the multi-tenant challenge in HPC environments, namely resource isolation. Traditional HPC systems are built upon scalable high-performance networking technologies designed to meet specific application requirements. Dynamic isolation of resources within these environments has remained difficult to achieve. SDN and NFV methodology provide us with relevant concepts and available open standards based APIs that isolate compute and storage resources within an otherwise common networking infrastructure. Additionally, the integration of the networking APIs within larger system frameworks such as OpenStack provide the tools necessary to establish isolated enclaves dynamically allowing the benefits of HPC while providing a controlled security structure surrounding these systems.« less
Tolma, Eleni; John, Robert; Garner, Jane
2007-01-01
Food insecurity in the United States is a major public health issue. The main objective of this study was to evaluate the availability and quality of printed materials addressing food security targeted to special populations by the United States Department of Agriculture (USDA). Nutrition education resources addressing food security available from USDA websites were selected for analysis. Not applicable. The review team consisted of project staff (n = 6), two of who were fluent in Spanish. Selection criteria were established to identify the food-security materials, and a group of reviewers assessed the quality of each publication both quantitatively and qualitatively. A consensus meeting among the reviewers was held to make final determinations of the quality of the materials. The quantitative data analysis consisted of basic descriptive statistics. Among the 27 materials initially identified, 20 were either irrelevant or of low relevance to food security. Moreover, very few of them were intended for minority populations. The quality of most of the materials ranged from "average" to "good." Some of the major weaknesses include readability level, lack of cultural relevance, and inadequate coverage of food insecurity. Very few materials on food insecurity are of high quality. In the development of such materials, emphasis should be given to the readability level, content, and cultural relevance.
Developing an Undergraduate Information Systems Security Track
ERIC Educational Resources Information Center
Sharma, Aditya; Murphy, Marianne C.; Rosso, Mark A.; Grant, Donna
2013-01-01
Information Systems Security as a specialized area of study has mostly been taught at the graduate level. This paper highlights the efforts of establishing an Information Systems (IS) Security track at the undergraduate level. As there were many unanswered questions and concerns regarding the Security curriculum, focus areas, the benefit of…
Osabohien, Romanus; Osabuohien, Evans; Urhie, Ese
2018-01-01
Background: Growth in agricultural science and technology is deemed essential for in-creasing agricultural output; reduce the vulnerability of rural poverty and in turn, food security. Food security and growth in agricultural output depends on technological usages, which enhances the pro-ductive capacity of the agricultural sector. The indicators of food security utilised in this study in-clude: dietary energy supply, average value of food production, prevalence of food inadequacy, among others. Objective: In this paper, we examined the level of technology and how investment in the agriculture and technology can improve technical know-how in Nigeria with a view to achieving food security. Method: We carried out the analysis on how investment in technology and institutional framework can improve the level of food availability (a key component of food security) in Nigeria using econ-ometric technique based on Autoregressive Distribution Lag (ARDL) framework. Results: The results showed, inter alia, that in Nigeria, there is a high level of food insecurity as a result of low attention on food production occasioned by the pervasive influence of oil that become the major export product. Conclusion: It was noted that the availability of arable land was one of the major factors to increase food production to solve the challenge of food insecurity. Thus, the efforts of reducing the rate of food insecurity are essential in this regards. This can also be achieved, among others, by active interactions between government and farmers, to make contribution to important planning issues that relate to food production in the country and above all, social protection policies should be geared or channelled to agricultural sector to protect farmers who are vulnerable to shocks and avert risks associated with agriculture. PMID:29853816
Osabohien, Romanus; Osabuohien, Evans; Urhie, Ese
2018-04-01
Growth in agricultural science and technology is deemed essential for in-creasing agricultural output; reduce the vulnerability of rural poverty and in turn, food security. Food security and growth in agricultural output depends on technological usages, which enhances the pro-ductive capacity of the agricultural sector. The indicators of food security utilised in this study in-clude: dietary energy supply, average value of food production, prevalence of food inadequacy, among others. In this paper, we examined the level of technology and how investment in the agriculture and technology can improve technical know-how in Nigeria with a view to achieving food security. We carried out the analysis on how investment in technology and institutional framework can improve the level of food availability (a key component of food security) in Nigeria using econ-ometric technique based on Autoregressive Distribution Lag (ARDL) framework. The results showed, inter alia, that in Nigeria, there is a high level of food insecurity as a result of low attention on food production occasioned by the pervasive influence of oil that become the major export product. It was noted that the availability of arable land was one of the major factors to increase food production to solve the challenge of food insecurity. Thus, the efforts of reducing the rate of food insecurity are essential in this regards. This can also be achieved, among others, by active interactions between government and farmers, to make contribution to important planning issues that relate to food production in the country and above all, social protection policies should be geared or channelled to agricultural sector to protect farmers who are vulnerable to shocks and avert risks associated with agriculture.
Brown, Geoffrey L.; Mangelsdorf, Sarah C.; Neff, Cynthia
2014-01-01
To reach a greater understanding of the early father-child attachment relationship, this study examined concurrent and longitudinal associations among father involvement, paternal sensitivity, and father-child attachment security at 13 months and 3 years of age. Analyses revealed few associations among these variables at 13 months of age, but involvement and sensitivity independently predicted father-child attachment security at age 3. Moreover, sensitivity moderated the association between involvement and attachment security at 3 years. Specifically, involvement was unrelated to attachment security when fathers were highly sensitive, but positively related to attachment security when fathers were relatively less sensitive. Father involvement was also moderately stable across the two timepoints, but paternal sensitivity was not. Furthermore, there was significant stability in father-child attachment security from 13 months to 3 years. Secure attachment at 13 months also predicted greater levels of paternal sensitivity at 3 years, with sensitivity at age 3 mediating the association between 13 month and 3 year attachment security. In sum, a secure father-child attachment relationship a) was related to both quantity and quality of fathering behavior, b) remained relatively stable across early childhood, and c) predicted increased paternal sensitivity over time. These findings further our understanding of the correlates of early father-child attachment, and underscore the need to consider multiple domains of fathers’ parenting and reciprocal relations between fathering behavior and father-child attachment security. PMID:22468691
Brucker, Debra L
2016-04-01
Prior research has suggested that young adults with disabilities face economic, health and social disadvantage. Food security, an area of disadvantage that can influence overall health, has not been fully explored for this population. To examine levels of food security between young adults with and without disabilities, controlling for individual characteristics. Logistic regression analysis of a nationally representative sample of young adults (age 18-25) (n = 32,795) with and without disabilities, using pooled data form the 2011-2013 National Health Interview Survey. Young adults with disabilities have significantly higher odds (OR: 2.58, p < 0.001) of living in a household that is food insecure than young adults without disabilities, even when controlling for individual characteristics. Odds of living in a household that is food insecure are particularly high (OR: 5.35, p < 0.001) among young adults with high levels of psychological distress, controlling for other factors. Young adults with disabilities have increased odds of living in a household that is food insecure. This study has important policy and community program implications. Copyright © 2016 Elsevier Inc. All rights reserved.
Security Behavior Observatory: Infrastructure for Long-term Monitoring of Client Machines
2014-07-14
desired data. In Wmdows, this is most often a .NET language (e.g., C#, PowerShell), a command-line batch script, or Java . 3) Least privilege: To ensure...modules are written in Java , and thus should be easily-portable to any OS. B. Deployment There are several high-level requirements the SBO must meet...practically feasible with such solutions. Instead, one researcher with access to all the clients’ keys (stored in an isolated and secured MySQL database
Kim, Min-Seok; Hong, Yun-Chul; Yook, Ji-Hoo; Kang, Mo-Yeol
2017-10-01
To investigate the effects of job security on new development of depressive episode, suicide ideation, and decline in self-rated health. Data from the Korea Welfare Panel Study from 2012 to 2015 were analysed. A total of 2912 waged workers self-assessed their depressive episode, suicide ideation, and health annually by answering the questionnaire. Participants were divided into three groups according to the level of job security: high, intermediate and low. To evaluate the influence of job security, we performed survival analysis after stratification by gender with adjustment for covariates. The result was further stratified by whether the respondent was the head of household. After adjusting for covariates, men in low job security group showed significantly higher hazard ratios (HRs) for depression (HR 1.27, 95% CI 1.01-1.60), suicide ideation (HR 3.25, 95% CI 1.72-6.16), and decline in self-rated health (HR 1.73, 95% CI 1.16-2.59). Women showed significantly higher HR of depression in the intermediate (HR 1.37, 95% CI 1.01-1.87) and low (HR 1.50, 95% CI 1.12-1.99) job security group. Male head of household with low job security showed significantly higher HR of depression, suicide ideation, and decline in self-rated health. Non-head-of-household women with intermediate and low job security showed higher risk of depression than those with high job security. We found that perceived job insecurity is associated with the new development of depressive episode, suicide ideation, and decline in self-rated health.
Gharaveis, Arsalan; Hamilton, D Kirk; Pati, Debajyoti; Shepley, Mardelle
2017-01-01
The aim of this study was to examine the influence of visibility on teamwork, collaborative communication, and security issues in emergency departments (EDs). This research explored whether with high visibility in EDs, teamwork and collaborative communication can be improved while the security issues will be reduced. Visibility has been regarded as a critical design consideration and can be directly and considerably impacted by ED's physical design. Teamwork is one of the major related operational outcomes of visibility and involves nurses, support staff, and physicians. The collaborative communication in an ED is another important factor in the process of care delivery and affects efficiency and safety. Furthermore, security is a behavioral factor in ED designs, which includes all types of safety including staff safety, patient safety, and the safety of visitors and family members. This qualitative study investigated the impact of visibility on teamwork, collaborative communication, and security issues in the ED. One-on-one interviews and on-site observation sessions were conducted in a community hospital. Corresponding data analysis was implemented by using computer plan analysis, observation and interview content, and theme analyses. The findings of this exploratory study provided a framework to identify visibility as an influential factor in ED design. High levels of visibility impact productivity and efficiency of teamwork and communication and improve the chance of lowering security issues. The findings of this study also contribute to the general body of knowledge about the effect of physical design on teamwork, collaborative communication, and security.
Cantón-Cortés, David; Cantón, José; Cortés, María Rosario
2016-01-01
The Emotional Security Theory (EST) was originally developed to investigate the association between high levels of interparental conflict and child maladaptative outcome. The objective of the present study was to analyze the effects of emotional security in the family system on psychological distress among a sample of young female adult survivors of child sexual abuse (CSA). The role of emotional security was investigated through the interactive effects of a number of factors including the type of abuse, the continuity of abuse, the relationship with the perpetrator and the existence of disclosure for the abuse. Participants were 167 female survivors of CSA. Information about the abuse was obtained from a self-reported questionnaire. Emotional security was assessed with the Security in the Family System (SIFS) Scale, and the Symptom Checklist-90-Revised (SCL-90-R) was used to assess psychological distress. In the total sample, insecurity (preoccupation and disengagement) was correlated with high psychological distress scores, whereas no relationship was found between security and psychological distress. The relationship between emotional insecurity and psychological distress was stronger in cases of continued abuse and non-disclosure, while the relationship between emotional security and distress was stronger in cases of extrafamilial abuse and especially isolated or several incidents and when a disclosure had been made. No interactive effect was found between any of the three emotional variables and the type of abuse committed. The results of the current study suggest that characteristics of CSA such as relationship with the perpetrator and, especially, continuity of abuse and whether or not disclosure had been made, can affect the impact of emotional security on psychological distress of CSA survivors. Copyright © 2015 Elsevier Ltd. All rights reserved.
The vitamin D status of prison inmates.
Nwosu, Benjamin Udoka; Maranda, Louise; Berry, Rosalie; Colocino, Barbara; Flores, Carlos D; Folkman, Kerry; Groblewski, Thomas; Ruze, Patricia
2014-01-01
There is no comprehensive, systematic analysis of the vitamin D status of prisoners in the scientific literature. To investigate the vitamin D status and its determinants in US prison inmates. Given the uniformity of dietary intake amongst inmates, vitamin D status will be determined by non-dietary factors such as skin pigmentation, security level-, and the duration of incarceration. A retrospective study of 526 inmates (males, n=502, age 48.6 ± 12.5 years; females, n=24, age 44.1 ± 12.2) in Massachusetts prisons. Vitamin D sufficiency, insufficiency, and deficiency were respectively defined as a 25(OH)D concentration 75 nmol/L; 50 to 75 nmol/L; and <50 nmol/L. The Massachusetts Department of Correction Statement of Nutritional Adequacy stated that each inmate received the recommended daily allowance of vitamin D daily. Security level of incarceration was designated as minimum, medium, and maximum. Racial groups were categorized as Black, white, Asian, and Others. Serum 25(OH)D levels peaked in summer and autumn, and decreased in winter and spring. Vitamin D deficiency occurred in 50.5% of blacks, 29.3% of whites, and 14.3% of Asian inmates (p=0.007). Black inmates had significantly lower serum 25(OH)D level than white inmates at the maximum security level (p=0.015), medium security level (p=0.001), but not at the minimum security level (p=0.40). After adjusting for covariates black inmates at a maximum security level had a four-fold higher risk for vitamin D deficiency than white inmates at the same security level (OR 3.9 [95% CI 1.3-11.7]. The vitamin D status of prison inmates is determined by skin pigmentation, seasons, and the security level of incarceration.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This presentation provides a high-level overview of the current U.S. shared solar landscape, the impact that a given shared solar program's structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.
Cyber Attacks and Terrorism: A Twenty-First Century Conundrum.
Albahar, Marwan
2017-01-05
In the recent years, an alarming rise in the incidence of cyber attacks has made cyber security a major concern for nations across the globe. Given the current volatile socio-political environment and the massive increase in the incidence of terrorism, it is imperative that government agencies rapidly realize the possibility of cyber space exploitation by terrorist organizations and state players to disrupt the normal way of life. The threat level of cyber terrorism has never been as high as it is today, and this has created a lot of insecurity and fear. This study has focused on different aspects of cyber attacks and explored the reasons behind their increasing popularity among the terrorist organizations and state players. This study proposes an empirical model that can be used to estimate the risk levels associated with different types of cyber attacks and thereby provide a road map to conceptualize and formulate highly effective counter measures and cyber security policies.
Achieving Learning Objectives through E-Voting Case Studies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bishop, Matt; Frincke, Deb
2007-01-01
The recent explosion in the use of electronic voting machines provides a wonderful opportunity to teach students about computer security. Because voting is the cornerstone of any democracy or republic, the need for secure voting systems is obvious. Further, students are familiar with how to vote. But the complexity of mapping a traditional process of voting using secret ballots to an electronic environment shows the difficulties of implementing secure processes and systems. In this article, we show a high level mapping from selected security and privacy education outcomes into a target ‘case study’ of developing electronic voting machines intended formore » traditional secret ballot elections. Our intent is to motivate both a set of lessons specifically involving e-voting, as well as illustrating the usefulness of having a mapping from outcomes to simplified case studies.« less
Retention and Advancement in the Retail Industry: A Career Ladder Approach.
ERIC Educational Resources Information Center
Prince, Heath J.
Retailing is the largest industry in the United States, employing roughly 18 percent of the total labor force. However, high turnover resulting from low wages in entry-level positions and the perceptions of retail workers that job security is far from certain and that advancement potential is limited have resulted in low levels of employee…
Implementation of an Entry-Level Retention Program for High-Risk College Freshmen.
ERIC Educational Resources Information Center
Zanoni, Candido
The specially funded program described in this report was implemented at the University of Minnesota's General College in Fall 1979 to promote the academic improvement and long-range retention of high-risk Black, Hispanic, and Native American students. After introductory material discussing the process involved in securing program funds from the…
A Challenging High School Education for All
ERIC Educational Resources Information Center
US Department of Education, 2006
2006-01-01
High school is the training ground for college and work. Today, most good jobs require a college education. The way for children to get ready for college is to take challenging courses. The level of math, science and foreign language education students receive will be important for American global competitiveness and national security. In…
NASA Technical Reports Server (NTRS)
Swenson, Paul
2017-01-01
Satellite/Payload Ground Systems - Typically highly-customized to a specific mission's use cases - Utilize hundreds (or thousands!) of specialized point-to-point interfaces for data flows / file transfers Documentation and tracking of these complex interfaces requires extensive time to develop and extremely high staffing costs Implementation and testing of these interfaces are even more cost-prohibitive, and documentation often lags behind implementation resulting in inconsistencies down the road With expanding threat vectors, IT Security, Information Assurance and Operational Security have become key Ground System architecture drivers New Federal security-related directives are generated on a daily basis, imposing new requirements on current / existing ground systems - These mandated activities and data calls typically carry little or no additional funding for implementation As a result, Ground System Sustaining Engineering groups and Information Technology staff continually struggle to keep up with the rolling tide of security Advancing security concerns and shrinking budgets are pushing these large stove-piped ground systems to begin sharing resources - I.e. Operational / SysAdmin staff, IT security baselines, architecture decisions or even networks / hosting infrastructure Refactoring these existing ground systems into multi-mission assets proves extremely challenging due to what is typically very tight coupling between legacy components As a result, many "Multi-Mission" ops. environments end up simply sharing compute resources and networks due to the difficulty of refactoring into true multi-mission systems Utilizing continuous integration / rapid system deployment technologies in conjunction with an open architecture messaging approach allows System Engineers and Architects to worry less about the low-level details of interfaces between components and configuration of systems GMSEC messaging is inherently designed to support multi-mission requirements, and allows components to aggregate data across multiple homogeneous or heterogeneous satellites or payloads - The highly-successful Goddard Science and Planetary Operations Control Center (SPOCC) utilizes GMSEC as the hub for it's automation and situational awareness capability Shifts focus towards getting GS to a final configuration-managed baseline, as well as multi-mission / big-picture capabilities that help increase situational awareness, promote cross-mission sharing and establish enhanced fleet management capabilities across all levels of the enterprise.
Survey of Codes Employing Nuclear Damage Assessment
1977-10-01
surveyed codes were com- DO 73Mu 1473 ETN OF 1NOVSSSOLETE UNCLASSIFIED 1 SECURITY CLASSIFICATION OF THIS f AGE (Wh*11 Date Efntered)S<>-~C. I UNCLASSIFIED...level and above) TALLEY/TOTEM not nuclear TARTARUS too highly aggregated (battalion level and above) UNICORN highly aggregated force allocation code...vulnerability data can bq input by the user as he receives them, and there is the abil ’ity to replay any situation using hindsight. The age of target
Zeinali, Ali; Sharifi, Hassanpasha; Enayati, Mirsalahadine; Asgari, Parviz; Pasha, Gohlamreza
2011-01-01
BACKGROUND: The purpose of present study was to create and test a model that illustrates variables that influence the development of addiction susceptibility and determine how different styles of parenting may indirectly influence the addiction susceptibility of children through the mediators of attachment style and self-regulation. METHODS: Using random cluster sampling, 508 adolescent high school boys and girls aged 14-19 years were enrolled. Data were analyzed using structural equations modeling (path analysis). RESULTS: The results showed that authoritative and permissive parenting styles were associated with secure attachment whereas authoritarian and neglectful parenting styles were associated with insecure attachment. Insecure attachment was associated with a low level of self-regulation whereas secure attachment was associated with a high level of self-regulation. We found that a low level of self-regulation increased the adolescent's addiction susceptibility whereas a high level of self-regulation decreased their addiction susceptibility. CONCLUSIONS: The findings of present study suggest the authoritative and permissive parenting styles as the most efficient styles and authoritarian and neglectful parenting styles as the most inefficient styles in terms of addiction susceptibility. Accordingly, efficient parenting style training to parents should be the main goal of drug demand reduction program. PMID:22973379
49 CFR 1546.103 - Form, content, and availability of security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... security program is acceptable only if TSA finds that the security program provides a level of protection similar to the level of protection provided by U.S. aircraft operators serving the same airports. Foreign... the same airport, if TSA determines that such procedures are necessary to provide a similar level of...
Thallium-201 for cardiac stress tests: residual radioactivity worries patients and security.
Geraci, Matthew J; Brown, Norman; Murray, David
2012-12-01
A 47-year-old man presented to the Emergency Department (ED) in duress and stated he was "highly radioactive." There were no reports of nuclear disasters, spills, or mishaps in the local area. This report discusses the potential for thallium-201 (Tl-201) patients to activate passive radiation alarms days to weeks after nuclear stress tests, even while shielded inside industrial vehicles away from sensors. Characteristics of Tl-201, as used for medical imaging, are described. This patient was twice detained by Homeland Security Agents and searched after he activated radiation detectors at a seaport security checkpoint. Security agents deemed him not to be a threat, but they expressed concern regarding his health and level of personal radioactivity. The patient was subsequently barred from his job and sent to the hospital. Tl-201 is a widely used radioisotope for medical imaging. The radioactive half-life of Tl-201 is 73.1h, however, reported periods of extended personal radiation have been seen as far out as 61 days post-administration. This case describes an anxious, but otherwise asymptomatic patient presenting to the ED with detection of low-level personal radiation. Documentation should be provided to and carried by individuals receiving radionuclides for a minimum of five to six half-lives of the longest-lasting isotope provided. Patients receiving Tl-201 should understand the potential for security issues; reducing probable tense moments, confusion, and anxiety to themselves, their employers, security officials, and ED staff. Copyright © 2012 Elsevier Inc. All rights reserved.
Statistical Models for Predicting Threat Detection From Human Behavior
Kelley, Timothy; Amon, Mary J.; Bertenthal, Bennett I.
2018-01-01
Users must regularly distinguish between secure and insecure cyber platforms in order to preserve their privacy and safety. Mouse tracking is an accessible, high-resolution measure that can be leveraged to understand the dynamics of perception, categorization, and decision-making in threat detection. Researchers have begun to utilize measures like mouse tracking in cyber security research, including in the study of risky online behavior. However, it remains an empirical question to what extent real-time information about user behavior is predictive of user outcomes and demonstrates added value compared to traditional self-report questionnaires. Participants navigated through six simulated websites, which resembled either secure “non-spoof” or insecure “spoof” versions of popular websites. Websites also varied in terms of authentication level (i.e., extended validation, standard validation, or partial encryption). Spoof websites had modified Uniform Resource Locator (URL) and authentication level. Participants chose to “login” to or “back” out of each website based on perceived website security. Mouse tracking information was recorded throughout the task, along with task performance. After completing the website identification task, participants completed a questionnaire assessing their security knowledge and degree of familiarity with the websites simulated during the experiment. Despite being primed to the possibility of website phishing attacks, participants generally showed a bias for logging in to websites versus backing out of potentially dangerous sites. Along these lines, participant ability to identify spoof websites was around the level of chance. Hierarchical Bayesian logistic models were used to compare the accuracy of two-factor (i.e., website security and encryption level), survey-based (i.e., security knowledge and website familiarity), and real-time measures (i.e., mouse tracking) in predicting risky online behavior during phishing attacks. Participant accuracy in identifying spoof and non-spoof websites was best captured using a model that included real-time indicators of decision-making behavior, as compared to two-factor and survey-based models. Findings validate three widely applicable measures of user behavior derived from mouse tracking recordings, which can be utilized in cyber security and user intervention research. Survey data alone are not as strong at predicting risky Internet behavior as models that incorporate real-time measures of user behavior, such as mouse tracking. PMID:29713296
Six-State Quantum Key Distribution Using Photons with Orbital Angular Momentum
NASA Astrophysics Data System (ADS)
Li, Jun-Lin; Wang, Chuan
2010-11-01
A new implementation of high-dimensional quantum key distribution (QKD) protocol is discussed. Using three mutual unbiased bases, we present a d-level six-state QKD protocol that exploits the orbital angular momentum with the spatial mode of the light beam. The protocol shows that the feature of a high capacity since keys are encoded using photon modes in d-level Hilbert space. The devices for state preparation and measurement are also discussed. This protocol has high security and the alignment of shared reference frames is not needed between sender and receiver.
10 CFR 72.186 - Change to physical security and safeguards contingency plans.
Code of Federal Regulations, 2010 CFR
2010-01-01
... approval for a period of three years from the date of the change, and shall, within two months after the... THE INDEPENDENT STORAGE OF SPENT NUCLEAR FUEL, HIGH-LEVEL RADIOACTIVE WASTE, AND REACTOR-RELATED...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bachner, Katherine M.; Mladineo, Stephen V.
The NNSA Material Protection, Control, and Accounting (MPC&A) program has been engaged for fifteen years in upgrading the security of nuclear materials in Russia. Part of the effort has been to establish the conditions necessary to ensure the long-term sustainability of nuclear security. A sustainable program of nuclear security requires the creation of an indigenous infrastructure, starting with sustained high level government commitment. This includes organizational development, training, maintenance, regulations, inspections, and a strong nuclear security culture. The provision of modern physical protection, control, and accounting equipment to the Russian Federation alone is not sufficient. Comprehensive infrastructure projects support themore » Russian Federation's ability to maintain the risk reduction achieved through upgrades to the equipment. To illustrate the contributions to security, and challenges of implementation, this paper discusses the history and next steps for an indigenous Tamper Indication Device (TID) program, and a Radiation Portal Monitoring (RPM) program.« less
Brief analysis of Jiangsu grid security and stability based on multi-infeed DC index in power system
NASA Astrophysics Data System (ADS)
Zhang, Wenjia; Wang, Quanquan; Ge, Yi; Huang, Junhui; Chen, Zhengfang
2018-02-01
The impact of Multi-infeed HVDC has gradually increased to security and stability operating in Jiangsu power grid. In this paper, an appraisal method of Multi-infeed HVDC power grid security and stability is raised with Multi-Infeed Effective Short Circuit Ratio, Multi-Infeed Interaction Factor and Commutation Failure Immunity Index. These indices are adopted in security and stability simulating calculation of Jiangsu Multi-infeed HVDC system. The simulation results indicate that Jiangsu power grid is operating with a strong DC system. It has high level of power grid security and stability, and meet the safety running requirements. Jinpin-Suzhou DC system is located in the receiving end with huge capacity, which is easily leading to commutation failure of the transmission line. In order to resolve this problem, dynamic reactive power compensation can be applied in power grid near Jinpin-Suzhou DC system. Simulation result shows this method is feasible to commutation failure.
Variability of African Farming Systems from Phenological Analysis of NDVI Time Series
NASA Technical Reports Server (NTRS)
Vrieling, Anton; deBeurs, K. M.; Brown, Molly E.
2011-01-01
Food security exists when people have access to sufficient, safe and nutritious food at all times to meet their dietary needs. The natural resource base is one of the many factors affecting food security. Its variability and decline creates problems for local food production. In this study we characterize for sub-Saharan Africa vegetation phenology and assess variability and trends of phenological indicators based on NDVI time series from 1982 to 2006. We focus on cumulated NDVI over the season (cumNDVI) which is a proxy for net primary productivity. Results are aggregated at the level of major farming systems, while determining also spatial variability within farming systems. High temporal variability of cumNDVI occurs in semiarid and subhumid regions. The results show a large area of positive cumNDVI trends between Senegal and South Sudan. These correspond to positive CRU rainfall trends found and relate to recovery after the 1980's droughts. We find significant negative cumNDVI trends near the south-coast of West Africa (Guinea coast) and in Tanzania. For each farming system, causes of change and variability are discussed based on available literature (Appendix A). Although food security comprises more than the local natural resource base, our results can perform an input for food security analysis by identifying zones of high variability or downward trends. Farming systems are found to be a useful level of analysis. Diversity and trends found within farming system boundaries underline that farming systems are dynamic.
Secure data sharing in public cloud
NASA Astrophysics Data System (ADS)
Venkataramana, Kanaparti; Naveen Kumar, R.; Tatekalva, Sandhya; Padmavathamma, M.
2012-04-01
Secure multi-party protocols have been proposed for entities (organizations or individuals) that don't fully trust each other to share sensitive information. Many types of entities need to collect, analyze, and disseminate data rapidly and accurately, without exposing sensitive information to unauthorized or untrusted parties. Solutions based on secure multiparty computation guarantee privacy and correctness, at an extra communication (too costly in communication to be practical) and computation cost. The high overhead motivates us to extend this SMC to cloud environment which provides large computation and communication capacity which makes SMC to be used between multiple clouds (i.e., it may between private or public or hybrid clouds).Cloud may encompass many high capacity servers which acts as a hosts which participate in computation (IaaS and PaaS) for final result, which is controlled by Cloud Trusted Authority (CTA) for secret sharing within the cloud. The communication between two clouds is controlled by High Level Trusted Authority (HLTA) which is one of the hosts in a cloud which provides MgaaS (Management as a Service). Due to high risk for security in clouds, HLTA generates and distributes public keys and private keys by using Carmichael-R-Prime- RSA algorithm for exchange of private data in SMC between itself and clouds. In cloud, CTA creates Group key for Secure communication between the hosts in cloud based on keys sent by HLTA for exchange of Intermediate values and shares for computation of final result. Since this scheme is extended to be used in clouds( due to high availability and scalability to increase computation power) it is possible to implement SMC practically for privacy preserving in data mining at low cost for the clients.
