Sample records for information security training

  1. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    ERIC Educational Resources Information Center

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  2. Measuring the Effectiveness of Information Security Training: A Comparative Analysis of Computer-Based Training and Instructor-Based Training

    ERIC Educational Resources Information Center

    Kim, Philip

    2010-01-01

    Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization's information assets. Many financial…

  3. Performance Analysis of Cyber Security Awareness Delivery Methods

    NASA Astrophysics Data System (ADS)

    Abawajy, Jemal; Kim, Tai-Hoon

    In order to decrease information security threats caused by human-related vulnerabilities, an increased concentration on information security awareness and training is necessary. There are numerous information security awareness training delivery methods. The purpose of this study was to determine what delivery method is most successful in providing security awareness training. We conducted security awareness training using various delivery methods such as text based, game based and a short video presentation with the aim of determining user preference delivery methods. Our study suggests that a combined delvery methods are better than individual secrity awareness delivery method.

  4. The Training Deficiency in Corporate America: Training Security Professionals to Protect Sensitive Information

    ERIC Educational Resources Information Center

    Johnson, Kenneth T.

    2017-01-01

    Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…

  5. Information Security – Guidance for Manually Completing the Information Security Awareness Training

    EPA Pesticide Factsheets

    The purpose of this guidance is to provide an alternative manual process for disseminating EPA Information Security Awareness Training (ISAT) materials and collecting results from EPA users who elect to complete the ISAT manually.

  6. 32 CFR 2001.71 - Coverage.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Security Education and Training § 2001.71 Coverage. (a) General. Each department or agency shall establish and maintain a formal security education and training program which provides for initial training, refresher training...

  7. 9 CFR 121.15 - Training.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... must provide information and training on biosafety and security to each individual with access approval... or entity must provide information and training on biosafety and security to each individual not... Internet at http://www.aphis.usda.gov/programs/ag_selectagent/index.html. (b) Refresher training must be...

  8. 42 CFR 73.15 - Training.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... provide information and training on biosafety and security to each individual with access approval from... entity must provide information and training on biosafety and security to each individual not approved... provided under the OSHA Bloodborne Pathogen Standard set forth at 29 CFR 1910.1030. (b) Refresher training...

  9. 49 CFR 172.704 - Training requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND... communication standards of this subchapter. (2) Function-specific training. (i) Each hazmat employee must be... must include company security objectives, organizational security structure, specific security...

  10. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...

  11. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...

  12. Is Seeing Believing? Training Users on Information Security: Evidence from Java Applets

    ERIC Educational Resources Information Center

    Ayyagari, Ramakrishna; Figueroa, Norilyz

    2017-01-01

    Information Security issues are one of the top concerns of CEOs. Accordingly, information systems education and research have addressed security issues. One of the main areas of research is the behavioral issues in Information Security, primarily focusing on users' compliance to information security policies. We contribute to this literature by…

  13. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ....g., system and network administrators, and system/application security officers) must receive... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems...

  14. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ....g., system and network administrators, and system/application security officers) must receive... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems...

  15. 32 CFR 2001.70 - General.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Security Education and Training § 2001.70 General. (a) Purpose. This subpart sets standards for agency security education and... uniformity in the conduct of agency security education and training programs; and (3) Reduce instances of...

  16. Report: EPA’s Information Systems and Data Are at Risk Due to Insufficient Training of Personnel With Significant Information Security Responsibilities

    EPA Pesticide Factsheets

    Report #14-P-0142, March 21, 2014. The EPA places its information systems and data at risk due to an organizational structure that has not specified required duties and responsibilities to ensure personnel are trained on key information security roles.

  17. 6 CFR 7.11 - Components' responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... INFORMATION Administration § 7.11 Components' responsibilities. Each DHS component shall appoint a security... security information; (b) Report violations of the provisions of this regulation to the Chief Security... component acquire adequate security education and training, as required by the DHS classified information...

  18. Disaster at a University: A Case Study in Information Security

    ERIC Educational Resources Information Center

    Ayyagari, Ramakrishna; Tyks, Jonathan

    2012-01-01

    Security and disaster training is identified as a top Information Technology (IT) required skill that needs to be taught in Information Systems (IS) curriculums. Accordingly, information security and privacy have become core concepts in information system education. Providing IT security on a shoestring budget is always difficult and many small…

  19. Report: EPA Lacks Processes to Validate Whether Contractors Receive Specialized Role-Based Training for Network and Data Protection

    EPA Pesticide Factsheets

    Report #17-P-0344, July 31, 2017. The EPA is unaware whether information security contractors possess the skills and training needed to protect the agency’s information, data and network from security breaches.

  20. Information Security Awareness On-Line Materials Design with Knowledge Maps

    ERIC Educational Resources Information Center

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  1. Exploring Factors That Affect Adoption of Computer Security Practices among College Students

    ERIC Educational Resources Information Center

    Alqarni, Amani

    2017-01-01

    Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…

  2. Information Technology Security Training Requirements: A Role- and Performance-Based Model

    DTIC Science & Technology

    1998-04-01

    Journal, Vol.9, no. 2, pp. 18-20, 1995. Kearsley, Greg. Andragogy (M. Knowles), Washington, DC: George Washington University, 1996. Knowles, M.S...The Modern Practice of Adult Education: Andragogy vs. Pedagogy, New York: Association Press, 1970. Information Technology Security Training

  3. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  4. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  5. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  6. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  7. The Effectiveness of Information Technology Simulation and Security Awareness Training on U.S Military Personnel in Iraq and Afghanistan

    ERIC Educational Resources Information Center

    Armstead, Stanley K.

    2017-01-01

    In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…

  8. The Impact of Information Richness on Information Security Awareness Training Effectiveness

    ERIC Educational Resources Information Center

    Shaw, R. S.; Chen, Charlie C.; Harris, Albert L.; Huang, Hui-Jou

    2009-01-01

    In recent years, rapid progress in the use of the internet has resulted in huge losses in many organizations due to lax security. As a result, information security awareness is becoming an important issue to anyone using the Internet. To reduce losses, organizations have made information security awareness a top priority. The three main barriers…

  9. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 2 2011-01-01 2011-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  10. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 2 2013-01-01 2013-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  11. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 2 2012-01-01 2012-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  12. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...

  13. Report: Information Security Series: Security Practices Comprehensive Environmental Response, Compensation, and Liability Information System

    EPA Pesticide Factsheets

    Report #2006-P-00019, March 28, 2006. OSWER’s implemented practices to ensure production servers were being monitored for known vulnerabilities and personnel with significant security responsibility completed the Agency’s recommended security training.

  14. Exploring Effects of Organizational Culture upon Implementation of Information Security Awareness and Training Programs within the Defense Industry Located in the Tennessee Valley Region

    ERIC Educational Resources Information Center

    Grant, Robert Luther

    2017-01-01

    Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…

  15. 5 CFR 930.301 - Information systems security awareness training program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning... management; and management and implementation level training in system/application life cycle management...

  16. Developing a computer security training program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1990-01-01

    We all know that training can empower the computer protection program. However, pushing computer security information outside the computer security organization into the rest of the company is often labeled as an easy project or a dungeon full of dragons. Used in part or whole, the strategy offered in this paper may help the developer of a computer security training program ward off dragons and create products and services. The strategy includes GOALS (what the result of training will be), POINTERS (tips to ensure survival), and STEPS (products and services as a means to accomplish the goals).

  17. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...

  18. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...

  19. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... B to 10 CFR part 73. (iii) A cyber security plan in accordance with the criteria set forth in § 73..., training and qualification plan, and cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan...

  20. Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abbott, Shannon

    In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, andmore » proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.« less

  1. Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users

    ERIC Educational Resources Information Center

    Edwards, Keith

    2015-01-01

    Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the…

  2. National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook

    NASA Technical Reports Server (NTRS)

    Roback, E.

    1991-01-01

    The NASA Automated Information Security Handbook provides NASA's overall approach to automated information systems security including discussions of such aspects as: program goals and objectives, assignment of responsibilities, risk assessment, foreign national access, contingency planning and disaster recovery, awareness training, procurement, certification, planning, and special considerations for microcomputers.

  3. 2017 Joint Annual NDIA/AIA Industrial Security Committee Fall Conference

    DTIC Science & Technology

    2017-11-15

    beyond credit data to offer the insights that government professionals need to make informed decisions and ensure citizen safety, manage compliance...business that provides information technology and professional services. We specialize in managing business processes and systems integration for both... Information Security System ISFD Industrial Security Facilities Database OBMS ODAA Business Management System STEPP Security, Training, Education and

  4. TENOR Follow-on

    DTIC Science & Technology

    2002-04-01

    Training environments; Distance learning; Information sharing; System architecture; 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Public... security , and the team members generally originate from different geographical locations and different units with varied operational mission and...Use of a server provides security and flexibility in the development and updating of training material. The lessons are created in HTML, a widely

  5. Using Information Technologies in Professional Training of Future Security Specialists in the USA, Great Britain, Poland and Israel

    ERIC Educational Resources Information Center

    Kyslenko, Dmytro

    2017-01-01

    The paper discusses the use of information technologies in professional training of future security specialists in the United States, Great Britain, Poland and Israel. The probable use of computer-based techniques being available within the integrated Web-sites have been systematized. It has been suggested that the presented scheme may be of great…

  6. How Attitude toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention

    ERIC Educational Resources Information Center

    Johnson, David P.

    2017-01-01

    The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human…

  7. Practices in security and confidentiality of HIV/AIDS patients' information: A national survey among staff at HIV outpatient clinics in Vietnam.

    PubMed

    Khac Hai, Nguyen; Lawpoolsri, Saranath; Jittamala, Podjanee; Thi Thu Huong, Phan; Kaewkungwal, Jaranit

    2017-01-01

    Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs) in Vietnam. A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique. In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44-9.67); staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39-11.32) and moderate knowledge levels (OR: 5.10; 95%CI: 2.36-11.00); and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices) and moderate perception levels (OR: 5.67; 95%CI: 2.93-10.95). Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29-3.65). Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate healthcare clinics (HIV-OPC) into units integrated into general hospitals/healthcare facilities. The findings of this study highlight topics that could be used for improving management and operation of information system and revising guidelines and regulations on protection measures/strategies for data security and confidentiality of HIV/AIDS patients by Vietnam health authorities or other countries facing similar situations. Secure infrastructure and secure measures for data access and use are very important, worthwhile investments. The provision of continuous training and active enforcement and monitoring of the practices of healthcare personnel might lead to an improved understanding and acknowledegement of the importance of national policies/guidelines regarding HIV-related patient information.

  8. 76 FR 31971 - New Agency Information Collection Activity Under OMB Review: Security Program for Hazardous...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-02

    ... INFORMATION CONTACT: Joanna Johnson, TSA PRA Officer, Office of Information Technology (OIT), TSA-11... other forms of information technology. Information Collection Requirement Title: Security Program for... surveyor tool that is managed at TSA. Participants who attend the classroom training sessions will also be...

  9. An Innovative Community College Program and Partnership in Information Security.

    ERIC Educational Resources Information Center

    Howard, Barbara C; Morneau, Keith A.

    This report describes an innovative network security program initiated by Northern Virginia Community College and funded with a grant from the Northern Virginia Regional Partnership. The program educates and trains students in the instillation, configuration, and troubleshooting of the hardware and software infrastructure of information security.…

  10. 48 CFR 239.7102-3 - Information assurance contractor training and certification.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-3 Information..., certification maintenance, and continuing education or sustainment training required for the information... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Information assurance...

  11. 48 CFR 239.7102-3 - Information assurance contractor training and certification.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-3 Information..., certification maintenance, and continuing education or sustainment training required for the information... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Information assurance...

  12. 48 CFR 239.7102-3 - Information assurance contractor training and certification.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-3 Information..., certification maintenance, and continuing education or sustainment training required for the information... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Information assurance...

  13. 48 CFR 239.7102-3 - Information assurance contractor training and certification.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-3 Information..., certification maintenance, and continuing education or sustainment training required for the information... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Information assurance...

  14. 48 CFR 239.7102-3 - Information assurance contractor training and certification.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ACQUISITION OF INFORMATION TECHNOLOGY Security and Privacy for Computer Systems 239.7102-3 Information..., certification maintenance, and continuing education or sustainment training required for the information... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Information assurance...

  15. Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system.

    PubMed

    Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam

    2017-01-01

    Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.

  16. 78 FR 57643 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-19

    ... Security (DHS) Cybersecurity Education Office (CEO) National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog (Training Catalog) Collection AGENCY: Cybersecurity Education Office, DHS. ACTION: 30-Day Notice and request for comments; New Collection (Request for...

  17. 78 FR 35295 - Agency Information Collection Activities: Department of Homeland Security (DHS) Cybersecurity...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-12

    ... Security (DHS) Cybersecurity Education Office (CEO) National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog (Training Catalog) Collection AGENCY: Cybersecurity Education Office, DHS. ACTION: 60-Day Notice and request for comments; New Collection (Request for...

  18. Innovative Model for Information Assurance Curriculum: A Teaching Hospital

    ERIC Educational Resources Information Center

    Goel, Sanjay; Pon, Damira; Bloniarz, Peter; Bangert-Drowns, Robert; Berg, George; Delio, Vince; Iwan, Laura; Hurbanek, Thomas; Schuman, Sandoor P.; Gangolly, Jagdish; Baykal, Adnan; Hobbs, Jon

    2006-01-01

    A novel idea for information security education created by the New York State Center for Information Forensics and Assurance (CIFA) is presented. This new approach incorporates a teaching hospital model originally developed for medical training. In this model, information security problems from industry and government are solved and abstracted…

  19. 49 CFR 172.704 - Training requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 2 2011-10-01 2011-10-01 false Training requirements. 172.704 Section 172.704... PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Training § 172.704 Training requirements. (a) Hazmat employee training must include the...

  20. 76 FR 58531 - Intent to Request Renewal From OMB of One Current Public Collection of Information: Flight...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-21

    ... Aliens and Other Designated Individuals; Security Awareness Training for Flight School Employees AGENCY... checks for all aliens and other designated individuals seeking flight instruction (``candidates'') from... OMB Control Number 1652-0021, Flight Training for Aliens and Other Designated Individuals; Security...

  1. 10 CFR 95.33 - Security education.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 2 2014-01-01 2014-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... providing security education and training. A licensee or other entity subject to part 95 may obtain...

  2. 49 CFR 172.802 - Components of a security plan.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 2 2013-10-01 2013-10-01 false Components of a security plan. 172.802 Section 172... TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.802 Components of a security plan. (a) The...

  3. 49 CFR 172.802 - Components of a security plan.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 2 2014-10-01 2014-10-01 false Components of a security plan. 172.802 Section 172... TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.802 Components of a security plan. (a) The...

  4. 49 CFR 172.802 - Components of a security plan.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 2 2011-10-01 2011-10-01 false Components of a security plan. 172.802 Section 172... TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.802 Components of a security plan. (a) The...

  5. 49 CFR 172.802 - Components of a security plan.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 2 2012-10-01 2012-10-01 false Components of a security plan. 172.802 Section 172... TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.802 Components of a security plan. (a) The...

  6. 77 FR 14525 - Statement of Organization, Functions, and Delegations of Authority

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-12

    ... maintains the CDC Computer Security Incident Response Team; (4) performs cyber security incident reporting... systems planning and support; internal security and emergency preparedness; and management analysis and... security; education, training, and workforce development in information and IT disciplines; development and...

  7. Practices in security and confidentiality of HIV/AIDS patients’ information: A national survey among staff at HIV outpatient clinics in Vietnam

    PubMed Central

    Khac Hai, Nguyen; Lawpoolsri, Saranath; Jittamala, Podjanee; Thi Thu Huong, Phan

    2017-01-01

    Introduction Breach of confidentiality or invasion of privacy from the collection and use of medical records, particularly those of patients with HIV/AIDS or other diseases sensitive to stigmatization, should be prevented by all related stakeholders in healthcare settings. The main focus of this study was to assess practices regarding security and confidentiality of HIV-related information among staff at HIV outpatient clinics (HIV-OPCs) in Vietnam. Methods A descriptive cross-sectional study was conducted at all 312 HIV-OPCs across the country using an online survey technique. Results In general, the staff practices for securing and protecting patient information were at acceptable levels. Most staff had proper measures and practices for maintaining data security; however, the protection of patient confidentiality, particularly for data access, sharing, and transfer still required improvement. Most HIV-OPC staff had good or moderate knowledge and positive perceptions towards security and confidentiality issues. Staff who were not trained in the practice of security measures differed significantly from those who were trained (OR: 3.74; 95%CI: 1.44–9.67); staff needing improved knowledge levels differed significantly from those with good (OR: 5.20; 95%CI: 2.39–11.32) and moderate knowledge levels (OR: 5.10; 95%CI: 2.36–11.00); and staff needing improved perception levels differed significantly from those with good (i.e., with 100% proper practices) and moderate perception levels (OR: 5.67; 95%CI: 2.93–10.95). Staff who were not trained in the protection of data confidentiality differed significantly from those who were trained (OR: 2.18; 95%CI: 1.29–3.65). Conclusions Training is an important factor to help raise the levels of proper practices regarding confidentiality and security, to improve knowledge and raise awareness about change among staff. The operation and management of HIV treatment and care in Vietnam are currently transitioning from separate healthcare clinics (HIV-OPC) into units integrated into general hospitals/healthcare facilities. The findings of this study highlight topics that could be used for improving management and operation of information system and revising guidelines and regulations on protection measures/strategies for data security and confidentiality of HIV/AIDS patients by Vietnam health authorities or other countries facing similar situations. Secure infrastructure and secure measures for data access and use are very important, worthwhile investments. The provision of continuous training and active enforcement and monitoring of the practices of healthcare personnel might lead to an improved understanding and acknowledegement of the importance of national policies/guidelines regarding HIV-related patient information. PMID:29136017

  8. Technical solutions for mitigating security threats caused by health professionals in clinical settings.

    PubMed

    Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio

    2015-08-01

    The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gibbs, P. W.

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  10. The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress

    DTIC Science & Technology

    2009-05-27

    technology network architecture to connect various DHS elements and promote information sharing.17 • Establish a DHS State, Local, and Regional...A Strategic Plan; training, and the implementation of a comprehensive information systems architecture .65 As part of its integration...information technology network architecture was submitted to Congress last year. See DHS I&A, Homeland Security Information Technology Network

  11. 77 FR 65048 - Privacy Act; System of Records: Personal Property Claims, State-27

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-24

    ... cyber security awareness training which covers the procedures for handling Sensitive but Unclassified... Property Claims. SECURITY CLASSIFICATION: Unclassified. SYSTEM LOCATION: Department of State, SA-3, Suite... which can include information such as names, birthdates, social security numbers (SSNs), employee IDs...

  12. 49 CFR 15.11 - Persons with a need to know.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.11... circumstances: (1) When the person requires access to specific SSI to carry out transportation security... training to carry out transportation security activities approved, accepted, funded, recommended, or...

  13. 49 CFR 15.11 - Persons with a need to know.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Office of the Secretary of Transportation PROTECTION OF SENSITIVE SECURITY INFORMATION § 15.11... circumstances: (1) When the person requires access to specific SSI to carry out transportation security... training to carry out transportation security activities approved, accepted, funded, recommended, or...

  14. Collaborating to optimize nursing students' agency information technology use.

    PubMed

    Fetter, Marilyn S

    2009-01-01

    As the learning laboratory for gaining actual patient care experience, clinical agencies play an essential role in nursing education. With an information technology revolution transforming healthcare, nursing programs are eager for their students to learn the latest informatics systems and technologies. However, many healthcare institutions are struggling to meet their own information technology needs and report limited resources and other as barriers to nursing student training. In addition, nursing students' information technology access and use raise security and privacy concerns. With the goal of a fully electronic health record by 2014, it is imperative that agencies and educational programs collaborate. They need to establish educationally sound, cost-effective, and secure policies and procedures for managing students' use of information technology systems. Strategies for evaluating options, selecting training methods, and ensuring data security are shared, along with strategies that may reap clinical, economic, and educational benefits. Students' information technology use raises numerous issues that the nursing profession must address to participate in healthcare's transformation into the digital age.

  15. 49 CFR 1552.5 - Fees.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight Training for Aliens and Other Designated... information required under § 1552.3 to TSA. (2) TSA will not issue any fee refunds, unless a fee was paid in...

  16. 49 CFR 1552.5 - Fees.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight Training for Aliens and Other Designated... information required under § 1552.3 to TSA. (2) TSA will not issue any fee refunds, unless a fee was paid in...

  17. 10 CFR 52.79 - Contents of applications; technical information in final safety analysis report.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) A cyber security plan in accordance with the criteria set forth in § 73.54 of this chapter; (iv) A... cyber security plan; and (v) Each applicant who prepares a physical security plan, a safeguards contingency plan, a training and qualification plan, or a cyber security plan, shall protect the plans and...

  18. Thundercloud: Domain specific information security training for the smart grid

    NASA Astrophysics Data System (ADS)

    Stites, Joseph

    In this paper, we describe a cloud-based virtual smart grid test bed: ThunderCloud, which is intended to be used for domain-specific security training applicable to the smart grid environment. The test bed consists of virtual machines connected using a virtual internal network. ThunderCloud is remotely accessible, allowing students to undergo educational exercises online. We also describe a series of practical exercises that we have developed for providing the domain-specific training using ThunderCloud. The training exercises and attacks are designed to be realistic and to reflect known vulnerabilities and attacks reported in the smart grid environment. We were able to use ThunderCloud to offer practical domain-specific security training for smart grid environment to computer science students at little or no cost to the department and no risk to any real networks or systems.

  19. The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress

    DTIC Science & Technology

    2010-03-19

    network architecture to connect various DHS elements and promote information sharing.17 • Establish a DHS State, Local, and Regional Fusion Center...of reports; the I&A Strategic Plan; training, and the implementation of a comprehensive information systems architecture .73 As part of its...comprehensive information technology network architecture was submitted to Congress last year. See DHS I&A, Homeland Security Information Technology Network

  20. Plan for Reducing Unnecessary use of Social Security Numbers

    EPA Pesticide Factsheets

    Recognizing that training and awareness are critical to protecting agency Personally Identifiable Information (PII), the EPA is developing online training for privacy contacts in its programs and regions.

  1. Information Assurance within the United States Air Force

    ERIC Educational Resources Information Center

    Cherry, John D.

    2010-01-01

    According to the Department of Defense (DoD), a review of information assurance (IA) in the United States Air Force (USAF) in 2009, cyber security is jeopardized because of information loss. This situation has occurred in large part because of less than optimal training practices or adherence to training protocols. The purpose of this study was…

  2. 9 CFR 121.15 - Training.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 9 Animals and Animal Products 1 2011-01-01 2011-01-01 false Training. 121.15 Section 121.15... AGENTS AND TOXINS § 121.15 Training. (a) An individual or entity required to register under this part must provide information and training on biosafety and security to each individual with access approval...

  3. 9 CFR 121.15 - Training.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Training. 121.15 Section 121.15... AGENTS AND TOXINS § 121.15 Training. (a) An individual or entity required to register under this part must provide information and training on biosafety and security to each individual with access approval...

  4. 42 CFR 73.15 - Training.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 1 2011-10-01 2011-10-01 false Training. 73.15 Section 73.15 Public Health PUBLIC... AND TOXINS § 73.15 Training. (a) An individual or entity required to register under this part must provide information and training on biosafety and security to each individual with access approval from...