The Application of materials attractiveness in a graded approach to nuclear materials security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ebbinghaus, B.; Bathke, C.; Dalton, D.
2013-07-01
The threat from terrorist groups has recently received greater attention. In this paper, material quantity and material attractiveness are addressed through the lens of a minimum security strategy needed to prevent the construction of a nuclear explosive device (NED) by an adversary. Nuclear materials are placed into specific security categories (3 or 4 categories) , which define a number of security requirements to protect the material. Materials attractiveness can be divided into four attractiveness levels, High, Medium, Low, and Very Low that correspond to the utility of the material to the adversary and to a minimum security strategy that ismore » necessary to adequately protect the nuclear material. We propose a graded approach to materials attractiveness that recognizes for instance substantial differences in attractiveness between pure reactor-grade Pu oxide (High attractiveness) and fresh MOX fuel (Low attractiveness). In either case, an adversary's acquisition of a Category I quantity of plutonium would be a major incident, but the acquisition of Pu oxide by the adversary would be substantially worse than the acquisition of fresh MOX fuel because of the substantial differences in the time and complexity required of the adversary to process the material and fashion it into a NED.« less
Stress, satisfaction and burnout amongst Australian and New Zealand radiation oncologists.
Leung, John; Rioseco, Pilar; Munro, Philip
2015-02-01
The aim of this study was to determine the self-reported prevalence of stress, job satisfaction and burnout among radiation oncologists in Australia and New Zealand. A secondary aim was to determine the association between stress and satisfaction parameters with burnout. An anonymous online survey was distributed to all radiation oncologists listed on Royal Australian and New Zealand College of Radiologists membership database. There were 37 Likert scale questions on stress, 17 Likert scale questions on job satisfaction and burnout assessed by the Maslach Burnout Inventory - Human Services Survey (MBI-HSS). A principal component analysis was done for stress and satisfaction to identify specific areas. Independent samples t-tests and analysis of variances were done. There were 220 responses out of 348 eligible respondents (63.2% response rate).For stress, a principal component analysis identified five areas: delivery demands, demands on time, continuing professional development (CPD), value and security, and interpersonal/teaching demands. Specialist radiation oncologists were more stressed by value and security than generalists (P < 0.01). Lung cancer specialists had higher levels of stress associated with delivery demands, demands on time and CPD compared with others (P = 0.01). Those over 60 years were less stressed by delivery demands (P = 0.02), demands on time (P = 0.01) and CPD (P = 0.01) than their younger colleagues. Four satisfaction factors were identified in the principal component analysis: resources/remuneration, status/security, delivery of services and professional activities. [Correction added on 15 August 2014, after first online publication: stress/security was replaced with status/security.] Males and Australian radiation oncologists were more satisfied with professional activities (P = 0.02). Brachytherapy specialists were more satisfied with status/security (P = 0.01) while those interested in urology were more satisfied with resources/renumeration (P = 0.01) and professional activities (P = 0.01). The burnout results revealed at least 48.5% of respondents scoring highly in at least one of the three measures of burnout (emotional exhaustion, depersonalisation and personal accomplishment) while 37.5% scoring highly in the emotional exhaustion and depersonalisation subscales. Public sector radiation oncologists had higher levels of emotional exhaustion and lower levels of personal accomplishment than their private sector counterparts, while those interested in lung cancer had higher levels of emotional exhaustion. Multiple regression analysis revealed that the stress subscale demands on time had a significant effect on emotional exhaustion. Higher CPD stress and interpersonal/teaching demands increased the feeling of depersonalisation, while satisfaction with delivery of services was associated with lower levels of depersonalisation and higher levels of personal accomplishment. This first study of stress, satisfaction and burnout among radiation oncologists in Australia and New Zealand had a reasonable response rate and identified specific areas of stress and satisfaction. Nearly half of the respondents scored highly in one burnout subscale. Some of the stress and satisfaction subscales correlated with certain aspects of burnout. Further research will be undertaken to refine the stress and satisfaction parameters and address burnout interventions. © 2014 The Royal Australian and New Zealand College of Radiologists.
Strategy to Improve Naval Shipbuilding Industry Self-Reliance in Indonesia
2017-12-01
investment in the defense industry sector. As the biggest archipelagic country in the world, Indonesia’s demand for maritime technology is high . It...the growth of the maritime industry around the country. However, the naval shipbuilding industry carries high risk and requires high capital for...the high threat level with the region, India and South Korea give more attention to national security by providing a higher budget for defense
Code of Federal Regulations, 2010 CFR
2010-04-01
... on a consolidated basis, by the highest level holding company that is a Material Associated Person..., as of quarter-end for the registered government securities broker or dealer and its highest level... registered government securities broker or dealer and its highest level holding company that is a Material...
Father involvement, paternal sensitivity, and father-child attachment security in the first 3 years.
Brown, Geoffrey L; Mangelsdorf, Sarah C; Neff, Cynthia
2012-06-01
To reach a greater understanding of the early father-child attachment relationship, this study examined concurrent and longitudinal associations among father involvement, paternal sensitivity, and father-child attachment security at 13 months and 3 years of age. Analyses revealed few associations among these variables at 13 months of age, but involvement and sensitivity independently predicted father-child attachment security at age 3. Moreover, sensitivity moderated the association between involvement and attachment security at 3 years. Specifically, involvement was unrelated to attachment security when fathers were highly sensitive, but positively related to attachment security when fathers were relatively less sensitive. Father involvement was also moderately stable across the two time points, but paternal sensitivity was not. Furthermore, there was significant stability in father-child attachment security from 13 months to 3 years. Secure attachment at 13 months also predicted greater levels of paternal sensitivity at 3 years, with sensitivity at age 3 mediating the association between 13 month and 3 year attachment security. In sum, a secure father-child attachment relationship (a) was related to both quantity and quality of fathering behavior, (b) remained relatively stable across early childhood, and (c) predicted increased paternal sensitivity over time. These findings further our understanding of the correlates of early father-child attachment, and underscore the need to consider multiple domains of fathers' parenting and reciprocal relations between fathering behavior and father-child attachment security. PsycINFO Database Record (c) 2012 APA, all rights reserved.
The changing face of Hanford security 1990--1994
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thielman, J.
The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE`s Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almostmore » literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here.« less
Predictors of attachment security in preschool children from intact and divorced families.
Nair, Hira; Murray, Ann D
2005-09-01
The authors selected 58 mother-child dyads from divorced and intact families to participate in a study on the impact of divorce on preschoolers' attachment security. The authors explored pathways that lead to security of attachment. They found that mothers from divorced families were younger, had lower income levels, and had lower levels of education compared with their intact counterparts. Divorced mothers also reported significantly higher levels of stress, depression, need for social support, and conflict with their spouses. Mothers from intact families were more likely to use positive (authoritative) parenting styles compared with divorced mothers. Children in the divorced group had lower security scores on the Attachment Q-Set instrument (E. Waters, 1995). Regression analyses indicated that parenting style made a direct (independent) contribution to attachment security. In addition, temperament was related to attachment security, but temperament did not diminish the association of parenting style with attachment security. Furthermore, regression analyses indicated that the relationship of divorce to attachment security was mediated by parenting style.
The Philippine Navy’s Strategic Sail Plan 2020: A Strong and Credible Force by 2020
2017-06-09
In his 1990 book, he ranked the Philippines Navy at a 6, offshore territorial defense Navy, with high levels of capability in operations up to about...relatively high levels of capability in defensive (and constabulary) operations up to about 200 miles from their shores”196 but the Philippines “just...South China Sea and the competing claims with the Philippines within this area. Philippine Focus on Maritime Security There are multiple articles
A hierarchical detection method in external communication for self-driving vehicles based on TDMA.
Alheeti, Khattab M Ali; Al-Ani, Muzhir Shaban; McDonald-Maier, Klaus
2018-01-01
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-12
... executing certain trades that either add liquidity to or remove liquidity from the Exchange's order book in... adopted its fees, it set its fee levels appropriate to the start-up nature of the Exchange's new equities... to perform at a high level of responsiveness and efficiency. \\5\\ Securities Exchange Act Release No...
The High-Tech Surge. Focus on Careers.
ERIC Educational Resources Information Center
Vo, Chuong-Dai Hong
1996-01-01
The computer industry is growing at a phenomenal rate as technology advances and prices fall, stimulating unprecedented demand from business, government, and individuals. Higher levels of education will be the key to securing employment as organizations increasingly rely on sophisticated technology. (Author)
Dudarev, Alexey A; Dushkina, Eugenia V; Sladkova, Yuliya N; Alloyarov, Pavel R; Chupakhin, Valery S; Dorofeyev, Vitaliy M; Kolesnikova, Tatjana A; Fridman, Kirill B; Evengard, Birgitta; Nilsson, Lena M
2013-01-01
Poor state of water supply systems, shortage of water purification facilities and disinfection systems, low quality of drinking water generally in Russia and particularly in the regions of the Russian Arctic, Siberia and Far East have been defined in the literature. However, no standard protocol of water security assessment has been used in the majority of studies. Uniform water security indicators collected from Russian official statistical sources for the period 2000-2011 were used for comparison for 18 selected regions in the Russian Arctic, Siberia and Far East. The following indicators of water security were analyzed: water consumption, chemical and biological contamination of water reservoirs of Categories I and II of water sources (centralized--underground and surface, and non-centralized) and of drinking water. Water consumption in selected regions fluctuated from 125 to 340 L/person/day. Centralized water sources (both underground and surface sources) are highly contaminated by chemicals (up to 40-80%) and biological agents (up to 55% in some regions), mainly due to surface water sources. Underground water sources show relatively low levels of biological contamination, while chemical contamination is high due to additional water contamination during water treatment and transportation in pipelines. Non-centralized water sources are highly contaminated (both chemically and biologically) in 32-90% of samples analyzed. Very high levels of chemical contamination of drinking water (up to 51%) were detected in many regions, mainly in the north-western part of the Russian Arctic. Biological contamination of drinking water was generally much lower (2.5-12%) everywhere except Evenki AO (27%), and general and thermotolerant coliform bacteria predominated in drinking water samples from all regions (up to 17.5 and 12.5%, correspondingly). The presence of other agents was much lower: Coliphages--0.2-2.7%, Clostridia spores, Giardia cysts, pathogenic bacteria, Rotavirus--up to 0.8%. Of a total of 56 chemical pollutants analyzed in water samples from centralized water supply systems, 32 pollutants were found to be in excess of hygienic limits, with the predominant pollutants being Fe (up to 55%), Cl (up to 57%), Al (up to 43%) and Mn (up to 45%). In 18 selected regions of the Russian Arctic, Siberia and Far East Category I and II water reservoirs, water sources (centralized--underground, surface; non-centralized) and drinking water are highly contaminated by chemical and biological agents. Full-scale reform of the Russian water industry and water security system is urgently needed, especially in selected regions.
Cyr, Maeve; Pasalich, Dave S; McMahon, Robert J; Spieker, Susan J
2014-10-01
This study examined whether infant attachment security moderates the association between parenting in preschool and later aggressive behavior among a sample of children at high risk for developing conduct problems. Participants were 82 adolescent mother-child dyads recruited from the community. Infant attachment status at age 1 year was measured using the Strange Situation. When children were aged 4.5 years, mothers reported on their self-efficacy in regards to parenting, and mothers' positive parenting and criticism were coded from direct observations of parent-child interactions. In grade 1, mothers reported on their children's aggressive behavior. Infant secure attachment significantly moderated the association between observed maternal criticism and child aggression. That is, among insecurely attached children, higher levels of maternal criticism were associated with more severe aggression. This longitudinal finding suggests that a secure attachment may buffer the deleterious effects of harsh parenting on child aggression.
Invisible Security Ink Based on Water-Soluble Graphitic Carbon Nitride Quantum Dots.
Song, Zhiping; Lin, Tianran; Lin, Lihua; Lin, Sen; Fu, Fengfu; Wang, Xinchen; Guo, Liangqia
2016-02-18
Stimuli-responsive photoluminescent (PL) materials have been widely used as fluorescent ink for data security applications. However, traditional fluorescent inks are limited in maintaining the secrecy of information because the inks are usually visible by naked eyes either under ambient light or UV-light illumination. Here, we introduced metal-free water-soluble graphitic carbon nitride quantum dots (g-CNQDs) as invisible security ink for information coding, encryption, and decryption. The information written by the g-CNQDs is invisible in ambient light and UV light, but it can be readable by a fluorescence microplate reader. Moreover, the information can be encrypted and decrypted by using oxalic acid and sodium bicarbonate as encryption reagent and decryption reagent, respectively. Our findings provide new opportunities for high-level information coding and protection by using water-soluble g-CNQDs as invisible security ink. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
2009-03-01
Framework ( IATF ) as their guidance for information assurance. The IATF defines what high 5 OB1 is compatible with and intends to use legacy...standardized levels of security. The OB1 team using the IATF as guidance defines high robustness as proving to the maximum extent possible, that
Process Security in Chemical Engineering Education
ERIC Educational Resources Information Center
Piluso, Cristina; Uygun, Korkut; Huang, Yinlun; Lou, Helen H.
2005-01-01
The threats of terrorism have greatly alerted the chemical process industries to assure plant security at all levels: infrastructure-improvement-focused physical security, information-protection-focused cyber security, and design-and-operation-improvement-focused process security. While developing effective plant security methods and technologies…
NASA Astrophysics Data System (ADS)
Sushko, O. P.; Kaznin, A. A.; Babkin, A. V.; Bogdanov, D. A.
2017-10-01
The study we are conducting involves the analysis of information security levels achieved by energy providers operating in the North Arctic Region. We look into whether the energy providers’ current information security levels meet reliability standards and determine what further actions may be needed for upgrading information security in the context of the digital transformation that the world community is undergoing. When developing the information security systems for electric energy providers or selecting the protection means for them, we are governed by the fact that the assets to be protected are process technologies. While information security risk can be assessed using different methods, the evaluation of the economic damage from these risks appears to be a difficult task. The most probable and harmful risks we have identified when evaluating the electric energy providers’ information security will be used by us as variables. To provide the evaluation, it is necessary to calculate the costs relating to elimination of the risks identified. The final stage of the study will involve the development of an operation algorithm for the North Arctic Region’s energy provider’s business information protection security system - a set of information security services, and security software and hardware.
Determining the right level for your IT security investment.
Claunch, Don; McMillan, Mac
2013-05-01
Investing sufficiently in IT security not only is essential for a healthcare organization's protection, but also is a responsibility to patients, and its success depends on its being addressed at all levels of management. Hospital data security breaches have the potential to cost as much as $7 million, including fines, litigation, and damaged reputation. Response and cleanup alone can cost hundreds of thousands of dollars. Developing and following an annual action plan for IT security can lower hospitals' IT security costs in the long run.
Food insecurity among Dutch food bank recipients: a cross-sectional study.
Neter, Judith E; Dijkstra, S Coosje; Visser, Marjolein; Brouwer, Ingeborg A
2014-05-16
To determine the prevalence of (very) low food security among Dutch food bank recipients, and to identify potential demographic, lifestyle and nutrition-related factors associated with (very) low food security. 11 of 135 Dutch food banks were selected throughout the Netherlands. 251 Dutch food bank recipients participated in the study (93 men and 158 women). Inclusion criteria for participation were: (1) at least 18 years of age, (2) sufficiently fluent in Dutch to participate in oral and written interviews, (3) recipient of a Dutch food bank for at least 1 month and (4) collect own food parcel at the food bank. A single member per household was included. Level of food security. The prevalence of food insecurity was 72.9% (N=183), of which 40.4% (N=74) reported very low food security. Of the very low food secure participants, 56.8% (N=42) reported they were ever hungry but did not eat because they could not afford enough food in the previous 3 months. Adjusted multinomial logistic regression analyses showed that households without children were less likely to experience low food security (OR 0.39 (95% CI 0.18 to 0.88)) and men (OR 0.24 (95% CI 0.11 to 0.51)) were less likely to experience very low food security, while low-educated recipients (OR 5.05 (95% CI 1.37 to 18.61)) were more likely to experience very low food security. Furthermore, recipients with high satisfaction with overall food intake (OR 0.46 (95% CI 0.27 to 0.78)), high perceived healthiness of overall food intake (OR 0.34 (95% CI 0.19 to 0.62)) or high self-efficacy of eating healthy (OR 0.62 (95% CI 0.40 to 0.96)) were less likely to experience very low food security. Our study showed high prevalence rates of food insecurity among Dutch food bank recipients, and identified subgroups at increased risk of food insecurity. More research is urgently needed on the underlying determinants of food insecurity and the effectiveness of food assistance by food banks. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Fast optical source for quantum key distribution based on semiconductor optical amplifiers.
Jofre, M; Gardelein, A; Anzolin, G; Amaya, W; Capmany, J; Ursin, R; Peñate, L; Lopez, D; San Juan, J L; Carrasco, J A; Garcia, F; Torcal-Milla, F J; Sanchez-Brea, L M; Bernabeu, E; Perdigues, J M; Jennewein, T; Torres, J P; Mitchell, M W; Pruneri, V
2011-02-28
A novel integrated optical source capable of emitting faint pulses with different polarization states and with different intensity levels at 100 MHz has been developed. The source relies on a single laser diode followed by four semiconductor optical amplifiers and thin film polarizers, connected through a fiber network. The use of a single laser ensures high level of indistinguishability in time and spectrum of the pulses for the four different polarizations and three different levels of intensity. The applicability of the source is demonstrated in the lab through a free space quantum key distribution experiment which makes use of the decoy state BB84 protocol. We achieved a lower bound secure key rate of the order of 3.64 Mbps and a quantum bit error ratio as low as 1.14×10⁻² while the lower bound secure key rate became 187 bps for an equivalent attenuation of 35 dB. To our knowledge, this is the fastest polarization encoded QKD system which has been reported so far. The performance, reduced size, low power consumption and the fact that the components used can be space qualified make the source particularly suitable for secure satellite communication.
Evolutionary Aspects for Technology Policy: the Case of Galileo Public-Private Partnership
NASA Astrophysics Data System (ADS)
Zervos, Vasilis
2002-01-01
This paper examines the impact of strategic interactions on Private-Public Partnerships (PPPs) in space. Though there is substantial business and economics literature on PPPs, it is traditionally focused on the relationships within the partnerships (low level) and the respective factors affecting its success. The contribution of this paper is that it examines the political economy of PPPs, analysing how `high-level' strategic interactions across public-private sectors in Europe and the US determine their behaviour and success. Within this context, the European case of Galileo and other national space projects, such as the US plans for a space-based anti- missile defence, are each based on different types of PPPs, confined within the geographical borders of the two areas. The security and commercial benefits of such programmes for the respective space industries and economies have a direct impact on the other area's industry and sense of security. The paper shows that trans- Atlantic cooperation at public policy level is essential to allow the respective industries to explore the benefits of cross-border strategic research partnerships (SRPs). This will reduce the costs of the respective programmes, addressing security concerns.
The strategic security officer.
Hodges, Charles
2014-01-01
This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.
Mutchler, Jan E; Li, Yang; Xu, Ping
2018-04-16
Older Americans rely heavily on Social Security benefits (SSBs) to support independent lifestyles, and many have few or no additional sources of income. We establish the extent to which SSBs adequately support economic security, benchmarked by the Elder Economic Security Standard Index. We document variability across U.S. counties in the adequacy levels of SSBs among older adults. We find that the average SSBs fall short of what is required for economic security in every county in the United States, but the level of shortfall varies considerably by location. Policy implications relating to strengthening Social Security and other forms of retirement income are discussed.
NASA Technical Reports Server (NTRS)
Zelkin, Natalie; Henriksen, Stephen
2011-01-01
This document is being provided as part of ITT's NASA Glenn Research Center Aerospace Communication Systems Technical Support (ACSTS) contract: "New ATM Requirements--Future Communications, C-Band and L-Band Communications Standard Development." ITT has completed a safety hazard analysis providing a preliminary safety assessment for the proposed C-band (5091- to 5150-MHz) airport surface communication system. The assessment was performed following the guidelines outlined in the Federal Aviation Administration Safety Risk Management Guidance for System Acquisitions document. The safety analysis did not identify any hazards with an unacceptable risk, though a number of hazards with a medium risk were documented. This effort represents an initial high-level safety hazard analysis and notes the triggers for risk reassessment. A detailed safety hazards analysis is recommended as a follow-on activity to assess particular components of the C-band communication system after the profile is finalized and system rollout timing is determined. A security risk assessment has been performed by NASA as a parallel activity. While safety analysis is concerned with a prevention of accidental errors and failures, the security threat analysis focuses on deliberate attacks. Both processes identify the events that affect operation of the system; and from a safety perspective the security threats may present safety risks.
DOT National Transportation Integrated Search
2015-08-01
In post-tensioning construction, steel cables : running through PVC pipes buried in concrete : construction components are subjected to a high : level of tension and then secured. This gives the : component significant strength, allowing bridge : spa...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false General. 5.401 Section 5.401 Federal Acquisition Regulations System FEDERAL ACQUISITION REGULATION ACQUISITION PLANNING PUBLICIZING CONTRACT ACTIONS Release of Information 5.401 General. (a) A high level of business security must...
76 FR 22409 - Nationwide Cyber Security Review (NCSR) Assessment
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-21
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0012] Nationwide Cyber Security Review (NCSR...), National Cyber Security Division (NCSD), Cyber Security Evaluation Program (CSEP), will submit the... for all levels of government to complete a cyber network security assessment so that a full measure of...
Murphy, Tia Panfile; Laible, Deborah J; Augustine, Mairin; Robeson, Lindsay
2015-01-01
Recent research has attempted to explain the mechanisms through which parental attachment affects social and emotional outcomes (e.g., Burnette, Taylor, Worthington, & Forsyth, 2007 ; Panfile & Laible, 2012 ). The authors' goal was to examine negative emotionality and emotion regulation as mediators of the associations that attachment has with empathy, forgiveness, guilt, and jealousy. One hundred forty-eight adolescents reported their parental attachment security, general levels of negative emotionality and abilities to regulate emotional responses, and tendencies to feel empathy, forgiveness, guilt, and jealousy. Results revealed that attachment security was associated with higher levels of empathy, forgiveness, and guilt, but lower levels of jealousy. In addition, emotion regulation mediated the links attachment shared with both empathy and guilt, such that higher levels of attachment security were linked with greater levels of emotion regulation, which led to greater levels of empathy and guilt. Alternatively, negative emotionality mediated the links attachment shared with both forgiveness and jealousy, such that higher levels of attachment security were associated with lower levels of negative emotionality, which in turn was linked to lower levels of forgiveness and higher levels of jealousy. This study provides a general picture of how attachment security may play a role in shaping an individual's levels of social emotions.
Development of a food security measurement tool for New Zealand households.
Parnell, Winsome R; Gray, Andrew R
2014-10-28
To determine the prevalence of household food insecurity in New Zealand (NZ), eight food security statements were included in the 1997 National Nutrition Survey of adults. Rasch model analysis was performed to determine whether each food security statement (addressing a food security attribute) was discrete and could be ranked on a unidimensional scale. The NZ model had marginal 'household' reliability (0·60-0·66), good item separation (17·20-17·77) and item infit/outfit values between 0·8 and 1·25. Indices could be ranked by level of severity and represent the experience of household food insecurity in NZ. Categories of food security were assigned and used to predict food choice, and energy and nutrient intakes. Compared with fully secure/almost fully secure households, those that were moderately secure or of low security were less likely to consume the recommended daily servings of fruit and vegetables, and more likely to consume fatty meats. Intake of total fat, saturated, monounsaturated and polyunsaturated fat, cholesterol, lactose and vitamin B12 increased with lower levels of food security. Intakes of glucose, fructose and vitamin C were highest in the fully secure/almost fully secure category. This unique eight-component food security measurement tool has less respondent burden than the US Core Food Security Measure. The relationships between the level of food insecurity and food choice and nutrient intakes illustrate that the most food-insecure households have less healthy diets. This relatively brief population-specific measurement tool is suitable to monitor population food security status, and is a useful marker of nutritional status.
33 CFR 101.200 - MARSEC Levels.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false MARSEC Levels. 101.200 Section... MARITIME SECURITY: GENERAL Maritime Security (MARSEC) Levels § 101.200 MARSEC Levels. (a) MARSEC Levels advise the maritime community and the public of the level of risk to the maritime elements of the...
Interactive Synthesis of Code Level Security Rules
2017-04-01
Interactive Synthesis of Code-Level Security Rules A Thesis Presented by Leo St. Amour to The Department of Computer Science in partial fulfillment...of the requirements for the degree of Master of Science in Computer Science Northeastern University Boston, Massachusetts April 2017 DISTRIBUTION...Abstract of the Thesis Interactive Synthesis of Code-Level Security Rules by Leo St. Amour Master of Science in Computer Science Northeastern University
Strategic Mobility 21: Smart and Secure E Corridor Stakeholder Evaluation - Savannah
2009-12-07
validated to meet Customs-Trade Partnership Against Terrorism ( CTPAT ) level 3 Customs standards and combined with multiple overlain foreign trade zones... CTPAT level 3 benefits of technology validated supply chains insulating shippers against random inspections as the core elements of smart secure...their carrier partners, Customs-Trade Partnership Against Terrorism ( CTPAT ) level 3 technologically verified supply chain security for all shippers
Brown, Darcy; Larkin, Fintan; Sengupta, Samrat; Romero-Ureclay, Jose L; Ross, Callum C; Gupta, Nitin; Vinestock, Morris; Das, Mrigendra
2014-10-01
A number of studies have demonstrated the anti-aggressive properties of clozapine in schizophrenia and its positive effect in borderline personality disorder. There is no published literature on the treatment of antisocial personality disorder (ASPD) with clozapine. We present a case series of 7 patients with primary ASPD and high psychopathic traits treated with clozapine, having a significant history of serious violence and currently detained in a UK based high-security hospital. A retrospective review of case notes was carried out to formulate Clinical Global Impression (CGI) scores and record incidents of violence and aggression. Effect on specific symptom domains (cognitive-perceptual, impulsive-behavioural dyscontrol, affective dysregulation) was also noted. Metabolic parameters and serum clozapine levels were also sampled. All 7 patients showed significant improvement on clozapine. It was shown to benefit all symptom domains, especially impulsive behavioral dyscontrol and anger. The number of violent incidents committed by 6 of the 7 patients reduced significantly, and all patients' risk of violence reduced. Clozapine serum levels for 6 of the 7 patients were in the range 150-350 ng/mL. Clozapine is of benefit in reducing the clinical severity of ASPD. It improved all symptom domains, especially impulsive-behavioral dyscontrol and anger, and reduced levels of aggression and violence, especially at lower doses (serum levels <350 ng/m). To our knowledge, this is the first account of clozapine treatment in patients with ASPD and high psychopathy.
Food insecurity and diabetes self-management among food pantry clients.
Ippolito, Matthew M; Lyles, Courtney R; Prendergast, Kimberly; Marshall, Michelle Berger; Waxman, Elaine; Seligman, Hilary Kessler
2017-01-01
To examine the association between level of food security and diabetes self-management among food pantry clients, which is largely not possible using clinic-based sampling methods. Cross-sectional descriptive study. Community-based food pantries in California, Ohio and Texas, USA, from March 2012 through March 2014. Convenience sample of adults with diabetes queuing at pantries (n 1237; 83 % response). Sampled adults were stratified as food secure, low food secure or very low food secure. We used point-of-care glycated Hb (HbA1c) testing to determine glycaemic control and captured diabetes self-management using validated survey items. The sample was 70 % female, 55 % Latino/Hispanic, 25 % white and 10 % black/African American, with a mean age of 56 years. Eighty-four per cent were food insecure, one-half of whom had very low food security. Mean HbA1c was 8·1 % and did not vary significantly by food security status. In adjusted models, very-low-food-secure participants, compared with both low-food-secure and food-secure participants, had poorer diabetes self-efficacy, greater diabetes distress, greater medication non-adherence, higher prevalence of severe hypoglycaemic episodes, higher prevalence of depressive symptoms, more medication affordability challenges, and more food and medicine or health supply trade-offs. Few studies of the health impact of food security have been able to examine very low food security. In a food pantry sample with high rates of food insecurity, we found that diabetes self-management becomes increasingly difficult as food security worsens. The efficacy of interventions to improve diabetes self-management may increase if food security is simultaneously addressed.
Effectiveness of the Civil Aviation Security Program.
1976-09-20
commerce--a pr per balance appears to exist. Moreover, airline and airport security programs appear to be capable of responding to changes in the nature...Moreover, airline and airport security programs appear to be capable of responding to changes in the nature and level of current and future threats. The...delays and diversions were experienced. Airline and airport security measures continued to afford the necessary level of protection to U.S. air
[The Explore of the Security Strategy Model in Hospital Mobile Clinic New Mode].
Li, Ke; Xia, Yong; Wang, Wei
2016-03-01
The paper elaborates and analyzes the current status of mobile hospital information security, then puts forward a security new model of the mobile treatment, then its architecture and solutions is elaborated. The use of this model makes the overall security level of hospital information to be further improved and enhanced, it has a positive signifi cance to promote the overal hospital management level.
The skill-divide in job quality: a cross-national analysis of 28 countries.
Stier, Haya
2015-01-01
This study focuses on the skill divide in job quality and the role of social institutions in structuring the relation of workers' qualifications to the attributes of their jobs. Four measures of job quality are examined: job security, job achievement, job content and work schedule flexibility. The study is based on the 2005 ISSP module on work orientations and encompasses 28 countries. Obtained through multilevel modeling, the findings show that low-skilled workers are disadvantaged in all aspects of job quality. However, skill inequality in the quality of employment depends on countries' characteristics, with declining inequality in countries at higher levels of technological development and to some extent also in times of technological growth. At times of high unemployment, skill disparities in job security widen while on other measures of job quality they decline. Under high market regulation, the low skilled enjoy better job security but on other measures, skill inequalities increase. Copyright © 2014 Elsevier Inc. All rights reserved.
Nunnery, D L; Haldeman, L A; Morrison, S D; Dharod, J M
2015-04-01
Objectives of this study: (1) Examine food insecurity (FI) prevalence and its relationship with sociodemographic and pre-resettlement characteristics; (2) Investigate differences in amount of money spent on food/month by food security status and socio-demographic characteristics. A pilot study with semi-structured in-home interviews was conducted with Liberian caregivers (n = 33). FI was indicated in 61% of households. FI was higher among women >40, had ≤ high school education and those making ≤$1,000/month. Women arriving in US >15 years of age were more likely to be food insecure. Participants spent an average $109/month on groceries/member. Food insecure women, and those without a car spent more money on food (P < .10). Liberian women in this sample experience high levels of FI upon resettlement. Besides poor economic conditions, pre-resettlement characteristics were associated with food security status. These findings call for future research to understand how preresettlement conditions affect food choices, budgeting and thereby food security status.
Approach to estimation of level of information security at enterprise based on genetic algorithm
NASA Astrophysics Data System (ADS)
V, Stepanov L.; V, Parinov A.; P, Korotkikh L.; S, Koltsov A.
2018-05-01
In the article, the way of formalization of different types of threats of information security and vulnerabilities of an information system of the enterprise and establishment is considered. In a type of complexity of ensuring information security of application of any new organized system, the concept and decisions in the sphere of information security are expedient. One of such approaches is the method of a genetic algorithm. For the enterprises of any fields of activity, the question of complex estimation of the level of security of information systems taking into account the quantitative and qualitative factors characterizing components of information security is relevant.
NASA Astrophysics Data System (ADS)
Khe Sun, Pak; Vorona-Slivinskaya, Lubov; Voskresenskay, Elena
2017-10-01
The article highlights the necessity of a complex approach to assess economic security of municipalities, which would consider municipal management specifics. The approach allows comparing the economic security level of municipalities, but it does not describe parameter differences between compared municipalities. Therefore, there is a second method suggested: parameter rank order method. Applying these methods allowed to figure out the leaders and outsiders of the economic security among municipalities and rank all economic security parameters according to the significance level. Complex assessment of the economic security of municipalities, based on the combination of the two approaches, allowed to assess the security level more accurate. In order to assure economic security and equalize its threshold values, one should pay special attention to transportation system development in municipalities. Strategic aims of projects in the area of transportation infrastructure development in municipalities include the following issues: contribution into creating and elaborating transportation logistics and manufacture transport complexes, development of transportation infrastructure with account of internal and external functions of the region, public transport development, improvement of transport security and reducing its negative influence on the environment.
Singh, Abhinav; Purohit, Bharathi M; Masih, Nitin; Kahndelwal, Praveen Kumar
2014-04-01
The target population for this cross sectional study comprises subjects with and without social security in a national social security scheme. The study aimed to compare and assess the risk factors for oral diseases among insured (organised sector) and non-insured workers (unorganised sector) in New Delhi, India. The sample comprised a total of 2,752 subjects. Of these, 960 workers belonged to the formal or organised sector with a social security and dental health insurance and 1,792 had no social security or dental insurance from the informal or unorganised sector. Significant differences were noted between the two groups for literacy levels, between-meal sugar consumption, tobacco-related habits and utilisation of dental care. Bleeding/calculus and periodontal pockets were present among 25% and 65.4% of insured workers, respectively. Similarly, 13.6% and 84.5% of non-insured workers had bleeding/calculus and periodontal pockets, respectively. The mean DMFT (decayed, missing, filled teeth) value among the insured workers and non-insured workers was 3.27 ± 1.98 and 3.75 ± 1.80, respectively. The association between absence of health insurance and dental caries was evident with an odds ratio (OR) of 1.94. Subjects with below graduate education were more prone to dental caries (OR = 1.62). Subjects who cleaned their teeth two or more times a day were less likely to have dental caries (OR = 1.47). Utilisation of dental care was inversely related to dental caries (OR = 1.25). The major risk factors for oral diseases in both the groups with similar socio-economic status were the lack of social security and health insurance, low literacy levels, high tobacco consumption and low levels of dental care utilisation. © 2013 FDI World Dental Federation.
DOE`s nation-wide system for access control can solve problems for the federal government
DOE Office of Scientific and Technical Information (OSTI.GOV)
Callahan, S.; Tomes, D.; Davis, G.
1996-07-01
The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by manymore » different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.« less
University building safety index measurement using risk and implementation matrix
NASA Astrophysics Data System (ADS)
Rahman, A.; Arumsari, F.; Maryani, A.
2018-04-01
Many high rise building constructed in several universities in Indonesia. The high-rise building management must provide the safety planning and proper safety equipment in each part of the building. Unfortunately, most of the university in Indonesia have not been applying safety policy yet and less awareness on treating safety facilities. Several fire accidents in university showed that some significant risk should be managed by the building management. This research developed a framework for measuring the high rise building safety index in university The framework is not only assessed the risk magnitude but also designed modular building safety checklist for measuring the safety implementation level. The safety checklist has been developed for 8 types of the university rooms, i.e.: office, classroom, 4 type of laboratories, canteen, and library. University building safety index determined using risk-implementation matrix by measuring the risk magnitude and assessing the safety implementation level. Building Safety Index measurement has been applied in 4 high rise buildings in ITS Campus. The building assessment showed that the rectorate building in secure condition and chemical department building in beware condition. While the library and administration center building was in less secure condition.
Factors Affecting Attachment in International Adoptees at 6 Months Post Adoption
Weiss, Sandra
2011-01-01
This pilot study examined the effect of five child and maternal factors on the attachment security of international adoptees at six months post adoption. Results from the sample of 22 adoptive mother-infant dyads showed that age at adoption, developmental status, length and quality of preadoption care, and maternal attachment representations were not significant predictors of child attachment status. The number of preadoption placements and the child's stress level did significantly predict attachment status, accounting for approximately 40% of the variance in attachment security. Number of preadoption placements uniquely contributed 14% of that variance (p=.007) while stress level uniquely contributed 12% (p=.01). Children who had fewer preadoption placements had higher attachment security; similarly, children who had lower stress levels had higher attachment security. Results suggest that consistency of preadoption care was more important than its length or quality. Further, the relationship between stress level and attachment security raises the possibility that a lower stress level functions as a protective factor for the developing attachment with the adoptive mother. PMID:22267885
Research on information security system of waste terminal disposal process
NASA Astrophysics Data System (ADS)
Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei
2017-05-01
Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.
Agroforestry, climate change, and food security
USDA-ARS?s Scientific Manuscript database
Successfully addressing global climate change effects on agriculture will require a holistic, sustained approach incorporating a suite of strategies at multiple spatial scales and time horizons. In the USA of the 1930’s, bold and innovative leadership at high levels of government was needed to enact...
ASIS healthcare security benchmarking study.
2001-01-01
Effective security has aligned itself into the everyday operations of a healthcare organization. This is evident in every regional market segment, regardless of size, location, and provider clinical expertise or organizational growth. This research addresses key security issues from an acute care provider to freestanding facilities, from rural hospitals and community hospitals to large urban teaching hospitals. Security issues and concerns are identified and addressed daily by senior and middle management. As provider campuses become larger and more diverse, the hospitals surveyed have identified critical changes and improvements that are proposed or pending. Mitigating liabilities and improving patient, visitor, and/or employee safety are consequential to the performance and viability of all healthcare providers. Healthcare organizations have identified the requirement to compete for patient volume and revenue. The facility that can deliver high-quality healthcare in a comfortable, safe, secure, and efficient atmosphere will have a significant competitive advantage over a facility where patient or visitor security and safety is deficient. Continuing changes in healthcare organizations' operating structure and healthcare geographic layout mean changes in leadership and direction. These changes have led to higher levels of corporate responsibility. As a result, each organization participating in this benchmark study has added value and will derive value for the overall benefit of the healthcare providers throughout the nation. This study provides a better understanding of how the fundamental security needs of security in healthcare organizations are being addressed and its solutions identified and implemented.
NASA Astrophysics Data System (ADS)
Kurnianto, Ari; Isnanto, Rizal; Widodo, Aris Puji
2018-02-01
Information security is a problem effected business process of an organization, so it needs special concern. Information security assessment which is good and has international standard is done using Information Security Management System (ISMS) ISO/IEC 27001:2013. In this research, the high level assessment has been done using ISO/IEC 27001:2013 to observe the strength of information secuity in Ministry of Internal Affairs. The research explains about the assessment of information security management which is built using PHP. The input data use primary and secondary data which passed observation. The process gets maturity using the assessment of ISO/IEC 27001:2013. GAP Analysis observes the condition now a days and then to get recommendation and road map. The result of this research gets all of the information security process which has not been already good enough in Ministry of Internal Affairs, gives recommendation and road map to improve part of all information system being running. It indicates that ISO/IEC 27001:2013 is good used to rate maturity of information security management. As the next analyzation, this research use Clause and Annex in ISO/IEC 27001:2013 which is suitable with condition of Data Center and Data Recovery Center, so it gets optimum result and solving problem of the weakness information security.
Davies, Patrick T; Cummings, E Mark; Winter, Marcia A
2004-01-01
This study was designed to delineate pathways between systems profiles of family functioning, children's emotional insecurity in the interparental relationship, and their psychological adjustment in a sample of 221 children and their parents. Consistent with family systems theory, cluster analyses conducted with assessments of marital, coparental, and parent-child functioning indicated that families fit into one of four profiles: (a) cohesive families, characterized by warmth, affection, and flexible well-defined boundaries in family relationships; (b) disengaged families, reflected in high levels of adversity and low levels of support across family subsystems; (c) enmeshed families, evidenced by high levels of discord and weak maintenance of relationship boundaries in the family unit; and (d) adequate families, defined by elevated parental psychological control within a larger family context of low discord and high warmth. In comparison to children in cohesive families, children in enmeshed and disengaged families exhibited greater signs of insecurity in the interparental relationship concurrently and internalizing and externalizing symptoms both concurrently and 1 year later. Structural equation models revealed that a latent, multimethod measure of insecurity in the interparental relationship partially mediated associations between family enmeshment and disengagement and children's psychological symptoms 1 year later. Results are discussed in relation to how they inform and refine a family-wide model of the emotional security hypothesis.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schanfein, Mark J.; Mladineo, Stephen V.
2015-07-07
Over the last few years, significant attention has been paid to both encourage application and provide domestic and international guidance for designing in safeguards and security in new facilities.1,2,3 However, once a facility is operational, safeguards, security, and safety often operate as separate entities that support facility operations. This separation is potentially a serious weakness should insider or outsider threats become a reality.Situations may arise where safeguards detects a possible loss of material in a facility. Will they notify security so they can, for example, check perimeter doors for tampering? Not doing so might give the advantage to an insidermore » who has already, or is about to, move nuclear material outside the facility building. If outsiders break into a facility, the availability of any information to coordinate the facility’s response through segregated alarm stations or a failure to include all available radiation sensors, such as safety’s criticality monitors can give the advantage to the adversary who might know to disable camera systems, but would most likely be unaware of other highly relevant sensors in a nuclear facility.This paper will briefly explore operational safeguards, safety, and security by design (3S) at a high level for domestic and State facilities, identify possible weaknesses, and propose future administrative and technical methods, to strengthen the facility system’s response to threats.« less
Cyber Safety and Security for Reduced Crew Operations (RCO)
NASA Technical Reports Server (NTRS)
Driscoll, Kevin
2017-01-01
NASA and the Aviation Industry is looking into reduced crew operations (RCO) that would cut today's required two-person flight crews down to a single pilot with support from ground-based crews. Shared responsibility across air and ground personnel will require highly reliable and secure data communication and supporting automation, which will be safety-critical for passenger and cargo aircraft. This paper looks at the different types and degrees of authority delegation given from the air to the ground and the ramifications of each, including the safety and security hazards introduced, the mitigation mechanisms for these hazards, and other demands on an RCO system architecture which would be highly invasive into (almost) all safety-critical avionics. The adjacent fields of unmanned aerial systems and autonomous ground vehicles are viewed to find problems that RCO may face and related aviation accident scenarios are described. The paper explores possible data communication architectures to meet stringent performance and information security (INFOSEC) requirements of RCO. Subsequently, potential challenges for RCO data communication authentication, encryption and non-repudiation are identified. The approach includes a comprehensive safety-hazard analysis of the RCO system to determine top level INFOSEC requirements for RCO and proposes an option for effective RCO implementation. This paper concludes with questioning the economic viability of RCO in light of the expense of overcoming the operational safety and security hazards it would introduce.
Elgenaidi, Walid; Newe, Thomas; O'Connell, Eoin; Toal, Daniel; Dooly, Gerard
2016-12-21
There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper.
Elgenaidi, Walid; Newe, Thomas; O’Connell, Eoin; Toal, Daniel; Dooly, Gerard
2016-01-01
There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper. PMID:28009834
A hierarchical detection method in external communication for self-driving vehicles based on TDMA
Al-ani, Muzhir Shaban; McDonald-Maier, Klaus
2018-01-01
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms. PMID:29315302
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-01-01
Background and objective While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Materials and methods Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software ‘R’ by effectively combining secret-sharing-based secure computation with original computation. Results Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50 000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. Discussion If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using ‘R’ that works interactively while secure computation protocols generally require a significant amount of processing time. Conclusions We propose a secure statistical analysis system using ‘R’ for medical data that effectively integrates secret-sharing-based secure computation and original computation. PMID:24763677
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-10-01
While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software 'R' by effectively combining secret-sharing-based secure computation with original computation. Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50,000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using 'R' that works interactively while secure computation protocols generally require a significant amount of processing time. We propose a secure statistical analysis system using 'R' for medical data that effectively integrates secret-sharing-based secure computation and original computation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Doorstep: A doorbell security system for the prevention of doorstep crime.
Ennis, Andrew; Cleland, Ian; Patterson, Timothy; Nugent, Chris D; Cruciani, Federico; Paggetti, Cristiano; Morrison, Gareth; Taylor, Richard
2016-08-01
Safety and security rank highly in the priorities of older people on both an individual and policy level. Older people are commonly targeted as victims of doorstep crime, as they can be perceived as being vulnerable. As a result, this can have a major effect on the victim's health and wellbeing. There have been numerous prevention strategies implemented in an attempt to combat and reduce the number of doorstep crimes. There is, however, little information available detailing the effectiveness of these strategies and how they impact on the fear of crime, particularly with repeat victims. There is therefore clear merit in the creation and piloting of a technology based solution to combat doorstep crime. This paper presents a developed solution to provide increased security for older people within their home.
High Efficiency mm-Wave Transmitter Array
2016-09-01
SECURITY CLASSIFICATION OF: High efficiency, high power transmitters integrated in silicon at 45, 94 and 138 GHz were developed. Our approach...employs CMOS-SOI and SiGe HBT unit amplifiers, power -combined in free-space using antenna arrays to attain high power levels. In the baseline approach...the-art were made. At 45GHz, a single CMOS chip produced an RF power of 630mW, which yielded an EIRP of 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND
The Indian National Food Security Act, 2013: a commentary.
Varadharajan, Kiruba Sankar; Thomas, Tinku; Kurpad, Anura
2014-06-01
The National Food Security Act (NFSA) 2013, passed recently by the Indian Parliament, aims to ensure food security in India, chiefly by providing cereals at subsidized prices through the Targeted Public Distribution System (TPDS) for about two-thirds of households. The predominant line of criticism of the NFSA has been the costs of such an ambitious rights-based approach in the context of decelerating economic growth and growing fiscal deficits. We argue that the food subsidy has been increasing through the last few decades and is set to climb even higher with this act but that the incremental costs, at about 0.2% of gross domestic product, are not as high as claimed. Further, recent evidence of increasing utilization of the TPDS and decreasing corruption add credence to the act's premise that significant income transfers to poor households can be achieved, thereby promoting food security as well as dietary diversity. Several concerns remain to be addressed in the design and implementation of the act, including its proposed coverage, a cereal-centric approach, the identification of beneficiaries, and its adaptability at the state level. If these are resolved effectively, the act can prove to be a significant step forward in India's long-drawn-out battle against undernutrition and food insecurity. Finally, the NFSA also provides a fresh opportunity to reform and strengthen the TPDS, which has been an integral component of India's strategy to achieve food security at the national level.
Code of Federal Regulations, 2010 CFR
2010-07-01
... threat of an unlawful act against a vessel or terminal is, though possible, not likely. Security Level II... area, or against a type of vessel or terminal. Security Level III means the degree of security... that is a felony under U.S. federal law, under the laws of the States where the vessel is located, or...
DOT National Transportation Integrated Search
2012-05-16
This Communications Data Delivery System Analysis Task 2 report describes and analyzes options for Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communications data delivery systems using various communication media (Dedicated Short Ra...
Identifying pathways for improving household food self-sufficiency outcomes in the hills of Nepal
USDA-ARS?s Scientific Manuscript database
Maintaining and improving food security in mountain regions is an ongoing challenge. There are many facets to the problem, including comparatively high levels of system diversity and crop-livestock integration, challenging terrain and transportation bottlenecks, declining labor availability due to o...
Attachment anxiety benefits from security priming: Evidence from working memory performance
2018-01-01
The present study investigates the relationship between the attachment dimensions (anxious vs. avoidance) and the cognitive performance of individuals, specifically whether the attachment dimensions would predict the working memory (WM) performance. In the n-back task, reflecting the WM capacity, both attachment related and non-attachment related words were used. Participants were randomly assigned into two groups that received either the secure or the neutral subliminal priming. In the secure priming condition, the aim was to induce sense of security by presenting secure attachment words prior to the n-back task performance. In neutral priming condition, neutral words that did not elicit sense of security were presented. Structural equation modeling revealed divergent patterns for attachment anxiety and avoidance dimensions under the different priming conditions. In neutral priming condition, WM performance declined in terms of capacity in the n-back task for individuals who rated higher levels of attachment anxiety. However in the secure priming condition, WM performance was boosted in the n-back task for individuals who rated higher levels of attachment anxiety. In other words, the subliminal priming of the security led to increased WM capacity of individuals who rated higher levels of attachment anxiety. This effect, however, was not observed for higher levels of attachment avoidance. Results are discussed along the lines of hyperactivation and deactivation strategies of the attachment system. PMID:29522549
Secure videoconferencing equipment switching system and method
Hansen, Michael E [Livermore, CA
2009-01-13
A switching system and method are provided to facilitate use of videoconference facilities over a plurality of security levels. The system includes a switch coupled to a plurality of codecs and communication networks. Audio/Visual peripheral components are connected to the switch. The switch couples control and data signals between the Audio/Visual peripheral components and one but nor both of the plurality of codecs. The switch additionally couples communication networks of the appropriate security level to each of the codecs. In this manner, a videoconferencing facility is provided for use on both secure and non-secure networks.
ERIC Educational Resources Information Center
Barnes, Donald E.; And Others
Characteristics of the entry-level job market in lower Manhattan, or "Downtown," for new high school graduates were assessed. Questionnaire-guided interviews with representatives of principal industries and occupations were conducted within five major employment groups: banking, insurance, securities, communications and transportation,…
ERIC Educational Resources Information Center
Smith, Gwendolynn T.
2012-01-01
The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…
T2AR: trust-aware ad-hoc routing protocol for MANET.
Dhananjayan, Gayathri; Subbiah, Janakiraman
2016-01-01
Secure data transfer against the malicious attacks is an important issue in an infrastructure-less independent network called mobile ad-hoc network (MANET). Trust assurance between MANET nodes is the key parameter in the high-security provision under dynamic topology variations and open wireless constraints. But, the malicious behavior of nodes reduces the trust level of the nodes that leads to an insecure data delivery. The increase in malicious attacks causes the excessive energy consumption that leads to a reduction of network lifetime. The lack of positional information update of the nodes in ad-hoc on-demand vector (AODV) protocol during the connection establishment offers less trust level between the nodes. Hence, the trust rate computation using energy and mobility models and its update are the essential tasks for secure data delivery. This paper proposes a trust-aware ad-hoc routing (T2AR) protocol to improve the trust level between the nodes in MANET. The proposed method modifies the traditional AODV routing protocol with the constraints of trust rate, energy, mobility based malicious behavior prediction. The packet sequence ID matching from the log reports of neighbor nodes determine the trust rate that avoids the malicious report generation. Besides, the direct and indirect trust observation schemes utilization increases the trust level. Besides, the received signal strength indicator utilization determines the trusted node is within the communication range or not. The comparative analysis between the proposed T2AR with the existing methods such as TRUNCMAN, RBT, GR, FBR and DICOTIDS regarding the average end-to-end delay, throughput, false positives, packet delivery ratio shows the effectiveness of T2AR in the secure MANET environment design.
Bioterrorism versus radiological terrorism: notes from a bio/nuclear epidemiologist.
Goffman, Thomas E
2009-01-01
The antiterrorism and disaster planning communities often speak of the high potential for bioterrorism and possible potential for radioterrorism, specifically the explosion of a fission device on US soil. Information gained from an epidemiologist's work in the national and international scene, which inevitably involves Intel regarding the cultures and subcultures being studied, suggest that bioterrorism is far less likely to be a major threat, that has been over-emphasized at the state level due to warnings from Homeland Security, and that Homeland Security itself appears biased toward bioterrorism of late with very little available rational basis.
Assessment on security system of radioactive sources used in hospitals of Thailand
NASA Astrophysics Data System (ADS)
Jitbanjong, Petchara; Wongsawaeng, Doonyapong
2016-01-01
Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources used in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.
Hao, Shuxin; Lü, Yiran; Liu, Jie; Liu, Yue; Xu, Dongqun
2018-01-01
To study the application of classified protection of information security in the information system of air pollution and health impact monitoring, so as to solve the possible safety risk of the information system. According to the relevant national standards and requirements for the information system security classified protection, and the professional characteristics of the information system, to design and implement the security architecture of information system, also to determine the protection level of information system. Basic security measures for the information system were developed in the technical safety and management safety aspects according to the protection levels, which effectively prevented the security risk of the information system. The information system established relatively complete information security protection measures, to enhanced the security of professional information and system service, and to ensure the safety of air pollution and health impact monitoring project carried out smoothly.
ERIC Educational Resources Information Center
Cabrera, Alberto F.; Burkum, Kurt R.; La Nasa, Steven M.
The High School Sophomore Cohort of 1980 followed nine different pathways to a 4-year college degree. These paths were formed by a combination of different levels of academic preparation secured in high school and the first type of postsecondary institution attended. The pathway most likely to lead to a 4-year degree is one defined by acquiring…
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security. 8.7 Section 8.7 Foreign Relations DEPARTMENT OF STATE GENERAL ADVISORY COMMITTEE MANAGEMENT § 8.7 Security. (a) All officers and members of a committee must have a security clearance for the subject matter level of security at which the committee...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security. 8.7 Section 8.7 Foreign Relations DEPARTMENT OF STATE GENERAL ADVISORY COMMITTEE MANAGEMENT § 8.7 Security. (a) All officers and members of a committee must have a security clearance for the subject matter level of security at which the committee...
Dudarev, Alexey A.; Dushkina, Eugenia V.; Sladkova, Yuliya N.; Alloyarov, Pavel R.; Chupakhin, Valery S.; Dorofeyev, Vitaliy M.; Kolesnikova, Tatjana A.; Fridman, Kirill B.; Evengard, Birgitta; Nilsson, Lena M.
2013-01-01
Background Poor state of water supply systems, shortage of water purification facilities and disinfection systems, low quality of drinking water generally in Russia and particularly in the regions of the Russian Arctic, Siberia and Far East have been defined in the literature. However, no standard protocol of water security assessment has been used in the majority of studies. Study design and methods Uniform water security indicators collected from Russian official statistical sources for the period 2000–2011 were used for comparison for 18 selected regions in the Russian Arctic, Siberia and Far East. The following indicators of water security were analyzed: water consumption, chemical and biological contamination of water reservoirs of Categories I and II of water sources (centralized – underground and surface, and non-centralized) and of drinking water. Results Water consumption in selected regions fluctuated from 125 to 340 L/person/day. Centralized water sources (both underground and surface sources) are highly contaminated by chemicals (up to 40–80%) and biological agents (up to 55% in some regions), mainly due to surface water sources. Underground water sources show relatively low levels of biological contamination, while chemical contamination is high due to additional water contamination during water treatment and transportation in pipelines. Non-centralized water sources are highly contaminated (both chemically and biologically) in 32–90% of samples analyzed. Very high levels of chemical contamination of drinking water (up to 51%) were detected in many regions, mainly in the north-western part of the Russian Arctic. Biological contamination of drinking water was generally much lower (2.5–12%) everywhere except Evenki AO (27%), and general and thermotolerant coliform bacteria predominated in drinking water samples from all regions (up to 17.5 and 12.5%, correspondingly). The presence of other agents was much lower: Coliphages – 0.2–2.7%, Clostridia spores, Giardia cysts, pathogenic bacteria, Rotavirus – up to 0.8%. Of a total of 56 chemical pollutants analyzed in water samples from centralized water supply systems, 32 pollutants were found to be in excess of hygienic limits, with the predominant pollutants being Fe (up to 55%), Cl (up to 57%), Al (up to 43%) and Mn (up to 45%). Conclusion In 18 selected regions of the Russian Arctic, Siberia and Far East Category I and II water reservoirs, water sources (centralized – underground, surface; non-centralized) and drinking water are highly contaminated by chemical and biological agents. Full-scale reform of the Russian water industry and water security system is urgently needed, especially in selected regions. PMID:24350065
Comparative inter-institutional study of stress among dentists.
Pozos-Radillo, Blanca E; Galván-Ramírez, Ma Luz; Pando, Manuel; Carrión, Ma De los Angeles; González, Guillermo J
2010-01-01
Dentistry is considered to be a stressful profession due to different factors caused by work, representing a threat to dentists'health. The objectives of this work were to identify and compare chronic stress in dentists among the different health institutions and the association of stress with risk factors. The study in question is observational, transversal and comparative; 256 dentists were included, distributed among five public health institutions in the city of Guadalajara, Jalisco, Mexico, namely: the Mexican Institute of Social Security (IMSS), the Ministry of Health (SS), the Integral Development of the Family (DIF), the Social Security Services Institute for the Workers (ISSSTE) and the University of Guadalajara (U. de G) Data were obtained by means of the census technique. Stress was identified using the Stress Symptoms Inventory and the statistical analysis was performed using the Odds Ratio (O.R.) and the chi-square statistic. From the total population studied, 219 subjects presented high levels of chronic stress and 37, low levels. In the results of comparative analysis, significant differences were found between IMSS and U. de G and likewise between IMSS and SS. However, in the analysis of association, only U. de G was found to be associated with the high level of chronic stress.