  5. Small Community Training & Education

    Science.gov Websites

    training and adult education professionals. • National Technical Information Service (NTIS) This U.S residents of New Jersey and beyond through education and public service. • Operator Training Committee of Water Wastewater Training Security Conservation & Water Efficiency Water for All Americans Water We

  6. Barriers to Securing Data on Bluetooth®-Enabled Mobile Devices: A Phenomenological Study

    ERIC Educational Resources Information Center

    Hines, Natasha

    2015-01-01

    Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated…

  7. Technical Secondary Education in Togo and Cameroon--Research Note.

    ERIC Educational Resources Information Center

    Paul, Jean-Jacques

    1990-01-01

    Evaluates technical secondary education in Togo and Cameroon from the market perspective, using tracer study data. To help overcome difficulties in finding employment after training, many individuals secure work in the low-paying informal sector. One solution is to stimulate and enhance the role of informal training through apprentice training…

  8. An Analysis of Federal Airport and Air Carrier Employee Access Control, Screening. and Training Regulations

    DTIC Science & Technology

    1998-03-01

    traveling public, air carriers, and persons employed by or conducting business at public airports. 14. SUBJECT TERMS Airport Security , Federal...26 4. Sterile Area 28 5. Exclusive Area 28 E. SECURITY ALERT LEVELS 29 F. AIRPORT SECURITY TOOLS 30 1. Electronic Detection System 31 a... Security Coordinator ASP Airport Security Program BIS Biometrie Identification System CCTV Closed Circuit Television CJIS Criminal Justice Information

  9. Report: EPA’s National Security Information Program Could Be Improved

    EPA Pesticide Factsheets

    Report #12-P-0543, June 18, 2012. Under its classified NSI program, EPA has assigned responsibilities and provided guidance, training, and oversight. EPA program offices provide secure equipment and space, following NSI program specifications.

  10. 12 CFR 792.69 - Training and employee standards of conduct with regard to privacy.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... regard to privacy. 792.69 Section 792.69 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION... UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED INFORMATION The Privacy Act § 792.69 Training and employee standards of conduct with regard to...

  11. TRAIN-UNIX. Training Records And Information Network UNIX Version

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lawrence, M.E.; Crires, J.T.; Johnston, M.

    1995-12-01

    TRAIN-UNIX is used to track training requirements, qualifications, training completion and schedule training, classrooms and instructors. TRAIN-UNIX is a requirements-based system. When the identified training requirements for specific jobs are entered into the system, the employees manager or responsible training person assigns jobs to an employee. TRAIN-UNIX will then assemble an Individual Training Plan (ITP) with all courses required. ITP`s can also be modified to add any special training directed or identified by management, best business practices, procedures, etc. TRAIN-UNIX also schedules and tracks conferences, seminars, and required reading. TRAIN-UNIX is a secure database system on a server accessible viamore » the network. Access to the user functions (scheduling, data entry, ITP modification etc.) within TRAIN-UNIX are granted by function, as needed, by the system administrator. An additional level of security allows those who access TRAIN-UNIX to only add, modify or view information for the organizations to which they belong. TRAIN-UNIX scheduling function allows network access to scheduling of students. As a function of the scheduling process, TRAIN-UNIX checks to insure that the student is a valid employee, not double booked, and the instructor and classroom are not double booked. TRAIN-UNIX will report pending lapse of courses or qualifications. This ability to know the lapse of training along with built in training requesting function allows the training deliverers to forecast training needs.« less

  12. Training Records And Information Network UNIX Version

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Johnston, Michael

    1996-12-01

    TRAIN-UNIX is used to track training requirements, qualifications, training completion and schedule training, classrooms and instructors. TRAIN-UNIX is a requirements-based system. When the identified training requirements for specific jobs are entered into the system, the employees manager or responsible training person assigns jobs to an employee. TRAIN-UNIX will then assemble an Individual Training Plan (ITP) with all courses required. ITP''s can also be modified to add any special training directed or identified by management, best business practices, procedures, etc. TRAIN-UNIX also schedules and tracks conferences, seminars, and required reading. TRAIN-UNIX is a secure database system on a server accessible viamore » the network. Access to the user functions (scheduling, data entry, ITP modification etc.) within TRAIN-UNIX are granted by function, as needed, by the system administrator. An additional level of security allows those who access TRAIN-UNIX to only add, modify or view information for the organizations to which they belong. TRAIN-UNIX scheduling function allows network access to scheduling of students. As a function of the scheduling process, TRAIN-UNIX checks to insure that the student is a valid employee, not double booked, and the instructor and classroom are not double booked. TRAIN-UNIX will report pending lapse of courses or qualifications. This ability to know the lapse of training along with built in training requesting function allows the training deliverers to forecast training needs.« less

  13. 49 CFR 172.600 - Applicability and general requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... MATERIALS TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Emergency Response Information § 172.600 Applicability and... prescribes requirements for providing and maintaining emergency response information during transportation...

  14. 49 CFR 172.600 - Applicability and general requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... MATERIALS TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Emergency Response Information § 172.600 Applicability and... prescribes requirements for providing and maintaining emergency response information during transportation...

  15. How to Overcome Information Anxiety: Assignment and Use of DoD Distribution Statements for Technical Documents. Volume 1. Facilitor Guide

    DTIC Science & Technology

    1998-05-01

    distribution limitations recommended if public release is not approved. The ASD(PA) shall also process appeals when public release denial is based upon...Rules of Evidence, and all other applicable laws. An interlocutory appeal by the United States shall lie from a decision or order of a district court... limitations ; document markings; document preparation; scientific and technical information; STINFO; information security; security training

  16. 46 CFR 160.151-59 - Operating instructions and information for the ship's training manual.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 6 2010-10-01 2010-10-01 false Operating instructions and information for the ship's training manual. 160.151-59 Section 160.151-59 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) EQUIPMENT, CONSTRUCTION, AND MATERIALS: SPECIFICATIONS AND APPROVAL LIFESAVING EQUIPMENT Inflatable Liferafts (SOLAS) § 160.151-59...

  17. Joint Global War on Terror (GWOT) Vascular Injury Study 2

    DTIC Science & Technology

    2017-02-01

    trauma, vascular injury management, survey , OIF, OEF, Iraq, Afghanistan, Iraq, deployment, training 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...injury, extremity, vascular injury, vascular trauma, vascular injury management, survey , OIF, OEF, Iraq, Afghanistan, Iraq, deployment, training...Phase II will be analyzed to provide comprehensive descriptive information on the patient cohort pertaining to demographics, injury information and

  18. Computer simulation of functioning of elements of security systems

    NASA Astrophysics Data System (ADS)

    Godovykh, A. V.; Stepanov, B. P.; Sheveleva, A. A.

    2017-01-01

    The article is devoted to issues of development of the informational complex for simulation of functioning of the security system elements. The complex is described from the point of view of main objectives, a design concept and an interrelation of main elements. The proposed conception of the computer simulation provides an opportunity to simulate processes of security system work for training security staff during normal and emergency operation.

  19. The Campus Executive's Role in Security and Liability Issues.

    ERIC Educational Resources Information Center

    Bromley, Max; Territo, Leonard

    1986-01-01

    Executives at institutions of higher education have become increasingly concerned about serious crimes being committed on their campuses. The liability issue, criminal activity information, physical security and design issues, student patrol escorts, crime prevention training, and task force development are discussed. (MLW)

  20. 49 CFR 172.804 - Relationship to other Federal requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... MATERIALS TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.804 Relationship to other Federal... 49 Transportation 2 2011-10-01 2011-10-01 false Relationship to other Federal requirements. 172...

  1. 49 CFR 172.804 - Relationship to other Federal requirements.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... MATERIALS TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.804 Relationship to other Federal... 49 Transportation 2 2014-10-01 2014-10-01 false Relationship to other Federal requirements. 172...

  2. 49 CFR 172.804 - Relationship to other Federal requirements.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... MATERIALS TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.804 Relationship to other Federal... 49 Transportation 2 2013-10-01 2013-10-01 false Relationship to other Federal requirements. 172...

  3. 49 CFR 172.804 - Relationship to other Federal requirements.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... MATERIALS TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.804 Relationship to other Federal... 49 Transportation 2 2012-10-01 2012-10-01 false Relationship to other Federal requirements. 172...

  4. 49 CFR 172.804 - Relationship to other Federal requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... MATERIALS TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Safety and Security Plans § 172.804 Relationship to other Federal... 49 Transportation 2 2010-10-01 2010-10-01 false Relationship to other Federal requirements. 172...

  5. 32 CFR 806b.52 - Who needs training.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... in the design, development, operation and maintenance of any system of records. More specialized... specialists, finance officers, information managers, supervisors, and individuals working with medical and security records. Commanders will ensure that above personnel are trained annually in the principles and...

  6. HIPAA Compliance and Training: A Perfect Storm for Professionalism Education?

    PubMed

    Agris, Julie L; Spandorfer, John M

    2016-12-01

    The HIPAA Rules continue to support and bolster the importance of protecting the privacy and security of patients' protected health information. The HIPAA training requirements are at the cornerstone of meaningful implementation and provide a ripe opportunity for critical education.

  7. 49 CFR 172.701 - Federal-State relationship.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Federal-State relationship. 172.701 Section 172... TABLE, SPECIAL PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Training § 172.701 Federal-State relationship. This subpart and the parts...

  8. Stacking The Deck - Can We Better Develop Future Homeland Security Leaders With Formal Mentoring Programs?

    DTIC Science & Technology

    2014-09-01

    under workman’s compensation? 9) Describe the Laissez -Fa ire leadership style. Is this style applicable in the fire service? 10) Is training required...Informal mentoring appears to be the status quo in homeland security agencies for leadership development. However, informal mentoring is flawed due to...formal mentoring programs can assist organizations with employee retention, succession planning, leadership development, closing generational gaps, and

  9. Exploring Information Security Awareness Training to Reduce Unauthorized Disclosure of Information in Public Schools

    ERIC Educational Resources Information Center

    Fleming, Antoine

    2017-01-01

    Advances in technological uses within public schools provide increased methods to collect and store non-public personal information (NPI) or personally identifiable information (PII) from both students and employees. Consequently, the sensitive information collected is susceptible to unauthorized disclosure, as various public school employees are…

  10. The Forensic Confirmation Bias: A Comparison Between Experts and Novices.

    PubMed

    van den Eeden, Claire A J; de Poot, Christianne J; van Koppen, Peter J

    2018-05-17

    A large body of research has described the influence of context information on forensic decision-making. In this study, we examined the effect of context information on the search for and selection of traces by students (N = 36) and crime scene investigators (N = 58). Participants investigated an ambiguous mock crime scene and received prior information indicating suicide, a violent death or no information. Participants described their impression of the scene and wrote down which traces they wanted to secure. Results showed that context information impacted first impression of the scene and crime scene behavior, namely number of traces secured. Participants in the murder condition secured most traces. Furthermore, the students secured more crime-related traces. Students were more confident in their first impression. This study does not indicate that experts outperform novices. We therefore argue for proper training on cognitive processes as an integral part of all forensic education. © 2018 American Academy of Forensic Sciences.

  11. 33 CFR 150.602 - What occupational awareness training is required?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Workplace Safety and Health Safety and Health (general) § 150.602 What occupational awareness training is required? (a) Each deepwater port operator must ensure that all deepwater port personnel are provided with information and...

  12. Conception of a course for professional training and education in the field of computer and mobile forensics

    NASA Astrophysics Data System (ADS)

    Kröger, Knut; Creutzburg, Reiner

    2012-06-01

    IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or was done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data makes it necessary to further train the own employees in the field of IT forensics. Motivated by these facts, a training concept, which allows the creation of practical exercises, is presented in this paper. The focus is on the practical implementation of forensic important relationships.

  13. Medical Devices Transition to Information Systems: Lessons Learned

    PubMed Central

    Charters, Kathleen G.

    2012-01-01

    Medical devices designed to network can share data with a Clinical Information System (CIS), making that data available within clinician workflow. Some lessons learned by transitioning anesthesia reporting and monitoring devices (ARMDs) on a local area network (LAN) to integration of anesthesia documentation within a CIS include the following categories: access, contracting, deployment, implementation, planning, security, support, training and workflow integration. Areas identified for improvement include: Vendor requirements for access reconciled with the organizations’ security policies and procedures. Include clauses supporting transition from stand-alone devices to information integrated into clinical workflow in the medical device procurement contract. Resolve deployment and implementation barriers that make the process less efficient and more costly. Include effective field communication and creative alternatives in planning. Build training on the baseline knowledge of trainees. Include effective help desk processes and metrics. Have a process for determining where problems originate when systems share information. PMID:24199054

  14. Big data, little security: Addressing security issues in your platform

    NASA Astrophysics Data System (ADS)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  15. Privacy, confidentiality, and security in information systems of state health agencies.

    PubMed

    O'Brien, D G; Yasnoff, W A

    1999-05-01

    To assess the employment and status of privacy, confidentiality, security and fair information practices in electronic information systems of U.S. state health agencies. A survey instrument was developed and administered to key contacts within the state health agencies of each of the 50 U.S. states, Puerto Rico and the District of Columbia. About a third of U.S. state health agencies have no written policies in place regarding privacy and confidentiality in electronic information systems. The doctrines of fair information practice often seemed to be ignored. One quarter of the agencies reported at least one security breach during the past two years, and 16% experienced a privacy and confidentiality related transgression. Most of the breaches were committed by personnel from within the agencies. These results raise questions about the integrity of existing privacy, confidentiality and security measures in the information systems of U.S. state health agencies. Recommendations include the development and vigorous enforcement of written privacy and confidentiality policies, increased personnel training, and expanded implementation of security measures such as encryption and system firewalls. A discussion of the current status of U.S. privacy, confidentiality and security issues is offered.

  16. Health Information Security in Hospitals: the Application of Security Safeguards.

    PubMed

    Mehraeen, Esmaeil; Ayatollahi, Haleh; Ahmadi, Maryam

    2016-02-01

    A hospital information system has potentials to improve the accessibility of clinical information and the quality of health care. However, the use of this system has resulted in new challenges, such as concerns over health information security. This paper aims to assess the status of information security in terms of administrative, technical and physical safeguards in the university hospitals. This was a survey study in which the participants were information technology (IT) managers (n=36) who worked in the hospitals affiliated to the top ranked medical universities (university A and university B). Data were collected using a questionnaire. The content validity of the questionnaire was examined by the experts and the reliability of the questionnaire was determined using Cronbach's coefficient alpha (α=0.75). The results showed that the administrative safeguards were arranged at a medium level. In terms of the technical safeguards and the physical safeguards, the IT managers rated them at a strong level. According to the results, among three types of security safeguards, the administrative safeguards were assessed at the medium level. To improve it, developing security policies, implementing access control models and training users are recommended.

  17. Influence of emergency physician's tying technique on knot security.

    PubMed

    Batra, E K; Franz, D A; Towler, M A; Rodeheaver, G T; Thacker, J G; Zimmer, C A; Edlich, R F

    1992-01-01

    The purpose of this study was to determine the influence of emergency physician's tying technique on knot security using 2-0 and 4-0 monofilament and multifilament nylon sutures. Using an Instron Tensile Tester and a portable tensiometer, knot security was achieved with these sutures using four-throw square knots (1 = 1 = 1 = 1). After didactic and psychomotor skill training, medical students were taught to construct the four-throw square knot using either a two-hand tie or an instrument tie. Using the portable tensiometer, their knot tying techniques were judged to be superior to those used by emergency physicians. The emergency physician's faulty technique can easily be corrected by didactic information and psychomotor skill training.

  18. Security of electronic medical information and patient privacy: what you need to know.

    PubMed

    Andriole, Katherine P

    2014-12-01

    The responsibility that physicians have to protect their patients from harm extends to protecting the privacy and confidentiality of patient health information including that contained within radiological images. The intent of HIPAA and subsequent HIPAA Privacy and Security Rules is to keep patients' private information confidential while allowing providers access to and maintaining the integrity of relevant information needed to provide care. Failure to comply with electronic protected health information (ePHI) regulations could result in financial or criminal penalties or both. Protected health information refers to anything that can reasonably be used to identify a patient (eg, name, age, date of birth, social security number, radiology examination accession number). The basic tools and techniques used to maintain medical information security and patient privacy described in this article include physical safeguards such as computer device isolation and data backup, technical safeguards such as firewalls and secure transmission modes, and administrative safeguards including documentation of security policies, training of staff, and audit tracking through system logs. Other important concepts related to privacy and security are explained, including user authentication, authorization, availability, confidentiality, data integrity, and nonrepudiation. Patient privacy and security of medical information are critical elements in today's electronic health care environment. Radiology has led the way in adopting digital systems to make possible the availability of medical information anywhere anytime, and in identifying and working to eliminate any risks to patients. Copyright © 2014 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  19. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  20. Information-Pooling Bias in Collaborative Security Incident Correlation Analysis.

    PubMed

    Rajivan, Prashanth; Cooke, Nancy J

    2018-03-01

    Incident correlation is a vital step in the cybersecurity threat detection process. This article presents research on the effect of group-level information-pooling bias on collaborative incident correlation analysis in a synthetic task environment. Past research has shown that uneven information distribution biases people to share information that is known to most team members and prevents them from sharing any unique information available with them. The effect of such biases on security team collaborations are largely unknown. Thirty 3-person teams performed two threat detection missions involving information sharing and correlating security incidents. Incidents were predistributed to each person in the team based on the hidden profile paradigm. Participant teams, randomly assigned to three experimental groups, used different collaboration aids during Mission 2. Communication analysis revealed that participant teams were 3 times more likely to discuss security incidents commonly known to the majority. Unaided team collaboration was inefficient in finding associations between security incidents uniquely available to each member of the team. Visualizations that augment perceptual processing and recognition memory were found to mitigate the bias. The data suggest that (a) security analyst teams, when conducting collaborative correlation analysis, could be inefficient in pooling unique information from their peers; (b) employing off-the-shelf collaboration tools in cybersecurity defense environments is inadequate; and (c) collaborative security visualization tools developed considering the human cognitive limitations of security analysts is necessary. Potential applications of this research include development of team training procedures and collaboration tool development for security analysts.

  1. Command Inspections - A Self-Evaluation Approach

    DTIC Science & Technology

    1988-03-30

    Tool in the Air Force," Air Wa’ Collg •e Report go. AV-A C-85J174, Air University, United States Air Force, Maxwell AFB, Alabama, Kay 1985, r)p. 1-40...Safety and Fire Prevention 3. Physical Security and Crime Prevention 4. Information and Personnel Security 5, Operations 6. Training 7. Nuclear

  2. 75 FR 65618 - Commission Information Collection Activities (FERC-725B); Comment Request; Extension

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-26

    ... requirements to safeguard critical cyber assets.\\4\\ These standards help protect the nation's Bulk-Power System against potential disruptions from cyber attacks.\\5\\ \\3\\ CIP-002-1, CIP-003-1, CIP-004-1, CIP-005-1, CIP... Cyber Asset Identification. Security Management Controls. Personnel and Training. Electronic Security...

  3. Productivity and Job Security: Retraining to Adapt to Technological Change.

    ERIC Educational Resources Information Center

    National Center for Productivity and Quality of Working Life, Washington, DC.

    This report, the first of a series on productivity and job security, presents five case studies to illustrate retraining to achieve worker's adjustment to technology. The first of seven chapters addresses the following issues: the availability of job training/retraining data, the desirability of informing workers in advance of technological…

  4. The Most Likely Nemesis to Timely, Accurate Electronic Information

    DTIC Science & Technology

    2002-02-04

    NETWORKS, TRAINING, COMMERCIAL OFF-THE-SHELF, INFORMATION TECHNOLOGY , INTERNET , COMMUNICATIONS EQUIPMENT, ELECTRONIC INFORMATION 15.Abstract... information . During a recent interview for Military Information Technology magazine, Lieutenant General John L. Woodward, Jr., USAF, Deputy Chief of Staff...NSC) Coordinator for Security, Infrastructure Protection and Counterterrorism, said the NSC did not want a czar for information technology (IT) nor

  5. Safe teleradiology: information assurance as project planning methodology

    NASA Astrophysics Data System (ADS)

    Collmann, Jeff R.; Alaoui, Adil; Nguyen, Dan; Lindisch, David

    2003-05-01

    This project demonstrates use of OCTAVE, an information security risk assessment method, as an approach to the safe design and planning of a teleradiology system. By adopting this approach to project planning, we intended to provide evidence that including information security as an intrinsic component of project planning improves information assurance and that using information assurance as a planning tool produces and improves the general system management plan. Several considerations justify this approach to planning a safe teleradiology system. First, because OCTAVE was designed as a method for retrospectively assessing and proposing enhancements for the security of existing information management systems, it should function well as a guide to prospectively designing and deploying a secure information system such as teleradiology. Second, because OCTAVE provides assessment and planning tools for use primarily by interdisciplinary teams from user organizations, not consultants, it should enhance the ability of such teams at the local level to plan safe information systems. Third, from the perspective of sociological theory, OCTAVE explicitly attempts to enhance organizational conditions identified as necessary to safely manage complex technologies. Approaching information system design from the perspective of information security risk management proactively integrates health information assurance into a project"s core. This contrasts with typical approaches that perceive "security" as a secondary attribute to be "added" after designing the system and with approaches that identify information assurance only with security devices and user training. The perspective of health information assurance embraces so many dimensions of a computerized health information system"s design that one may successfully deploy a method for retrospectively assessing information security risk as a prospective planning tool. From a sociological perspective, this approach enhances the general conditions as well as establishes specific policies and procedures for reliable performance of health information assurance.

  6. 77 FR 48172 - Comment Request for Information Collection for the Reemployment and Eligibility Assessments (REA...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-13

    ... of Labor, Employment and Training Administration, Office of Workforce Security, 200 Constitution... with reemployment and training services through the workforce investment system by linking them to... understand program dynamics, and to gather data to report on REAs, including the number of scheduled in...

  7. Virtualization in education: Information Security lab in your hands

    NASA Astrophysics Data System (ADS)

    Karlov, A. A.

    2016-09-01

    The growing demand for qualified specialists in advanced information technologies poses serious challenges to the education and training of young personnel for science, industry and social problems. Virtualization as a way to isolate the user from the physical characteristics of computing resources (processors, servers, operating systems, networks, applications, etc.), has, in particular, an enormous influence in the field of education, increasing its efficiency, reducing the cost, making it more widely and readily available. The study of Information Security of computer systems is considered as an example of use of virtualization in education.

  8. [Development of a Tool for Training and Evaluation of the Competencies in Occupational Mental Health Necessary for Labor and Social Security Attorneys].

    PubMed

    Morimoto, Hideki; Shibata, Yoshiyuki; Kayashima, Kotaro; Motoyama, Kyoko; Wakabayashi, Tadashi; Horasawa, Ken; Maruta, Wakako; Ogasawara, Takayuki; Nishikido, Noriko; Oyama, Yuji; Toyoda, Hiroyuki; Mori, Ayaka; Mori, Koji

    2016-06-01

    Labor and Social Security Attorneys (LSSAs) advise their clients about occupational mental health, but the competencies necessary in this field are not clear to them. We standardized the necessary competencies as a counseling guide for LSSAs, and we also designed a related discussion training program. These competencies were summarized in a brainstorming session at a research conference comprised of physicians, an occupational health nurse, LSSAs, an instructional design expert, and a management consultant, and then a training program (lasting 9 hours 30 minutes) was developed. Nineteen trainees who were introduced by members of the research conference collectively completed a seven-question written test, both before and after the training, in order to assess its effectiveness. Sixteen trainees who completed the training were surveyed, with a recovery rate of 100%. The necessary competencies that they identified were: information about circular notices from the Ministry of Health, Labor and Welfare; behavior such as the gathering of information; and dealing with the reinstatement of employees. The scores were subjected to the Wilcoxon signed-rank test in order to evaluate the training, and the answers from the pre-training were compared with those from the post-training. A significant difference (P < 0.05) was seen for each question. These results show the effectiveness of the developed training program for the learning of the competencies necessary for LSSAs.