Henriksen, Eva; Burkow, Tatjana M; Johnsen, Elin; Vognild, Lars K
2013-08-09
Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient's TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO's standard for information security risk management. A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy.
Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue
2016-01-01
Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.
Predictors of Attachment Security in Preschool Children from Intact and Divorced Families
ERIC Educational Resources Information Center
Nair, Hira; Murray, Ann D.
2005-01-01
The authors selected 58 mother-child dyads from divorced and intact families to participate in a study on the impact of divorce on preschoolers' attachment security. The authors explored pathways that lead to security of attachment. They found that mothers from divorced families were younger, had lower income levels, and had lower levels of…
Code of Federal Regulations, 2010 CFR
2010-04-01
... information regarding a social security leveling optional form of benefit) is needed to make that... (plus any social security supplements described in the last sentence of section 411(a)(9) payable to the... rule for forms which include social security leveling or a refund of employee contributions. For an...
A Graph Oriented Approach for Network Forensic Analysis
ERIC Educational Resources Information Center
Wang, Wei
2010-01-01
Network forensic analysis is a process that analyzes intrusion evidence captured from networked environment to identify suspicious entities and stepwise actions in an attack scenario. Unfortunately, the overwhelming amount and low quality of output from security sensors make it difficult for analysts to obtain a succinct high-level view of complex…
Higher Education Administrators Roles in Fortification of Information Security Program
ERIC Educational Resources Information Center
Eyadat, Mohammad S.
2015-01-01
Information systems produce significant benefits to organizations. Therefore, organizations invest tremendous amount of money and time to obtain and manage information in order to maintain a high level of performance and to remain competitive. There are many factors that can impact the organizational information management and performance. One of…
Experiences of restrictiveness in forensic psychiatric care: Systematic review and concept analysis.
Tomlin, Jack; Bartlett, Peter; Völlm, Birgit
Mentally disordered offenders may be sent to secure psychiatric hospitals. These settings can resemble carceral spaces, employing high levels of security restricting resident autonomy, expression and social interaction. However, research exploring the restrictiveness of forensic settings is sparse. A systematic review was therefore undertaken to conceptualize this restrictiveness. Eight databases were searched for papers that address restrictive elements of secure forensic care in a non-cursory way. Fifty sources (empirical articles and policy documents) were included and subject to thematic analysis to identify 1) antecedent conditions to, 2) characteristic attributes, 3) consequences and 4) 'deviant' cases of the developing concept. The restrictiveness of forensic care was experienced across three levels: individual, institutional and systemic. Restrictiveness was subjective and included such disparate elements as limited leave and grounds access, ownership of personal belongings and staff attitudes. The manner and extent to which these are experienced as restrictive was influenced by two antecedent conditions; whether the purpose of forensic care was to be more caring or custodial and the extent to which residents were perceived to be risky. We argue that there must be a reflexivity from stakeholders between the level of restrictiveness needed to safely provide care in a therapeutic milieu and enable the maximum amount of resident autonomy. Copyright © 2018 Elsevier Ltd. All rights reserved.
Castedo, Luis
2017-01-01
Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to 50% and a data throughput that doubles RSA in most scenarios. These conclusions are then corroborated by a frame temporal analysis of Ethernet packets. In addition, current data compression algorithms are evaluated, concluding that, when dealing with the small payloads related to IoT applications, they do not pay off in terms of real data throughput and power consumption. PMID:28850104
Suárez-Albela, Manuel; Fernández-Caramés, Tiago M; Fraga-Lamas, Paula; Castedo, Luis
2017-08-29
Fog computing extends cloud computing to the edge of a network enabling new Internet of Things (IoT) applications and services, which may involve critical data that require privacy and security. In an IoT fog computing system, three elements can be distinguished: IoT nodes that collect data, the cloud, and interconnected IoT gateways that exchange messages with the IoT nodes and with the cloud. This article focuses on securing IoT gateways, which are assumed to be constrained in terms of computational resources, but that are able to offload some processing from the cloud and to reduce the latency in the responses to the IoT nodes. However, it is usually taken for granted that IoT gateways have direct access to the electrical grid, which is not always the case: in mission-critical applications like natural disaster relief or environmental monitoring, it is common to deploy IoT nodes and gateways in large areas where electricity comes from solar or wind energy that charge the batteries that power every device. In this article, how to secure IoT gateway communications while minimizing power consumption is analyzed. The throughput and power consumption of Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are considered, since they are really popular, but have not been thoroughly analyzed when applied to IoT scenarios. Moreover, the most widespread Transport Layer Security (TLS) cipher suites use RSA as the main public key-exchange algorithm, but the key sizes needed are not practical for most IoT devices and cannot be scaled to high security levels. In contrast, ECC represents a much lighter and scalable alternative. Thus, RSA and ECC are compared for equivalent security levels, and power consumption and data throughput are measured using a testbed of IoT gateways. The measurements obtained indicate that, in the specific fog computing scenario proposed, ECC is clearly a much better alternative than RSA, obtaining energy consumption reductions of up to 50% and a data throughput that doubles RSA in most scenarios. These conclusions are then corroborated by a frame temporal analysis of Ethernet packets. In addition, current data compression algorithms are evaluated, concluding that, when dealing with the small payloads related to IoT applications, they do not pay off in terms of real data throughput and power consumption.
Water security for productive economies: Applying an assessment framework in southern Africa
NASA Astrophysics Data System (ADS)
Holmatov, Bunyod; Lautze, Jonathan; Manthrithilake, Herath; Makin, Ian
2017-08-01
Achieving water security has emerged as a major objective in Africa, yet an analytical or diagnostic framework for assessing water security in African countries is not known to exist. This paper applies one key dimension of the 2016 Asian Development Bank's (ADB) Asian Water Development Outlook (AWDO) to assess levels of water security for productive economies in countries of the Southern African Development Community (SADC). Economic aspects of water security cover four areas: economic activities in the broad sense, agriculture, electricity, and industry. Water security in each area is measured through application of a set of indicators; results of indicator application are then aggregated to determine economic water security at a country-level. Results show that economic water security in SADC is greatest in the Seychelles and South Africa, and lowest in Madagascar and Malawi. Opportunities for strengthening economic water security in the majority of SADC countries exist through improving agricultural water productivity, strengthening resilience, and expanding sustainable electricity generation. More profoundly, this paper suggests that there is clear potential and utility in applying approaches used elsewhere to assess economic water security in southern Africa.
Proof of cipher text ownership based on convergence encryption
NASA Astrophysics Data System (ADS)
Zhong, Weiwei; Liu, Zhusong
2017-08-01
Cloud storage systems save disk space and bandwidth through deduplication technology, but with the use of this technology has been targeted security attacks: the attacker can get the original file just use hash value to deceive the server to obtain the file ownership. In order to solve the above security problems and the different security requirements of cloud storage system files, an efficient information theory security proof of ownership scheme is proposed. This scheme protects the data through the convergence encryption method, and uses the improved block-level proof of ownership scheme, and can carry out block-level client deduplication to achieve efficient and secure cloud storage deduplication scheme.
Insider Threat Security Reference Architecture
2012-04-01
this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture
New color-shifting security devices
NASA Astrophysics Data System (ADS)
Moia, Franco
2004-06-01
The unbroken global increase of forgery and counterfeiting of valuable documents and products steadily requires improved types of optical security devices. Hence, the "security world" is actively seeking for new features which meet high security standards, look attractively and allow easy recognition. One special smart security device created by ROLIC's technology represents a cholesteric device combined with a phase image. On tilting, such devices reveal strong color shifts which are clearly visible to the naked eye. The additional latent image is invisible under normal lighting conditions but can be revealed to human eyes by means of a simple, commercially available linear sheet polarizer. Based on our earlier work, first published in 1981, we now have developed phase change guest-host devices combined with dye-doped cholesteric material for application in new security features. ROLIC has developed sophisticated material systems of cross-linkable cholesteric liquid crystals and suitable cross-linkable dyes which allow to create outstanding cholesteric color-shifting effects not only on light absorbing dark backgrounds but also on bright or even white backgrounds preserving the circularly polarizing state. The new security devices combine unambiguously 1st and 2nd level inspection features and show brilliant colors on black as well as on white substrates. On tilting, the security devices exhibit remarkable color shifts while the integrated hidden images can be revealed by use of a sheet polarizer. Furthermore, due to its very thin material layers, even demanding applications, such as on banknotes can be considered.
[Food availability according to food security-insecurity among Mexican households].
Valencia-Valero, Reyna Guadalupe; Ortiz-Hernández, Luis
2014-04-01
To know the differences in food availability according to food insecurity level among the Mexican households. We analyzed the database of the National Survey of Household's Incomes and Expenditures (n=27 445 households). Households were classified according to the Latin American and Caribbean Inventory of Food Security. The availability of each food group was estimated as grams per day per equivalent adult. 50.0% of Mexican households experienced some degree of food insecurity. Among households with food insecurity there was high availability of corn, wheat, egg, and sugars; but there was low availability of fresh fruits and vegetables, lean meat, poultry, seafood, milk, cheeses, and sweetened beverages. Although in households with food insecurity there is lower availability of most food groups (both with high nutrient density and with high energy density); they have higher availability of cheap foods, which in some cases are only source of energy but do not provide nutrients.
Practical device-independent quantum cryptography via entropy accumulation.
Arnon-Friedman, Rotem; Dupuis, Frédéric; Fawzi, Omar; Renner, Renato; Vidick, Thomas
2018-01-31
Device-independent cryptography goes beyond conventional quantum cryptography by providing security that holds independently of the quality of the underlying physical devices. Device-independent protocols are based on the quantum phenomena of non-locality and the violation of Bell inequalities. This high level of security could so far only be established under conditions which are not achievable experimentally. Here we present a property of entropy, termed "entropy accumulation", which asserts that the total amount of entropy of a large system is the sum of its parts. We use this property to prove the security of cryptographic protocols, including device-independent quantum key distribution, while achieving essentially optimal parameters. Recent experimental progress, which enabled loophole-free Bell tests, suggests that the achieved parameters are technologically accessible. Our work hence provides the theoretical groundwork for experimental demonstrations of device-independent cryptography.
Simulation Data Management - Requirements and Design Specification
DOE Office of Scientific and Technical Information (OSTI.GOV)
Clay, Robert L.; Friedman-Hill, Ernest J.; Gibson, Marcus J.
Simulation Data Management (SDM), the ability to securely organize, archive, and share analysis models and the artifacts used to create them, is a fundamental requirement for modern engineering analysis based on computational simulation. We have worked separately to provide secure, network SDM services to engineers and scientists at our respective laboratories for over a decade. We propose to leverage our experience and lessons learned to help develop and deploy a next-generation SDM service as part of a multi-laboratory team. This service will be portable across multiple sites and platforms, and will be accessible via a range of command-line tools andmore » well-documented APIs. In this document, we’ll review our high-level and low-level requirements for such a system, review one existing system, and briefly discuss our proposed implementation.« less
DNA based random key generation and management for OTP encryption.
Zhang, Yunpeng; Liu, Xin; Sun, Manhui
2017-09-01
One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.
NASA Astrophysics Data System (ADS)
Rangga, K. K.; Syarief, Y. A.
2018-03-01
The objectives of this study are to study the participation of paddy farmers in the Special Effort program to increase paddy production, to study the level of household food security of paddy farmers, and to analyze the correlation between farmer participation and food security level of paddy farmers. The location was chosen purposively in Seputih Raman sub-district. The data were collected from December 2016 to February 2017. The population of this study was paddy farmers who participating in Special Effort program. The hypothesis was tested by using Spearman’s Rank correlation test. Farmer household’s food security was measured objectively based on the share of household’s food expenditure and subjectively based on the opinion, views, and attitudes or farmers’ opinions on food availability, food distribution, and household food consumption. This research showed that farmers’ participation in Special Effort program in Seputih Raman Sub Ditrict, Central Lampung Regency belonged to medium classification, household food security either objectively or subjectively was in food resistant condition of medium classification, and there was significant correlation between farmers’ participation and food security level of paddy farmer household.
NASA Astrophysics Data System (ADS)
Schutte, Klamer; Burghouts, Gertjan; van der Stap, Nanda; Westerwoudt, Victor; Bouma, Henri; Kruithof, Maarten; Baan, Jan; ten Hove, Johan-Martijn
2016-10-01
The bottleneck in situation awareness is no longer in the sensing domain but rather in the data interpretation domain, since the number of sensors is rapidly increasing and it is not affordable to increase human data-analysis capacity at the same rate. Automatic image analysis can assist a human analyst by alerting when an event of interest occurs. However, common state-of-the-art image recognition systems learn representations in high-dimensional feature spaces, which makes them less suitable to generate a user-comprehensive message. Such data-driven approaches rely on large amounts of training data, which is often not available for quite rare but high-impact incidents in the security domain. The key contribution of this paper is that we present a novel real-time system for image understanding based on generic instantaneous low-level processing components (symbols) and flexible user-definable and user-understandable combinations of these components (sentences) at a higher level for the recognition of specific relevant events in the security domain. We show that the detection of an event of interest can be enhanced by utilizing recognition of multiple short-term preparatory actions.
Impacts of fishing low-trophic level species on marine ecosystems.
Smith, Anthony D M; Brown, Christopher J; Bulman, Catherine M; Fulton, Elizabeth A; Johnson, Penny; Kaplan, Isaac C; Lozano-Montes, Hector; Mackinson, Steven; Marzloff, Martin; Shannon, Lynne J; Shin, Yunne-Jai; Tam, Jorge
2011-08-26
Low-trophic level species account for more than 30% of global fisheries production and contribute substantially to global food security. We used a range of ecosystem models to explore the effects of fishing low-trophic level species on marine ecosystems, including marine mammals and seabirds, and on other commercially important species. In five well-studied ecosystems, we found that fishing these species at conventional maximum sustainable yield (MSY) levels can have large impacts on other parts of the ecosystem, particularly when they constitute a high proportion of the biomass in the ecosystem or are highly connected in the food web. Halving exploitation rates would result in much lower impacts on marine ecosystems while still achieving 80% of MSY.
Perception of Human-Derived Risk Influences Choice at Top of the Food Chain
Cristescu, Bogdan; Stenhouse, Gordon B.; Boyce, Mark S.
2013-01-01
On human-used landscapes, animal behavior is a trade-off between maximizing fitness and minimizing human-derived risk. Understanding risk perception in wildlife can allow mitigation of anthropogenic risk, with benefits to long-term animal fitness. Areas where animals choose to rest should minimize risk from predators, which for large carnivores typically equate to humans. We hypothesize that high human activity leads to selection for habitat security, whereas low activity enables trading security for forage. We investigated selection of resting (bedding) sites by GPS radiocollared adult grizzly bears (n = 10) in a low density population on a multiple-use landscape in Canada. We compared security and foods at resting and random locations while accounting for land use, season, and time of day. On reclaimed mines with low human access, bears selected high horizontal cover far from trails, but did not avoid open (herbaceous) areas, resting primarily at night. In protected areas bears also bedded at night, in areas with berry shrubs and Hedysarum spp., with horizontal cover selected in the summer, during high human access. On public lands with substantial human recreation, bears bedded at day, selected resting sites with high horizontal cover in the summer and habitat edges, with bedding associated with herbaceous foods. These spatial and temporal patterns of selection suggest that bears perceive human-related risk differentially in relation to human activity level, season and time of day, and employ a security-food trade-off strategy. Although grizzly bears are presently not hunted in Alberta, their perceived risks associated with humans influence resting-site selection. PMID:24367549
Shah, Ajit
2006-04-01
The elderly prison population is increasing and there is a significant amount of unidentified psychiatric morbidity among elderly prisoners. A sizeable number of elderly subjects are referred to regional forensic units. These units are able to provide advice but are reluctant to admit frail, physically ill and vulnerable elderly into their unit because the ward environment is considered inappropriate for them. A sizeable number of inpatients in medium and high secure units are elderly. This paper is an exploratory audit of referrals from a medium and high secure forensic psychiatry unit to a specialist consultation-only liaison old age psychiatry service, which was specifically developed to service the forensic unit. The demographic and clinical characteristics of the patients seen by this specialist service were similar to elderly inpatients in medium and high secure units. All referrals were judged to be appropriate and new management advice was provided in all cases. Main reasons for referral included diagnostic advice, placement advice and treatment advice. Establishing a diagnosis of dementia was considered important because Alzheimer's disease and Lewy body dementia can be treated with cholinesterase inhibitors. Placement advice was the most difficult to provide because of paucity of residential and nursing homes able and willing to accept patients with a forensic history. There is a need for a comprehensive model of specialist forensic old age psychiatry service at a regional or supraregional level. A consensus needs to be reached on the exact configuration of such a service.
Assessment on security system of radioactive sources used in hospitals of Thailand
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jitbanjong, Petchara, E-mail: petcharajit@gmail.com; Wongsawaeng, Doonyapong
Unsecured radioactive sources have caused deaths and serious injuries in many parts of the world. In Thailand, there are 17 hospitals that use teletherapy with cobalt-60 radioactive sources. They need to be secured in order to prevent unauthorized removal, sabotage and terrorists from using such materials in a radiological weapon. The security system of radioactive sources in Thailand is regulated by the Office of Atoms for Peace in compliance with Global Threat Reduction Initiative (GTRI), U.S. DOE, which has started to be implemented since 2010. This study aims to perform an assessment on the security system of radioactive sources usedmore » in hospitals in Thailand and the results can be used as a recommended baseline data for development or improvement of hospitals on the security system of a radioactive source at a national regulatory level and policy level. Results from questionnaires reveal that in 11 out of 17 hospitals (64.70%), there were a few differences in conditions of hospitals using radioactive sources with installation of the security system and those without installation of the security system. Also, personals working with radioactive sources did not clearly understand the nuclear security law. Thus, government organizations should be encouraged to arrange trainings on nuclear security to increase the level of understanding. In the future, it is recommended that the responsible government organization issues a minimum requirement of nuclear security for every medical facility using radioactive sources.« less
Analysis of information security management systems at 5 domestic hospitals with more than 500 beds.
Park, Woo-Sung; Seo, Sun-Won; Son, Seung-Sik; Lee, Mee-Jeong; Kim, Shin-Hyo; Choi, Eun-Mi; Bang, Ji-Eon; Kim, Yea-Eun; Kim, Ok-Nam
2010-06-01
The information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on information security and security countermeasures which meet both international standards and the needs of individual hospitals. The ISMS check-list derived from international/domestic standards was distributed to each hospital to complete and the staff of each hospital was interviewed. Information Security Indicator and Information Security Values were used to estimate the present security levels and evaluate the application of each hospital's current system. With regard to the moderate clause of the ISMS, the hospitals were determined to be in compliance. The most vulnerable clause was asset management, in particular, information asset classification guidelines. The clauses of information security incident management and business continuity management were deemed necessary for the establishment of successful ISMS. The level of current ISMS in the hospitals evaluated was determined to be insufficient. Establishment of adequate ISMS is necessary to ensure patient privacy and the safe use of medical records for various purposes. Implementation of ISMS which meet international standards with a long-term and comprehensive perspective is of prime importance. To reflect the requirements of the varied interests of medical staff, consumers, and institutions, the establishment of political support is essential to create suitable hospital ISMS.
NASA Astrophysics Data System (ADS)
Varlataya, S. K.; Evdokimov, V. E.; Urzov, A. Y.
2017-11-01
This article describes a process of calculating a certain complex information security system (CISS) reliability using the example of the technospheric security management model as well as ability to determine the frequency of its maintenance using the system reliability parameter which allows one to assess man-made risks and to forecast natural and man-made emergencies. The relevance of this article is explained by the fact the CISS reliability is closely related to information security (IS) risks. Since reliability (or resiliency) is a probabilistic characteristic of the system showing the possibility of its failure (and as a consequence - threats to the protected information assets emergence), it is seen as a component of the overall IS risk in the system. As it is known, there is a certain acceptable level of IS risk assigned by experts for a particular information system; in case of reliability being a risk-forming factor maintaining an acceptable risk level should be carried out by the routine analysis of the condition of CISS and its elements and their timely service. The article presents a reliability parameter calculation for the CISS with a mixed type of element connection, a formula of the dynamics of such system reliability is written. The chart of CISS reliability change is a S-shaped curve which can be divided into 3 periods: almost invariable high level of reliability, uniform reliability reduction, almost invariable low level of reliability. Setting the minimum acceptable level of reliability, the graph (or formula) can be used to determine the period of time during which the system would meet requirements. Ideally, this period should not be longer than the first period of the graph. Thus, the proposed method of calculating the CISS maintenance frequency helps to solve a voluminous and critical task of the information assets risk management.
Davoren, Mary; O'Dwyer, Sarah; Abidin, Zareena; Naughton, Leena; Gibbons, Olivia; Doyle, Elaine; McDonnell, Kim; Monks, Stephen; Kennedy, Harry G
2012-07-13
We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Clinicians appear to decide moves based on combinations of current and imminent (dynamic) risk measured by HCR-20 dynamic score and historical seriousness of risk as measured by need for therapeutic security (DUNDRUM-1) in keeping with Scott's formulation of risk and seriousness. The DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales have utility as dynamic measures that can off-set perceived 'dangerousness'.
2012-01-01
Background We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. Methods This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. Results There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Conclusions Clinicians appear to decide moves based on combinations of current and imminent (dynamic) risk measured by HCR-20 dynamic score and historical seriousness of risk as measured by need for therapeutic security (DUNDRUM-1) in keeping with Scott's formulation of risk and seriousness. The DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales have utility as dynamic measures that can off-set perceived 'dangerousness'. PMID:22794187
Security Management in a Multimedia System
ERIC Educational Resources Information Center
Rednic, Emanuil; Toma, Andrei
2009-01-01
In database security, the issue of providing a level of security for multimedia information is getting more and more known. For the moment the security of multimedia information is done through the security of the database itself, in the same way, for all classic and multimedia records. So what is the reason for the creation of a security…
Perceived Security Determinants in E-Commerce among Turkish University Students
ERIC Educational Resources Information Center
Yenisey, M.M.; Ozok, A.A.; Salvendy, G.
2005-01-01
Perceived security is defined as the level of security that users feel while they are shopping on e-commerce sites. The aims of this study were to determine items that positively influence this feeling of security by users during shopping, and to develop guidelines for perceived security in e-commerce. An experiment allowed users with different…
Video calls from lay bystanders to dispatch centers - risk assessment of information security.
Bolle, Stein R; Hasvold, Per; Henriksen, Eva
2011-09-30
Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers.
Video calls from lay bystanders to dispatch centers - risk assessment of information security
2011-01-01
Background Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Methods Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Results Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Conclusions Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers. PMID:21958387
Navigation Ground Data System Engineering for the Cassini/Huygens Mission
NASA Technical Reports Server (NTRS)
Beswick, R. M.; Antreasian, P. G.; Gillam, S. D.; Hahn, Y.; Roth, D. C.; Jones, J. B.
2008-01-01
The launch of the Cassini/Huygens mission on October 15, 1997, began a seven year journey across the solar system that culminated in the entry of the spacecraft into Saturnian orbit on June 30, 2004. Cassini/Huygens Spacecraft Navigation is the result of a complex interplay between several teams within the Cassini Project, performed on the Ground Data System. The work of Spacecraft Navigation involves rigorous requirements for accuracy and completeness carried out often under uncompromising critical time pressures. To support the Navigation function, a fault-tolerant, high-reliability/high-availability computational environment was necessary to support data processing. Configuration Management (CM) was integrated with fault tolerant design and security engineering, according to the cornerstone principles of Confidentiality, Integrity, and Availability. Integrated with this approach are security benchmarks and validation to meet strict confidence levels. In addition, similar approaches to CM were applied in consideration of the staffing and training of the system administration team supporting this effort. As a result, the current configuration of this computational environment incorporates a secure, modular system, that provides for almost no downtime during tour operations.
SLIGHTLY IRRADIATED FUEL (SIF) INTERIM DISPOSITION PROJECT
DOE Office of Scientific and Technical Information (OSTI.GOV)
NORTON SH
2010-02-23
CH2M HILL Plateau Remediation Company (CH2M HILL PRC) is proud to submit the Slightly Irradiated Fuel (SIF) Interim Disposition Project for consideration by the Project Management Institute as Project of the Year for 2010. The SIF Project was a set of six interrelated sub-projects that delivered unique stand-alone outcomes, which, when integrated, provided a comprehensive and compliant system for storing high risk special nuclear materials. The scope of the six sub-projects included the design, construction, testing, and turnover of the facilities and equipment, which would provide safe, secure, and compliant Special Nuclear Material (SNM) storage capabilities for the SIF material.more » The project encompassed a broad range of activities, including the following: Five buildings/structures removed, relocated, or built; Two buildings renovated; Structural barriers, fencing, and heavy gates installed; New roadways and parking lots built; Multiple detection and assessment systems installed; New and expanded communication systems developed; Multimedia recording devices added; and A new control room to monitor all materials and systems built. Project challenges were numerous and included the following: An aggressive 17-month schedule to support the high-profile Plutonium Finishing Plant (PFP) decommissioning; Company/contractor changeovers that affected each and every project team member; Project requirements that continually evolved during design and construction due to the performance- and outcome-based nature ofthe security objectives; and Restrictions imposed on all communications due to the sensitive nature of the projects In spite of the significant challenges, the project was delivered on schedule and $2 million under budget, which became a special source of pride that bonded the team. For years, the SIF had been stored at the central Hanford PFP. Because of the weapons-grade piutonium produced and stored there, the PFP had some of the tightest security on the Hanford nuclear reservation. Workers had to pass through metal detectors when they arrived at the plant and materials leaving the plant had to be scanned for security reasons. Whereas other high-security nuclear materials were shipped from the PFP to Savannah River, S.C. as part ofa Department of Energy (DOE) program to consolidate weapons-grade plutonium, it was determined that the SIF should remain onsite pending disposition to a national repository. Nevertheless, the SIF still requires a high level of security that the PFP complex has always provided. With the 60-year PFP mission of producing and storing plutonium concluded, the environmental cleanup plans for Hanford call for the demolition of the 63-building PFP complex. Consequently, if the SIF remained at PFP it not only would have interfered with the environmental cleanup plans, but would have required $100 million in facility upgrades to meet increased national security requirements imposed after the 9/11 terrorist attacks. A new smaller and more cost-effective area was needed to store this material, which led to the SIF Project. Once the SIF project was successfully completed and the SIF was safely removed from PFP, the existing Protected Area at PFP could be removed, and demolition could proceed more quickly without being encumbered by restrictive security requirements that an active Protected Area requires. The lightened PFP security level brought by safely removing and storing the SIF would also yield lowered costs for deactivation and demolition, as well as reduce overall life-cycle costs.« less
An analysis of Indonesia’s information security index: a case study in a public university
NASA Astrophysics Data System (ADS)
Yustanti, W.; Qoiriah, A.; Bisma, R.; Prihanto, A.
2018-01-01
Ministry of Communication and Informatics of the Republic of Indonesia has issued the regulation number 4-2016 about Information Security Management System (ISMS) for all kind organizations. Public university as a government institution must apply this standard to assure its level of information security has complied ISO 27001:2013. This research is a preliminary study to evaluate the readiness of university IT services (case study in a public university) meets the requirement of ISO 27001:2013 using the Indonesia’s Information Security Index (IISI). There are six parameters used to measure the level of information security, these are the ICT role, governance, risk management, framework, asset management and technology. Each parameter consists of serial questions which must be answered and convert to a numeric value. The result shows the level of readiness and maturity to apply ISO 27001 standard.
17 CFR 15.04 - Reportable trading volume level.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Reportable trading volume level. 15.04 Section 15.04 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REPORTS-GENERAL PROVISIONS § 15.04 Reportable trading volume level. The volume quantity for the purpose of...
Ray-Bennett, Nibedita S; Collins, Andrew; Bhuiya, Abbas; Edgeworth, Ross; Nahar, Papreen; Alamgir, Fariba
2010-05-01
There has been significant interest in the rhetoric of health security in recent years from both global and local perspectives. Understanding health in the context of disaster vulnerability presents an opportunity to examine how improved health might reduce the effects of environmental disasters and other crises. To this end, a project was implemented in Bangladesh to establish the potential of a health security approach for disaster resilience amongst people living in high risk environments. This paper explores what we might mean by health security through engaging community level perspectives in the southeast coastal belt of Bangladesh, an area prone to cyclone and flood. This has been examined with respect to variation in gender and wealth of households. Household surveys, interviews and focus group discussions were some of the methods used to collect data. The findings show that health related coping strategies and agentive capabilities in the context of impending crises vary from one micro-context to the next. This suggests a dynamic and integrative resilience that could be built on further, but one which remains remote from wider discourses on health security. Copyright 2010 Elsevier Ltd. All rights reserved.
Slater, Alexander; Bennett, Daniel M; Vojt, Gabriele; Thomson, Lindsay
2016-07-01
The Mental Health (Care and Treatment) (Scotland) Act 2003 introduced the right for patients in high-security psychiatric care to appeal against detention in conditions of excessive security. A previous study examined the first 100 patients to appeal under this provision. In this study we compare them with the next cohort of 110 patients to lodge an appeal, finding, contrary to expectations, no change in patient characteristics or the outcome of their appeals. The clinical, legal and demographic features of successful and unsuccessful appellants, who made up 38% and 27% of the 110 patients, respectively, were also compared. Those patients with the support of their responsible medical officer and those already included on a transfer list had a significantly better chance of success (p = 0.00). It was also found that a history of excessive alcohol consumption was associated with successful appeals (p = 0.002). A diagnosis of learning disability was associated with unsuccessful appeals (p = 0.018), though the sub-sample was very small. These findings are important given the forthcoming extension of this right of appeal to other levels of security. © The Author(s) 2015.
NASA Astrophysics Data System (ADS)
Haneda, Kiyofumi; Kajima, Toshio; Koyama, Tadashi; Muranaka, Hiroyuki; Dojo, Hirofumi; Aratani, Yasuhiko
2002-05-01
The target of our study is to analyze the level of necessary security requirements, to search for suitable security measures and to optimize security distribution to every portion of the medical practice. Quantitative expression must be introduced to our study, if possible, to enable simplified follow-up security procedures and easy evaluation of security outcomes or results. Using fault tree analysis (FTA), system analysis showed that system elements subdivided into groups by details result in a much more accurate analysis. Such subdivided composition factors greatly depend on behavior of staff, interactive terminal devices, kinds of services provided, and network routes. Security measures were then implemented based on the analysis results. In conclusion, we identified the methods needed to determine the required level of security and proposed security measures for each medical information system, and the basic events and combinations of events that comprise the threat composition factors. Methods for identifying suitable security measures were found and implemented. Risk factors for each basic event, a number of elements for each composition factor, and potential security measures were found. Methods to optimize the security measures for each medical information system were proposed, developing the most efficient distribution of risk factors for basic events.
Dudarev, Alexey A; Alloyarov, Pavel R; Chupakhin, Valery S; Dushkina, Eugenia V; Sladkova, Yuliya N; Dorofeyev, Vitaliy M; Kolesnikova, Tatijana A; Fridman, Kirill B; Nilsson, Lena Maria; Evengård, Birgitta
2013-01-01
Problems related to food security in Russian Arctic (dietary imbalance, predominance of carbohydrates, shortage of milk products, vegetables and fruits, deficit of vitamins and microelements, chemical, infectious and parasitic food contamination) have been defined in the literature. But no standard protocol of food security assessment has been used in the majority of studies. Our aim was to obtain food security indicators, identified within an Arctic collaboration, for selected regions of the Russian Arctic, Siberia and the Far East, and to compare food safety in these territories. In 18 regions of the Russian Arctic, Siberia and the Far East, the following indicators of food security were analyzed: food costs, food consumption, and chemical and biological food contamination for the period 2000-2011. Food costs in the regions are high, comprising 23-43% of household income. Only 4 out of 10 food groups (fish products, cereals, sugar, plant oil) are consumed in sufficient amounts. The consumption of milk products, eggs, vegetables, potatoes, fruits (and berries) is severely low in a majority of the selected regions. There are high levels of biological contamination of food in many regions. The biological and chemical contamination situation is alarming, especially in Chukotka. Only 7 food pollutants are under regular control; among pesticides, only DDT. Evenki AO and Magadan Oblast have reached peak values in food contaminants compared with other regions. Mercury in local fish has not been analyzed in the majority of the regions. In 3 regions, no monitoring of DDT occurs. Aflatoxins have not been analyzed in 5 regions. Nitrates had the highest percentage in excess of the hygienic threshold in all regions. Excesses of other pollutants in different regions were episodic and as a rule not high. Improvement of the food supply and food accessibility in the regions of the Russian Arctic, Siberia and the Far East is of utmost importance. Both quantitative and qualitative control of chemical and biological contaminants in food is insufficient and demands radical enhancement aimed at improving food security.
Dudarev, Alexey A.; Alloyarov, Pavel R.; Chupakhin, Valery S.; Dushkina, Eugenia V.; Sladkova, Yuliya N.; Dorofeyev, Vitaliy M.; Kolesnikova, Tatijana A.; Fridman, Kirill B.; Nilsson, Lena Maria; Evengård, Birgitta
2013-01-01
Background Problems related to food security in Russian Arctic (dietary imbalance, predominance of carbohydrates, shortage of milk products, vegetables and fruits, deficit of vitamins and microelements, chemical, infectious and parasitic food contamination) have been defined in the literature. But no standard protocol of food security assessment has been used in the majority of studies. Objectives Our aim was to obtain food security indicators, identified within an Arctic collaboration, for selected regions of the Russian Arctic, Siberia and the Far East, and to compare food safety in these territories. Study design and methods In 18 regions of the Russian Arctic, Siberia and the Far East, the following indicators of food security were analyzed: food costs, food consumption, and chemical and biological food contamination for the period 2000–2011. Results Food costs in the regions are high, comprising 23–43% of household income. Only 4 out of 10 food groups (fish products, cereals, sugar, plant oil) are consumed in sufficient amounts. The consumption of milk products, eggs, vegetables, potatoes, fruits (and berries) is severely low in a majority of the selected regions. There are high levels of biological contamination of food in many regions. The biological and chemical contamination situation is alarming, especially in Chukotka. Only 7 food pollutants are under regular control; among pesticides, only DDT. Evenki AO and Magadan Oblast have reached peak values in food contaminants compared with other regions. Mercury in local fish has not been analyzed in the majority of the regions. In 3 regions, no monitoring of DDT occurs. Aflatoxins have not been analyzed in 5 regions. Nitrates had the highest percentage in excess of the hygienic threshold in all regions. Excesses of other pollutants in different regions were episodic and as a rule not high. Conclusion Improvement of the food supply and food accessibility in the regions of the Russian Arctic, Siberia and the Far East is of utmost importance. Both quantitative and qualitative control of chemical and biological contaminants in food is insufficient and demands radical enhancement aimed at improving food security. PMID:24471055
Short-term clinical and quality-of-life outcomes in women treated by the TVT-Secur procedure.
Lim, Jeanette L; de Cuyper, Eva M J; Cornish, Ann; Frazer, Malcolm
2010-04-01
The TVT-Secur (Ethicon, Somerville, NJ, USA) is a minimally invasive suburethral synthetic sling used in the treatment of female stress urinary incontinence. It claims to cause less postoperative pain and to enable performing in an office setting. However, this may be at the expense of a significant learning curve and a higher early failure rate. To assess objectively the success rate of the TVT-Secur procedure in the 'U' configuration at six months. Secondary outcomes focussed on subjective success rates, complications, patient satisfaction and quality-of-life (QOL). A prospective observational study was undertaken at two tertiary referral urogynaecology centres. A cohort of 42 consecutive patients with urodynamic stress incontinence who underwent the TVT-Secur procedure in the 'U' configuration between November 2006 and August 2007 were followed up for six months. Three standardised QOL questionnaires were completed preoperatively and at six months. A urogenital history, visual analogue score (VAS) for patient satisfaction, uroflow and urinary stress test were performed at six months. Recruitment was ceased prematurely because of a high number of early failures. Objective and subjective success rates at six months were 58.3% and 51.3% respectively. Complications included urinary tract infections, voiding difficulty, groin discomfort, haematoma, vaginal pain, tape erosion and intra-operative dislodgement of tape. Prevalence of de novo urge incontinence was 10.3%. Only symptom-specific QOL scores improved and only 48.6% indicated a high level satisfaction (VAS > or = 80%) with TVT-Secur. On the basis of this limited study, we are hesitant to recommend the 'U' configuration of the TVT-Secur over its more established counterparts, the TVT and TVT-O.
Chlorine (CI2), a high-production volume air pollutant, is an irritant of interest to homeland security. Risk assessment approaches to establish egress or re-entry levels typically use an assumption based on Haber's Rule and apply a concentration times duration ("C x t") adjustme...
Proceedings of the 1st Army Installation Energy Security and Independence Conference
2007-03-01
robustness of Transmission and Distribution system, and that pro- motes the use of demand response, CHP, and use of renewable intermit - ERDC/CERL TR...charged during low load periods. • Generation is run at optimum level during high loads. • Storage follows load and provides fast power balance during
10 CFR 72.186 - Change to physical security and safeguards contingency plans.
Code of Federal Regulations, 2012 CFR
2012-01-01
... approval for a period of three years from the date of the change, and shall, within two months after the change is made, submit a report addressed to Director, Division of Spent Fuel Storage and Transportation... THE INDEPENDENT STORAGE OF SPENT NUCLEAR FUEL, HIGH-LEVEL RADIOACTIVE WASTE, AND REACTOR-RELATED...
10 CFR 72.186 - Change to physical security and safeguards contingency plans.
Code of Federal Regulations, 2014 CFR
2014-01-01
... approval for a period of three years from the date of the change, and shall, within two months after the change is made, submit a report addressed to Director, Division of Spent Fuel Storage and Transportation... THE INDEPENDENT STORAGE OF SPENT NUCLEAR FUEL, HIGH-LEVEL RADIOACTIVE WASTE, AND REACTOR-RELATED...
10 CFR 72.186 - Change to physical security and safeguards contingency plans.
Code of Federal Regulations, 2013 CFR
2013-01-01
... approval for a period of three years from the date of the change, and shall, within two months after the change is made, submit a report addressed to Director, Division of Spent Fuel Storage and Transportation... THE INDEPENDENT STORAGE OF SPENT NUCLEAR FUEL, HIGH-LEVEL RADIOACTIVE WASTE, AND REACTOR-RELATED...
10 CFR 72.186 - Change to physical security and safeguards contingency plans.
Code of Federal Regulations, 2011 CFR
2011-01-01
... approval for a period of three years from the date of the change, and shall, within two months after the change is made, submit a report addressed to Director, Division of Spent Fuel Storage and Transportation... THE INDEPENDENT STORAGE OF SPENT NUCLEAR FUEL, HIGH-LEVEL RADIOACTIVE WASTE, AND REACTOR-RELATED...
Engaging US Business in Support of National Security Objectives Task Group Report
2008-01-16
meetings of the Business Round Table, the U.S. Chamber of Commerce , and the National Association of REPORT FY08-1 2 Defense Business Board...Round Table, the U.S. Chamber of Commerce , and the National Association of Manufacturers are representative high-level fora where such dialogue would
Code of Federal Regulations, 2014 CFR
2014-01-01
... security organization must include sufficient personnel per shift to provide for monitoring of detection... authorization and visually searched for explosives before entry. (10) Written response procedures must be... termination of the license. (11) All detection systems and supporting subsystems must be tamper indicating...
Code of Federal Regulations, 2011 CFR
2011-01-01
... security organization must include sufficient personnel per shift to provide for monitoring of detection... authorization and visually searched for explosives before entry. (10) Written response procedures must be... termination of the license. (11) All detection systems and supporting subsystems must be tamper indicating...
Code of Federal Regulations, 2012 CFR
2012-01-01
... security organization must include sufficient personnel per shift to provide for monitoring of detection... authorization and visually searched for explosives before entry. (10) Written response procedures must be... termination of the license. (11) All detection systems and supporting subsystems must be tamper indicating...
Code of Federal Regulations, 2013 CFR
2013-01-01
... security organization must include sufficient personnel per shift to provide for monitoring of detection... authorization and visually searched for explosives before entry. (10) Written response procedures must be... termination of the license. (11) All detection systems and supporting subsystems must be tamper indicating...
Authentication and Key Establishment in Dynamic Wireless Sensor Networks
Qiu, Ying; Zhou, Jianying; Baek, Joonsang; Lopez, Javier
2010-01-01
When a sensor node roams within a very large and distributed wireless sensor network, which consists of numerous sensor nodes, its routing path and neighborhood keep changing. In order to provide a high level of security in this environment, the moving sensor node needs to be authenticated to new neighboring nodes and a key established for secure communication. The paper proposes an efficient and scalable protocol to establish and update the authentication key in a dynamic wireless sensor network environment. The protocol guarantees that two sensor nodes share at least one key with probability 1 (100%) with less memory and energy cost, while not causing considerable communication overhead. PMID:22319321
Token-based information security for commercial and federal information networks
NASA Astrophysics Data System (ADS)
Rohland, William S.
1996-03-01
The planning of cryptographic solutions for messaging and electronic commerce applications in the United States during the past few years has been motivated by a high level of interest in the technology on the part of potential users. It has been marked by a high level of controversy over algorithms, patent rights and escrow policy. The diverse needs of the government and commercial sectors have led to mutually exclusive solutions based on different algorithms and policy; this phenomenon is fairly unique to the United States. Because of the strong requirement to preserve the differences that make these solutions unique for the two environments, the near-term evolution of a single standard appears unlikely. Furthermore, the need on the part of some government agencies and some commercial establishments exists to operate in both environments. This paper deals with the technical definition and design approach to a dual-use cryptographic device and the migration paths to the dual-use device from both environments. Such a device is further considered as a component of a secure cryptographic translation facility.
Effect of Organizational Factors on Information Security Implementations
ERIC Educational Resources Information Center
Perez, Rafael G.
2013-01-01
The purpose of this quantitative inferential study is to determine the level of correlation between the organizational factors of information security awareness, balanced security processes, and organizational structure with the size of the estimation gap of information security implementations mediated by the end user intentionality. The study…
10 CFR 1046.14 - Access authorization.
Code of Federal Regulations, 2010 CFR
2010-01-01
... authorization for the highest level of classified matter to which they potentially have access. Security police... by the site security organization and approved by the Head of the Field Element. Security police officers shall possess a minimum of an “L” or DOE Secret access authorization. Security police officers...
Analysis of Proton Radiation Effects on Gallium Nitride High Electron Mobility Transistors
2017-03-01
energy levels on a GaN-on-silicon high electron mobility transistor was created. Based on physical results of 2.0-MeV protons irradiation to fluence...and the physical device at 2.0-MeV proton irradiation , predictions were made for 5.0, 10.0, 20.0 and 40.0-MeV proton irradiation . The model generally...nitride, high electron mobility transistor, electronics, 2 MeV proton irradiation , radiation effects 15. NUMBER OF PAGES 87 16. PRICE CODE 17. SECURITY
49 CFR 393.134 - What are the rules for securing roll-on/roll-off or hook lift containers?
Code of Federal Regulations, 2014 CFR
2014-10-01
... which is not equipped with an integral securement system must be: (1) Blocked against forward movement... least as effectively as the tiedowns in the two previous items. (4) The mechanisms used to secure the... secure the container to the vehicle, providing the same level of securement as the missing, damaged or...
49 CFR 393.134 - What are the rules for securing roll-on/roll-off or hook lift containers?
Code of Federal Regulations, 2012 CFR
2012-10-01
... which is not equipped with an integral securement system must be: (1) Blocked against forward movement... least as effectively as the tiedowns in the two previous items. (4) The mechanisms used to secure the... secure the container to the vehicle, providing the same level of securement as the missing, damaged or...
Land Ecological Security Evaluation of Guangzhou, China
Xu, Linyu; Yin, Hao; Li, Zhaoxue; Li, Shun
2014-01-01
As the land ecosystem provides the necessary basic material resources for human development, land ecological security (LES) plays an increasingly important role in sustainable development. Given the degradation of land ecological security under rapid urbanization and the urgent LES requirements of urban populations, a comprehensive evaluation method, named Double Land Ecological Security (DLES), has been introduced with the city of Guangzhou, China, as a case study, which evaluates the LES in regional and unit scales for reasonable and specific urban planning. In the evaluation process with this method, we have combined the material security with the spiritual security that is inevitably associated with LES. Some new coefficients of land-security supply/demand distribution and technology contribution for LES evaluation have also been introduced for different spatial scales, including the regional and the unit scales. The results for Guangzhou indicated that, temporally, the LES supply indices were 0.77, 0.84 and 0.77 in 2000, 2006 and 2009 respectively, while LES demand indices for the city increased in 2000, 2006 and 2009 from 0.57 to 0.95, which made the LES level decreased slowly in this period. Spatially, at the regional scale, the urban land ecological security (ULES) level decreased from 0.2 (marginal security) to −0.18 (marginal insecurity) as a whole; in unit scale, areas in the north and in parts of the east were relatively secure and the security area was shrinking with time, but the central and southern areas turned to be marginal insecurity, especially in 2006 and 2009. This study proposes that DLES evaluation should be conducted for targeted and efficient urban planning and management, which can reflect the LES level of study area in general and in detail. PMID:25321873
Land ecological security evaluation of Guangzhou, China.
Xu, Linyu; Yin, Hao; Li, Zhaoxue; Li, Shun
2014-10-15
As the land ecosystem provides the necessary basic material resources for human development, land ecological security (LES) plays an increasingly important role in sustainable development. Given the degradation of land ecological security under rapid urbanization and the urgent LES requirements of urban populations, a comprehensive evaluation method, named Double Land Ecological Security (DLES), has been introduced with the city of Guangzhou, China, as a case study, which evaluates the LES in regional and unit scales for reasonable and specific urban planning. In the evaluation process with this method, we have combined the material security with the spiritual security that is inevitably associated with LES. Some new coefficients of land-security supply/demand distribution and technology contribution for LES evaluation have also been introduced for different spatial scales, including the regional and the unit scales. The results for Guangzhou indicated that, temporally, the LES supply indices were 0.77, 0.84 and 0.77 in 2000, 2006 and 2009 respectively, while LES demand indices for the city increased in 2000, 2006 and 2009 from 0.57 to 0.95, which made the LES level decreased slowly in this period. Spatially, at the regional scale, the urban land ecological security (ULES) level decreased from 0.2 (marginal security) to -0.18 (marginal insecurity) as a whole; in unit scale, areas in the north and in parts of the east were relatively secure and the security area was shrinking with time, but the central and southern areas turned to be marginal insecurity, especially in 2006 and 2009. This study proposes that DLES evaluation should be conducted for targeted and efficient urban planning and management, which can reflect the LES level of study area in general and in detail.
Security practices and regulatory compliance in the healthcare industry.
Kwon, Juhee; Johnson, M Eric
2013-01-01
Securing protected health information is a critical responsibility of every healthcare organization. We explore information security practices and identify practice patterns that are associated with improved regulatory compliance. We employed Ward's cluster analysis using minimum variance based on the adoption of security practices. Variance between organizations was measured using dichotomous data indicating the presence or absence of each security practice. Using t tests, we identified the relationships between the clusters of security practices and their regulatory compliance. We utilized the results from the Kroll/Healthcare Information and Management Systems Society telephone-based survey of 250 US healthcare organizations including adoption status of security practices, breach incidents, and perceived compliance levels on Health Information Technology for Economic and Clinical Health, Health Insurance Portability and Accountability Act, Red Flags rules, Centers for Medicare and Medicaid Services, and state laws governing patient information security. Our analysis identified three clusters (which we call leaders, followers, and laggers) based on the variance of security practice patterns. The clusters have significant differences among non-technical practices rather than technical practices, and the highest level of compliance was associated with hospitals that employed a balanced approach between technical and non-technical practices (or between one-off and cultural practices). Hospitals in the highest level of compliance were significantly managing third parties' breaches and training. Audit practices were important to those who scored in the middle of the pack on compliance. Our results provide security practice benchmarks for healthcare administrators and can help policy makers in developing strategic and practical guidelines for practice adoption.
Security practices and regulatory compliance in the healthcare industry
Kwon, Juhee; Johnson, M Eric
2013-01-01
Objective Securing protected health information is a critical responsibility of every healthcare organization. We explore information security practices and identify practice patterns that are associated with improved regulatory compliance. Design We employed Ward's cluster analysis using minimum variance based on the adoption of security practices. Variance between organizations was measured using dichotomous data indicating the presence or absence of each security practice. Using t tests, we identified the relationships between the clusters of security practices and their regulatory compliance. Measurement We utilized the results from the Kroll/Healthcare Information and Management Systems Society telephone-based survey of 250 US healthcare organizations including adoption status of security practices, breach incidents, and perceived compliance levels on Health Information Technology for Economic and Clinical Health, Health Insurance Portability and Accountability Act, Red Flags rules, Centers for Medicare and Medicaid Services, and state laws governing patient information security. Results Our analysis identified three clusters (which we call leaders, followers, and laggers) based on the variance of security practice patterns. The clusters have significant differences among non-technical practices rather than technical practices, and the highest level of compliance was associated with hospitals that employed a balanced approach between technical and non-technical practices (or between one-off and cultural practices). Conclusions Hospitals in the highest level of compliance were significantly managing third parties’ breaches and training. Audit practices were important to those who scored in the middle of the pack on compliance. Our results provide security practice benchmarks for healthcare administrators and can help policy makers in developing strategic and practical guidelines for practice adoption. PMID:22955497
Army Officer Counseling Training for Commanders: Participant Manual
2011-04-01
but also create high levels of stress , burnout , and frustration. o Even social events may be perceived as burdensome because they take away from... level of security is not always present in private-sector jobs . o Educational opportunities stand out as the most attractive benefit the Army offers...and one or more silent observers. If you are an observer, your role will be to take notes on the counselor‟s performance and provide feedback at the
Zhang, Xing; Ran, Guangming; Xu, Wenjian; Ma, Yuanxiao; Chen, Xu
2018-01-01
Humans are highly social animals, and the ability to cater to the preferences of other individuals is encouraged by society. Preference-inferring is an important aspect of the theory of mind (TOM). Many previous studies have shown that attachment style is closely related to TOM ability. However, little is known about the effects of adult attachment style on preferences inferring under different levels of certainty. Here, we investigated how adult attachment style affects neural activity underlying preferences inferred under different levels of certainty by using functional magnetic resonance imaging (fMRI). The fMRI results demonstrated that adult attachment influenced the activation of anterior insula (AI) and inferior parietal lobule (IPL) in response to ambiguous preference-inferring. More specifically, in the ambiguous preference condition, the avoidant attached groups exhibited a significantly enhanced activation than secure and anxious attached groups in left IPL; the anxious attached groups exhibited a significantly reduced activation secure attached group in left IPL. In addition, the anxious attached groups exhibited a significantly reduced activation than secure and avoidant attached groups in left AI. These results were also further confirmed by the subsequent PPI analysis. The results from current study suggest that, under ambiguous situations, the avoidant attached individuals show lower sensitivity to the preference of other individuals and need to invest more cognitive resources for preference-reasoning; while compared with avoidant attached group, the anxious attached individuals express high tolerance for uncertainty and a higher ToM proficiency. Results from the current study imply that differences in preference-inferring under ambiguous conditions associated with different levels of individual attachment may explain the differences in interpersonal interaction. PMID:29559932
Multicore Architectures for Multiple Independent Levels of Security Applications
2012-09-01
to bolster the MILS effort. However, current MILS operating systems are not designed for multi-core platforms. They do not have the hardware support...current MILS operating systems are not designed for multi‐core platforms. They do not have the hardware support to ensure that the separation...the availability of information at different security classification levels while increasing the overall security of the computing system . Due to the
20 CFR 416.1401 - Definitions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... Council. Determination means the initial determination or the reconsidered determination. Mass change means a State-initiated change in the level(s) of federally administered State supplementary payments...
SPOT: Optimization Tool for Network Adaptable Security
NASA Astrophysics Data System (ADS)
Ksiezopolski, Bogdan; Szalachowski, Pawel; Kotulski, Zbigniew
Recently we have observed the growth of the intelligent application especially with its mobile character, called e-anything. The implementation of these applications provides guarantee of security requirements of the cryptographic protocols which are used in the application. Traditionally the protocols have been configured with the strongest possible security mechanisms. Unfortunately, when the application is used by means of the mobile devices, the strongest protection can lead to the denial of services for them. The solution of this problem is introducing the quality of protection models which will scale the protection level depending on the actual threat level. In this article we would like to introduce the application which manages the protection level of the processes in the mobile environment. The Security Protocol Optimizing Tool (SPOT) optimizes the cryptographic protocol and defines the protocol version appropriate to the actual threat level. In this article the architecture of the SPOT is presented with a detailed description of the included modules.
Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds
Park, Woo-Sung; Son, Seung-Sik; Lee, Mee-Jeong; Kim, Shin-Hyo; Choi, Eun-Mi; Bang, Ji-Eon; Kim, Yea-Eun; Kim, Ok-Nam
2010-01-01
Objectives The information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on information security and security countermeasures which meet both international standards and the needs of individual hospitals. Methods The ISMS check-list derived from international/domestic standards was distributed to each hospital to complete and the staff of each hospital was interviewed. Information Security Indicator and Information Security Values were used to estimate the present security levels and evaluate the application of each hospital's current system. Results With regard to the moderate clause of the ISMS, the hospitals were determined to be in compliance. The most vulnerable clause was asset management, in particular, information asset classification guidelines. The clauses of information security incident management and business continuity management were deemed necessary for the establishment of successful ISMS. Conclusions The level of current ISMS in the hospitals evaluated was determined to be insufficient. Establishment of adequate ISMS is necessary to ensure patient privacy and the safe use of medical records for various purposes. Implementation of ISMS which meet international standards with a long-term and comprehensive perspective is of prime importance. To reflect the requirements of the varied interests of medical staff, consumers, and institutions, the establishment of political support is essential to create suitable hospital ISMS. PMID:21818429
Social Security Disability Insurance Enrollment and Health Care Employment.
Pellegrini, Lawrence C; Geissler, Kimberley H
2017-09-21
To examine the relationship between Social Security Disability Insurance (SSDI) enrollment and health care employment. State-year level data from government and other publicly available sources for all states (2000-2014). Population-weighted linear regression analyses model associations between each health care employment measure and each SSDI enrollment measure (i.e., SSDI overall, physical, or mental health enrollment rates), controlling for factors associated with health care employment, state fixed effects, and secular time trends. Data are gathered from publicly available sources. A one standard deviation increase in SSDI enrollment per 100,000 population is associated with a statistically significant 2.6 and 4.5 percent increase in the mean employment rate per 100,000 population for health care practitioner and technical occupations and health care support occupations, respectively. The size of this relationship varies by the type of disabling condition for SSDI enrollment (physical versus mental health). Social Security Disability Insurance enrollment is significantly associated with health care employment at the state level. Quantifying the magnitude of this relationship is important given high SSDI enrollment rates as well as evolving policy and demographic shifts related to the SSDI program. © Health Research and Educational Trust.
Secure Recognition of Voice-Less Commands Using Videos
NASA Astrophysics Data System (ADS)
Yau, Wai Chee; Kumar, Dinesh Kant; Weghorn, Hans
Interest in voice recognition technologies for internet applications is growing due to the flexibility of speech-based communication. The major drawback with the use of sound for internet access with computers is that the commands will be audible to other people in the vicinity. This paper examines a secure and voice-less method for recognition of speech-based commands using video without evaluating sound signals. The proposed approach represents mouth movements in the video data using 2D spatio-temporal templates (STT). Zernike moments (ZM) are computed from STT and fed into support vector machines (SVM) to be classified into one of the utterances. The experimental results demonstrate that the proposed technique produces a high accuracy of 98% in a phoneme classification task. The proposed technique is demonstrated to be invariant to global variations of illumination level. Such a system is useful for securely interpreting user commands for internet applications on mobile devices.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sparks, Sandy; Miller, Russell B.
This project evaluated the information security posture of QUALCOMM regarding its Internet connections. It also enhanced and refined the ability of LLNL to perform these evaluations and add to its body of knowledge concerning Internet threats, vulnerabilities, and countermeasures. The evaluations required a high degree of trust and cooperation between the assessors (LLNL) and the target organization (QUALCOMM). Without this high level of cooperation, the activity could easily have become an adversarial audit type situation and counterproductive to all parties.