  9. 76 FR 22744 - 60-Day Notice of Proposed Information Collection: Form DS-3083, Training Registration (For Non-U...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-22

    ...'' and ``Study Abroad Administrators Security Overseas Seminar''. Methodology: This information will be... business abroad who is eligible, on a space available basis, for either of two courses offered annually or...

  10. U.S. Army Public Affairs Officers and Social Media Training Requirements

    DTIC Science & Technology

    2016-06-10

    ABSTRACT Social media platforms have become an effective and efficient method used by U.S. Army organizations to deliver and communicate messages to...standards. 15. SUBJECT TERMS Public Affairs Officer, Social Media Training, Communications , Social Media Platforms, Training 16. SECURITY...methods to directly communicate with various audiences. The dramatic impact of social media in the information environment has created a shift, and caused

  11. Privacy and security compliance in the E-healthcare marketplace.

    PubMed

    Lutes, M

    2000-03-01

    Complying with security and privacy regulations proposed by HHS in response to the Health Insurance Portability and Accountability Act (HIPAA) will require healthcare managers to address both internal and external business interactions and initiatives. The proposed regulations mandate certain procedures regarding administration, physical safeguards, technical security for data integrity and confidentiality, and technical security against unauthorized access. In particular, the proposed regulations require organizations to contractually ensure that vendors adhere to the regulations. Healthcare organizations also must implement training procedures for staff members who have contact with protected health information and designate a privacy officer to guard against improper disclosure of such information. Documented policies for organizational decision making are vital to an organization's efforts to implement procedures for compliance with the regulations.

  12. An Integrative Behavioral Model of Information Security Policy Compliance

    PubMed Central

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing members' neutralization intention to violate information security policy should be emphasized. PMID:24971373

  13. An integrative behavioral model of information security policy compliance.

    PubMed

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing members' neutralization intention to violate information security policy should be emphasized.

  14. Ethics in Public Health Research

    PubMed Central

    Myers, Julie; Frieden, Thomas R.; Bherwani, Kamal M.; Henning, Kelly J.

    2008-01-01

    Public health agencies increasingly use electronic means to acquire, use, maintain, and store personal health information. Electronic data formats can improve performance of core public health functions, but potentially threaten privacy because they can be easily duplicated and transmitted to unauthorized people. Although such security breaches do occur, electronic data can be better secured than paper records, because authentication, authorization, auditing, and accountability can be facilitated. Public health professionals should collaborate with law and information technology colleagues to assess possible threats, implement updated policies, train staff, and develop preventive engineering measures to protect information. Tightened physical and electronic controls can prevent misuse of data, minimize the risk of security breaches, and help maintain the reputation and integrity of public health agencies. PMID:18382010

  15. Possibilities and pitfalls of outsourcing.

    PubMed

    Hazelwood, Sarah E; Hazelwood, Anita C; Cook, Ellen D

    2005-10-01

    Outsourcing can save healthcare organizations costs related to staffing and training. Organizations should ensure that a vendor's staff is credentialed, knowledgeable, and properly trained. Outsourcing firms should ensure the confidentiality and security of the information they will handle. Outsourcing carries risks for providers, including potentially negative impact on tax-exempt status and loss of control over business processes.

  16. 29 CFR 2520.104-22 - Exemption from reporting and disclosure requirements for apprenticeship and training plans.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... disclosure requirements for apprenticeship and training plans. (a) An employee welfare benefit plan that...) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR REPORTING AND DISCLOSURE UNDER THE EMPLOYEE... information required to be contained in such notice is disclosed to employees of employers contributing to the...

  17. 49 CFR 193.2715 - Training: security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...

  18. 49 CFR 193.2715 - Training: security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 3 2012-10-01 2012-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...

  19. 49 CFR 193.2715 - Training: security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false Training: security. 193.2715 Section 193.2715...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2715 Training: security. (a) Personnel responsible for security at an LNG plant must be trained in accordance with a written plan of...

  20. Third-year medical students' knowledge of privacy and security issues concerning mobile devices.

    PubMed

    Whipple, Elizabeth C; Allgood, Kacy L; Larue, Elizabeth M

    2012-01-01

    The use of mobile devices are ubiquitous in medical-care professional settings, but information on privacy and security concerns of mobile devices for medical students is scarce. To gain baseline information about third-year medical students' mobile device use and knowledge of privacy and security issues concerning mobile devices. We surveyed 67 third-year medical students at a Midwestern university on their use of mobile devices and knowledge of how to protect information available through mobile devices. Students were also presented with clinical scenarios to rate their level of concern in regards to privacy and security of information. The most used features of mobile devices were: voice-to-voice (100%), text messaging (SMS) (94%), Internet (76.9%), and email (69.3%). For locking of one's personal mobile phone, 54.1% never physically lock their phone, and 58% never electronically lock their personal PDA. Scenarios considering definitely privacy concerns include emailing patient information intact (66.7%), and posting de-identified information on YouTube (45.2%) or Facebook (42.2%). As the ease of sharing data increases with the use of mobile devices, students need more education and training on possible privacy and security risks posed with mobile devices.

  1. 77 FR 61772 - Agency Information Collection Activities: Proposed Collection; Comment Request, Crisis Counseling...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-11

    ... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2012-0031; OMB No. 1660-0085] Agency Information Collection Activities: Proposed Collection; Comment Request, Crisis Counseling Assistance and Training Program AGENCY: Federal Emergency Management Agency, DHS. ACTION: Notice...

  2. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  3. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  4. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  5. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  6. 49 CFR 1552.23 - Security awareness training programs.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  7. [Security agents on the front line against Ebola: roles, perceptions and knowledge in Fann Teaching Hospital, Dakar, Senegal].

    PubMed

    Lanièce, C; Sow, K; Desclaux, A

    2016-10-01

    Security agents are on the front line when patients arrive at health facilities, giving them a potential role to play in an Ebola virus disease (EVD) outbreak. The position of security agents within health services is poorly documented. A survey was conducted to clarify their understanding of Ebola pathology, to assess their need for information and to determine their role in patient management. The survey included both qualitative and quantitative aspects. 80 security agents of the Fann teaching hospital (Dakar) completed questionnaires, and 11 were interviewed. Qualitative analysis was performed with Dedoose and the quantitative analysis using Excel. The results show that security agents' activities go beyond their mission of security and control. They are involved in informing, orienting and assisting patients and those accompanying them in the hospital. The security agents have basic knowledge of EVD, but overestimate the risk of transmission. They want to be more informed and to have access to protective material. These results suggest that these professionals should be taken into account when developing response strategies to Ebola outbreaks. Their knowledge of and protection against the disease must be strengthened. Non-health professionals working in health facilities should be trained in order to be able to relay information to the public.

  8. 49 CFR 1542.213 - Training.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 9 2011-10-01 2011-10-01 false Training. 1542.213 Section 1542.213 Transportation..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.213 Training. (a... training in accordance with TSA-approved curriculum specified in the security program. This curriculum must...

  9. VOCATIONAL EDUCATION AND TRAINING IN THE SOVIET UNION, REPORT OF THE BACIE DELEGATIONS VISIT, 5-23 MAY, 1963.

    ERIC Educational Resources Information Center

    PERRY, PETER

    A SUMMARY OF INDUSTRIAL AND COMMERCIAL TRAINING INFORMATION SECURED BY A DELEGATION OF FIVE BRITISH EDUCATORS WHO VISITED 19 VOCATIONAL TECHNICAL SCHOOLS, INDUSTRIAL ESTABLISHMENTS, INSTITUTES OF HIGHER EDUCATION, AND VARIOUS LEVELS OF MINISTRIES AND GOVERNMENT DEPARTMENTS IN MOSCOW, LENINGRAD, AND TBILISC (GEORGIA) IS PRESENTED. IN 45 YEARS, THE…

  10. Security practices and regulatory compliance in the healthcare industry.

    PubMed

    Kwon, Juhee; Johnson, M Eric

    2013-01-01

    Securing protected health information is a critical responsibility of every healthcare organization. We explore information security practices and identify practice patterns that are associated with improved regulatory compliance. We employed Ward's cluster analysis using minimum variance based on the adoption of security practices. Variance between organizations was measured using dichotomous data indicating the presence or absence of each security practice. Using t tests, we identified the relationships between the clusters of security practices and their regulatory compliance. We utilized the results from the Kroll/Healthcare Information and Management Systems Society telephone-based survey of 250 US healthcare organizations including adoption status of security practices, breach incidents, and perceived compliance levels on Health Information Technology for Economic and Clinical Health, Health Insurance Portability and Accountability Act, Red Flags rules, Centers for Medicare and Medicaid Services, and state laws governing patient information security. Our analysis identified three clusters (which we call leaders, followers, and laggers) based on the variance of security practice patterns. The clusters have significant differences among non-technical practices rather than technical practices, and the highest level of compliance was associated with hospitals that employed a balanced approach between technical and non-technical practices (or between one-off and cultural practices). Hospitals in the highest level of compliance were significantly managing third parties' breaches and training. Audit practices were important to those who scored in the middle of the pack on compliance. Our results provide security practice benchmarks for healthcare administrators and can help policy makers in developing strategic and practical guidelines for practice adoption.

  11. Security practices and regulatory compliance in the healthcare industry

    PubMed Central

    Kwon, Juhee; Johnson, M Eric

    2013-01-01

    Objective Securing protected health information is a critical responsibility of every healthcare organization. We explore information security practices and identify practice patterns that are associated with improved regulatory compliance. Design We employed Ward's cluster analysis using minimum variance based on the adoption of security practices. Variance between organizations was measured using dichotomous data indicating the presence or absence of each security practice. Using t tests, we identified the relationships between the clusters of security practices and their regulatory compliance. Measurement We utilized the results from the Kroll/Healthcare Information and Management Systems Society telephone-based survey of 250 US healthcare organizations including adoption status of security practices, breach incidents, and perceived compliance levels on Health Information Technology for Economic and Clinical Health, Health Insurance Portability and Accountability Act, Red Flags rules, Centers for Medicare and Medicaid Services, and state laws governing patient information security. Results Our analysis identified three clusters (which we call leaders, followers, and laggers) based on the variance of security practice patterns. The clusters have significant differences among non-technical practices rather than technical practices, and the highest level of compliance was associated with hospitals that employed a balanced approach between technical and non-technical practices (or between one-off and cultural practices). Conclusions Hospitals in the highest level of compliance were significantly managing third parties’ breaches and training. Audit practices were important to those who scored in the middle of the pack on compliance. Our results provide security practice benchmarks for healthcare administrators and can help policy makers in developing strategic and practical guidelines for practice adoption. PMID:22955497

  12. Development and Demonstration of a Security Core Component

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Turke, Andy

    In recent years, the convergence of a number of trends has resulted in Cyber Security becoming a much greater concern for electric utilities. A short list of these trends includes: · Industrial Control Systems (ICSs) have evolved from depending on proprietary hardware and operating software toward using standard off-the-shelf hardware and operating software. This has meant that these ICSs can no longer depend on “security through obscurity. · Similarly, these same systems have evolved toward using standard communications protocols, further reducing their ability to rely upon obscurity. · The rise of the Internet and the accompanying demand for more datamore » about virtually everything has resulted in formerly isolated ICSs becoming at least partially accessible via Internet-connected networks. · “Cyber crime” has become commonplace, whether it be for industrial espionage, reconnaissance for a possible cyber attack, theft, or because some individual or group “has something to prove.” Electric utility system operators are experts at running the power grid. The reality is, especially at small and mid-sized utilities, these SCADA operators will by default be “on the front line” if and when a cyber attack occurs against their systems. These people are not computer software, networking, or cyber security experts, so they are ill-equipped to deal with a cyber security incident. Cyber Security Manager (CSM) was conceived, designed, and built so that it can be configured to know what a utility’s SCADA/EMS/DMS system looks like under normal conditions. To do this, CSM monitors log messages from any device that uses the syslog standard. It can also monitor a variety of statistics from the computers that make up the SCADA/EMS/DMS: outputs from host-based security tools, intrusion detection systems, SCADA alarms, and real-time SCADA values – even results from a SIEM (Security Information and Event Management) system. When the system deviates from “normal,” CSM can alert the operator in language that they understand that an incident may be occurring, provide actionable intelligence, and informing them what actions to take. These alarms may be viewed on CSM’s built-in user interface, sent to a SCADA alarm list, or communicated via email, phone, pager, or SMS message. In recognition of the fact that “real world” training for cyber security events is impractical, CSM has a built-in Operator Training Simulator capability. This can be used stand alone to create simulated event scenarios for training purposes. It may also be used in conjunction with the recipient’s SCADA/EMS/DMS Operator Training Simulator. In addition to providing cyber security situational awareness for electric utility operators, CSM also provides tools for analysts and support personnel; in fact, the majority of user interface displays are designed for use in analyzing current and past security events. CSM keeps security-related information in long-term storage, as well as writing any decisions it makes to a (syslog) log for use forensic or other post-event analysis.« less

  13. Optical security system for the protection of personal identification information.

    PubMed

    Doh, Yang-Hoi; Yoon, Jong-Soo; Choi, Kyung-Hyun; Alam, Mohammad S

    2005-02-10

    A new optical security system for the protection of personal identification information is proposed. First, authentication of the encrypted personal information is carried out by primary recognition of a personal identification number (PIN) with the proposed multiplexed minimum average correlation energy phase-encrypted (MMACE_p) filter. The MMACE_p filter, synthesized with phase-encrypted training images, can increase the discrimination capability and prevent the leak of personal identification information. After the PIN is recognized, speedy authentication of personal information can be achieved through one-to-one optical correlation by means of the optical wavelet filter. The possibility of information counterfeiting can be significantly decreased with the double-identification process. Simulation results demonstrate the effectiveness of the proposed technique.

  14. 12 CFR 792.69 - Training and employee standards of conduct with regard to privacy.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... regard to privacy. 792.69 Section 792.69 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR...

  15. 12 CFR 792.69 - Training and employee standards of conduct with regard to privacy.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... regard to privacy. 792.69 Section 792.69 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR...

  16. 12 CFR 792.69 - Training and employee standards of conduct with regard to privacy.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... regard to privacy. 792.69 Section 792.69 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR...

  17. 12 CFR 792.69 - Training and employee standards of conduct with regard to privacy.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... regard to privacy. 792.69 Section 792.69 Banks and Banking NATIONAL CREDIT UNION ADMINISTRATION REGULATIONS AFFECTING THE OPERATIONS OF THE NATIONAL CREDIT UNION ADMINISTRATION REQUESTS FOR INFORMATION UNDER THE FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR...

  18. Conception of a course for professional training and education in the field of computer and mobile forensics, part III: network forensics and penetration testing

    NASA Astrophysics Data System (ADS)

    Kröger, Knut; Creutzburg, Reiner

    2014-02-01

    IT security and computer forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or were done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data make it necessary to further train the own employees in the field of network forensics and penetration testing. Motivated by these facts, this paper - a continuation of a paper of January 2012 [1], which showed the conception of a course for professional training and education in the field of computer and mobile forensics - addresses the practical implementation important relationships of network forensic and penetration testing.

  19. Employee Participation--A Practical Guide.

    ERIC Educational Resources Information Center

    Wooden, Mark

    1990-01-01

    Despite the benefits of employee participation in decision making, it is not widespread. Making it work requires commitment, job security, training, access to information, communication channels, goal setting, flat organizational structures, and financial reinforcement. (SK)

  20. Joint Combined Exchange Training Evaluation Framework: A Crucial Tool in Security Cooperation Assessment

    DTIC Science & Technology

    2015-12-01

    DOD, joint, or armed service component’s manuals , and other publications . Obviously, JCETs fall under the broader spectrum of security cooperation...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited JOINT COMBINED...No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing

  1. Dynamic security contingency screening and ranking using neural networks.

    PubMed

    Mansour, Y; Vaahedi, E; El-Sharkawi, M A

    1997-01-01

    This paper summarizes BC Hydro's experience in applying neural networks to dynamic security contingency screening and ranking. The idea is to use the information on the prevailing operating condition and directly provide contingency screening and ranking using a trained neural network. To train the two neural networks for the large scale systems of BC Hydro and Hydro Quebec, in total 1691 detailed transient stability simulation were conducted, 1158 for BC Hydro system and 533 for the Hydro Quebec system. The simulation program was equipped with the energy margin calculation module (second kick) to measure the energy margin in each run. The first set of results showed poor performance for the neural networks in assessing the dynamic security. However a number of corrective measures improved the results significantly. These corrective measures included: 1) the effectiveness of output; 2) the number of outputs; 3) the type of features (static versus dynamic); 4) the number of features; 5) system partitioning; and 6) the ratio of training samples to features. The final results obtained using the large scale systems of BC Hydro and Hydro Quebec demonstrates a good potential for neural network in dynamic security assessment contingency screening and ranking.

  2. 10 CFR 1046.15 - Training and qualification for security skills and knowledge.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Training and qualification for security skills and... SECURITY INTERESTS Protective Force Personnel § 1046.15 Training and qualification for security skills and... and Qualification for Security Skills and Knowledge,” to this subpart. The DOE contractor shall...

  3. 77 FR 61771 - Facility Security Officer Training Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-11

    ... Security Officer training program, with the primary focus on developing the curriculum for such a program... Administrator of the Department of Transportation in developing the FSO training curriculum. The purpose of the...) to establish comprehensive FSO training requirements designed to provide full security training that...

  4. SELECTION AND TRAINING, A SURVEY OF IOWA MANUFACTURING FIRMS. MONOGRAPH SERIES NO. 4.

    ERIC Educational Resources Information Center

    SHERIFF, DON R.; AND OTHERS

    INFORMATION ON EMPLOYEE SELECTION AND TRAINING ACTIVITIES WAS SECURED FROM QUESTIONNAIRES RETURNED BY 215 OF 283 FIRMS EMPLOYING AT LEAST 100 PERSONS. DATA FROM 207 SEPARATE ITEMS FOR EACH FIRM WERE KEY PUNCHED AND TABULATED INTO MULTIVARIATE CROSS-CLASSIFICATIONS. OVER 60 PERCENT OF THE FIRMS WERE IN CITIES HAVING OVER 25,000 POPULATION, 40…

  5. An Examination of Information Security Training and Education for IT Professionals in a Community College: A Case Study

    ERIC Educational Resources Information Center

    Stark, Adam

    2017-01-01

    This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…

  6. 49 CFR 172.323 - Infectious substances.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation PIPELINE AND HAZARDOUS MATERIALS SAFETY... PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Marking § 172.323 Infectious substances. (a) In addition to other requirements of this...

  7. Data security.

    PubMed

    2016-09-01

    A government-commissioned review of data security across health and care has led to the proposal of new standards for security and options for a consent/opt-out model. Standards include that all staff complete appropriate annual data security training and pass a mandatory test provided through the revised Information Governance Toolkit, that personal confidential data is only accessible to staff who need it for their current role, and that access is removed as soon as it is no longer required. The consent/opt-out model is outlined under 8 statements, and includes certain circumstances where it will not apply, for example, where there is an overriding public interest, or mandatory legal requirement.

  8. 77 FR 63849 - Facility Security Officer Training Requirements; Correction

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-17

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket No. USCG-2012-0908] Facility Security Officer Training Requirements; Correction AGENCY: Coast Guard, DHS. ACTION: Notice of public meeting; request for... comments on the development of a Facility Security Officer training program. The notice contains an...

  9. Developing the security culture at the SEISMED Reference Centres.

    PubMed

    Fowler, J

    1996-01-01

    The paper gives a brief summary of the SEISMED project and the particular role played by the Reference Centres. Details are given of the hardware and application systems in use in the Royal Hospitals (NHS) Trust (RHT), one of the SEISMED Reference Centres. It proposes, without verification, a definition of a Security Culture based on three criteria. These are suggested to be the "Awareness" the "Acceptance" and the "Actions" of the management and staff to improve Information Systems Security throughout the RHT. The way that "Awareness" was increased is shown by the specific initiatives commenced as a result of a CRAMM Risk Analysis and the management and staff training programmes. The specific initiatives mentioned include, an Information Systems Security Policy, a contingency and disaster recovery plan, improvements in the physical protection of equipment and changes to the method of access control. The "Acceptance" by the staff of these measures is considered and the success or failure of "Developing A Security Culture" examined. The role of SEISMED in this process is assessed.

  10. New Resources for Collecting Psychological Conditions Information

    DTIC Science & Technology

    2007-12-01

    about personnel security investigations, and presents additional recommendations to assist investigators who must collect psychological conditions...After it appears in the Monitor, add the article by the American Psychological Association’s ethics director to the investigator training program. 3...person concept. Available, reliable information about the person, past and present , favorable and unfavorable, should be considered in reaching a

  11. A Quantitative Examination of Perceived Promotability of Information Security Professionals with Vendor-Specific Certifications versus Vendor-Neutral Certifications

    ERIC Educational Resources Information Center

    Gleghorn, Gregory D.

    2011-01-01

    Human capital theory suggests the knowledge, skills, and abilities one obtains through experience, on-the-job training, or education enhances one's productivity. This research was based on human capital theory and promotability (i.e., upward mobility). The research offered in this dissertation shows what effect obtaining information security…

  12. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Training and knowledge for individuals with... SECURITY INDIRECT AIR CARRIER SECURITY § 1548.11 Training and knowledge for individuals with security... accept, handle, transport, or deliver cargo have knowledge of the— (1) Applicable provisions of this part...

  13. Organizing safety: conditions for successful information assurance programs.

    PubMed

    Collmann, Jeff; Coleman, Johnathan; Sostrom, Kristen; Wright, Willie

    2004-01-01

    Organizations must continuously seek safety. When considering computerized health information systems, "safety" includes protecting the integrity, confidentiality, and availability of information assets such as patient information, key components of the technical information system, and critical personnel. "High Reliability Theory" (HRT) argues that organizations with strong leadership support, continuous training, redundant safety mechanisms, and "cultures of high reliability" can deploy and safely manage complex, risky technologies such as nuclear weapons systems or computerized health information systems. In preparation for the Health Insurance Portability and Accountability Act (HIPAA) of 1996, the Office of the Assistant Secretary of Defense (Health Affairs), the Offices of the Surgeons General of the United States Army, Navy and Air Force, and the Telemedicine and Advanced Technology Research Center (TATRC), US Army Medical Research and Materiel Command sponsored organizational, doctrinal, and technical projects that individually and collectively promote conditions for a "culture of information assurance." These efforts include sponsoring the "P3 Working Group" (P3WG), an interdisciplinary, tri-service taskforce that reviewed all relevant Department of Defense (DoD), Miliary Health System (MHS), Army, Navy and Air Force policies for compliance with the HIPAA medical privacy and data security regulations; supporting development, training, and deployment of OCTAVE(sm), a self-directed information security risk assessment process; and sponsoring development of the Risk Information Management Resource (RIMR), a Web-enabled enterprise portal about health information assurance.

  14. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Booker, Paul M.; Maple, Scott A.