Effects of Climate Change on Volcanic Emissions and Health Security in Hawaii by 2050
2017-08-01
pulmonary edema (fluid in the lungs), and acute respiratory distress syndrome (ARDS) (Weinstein et al 2013). Acute symptoms increase as SO2 levels and/or...vulnerable populations (Longo et al 2010). At high concentrations, the acute systemic effects of SO2 include: upper airway irritation, pneumonitis...Hydrogen sulfide (H2S) causes cough, shortness of breath and pulmonary edema. At high frequency inhalation, the acute systemic effects of fluoride
A study of IEEE 802.15.4 security framework for wireless body area networks.
Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup
2011-01-01
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.
A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks
Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup
2011-01-01
A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN. PMID:22319358
Measuring Global Water Security Towards Sustainable Development Goals
NASA Technical Reports Server (NTRS)
Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide
2016-01-01
Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.
Emergency Preparedness for Catastrophic Events at Small and Medium Sized Airports: Lacking or Not?
NASA Technical Reports Server (NTRS)
Sweet, Kathleen M.
2007-01-01
The implementation of security methods and processes in general has had a decisive impact on the aviation industry. However, efforts to effectively coordinate varied aspects of security protocols between agencies and general aviation components have not been adequately addressed. Whether or not overall security issues, especially with regard to planning for catastrophic terrorist events, have been neglected at the nation's smaller airports is the main topic of this paper. For perspective, the term general aviation is generally accepted to include all flying except for military and scheduled airline operations. Genera aviation makes up more than 1 percent of the U.S. Gross Domestic Product and supports almost 1.3 mission high-skilled jobs in professional services and manufacturing and hence is an important component of the aviation industry (AOPA, n.d.). In both conceptual and practical terms, this paper argues for the proactive management of security planning and repeated security awareness training from both an individual and an organizational perspective within the general aviation venue. The results of a research project incorporating survey data from general aviation and small commercial airport managers as well as Transportation Security Administration (TSA) employees are reported. Survey findings suggest that miscommunication does take place on different organizational levels and that between TSA employees and airport management interaction can be contentious and cooperation diminished. The importance of organizational training for decreasing conflict and increasing security and preparedness is discussed as a primary implication.
Sustainability impact assessment to improve food security of smallholders in Tanzania
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schindler, Jana, E-mail: jana.schindler@zalf.de; Humboldt Universität zu Berlin, Faculty of Agriculture and Horticulture, Invalidenstr. 42, 10099 Berlin; Graef, Frieder, E-mail: graef@zalf.de
The objective of this paper was to assess the sustainability impacts of planned agricultural development interventions, so called upgrading strategies (UPS), to enhance food security and to identify what advantages and risks are assessed from the farmer's point of view in regards to social life, the economy and the environment. We developed a participatory methodological procedure that links food security and sustainable development. Farmers in four different case study villages in rural Tanzania chose their priority UPS. For these UPS, they assessed the impacts on locally relevant food security criteria. The positive impacts identified were mainly attributed to increased agriculturalmore » production and its related positive impacts such as increased income and improved access to necessary means to diversify the diet. However, several risks of certain UPS were also indicated by farmers, such as increased workload, high maintenance costs, higher competition among farmers, loss of traditional knowledge and social conflicts. We discussed the strong interdependence of socio-economic and environmental criteria to improve food security for small-scale farmers and analysed several trade-offs in regards to UPS choices and food security criteria. We also identified and discussed the advantages and challenges of our methodological approach. In conclusion, the participatory impact assessment on the farmer level allowed a locally specific analysis of the various positive and negative impacts of UPS on social life, the economy and the environment. We emphasize that only a development approach that considers social, economic and environmental challenges simultaneously can enhance food security.« less
NASA Astrophysics Data System (ADS)
Su, Meirong; Chen, Chen; Lu, Weiwei; Liu, Gengyuan; Yang, Zhifeng; Chen, Bin
2013-06-01
Urban public health is an important global issue, and receives extensive attention. It is necessary to compare urban public health status among different cities, so that each city can define its own health patterns and limiting factors. The following assessment indicators were established to evaluate urban public health status: living conditions, physical health, education and culture, environmental quality, and social security. A weighted-sum model was used in combination with these indicators to compare the urban public health status in four cities—Beijing, New York, London, and Tokyo—using data for 2000-2009. Although the urban public health level of Beijing was lower than that of the other cities, it showed the greatest increase in this level over the study period. Different patterns of urban public health were identified: London had the most balanced, steady pattern (almost all factors performed well and developed stably); New York and Tokyo showed balanced, but unsteady patterns (most factors remained high, though social security and environmental quality fluctuated); Beijing had the most unbalanced, unsteady pattern (the different factors were at different levels, and education and culture and social security fluctuated). For enhanced urban public health status, environmental quality and education and culture clearly need to be improved in Beijing. This study demonstrates that a comparison of different cities is helpful in identifying limiting factors for urban public health and providing an orientation for future urban development.
State-of-the-art research on electromagnetic information security
NASA Astrophysics Data System (ADS)
Hayashi, Yu-ichi
2016-07-01
As information security is becoming increasingly significant, security at the hardware level is as important as in networks and applications. In recent years, instrumentation has become cheaper and more precise, computation has become faster, and capacities have increased. With these advancements, the threat of advanced attacks that were considerably difficult to carry out previously has increased not only in military and diplomatic fields but also in general-purpose manufactured devices. This paper focuses on the problem of the security limitations concerning electromagnetic waves (electromagnetic information security) that has rendered attack detection particularly difficult at the hardware level. In addition to reviewing the mechanisms of these information leaks and countermeasures, this paper also presents the latest research trends and standards.
Kirkpatrick, Sharon I; Tarasuk, Valerie
2010-07-01
Although the sociodemographic characteristics of food-insecure households have been well documented, there has been little examination of neighbourhood characteristics in relation to this problem. In the present study we examined the association between household food security and neighbourhood features including geographic food access and perceived neighbourhood social capital. Cross-sectional survey and mapping of discount supermarkets and community food programmes. Twelve high-poverty neighbourhoods in Toronto, Ontario, Canada. Respondents from 484 low-income families who had children and who lived in rental accommodations. Food insecurity was pervasive, affecting two-thirds of families with about a quarter categorized as severely food insecure, indicative of food deprivation. Food insecurity was associated with household factors including income and income source. However, food security did not appear to be mitigated by proximity to food retail or community food programmes, and high rates of food insecurity were observed in neighbourhoods with good geographic food access. While low perceived neighbourhood social capital was associated with higher odds of food insecurity, this effect did not persist once we accounted for household sociodemographic factors. Our findings raise questions about the extent to which neighbourhood-level interventions to improve factors such as food access or social cohesion can mitigate problems of food insecurity that are rooted in resource constraints. In contrast, the results reinforce the importance of household-level characteristics and highlight the need for interventions to address the financial constraints that underlie problems of food insecurity.
33 CFR 106.235 - Maritime Security (MARSEC) Level coordination and implementation.
Code of Federal Regulations, 2010 CFR
2010-07-01
... in compliance with the security requirements in this part for the MARSEC Level in effect for the OCS..., and stress the need for increased vigilance. (d) An OCS facility owner or operator whose facility is...
Gangadari, Bhoopal Rao; Rafi Ahamed, Shaik
2016-09-01
In biomedical, data security is the most expensive resource for wireless body area network applications. Cryptographic algorithms are used in order to protect the information against unauthorised access. Advanced encryption standard (AES) cryptographic algorithm plays a vital role in telemedicine applications. The authors propose a novel approach for design of substitution bytes (S-Box) using second-order reversible one-dimensional cellular automata (RCA 2 ) as a replacement to the classical look-up-table (LUT) based S-Box used in AES algorithm. The performance of proposed RCA 2 based S-Box and conventional LUT based S-Box is evaluated in terms of security using the cryptographic properties such as the nonlinearity, correlation immunity bias, strict avalanche criteria and entropy. Moreover, it is also shown that RCA 2 based S-Boxes are dynamic in nature, invertible and provide high level of security. Further, it is also found that the RCA 2 based S-Box have comparatively better performance than that of conventional LUT based S-Box.
Rafi Ahamed, Shaik
2016-01-01
In biomedical, data security is the most expensive resource for wireless body area network applications. Cryptographic algorithms are used in order to protect the information against unauthorised access. Advanced encryption standard (AES) cryptographic algorithm plays a vital role in telemedicine applications. The authors propose a novel approach for design of substitution bytes (S-Box) using second-order reversible one-dimensional cellular automata (RCA2) as a replacement to the classical look-up-table (LUT) based S-Box used in AES algorithm. The performance of proposed RCA2 based S-Box and conventional LUT based S-Box is evaluated in terms of security using the cryptographic properties such as the nonlinearity, correlation immunity bias, strict avalanche criteria and entropy. Moreover, it is also shown that RCA2 based S-Boxes are dynamic in nature, invertible and provide high level of security. Further, it is also found that the RCA2 based S-Box have comparatively better performance than that of conventional LUT based S-Box. PMID:27733924
Kluge, Hans; Martín-Moreno, Jose Maria; Emiroglu, Nedret; Rodier, Guenael; Kelley, Edward; Vujnovic, Melitta; Permanand, Govin
2018-01-01
The International Health Regulations (IHR) 2005, as the overarching instrument for global health security, are designed to prevent and cope with major international public health threats. But poor implementation in countries hampers their effectiveness. In the wake of a number of major international health crises, such as the 2014 Ebola and 2016 Zika outbreaks, and the findings of a number of high-level assessments of the global response to these crises, it has become clear that there is a need for more joined-up thinking between health system strengthening activities and health security efforts for prevention, alert and response. WHO is working directly with its Member States to promote this approach, more specifically around how to better embed the IHR (2005) core capacities into the main health system functions. This paper looks at how and where the intersections between the IHR and the health system can be best leveraged towards developing greater health system resilience. This merging of approaches is a key component in pursuit of Universal Health Coverage and strengthened global health security as two mutually reinforcing agendas. PMID:29379650
Kluge, Hans; Martín-Moreno, Jose Maria; Emiroglu, Nedret; Rodier, Guenael; Kelley, Edward; Vujnovic, Melitta; Permanand, Govin
2018-01-01
The International Health Regulations (IHR) 2005, as the overarching instrument for global health security, are designed to prevent and cope with major international public health threats. But poor implementation in countries hampers their effectiveness. In the wake of a number of major international health crises, such as the 2014 Ebola and 2016 Zika outbreaks, and the findings of a number of high-level assessments of the global response to these crises, it has become clear that there is a need for more joined-up thinking between health system strengthening activities and health security efforts for prevention, alert and response. WHO is working directly with its Member States to promote this approach, more specifically around how to better embed the IHR (2005) core capacities into the main health system functions. This paper looks at how and where the intersections between the IHR and the health system can be best leveraged towards developing greater health system resilience. This merging of approaches is a key component in pursuit of Universal Health Coverage and strengthened global health security as two mutually reinforcing agendas.
NASA Astrophysics Data System (ADS)
Balamurugan, A. M.; Sivasubramanian, A.
2014-06-01
The Optical Burst Switching (OBS) is an emergent result to the technology issue that could achieve a viable network in future. They have the ability to meet the bandwidth requisite of those applications that call for intensive bandwidth. The field of optical transmission has undergone numerous advancements and is still being researched mainly due to the fact that optical data transmission can be done at enormous speeds. The concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution and quality of service (QoS). This paper proposes a framework based on QKD based secure edge router architecture design to provide burst confidentiality. The QKD protocol offers high level of confidentiality as it is indestructible. The design architecture was implemented in FPGA using diverse models and the results were taken. The results show that the proposed model is suitable for real time secure routing applications of the Optical burst switched networks.
2013-01-01
Background Privacy and information security are important for all healthcare services, including home-based services. We have designed and implemented a prototype technology platform for providing home-based healthcare services. It supports a personal electronic health diary and enables secure and reliable communication and interaction with peers and healthcare personnel. The platform runs on a small computer with a dedicated remote control. It is connected to the patient’s TV and to a broadband Internet. The platform has been tested with home-based rehabilitation and education programs for chronic obstructive pulmonary disease and diabetes. As part of our work, a risk assessment of privacy and security aspects has been performed, to reveal actual risks and to ensure adequate information security in this technical platform. Methods Risk assessment was performed in an iterative manner during the development process. Thus, security solutions have been incorporated into the design from an early stage instead of being included as an add-on to a nearly completed system. We have adapted existing risk management methods to our own environment, thus creating our own method. Our method conforms to ISO’s standard for information security risk management. Results A total of approximately 50 threats and possible unwanted incidents were identified and analysed. Among the threats to the four information security aspects: confidentiality, integrity, availability, and quality; confidentiality threats were identified as most serious, with one threat given an unacceptable level of High risk. This is because health-related personal information is regarded as sensitive. Availability threats were analysed as low risk, as the aim of the home programmes is to provide education and rehabilitation services; not for use in acute situations or for continuous health monitoring. Conclusions Most of the identified threats are applicable for healthcare services intended for patients or citizens in their own homes. Confidentiality risks in home are different from in a more controlled environment such as a hospital; and electronic equipment located in private homes and communicating via Internet, is more exposed to unauthorised access. By implementing the proposed measures, it has been possible to design a home-based service which ensures the necessary level of information security and privacy. PMID:23937965
48 CFR 1352.237-70 - Security processing requirements-high or moderate risk contracts.
Code of Federal Regulations, 2011 CFR
2011-10-01
... requirements-high or moderate risk contracts. 1352.237-70 Section 1352.237-70 Federal Acquisition Regulations... Provisions and Clauses 1352.237-70 Security processing requirements—high or moderate risk contracts. As prescribed in 48 CFR 1337.110-70 (b), insert the following clause: Security Processing Requirements—High or...
Managing business compliance using model-driven security management
NASA Astrophysics Data System (ADS)
Lang, Ulrich; Schreiner, Rudolf
Compliance with regulatory and governance standards is rapidly becoming one of the hot topics of information security today. This is because, especially with regulatory compliance, both business and government have to expect large financial and reputational losses if compliance cannot be ensured and demonstrated. One major difficulty of implementing such regulations is caused the fact that they are captured at a high level of abstraction that is business-centric and not IT centric. This means that the abstract intent needs to be translated in a trustworthy, traceable way into compliance and security policies that the IT security infrastructure can enforce. Carrying out this mapping process manually is time consuming, maintenance-intensive, costly, and error-prone. Compliance monitoring is also critical in order to be able to demonstrate compliance at any given point in time. The problem is further complicated because of the need for business-driven IT agility, where IT policies and enforcement can change frequently, e.g. Business Process Modelling (BPM) driven Service Oriented Architecture (SOA). Model Driven Security (MDS) is an innovative technology approach that can solve these problems as an extension of identity and access management (IAM) and authorization management (also called entitlement management). In this paper we will illustrate the theory behind Model Driven Security for compliance, provide an improved and extended architecture, as well as a case study in the healthcare industry using our OpenPMF 2.0 technology.
Water security evaluation in Yellow River basin
NASA Astrophysics Data System (ADS)
Jiang, Guiqin; He, Liyuan; Jing, Juan
2018-03-01
Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.
2009-12-17
IEEE TDKE, 1996. 8( 1). 14. Garvey, T.D., The inference Problem for Computer Security. 1992, SRI International. 15. Chaum , D ., Blind Signatures for...Pervasive Computing Environments. IEEE Transactions on Vehicular Technology, 2006. 55(4). 17. Chaum , D ., Security without Identification: Transaction...Systems to make Big Brother Obsolete. Communications of the ACM 1985. 28(10). 18. Chaum , D ., Untraceable Electronic Mail, Return Addresses, and Digital
Role of farmer group institutions in increasing farm production and household food security
NASA Astrophysics Data System (ADS)
Rahmadanih; Bulkis, S.; Arsyad, M.; Amrullah, A.; Viantika, N. M.
2018-05-01
Food productions and food security are still becomes serious issue in agriculture development. The research objectives are (1) Examining the role of Farmer Group in increasing farm production and (2) Analyzing the role of Farmer Group in relationship with the household food security. The research was conducted in Soppeng District, South Sulawesi, Indonesia by taking unit of analysis at household level of Farmer Group members. Sample were 6 farmer groups, consisting of 365 households. The Results showed that the Farmer Group has a good role as a production, collaboration and market unit to increase farming production (score 2.3-2.6), but haven’t much impact to increase household food security. Rice production are 4.2 – 6.2 tons per hectare and household food security level are “low and marginal food secure” (mean score 4 and 6). Nevertheless, the role of Farmer Group showed a positive relationship with the level of household food security. So, it is necessarry to increase the role of Farmer Group in order to increase income and household food security based on Farmer Group’s needs and potencies through facilitation of (a) seed and water/irrigation availability, (b) preparing organization rules (AD/ART) and (c) appropriate training and education of food and nutrition.
Analysis on the University’s Network Security Level System in the Big Data Era
NASA Astrophysics Data System (ADS)
Li, Tianli
2017-12-01
The rapid development of science and technology, the continuous expansion of the scope of computer network applications, has gradually improved the social productive forces, has had a positive impact on the increase production efficiency and industrial scale of China's different industries. Combined with the actual application of computer network in the era of large data, we can see the existence of influencing factors such as network virus, hacker and other attack modes, threatening network security and posing a potential threat to the safe use of computer network in colleges and universities. In view of this unfavorable development situation, universities need to pay attention to the analysis of the situation of large data age, combined with the requirements of network security use, to build a reliable network space security system from the equipment, systems, data and other different levels. To avoid the security risks exist in the network. Based on this, this paper will analyze the hierarchical security system of cyberspace security in the era of large data.
Talking about health: correction employees' assessments of obstacles to healthy living.
Morse, Tim; Dussetschleger, Jeffrey; Warren, Nicholas; Cherniack, Martin
2011-09-01
Describe health risks/obstacles to health among correctional employees. Mixed-methods approach combined results from four focus groups, 10 interviews, 335 surveys, and 197 physical assessments. Obesity levels were higher than national averages (40.7% overweight and 43.3% obese), with higher levels associated with job tenure, male gender, and working off-shift. Despite widespread concern about the lack of fitness, leisure exercise was higher than national norms. Respondents had higher levels of hypertension than national norms, with 31% of men and 25.8% of women hypertensive compared with 17.1% and 15.1% for national norms. Stress levels were elevated. Officers related their stress to concerns about security, administrative requirements, and work/family imbalance. High stress levels are reflected in elevated levels of hypertension. Correctional employees are at high risk for chronic disease, and environmental changes are needed to reduce risk factors. (C)2011The American College of Occupational and Environmental Medicine
Effectiveness of Conducted Electrical Weapons to Prevent Violence-Related Injuries in the Hospital.
Gramling, Joshua J; McGovern, Patricia M; Church, Timothy R; Nachreiner, Nancy M; Gaugler, Joseph E
2018-05-01
Health care workers suffer higher rates of violence-related injuries than workers in other industries, with hospital security officers and ED personnel at particularly high risk for injury. Arming hospital security workers with conducted electrical weapons, such as tasers, has been suggested as an intervention to decrease violence-related injuries in the hospital. A retrospective cohort of all security and ED nursing staff at an urban level 1 trauma center was identified from human resources data for the period 4 years before and 7 years after security workers were armed with conducted electrical weapons. A violence-related rate of injury was calculated as all violence-related injuries incurred by each employee for the numerator and the productive hours worked by each person during the study period as the denominator. The hospital employed approximately 30 security staff and 200 nursing staff at the time, with a total of 98 security officers and 468 nursing staff members over the 11 years of study. During the total nursing study period, 98 security officers contributed 452,901 hours; 265 registered nurses from the emergency department contributed 1,535,044 hours; and 203 health care assistants contributed 624,805 hours. Security officers' violence-related rate of injury was 13 times higher than that of the nursing staff. The risk ratio was 1.0 (95% confidence interval [CI] 0.7-1.4) between the 2 examination periods for security officers, with similar results for nurses. However, among security workers, the cost of the injuries decreased in the period after implementation. Carrying conducted electrical weapons by hospital security staff appears to have limited capacity to decrease overall rates of violence-related injury but may decrease the severity of violence-related injuries. The latter could decease costs to health care organizations as well as morbidity of injured staff. Contribution to Emergency Nursing Practice. Copyright © 2017 Emergency Nurses Association. Published by Elsevier Inc. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Qojas, M.
1999-03-01
This document is an analysis of options for unilateral and cooperative action to improve the security of Jordan's borders. Sections describe the current political, economic, and social interactions along Jordan's borders. Next, the document discusses border security strategy for cooperation among neighboring countries and the adoption of confidence-building measures. A practical cooperative monitoring system would consist of hardware for early warning, command and control, communications, and transportation. Technical solutions can expand opportunities for the detection and identification of intruders. Sensors (such as seismic, break-wire, pressure-sensing, etc.) can warn border security forces of intrusion and contribute to the identification of themore » intrusion and help formulate the response. This document describes conceptual options for cooperation, offering three scenarios that relate to three hypothetical levels (low, medium, and high) of cooperation. Potential cooperative efforts under a low cooperation scenario could include information exchanges on military equipment and schedules to prevent misunderstandings and the establishment of protocols for handling emergency situations or unusual circumstances. Measures under a medium cooperation scenario could include establishing joint monitoring groups for better communications, with hot lines and scheduled meetings. The high cooperation scenario describes coordinated responses, joint border patrols, and sharing border intrusion information. Finally, the document lists recommendations for organizational, technical, and operational initiatives that could be applicable to the current situation.« less
Communicating Homeland Security Threats: Government and Public Efforts
2010-12-01
States has never operated at a threat level lower than blue - guarded risk. The Homeland Security Advisory Council’s primary recommendations included...changing the alert level baseline to blue (guarded risk). Their rationale for resetting the threat level baseline includes acknowledging that a...accustomed to the guarded blue level indicative of a general threat of terrorist attack. To assume that public officials and citizens would ever
You, Wei-Bin; He, Dong-Jin; Qin, De-Hua; Ji, Zhi-Rong; Wu, Li-Yun; Yu, Jian-An; Chen, Bing-Rong; Tan, Yong
2014-05-01
This paper proposed a new concept of ecological security for protection by a comprehensive analysis of the contents and standards of world heritage sites. A frame concept model named "Pressure-State-Control" for early warning of ecological security at world heritage mixed sites was constructed and evaluation indicators of this frame were also selected. Wuyishan Scenery District was chosen for a case study, which has been severely disturbed by natural and artificial factors. Based on the frame model of "Pressure-State-Control" and by employing extension analysis, the matter-element model was established to assess the ecological security status of this cultural and natural world heritage mixed site. The results showed that the accuracy of ecological security early warning reached 84%. Early warning rank was I level (no alert status) in 1997 and 2009, but that in 2009 had a higher possibility to convert into II level. Likewise, the early-warning indices of sensitive ranks were different between 1997 and 2009. Population density, population growth rate, area index for tea garden, cultivated land owned per capita, level of drought, and investment for ecological and environmental construction were the main limiting factors to hinder the development of ecological security from 2009 to future. In general, the status of Wuyishan Scenery District ecological security was relatively good and considered as no alert level, while risk conditions also existed in terms of a few early-warning indicators. We still need to pay more attention to serious alert indicators and adopt effective prevention and control measures to maintain a good ecological security status of this heritage site.
From Secure Memories to Smart Card Security
NASA Astrophysics Data System (ADS)
Handschuh, Helena; Trichina, Elena
Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.
Mense, Alexander; Hoheiser-Pförtner, Franz; Schmid, Martin; Wahl, Harald
2013-01-01
Working with health related data necessitates appropriate levels of security and privacy. Information security, meaning ensuring confidentiality, integrity, and availability, is more organizational, than technical in nature. It includes many organizational and management measures, is based on well-defined security roles, processes, and documents, and needs permanent adaption of security policies, continuously monitoring, and measures assessment. This big challenge for any organization leads to implementation of an information security management system (ISMS). In the context of establishing a regional or national electronic health record for integrated care (ICEHR), the situation is worse. Changing the medical information exchange from on-demand peer-to-peer connections to health information networks requires all organizations participating in the EHR system to have consistent security levels and to follow the same security guidelines and rules. Also, the implementation must be monitored and audited, establishing cross-organizational information security management systems (ISMS) based on international standards. This paper evaluates requirements and defines basic concepts for an ISO 27000 series-based cross-organizational ISMS in the healthcare domain and especially for the implementation of the nationwide electronic health record in Austria (ELGA).
Multiple Object Based RFID System Using Security Level
NASA Astrophysics Data System (ADS)
Kim, Jiyeon; Jung, Jongjin; Ryu, Ukjae; Ko, Hoon; Joe, Susan; Lee, Yongjun; Kim, Boyeon; Chang, Yunseok; Lee, Kyoonha
2007-12-01
RFID systems are increasingly applied for operational convenience in wide range of industries and individual life. However, it is uneasy for a person to control many tags because common RFID systems have the restriction that a tag used to identify just a single object. In addition, RFID systems can make some serious problems in violation of privacy and security because of their radio frequency communication. In this paper, we propose a multiple object RFID tag which can keep multiple object identifiers for different applications in a same tag. The proposed tag allows simultaneous access for their pair applications. We also propose an authentication protocol for multiple object tag to prevent serious problems of security and privacy in RFID applications. Especially, we focus on efficiency of the authentication protocol by considering security levels of applications. In the proposed protocol, the applications go through different authentication procedures according to security level of the object identifier stored in the tag. We implemented the proposed RFID scheme and made experimental results about efficiency and stability for the scheme.
Deafblindness, ontological security, and social recognition.
Danermark, Berth D; Möller, Kerstin
2008-11-01
Trust, ontological security, and social recognition are discussed in relation to self-identity among people with acquired deafblindness. To date the phenomenon has not been elaborated in the context of deafblindness. When a person with deafblindness interacts with the social and material environment, the reliability, constancy, and predictability of his or her relations is crucial for maintaining or achieving ontological security or a general and fairly persistent feeling of well-being. When these relations fundamentally change, the impact on ontological security will be very negative. The construction of social recognition through the interaction between the self and others is embodied across three dimensions: at the individual level, at the legal systems level, and at the normative or value level. The relationship between trust and ontological security on the one hand and social recognition on the other hand is discussed. It is argued that these basic processes affecting personality development have to be identified and acknowledged in the interactions people with deafblindness experience. Some implications for the rehabilitation of people with acquired deafblindness are presented and illustrated.
Code of Federal Regulations, 2010 CFR
2010-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED... three established threshold levels, one being performance accuracy, for two consecutive quarters, and... period. During this 3-month period we will not require the State agency to meet the threshold levels...
ERIC Educational Resources Information Center
Samier, Eugenie
2015-01-01
The United Arab Emirates (UAE) is a small state transitioning from traditional communities into a modern society. This is a complex process: it involves instilling a national identity over tribal structures; modernising and technologising while retaining Islam; ensuring a high level of security while allowing for a liberal and relatively free…
ERIC Educational Resources Information Center
Benfari, Robert C.; Eaker, Elaine
1984-01-01
Studied male smokers (N=182) at high risk of coronary heart disease to determine variables that discriminated between successful and nonsuccessful quitters. Analysis revealed that baseline level of smoking, life events, personal security, and selected group process variables were predictive of success or failure in the intervention program.…
Milsom, Sophia A; Freestone, Mark; Duller, Rachel; Bouman, Marisa; Taylor, Celia
2014-04-01
Social climate has an influence on a number of treatment-related factors, including service users' behaviour, staff morale and treatment outcomes. Reliable assessment of social climate is, therefore, beneficial within forensic mental health settings. The Essen Climate Evaluation Schema (EssenCES) has been validated in forensic mental health services in the UK and Germany. Preliminary normative data have been produced for UK high-security national health services and German medium-security and high-security services. We aim to validate the use of the EssenCES scale (English version) and provide preliminary normative data in UK medium-security hospital settings. The EssenCES scale was completed in a medium-security mental health service as part of a service-wide audit. A total of 89 patients and 112 staff completed the EssenCES. The three-factor structure of the EssenCES and its internal construct validity were maintained within the sample. Scores from this medium-security hospital sample were significantly higher than those from earlier high-security hospital data, with three exceptions--'patient cohesion' according to the patients and 'therapeutic hold' according to staff and patients. Our data support the use of the EssenCES scale as a valid measure for assessing social climate within medium-security hospital settings. Significant differences between the means of high-security and medium-security service samples imply that degree of security is a relevant factor affecting the ward climate and that in monitoring quality of secure services, it is likely to be important to apply different scores to reflect standards. Copyright © 2013 John Wiley & Sons, Ltd.
ERIC Educational Resources Information Center
Bracy, Nicole L.