    2010-06-08

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a causemore » add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance to smuggling activities after training or technology is deployed at a given location. This paper will present an approach to holistic border security information analysis.« less

  15. A Video Game for Cyber Security Training and Awareness

    DTIC Science & Technology

    2006-01-01

    potentially mundane. Video games have been proposed as an engaging training vehicle (Prenski, 2001). Here we describe a video game-like tool called Cyber- CIEGE...formation assurance, and information assurance technolo- gists with little background in video games . Early focus was on establishing a language that... video games or adventure games appear more inclined to explorethe game, sometimes proceeding beyond the simple aware- ness scenarios into more

  16. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1980-05-22

    SECURITY. - CONTINUED TRAINING OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. - SECURITY PROGRAMS IMPLEMENTED BY AIR FREIGHT...cooperation by all concerned. (See Exhibit 14) Airport Security - Ongoing activities which contributed significantly to airport security included full...implementation of the revised Federal Aviation Regulations (FAR) Part 107 governing airport security , training of law enforcement officers supporting

  17. The Human Resources Management System: Part 1.

    ERIC Educational Resources Information Center

    Ceriello, Vincent R.

    1982-01-01

    Presents a systematic and disciplined approach to planning for the development and implementation of an information system which will collect, store, maintain, and report human resources data. Discusses guidelines, priorities, training requirements, security, auditing, interface with payroll, and personnel reporting. (CT)

  18. 20 CFR 401.30 - Privacy Act and other responsibilities.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ....30 Section 401.30 Employees' Benefits SOCIAL SECURITY ADMINISTRATION PRIVACY AND DISCLOSURE OF... that agency employees and contractors receive appropriate training and education programs regarding the... information privacy issues, including those relating to the collection, use, sharing, and disclosure of...

  19. 20 CFR 401.30 - Privacy Act and other responsibilities.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ....30 Section 401.30 Employees' Benefits SOCIAL SECURITY ADMINISTRATION PRIVACY AND DISCLOSURE OF... that agency employees and contractors receive appropriate training and education programs regarding the... information privacy issues, including those relating to the collection, use, sharing, and disclosure of...

  20. 20 CFR 401.30 - Privacy Act and other responsibilities.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ....30 Section 401.30 Employees' Benefits SOCIAL SECURITY ADMINISTRATION PRIVACY AND DISCLOSURE OF... that agency employees and contractors receive appropriate training and education programs regarding the... information privacy issues, including those relating to the collection, use, sharing, and disclosure of...

  1. 20 CFR 401.30 - Privacy Act and other responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ....30 Section 401.30 Employees' Benefits SOCIAL SECURITY ADMINISTRATION PRIVACY AND DISCLOSURE OF... that agency employees and contractors receive appropriate training and education programs regarding the... information privacy issues, including those relating to the collection, use, sharing, and disclosure of...

  2. Repositioning Technical and Vocational Education and Training (TVET) for Youths Employment and National Security in Nigeria

    ERIC Educational Resources Information Center

    Ogbunaya, T. C.; Udoudo, Ekereobong S.

    2015-01-01

    The paper focused on repositioning Technical and Vocational Education and Training (TVET) for youth's employment and national security in Nigeria. It examined briefly the concepts of technical vocational education and training (TVET), youths, unemployment and national security as well as the effects of unemployment on national security in Nigeria.…

  3. Rotting from Within: American Education and National Security

    DTIC Science & Technology

    2011-03-04

    Service, Training, Obesity, Health, Physical Fitness, Economic, Security, Training Education, High School, Pre-School, Teachers, Leaders, Military...Accessions, Citizenship, Quality, Selfless Service, Training, Obesity, Health, Physical Fitness, Economic, Security, Training Education, High School...subject areas 4 such as the arts and physical fitness. This emphasis on core-courses was mostly adhered to by America‘s diverse school systems

  4. 78 FR 69310 - Hazardous Materials Table, Special Provisions, Hazardous Materials Communications, Emergency...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-19

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration 49 CFR Part 172 Hazardous Materials Table, Special Provisions, Hazardous Materials Communications, Emergency Response Information, Training Requirements, and Security Plans CFR Correction In Title 49 of the Code of...

  5. 28 CFR 65.70 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...; (3) Criminal Division of the Department of Justice; (4) Internal Revenue Service; (5) Customs Service; (6) Department of Homeland Security; (7) U.S. Marshals Service; (8) National Park Service; (9) U.S... Act to mean funds, equipment, training, intelligence information, and personnel. (c) Federal law...

  6. Advancing STEM Career and Learning through Civic Engagement

    ERIC Educational Resources Information Center

    Xie, Yichun

    2014-01-01

    The Mayor's Youth Technology Corps (MYTC)--Creating Safe Communities through Information Technology Training in Homeland Security Applications (2008-2012)--offered a collaboration of resources, supports, and opportunities for strengthening science, technology, engineering, and mathematics (STEM) education efforts in an underserved community, the…

  7. The security of patient identifiable information in doctors' homes.

    PubMed

    McLean, Iain; Anderson, C Mary

    2004-08-01

    Ethically and legally doctors bear a responsibility to ensure the security of patient identifiable information in their possession. Many doctors, especially those in forensic medicine, hold paper or computerised medical records at home. This survey was conducted to assess the level of security for these records and awareness of the issues. Fifty-six forensic physicians (30 male, 26 female) answered a questionnaire. Eighty-nine percent used a computer to write patient notes and reports, but only 26 of these were on the Data Protection Register, and only 24 password-protected their files. Few doctors took steps to protect data on old computers they had stopped using. Of those responding, 88% held paper records at home but only of these had lockable filing cabinets. Burglar alarms were fitted in 77% of homes, yet 36% of homes had been burgled. No participants had written instructions for disposal of records and reports after their death. Older participants were more likely to have been burgled, yet less likely to have antiviral software than their younger counterparts. Participants expressed the need for information, education and training in data security.

  8. Safety Psychology Applicating on Coal Mine Safety Management Based on Information System

    NASA Astrophysics Data System (ADS)

    Hou, Baoyue; Chen, Fei

    In recent years, with the increase of intensity of coal mining, a great number of major accidents happen frequently, the reason mostly due to human factors, but human's unsafely behavior are affected by insecurity mental control. In order to reduce accidents, and to improve safety management, with the help of application security psychology, we analyse the cause of insecurity psychological factors from human perception, from personality development, from motivation incentive, from reward and punishment mechanism, and from security aspects of mental training , and put forward countermeasures to promote coal mine safety production,and to provide information for coal mining to improve the level of safety management.

  9. 456 Hours to Train the Reserve Component: Analysis of the Impact of Increased Annual Training Requirements on 4th Assault Amphibian Battalion

    DTIC Science & Technology

    2016-12-01

    contends with to accomplish annual general military training requirements and mission essential tasks. Currently, there are 18 annual general military...training model that can be used to improve training effectiveness and efficiency. We believe that adjusting how reserve units conduct 11 of the 18 ...PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18 . SECURITY CLASSIFICATION OF THIS PAGE Unclassified 19. SECURITY

  10. 78 FR 9711 - Agency Information Collection Activities; Submission for OMB Review; Comment Request: Crisis...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-11

    ... Request: Crisis Counseling Assistance and Training Program AGENCY: Federal Emergency Management Agency, DHS. ACTION: Notice. SUMMARY: The Federal Emergency Management Agency (FEMA) will submit the... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2012-0031...

  11. 32 CFR 2001.71 - Coverage.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Coverage. 2001.71 Section 2001.71 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL... Training § 2001.71 Coverage. (a) General. Each department or agency shall establish and maintain a formal...

  12. 32 CFR 2001.71 - Coverage.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Coverage. 2001.71 Section 2001.71 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL... Training § 2001.71 Coverage. (a) General. Each department or agency shall establish and maintain a formal...

  13. 32 CFR 2001.71 - Coverage.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Coverage. 2001.71 Section 2001.71 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL... Training § 2001.71 Coverage. (a) General. Each department or agency shall establish and maintain a formal...

  14. Development of an Information Security Awareness Training Program for the Royal Saudi Naval Forces (RSNF)

    DTIC Science & Technology

    2003-06-01

    security faculty. This program offers great teaching along with the ability to master the material needed for the two most popular certifications in...then move on to an overview of some popular networks. The Open Systems Interconnect model (OSI) will be introduced to trainees to make them understand...several different network types, this part explains the two most popular types of networks: LANs and WANs. 2.1.4. Time: 30 Minutes 32 2.2. Network

  15. A review of video security training and assessment-systems and their applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cellucci, J.; Hall, R.J.

    1991-01-01

    This paper reports that during the last 10 years computer-aided video data collection and playback systems have been used as nuclear facility security training and assessment tools with varying degrees of success. These mobile systems have been used by trained security personnel for response force training, vulnerability assessment, force-on-force exercises and crisis management. Typically, synchronous recordings from multiple video cameras, communications audio, and digital sensor inputs; are played back to the exercise participants and then edited for training and briefing. Factors that have influence user acceptance include: frequency of use, the demands placed on security personnel, fear of punishment, usermore » training requirements and equipment cost. The introduction of S-VHS video and new software for scenario planning, video editing and data reduction; should bring about a wider range of security applications and supply the opportunity for significant cost sharing with other user groups.« less

  16. Assessing the need for communication training for specialists in poison information.

    PubMed

    Planalp, Sally; Crouch, Barbara; Rothwell, Erin; Ellington, Lee

    2009-07-01

    Effective communication has been shown to be essential to physician-patient communication and may be even more critical for poison control center (PCC) calls because of the absence of visual cues, the need for quick and accurate information exchange, and possible suboptimal conditions such as call surges. Professionals who answer poison control calls typically receive extensive training in toxicology but very little formal training in communication. An instrument was developed to assess the perceived need for communication training for specialists in poison information (SPIs) with input from focus groups and a panel of experts. Requests to respond to an online questionnaire were made to PCCs throughout the United States and Canada. The 537 respondents were 70% SPIs or poison information providers (PIPs), primarily educated in nursing or pharmacy, working across the United States and Canada, and employed by their current centers an average of 10 years. SPIs rated communication skills as extremely important to securing positive outcomes for PCC calls even though they reported that their own training was not strongly focused on communication and existing training in communication was perceived as only moderately useful. Ratings of the usefulness of 21 specific training units were consistently high, especially for new SPIs but also for experienced SPIs. Directors rated the usefulness of training for experienced SPIs higher for 5 of the 21 challenges compared to the ratings of SPIs. Findings support the need for communication training for SPIs and provide an empirical basis for setting priorities in developing training units.

  17. 49 CFR 193.2709 - Security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  18. 49 CFR 193.2709 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 3 2011-10-01 2011-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  19. 49 CFR 193.2709 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 3 2014-10-01 2014-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  20. 49 CFR 193.2709 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 49 Transportation 3 2012-10-01 2012-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  1. 49 CFR 193.2709 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 49 Transportation 3 2013-10-01 2013-10-01 false Security. 193.2709 Section 193.2709 Transportation...: FEDERAL SAFETY STANDARDS Personnel Qualifications and Training § 193.2709 Security. Personnel having security duties must be qualified to perform their assigned duties by successful completion of the training...

  2. Word Frequency Analysis. MOS: 19F. Skill Levels 1 & 2.

    DTIC Science & Technology

    1981-05-01

    NUMBER(a) Dr. Alexander A. Longo 9. PERFORMING ORGANIZATION NAME AND ADCRESS 10. PROGRAM ELEMENT, PROJECT, TASK AREA 4 WORK UNIT NUMSERS Training ...Developments Institute ATTN: ATTG-DOR Fort Monroe, VA 23651 -- It. CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE Training Developments Institute IAvJ...JAW 73 1473 EInON OF I NOV 6S IS OBSOLETE SECURITY CLASSIFICATION O F Tl)lS PAGE (ifNe Dote Entered) Contents and General Information 1. The Word

  3. Fabricating Synthetic Data in Support of Training for Domestic Terrorist Activity Data Mining Research

    DTIC Science & Technology

    2010-09-01

    of Mannheim seeks to produce realistic digital images for student analysis ( Moch & Freiling, 2009). Using instructor generated scripts and the...laboratory. ACM Transactions on Information and System Security, (pp. 262-294). Moch , C., & Freiling, F. (2009). The forensic image generator

  4. 76 FR 70420 - New England Fishery Management Council; Public Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-14

    ... United States Coast Guard will hold a Commercial Fishing Gear Stowage Workshop to consider actions... Fisheries Training Center, 5200 East Hospital Road, Buzzards Bay, MA 02542. The public must preregister for this workshop to facilitate entrance to this secure facility, see supplementary information for details...

  5. Meeting the privacy requirements for the development of a multi-centre patient registry in Canada: the Rick Hansen Spinal Cord Injury Registry.

    PubMed

    Noonan, Vanessa K; Thorogood, Nancy P; Joshi, Phalgun B; Fehlings, Michael G; Craven, B Catharine; Linassi, Gary; Fourney, Daryl R; Kwon, Brian K; Bailey, Christopher S; Tsai, Eve C; Drew, Brian M; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F

    2013-05-01

    Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. Copyright © 2013 Longwoods Publishing.

  6. Meeting the Privacy Requirements for the Development of a Multi-Centre Patient Registry in Canada: The Rick Hansen Spinal Cord Injury Registry

    PubMed Central

    Noonan, Vanessa K.; Thorogood, Nancy P.; Joshi, Phalgun B.; Fehlings, Michael G.; Craven, B. Catharine; Linassi, Gary; Fourney, Daryl R.; Kwon, Brian K.; Bailey, Christopher S.; Tsai, Eve C.; Drew, Brian M.; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F.

    2013-01-01

    Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. PMID:23968640

  7. Campus Protective Services: A Self-Instructional Training Course for Campus Security Personnel.

    ERIC Educational Resources Information Center

    Mullendore, Philip

    While most college campuses use non-sworn personnel, mostly students, to supplement regular security or peace officer personnel, there is no legal requirement or formal strategy for training these non-sworn officers. This handbook presents a self-instructional training course for non-sworn campus security personnel and was prepared to meet…

  8. Private Security Training. Phase 1: Basic. Instructor Edition.

    ERIC Educational Resources Information Center

    Oklahoma State Dept. of Vocational and Technical Education, Stillwater. Curriculum and Instructional Materials Center.

    This basic module on private security training was designed under the direction of the Oklahoma Council on Law Enforcement Education and Training to teach basic skills necessary for entry-level employment in this field. This module contains six instructional units that cover the following topics: (1) interpreting the Oklahoma Security Guard and…

  9. Training and the Training Officer/Coordinator

    ERIC Educational Resources Information Center

    Holman, Larry L., Jr.

    2008-01-01

    The role of the campus law enforcement/security officer is to provide safety and security to students, staff/faculty, visitors and campus property as well as enforce all laws, and campus/departmental policies and procedures. This is the reason that training for the campus law enforcement/security officer is so vital to his/her safety and…

  10. Analysis of health professional security behaviors in a real clinical setting: an empirical study.

    PubMed

    Fernández-Alemán, José Luis; Sánchez-Henarejos, Ana; Toval, Ambrosio; Sánchez-García, Ana Belén; Hernández-Hernández, Isabel; Fernandez-Luque, Luis

    2015-06-01

    The objective of this paper is to evaluate the security behavior of healthcare professionals in a real clinical setting. Standards, guidelines and recommendations on security and privacy best practices for staff personnel were identified using a systematic literature review. After a revision process, a questionnaire consisting of 27 questions was created and responded to by 180 health professionals from a public hospital. Weak passwords were reported by 62.2% of the respondents, 31.7% were unaware of the organization's procedures for discarding confidential information, and 19.4% did not carry out these procedures. Half of the respondents (51.7%) did not take measures to ensure that the personal health information on the computer monitor could not be seen by unauthorized individuals, and 57.8% were unaware of the procedure established to report a security violation. The correlation between the number of years in the position and good security practices was not significant (Pearson's r=0.085, P=0.254). Age was weakly correlated with good security practices (Pearson's r=-0.169, P=0.028). A Mann-Whitney test showed no significant difference between the respondents' security behavior as regards gender (U=2536, P=0.792, n=178). The results of the study suggest that more efforts are required to improve security education for health personnel. It was found that both preventive and corrective actions are needed to prevent health staff from causing security incidents. Healthcare organizations should: identify the types of information that require protection, clearly communicate the penalties that will be imposed, promote security training courses, and define what the organization considers improper behavior to be and communicate this to all personnel. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  11. [Access control management in electronic health records: a systematic literature review].

    PubMed

    Carrión Señor, Inmaculada; Fernández Alemán, José Luis; Toval, Ambrosio

    2012-01-01

    This study presents the results of a systematic literature review of aspects related to access control in electronic health records systems, wireless security and privacy and security training for users. Information sources consisted of original articles found in Medline, ACM Digital Library, Wiley InterScience, IEEE Digital Library, Science@Direct, MetaPress, ERIC, CINAHL and Trip Database, published between January 2006 and January 2011. A total of 1,208 articles were extracted using a predefined search string and were reviewed by the authors. The final selection consisted of 24 articles. Of the selected articles, 21 dealt with access policies in electronic health records systems. Eleven articles discussed whether access to electronic health records should be granted by patients or by health organizations. Wireless environments were only considered in three articles. Finally, only four articles explicitly mentioned that technical training of staff and/or patients is required. Role-based access control is the preferred mechanism to deploy access policy by the designers of electronic health records. In most systems, access control is managed by users and health professionals, which promotes patients' right to control personal information. Finally, the security of wireless environments is not usually considered. However, one line of research is eHealth in mobile environments, called mHealth. Copyright © 2011 SESPAS. Published by Elsevier Espana. All rights reserved.

  12. A National Agenda for Public Health Informatics

    PubMed Central

    Yasnoff, William A.; Overhage, J. Marc; Humphreys, Betsy L.; LaVenture, Martin

    2001-01-01

    The AMIA 2001 Spring Congress brought together members of the the public health and informatics communities to develop a national agenda for public health informatics. Discussions of funding and governance; architecture and infrastructure; standards and vocabulary; research, evaluation, and best practices; privacy, confidentiality, and security; and training and workforce resulted in 74 recommendations with two key themes—that all stakeholders need to be engaged in coordinated activities related to public health information architecture, standards, confidentiality, best practices, and research; and that informatics training is needed throughout the public health workforce. Implementation of this consensus agenda will help promote progress in the application of information technology to improve public health. PMID:11687561

  13. Gathering Information from Transport Systems for Processing in Supply Chains

    NASA Astrophysics Data System (ADS)

    Kodym, Oldřich; Unucka, Jakub

    2016-12-01

    Paper deals with complex system for processing information from means of transport acting as parts of train (rail or road). It focuses on automated information gathering using AutoID technology, information transmission via Internet of Things networks and information usage in information systems of logistic firms for support of selected processes on MES and ERP levels. Different kinds of gathered information from whole transport chain are discussed. Compliance with existing standards is mentioned. Security of information in full life cycle is integral part of presented system. Design of fully equipped system based on synthesized functional nodes is presented.

  14. The Future of Indigenous Security Force Training: Considerations for the Joint Operational Commander

    DTIC Science & Technology

    2007-11-06

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE The Future of Indigenous Security Force Training: 5a. CONTRACT NUMBER...focus on indigenous security force training and development (ISFTD) is unique to OIF or if it foreshadows a requirement that must be addressed in...operational plans using ad hoc capabilities. This research paper seeks to demonstrate that the U.S. military has an increased need to train indigenous

  15. Redefining the High-Technology Classroom.

    ERIC Educational Resources Information Center

    Dickson, Gary W.; Segars, Albert

    1999-01-01

    Defines the physical and virtual space of high-tech classrooms in terms of one-to-many, many-to-one, one-to-one, and many-to-many communications modes. Urges an active approach to using information technology that includes administrative and technical support, rewards for innovation, training, security, and good design. (SK)

  16. Community Colleges in the Highway: Major Issues for Technology Planning.

    ERIC Educational Resources Information Center

    Moquin, Bert; Travis, Jon E.

    1999-01-01

    Rates the importance of planning topics, as identified by technology personnel at Texas community colleges, related to the information superhighway (ISH). Finds, through a Delphi study, that significant issues that should be considered in strategic technology planning include training, cost, planning, security/legal, uses and innovations,…

  17. Designing for the Elderly User: Internet Safety Training

    ERIC Educational Resources Information Center

    Appelt, Lianne C.

    2016-01-01

    The following qualitative study examines the usability of a custom-designed Internet safety tutorial, targeted at elderly individuals who use the Internet regularly, for effectively conveying critical information regarding online fraud, scams, and other cyber security. The elderly population is especially at risk when it comes to fraudulent…

  18. The Invisible Minority: Preparing Teachers to Meet the Needs of Gay and Lesbian Youth.

    ERIC Educational Resources Information Center

    Mathison, Carla

    1998-01-01

    Teacher educators can help prepare future educators to teach homosexual students by creating safe environments for homosexual students, providing positive role models, selecting relevant curriculum and activities, providing information and training for faculty, securing relevant library holdings, and conducting research on homosexual students.…

  19. Cable T.V.: Boon to Vocational Guidance in Rural Areas.

    ERIC Educational Resources Information Center

    Bliss, James L.; And Others

    Allegany Opportunities is a television series which is designed to assist people who may be unemployed, underemployed, or contemplating entering an occupational field by informing them of opportunities available for work, training, and education and procedures for securing work in rural Allegany County. Emphasis is on those occupations requiring…

  20. DOE's Computer Incident Advisory Capability (CIAC)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schultz, E.

    1990-09-01

    Computer security is essential in maintaining quality in the computing environment. Computer security incidents, however, are becoming more sophisticated. The DOE Computer Incident Advisory Capability (CIAC) team was formed primarily to assist DOE sites in responding to computer security incidents. Among CIAC's other responsibilities are gathering and distributing information to DOE sites, providing training workshops, coordinating with other agencies, response teams, and vendors, creating guidelines for incident handling, and developing software tools. CIAC has already provided considerable assistance to DOE sites faced with virus infections and worm and hacker attacks, has issued over 40 information bulletins, and has developed andmore » presented a workshop on incident handling. CIAC's experience in helping sites has produced several lessons learned, including the need to follow effective procedures to avoid virus infections in small systems and the need for sound password management and system administration in networked systems. CIAC's activity and scope will expand in the future. 4 refs.« less

  1. Radioactive source security: the cultural challenges.

    PubMed

    Englefield, Chris

    2015-04-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  2. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1980-10-14

    CEASE FUNDING OF TRAINING"OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. F. FEDERAL AIR MARSHALS PROVIDE LAW ENFORCEMENT SUPPORT...enforcement officer authority through special deputations by the U.S. Marshals Service on an annual basis. Airport Security - Continuing activities...which contributed signifi- cantly to airport security include the training of local law enforcement officers supporting airport security programs, the

  3. Identification of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2009-02-01

    This report documents the identification of strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP).There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important to leverage every education and training dollar. The leveraging of dollars serves many purposes.more » These include increasing the amount of training that can be delivered and therefore increasing the number of people reached, increasing the number and quality of public/private partnerships, and increasing the number of businesses that are involved in the training of their future workforce.« less

  4. The Training and Employment of Area Specialists in the Military

    DTIC Science & Technology

    1989-06-01

    Unit Acca =o N I1. Title (Include Security Classification) The Training and Employment of Area Specialists in the Military 12 Personal Author(s) Randy P...administering, and analyzing a survey that accounts for about half of the information to come. This work does not answer all the ques- tions that exist...original Academic Associate and co-author of the area studies curriculum at NPS, that these factors accounted for the original decision by the Army to begin

  5. User's guide for the IEBT application

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bartoletti, T

    INFOSEC Experience-Based Training (IEBT) is a simulation and modeling approach to education in the arena of information security issues and its application to system-specific operations. The IEBT philosophy is that ''Experience is the Best Teacher''. This approach to computer-based training aims to bridge the gap between unappealing ''read the text, answer the questions'' types of training (largely a test of short-term memory), and the far more costly, time-consuming and inconvenient ''real hardware'' laboratory experience. Simulation and modeling supports this bridge by allowing the critical or salient features to be exercised while avoiding those aspects of a real world experience unrelatedmore » to the training goal.« less

  6. Downgrade of the Savannah River Sites FB-Line

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    SADOWSKI, ED; YOURCHAK, RANDY; PRETZELLO MARJI

    2005-07-05

    This paper will discuss the Safeguards & Security (S&S) activities that resulted in the downgrade of the Savannah River Site's FB-Line (FBL) from a Category I Material Balance Area (MBA) in a Material Access Area (MAA) to a Category IV MBA in a Property Protection Area (PPA). The Safeguards activities included measurement of final product items, transferal of nuclear material to other Savannah River Site (SRS) facilities, discard of excess nuclear material items, and final measurements of holdup material. The Security activities included relocation and destruction of classified documents and repositories, decertification of a classified computer, access control changes, updatesmore » to planning documents, deactivation and removal of security systems, Human Reliability Program (HRP) removals, and information security training for personnel that will remain in the FBL PPA.« less

  7. Changing Mindsets to Transform Security: Leader Development for an Unpredictable and Complex World

    DTIC Science & Technology

    2013-01-01

    fields of phys- ical science, the amount of information is doubling every one to two years, meaning that more than half of what a college student has...beyond a review of current events or it being at a “ informational ” level. Naval War College Professor Mackubin Owens stated in 2006, that, The new... information technology in education and training underpinned by a sta- ble and experienced academic community that can support the exponential growth

  8. CERT(Restricted) Resilience Management Model (CERT(Restricted)-RMM) V1.1: NIST Special Publication 800-66 Crosswalk

    DTIC Science & Technology

    2013-10-01

    Technology Assets • EXD:SG2 Manage Risks Due to External Dependencies (SP1-SP2) • EXD:SG3.SP4 Formalize Relationships 5 . Data Backup Plan and...Information Access Management (C.E.R. § 164.308(a)(4)) 11 4.5. Security Awareness and Training (C.E.R. § 164.308(a)( 5 )) 13 4.6. Security Incident Procedures...for managing operational resilience. It has two primary objectives: • Establish the convergence of operational risk and resilience management

  9. Brownfields Grants Information

    EPA Pesticide Factsheets

    This asset includes all types of information regarding Brownfields grant programs that subsidize/support Brownfield cleanup. This includes EPA's Brownfields Program grant funding for brownfields assessment, cleanup, revolving loans, and environmental job training. Assessment grants provide funding for a grant recipient to inventory, characterize, assess, and conduct planning and community involvement related to brownfield sites. Revolving Loan Fund Grants enable States, political subdivisions, and Indian tribes to make low interest loans to carryout cleanup activities at brownfields properties. Cleanup grants provide funding for a grant recipient to carry out cleanup activities at brownfield sites. Environmental Workforce Development and Job Training Grants are designed to provide funding to eligible entities, including nonprofit organizations, to recruit, train, and place predominantly low-income and minority, unemployed and under-employed residents of solid and hazardous waste-impacted communities with the skills needed to secure full-time, sustainable employment in the environmental field and in the assessment and cleanup work taking place in their communities. Training, Research, and Technical Assistance Grants provide funding to eligible organizations to provide training, research, and technical assistance to facilitate brownfields cleanup. Regulatory authority for the collection and use of this information is found in the Small Business Liability Relief

  10. The Idea to Promote the Development of E-Government in the Civil Aviation System

    NASA Astrophysics Data System (ADS)

    Renliang, Jiang

    E-government has a significant impact on the organizational structure, working mechanism, operating methods and behavior patterns of the civil aviation administration department.The purpose of this research is to find some countermeasures propelling the electronization, network and office automation of the civil aviation system.The method used in the study was field and literature research.The studies showed that government departments in the civil aviation system could promote the development of e-government further by promoting open administration and implementing democratic and scientific decision-making, strengthening the popularization of information technology and information technology training on civil servants, paying attention to the integration and sharing of information resources, formulating a standard e-government system for the civil aviation system, developing the legal security system for the e-government and strengthening the network security.

  11. Organizati" and Programs of the U.S. Department of Labor: Manpower Administration.

    ERIC Educational Resources Information Center

    Manpower Administration (DOL), Washington, DC.

    This publication was prepared to assist agencies in the development of manpower programs under the Demonstration Cities and Metropolitan Development Act of 1966. It contains information concerning the: (1)Manpowe r Administration (MA), (2)Bureau of Employment Security (BES), (3)Bureau of Apprenticeship and Training (BAT), (4)Bureau of Work…

  12. Seeking a Balance: Online Safety for Our Children

    ERIC Educational Resources Information Center

    Endicott-Popovsky, Barbara

    2009-01-01

    Without specific education in online safety and security issues, putting any limitations on access could seem counter to what a librarian is trained to do. At a cybersecurity workshop sponsored by Washington Library Media Association (WLMA) last October, an informal show of hands from attending teacher-librarians uncovered a range of motivations…

  13. 49 CFR Appendix C to Part 172 - Dimensional Specifications for Recommended Placard Holder

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 2 2011-10-01 2011-10-01 false Dimensional Specifications for Recommended Placard Holder C Appendix C to Part 172 Transportation Other Regulations Relating to Transportation PIPELINE AND... INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Pt. 172, App. C Appendix C to Part 172—Dimensional...

  14. 49 CFR Appendix C to Part 172 - Dimensional Specifications for Recommended Placard Holder

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 49 Transportation 2 2014-10-01 2014-10-01 false Dimensional Specifications for Recommended Placard Holder C Appendix C to Part 172 Transportation Other Regulations Relating to Transportation PIPELINE AND... INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Pt. 172, App. C Appendix C to Part 172—Dimensional...

  15. Identification and Access Management: An Action Research Approach to Develop a Training Strategy for Higher Education

    ERIC Educational Resources Information Center

    San Nicolas-Rocca, Tonia

    2010-01-01

    Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…

  16. 49 CFR 172.316 - Packagings containing materials classed as ORM-D.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Packagings containing materials classed as ORM-D... INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Marking § 172.316 Packagings containing materials classed as ORM-D. (a) Each non-bulk packaging containing a material classed as ORM-D must be marked on at...

  17. Electronic health systems: challenges faced by hospital-based providers.

    PubMed

    Agno, Christina Farala; Guo, Kristina L

    2013-01-01

    The purpose of this article is to discuss specific challenges faced by hospitals adopting the use of electronic medical records and implementing electronic health record (EHR) systems. Challenges include user and information technology support; ease of technical use and software interface capabilities; compliance; and financial, legal, workforce training, and development issues. Electronic health records are essential to preventing medical errors, increasing consumer trust and use of the health system, and improving quality and overall efficiency. Government efforts are focused on ways to accelerate the adoption and use of EHRs as a means of facilitating data sharing, protecting health information privacy and security, quickly identifying emerging public health threats, and reducing medical errors and health care costs and increasing quality of care. This article will discuss physician and nonphysician staff training before, during, and after implementation; the effective use of EHR systems' technical features; the selection of a capable and secure EHR system; and the development of collaborative system implementation. Strategies that are necessary to help health care providers achieve successful implementation of EHR systems will be addressed.

  18. Contracting for Reform: The Challenges of Procuring Security Training and Advisory Services in Fragile Environments

    DTIC Science & Technology

    2014-04-30

    reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204...USA, Deputy Director of Contracting, U.S. Army Corps of Engineers The Efficacy of the Government’s Use of Past Performance Information: An... remuneration that we’re paying them. (author interview). Selecting the right people is an investment in quality and success, but this mindset was absent. The

  19. Training and information technology issue, 2005

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Agnihotri, Newal

    The focus of the May-June issue is on training and information technology. Major articles/reports in this issue include: Communicating effectively, by Alain Bucaille, AREVA; Reputation management, by Susan Brisset, Bruce Power; Contol room and HSI modernization guidance, by Joseph Naser, EPRI; How far are we from public acceptance, by Jennifer A. Biedscheid and Murthy Devarakonda, Washington TRU Solutions LLC; Spent fuel management options, by Brent W. Dixon and Steven J. Piet, Idaho National Laboratory; Industry Awards; A secure energy future for America, by George W. Bush, President, United States of America; Vision of the future of nuclear energy, by Annemore » Lauvergeon, AREVA; and, Plant profile: strategy for transition to digital, TXU Power.« less

  20. Experience of Social Media, Training and Development on Work Proficiency: A Qualitative Study with Security Personnel

    ERIC Educational Resources Information Center

    Okyireh, Rexford Owusu; Okyireh, Marijke Akua Adobea

    2016-01-01

    How useful is social media and training programs to the development of professionals in the security sector? In this study the researchers examined three key issues pertaining to training programs. These were marketing of training programs, participant experiences of training content and work proficiency. A sample of ten participants of a forensic…

  1. Framework for Deploying a Virtualized Computing Environment for Collaborative and Secure Data Analytics

    PubMed Central

    Meyer, Adrian; Green, Laura; Faulk, Ciearro; Galla, Stephen; Meyer, Anne-Marie

    2016-01-01

    Introduction: Large amounts of health data generated by a wide range of health care applications across a variety of systems have the potential to offer valuable insight into populations and health care systems, but robust and secure computing and analytic systems are required to leverage this information. Framework: We discuss our experiences deploying a Secure Data Analysis Platform (SeDAP), and provide a framework to plan, build and deploy a virtual desktop infrastructure (VDI) to enable innovation, collaboration and operate within academic funding structures. It outlines 6 core components: Security, Ease of Access, Performance, Cost, Tools, and Training. Conclusion: A platform like SeDAP is not simply successful through technical excellence and performance. It’s adoption is dependent on a collaborative environment where researchers and users plan and evaluate the requirements of all aspects. PMID:27683665

  2. Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges

    NASA Astrophysics Data System (ADS)

    Cayirci, Erdal; Rong, Chunming; Huiskamp, Wim; Verkoelen, Cor

    Military/civilian education training and experimentation networks (ETEN) are an important application area for the cloud computing concept. However, major security challenges have to be overcome to realize an ETEN. These challenges can be categorized as security challenges typical to any cloud and multi-level security challenges specific to an ETEN environment. The cloud approach for ETEN is introduced and its security challenges are explained in this paper.

  3. Certified Training for Nuclear and Radioactive Source Security Management.

    PubMed

    Johnson, Daniel

    2017-04-01

    Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  4. 49 CFR 1522.119 - Training.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation Firms and Validators for the Certified Cargo Screening Program § 1522.119 Training. (a) Initial training. The validation firm must ensure that its validators and...

  5. Computer Security for Commercial Nuclear Power Plants - Literature Review for Korea Hydro Nuclear Power Central Research Institute

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Duran, Felicia Angelica; Waymire, Russell L.

    2013-10-01

    Sandia National Laboratories (SNL) is providing training and consultation activities on security planning and design for the Korea Hydro and Nuclear Power Central Research Institute (KHNPCRI). As part of this effort, SNL performed a literature review on computer security requirements, guidance and best practices that are applicable to an advanced nuclear power plant. This report documents the review of reports generated by SNL and other organizations [U.S. Nuclear Regulatory Commission, Nuclear Energy Institute, and International Atomic Energy Agency] related to protection of information technology resources, primarily digital controls and computer resources and their data networks. Copies of the key documentsmore » have also been provided to KHNP-CRI.« less

  6. TRENCADIS - secure architecture to share and manage DICOM objects in a ontological framework based on OGSA.

    PubMed

    Blanquer, Ignacio; Hernandez, Vicente; Segrelles, Damià; Torres, Erik

    2007-01-01

    Today most European healthcare centers use the digital format for their databases of images. TRENCADIS is a software architecture comprising a set of services as a solution for interconnecting, managing and sharing selected parts of medical DICOM data for the development of training and decision support tools. The organization of the distributed information in virtual repositories is based on semantic criteria. Different groups of researchers could organize themselves to propose a Virtual Organization (VO). These VOs will be interested in specific target areas, and will share information concerning each area. Although the private part of the information to be shared will be removed, special considerations will be taken into account to avoid the access by non-authorized users. This paper describes the security model implemented as part of TRENCADIS. The paper is organized as follows. First introduces the problem and presents our motivations. Section 1 defines the objectives. Section 2 presents an overview of the existing proposals per objective. Section 3 outlines the overall architecture. Section 4 describes how TRENCADIS is architected to realize the security goals discussed in the previous sections. The different security services and components of the infrastructure are briefly explained, as well as the exposed interfaces. Finally, Section 5 concludes and gives some remarks on our future work.

  7. Physically secured orthogonal frequency division multiplexing-passive optical network employing noise-based encryption and signal recovery process

    NASA Astrophysics Data System (ADS)

    Jin, Wei; Zhang, Chongfu; Yuan, Weicheng

    2016-02-01

    We propose a physically enhanced secure scheme for direct detection-orthogonal frequency division multiplexing-passive optical network (DD-OFDM-PON) and long reach coherent detection-orthogonal frequency division multiplexing-passive optical network (LRCO-OFDM-PON), by employing noise-based encryption and channel/phase estimation. The noise data generated by chaos mapping are used to substitute training sequences in preamble to realize channel estimation and frame synchronization, and also to be embedded on variable number of key-selected randomly spaced pilot subcarriers to implement phase estimation. Consequently, the information used for signal recovery is totally hidden as unpredictable noise information in OFDM frames to mask useful information and to prevent illegal users from correctly realizing OFDM demodulation, and thereby enhancing resistance to attackers. The levels of illegal-decryption complexity and implementation complexity are theoretically discussed. Through extensive simulations, the performances of the proposed channel/phase estimation and the security introduced by encrypted pilot carriers have been investigated in both DD-OFDM and LRCO-OFDM systems. In addition, in the proposed secure DD-OFDM/LRCO-OFDM PON models, both legal and illegal receiving scenarios have been considered. These results show that, by utilizing the proposed scheme, the resistance to attackers can be significantly enhanced in DD-OFDM-PON and LRCO-OFDM-PON systems without performance degradations.

  8. Enhanced Facial Symmetry Assessment in Orthodontists

    PubMed Central

    Jackson, Tate H.; Clark, Kait; Mitroff, Stephen R.

    2013-01-01

    Assessing facial symmetry is an evolutionarily important process, which suggests that individual differences in this ability should exist. As existing data are inconclusive, the current study explored whether a group trained in facial symmetry assessment, orthodontists, possessed enhanced abilities. Symmetry assessment was measured using face and non-face stimuli among orthodontic residents and two control groups: university participants with no symmetry training and airport security luggage screeners, a group previously shown to possess expert visual search skills unrelated to facial symmetry. Orthodontic residents were more accurate at assessing symmetry in both upright and inverted faces compared to both control groups, but not for non-face stimuli. These differences are not likely due to motivational biases or a speed-accuracy tradeoff—orthodontic residents were slower than the university participants but not the security screeners. Understanding such individual differences in facial symmetry assessment may inform the perception of facial attractiveness. PMID:24319342

  9. ED Proposed Regulations to Title II of HEA: Comments from the Data Quality Campaign

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2015

    2015-01-01

    States are uniquely positioned to provide feedback to teacher preparation programs (TPPs) on the effectiveness of the teachers they train, and to provide information about the quality of TPPs to the public. States have been building the significant data capacity to reliably and securely link teachers with their students' achievement and growth…

  10. 49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Training and knowledge for individuals with... and knowledge for individuals with security-related duties. (a) No aircraft operator may use any... ensure that individuals performing security-related duties for the aircraft operator have knowledge of...

  11. WebCIS: large scale deployment of a Web-based clinical information system.

    PubMed

    Hripcsak, G; Cimino, J J; Sengupta, S

    1999-01-01

    WebCIS is a Web-based clinical information system. It sits atop the existing Columbia University clinical information system architecture, which includes a clinical repository, the Medical Entities Dictionary, an HL7 interface engine, and an Arden Syntax based clinical event monitor. WebCIS security features include authentication with secure tokens, authorization maintained in an LDAP server, SSL encryption, permanent audit logs, and application time outs. WebCIS is currently used by 810 physicians at the Columbia-Presbyterian center of New York Presbyterian Healthcare to review and enter data into the electronic medical record. Current deployment challenges include maintaining adequate database performance despite complex queries, replacing large numbers of computers that cannot run modern Web browsers, and training users that have never logged onto the Web. Although the raised expectations and higher goals have increased deployment costs, the end result is a far more functional, far more available system.

  12. Commercial Training Device Requirement (CTDR) for Initial Entry Rotary Wing (IERW) Aviation Training Helicopter

    DTIC Science & Technology

    1989-12-24

    training; 16 . PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF...to be leased is 205. One hundred aircraft will be VFR aircraft only. One hundred and five aircraft will be instrument flight rules ( IFR ) certified, 55...of which will be IFR equipped. The other IFR -certified aircraft will be visual flight rules equipped. c. The total lease cost is based on an assumed

  13. 49 CFR 1552.1 - Scope and definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) Definitions. As used in this part: Aircraft simulator means a flight simulator or flight training device, as.... Flight training means instruction received from a flight school in an aircraft or aircraft simulator..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight Training for Aliens and Other...

  14. 49 CFR 1552.1 - Scope and definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) Definitions. As used in this part: Aircraft simulator means a flight simulator or flight training device, as.... Flight training means instruction received from a flight school in an aircraft or aircraft simulator..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight Training for Aliens and Other...

  15. 49 CFR 1552.1 - Scope and definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) Definitions. As used in this part: Aircraft simulator means a flight simulator or flight training device, as.... Flight training means instruction received from a flight school in an aircraft or aircraft simulator..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight Training for Aliens and Other...

  16. 49 CFR 1552.1 - Scope and definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) Definitions. As used in this part: Aircraft simulator means a flight simulator or flight training device, as.... Flight training means instruction received from a flight school in an aircraft or aircraft simulator..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight Training for Aliens and Other...

  17. 49 CFR 1552.1 - Scope and definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) Definitions. As used in this part: Aircraft simulator means a flight simulator or flight training device, as.... Flight training means instruction received from a flight school in an aircraft or aircraft simulator..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight Training for Aliens and Other...

  18. 10 CFR 1046.12 - Physical fitness training program.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Physical fitness training program. 1046.12 Section 1046.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF SECURITY INTERESTS Protective Force Personnel § 1046.12 Physical fitness training program. (a) Each incumbent security police officer...

  19. 10 CFR 1046.12 - Physical fitness training program.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Physical fitness training program. 1046.12 Section 1046.12 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) PHYSICAL PROTECTION OF SECURITY INTERESTS Protective Force Personnel § 1046.12 Physical fitness training program. (a) Each incumbent security police officer...

  20. Training in the Post-Terrorism Era.

    ERIC Educational Resources Information Center

    Caudron, Shari

    2002-01-01

    A survey of training professionals revealed how the terrorist attacks of September 11, 2001 changed employee attitudes toward training. Decreased travel, increased use of distance technologies, development of security and evacuation plans, and emphasis on such topics as diversity, stress management, and security are some of the changes. (JOW)

  1. 76 FR 26714 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-09

    ... with ``Course and training data to include name, grade/rank/series, Social Security Number (SSN... in the system: Course and training data to include name, grade/rank/series, Social Security Number... amended. Purpose(s): The Army Career Tracker will receive training, education, experiential learning...

  2. A cognitive and economic decision theory for examining cyber defense strategies.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bier, Asmeret Brooke

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participantsmore » interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.« less

  3. Scientific Openness and National Security at the National Laboratories

    NASA Astrophysics Data System (ADS)

    McTague, John

    2000-04-01

    The possible loss to the People's Republic of China of important U.S. nuclear-weapons-related information has aroused concern about interactions of scientists employed by the national laboratories with foreign nationals. As a result, the National Academies assembled a committee to examine the roles of the national laboratories, the contribution of foreign interactions to the fulfillment of those roles, the risks and benefits of scientific openness in this context, and the merits and liabilities of the specific policies being implemented or proposed with respect to contacts with foreign nationals. The committee concluded that there are many aspects of the work at the laboratories that benefit from or even demand the opportunity for foreign interactions. The committee recommended five principles for guiding policy: (1) Maintain balance. Policy governing international dialogue by laboratory staff should seek to encourage international engagement in some areas, while tightly controlling it in others. (2) Educate staff. Security procedures should be clear, easy to follow, and serve an understandable purpose. (3) Streamline procedures. Good science is compatible with good security if there is intelligent line management both at the labs and in Washington, which applies effective tools for security in a sensible fashion. (4) Focus efforts. DOE should focus its efforts governing tightened security for information. The greatest attention should obviously be provided to the protection of classified information by appropriate physical and cybersecurity measures, and by personnel procedures and training. (5) Beware of prejudice against foreigners. Over the past half-century foreign-born individuals have contributed broadly and profoundly to national security through their work at the national laboratories.

  4. IFKIS a basis for organizational measures in avalanche risk management

    NASA Astrophysics Data System (ADS)

    Bründl, M.; Etter, H.-J.; Klingler, Ch.; Steiniger, M.; Rhyner, J.; Ammann, W.

    2003-04-01

    The avalanche winter 1999 in Switzerland showed that the combination of protection measures like avalanche barriers, hazard zone mapping, artificial avalanche release and organisational measures (closure of roads, evacuation etc.) proved to perform well. However, education as well as information and communication between the involved organizations proved to be a weak link in the crisis management. In the first part of the project IFKIS we developed a modular education and training course program for security responsibles of settlements and roads. In the second part an information system was developed which improves on the one hand the information fluxes between the national center for avalanche forecasting, the Swiss Federal Institute for Snow and Avalanche Research SLF, and the local forecasters. On the other hand the communication between the avalanche security services in the communities can be enhanced. During the last two years an information system based on Internet technology has been developed for this purpose. This system allows the transmission of measured data and observations to a central database at SLF and visualization of the data for different users. It also provides the possibility to exchange information on organizational measures like closure of roads, artificial avalanche release etc. on a local and regional scale. This improves the information fluxes and the coordination of safety-measures because all users, although at different places, are on the same information level. Inconsistent safety-measures can be avoided and information and communication concerning avalanche safety becomes much more transparent for all persons involved in hazard management. The training program as well the concept for the information-system are important basics for an efficient avalanche risk management but also for other natural processes and catastrophes.

  5. Mission Assurance Modeling and Simulation: A Cyber Security Roadmap

    NASA Technical Reports Server (NTRS)

    Gendron, Gerald; Roberts, David; Poole, Donold; Aquino, Anna

    2012-01-01

    This paper proposes a cyber security modeling and simulation roadmap to enhance mission assurance governance and establish risk reduction processes within constrained budgets. The term mission assurance stems from risk management work by Carnegie Mellon's Software Engineering Institute in the late 19905. By 2010, the Defense Information Systems Agency revised its cyber strategy and established the Program Executive Officer-Mission Assurance. This highlights a shift from simply protecting data to balancing risk and begins a necessary dialogue to establish a cyber security roadmap. The Military Operations Research Society has recommended a cyber community of practice, recognizing there are too few professionals having both cyber and analytic experience. The authors characterize the limited body of knowledge in this symbiotic relationship. This paper identifies operational and research requirements for mission assurance M&S supporting defense and homeland security. M&S techniques are needed for enterprise oversight of cyber investments, test and evaluation, policy, training, and analysis.

  6. Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training.