2009-01-01
Public schools have transformed significantly over the past several decades in response to broad concerns about rising school violence. Today's public schools are high security environments employing tactics commonly found in jails and prisons such as police officers, security cameras, identification systems, and secure building strategies.…
The research of network database security technology based on web service
NASA Astrophysics Data System (ADS)
Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin
2013-03-01
Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.
1998-03-01
traveling public, air carriers, and persons employed by or conducting business at public airports. 14. SUBJECT TERMS Airport Security , Federal...26 4. Sterile Area 28 5. Exclusive Area 28 E. SECURITY ALERT LEVELS 29 F. AIRPORT SECURITY TOOLS 30 1. Electronic Detection System 31 a... Security Coordinator ASP Airport Security Program BIS Biometrie Identification System CCTV Closed Circuit Television CJIS Criminal Justice Information
Kim, Geun Bae
2015-12-01
This paper aims to reveal how Hamheung Medical College in North Korea kept up its faculty with the trend of a new political system. The time period consists of three series of evaluations that occurred between the start of a reformation action in 1946 and the establishment of the regime in 1948. At the time, it was difficult to secure college faculty in the medical field, because of a serious shortage of medical personnel. Moreover, the problem in the recruitment of faculty at the medical college grew bigger since the members were required to have a high level of political consciousness. Then how did Hamheung Medical College accomplish this ideal securing of faculty that possessed political ideology and medical expertise? For the first time, a faculty evaluation at the local level was carried out and got rid of a few pro-Japanese or reactionary factions but maintained most of the faculty. Although academic background and research career of the faculty were considered, securing of the manpower in terms of number was crucial for the reconstruction of a professional school level. At the second time, as the central education bureau's intervention tightened the censorship, most of the faculty were evaluated as unqualified. Indeed, it was difficult to satisfy the standard of professionalism which emphasized a high level of academic career and political thought that included affiliation of Workers' Party of North Korea. The Medical College could not find faculty that could replace those professors and therefore, most of them maintained their faculty positions. Since then, the faculty who received excellent evaluations led the school at the very front. At the third time, the Medical College itself led the evaluations and implemented more relaxed standards of political ideology and medical expertise. Faculty who were cooperative to the reformation actions that North Korea carried forward or had working experience at the hospital and health service received a high level of recognition. Accordingly, the Medical College expanded itself by securing many professors, but also embodied a large gap of academic and ideological levels between them. Hence, the political ideology and medical expertise, which were set forth as the requirements for faculty, were constructed in the space of political ideal and social reality. Despite the high criteria the North Korean Government made, Hamheung Medical College's faculty fell below the average in terms of ideological and academic standards. As a way to compensate this, professors who greatly satisfied the both virtues were placed as leaders and, for supporting them, professors who taught the general education curriculum were recruited largely. And also, it appointed a large number of medical doctors who accumulated experiences in the field as new professors. Nevertheless, the Medical College struggled to raise the quality of medical education and was unable to prevent a part of its faculty from leaving to South Korea in the time of the Korean War. Thus, the political and academic virtues of the faculty at that time were not just simply about the professor individuals but were interrelated with the medical education and health care system in North Korea.
Haneda, Kiyofumi; Umeda, Tokuo; Koyama, Tadashi; Harauchi, Hajime; Inamura, Kiyonari
2002-01-01
The target of our study is to establish the methodology for analyzing level of security requirements, for searching suitable security measures and for optimizing security distribution to every portion of medical practice. Quantitative expression must be introduced to our study as possible for the purpose of easy follow up of security procedures and easy evaluation of security outcomes or results. Results of system analysis by fault tree analysis (FTA) clarified that subdivided system elements in detail contribute to much more accurate analysis. Such subdivided composition factors very much depended on behavior of staff, interactive terminal devices, kinds of service, and routes of network. As conclusion, we found the methods to analyze levels of security requirements for each medical information systems employing FTA, basic events for each composition factor and combination of basic events. Methods for searching suitable security measures were found. Namely risk factors for each basic event, number of elements for each composition factor and candidates of security measure elements were found. Method to optimize the security measures for each medical information system was proposed. Namely optimum distribution of risk factors in terms of basic events were figured out, and comparison of them between each medical information systems became possible.
NASA Technical Reports Server (NTRS)
Briggs, Maxwell H.; Gibson, Marc A.; Sanzi, James
2017-01-01
The Kilopower project aims to develop and demonstrate scalable fission-based power technology for systems capable of delivering 110 kW of electric power with a specific power ranging from 2.5 - 6.5 Wkg. This technology could enable high power science missions or could be used to provide surface power for manned missions to the Moon or Mars. NASA has partnered with the Department of Energys National Nuclear Security Administration, Los Alamos National Labs, and Y-12 National Security Complex to develop and test a prototypic reactor and power system using existing facilities and infrastructure. This technology demonstration, referred to as the Kilowatt Reactor Using Stirling TechnologY (KRUSTY), will undergo nuclear ground testing in the summer of 2017 at the Nevada Test Site. The 1 kWe variation of the Kilopower system was chosen for the KRUSTY demonstration. The concept for the 1 kWe flight system consist of a 4 kWt highly enriched Uranium-Molybdenum reactor operating at 800 degrees Celsius coupled to sodium heat pipes. The heat pipes deliver heat to the hot ends of eight 125 W Stirling convertors producing a net electrical output of 1 kW. Waste heat is rejected using titanium-water heat pipes coupled to carbon composite radiator panels. The KRUSTY test, based on this design, uses a prototypic highly enriched uranium-molybdenum core coupled to prototypic sodium heat pipes. The heat pipes transfer heat to two Advanced Stirling Convertors (ASC-E2s) and six thermal simulators, which simulate the thermal draw of full scale power conversion units. Thermal simulators and Stirling engines are gas cooled. The most recent project milestone was the completion of non-nuclear system level testing using an electrically heated depleted uranium (non-fissioning) reactor core simulator. System level testing at the Glenn Research Center (GRC) has validated performance predictions and has demonstrated system level operation and control in a test configuration that replicates the one to be used at the Device Assembly Facility (DAF) at the Nevada National Security Site. Fabrication, assembly, and testing of the depleted uranium core has allowed for higher fidelity system level testing at GRC, and has validated the fabrication methods to be used on the highly enriched uranium core that will supply heat for the DAF KRUSTY demonstration.
Foreign Investment and National Security: Economic Considerations
2010-02-08
euros. The OECD projects that the overall amount of direct investment flows in 2008 will decline as a result of lower levels of foreign direct...2.7 2.5 North America 129.9 244.4 n.a. 13.7 18.7 n.a. United States 101.0 175.4 192.9 10.7 13.4 12.5 Other developed econ . -34.6 46.7 n.a. -3.7...periodic regulatory impact assessments, and requirements that decisions to block an investment should be taken at high government levels . Critical
Foreign Investment and National Security: Economic Considerations
2008-12-01
overall amount of direct investment flows in 2008 will decline as a result of lower levels of foreign direct investment into and out of the United States...244.4 n.a. 13.7 18.7 n.a. United States 101.0 175.4 192.9 10.7 13.4 12.5 Other developed econ . -34.6 46.7 n.a. -3.7 3.6 n.a. Developing economies...regulatory impact assessments, and requirements that decisions to block an investment should be taken at high government levels
Insecurity, polio vaccination rates, and polio incidence in northwest Pakistan.
Verma, Amol A; Jimenez, Marcia P; Tangermann, Rudolf H; Subramanian, S V; Razak, Fahad
2018-02-13
Pakistan is one of three countries in which endemic transmission of poliovirus has never been stopped. Insecurity is often cited but poorly studied as a barrier to eradicating polio. We analyzed routinely collected health data from 32 districts of northwest Pakistan and constructed an index of insecurity based on journalistic reports of the monthly number of deaths and injuries resulting from conflict-related security incidents. The primary outcomes were the monthly incidence of paralytic polio cases within each district between 2007 and 2014 and the polio vaccination percentage from 666 district-level vaccination campaigns between 2007 and 2009, targeting ∼5.7 million children. Multilevel Poisson regression controlling for time and district fixed effects was used to model the association between insecurity, vaccinator access, vaccination rates, and polio incidence. The number of children inaccessible to vaccinators was 19.7% greater (95% CI: 19.2-20.2%), and vaccination rates were 5.3% lower (95% CI: 5.2-5.3%) in "high-insecurity" campaigns compared with "secure" campaigns. The unadjusted mean vaccination rate was 96.3% (SD = 8.6) in secure campaigns and 88.3% (SD = 19.2) in high-insecurity campaigns. Polio incidence was 73.0% greater (95% CI: 30-131%) during high-insecurity months (unadjusted mean = 0.13 cases per million people, SD = 0.71) compared with secure months (unadjusted mean = 1.23 cases per million people, SD = 4.28). Thus, insecurity was associated with reduced vaccinator access, reduced polio vaccination, and increased polio incidence in northwest Pakistan. These findings demonstrate that insecurity is an important obstacle to global polio eradication.
Trub, Leora; Quinlan, Ella; Starks, Tyrel J; Rosenthal, Lisa
2017-09-01
With increasing numbers of same-sex couples raising children in the United States, discriminatory attitudes toward children of same-sex parents (ACSSP) are of increasing concern. As with other forms of stigma and discrimination, lesbian, gay, and bisexual (LGB) individuals are at risk for internalizing these societal attitudes, which can negatively affect parenting-related decisions and behaviors and the mental and physical health of their children. Secure attachment is characterized by positive views of the self as loveable and worthy of care that are understood to develop in early relationships with caregivers. Secure attachment has been associated with positive mental and physical health, including among LGB individuals and couples. This study aimed to test the potential buffering role of secure attachment against stigma internalization by examining associations among secure attachment, discrimination, internalized homonegativity (IH), and ACSSP in an online survey study of 209 U.S. adults in same-sex relationships. Bootstrap analyses supported our hypothesized moderated mediation model, with secure attachment being a buffer. Greater discrimination was indirectly associated with more negative ACSSP through greater IH for individuals with mean or lower levels, but not for individuals with higher than average levels of secure attachment, specifically because among those with higher levels of secure attachment, discrimination was not associated with IH. These findings build on and extend past research, with important implications for future research and clinical work with LGB individuals, same-sex couples, and their families, including potential implementation of interventions targeting attachment security. © 2016 Family Process Institute.
Ojiako, Okey A; Ogbuji, Chiza A; Agha, Ngozi C; Onwuliri, Viola A
2010-10-01
The proximate, nutritional, and antinutritional compositions of the raw, cooked, and roasted samples of four Nigerian indigenous seeds-Sphenostylis stenocarpa, Pentaclethra macrophylla, Mucuna flagellipes, and Citrullus colocynthis-were evaluated. Also estimated were zinc and divalent cation bioavailability of the seeds using millimolar ratios/kg dry weight of [calcium]/[phytate], [phytate]/[zinc], [calcium][phytate]/[Zn], and [phytate]/[total phosphorus]. The results obtained revealed that the seeds of P. macrophylla and C. colocynthis had high protein and lipid levels. All the seeds were also found to have high energy value and low moisture content. Mineral analysis showed the presence of Na, K, Ca, and Mg in appreciable quantities and Zn, I, Fe, and Se in minute quantities. Antinutritional analyses indicated the presence of traces of tannin, oxalate, phytate, saponin, and cyanide in the samples. The various processing techniques had significant (P ≤ .05) effects on the measured parameters. The calculated [Ca][phytate]/[Zn] molar ratios revealed that these seeds had values above the critical level of 0.5 mL/kg, thus indicating reduced bioavailability of zinc. In view of the high nutrient contents, low antinutritional contents after processing, and their superabundance, these seeds could be cheap nutrient sources. The implications of these findings with regards to food security are enormous.
Khac Hai, Nguyen; Lawpoolsri, Saranath; Jittamala, Podjanee; Thi Thu Huong, Phan; Kaewkungwal, Jaranit
2017-01-01
Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs) in Vietnam. A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique. In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44-9.67); staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39-11.32) and moderate knowledge levels (OR: 5.10; 95%CI: 2.36-11.00); and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices) and moderate perception levels (OR: 5.67; 95%CI: 2.93-10.95). Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29-3.65). Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate healthcare clinics (HIV-OPC) into units integrated into general hospitals/healthcare facilities. The findings of this study highlight topics that could be used for improving management and operation of information system and revising guidelines and regulations on protection measures/strategies for data security and confidentiality of HIV/AIDS patients by Vietnam health authorities or other countries facing similar situations. Secure infrastructure and secure measures for data access and use are very important, worthwhile investments. The provision of continuous training and active enforcement and monitoring of the practices of healthcare personnel might lead to an improved understanding and acknowledegement of the importance of national policies/guidelines regarding HIV-related patient information.
Doocy, Shannon; Tappis, Hannah; Lyles, Emily; Witiw, Joseph; Aken, Vicki
2017-06-01
The war in Syria has left millions struggling to survive amidst violent conflict, pervasive unemployment, and food insecurity. Although international assistance funding is also at an all-time high, it is insufficient to meet the needs of conflict-affected populations, and there is increasing pressure on humanitarian stakeholders to find more efficient, effective ways to provide assistance. To evaluate 3 different assistance programs (in-kind food commodities, food vouchers, and unrestricted vouchers) in Idleb Governorate of Syria from December 2014 and March 2015. The evaluation used repeated survey data from beneficiary households to determine whether assistance was successful in maintaining food security at the household level. Shopkeeper surveys and program monitoring data were used to assess the impact on markets at the district/governorate levels and compare the cost-efficiency and cost-effectiveness of transfer modalities. Both in-kind food assistance and voucher programs showed positive effects on household food security and economic measures in Idleb; however, no intervention was successful in improving all outcomes measured. Food transfers were more likely to improve food access and food security than vouchers and unrestricted vouchers. Voucher programs were found to be more cost-efficient than in-kind food assistance, and more cost-effective for increasing household food consumption. Continuation of multiple types of transfer programs, including both in-kind assistance and vouchers, will allow humanitarian actors to remain responsive to evolving access and security considerations, local needs, and market dynamics.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification General § 9701.204 Definitions. In this subpart: Band means a work level or...
Code of Federal Regulations, 2014 CFR
2014-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification General § 9701.204 Definitions. In this subpart: Band means a work level or...
Code of Federal Regulations, 2012 CFR
2012-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification General § 9701.204 Definitions. In this subpart: Band means a work level or...
Code of Federal Regulations, 2013 CFR
2013-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification General § 9701.204 Definitions. In this subpart: Band means a work level or...
Code of Federal Regulations, 2010 CFR
2010-10-01
... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7101 Policy. HHS is responsible for implementing an information security program to ensure that its information systems and... information contained in those systems. Each system's level of security shall protect the integrity...
1996-10-01
Diet 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF THIS PAGE...approach, Frank et al. (1993) compared DDE and PCB residues in the general diet with blood levels of Ontario residents. Blood samples were obtained from...sources of PCBs and HCB in this geographical region. In a similar study, Kashyap et al. (1994) monitored DDT levels in duplicate diet samples and
1992-10-16
the DNA Fingerprint Laboratory. The Los Angeles Police Department and its former Chief, Daryl Gates for permitting a secret unit, the ...authorized to change information in. Conclusions Where angels fear .... Of all the reasons for compartmentation for which the level of evaluation...database, and a security label attribute is associated with data in each tuple in a relation. The range and distribution of security levels may
Health Information Security in Hospitals: the Application of Security Safeguards.
Mehraeen, Esmaeil; Ayatollahi, Haleh; Ahmadi, Maryam
2016-02-01
A hospital information system has potentials to improve the accessibility of clinical information and the quality of health care. However, the use of this system has resulted in new challenges, such as concerns over health information security. This paper aims to assess the status of information security in terms of administrative, technical and physical safeguards in the university hospitals. This was a survey study in which the participants were information technology (IT) managers (n=36) who worked in the hospitals affiliated to the top ranked medical universities (university A and university B). Data were collected using a questionnaire. The content validity of the questionnaire was examined by the experts and the reliability of the questionnaire was determined using Cronbach's coefficient alpha (α=0.75). The results showed that the administrative safeguards were arranged at a medium level. In terms of the technical safeguards and the physical safeguards, the IT managers rated them at a strong level. According to the results, among three types of security safeguards, the administrative safeguards were assessed at the medium level. To improve it, developing security policies, implementing access control models and training users are recommended.
Method for secure electronic voting system: face recognition based approach
NASA Astrophysics Data System (ADS)
Alim, M. Affan; Baig, Misbah M.; Mehboob, Shahzain; Naseem, Imran
2017-06-01
In this paper, we propose a framework for low cost secure electronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.
Kaiser, Michelle L; Cafer, Anne
2018-01-01
The United States is facing two interconnected social and public health crises of severe obesity and food insecurity within the social-ecological environment. Marginalized groups experience the highest rates and the greatest impacts in terms of morbidity, mortality, and financial burdens. Consequences include experiencing multimorbidities, mental health issues, and decreased quality of life. Food pantries have served as spaces to obtain food to meet household needs, but for some, food pantries have become long-term solutions. We surveyed 2,634 people who accessed pantries in 2005, 2010, and 2013 across 32 counties in a Midwest state. The authors sought to understand to what extent does length of time using a food pantry, food security status, income sources, use of federal food benefits, visiting a doctor, and demographic variables increase odds of severe obesity. More than 14% were severely obese; those who were long-term food pantry users and very low food secure were 1.732 times more likely to be severely obese. Receiving Disability/Supplemental Security Income, seeing a doctor in the last year, being female, and older age reduced the odds of severe obesity. Discussion includes implications for social workers who interact with groups likely to experience very low food security and severe obesity at different systems levels.
On the security of consumer wearable devices in the Internet of Things.
Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus
2018-01-01
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands.
On the security of consumer wearable devices in the Internet of Things
Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus
2018-01-01
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands. PMID:29668756
Physical and property victimization behind bars: a multilevel examination.
Lahm, Karen F
2009-06-01
The majority of the extant literature on inmate victimization considers only one level of analysis, thus ignoring the interaction effects between inmate- and prison-level variables. To extend this literature, multilevel modeling techniques were used to analyze self-report data from more than 1,000 inmates and 30 prisons in Kentucky, Tennessee, and Ohio. Results revealed that demographic variables were strong predictors of physical victimization (i.e., race and assaultive behavior). Also, security level had a contextual direct effect on physical victimization. Property victimization was best explained with an integrated model including inmate (i.e., race, assaultive behavior, prior education, prior employment, and time served), contextual (i.e., security level and proportion non-White), and micro-macro interaction variables (i.e., Race x Security Level). Policy implications and suggestions for future research are discussed.
Predicting Catastrophic BGP Routing Instabilities
2004-03-01
predict a BGP routing instability confine their focus to either macro- or micro -level metrics, but not to both. The inherent limitations of each of...Level and Micro -Level Metrics Correlation; Worm Attack Studies; 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY... micro -level metrics, but not to both. The inherent limitations of each of these forms of metric gives rise to an excessive rate of spurious alerts
Fuzzy assessment of health information system users' security awareness.
Aydın, Özlem Müge; Chouseinoglou, Oumout
2013-12-01
Health information systems (HIS) are a specific area of information systems (IS), where critical patient data is stored and quality health service is only realized with the correct use and efficient dissemination of this data to health workers. Therefore, a balance needs to be established between the levels of security and flow of information on HIS. Instead of implementing higher levels and further mechanisms of control to increase the security of HIS, it is preferable to deal with the arguably weakest link on HIS chain with respect to security: HIS users. In order to provide solutions and approaches for transforming users to the first line of defense in HIS but also to employ capable and appropriate candidates from the pool of newly graduated students, it is important to assess and evaluate the security awareness levels and characteristics of these existing and future users. This study aims to provide a new perspective to understand the phenomenon of security awareness of HIS users with the use of fuzzy analysis, and to assess the present situation of current and future HIS users of a leading medical and educational institution of Turkey, with respect to their security characteristics based on four different security scales. The results of the fuzzy analysis, the guide on how to implement this fuzzy analysis to any health institution and how to read and interpret these results, together with the possible implications of these results to the organization are provided.
Muhammad, Khan; Sajjad, Muhammad; Baik, Sung Wook
2016-05-01
In this paper, the problem of secure transmission of sensitive contents over the public network Internet is addressed by proposing a novel data hiding method in encrypted images with dual-level security. The secret information is divided into three blocks using a specific pattern, followed by an encryption mechanism based on the three-level encryption algorithm (TLEA). The input image is scrambled using a secret key, and the encrypted sub-message blocks are then embedded in the scrambled image by cyclic18 least significant bit (LSB) substitution method, utilizing LSBs and intermediate LSB planes. Furthermore, the cover image and its planes are rotated at different angles using a secret key prior to embedding, deceiving the attacker during data extraction. The usage of message blocks division, TLEA, image scrambling, and the cyclic18 LSB method results in an advanced security system, maintaining the visual transparency of resultant images and increasing the security of embedded data. In addition, employing various secret keys for image scrambling, data encryption, and data hiding using the cyclic18 LSB method makes the data recovery comparatively more challenging for attackers. Experimental results not only validate the effectiveness of the proposed framework in terms of visual quality and security compared to other state-of-the-art methods, but also suggest its feasibility for secure transmission of diagnostically important keyframes to healthcare centers and gastroenterologists during wireless capsule endoscopy.
Hollin, Clive R; Davies, Steffan; Duggan, Conor; Huband, Nick; McCarthy, Lucy; Clarke, Martin
2013-07-01
Patients who set fires are a perennial cause of concern with psychiatric services although perhaps rather neglected in the clinical research literature. The current study considered the characteristics on admission of 129 patients, 93 men and 36 women, with a known history of arson who had been admitted to a medium secure psychiatric hospital. The distinguishing characteristics of the sample were high numbers of patients with extensive criminal histories, most probably due to high levels of prison transfer and a higher occurrence of mental illness than psychopathic disorder. Aside from return to prison, most patients were discharged either to another psychiatric hospital or directly to the community. There was a high rate of re-conviction after discharge, mainly for minor offences, with about one in 10 of discharged patients committing arson. It was established, however, that not all incidents of arson led to a prosecution. It is concluded that there are weaknesses in the areas of both risk assessment and evidence-based treatment for arsonists.
Food Security and Diet Among American Indians in the Midwest.
Berryhill, Kelly; Hale, Jason; Chase, Brian; Clark, Lauren; He, Jianghua; Daley, Christine M
2018-04-05
The purpose of this study was to determine levels of food security among American Indians (AI) living in the Midwest and possible correlations between food security levels and various health outcomes, diet, and demographic variables. This study used a cross-sectional design to determine health behaviors among AI. Participants (n = 362) were recruited by AI staff through various cultural community events in the Midwest, such as powwows and health fairs. Inclusion criteria included the following: age 18 years or older, self-identify as an AI, and willing to participate in the survey. Of all participants, 210 (58%) had either low or very low food security, with 96 in the very low category (26.5%). Participants with very low food security tended to have significantly more chronic conditions. Additional significant differences for very low food security existed by demographic variables, including having no insurance (p < 0.0001) or having a regular primary care provider (p = 0.0354). There was also a significant difference between food security levels and the consumption of fast food within the past week (p value = 0.0420), though no differences were found in fruit and vegetable consumption. AI in our sample had higher levels of food insecurity than those reported in the literature for other racial/ethnic groups. AI and non-Native health professionals should be aware of the gravity of food insecurity and the impact it has on overall health. Additional research is needed to determine specific aspects of food insecurity affecting different Native communities to develop appropriate interventions.
Secure Obfuscation for Encrypted Group Signatures
Fan, Hongfei; Liu, Qin
2015-01-01
In recent years, group signature techniques are widely used in constructing privacy-preserving security schemes for various information systems. However, conventional techniques keep the schemes secure only in normal black-box attack contexts. In other words, these schemes suppose that (the implementation of) the group signature generation algorithm is running in a platform that is perfectly protected from various intrusions and attacks. As a complementary to existing studies, how to generate group signatures securely in a more austere security context, such as a white-box attack context, is studied in this paper. We use obfuscation as an approach to acquire a higher level of security. Concretely, we introduce a special group signature functionality-an encrypted group signature, and then provide an obfuscator for the proposed functionality. A series of new security notions for both the functionality and its obfuscator has been introduced. The most important one is the average-case secure virtual black-box property w.r.t. dependent oracles and restricted dependent oracles which captures the requirement of protecting the output of the proposed obfuscator against collision attacks from group members. The security notions fit for many other specialized obfuscators, such as obfuscators for identity-based signatures, threshold signatures and key-insulated signatures. Finally, the correctness and security of the proposed obfuscator have been proven. Thereby, the obfuscated encrypted group signature functionality can be applied to variants of privacy-preserving security schemes and enhance the security level of these schemes. PMID:26167686
NASA Astrophysics Data System (ADS)
Cayirci, Erdal; Rong, Chunming; Huiskamp, Wim; Verkoelen, Cor
Military/civilian education training and experimentation networks (ETEN) are an important application area for the cloud computing concept. However, major security challenges have to be overcome to realize an ETEN. These challenges can be categorized as security challenges typical to any cloud and multi-level security challenges specific to an ETEN environment. The cloud approach for ETEN is introduced and its security challenges are explained in this paper.
Cybersecurity in Hospitals: A Systematic, Organizational Perspective
Kaiser, Jessica P
2018-01-01
Background Cybersecurity incidents are a growing threat to the health care industry in general and hospitals in particular. The health care industry has lagged behind other industries in protecting its main stakeholder (ie, patients), and now hospitals must invest considerable capital and effort in protecting their systems. However, this is easier said than done because hospitals are extraordinarily technology-saturated, complex organizations with high end point complexity, internal politics, and regulatory pressures. Objective The purpose of this study was to develop a systematic and organizational perspective for studying (1) the dynamics of cybersecurity capability development at hospitals and (2) how these internal organizational dynamics interact to form a system of hospital cybersecurity in the United States. Methods We conducted interviews with hospital chief information officers, chief information security officers, and health care cybersecurity experts; analyzed the interview data; and developed a system dynamics model that unravels the mechanisms by which hospitals build cybersecurity capabilities. We then use simulation analysis to examine how changes to variables within the model affect the likelihood of cyberattacks across both individual hospitals and a system of hospitals. Results We discuss several key mechanisms that hospitals use to reduce the likelihood of cybercriminal activity. The variable that most influences the risk of cyberattack in a hospital is end point complexity, followed by internal stakeholder alignment. Although resource availability is important in fueling efforts to close cybersecurity capability gaps, low levels of resources could be compensated for by setting a high target level of cybersecurity. Conclusions To enhance cybersecurity capabilities at hospitals, the main focus of chief information officers and chief information security officers should be on reducing end point complexity and improving internal stakeholder alignment. These strategies can solve cybersecurity problems more effectively than blindly pursuing more resources. On a macro level, the cyber vulnerability of a country’s hospital infrastructure is affected by the vulnerabilities of all individual hospitals. In this large system, reducing variation in resource availability makes the whole system less vulnerable—a few hospitals with low resources for cybersecurity threaten the entire infrastructure of health care. In other words, hospitals need to move forward together to make the industry less attractive to cybercriminals. Moreover, although compliance is essential, it does not equal security. Hospitals should set their target level of cybersecurity beyond the requirements of current regulations and policies. As of today, policies mostly address data privacy, not data security. Thus, policy makers need to introduce policies that not only raise the target level of cybersecurity capabilities but also reduce the variability in resource availability across the entire health care system. PMID:29807882
ERIC Educational Resources Information Center
De Patta, Joe
2003-01-01
Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…
Desktop Security ... Now More than Ever
ERIC Educational Resources Information Center
Huber, Joe
2005-01-01
Desktop security is the foundation of your overall security plan in K-12 education. National Educational Technology Standards (NETS) mainly states that students at all grade levels should know to make changes in the default settings for the operating system and its applications.
Protecting public surface transportation against terrorism and serious crime : an executive overview
DOT National Transportation Integrated Search
2001-10-01
Because terrorist threats are not easily quantifiable, it is difficult to determine the "right" level of security. Using cost-benefit analysis as the sole criterion to determine the level of security is inadequate. The risk of death to any individual...
20 CFR 408.1001 - Definitions.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS... determination or the reconsidered determination. Mass change means a State-initiated change in the level(s) of... to give up a right knowingly and voluntarily. We, us, or our refers to the Social Security...
20 CFR 408.1001 - Definitions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS... determination or the reconsidered determination. Mass change means a State-initiated change in the level(s) of... to give up a right knowingly and voluntarily. We, us, or our refers to the Social Security...