    PubMed

    de Gramatica, Martina; Massacci, Fabio; Shim, Woohyun; Turhan, Uğur; Williams, Julian

    2017-02-01

    We analyze the issue of agency costs in aviation security by combining results from a quantitative economic model with a qualitative study based on semi-structured interviews. Our model extends previous principal-agent models by combining the traditional fixed and varying monetary responses to physical and cognitive effort with nonmonetary welfare and potentially transferable value of employees' own human capital. To provide empirical evidence for the tradeoffs identified in the quantitative model, we have undertaken an extensive interview process with regulators, airport managers, security personnel, and those tasked with training security personnel from an airport operating in a relatively high-risk state, Turkey. Our results indicate that the effectiveness of additional training depends on the mix of "transferable skills" and "emotional" buy-in of the security agents. Principals need to identify on which side of a critical tipping point their agents are to ensure that additional training, with attached expectations of the burden of work, aligns the incentives of employees with the principals' own objectives. © 2016 Society for Risk Analysis.

  7. The health information system security threat lifecycle: an informatics theory.

    PubMed

    Fernando, Juanita I; Dawson, Linda L

    2009-12-01

    This manuscript describes the health information system security threat lifecycle (HISSTL) theory. The theory is grounded in case study data analyzing clinicians' health information system (HIS) privacy and security (P&S) experiences in the practice context. The 'questerview' technique was applied to this study of 26 clinicians situated in 3 large Australian (across Victoria) teaching hospitals. Questerviews rely on data collection that apply standardized questions and questionnaires during recorded interviews. Analysis (using Nvivo) involved the iterative scrutiny of interview transcripts to identify emergent themes. Issues including poor training, ambiguous legal frameworks containing punitive threats, productivity challenges, usability errors and the limitations of the natural hospital environment emerged from empirical data about the clinicians' HIS P&S practices. The natural hospital environment is defined by the permanence of electronic HISs (e-HISs), shared workspaces, outdated HIT infrastructure, constant interruption, a P&S regulatory environment that is not conducive to optimal training outcomes and budgetary constraints. The evidence also indicated the obtrusiveness, timeliness, and reliability of P&S implementations for clinical work affected participant attitudes to, and use of, e-HISs. The HISSTL emerged from the analysis of study evidence. The theory embodies elements such as the fiscal, regulatory and natural hospital environments which impede P&S implementations in practice settings. These elements conflict with improved patient care outcomes. Efforts by clinicians to avoid conflict and emphasize patient care above P&S tended to manifest as security breaches. These breaches entrench factors beyond clinician control and perpetuate those within clinician control. Security breaches of health information can progress through the HISSTL. Some preliminary suggestions for addressing these issues are proposed. Legislative frameworks that are not related to direct patient care were excluded from this study. Other limitations included an exclusive focus on patient care tasks post-admission and pre-discharge from public hospital wards. Finally, the number of cases was limited by the number of participants who volunteered to participate in the study. It is reasonable to assume these participants were more interested in the P&S of patient care work than their counterparts, though the study was not intended to provide quantitative or statistical data. Nonetheless, additional case studies would strengthen the HISSTL theory if confirmatory, practice-based evidence were found.

  8. Balancing entrepreneurship and business practices for e-collaboration: responsible information sharing in academic research.

    PubMed

    Porter, Mark W; Porter, Mark William; Milley, David; Oliveti, Kristyn; Ladd, Allen; O'Hara, Ryan J; Desai, Bimal R; White, Peter S

    2008-11-06

    Flexible, highly accessible collaboration tools can inherently conflict with controls placed on information sharing by offices charged with privacy protection, compliance, and maintenance of the general business environment. Our implementation of a commercial enterprise wiki within the academic research environment addresses concerns of all involved through the development of a robust user training program, a suite of software customizations that enhance security elements, a robust auditing program, allowance for inter-institutional wiki collaboration, and wiki-specific governance.

  9. Implementation of Strategies to Leverage Public and Private Resources for National Security Workforce Development

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2009-04-01

    This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important tomore » leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.« less

  10. Motivations and reasons for women attending a breast self-examination training program: A qualitative study.

    PubMed

    Yang, Rea-Jeng; Huang, Lian-Hua; Hsieh, Yeu-Sheng; Chung, Ue-Lin; Huang, Chiun-Sheng; Bih, Herng-Dar

    2010-07-10

    Breast cancer is a major threat to Taiwanese women's health. Despite the controversy surrounding the effectiveness of breast self-examination (BSE) in reducing mortality, BSE is still advocated by some health departments. The aim of the study is to provide information about how women decide to practice BSE and their experiences through the training process. Sixty-six women aged 27-50 were recruited. A descriptive study was conducted using small group and individual in-depth interviews to collect data, and using thematic analysis and constant comparison techniques for data analysis. It was found that a sense of self-security became an important motivator for entering BSE training. The satisfaction in obtaining a sense of self-security emerged as the central theme. Furthermore, a ladder motivation model was developed to explain the participants' motivations for entering BSE training. The patterns of motivation include opportunity taking, clarifying confusion, maintaining health, and illness monitoring, which were connected with the risk perception for breast cancer. We recognize that the way women decide to attend BSE training is influenced by personal and social factors. Understanding the different risk assessments women rely on in making their health decisions is essential. This study will assist researchers and health professionals to gain a better understanding of alternative ways to deal with breast health, and not to be limited by the recommendations of the health authorities.

  11. Career Counseling Information

    DTIC Science & Technology

    1989-01-01

    heart disease as described by the National Institutes of Health Conference on Obesity. Fat is clearly the culprit, not total body weight. Overweight is...requiring high-level security clearance, long lead time and specialized training, or overseas screening. This expanded window will allow most personnel with ...replaced with a comprehensive Career Leader Development Program (CLDP). CLDP will include Petty officer Indoctrination Course (POIC); Chief Petty officer

  12. Preventing the cure from being worse than the disease: special issues in hospital outsourcing.

    PubMed

    Beardwood, John; Alleyne, Andrew

    2004-01-01

    Like private sector organizations, hospitals are increasingly outsourcing services from food/cafeteria and security and facilities maintenance to the consulting and training of personnel and information technology (IT) functions. Also like private sector organizations, while hospitals seek the cure that will improve services at less cost, without careful management, the cure can be worse than the disease.

  13. Performance-Based Occupational Strength Testing for Candidate Navy Pilots/Naval Flight Officers.

    DTIC Science & Technology

    1995-08-15

    Classification in accordance with U.S. Security Regulations (i.e., UNCLASSIFIED). If form contains classified information, stamp classification on the top...34Developing job-related preplacement medical examinations." Journal of Occupational Medicine. 23(7): 469-476. 1981. Federal regulations ...transition training for already qualified aviators. Analysis included a review of: current Army Regulations governing prerequisites for combat

  14. Train Practical Nurses to Become Registered Nurses: A Survey of the PN Point of View. Research Report Number 1.

    ERIC Educational Resources Information Center

    Gilpatrick, Eleanor

    To secure information about the characteristics of the practical nurse population and their opinions about registered nurse preparation, questionnaires were distributed to 2,923 practical nurses employed by the New York City Municipal Hospitals. Usable questionnaires numbered 2,361 or 81 percent of the employed PN population. Approximately 9…

  15. Developing measurement indices to enhance protection and resilience of critical infrastructure and key resources.

    PubMed

    Fisher, Ronald E; Norman, Michael

    2010-07-01

    The US Department of Homeland Security (DHS) is developing indices to better assist in the risk management of critical infrastructures. The first of these indices is the Protective Measures Index - a quantitative index that measures overall protection across component categories: physical security, security management, security force, information sharing, protective measures and dependencies. The Protective Measures Index, which can also be recalculated as the Vulnerability Index, is a way to compare differing protective measures (eg fence versus security training). The second of these indices is the Resilience Index, which assesses a site's resilience and consists of three primary components: robustness, resourcefulness and recovery. The third index is the Criticality Index, which assesses the importance of a facility. The Criticality Index includes economic, human, governance and mass evacuation impacts. The Protective Measures Index, Resilience Index and Criticality Index are being developed as part of the Enhanced Critical Infrastructure Protection initiative that DHS protective security advisers implement across the nation at critical facilities. This paper describes two core themes: determination of the vulnerability, resilience and criticality of a facility and comparison of the indices at different facilities.

  16. 48 CFR 225.7402-4 - Law of war training.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... provided by the Defense Acquisition University at https://acc.dau.mil/CommunityBrowser.aspx?id=18014&lang... war training include the following: (i) Private security contractors. (ii) Security guards in or near...

  17. 48 CFR 225.7402-4 - Law of war training.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... provided by the Defense Acquisition University at https://acc.dau.mil/CommunityBrowser.aspx?id=18014&lang... war training include the following: (i) Private security contractors. (ii) Security guards in or near...

  18. 48 CFR 225.7402-4 - Law of war training.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... provided by the Defense Acquisition University at https://acc.dau.mil/CommunityBrowser.aspx?id=18014&lang... war training include the following: (i) Private security contractors. (ii) Security guards in or near...

  19. 32 CFR 2001.71 - Coverage.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., specialized training, and termination briefings. This subpart establishes fundamental security education and... authorities, security managers, classification management officers, security specialists, and all other.... Classification management officers, security managers, security specialists, declassification authorities, and...

  20. Private Security Contractors: The Other Force

    DTIC Science & Technology

    2011-03-22

    improving PSC oversight. This paper will not address private contractors conducting Police force training , governmental use of PSCs outside of Iraq...theater entry requirements, conduct mandatory training , conduct weapons training and qualification and conduct security verification and criminal...an effective oversight program including contractor deployment tracking, limited contract oversight personnel, and untrained Contract Officer

  1. Abramovo Counterterrorism Training Center

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hayes, Christopher M; Ross, Larry; Lingenfelter, Forrest E

    2011-01-01

    The U.S. government has been assisting the Russian Federation (RF) Ministry of Defense (MOD) for many years with nuclear weapons transportation security (NWTS) through the provision of specialized guard escort railcars and cargo railcars with integrated physical security and communication systems, armored transport vehicles, and armored escort vehicles. As a natural continuation of the NWTS program, a partnership has been formed to construct a training center that will provide counterterrorism training to personnel in all branches of the RF MOD. The Abramovo Counterterrorism Training Center (ACTC) is a multinational, multiagency project with funding from Canada, RF and the U.S. Departmentsmore » of Defense and Energy. ACTC will be a facility where MOD personnel can conduct basic through advanced training in various security measures to protect Category IA material against the threat of terrorist attack. The training will enhance defense-in-depth principles by integrating MOD guard force personnel into the overall physical protection systems and improving their overall response time and neutralization capabilities. The ACTC project includes infrastructure improvements, renovation of existing buildings, construction of new buildings, construction of new training facilities, and provision of training and other equipment. Classroom training will be conducted in a renovated training building. Basic and intermediate training will be conducted on three different security training areas where various obstacles and static training devices will be constructed. The central element of ACTC, where advanced training will be held, is the 'autodrome,' a 3 km road along which various terrorist events can be staged to challenge MOD personnel in realistic and dynamic nuclear weapons transportation scenarios. This paper will address the ACTC project elements and the vision for training development and integrating this training into actual nuclear weapons transportation operations.« less

  2. Inspection Report on "Internal Controls over Accountable Classified Removable Electronic Media at Oak Ridge National Laboratory"

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    2009-05-01

    The Department of Energy's Oak Ridge National Laboratory (ORNL) conducts cutting edge scientific research. ORNL utilizes removable electronic media, such as computer hard drives, compact disks, data tapes, etc., to store vast amounts of classified information. Incidents involving breakdowns in controls over classified removable electronic media have been a continuous challenge for the Department. The loss of even one piece of such media can have serious national security implications. In 2004, the Department had a complex-wide 'stand-down' of all activities using classified removable electronic media, and such media containing Secret/Restricted Data or higher classified data was designated 'Accountable Classified Removablemore » Electronic Media' (ACREM). As part of the stand-down, sites were required to conduct a 100 percent physical inventory of all ACREM; enter it all into accountability; and conduct security procedure reviews and training. Further, the Department implemented a series of controls, including conducting periodic inventories, utilizing tamper proof devices on ACREM safes, and appointing trained custodians to be responsible for the material. After performance testing and validation that the required accountability systems were in place, ACREM operations at ORNL were approved for restart on August 10, 2004. We conducted a review at ORNL and associated facilities to determine whether ACREM is managed, protected, and controlled consistent with applicable requirements. We found that: (1) Eight pieces of Secret/Restricted Data media had not been identified as ACREM and placed into a system of accountability. Consequently, the items were not subject to all required protections and controls, such as periodic accountability inventories, oversight by a trained custodian, or storage in a designated ACREM safe. (However, the items were secured in safes approved for classified material.) (2) Other required ACREM protections and controls were not implemented as follows: a tamper indicating device was not being used on an ACREM safe; records documenting when a certain safe was opened did not support that a purported inventory had been conducted; and a safe inventory had not been completed in a timely manner. (3) A Personal Digital Assistant and a thumb drive, both capable of recording or transmitting data, were stored in a security area without an analysis to identify vulnerabilities and compensatory measures having been conducted, as required. We also found that an ORNL Cooperative Research and Development Agreement partner had not disabled classified computer ports at the partner's site that were capable of writing classified information to external or removable media, as required. We made several recommendations designed to enhance the security of ACREM, security areas, and computers.« less

  3. Security training with interactive laser-video-disk technology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilson, D.

    1988-01-01

    DOE, through its contractor EG and G Energy Measurements, Inc., has developed a state-of-the-art interactive-video system for use at the Department of Energy's Central Training Academy. Called the Security Training and Evaluation Shooting System (STRESS), the computer-driven decision shooting system employs the latest is laservideo-disk technology. STRESS is designed to provide realistic and stressful training for security inspectors employed by the DOE and its contractors. The system uses wide-screen video projection, sophisticated scenario-branching technology, and customized video scenarios especially designed for the DOE. Firing a weapon that has been modified to shoot ''laser bullets,'' and wearing a special vest thatmore » detects ''hits'': the security inspector encounters adversaries on the wide screen who can shoot or be shot by the inspector in scenarios that demand fast decisions. Based on those decisions, the computer provides instantaneous branching to different scenes, giving the inspector confrontational training with the realism and variability of real life.« less

  4. 2008 Homeland Security S and T Stakeholders Conference West

    DTIC Science & Technology

    2008-01-16

    Untitled Document 2008hls.html[5/26/ 2016 8:25:16 AM] 2008 Homeland Security S&T Stakeholders Conference West “Putting First Responders First” Los...Sector Commander/Captain of the Port, U.S. Coast Guard Sector Los Angeles - Long Beach Mr. Mark Denari, Director, Aviation Security & Public Safety...Document 2008hls.html[5/26/ 2016 8:25:16 AM] Pre Conference Training Workshop Monday, 14 January 2008 Training Session 3:Better Security via Randomization

  5. Gauging Skills of Hospital Security Personnel: a Statistically-driven, Questionnaire-based Approach.

    PubMed

    Rinkoo, Arvind Vashishta; Mishra, Shubhra; Rahesuddin; Nabi, Tauqeer; Chandra, Vidha; Chandra, Hem

    2013-01-01

    This study aims to gauge the technical and soft skills of the hospital security personnel so as to enable prioritization of their training needs. A cross sectional questionnaire based study was conducted in December 2011. Two separate predesigned and pretested questionnaires were used for gauging soft skills and technical skills of the security personnel. Extensive statistical analysis, including Multivariate Analysis (Pillai-Bartlett trace along with Multi-factorial ANOVA) and Post-hoc Tests (Bonferroni Test) was applied. The 143 participants performed better on the soft skills front with an average score of 6.43 and standard deviation of 1.40. The average technical skills score was 5.09 with a standard deviation of 1.44. The study avowed a need for formal hands on training with greater emphasis on technical skills. Multivariate analysis of the available data further helped in identifying 20 security personnel who should be prioritized for soft skills training and a group of 36 security personnel who should receive maximum attention during technical skills training. This statistically driven approach can be used as a prototype by healthcare delivery institutions worldwide, after situation specific customizations, to identify the training needs of any category of healthcare staff.

  6. Gauging Skills of Hospital Security Personnel: a Statistically-driven, Questionnaire-based Approach

    PubMed Central

    Rinkoo, Arvind Vashishta; Mishra, Shubhra; Rahesuddin; Nabi, Tauqeer; Chandra, Vidha; Chandra, Hem

    2013-01-01

    Objectives This study aims to gauge the technical and soft skills of the hospital security personnel so as to enable prioritization of their training needs. Methodology A cross sectional questionnaire based study was conducted in December 2011. Two separate predesigned and pretested questionnaires were used for gauging soft skills and technical skills of the security personnel. Extensive statistical analysis, including Multivariate Analysis (Pillai-Bartlett trace along with Multi-factorial ANOVA) and Post-hoc Tests (Bonferroni Test) was applied. Results The 143 participants performed better on the soft skills front with an average score of 6.43 and standard deviation of 1.40. The average technical skills score was 5.09 with a standard deviation of 1.44. The study avowed a need for formal hands on training with greater emphasis on technical skills. Multivariate analysis of the available data further helped in identifying 20 security personnel who should be prioritized for soft skills training and a group of 36 security personnel who should receive maximum attention during technical skills training. Conclusion This statistically driven approach can be used as a prototype by healthcare delivery institutions worldwide, after situation specific customizations, to identify the training needs of any category of healthcare staff. PMID:23559904

  7. Homeland Security and Defense Applications

    ScienceCinema

    None

    2018-01-16

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  8. Active and Progressive Exoskeleton Rehabilitation Using Multisource Information Fusion From EMG and Force-Position EPP.

    PubMed

    Fan, Yuanjie; Yin, Yuehong

    2013-12-01

    Although exoskeletons have received enormous attention and have been widely used in gait training and walking assistance in recent years, few reports addressed their application during early poststroke rehabilitation. This paper presents a healthcare technology for active and progressive early rehabilitation using multisource information fusion from surface electromyography and force-position extended physiological proprioception. The active-compliance control based on interaction force between patient and exoskeleton is applied to accelerate the recovery of the neuromuscular function, whereby progressive treatment through timely evaluation contributes to an effective and appropriate physical rehabilitation. Moreover, a clinic-oriented rehabilitation system, wherein a lower extremity exoskeleton with active compliance is mounted on a standing bed, is designed to ensure comfortable and secure rehabilitation according to the structure and control requirements. Preliminary experiments and clinical trial demonstrate valuable information on the feasibility, safety, and effectiveness of the progressive exoskeleton-assisted training.

  9. Nurses' experiences using a nursing information system: early stage of technology implementation.

    PubMed

    Lee, Ting-Ting

    2007-01-01

    Adoption of information technology in nursing practice has become a trend in healthcare. The impact of this technology on users has been widely studied, but little attention has been given to its influence at the beginning stage of implementation. Knowing the barriers to adopting technology could shorten this transition stage and minimize its negative influences. The purpose of this study was to explore nurses' experiences in the early stage of implementing a nursing information system. Focus groups were used to collect data at a medical center in Taiwan. The results showed that nurses had problems with the system's content design, had insufficient training, were concerned about data security, were stressed by added work, and experienced poor interdisciplinary cooperation. To smooth this beginning stage, the author recommends involving nurses early in the system design, providing sufficient training in keyboard entry skills, redesigning workflow, and improving interdisciplinary communication.

  10. Is your station secure?

    PubMed

    Patrick, Richard W

    2003-07-01

    All department personnel must practice and assure safety and security of stations, vehicles, equipment and related items. Keep vehicle bay doors closed unless the bays are physically occupied by a department member. When responding or leaving the station, ensure, after exiting the bay, that the door is closed. If confronted with questions pertaining to department operations, including SOPs and SOGs, box alarms, response patterns, training times, member rosters/addresses, etc., do not provide the information. Document the incident and immediately report it. Should the inquiry appear extremely unusual in nature, do not hesitate to contact law enforcement. Emergency service personnel should be educated on a periodic basis and remain vigilant at all times.

  11. Development of Standardized Clinical Training Cases for Diagnosis of Sexual Abuse using a Secure Telehealth Application

    ERIC Educational Resources Information Center

    Frasier, Lori D.; Thraen, Ioana; Kaplan, Rich; Goede, Patricia

    2012-01-01

    Objectives: The training of physicians, nurse examiners, social workers and other health professional on the evidentiary findings of sexual abuse in children is challenging. Our objective was to develop peer reviewed training cases for medical examiners of child sexual abuse, using a secure web based telehealth application (TeleCAM). Methods:…

  12. The use of information and communication technology (ICT) in dentistry.

    PubMed

    Knott, N J

    2013-02-01

    As the use of information and communication technology (ICT) becomes more widespread in dentistry the risk of breaching electronic commerce laws and patient confidentiality increases. It is necessary to be aware of the responsibilities internet usage entails, especially within a dental practice where the protection of patient information is of the utmost importance. More should be done to outline the various precautions that should be taken to ensure ICT security within the professional domain, as it would appear dentistry has been neglected with regard to receiving the proper ICT education, training and support systems.

  13. Use of a secure Internet Web site for collaborative medical research.

    PubMed

    Marshall, W W; Haley, R W

    2000-10-11

    Researchers who collaborate on clinical research studies from diffuse locations need a convenient, inexpensive, secure way to record and manage data. The Internet, with its World Wide Web, provides a vast network that enables researchers with diverse types of computers and operating systems anywhere in the world to log data through a common interface. Development of a Web site for scientific data collection can be organized into 10 steps, including planning the scientific database, choosing a database management software system, setting up database tables for each collaborator's variables, developing the Web site's screen layout, choosing a middleware software system to tie the database software to the Web site interface, embedding data editing and calculation routines, setting up the database on the central server computer, obtaining a unique Internet address and name for the Web site, applying security measures to the site, and training staff who enter data. Ensuring the security of an Internet database requires limiting the number of people who have access to the server, setting up the server on a stand-alone computer, requiring user-name and password authentication for server and Web site access, installing a firewall computer to prevent break-ins and block bogus information from reaching the server, verifying the identity of the server and client computers with certification from a certificate authority, encrypting information sent between server and client computers to avoid eavesdropping, establishing audit trails to record all accesses into the Web site, and educating Web site users about security techniques. When these measures are carefully undertaken, in our experience, information for scientific studies can be collected and maintained on Internet databases more efficiently and securely than through conventional systems of paper records protected by filing cabinets and locked doors. JAMA. 2000;284:1843-1849.

  14. Evaluation of a Novel Disaster Nursing Education Method.

    PubMed

    Levoy, Kristin; DeBastiani, Summer D; McCabe, Brian E

    2018-02-21

    A common method of disaster training is needed to improve disaster nursing education and facilitate better communication among interprofessional disaster responders. To inform the development of disaster nursing curricula, a novel disaster nursing education method consistent with Homeland Security Exercise and Evaluation Program (HSEEP) and the International Council of Nurses (ICN) framework was developed to improve disaster nursing competencies in a baccalaureate nursing program. In total, 89 undergraduate nursing students participated. Perceived disaster nursing knowledge, confidence, and training/response were assessed with 14 items before and after the education. Exploratory factor analysis showed 3 factors, knowledge, confidence, and training/response, explained 71% of variation in items. Nursing students showed large improvements in perceived disaster nursing knowledge (t=11.95, P<0.001, Cohen's d=1.76), moderate increases in perceived confidence (t=4.54, P<0.001, d=0.67), and no change in disaster training and response (t=0.94, P=0.351, d=0.13). Results show preliminary evidence supporting the effectiveness of disaster nursing education informed by HSEEP. This training has the potential to fill current practice gaps in disaster nursing knowledge and build confidence to use those skills in practice. (Disaster Med Public Health Preparedness. 2018;page 1 of 8).

  15. CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 3

    DTIC Science & Technology

    2008-03-01

    describes essentials for requirements development and management. In addi- tion to providing training, eLearning and consulting services, she speaks at and...information, support sense- making, enable collaborative decision making, and effect changes in the physical environment. For example, the Global ...across layers, which enables effective use of resources and helps enforce security and confiden- tiality policies. Global Data Space DDS provides a

  16. 49 CFR 172.522 - EXPLOSIVES 1.1, EXPLOSIVES 1.2 and EXPLOSIVES 1.3 placards.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false EXPLOSIVES 1.1, EXPLOSIVES 1.2 and EXPLOSIVES 1.3... INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Placarding § 172.522 EXPLOSIVES 1.1, EXPLOSIVES 1.2 and EXPLOSIVES 1.3 placards. (a) Except for size and color, the EXPLOSIVES 1.1, EXPLOSIVES 1.2 and EXPLOSIVES 1.3...

  17. 49 CFR 172.522 - EXPLOSIVES 1.1, EXPLOSIVES 1.2 and EXPLOSIVES 1.3 placards.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 2 2011-10-01 2011-10-01 false EXPLOSIVES 1.1, EXPLOSIVES 1.2 and EXPLOSIVES 1.3... INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Placarding § 172.522 EXPLOSIVES 1.1, EXPLOSIVES 1.2 and EXPLOSIVES 1.3 placards. (a) Except for size and color, the EXPLOSIVES 1.1, EXPLOSIVES 1.2 and EXPLOSIVES 1.3...

  18. Predictive Validity of UAS/RPA Sensor Operator Training Qualification Measures

    DTIC Science & Technology

    2015-01-30

    and unpredictability of the task) and personality traits (e.g., patience). Several measures have been developed to address these gaps in...other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a...medical, citizenship, and security standards and aptitude requirements (Armed Services Vocational Aptitude Battery [ASVAB]). The current study

  19. On Glitchkriege: Strategy in the Cyber-Age

    DTIC Science & Technology

    2013-06-01

    ON GLITCHKRIEGE: Strategy in the Cyber-Age BY LIEUTENANT-COLONEL WILLIAM DUPUY FRENCH AIR FORCE A THESIS PRESENTED TO THE...3 ABOUT THE AUTHOR Lieutenant-Colonel William Dupuy entered the French Air Force Academy in 1995 as an engineering officer and graduated in...Lieutenant-Colonel William Dupuy owns an engineering degree from the French Air Force Academy, a master’s degree from the Information Security Training

  20. 49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  1. 49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  2. 49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  3. 49 CFR 1544.235 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... airport security program applicable to their location, and the aircraft operator's security program to the... security-related duties. 1544.235 Section 1544.235 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  4. Development of a HIPAA-compliant environment for translational research data and analytics.

    PubMed

    Bradford, Wayne; Hurdle, John F; LaSalle, Bernie; Facelli, Julio C

    2014-01-01

    High-performance computing centers (HPC) traditionally have far less restrictive privacy management policies than those encountered in healthcare. We show how an HPC can be re-engineered to accommodate clinical data while retaining its utility in computationally intensive tasks such as data mining, machine learning, and statistics. We also discuss deploying protected virtual machines. A critical planning step was to engage the university's information security operations and the information security and privacy office. Access to the environment requires a double authentication mechanism. The first level of authentication requires access to the university's virtual private network and the second requires that the users be listed in the HPC network information service directory. The physical hardware resides in a data center with controlled room access. All employees of the HPC and its users take the university's local Health Insurance Portability and Accountability Act training series. In the first 3 years, researcher count has increased from 6 to 58.

  5. Motivations and reasons for women attending a Breast Self-Examination training program: A qualitative study

    PubMed Central

    2010-01-01

    Background Breast cancer is a major threat to Taiwanese women's health. Despite the controversy surrounding the effectiveness of breast self-examination (BSE) in reducing mortality, BSE is still advocated by some health departments. The aim of the study is to provide information about how women decide to practice BSE and their experiences through the training process. Sixty-six women aged 27-50 were recruited. Methods A descriptive study was conducted using small group and individual in-depth interviews to collect data, and using thematic analysis and constant comparison techniques for data analysis. Results It was found that a sense of self-security became an important motivator for entering BSE training. The satisfaction in obtaining a sense of self-security emerged as the central theme. Furthermore, a ladder motivation model was developed to explain the participants' motivations for entering BSE training. The patterns of motivation include opportunity taking, clarifying confusion, maintaining health, and illness monitoring, which were connected with the risk perception for breast cancer. Conclusions We recognize that the way women decide to attend BSE training is influenced by personal and social factors. Understanding the different risk assessments women rely on in making their health decisions is essential. This study will assist researchers and health professionals to gain a better understanding of alternative ways to deal with breast health, and not to be limited by the recommendations of the health authorities. PMID:20618986

  6. Training strategies for laboratory animal veterinarians: challenges and opportunities.

    PubMed

    Colby, Lesley A; Turner, Patricia V; Vasbinder, Mary Ann

    2007-01-01

    The field of laboratory animal medicine is experiencing a serious shortage of appropriately trained veterinarians for both clinically related and research-oriented positions within academia, industry, and government. Recent outreach efforts sponsored by professional organizations have stimulated increased interest in the field. It is an opportune time to critically review and evaluate postgraduate training opportunities in the United States and Canada, including formal training programs, informal training, publicly accessible training resources and educational opportunities, and newly emerging training resources such as Internet-based learning aids. Challenges related to each of these training opportunities exist and include increasing enrollment in formal programs, securing adequate funding support, ensuring appropriate content between formal programs that may have diverse objectives, and accommodating the training needs of veterinarians who enter the field by the experience route. Current training opportunities and resources that exist for veterinarians who enter and are established within the field of laboratory animal science are examined. Strategies for improving formal laboratory animal medicine training programs and for developing alternative programs more suited to practicing clinical veterinarians are discussed. In addition, the resources for high-quality continuing education of experienced laboratory animal veterinarians are reviewed.

  7. HIPAA and the military health system: organizing technological and organizational reform in large enterprises

    NASA Astrophysics Data System (ADS)

    Collmann, Jeff R.

    2001-08-01

    The global scale, multiple units, diverse operating scenarios and complex authority structure of the Department of Defense Military Health System (MHS) create social boundaries that tend to reduce communication and collaboration about data security. Under auspices of the Defense Health Information Assurance Program (DHIAP), the Telemedicine and Advanced Technology Research Center (TATRC) is contributing to the MHS's efforts to prepare for and comply with the Health Insurance Portability and Accountability Act (HIPAA) of 1996 through organizational and technological innovations that bridge such boundaries. Building interdisciplinary (clinical, administrative and information technology) medical information security readiness teams (MISRT) at each military treatment facility (MTF) constitutes the heart of this process. DHIAP is equipping and training MISRTs to use new tools including 'OCTAVE', a self-directed risk assessment instrument and 'RIMR', a web-enabled Risk Information Management Resource. DHIAP sponsors an interdisciplinary, triservice workgroup for review and revision of relevant DoD and service policies and participates in formal DoD health information assurance activities. These activities help promote a community of proponents across the MHS supportive of improved health information assurance. The MHS HIPAA-compliance effort teaches important general lessons about organizational reform in large civilian or military enterprises.

  8. Afghan National Police Training Program Would Benefit from Better Compliance with the Economy Act and Reimbursable Agreements

    DTIC Science & Technology

    2011-08-25

    Security Cooperation Agency INL Bureau of International Narcotics and Law Enforcement Affairs JSSP Justice Sector Security Program PAE Pacific...regional training centers. The programs were the Justice Sector Security Program ( JSSP ), the Corrections System Support Program (CSSP), and the...Civilian Police International. JSSP and CSSP are considered rule of law programs. Rule of law is most commonly understood to be a foundational

  9. Human detection in sensitive security areas through recognition of omega shapes using MACH filters

    NASA Astrophysics Data System (ADS)

    Rehman, Saad; Riaz, Farhan; Hassan, Ali; Liaquat, Muwahida; Young, Rupert

    2015-03-01

    Human detection has gained considerable importance in aggravated security scenarios over recent times. An effective security application relies strongly on detailed information regarding the scene under consideration. A larger accumulation of humans than the number of personal authorized to visit a security controlled area must be effectively detected, amicably alarmed and immediately monitored. A framework involving a novel combination of some existing techniques allows an immediate detection of an undesirable crowd in a region under observation. Frame differencing provides a clear visibility of moving objects while highlighting those objects in each frame acquired by a real time camera. Training of a correlation pattern recognition based filter on desired shapes such as elliptical representations of human faces (variants of an Omega Shape) yields correct detections. The inherent ability of correlation pattern recognition filters caters for angular rotations in the target object and renders decision regarding the existence of the number of persons exceeding an allowed figure in the monitored area.

  10. Federated Tensor Factorization for Computational Phenotyping

    PubMed Central

    Kim, Yejin; Sun, Jimeng; Yu, Hwanjo; Jiang, Xiaoqian

    2017-01-01

    Tensor factorization models offer an effective approach to convert massive electronic health records into meaningful clinical concepts (phenotypes) for data analysis. These models need a large amount of diverse samples to avoid population bias. An open challenge is how to derive phenotypes jointly across multiple hospitals, in which direct patient-level data sharing is not possible (e.g., due to institutional policies). In this paper, we developed a novel solution to enable federated tensor factorization for computational phenotyping without sharing patient-level data. We developed secure data harmonization and federated computation procedures based on alternating direction method of multipliers (ADMM). Using this method, the multiple hospitals iteratively update tensors and transfer secure summarized information to a central server, and the server aggregates the information to generate phenotypes. We demonstrated with real medical datasets that our method resembles the centralized training model (based on combined datasets) in terms of accuracy and phenotypes discovery while respecting privacy. PMID:29071165

  11. Attitudes toward the large-scale implementation of an incident reporting system.

    PubMed

    Braithwaite, Jeffrey; Westbrook, Mary; Travaglia, Joanne

    2008-06-01

    An electronic Incident Information Management System implemented system-wide by the Department of Health, New South Wales, Australia was evaluated. We hypothesized that health professionals (i) would support the system via utilization and favourable attitudes and (ii) that their usage and attitudes would vary according to profession with nurses being most, and doctors least, favourably disposed. An online, anonymous questionnaire survey of 2185 health practitioners. Undertaking system training, satisfaction with training, reporting incidents, incident reporting rates since system introduction and attitude questions focusing on use, security and evaluation of the system and workplace safety cultures. The first hypothesis received partial support. The majority of respondents had undertaken training and rated it highly. Most had reported incidents and maintained their previous reporting levels. Most attitudes regarding using the system and its security were favourable. Mixed attitudes were held about workplace safety cultures and the value of the system. Deficiencies in quality of reporting, feedback on incident reports and resources to analyse incident data were problems identified. The second hypothesis was confirmed. Nurses were most, and doctors least, likely to undertake training, report incidents and express favourable attitudes. Allied health responses were intermediate to those of the other professions. The system implementation was relatively successful, but more so with some professions. Problems identified indicated that expectations as to the goals achievable in the short term were optimistic, but these are amenable to planned interventions.

  12. Transportation Self-Efficacy and Social Problem-Solving of Persons Who Are Blind or Visually Impaired.

    PubMed

    Crudden, Adele; O'Mally, Jamie; Antonelli, Karla

    2016-01-01

    Social problem-solving skills and transportation self-efficacy were assessed for 48 vocational rehabilitation consumers with visual disabilities who required assistance securing work transportation. Social problem solving was at the upper end of the normed average; transportation self-efficacy averaged 101.5 out of 140. Level of vision loss was not associated with score differences; urban residence related to slightly higher self-efficacy than suburban or rural residency. Participants appeared to have the skills necessary to secure employment transportation, but were less confident about transportation-seeking activities that required more initiative of social interaction. Training and information might help consumers gain confidence in these tasks and increase viable transportation options.

  13. Homeland Security Organizations: Design Contingencies in Complex Environments

    DTIC Science & Technology

    2011-09-01

    Lawrence & Lorsch, 1967, pp. 159–184), as well as Leavitt’s diamond (Leavitt, 1965) and Galbraith’s STAR (Galbraith, 2002; Kate & Galbraith, 2007...Angeles County Operational area came together in December 2004 to participate in a training exercise called, “Operation Talavera” ( Gardner , 2005). The...information from public health officials to suspect a biological attack, which was done rapidly through their “ syndromic surveillance capabilities.” Once

  14. Knowledge management: Role of the the Radiation Safety Information Computational Center (RSICC)

    NASA Astrophysics Data System (ADS)

    Valentine, Timothy

    2017-09-01

    The Radiation Safety Information Computational Center (RSICC) at Oak Ridge National Laboratory (ORNL) is an information analysis center that collects, archives, evaluates, synthesizes and distributes information, data and codes that are used in various nuclear technology applications. RSICC retains more than 2,000 software packages that have been provided by code developers from various federal and international agencies. RSICC's customers (scientists, engineers, and students from around the world) obtain access to such computing codes (source and/or executable versions) and processed nuclear data files to promote on-going research, to ensure nuclear and radiological safety, and to advance nuclear technology. The role of such information analysis centers is critical for supporting and sustaining nuclear education and training programs both domestically and internationally, as the majority of RSICC's customers are students attending U.S. universities. Additionally, RSICC operates a secure CLOUD computing system to provide access to sensitive export-controlled modeling and simulation (M&S) tools that support both domestic and international activities. This presentation will provide a general review of RSICC's activities, services, and systems that support knowledge management and education and training in the nuclear field.

  15. Remote Sensing and Capacity Building to Improve Food Security

    NASA Astrophysics Data System (ADS)

    Husak, G. J.; Funk, C. C.; Verdin, J. P.; Rowland, J.; Budde, M. E.

    2012-12-01

    The Famine Early Warning Systems Network (FEWS NET) is a U.S. Agency for International Development (USAID) supported project designed to monitor and anticipate food insecurity in the developing world, primarily Africa, Central America, the Caribbean and Central Asia. This is done through a network of partners involving U.S. government agencies, universities, country representatives, and partner institutions. This presentation will focus on the remotely sensed data used in FEWS NET activities and capacity building efforts designed to expand and enhance the use of FEWS NET tools and techniques. Remotely sensed data are of particular value in the developing world, where ground data networks and data reporting are limited. FEWS NET uses satellite based rainfall and vegetation greenness measures to monitor and assess food production conditions. Satellite rainfall estimates also drive crop models which are used in determining yield potential. Recent FEWS NET products also include estimates of actual evapotranspiration. Efforts are currently underway to assimilate these products into a single tool which would indicate areas experiencing abnormal conditions with implications for food production. FEWS NET is also involved in a number of capacity building activities. Two primary examples are the development of software and training of institutional partners in basic GIS and remote sensing. Software designed to incorporate rainfall station data with existing satellite-derived rainfall estimates gives users the ability to enhance satellite rainfall estimates or long-term means, resulting in gridded fields of rainfall that better reflect ground conditions. Further, this software includes a crop water balance model driven by the improved rainfall estimates. Finally, crop parameters, such as the planting date or length of growing period, can be adjusted by users to tailor the crop model to actual conditions. Training workshops in the use of this software, as well as basic GIS and remote sensing tools, are routinely conducted by FEWS NET representatives at host country meteorological and agricultural services. These institutions are then able to produce information that can more accurately inform food security decision making. Informed decision making reduces the risk associated with a given hazard. In the case of FEWS NET, this involves identification of shocks to food availability, allowing for the pre-positioning of aid to be available when a hazard strikes. Developing tools to incorporate better information in food production estimates and working closely with local staff trained in state-of-the-practice techniques results in a more informed decision making process, reducing the impacts of food security hazards.

  16. 49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... with security-related duties. (a) Security threat assessments. Each certified cargo screening facility... certified cargo screening facility complete a security threat assessment or comparable security threat... acuity, physical coordination, and motor skills to the extent required to effectively operate cargo...

  17. 49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  18. 49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  19. 49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Circulars; and (4) The applicable portions of approved airport security program(s) and aircraft operator... security-related duties. 1549.103 Section 1549.103 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION...

  20. Execution of a self-directed risk assessment methodology to address HIPAA data security requirements

    NASA Astrophysics Data System (ADS)

    Coleman, Johnathan

    2003-05-01

    This paper analyzes the method and training of a self directed risk assessment methodology entitled OCTAVE (Operationally Critical Threat Asset and Vulnerability Evaluation) at over 170 DOD medical treatment facilities. It focuses specifically on how OCTAVE built interdisciplinary, inter-hierarchical consensus and enhanced local capabilities to perform Health Information Assurance. The Risk Assessment Methodology was developed by the Software Engineering Institute at Carnegie Mellon University as part of the Defense Health Information Assurance Program (DHIAP). The basis for its success is the combination of analysis of organizational practices and technological vulnerabilities. Together, these areas address the core implications behind the HIPAA Security Rule and can be used to develop Organizational Protection Strategies and Technological Mitigation Plans. A key component of OCTAVE is the inter-disciplinary composition of the analysis team (Patient Administration, IT staff and Clinician). It is this unique composition of analysis team members, along with organizational and technical analysis of business practices, assets and threats, which enables facilities to create sound and effective security policies. The Risk Assessment is conducted in-house, and therefore the process, results and knowledge remain within the organization, helping to build consensus in an environment of differing organizational and disciplinary perspectives on Health Information Assurance.

  1. Specifying Skill-Based Training Strategies and Devices: A Model Description

    DTIC Science & Technology

    1990-06-01

    Technical Report 897 Specifying Skill-Based Training N Strategies and Devices: A Model Description I Paui J. Sticha and Mark Schlager Human Resources...unlimied 90 ’ Technical Report 897 Specifying Skill-Based Training Strategies and Devices: A Model Description Paul J. Sticha and Mark Schlager Human...SECURITY CLASSIFICATION OF THIS PAGE Form Approved REPORT DOCUMENTATION PAGE FMNo o7 ote la. REPORT SECURITY CLASSIFICATION lb. RESTRICTWE MARKINGS

  2. Constructing vulnerabilty and protective measures indices for the enhanced critical infrastructure protection program.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.

    2009-10-14

    The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators ofmore » the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The NIPP framework incorporates consequence, threat, and vulnerability components and addresses all hazards. The analysis of the vulnerability data needs to be reproducible, support risk analysis, and go beyond protection. It also needs to address important security/vulnerability topics, such as physical security, cyber security, systems analysis, and dependencies and interdependencies. This report provides an overview of the approach being developed to estimate vulnerability and provide vulnerability comparisons for sectors and subsectors. the information will be used to assist DHS in analyzing existing protective measures and vulnerability at facilities, to identify potential ways to reduce vulnerabilities, and to assist in preparing sector risk estimates. The owner/operator receives an analysis of the data collected for a specific asset, showing a comparison between the facility's protection posture/vulnerability index and those of DHS sector/subsector sites visited. This comparison gives the owner/operator an indication of the asset's security strengths and weaknesses that may be contributing factors to its vulnerability and protection posture. The information provided to the owner/operator shows how the asset compares to other similar assets within the asset's sector or subsector. A 'dashboard' display is used to illustrate the results in a convenient format. The dashboard allows the owner/operator to analyze the implementation of additional protective measures and to illustrate how such actions would impact the asset's Protective Measures Index (PMI) or Vulnerability Index (VI).« less

  3. 75 FR 22151 - National Maritime Security Advisory Committee; Vacancies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-27

    ... field are encouraged to apply: Port Operations Management/Port Authorities. Maritime Security Operations and Training. Marine Salvage Operations. Maritime Security Related Academics/Public Policy. Marine Facilities and Terminals Security Management. Vessel Owners/Operators. Maritime Labor. International and...

  4. Defense Security Cooperation Agency Vision 2020. Update 1

    DTIC Science & Technology

    2015-10-01

    the feasibility and pros/ cons of developing a DoD- wide security cooperation workforce development and management program including training...Synchronizing Security Cooperation Activities ..................................................................................... 7 Meeting...Security Cooperation ............................. 15 6. Remaining a Provider of Choice for Our International Customers

  5. Cyber Security Testing and Training Programs for Industrial Control Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Daniel Noyes

    2012-03-01

    Service providers rely on industrial control systems (ICS) to manage the flow of water at dams, open breakers on power grids, control ventilation and cooling in nuclear power plants, and more. In today's interconnected environment, this can present a serious cyber security challenge. To combat this growing challenge, government, private industry, and academia are working together to reduce cyber risks. The Idaho National Laboratory (INL) is a key contributor to the Department of Energy National SCADA Test Bed (NSTB) and the Department of Homeland Security (DHS) Control Systems Security Program (CSSP), both of which focus on improving the overall securitymore » posture of ICS in the national critical infrastructure. In support of the NSTB, INL hosts a dedicated SCADA testing facility which consists of multiple control systems supplied by leading national and international manufacturers. Within the test bed, INL researchers systematically examine control system components and work to identify vulnerabilities. In support of the CSSP, INL develops and conducts training courses which are designed to increase awareness and defensive capabilities for IT/Control System professionals. These trainings vary from web-based cyber security trainings for control systems engineers to more advanced hands-on training that culminates with a Red Team/ Blue Team exercise that is conducted within an actual control systems environment. INL also provides staffing and operational support to the DHS Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Security Operations Center which responds to and analyzes control systems cyber incidents across the 18 US critical infrastructure sectors.« less

  6. The Internet: friend or foe when providing patient education?

    PubMed

    Anderson, Amy Shelton; Klemm, Paula

    2008-02-01

    The Internet has changed how patients with cancer learn about and cope with their disease. Newly diagnosed patients with cancer often have complex educational and informational needs related to diagnosis and treatment. Nurses frequently encounter time and work-related constraints that can interfere with the provision of patient education. They are challenged to educate patients in an environment of rapidly expanding and innovative computer technology. Barriers that hinder nurses in integrating educational Internet resources into patient care include lack of training, time constraints, and inadequate administrative support. Advantages of Internet use for patient education and support include wide-ranging and current information, a variety of teaching formats, patient empowerment, new communication options, and support 24 hours a day, seven days a week. Pitfalls associated with Internet use for patients with cancer include inaccurate information, lack of access, poor quality of online resources, and security and privacy issues. Nurses routinely use computer technology in the workplace and follow rigorous security and privacy standards to protect patient information. Those skills can provide the foundation for the use of online sources for patient teaching. Nurses play an important role in helping patients evaluate the veracity of online information and introducing them to reliable Internet resources.

  7. 78 FR 35945 - Request for Comments on Security Training Programs for Surface Mode Employees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-14

    ... provided by owner/operators of freight railroads, passenger railroads, public transportation systems... in the public transportation, railroad carrier, and over-the-road bus (OTRB) modes.\\2\\ In summary.... 266 (August 3, 2007). 9/11 Act's Public Transportation Security Training Requirements. Paragraph 1408...

  8. 49 CFR Appendix to Part 380 - LCV Driver Training Programs, Required Knowledge and Skills

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...-wheel training designed to provide an opportunity to develop the skills outlined under the Proficiency... Maneuvers; and Turning, Steering and Tracking units. A series of basic exercises is practiced at off-highway... Security, Transportation Security Administration; the U.S. Department of Transportation, Research and...

  9. 49 CFR Appendix to Part 380 - LCV Driver Training Programs, Required Knowledge and Skills

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...-wheel training designed to provide an opportunity to develop the skills outlined under the Proficiency... Maneuvers; and Turning, Steering and Tracking units. A series of basic exercises is practiced at off-highway... Security, Transportation Security Administration; the U.S. Department of Transportation, Research and...

  10. 49 CFR Appendix to Part 380 - LCV Driver Training Programs, Required Knowledge and Skills

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...-wheel training designed to provide an opportunity to develop the skills outlined under the Proficiency... Maneuvers; and Turning, Steering and Tracking units. A series of basic exercises is practiced at off-highway... Security, Transportation Security Administration; the U.S. Department of Transportation, Research and...