A Trustworthy Key Generation Prototype Based on DDR3 PUF for Wireless Sensor Networks
Liu, Wenchao; Zhang, Zhenhua; Li, Miaoxin; Liu, Zhenglin
2014-01-01
Secret key leakage in wireless sensor networks (WSNs) is a high security risk especially when sensor nodes are deployed in hostile environment and physically accessible to attackers. With nowadays semi/fully-invasive attack techniques attackers can directly derive the cryptographic key from non-volatile memory (NVM) storage. Physically Unclonable Function (PUF) is a promising technology to resist node capture attacks, and it also provides a low cost and tamper-resistant key provisioning solution. In this paper, we designed a PUF based on double-data-rate SDRAM Type 3 (DDR3) memory by exploring its memory decay characteristics. We also described a prototype of 128-bit key generation based on DDR3 PUF with integrated fuzzy extractor. Due to the wide adoption of DDR3 memory in WSN, our proposed DDR3 PUF technology with high security levels and no required hardware changes is suitable for a wide range of WSN applications. PMID:24984058
Key Reconciliation for High Performance Quantum Key Distribution
Martinez-Mateo, Jesus; Elkouss, David; Martin, Vicente
2013-01-01
Quantum Key Distribution is carving its place among the tools used to secure communications. While a difficult technology, it enjoys benefits that set it apart from the rest, the most prominent is its provable security based on the laws of physics. QKD requires not only the mastering of signals at the quantum level, but also a classical processing to extract a secret-key from them. This postprocessing has been customarily studied in terms of the efficiency, a figure of merit that offers a biased view of the performance of real devices. Here we argue that it is the throughput the significant magnitude in practical QKD, specially in the case of high speed devices, where the differences are more marked, and give some examples contrasting the usual postprocessing schemes with new ones from modern coding theory. A good understanding of its implications is very important for the design of modern QKD devices. PMID:23546440
A Framework for RFID Survivability Requirement Analysis and Specification
NASA Astrophysics Data System (ADS)
Zuo, Yanjun; Pimple, Malvika; Lande, Suhas
Many industries are becoming dependent on Radio Frequency Identification (RFID) technology for inventory management and asset tracking. The data collected about tagged objects though RFID is used in various high level business operations. The RFID system should hence be highly available, reliable, and dependable and secure. In addition, this system should be able to resist attacks and perform recovery in case of security incidents. Together these requirements give rise to the notion of a survivable RFID system. The main goal of this paper is to analyze and specify the requirements for an RFID system to become survivable. These requirements, if utilized, can assist the system in resisting against devastating attacks and recovering quickly from damages. This paper proposes the techniques and approaches for RFID survivability requirements analysis and specification. From the perspective of system acquisition and engineering, survivability requirement is the important first step in survivability specification, compliance formulation, and proof verification.
Dialogue on Climate, Water, Energy and Human Security in Africa
2014-07-01
winter periods. The influence of the ocean mass on the coastal areas can be seen, with slightly lower increases in average temperatures. Figure 1...adaptation 1 1’ ~ + -foradaptllion m \\...A..AJ to reduce risk .... :’\\: " -••• \\ Warming Extreme Extreme Damaging Ocean Sea surface I Precipitation Sea...level Risk level with Risk level with trend temperature precipitation cyclone acidification temperature high adaptation cuJTentadaptation Institutions
Murray, P K
1998-08-01
The unique structure, role and operations of government high-security (HS) laboratories which work on animal diseases are described, with particular reference to the laboratories of nine countries. High-security laboratories provide cost-effective insurance against catastrophic losses which could occur following exotic disease outbreaks. The importance of these laboratories is reflected in the fact that several new laboratories have recently been constructed at considerable expense and older facilities have undergone major renovations. Biosecurity is fundamental to the operation of high-security laboratories, so good facility design and microbiological security practices are very important. High-security laboratories conduct exotic disease diagnosis, certification and surveillance, and also perform research into virology, disease pathogenesis and improvements to diagnostic tests and vaccines. The mandate of these laboratories includes the training of veterinarians in the recognition of exotic diseases. One extremely important role is the provision of expert advice on exotic diseases and participation (both nationally and internationally) in policy decisions regarding animal disease issues.
NASA Astrophysics Data System (ADS)
Siddiqi, A.; Muhammad, A.; Wescoat, J. L., Jr.
2017-12-01
Large-scale, legacy canal systems, such as the irrigation infrastructure in the Indus Basin in Punjab, Pakistan, have been primarily conceived, constructed, and operated with a techno-centric approach. The emerging socio-hydrological approaches provide a new lens for studying such systems to potentially identify fresh insights for addressing contemporary challenges of water security. In this work, using the partial definition of water security as "the reliable availability of an acceptable quantity and quality of water", supply reliability is construed as a partial measure of water security in irrigation systems. A set of metrics are used to quantitatively study reliability of surface supply in the canal systems of Punjab, Pakistan using an extensive dataset of 10-daily surface water deliveries over a decade (2007-2016) and of high frequency (10-minute) flow measurements over one year. The reliability quantification is based on comparison of actual deliveries and entitlements, which are a combination of hydrological and social constructs. The socio-hydrological lens highlights critical issues of how flows are measured, monitored, perceived, and experienced from the perspective of operators (government officials) and users (famers). The analysis reveals varying levels of reliability (and by extension security) of supply when data is examined across multiple temporal and spatial scales. The results shed new light on evolution of water security (as partially measured by supply reliability) for surface irrigation in the Punjab province of Pakistan and demonstrate that "information security" (defined as reliable availability of sufficiently detailed data) is vital for enabling water security. It is found that forecasting and management (that are social processes) lead to differences between entitlements and actual deliveries, and there is significant potential to positively affect supply reliability through interventions in the social realm.
Islanding the power grid on the transmission level: less connections for more security
Mureddu, Mario; Caldarelli, Guido; Damiano, Alfonso; Scala, Antonio; Meyer-Ortmanns, Hildegard
2016-01-01
Islanding is known as a management procedure of the power system that is implemented at the distribution level to preserve sensible loads from outages and to guarantee the continuity in electricity supply, when a high amount of distributed generation occurs. In this paper we study islanding on the level of the transmission grid and shall show that it is a suitable measure to enhance energy security and grid resilience. We consider the German and Italian transmission grids. We remove links either randomly to mimic random failure events, or according to a topological characteristic, their so-called betweenness centrality, to mimic an intentional attack and test whether the resulting fragments are self-sustainable. We test this option via the tool of optimized DC power flow equations. When transmission lines are removed according to their betweenness centrality, the resulting islands have a higher chance of being dynamically self-sustainable than for a random removal. Less connections may even increase the grid’s stability. These facts should be taken into account in the design of future power grids. PMID:27713509
[Food insecurity and social vulnerability in chiapas : the face of poverty].
Martínez-Rodríguez, Julio C; García-Chong, Néstor R; Trujillo-Olivera, Laura E; Noriero-Escalante, Lucio
2014-12-01
To estimate the frequency, distribution, and trends of food security/insecurity conditions of families in Chiapas and their relationship with low income factor and sociodemographic characteristics. Retrospective and cross-sectional descriptive study. Information of 1430 households from The National Health and Nutrition Survey 2012 was included. The Food Insecurity was measured using the harmonized version of the Latin and Caribbean Food Security Scale for México. 83% of households in Chiapas has some type of food insecurity, 86.5% is concentrated in the lower socioeconomic levels, 85% of households in rural areas have food insecurity, 87% of households beneficiary of Oportunidades still have food insecurity. A large part of this population continues to have high levels of Food Insecurity. Clearly targeted social programs designed to eliminate this lag, fail to reduce levels of access to food which affects the physical and intellectual potential development of Chiapas people, becoming an obstacle to the development of the State. Reorientation of food policy in México is considered. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.
Allen, Joseph P.; Porter, Maryfrances R.; McFarland, F. Christy; Marsh, Penny; McElhaney, Kathleen Boykin
2006-01-01
This study assessed the hypothesis that popularity in adolescence takes on a twofold role, both marking high levels of concurrent psychosocial adaptation, but also predicting increases over time in both positive and negative behaviors sanctioned by peer norms. This hypothesis was tested with multi-method, longitudinal data obtained on a diverse community sample of 185 adolescents. Sociometric popularity data were examined in relation to data from interview-based assessments of attachment security and ego development, observations of mother-adolescent interactions, and repeated self- and peer-report assessments of delinquency and alcohol use. Results indicated that popular adolescents displayed higher concurrent levels of ego development, secure attachment and more adaptive interactions with mothers and best friends. Longitudinal analyses supported a “popularity-socialization” hypothesis, however, in which popular adolescents were more likely to increase in behaviors that receive approval in the peer group (e.g., minor levels of drug use and delinquency) and decrease in behaviors unlikely to be well-received by peers (e.g., hostile behavior with peers). PMID:15892790
Islanding the power grid on the transmission level: less connections for more security
NASA Astrophysics Data System (ADS)
Mureddu, Mario; Caldarelli, Guido; Damiano, Alfonso; Scala, Antonio; Meyer-Ortmanns, Hildegard
2016-10-01
Islanding is known as a management procedure of the power system that is implemented at the distribution level to preserve sensible loads from outages and to guarantee the continuity in electricity supply, when a high amount of distributed generation occurs. In this paper we study islanding on the level of the transmission grid and shall show that it is a suitable measure to enhance energy security and grid resilience. We consider the German and Italian transmission grids. We remove links either randomly to mimic random failure events, or according to a topological characteristic, their so-called betweenness centrality, to mimic an intentional attack and test whether the resulting fragments are self-sustainable. We test this option via the tool of optimized DC power flow equations. When transmission lines are removed according to their betweenness centrality, the resulting islands have a higher chance of being dynamically self-sustainable than for a random removal. Less connections may even increase the grid’s stability. These facts should be taken into account in the design of future power grids.
NASA Astrophysics Data System (ADS)
Krell, N.; Evans, T. P.; Estes, L. D.; Caylor, K. K.
2017-12-01
While international metrics of food security and water availability are generated as spatial averages at the regional to national levels, climate variability impacts are differentially felt at the household level. This project investigated scales of variability of climate impacts on smallholder farmers using social and environmental data in central Kenya. Using sub-daily real-time environmental measurements to monitor smallholder agriculture, we investigated how changes in seasonal precipitation affected food security around Laikipia county from September 2015 to present. We also conducted SMS-based surveys of over 700 farmers to understand farmers' decision-making within the growing season. Our results highlight field-scale heterogeneity in biophysical and social factors governing crop yields using locally sensed real-time environmental data and weekly farmer-reported information about planting, harvesting, irrigation, and crop yields. Our preliminary results show relationships between changes in seasonal precipitation, NDVI, and soil moisture related to crop yields and decision-making at several scales. These datasets present a unique opportunity to collect highly spatially and temporally resolved information from data-poor regions at the household level.
NASA Astrophysics Data System (ADS)
Zhao, Weichen; Sun, Zhuo; Kong, Song
2016-10-01
Wireless devices can be identified by the fingerprint extracted from the signal transmitted, which is useful in wireless communication security and other fields. This paper presents a method that extracts fingerprint based on phase noise of signal and multiple level wavelet decomposition. The phase of signal will be extracted first and then decomposed by multiple level wavelet decomposition. The statistic value of each wavelet coefficient vector is utilized for constructing fingerprint. Besides, the relationship between wavelet decomposition level and recognition accuracy is simulated. And advertised decomposition level is revealed as well. Compared with previous methods, our method is simpler and the accuracy of recognition remains high when Signal Noise Ratio (SNR) is low.
Neller, Daniel J; Vitacco, Michael J; Magaletta, Philip R; Phillips-Boyles, A Brooke
2016-03-01
Research supports the effectiveness of the Risk-Needs-Responsivity model for reducing criminal recidivism. Yet programming interests of inmates--one facet of responsivity--remain an understudied phenomenon. In the present study, we explored the programming interests of 753 federal inmates housed across three levels of security. Results suggest that inmates, as a group, prefer specific programs over others, and that some of their interests may differ by security level. We discuss possible implications of these findings. © The Author(s) 2014.
VanTieghem, Michelle R.; Gabard-Durnam, Laurel; Goff, Bonnie; Flannery, Jessica; Humphreys, Kathryn L.; Telzer, Eva H.; Caldera, Christina; Louie, Jennifer Y.; Shapiro, Mor; Bolger, Niall; Tottenham, Nim
2018-01-01
Institutional caregiving is associated with significant deviations from species-expected caregiving, altering the normative sequence of attachment formation and placing children at risk for long-term emotional difficulties. However, little is known about factors that can promote resilience following early institutional caregiving. In the current study, we investigated how adaptations in affective processing (i.e. positive valence bias) and family-level protective factors (i.e. secure parent-child relationships) moderate risk for internalizing symptoms in Previously Institutionalized (PI) youth. Children and adolescents with and without a history of institutional care performed a laboratory-based affective processing task and self-reported measures of parent-child relationship security. PI youth were more likely than comparison youth to show positive valence biases when interpreting ambiguous facial expressions. Both positive valence bias and parent-child relationship security moderated the association between institutional care and parent-reported internalizing symptoms, such that greater positive valence bias and more secure parent-child relationships predicted fewer symptoms in PI youth. However, when both factors were tested concurrently, parent-child relationship security more strongly moderated the link between PI status and internalizing symptoms. These findings suggest that both individual-level adaptations in affective processing and family-level factors of secure parent-child relationships may ameliorate risk for internalizing psychopathology following early institutional caregiving. PMID:28401841
Vantieghem, Michelle R; Gabard-Durnam, Laurel; Goff, Bonnie; Flannery, Jessica; Humphreys, Kathryn L; Telzer, Eva H; Caldera, Christina; Louie, Jennifer Y; Shapiro, Mor; Bolger, Niall; Tottenham, Nim
2017-05-01
Institutional caregiving is associated with significant deviations from species-expected caregiving, altering the normative sequence of attachment formation and placing children at risk for long-term emotional difficulties. However, little is known about factors that can promote resilience following early institutional caregiving. In the current study, we investigated how adaptations in affective processing (i.e., positive valence bias) and family-level protective factors (i.e., secure parent-child relationships) moderate risk for internalizing symptoms in previously institutionalized (PI) youth. Children and adolescents with and without a history of institutional care performed a laboratory-based affective processing task and self-reported measures of parent-child relationship security. PI youth were more likely than comparison youth to show positive valence biases when interpreting ambiguous facial expressions. Both positive valence bias and parent-child relationship security moderated the association between institutional care and parent-reported internalizing symptoms, such that greater positive valence bias and more secure parent-child relationships predicted fewer symptoms in PI youth. However, when both factors were tested concurrently, parent-child relationship security more strongly moderated the link between PI status and internalizing symptoms. These findings suggest that both individual-level adaptations in affective processing and family-level factors of secure parent-child relationships may ameliorate risk for internalizing psychopathology following early institutional caregiving.
Comprehensive evaluation of ecological security in mining area based on PSR-ANP-GRAY.
He, Gang; Yu, Baohua; Li, Shuzhou; Zhu, Yanna
2017-09-06
With the large exploitation of mineral resources, a series of problems have appeared in the ecological environment of the mining area. Therefore, evaluating the ecological security of mining area is of great significance to promote its healthy development. In this paper, the evaluation index system of ecological security in mining area was constructed from three dimensions of nature, society and economy, combined with Pressure-State-Response framework model. Then network analytic hierarchy process and GRAY relational analysis method were used to evaluate the ecological security of the region, and the weighted correlation degree of ecological security was calculated through the index data of a coal mine from 2012 to 2016 in China. The results show that the ecological security in the coal mine area is on the rise as a whole, though it alternatively rose and dropped from 2012 to 2016. Among them, the ecological security of the study mining area is at the general security level from 2012 to 2015, and at a relatively safe level in 2016. It shows that the ecological environment of the study mining area can basically meet the requirement of the survival and development of the enterprises.
Report #18-P-0031, October 30, 2017. Although the EPA has an effective information security program, management emphasis is needed to achieve a higher level of maturity for the agency’s information security program.
Smart Push, Smart Pull, Sensor to Shooter in a Multi-Level Secure/Safe (MLS) Infrastructure
2006-05-04
policy violation with respect to: Security Safety Financial Posture Infrastructure The IATF identifies five levels: V1: Negligible effect V2: Minimal...MLS) Infrastructure Step 2: Determine Threat Levels Best practices also in the IATF Threats are ranked by assessing: Capability Resources Motivation...Risk Willingness The IATF identifies seven levels: T1: Inadvertent or accidental events Tripping over a power cord T2: Minimal resources – willing to
Korean Unification and the Future of the U.S.-ROK Alliance
2016-02-01
institutionalized or largely unstruc-tured. Regardless of form, security alliances as instruments of statecraft, at their most fundamental level , reflect a...a unified Korea would, at a macro level , reinforce the inter- national liberal democratic order. At a micro level , it could help ensure security on...Minister of Defense, which has since become an annual platform for strategic- level consultations on the alliance. Similar- ly, the Military Committee was
SAFETY AND SECURITY BUILDING, TRA614. ELEVATIONS. SECTIONS. TWO ROOF LEVELS. ...
SAFETY AND SECURITY BUILDING, TRA-614. ELEVATIONS. SECTIONS. TWO ROOF LEVELS. BLAW-KNOX 3150-814-2, 3/1950. INL INDEX NO. 531-0614-00-098-100703, REV. 6. - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
Systems Security Engineering Capability Maturity Model SSE-CMM Model Description Document
1999-04-01
management is the process of accessing and quantifying risk , and establishing an acceptable level of risk for the organization. Managing risk is an...Process of assessing and quantifying risk and establishing acceptable level of risk for the organization. [IEEE 13335-1:1996] Security Engineering
17 CFR 15.03 - Reporting levels.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Reporting levels. 15.03 Section 15.03 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION REPORTS-GENERAL... $10.00 if in the money upon expiration. Major foreign currency is the currency, and the cross-rates...
The research of computer network security and protection strategy
NASA Astrophysics Data System (ADS)
He, Jian
2017-05-01
With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.
NASA Astrophysics Data System (ADS)
Feng, Nan; Wu, Harris; Li, Minqiang; Wu, Desheng; Chen, Fuzan; Tian, Jin
2016-09-01
Information sharing across organisations is critical to effectively managing the security risks of inter-organisational information systems. Nevertheless, few previous studies on information systems security have focused on inter-organisational information sharing, and none have studied the sharing of inferred beliefs versus factual observations. In this article, a multiagent collaborative model (MACM) is proposed as a practical solution to assess the risk level of each allied organisation's information system and support proactive security treatment by sharing beliefs on event probabilities as well as factual observations. In MACM, for each allied organisation's information system, we design four types of agents: inspection agent, analysis agent, control agent, and communication agent. By sharing soft findings (beliefs) in addition to hard findings (factual observations) among the organisations, each organisation's analysis agent is capable of dynamically predicting its security risk level using a Bayesian network. A real-world implementation illustrates how our model can be used to manage security risks in distributed information systems and that sharing soft findings leads to lower expected loss from security risks.
1989-01-01
heart disease as described by the National Institutes of Health Conference on Obesity. Fat is clearly the culprit, not total body weight. Overweight is...requiring high-level security clearance, long lead time and specialized training, or overseas screening. This expanded window will allow most personnel with ...replaced with a comprehensive Career Leader Development Program (CLDP). CLDP will include Petty officer Indoctrination Course (POIC); Chief Petty officer
2013-09-01
control GCE ground combat element LCE logistics combat element MAGTF Marine Air Ground Task Force MWCS Marine Wing Communications Squadron NPS Naval...elements: command element (CE), ground combat el- ement ( GCE ), aviation combat element (ACE), and logistics combat element (LCE). Each ele- ment...This layer provides unimpeded high-speed connectivity between remote sites and the Internet. Limited security policies are applied at this level to
USDA-ARS?s Scientific Manuscript database
Grass pea (Lathyrus sativus L.) is an important food crop for human health and food security, however its seed contains high levels of the neurotoxin ß-ODAP. Previous work demonstrated that ß-ODAP content changes during early developmental stages of grass pea. Further, the regulation and mechanisms ...
The PRC Decision-Making Process
2002-03-01
REPORT DATE March 2002 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE The PRC Decision - Making ...of crisis. It explores who has the authority to make decisions in China today and who will have this authority as new leaders...security and foreign policy decision - making during times of crisis. The April 2001 EP-3 incident is examined to assess high-level
2008-12-01
time- on-task in deploying a patrol force, for example. In its most basic form, an FOB consists of a ring of barbed wire around a position with a...Modernizing The Marine Corps’ CH- 53 Super Stallion Helicopter,” Thesis, NPS (December 2001). HIGH LEVEL OF IMPORTANCE LOW 62 TASKS
Securing the future of natural rubber – an American tire and bio-energy platform from guayule
USDA-ARS?s Scientific Manuscript database
There is a high level of interest in alternative sources of natural rubber for the tire industry due to both the price and supply volatility of Hevea brasiliensis. The guayule plant (Parthenium argentatum) has served as a major source of domestic natural rubber in the early 20th century and is being...
Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor
Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung
2018-01-01
Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies. PMID:29695113
Tipton, Stephen J; Forkey, Sara; Choi, Young B
2016-04-01
This paper examines various methods encompassing the authentication of users in accessing Electronic Medical Records (EMRs). From a methodological perspective, multiple authentication methods have been researched from both a desktop and mobile accessibility perspective. Each method is investigated at a high level, along with comparative analyses, as well as real world examples. The projected outcome of this examination is a better understanding of the sophistication required in protecting the vital privacy constraints of an individual's Protected Health Information (PHI). In understanding the implications of protecting healthcare data in today's technological world, the scope of this paper is to grasp an overview of confidentiality as it pertains to information security. In addressing this topic, a high level overview of the three goals of information security are examined; in particular, the goal of confidentiality is the primary focus. Expanding upon the goal of confidentiality, healthcare accessibility legal aspects are considered, with a focus upon the Health Insurance Portability and Accountability Act of 1996 (HIPAA). With the primary focus of this examination being access to EMRs, the paper will consider two types of accessibility of concern: access from a physician, or group of physicians; and access from an individual patient.
Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor.
Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung
2018-04-24
Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies.
[How to establish the hospital information system security policies].
Gong, Qing-Yue; Shi, Cheng
2008-03-01
It is important to establish the hospital information system security policies. While these security policies are being established, a comprehensive consideration should be given to the acceptable levels of users, IT supporters and hospital managers. We should have a formal policy designing process that is consistently followed by all security policies. Reasons for establishing the security policies and their coverage and applicable objects should be stated clearly. Besides, each policy should define user's responsibilities and penalties of violation. Every organization will need some key policies, such as of information sources usage, remote access, information protection, perimeter security, and baseline host/device security. Security managing procedures are the mechanisms to enforce the policies. An incident-handling procedure is the most important security managing procedure for all organizations.
Green Secure Processors: Towards Power-Efficient Secure Processor Design
NASA Astrophysics Data System (ADS)
Chhabra, Siddhartha; Solihin, Yan
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.
HIPAA Compliance in U.S. Hospitals: A Self-Report of Progress Toward the Security Rule
Having, Karen; Davis, Diane C
2005-01-01
In January 2004, a random sampling of 1,000 U.S. hospitals was surveyed by researchers at a midwestern university to determine perceived level of compliance with the security requirements of the federal Health Insurance Portability and Accountability Act (HIPAA). Exactly one year later, a follow-up survey was sent to the 286 respondents of the 2004 survey, yielding a 50 percent return rate (n = 144). There was an overall trend in increased HIPAA security compliance from 2004 to 2005. There was no significant difference in perceived level of compliance based on the size of the hospital for the majority of security standards. PMID:18066377
18 CFR 3a.41 - Access requirements.
Code of Federal Regulations, 2011 CFR
2011-04-01
... level of such clearance (Top Secret, Secret, Confidential). The Personnel Security Officer will maintain.... Additionally, when a staff member no longer needs access to a particular security classification category, the security clearance will be adjusted to the classification category required. In both cases, this action...
Sparks, Lauren A; Trentacosta, Christopher J; Owusu, Erika; McLear, Caitlin; Smith-Darden, Joanne
2018-08-01
Secure attachment relationships have been linked to social competence in at-risk children. In the current study, we examined the role of parent secure base scripts in predicting at-risk kindergarteners' social competence. Parent representations of secure attachment were hypothesized to mediate the relationship between lower family cumulative risk and children's social competence. Participants included 106 kindergarteners and their primary caregivers recruited from three urban charter schools serving low-income families as a part of a longitudinal study. Lower levels of cumulative risk predicted greater secure attachment representations in parents, and scores on the secure base script assessment predicted children's social competence. An indirect relationship between lower cumulative risk and kindergarteners' social competence via parent secure base script scores was also supported. Parent script-based representations of the attachment relationship appear to be an important link between lower levels of cumulative risk and low-income kindergarteners' social competence. Implications of these findings for future interventions are discussed.
Assessing Security of Supply: Three Methods Used in Finland
NASA Astrophysics Data System (ADS)
Sivonen, Hannu
Public Private Partnership (PPP) has an important role in securing supply in Finland. Three methods are used in assessing the level of security of supply. First, in national expert groups, a linear mathematical model has been used. The model is based on interdependency estimates. It ranks societal functions or its more detailed components, such as items in the food supply chain, according to the effect and risk pertinent to the interdependencies. Second, the security of supply is assessed in industrial branch committees (clusters and pools) in the form of indicators. The level of security of supply is assessed against five generic factors (dimension 1) and tens of business branch specific functions (dimension 2). Third, in two thousand individual critical companies, the maturity of operational continuity management is assessed using Capability Maturity Model (CMM) in an extranet application. The pool committees and authorities obtain an anonymous summary. The assessments are used in allocating efforts for securing supply. The efforts may be new instructions, training, exercising, and in some cases, investment and regulation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Morellas, Vassilios; Johnson, Andrew; Johnston, Chris
2006-07-01
Thermal imaging is rightfully a real-world technology proven to bring confidence to daytime, night-time and all weather security surveillance. Automatic image processing intrusion detection algorithms are also a real world technology proven to bring confidence to system surveillance security solutions. Together, day, night and all weather video imagery sensors and automated intrusion detection software systems create the real power to protect early against crime, providing real-time global homeland protection, rather than simply being able to monitor and record activities for post event analysis. These solutions, whether providing automatic security system surveillance at airports (to automatically detect unauthorized aircraft takeoff andmore » landing activities) or at high risk private, public or government facilities (to automatically detect unauthorized people or vehicle intrusion activities) are on the move to provide end users the power to protect people, capital equipment and intellectual property against acts of vandalism and terrorism. As with any technology, infrared sensors and automatic image intrusion detection systems for global homeland security protection have clear technological strengths and limitations compared to other more common day and night vision technologies or more traditional manual man-in-the-loop intrusion detection security systems. This paper addresses these strength and limitation capabilities. False Alarm (FAR) and False Positive Rate (FPR) is an example of some of the key customer system acceptability metrics and Noise Equivalent Temperature Difference (NETD) and Minimum Resolvable Temperature are examples of some of the sensor level performance acceptability metrics. (authors)« less
Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks.
Zhang, Guomei; Sun, Hao
2016-12-16
We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor's reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured.
International migration: security concerns and human rights standards.
Crépeau, François; Nakache, Delphine; Atak, Idil
2007-09-01
Over the last two decades, the reinforcement of security-related migration policies has resulted in the perception of the foreigner, and especially the irregular migrant, as a category outside the circle of legality. The rights of foreigners in host countries have deteriorated due to the connection made between immigration and criminality. Restrictions imposed upon irregular migrants' basic political and civil rights have been accompanied by major obstacles to their access to economic and social rights, including the right to health. The events of 9/11 further contributed to this trend, which contradicts the basic premises of the human rights paradigm. Recent policy developments and ongoing international cooperation implementing systematic interception and interdiction mechanisms have led to the securitization of migration. The preventive and deterrent measures reinforce the security paradigm. By contrast, various national and international actors have been successful in defending irregular migrants' rights. At the domestic level, the involvement of the judiciary and civil society enhances the rights-based approach to foreigners. The role of judges is vital in holding policy-makers accountable for respecting the high national standards of human rights protection. This article elaborates on the dichotomy between the state's legitimate interest to ensure national security, and its domestic and international obligations to protect human rights for all, including irregular migrants. It focuses on the changing relationship between migration and security, on the one hand, and between state and individual, on the other hand. It affirms the necessity to recognize the pre-eminence of fundamental rights upon security concerns.
Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks
Zhang, Guomei; Sun, Hao
2016-01-01
We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor’s reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured. PMID:27999282