  11. 33 CFR 104.215 - Vessel Security Officer (VSO).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... procedures, including scenario-based response training; (4) Crowd management and control techniques; (5) Operations of security equipment and systems; and (6) Testing and calibration of security equipment and...

  12. Maritime security report. June 1999 [Inter-American Port Security Program

    DOT National Transportation Integrated Search

    1999-06-01

    Three international port security training courses were organized and managed by the U.S. Maritime Administration (MARAD) and conducted during the fall of 1998 in Panama, Peru, and Barbados as principal activities of the Inter-American Port Security ...

  13. Maritime security report number 3. September 1996 [U.S. Coast Guard issues passenger vessel and terminal security inspection regulations; international perspectives on maritime security; first Inter-American course on port security

    DOT National Transportation Integrated Search

    1996-09-01

    While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...

  14. A novel income security intervention to address poverty in a primary care setting: a retrospective chart review.

    PubMed

    Jones, Marcella K; Bloch, Gary; Pinto, Andrew D

    2017-08-17

    To examine the development and implementation of a novel income security intervention in primary care. A retrospective, descriptive chart review of all patients referred to the Income Security Heath Promotion service during the first year of the service (December 2013-December 2014). A multisite interdisciplinary primary care organisation in inner city Toronto, Canada, serving over 40 000 patients. The study population included 181 patients (53% female, mean age 48 years) who were referred to the Income Security Health Promotion service and engaged in care. The Income Security Health Promotion service consists of a trained health promoter who provides a mixture of expert advice and case management to patients to improve income security. An advisory group, made up of physicians, social workers, a community engagement specialist and a clinical manager, supports the service. Sociodemographic information, health status, referral information and encounter details were collected from patient charts. Encounters focused on helping patients with increasing their income (77.4%), reducing their expenses (58.6%) and improving their financial literacy (26.5%). The health promoter provided an array of services to patients, including assistance with taxes, connecting to community services, budgeting and accessing free services. The service could be improved with more specific goal setting, better links to other members of the healthcare team and implementing routine follow-up with each patient after discharge. Income Security Health Promotion is a novel service within primary care to assist vulnerable patients with a key social determinant of health. This study is a preliminary look at understanding the functioning of the service. Future research will examine the impact of the Income Security Health Promotion service on income security, financial literacy, engagement with health services and health outcomes. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  15. Growing Effective Strength without Growing End Strength: Operational Utilization of the Reserve Component during Training Periods

    DTIC Science & Technology

    2015-04-13

    Assistant Secretary for Legislative Affairs ( ASD (LA)) to identify legislation that impedes the use of RMI to meet operational requirements during active...Its Major Components. Washington DC: Department of Defense, December 21, 2010. ———. DoD Instruction 5100.20: National Security Agency/ Central ...course and speed; communicate that information coherently to the platform launching the weapon; and, launch the attack using anything from a kinetic

  16. Modeling and 3D Visualization for Evaluation of Anti-Terrorism/Force Protection Alternatives: Phase II Final Report

    DTIC Science & Technology

    2006-11-21

    SCHOOL Monterey, California 93943-5000 COL David A. Smarsh, USAF Dr. Leonard A. Ferrari Acting President...1.3.6 Planet 9 Studios David Colleen, CEO Chris Greuel, 3D Model Engineer Dan Ancona, Documentation and Training Carlos Newcomb, 3D Imagery...informational forum of M&S professionals working in the service of naval installation security. David Colleen, CEO, Planet 9 Studios, gave a

  17. National Athletic Trainers' Association-accredited postprofessional athletic training education: attractors and career intentions.

    PubMed

    Mazerolle, Stephanie M; Dodge, Thomas M

    2012-01-01

    Anecdotally, we know that students select graduate programs based on location, finances, and future career goals. Empirically, however, we lack information on what attracts a student to these programs. To gain an appreciation for the selection process of graduate study. Qualitative study. Postprofessional programs in athletic training (PPATs) accredited by the National Athletic Trainers' Association. A total of 19 first-year PPAT students participated, representing 13 of the 16 accredited PPAT programs. All interviews were conducted via phone and transcribed verbatim. Analysis of the interview data followed the procedures as outlined by a grounded theory approach. Trustworthiness was secured by (1) participant checks, (2) participant verification, and (3) multiple analyst triangulations. Athletic training students select PPAT programs for 4 major reasons: reputation of the program or faculty (or both), career intentions, professional socialization, and mentorship from undergraduate faculty or clinical instructors (or both). Participants discussed long-term professional goals as the driving force behind wanting an advanced degree in athletic training. Faculty and clinical instructor recommendations and the program's prestige helped guide the decisions. Participants also expressed the need to gain more experience, which promoted autonomy, and support while gaining that work experience. Final selection of the PPAT program was based on academic offerings, the assistantship offered (including financial support), advanced knowledge of athletic training concepts and principles, and apprenticeship opportunities. Students who attend PPAT programs are attracted to advancing their entry-level knowledge, are committed to their professional development as athletic trainers, and view the profession of athletic training as a life-long career. The combination of balanced academics, clinical experiences, and additional professional socialization and mentorship from the PPAT program experience will help them to secure their desired career positions.

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environmentmore » after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.« less

  19. Career Ladder and Curriculum Guide: Housing Management. Resident Selection and Occupancy Trainee, Resident Security Aide, Resident Security Officer, Security Officer II, Community Security Aide. Instructor's Manual.

    ERIC Educational Resources Information Center

    Allen, Archibald; Hailey, Pleasant L., Jr.

    This instructor's manual contains job analysis and training curriculum for the positions of Resident Selection and Occupancy Trainee, Resident Security Aide, Resident Security Officer, Security Officer II, and Community Security Aide. The two sections of the manual and their parts are as follows: Section I: A Model Curriculum for Resident…

  20. 33 CFR 105.210 - Facility personnel with security duties.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... must have knowledge, through training or equivalent job experience, in the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous... to threaten security; (d) Techniques used to circumvent security measures; (e) Crowd management and...

  1. 33 CFR 105.210 - Facility personnel with security duties.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... must have knowledge, through training or equivalent job experience, in the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous... to threaten security; (d) Techniques used to circumvent security measures; (e) Crowd management and...

  2. 33 CFR 105.210 - Facility personnel with security duties.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... must have knowledge, through training or equivalent job experience, in the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition and detection of dangerous... to threaten security; (d) Techniques used to circumvent security measures; (e) Crowd management and...

  3. Applications of Cognitive Flexibility Theory in Cross-Cultural Training

    ERIC Educational Resources Information Center

    Miller, Richard W.

    2010-01-01

    An examination of American efforts to influence global peace and security through development assistance to foreign police and other security forces reveals that they have a record of mixed results. The pitfalls arising from cultural dissonance in international training programs is a significant factor in why some police reform initiatives fail.…

  4. Security, Dignity, Caring Relationships, and Meaningful Work: Needs Motivating Participation in a Job-Training Program

    ERIC Educational Resources Information Center

    Ayers, David F.; Miller-Dyce, Cherrel; Carlone, David

    2008-01-01

    Researchers asked 17 participants in a job-training program to describe their personal struggles following an economic restructuring. Examined through a critical theoretical lens, findings indicate that the learners enrolled in the program to reclaim security, dignity, meaningful work, and caring relationships. Program planners at community…

  5. 49 CFR 1548.7 - Approval, amendment, annual renewal, and withdrawal of approval of the security program.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... requested by TSA concerning Security Threat Assessments. (ix) A statement acknowledging and ensuring that each employee and agent will successfully complete a Security Threat Assessment under § 1548.15 before... training and Security Threat Assessments by relevant personnel. (4) Duration of security program. The...

  6. 49 CFR 1572.203 - Transportation of explosives from Canada to the United States via railroad carrier.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Transportation of... determines is not known or is a threat to security. (e) At the border. (1) Train crew members who are not U.S...

  7. Successful public-private partnerships: The NYPD shield model.

    PubMed

    Amadeo, Vincent; Iannone, Stephen

    2017-12-01

    This article will identify the challenges that post 9/11 law enforcement faces regarding privatepublic partnerships and describe in detail the NYPD Shield programme, created to combat those challenges. Recommendations made by the 911 Commission included the incorporation of the private sector into future homeland security strategies. One such strategy is NYPD Shield. This programme is a nationally recognized award-winning public-private partnership dedicated to providing counterterrorism training and information sharing with government agencies, non-government organizations, private businesses, and the community. Information is shared through several platforms that include a dedicated website, instruction of counterterrorism training curricula, e-mail alerts, intelligence assessments and the hosting of quarterly conferences. This article also details how the NYPD Shield is providing its successful template to other law enforcement agencies enabling them to initiate similar programmes in their respective jurisdictions, and in doing so joining a National Shield Network.

  8. Education and training in the MEDICOM system.

    PubMed

    Marinos, G; Palamas, S; Vlachos, I; Panou-Diamandi, O; Kalivas, D; Koutsouris, D

    2000-01-01

    MEDICOM system is a world wide telematics application for electronic commerce of medical devices. It has been designed so as to provide the health care professionals with a central Internet access to up-to-date information about medical equipment from multiple manufacturers, in a particular easy and friendly way. Moreover, the Medicom system will serve the health care professionals' requirements for high-quality information about specific products in a form of multimedia presentations and that of a secure communication channel with the community of manufacturers, especially for post marketing surveillance. The system will provide the medical staff (physicians and technicians) with demonstrations of the operation procedures and the functioning of high-tech equipment in a form of virtual models. Moreover, through the medicom system the end users of medical devices can have access to on line libraries and participate in special newsgroups. This paper discusses the architectural structure of the MEDICOM system with emphasis to its educational and training functionality.

  9. Biocontainment, biosecurity, and security practices in beef feedyards.

    PubMed

    Brandt, Aric W; Sanderson, Michael W; DeGroot, Brad D; Thomson, Dan U; Hollis, Larry C

    2008-01-15

    To determine the biocontainment, biosecurity, and security practices at beef feedyards in the Central Plains of the United States. Survey. Managers of feedyards in Colorado, Kansas, Nebraska, Oklahoma, and Texas that feed beef cattle for finish before slaughter; feedyards had to have an active concentrated animal feeding operation permit with a 1-time capacity of >or= 1,000 cattle. A voluntary survey of feedyard personnel was conducted. Identified feedyard personnel were interviewed and responses regarding facility design, security, employees, disease preparedness, feedstuffs, hospital or treatment systems, sanitation, cattle sources, handling of sick cattle, and disposal of carcasses were collected in a database questionnaire. The survey was conducted for 106 feedyards with a 1-time capacity that ranged from 1,300 to 125,000 cattle. Feedyards in general did not have high implementation of biocontainment, biosecurity, or security practices. Smaller feedyards were, in general, less likely to use good practices than were larger feedyards. Results of the survey provided standard practices for biocontainment, biosecurity, and security in feedyards located in Central Plains states. Information gained from the survey results can be used by consulting veterinarians and feedyard managers as a basis for discussion and to target training efforts.

  10. DETERMINANTS OF SPECIALTY CHOICE OF RESIDENT DOCTORS; CASE STUDY--AMONG RESIDENT DOCTORS IN NIGERIA.

    PubMed

    Osuoji, Roland I; Adebanji, Atinuke; Abdulsalam, Moruf A; Oludara, Mobolaji A; Abolarinwa, Abimbola A

    2015-01-01

    This study examined medical specialty selection by Nigerian resident doctors using a marketing research approach to determine the selection criteria and the role of perceptions, expected remuneration, and job placement prospects of various specialties in the selection process. Data were from the Community of residents from April 2014 to July 2014. The cohort included 200 residents, but only 171 had complete information. Data were obtained from a cross section of resident doctors in the Lagos State University Teaching Hospital and at the 2014 Ordinary General Meeting of the National Association of Resident Doctors(NARD) where representatives from over 50 Teaching hospitals in Nigeria attended. Using a client behaviour model as a framework, a tripartite questionnaire was designed and administered to residents to deduce information on their knowledge about and interests in various specialties, their opinions of sixteen specialties, and the criteria they used in specialty selection. A total of 171 (85.5%) questionnaires were returned. ln many instances, consistency between selection criteria and perceptions of a specialty were accompanied by interest in pursuing the specialty. Job security, job availability on completion of programme, duration of training and qualifying examinations were highly correlated with p value < 0.05. Results of the Principal Component Analysis show two components (with Eigen values greater than one) explaining 65.3% of the total variance. The first component had placement and training and practice related variables loaded on it while the second component was loaded with job security and financial remuneration related variables. Using marketing research concepts for medical specialty selection (Weissmanet al 2012) stipulates that choice of speciality is influenced by criteria and perception. This study shows that job security expected financial remuneration, and examination requirements for qualification are major determinants of the choice of speciality for residents.

  11. When nightclub security agents assault clients more insight through a qualitative approach.

    PubMed

    Romain-Glassey, Nathalie; Gut, Melody; De Puy, Jacqueline; Mangin, Patrice

    2014-08-01

    Between 2007 and 2009, aggressions by security agents of nightclubs on clients increased from 6% to 10% among community violence situations encountered at the Violence Medical Unit (VMU) at the Lausanne University Hospital in Switzerland. Most victims were young men who had been drinking alcohol before the assault. About one quarter (25.7%) presented with one or several fractures, all of them in the head area. (For more details, refer to the previous article "When nightclub security agents assault clients" published in 2012(1).) Following this first study, we performed a second qualitative study in order to bring more information about the context and highlight victims' behaviors and experiences. Four themes emerged: how the assault began; the assault itself; third-party involvement; and the psychological state of victims when they consulted the VMU. The findings of this second study complemented the statistical results of the first study by showing under what circumstances security agents of nightclubs respond with physical violence to situations they consider a threat to security. Furthermore, the study described consequences for the victims that could be quite serious. Our findings support the need for nightclubs to improve selection and training of security staff. Copyright © 2014 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  12. Military Manpower Training Report for FY 1976.

    ERIC Educational Resources Information Center

    Office of the Assistant Secretary of Defense for Manpower and Reserve Affairs (DOD), Washington, DC.

    The document presents anticipated needs and costs for training military personnel in FY 1976, based on national security objectives. Training loads for each of the following categories are presented with supporting tables: (1) recruit training, (2) officer acquisition training, (3) specialized skill training, (4) flight training programs, and (5)…

  13. Learning Outcome Measurement in Nurse Participants After Disaster Training.

    PubMed

    Farra, Sharon L; Smith, Sherrill; Bashaw, Marie A

    2016-10-01

    The National Disaster Health Consortium is an interprofessional disaster training program. Using the Hierarchical Learning Framework of Competency Sets in Disaster Medicine and Public Health, this program educates nurses and other professionals to provide competent care and leadership within the interprofessional team. This study examined outcomes of this training. Training consisted of a combination of online and on-site training. Learning outcomes were measured by using the Emergency Preparedness Information Questionnaire (EPIQ) pre/post training and participant performance during live functional exercises with the use of rubrics based on Homeland Security Exercise and Evaluation principles. A total of 64 participants completed the EPIQ before and after training. The mean EPIQ pre-training score of 154 and mean post-training score of 81 (reverse-scored) was found to be statistically significant by paired t-test (P<0.001). Performance was evaluated in the areas of triage, re-triage, surge response, and sheltering. Greater than 90% of the exercise criteria were either met or partially met. Participants successfully achieved overall objectives in all scenarios. Disaster response requires nurses and other providers to function in interprofessional teams. Educational projects, like the National Disaster Health Consortium program, offer the potential to address the need for a standardized, interprofessional disaster training curriculum to promote positive outcomes. (Disaster Med Public Health Preparedness. 2016;page 1 of 6).

  14. Evaluating the Use of Remote Sensing Data in the USAID Famine Early Warning Systems Network

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.; Brickley, Elizabeth B.

    2011-01-01

    The US Agency for International Development (USAID) s Famine Early Warning System Network (FEWS NET) provides monitoring and early warning support to decision makers responsible for responding to food insecurity emergencies on three continents. FEWS NET uses satellite remote sensing and ground observations of rainfall and vegetation in order to provide information on drought, floods and other extreme weather events to decision makers. Previous research has presented results from a professional review questionnaire with FEWS NET expert end-users whose focus was to elicit Earth observation requirements. The review provided FEWS NET operational requirements and assessed the usefulness of additional remote sensing data. Here we analyzed 1342 food security update reports from FEWS NET. The reports consider the biophysical, socioeconomic, and contextual influences on the food security in 17 countries in Africa from 2000-2009. The objective was to evaluate the use of remote sensing information in comparison with other important factors in the evaluation of food security crises. The results show that all 17 countries use rainfall information, agricultural production statistics, food prices and food access parameters in their analysis of food security problems. The reports display large scale patterns that are strongly related to history of the FEWS NET program in each country. We found that rainfall data was used 84% of the time, remote sensing of vegetation 28% of the time, and gridded crop models 10%, reflecting the length of use of each product in the regions. More investment is needed in training personnel on remote sensing products to improve use of data products throughout the FEWS NET system.

  15. The Natural Hospital Environment: a Socio-Technical-Material perspective.

    PubMed

    Fernando, Juanita; Dawson, Linda

    2014-02-01

    This paper introduces two concepts into analyses of information security and hospital-based information systems-- a Socio-Technical-Material theoretical framework and the Natural Hospital Environment. The research is grounded in a review of pertinent literature with previously published Australian (Victoria) case study data to analyse the way clinicians work with privacy and security in their work. The analysis was sorted into thematic categories, providing the basis for the Natural Hospital Environment and Socio-Technical-Material framework theories discussed here. Natural Hospital Environments feature inadequate yet pervasive computer use, aural privacy shortcomings, shared workspace, meagre budgets, complex regulation that hinders training outcomes and out-dated infrastructure and are highly interruptive. Working collaboratively in many cases, participants found ways to avoid or misuse security tools, such as passwords or screensavers for patient care. Workgroup infrastructure was old, architecturally limited, haphazard in some instances, and was less useful than paper handover sheets to ensure the quality of patient care outcomes. Despite valiant efforts by some participants, they were unable to control factors influencing the privacy of patient health information in public hospital settings. Future improvements to hospital-based organisational frameworks for e-health can only be made when there is an improved understanding of the Socio-Technical-Material theoretical framework and Natural Hospital Environment contexts. Aspects within control of clinicians and administrators can be addressed directly although some others are beyond their control. An understanding and acknowledgement of these issues will benefit the management and planning of improved and secure hospital settings. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  16. Analysis Of Using Firewall And Single Honeypot In Training Attack On Wireless Network

    NASA Astrophysics Data System (ADS)

    Mohd. Diansyah, Tengku.; Faisal, Ilham; Perdana, Adidtya; Octaviani Sembiring, Boni; Hidayati Sinaga, Tantri

    2017-12-01

    Security issues become one of the important aspects of a network, especially a network security on the server. These problems underlie the need to build a system that can detect threats from parties who do not have access rights (hackers) that are by building a security system honeypot. A Honeypot is a diversion of intruders' attention, in order for intruders to think that it has managed to break down and retrieve data from a network, when in fact the data is not important and the location is isolated. A way to trap or deny unauthorized use of effort in an information system. One type of honeypot is honeyd. Honeyd is a low interaction honeypot that has a smaller risk compared to high interaction types because the interaction with the honeypot does not directly involve the real system. The purpose of the implementation of honeypot and firewall, firewall is used on Mikrotik. Can be used as an administrative tool to view reports of Honeyd generated activity and administrators can also view reports that are stored in the logs in order to assist in determining network security policies.

  17. Afghan National Engineer Brigade: Despite U.S. Training Efforts, the Brigade is Incapable of Operating Independently

    DTIC Science & Technology

    2016-01-01

    training—army staff on leave for holidays, political events, low literacy levels, and security concerns—also delayed NEB training. In addition, a Joint...establish a training program, has no literacy program, and needs coalition in the lead on all aspects of construction.” Table 1 - USFOR-A’s Assessment...due to holidays, political events, low literacy levels, and security concerns, which were beyond USFOR-A’s control. Although USFOR-A had 1 year

  18. Strategies for Improving Polio Surveillance Performance in the Security-Challenged Nigerian States of Adamawa, Borno, and Yobe During 2009-2014.

    PubMed

    Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G; Muhammed, Ado J G

    2016-05-01

    The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. © 2016 World Health Organization; licensee Oxford Journals.

  19. Strategies for Improving Polio Surveillance Performance in the Security-Challenged Nigerian States of Adamawa, Borno, and Yobe During 2009–2014

    PubMed Central

    Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G.; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M.; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G.; Muhammed, Ado J. G.

    2016-01-01

    Background. The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. Methods. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Results. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. Conclusions. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. PMID:26655842

  20. Does Well-Being Contribute to Performance? Emotional Security, Teacher Support and Learning Behaviour in Kindergarten

    ERIC Educational Resources Information Center

    Koomen, Helma M. Y.; van Leeuwen, Mirella G. P.; van der Leij, Aryan

    2004-01-01

    In this study, we examined relations between kindergartner's emotional security, task involvement and achievement and teacher's supportive presence in a cognitive training setting, in which the familiarity of the teacher was varied. Participants were 48 kindergarten children (mean age = 51.65 months); 16 children were trained by their regular…

  1. Higher Educational Institutions Providing Border Security Training: What Motivates Cadets and Instructors

    ERIC Educational Resources Information Center

    Talynev, V. E.

    2007-01-01

    The specific character of border troops' performance of their operational and service tasks at border security posts and "hot spots" makes it necessary to analyze in depth and study the problems of how to improve the training of graduates and how to motivate the cadets enrolled in higher educational institutions of Russia's Federal…

  2. 49 CFR 172.411 - EXPLOSIVE 1.1, 1.2, 1.3, 1.4, 1.5 and 1.6 labels, and EXPLOSIVE Subsidiary label.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 2 2011-10-01 2011-10-01 false EXPLOSIVE 1.1, 1.2, 1.3, 1.4, 1.5 and 1.6 labels..., EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND SECURITY PLANS Labeling § 172.411 EXPLOSIVE 1.1, 1.2, 1.3, 1.4, 1.5 and 1.6 labels, and EXPLOSIVE Subsidiary label. (a) Except for size and color...

  3. SU-G-PinS Room/Hall E-00: HAZMAT Training for the Medical Physicist - Part II

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    Medical Physicists are frequently involved in shipping radioactive materials or supervising those who do. Current U.S. Department of Transportation Hazardous Material Regulations, 49 CFR Parts 171 - 185, require hazmat employees to have documented training specified in 49 CFR 172 Subpart H. A hazmat employee is defined as an individual who: (1) loads, unloads or handles hazardous material; (2) manufactures, tests, reconditions, repairs, modifies, marks or otherwise represents containers, drums or packagings as qualified for use in the transportation of hazardous materials; (3) prepares hazardous materials for transportation; (4) is responsible for safety of transporting hazardous materials; or (5) operatesmore » a vehicle used to transport hazardous materials. Recurrent training is required at least once every three years. (The IATA two year training interval is not applicable and is generally misunderstood.) FAA has escalated inspection and enforcement. Facilities who ship radiopharmaceuticals to other laboratories, return radiopharmaceuticals or radioactive sources to suppliers, or otherwise ship radioactive materials have been cited for failure to provide and document the required training. The interrelationship of transportation regulations, 49 CFR, IATA, ICAO and other transportation regulations, which are frequently misunderstood, will be explained. The course will cover typical shipments by air and highway which are encountered in a medical institution. Items such as fissile materials, highway route controlled quantities, rail shipments, vessel shipments and such will be omitted; although specific questions may be addressed. A major objective of the course is to present the process of shipping radioactive material in a sequential and logical fashion. How radioactive materials for transportation purposes are defined by activity concentrations for exempt materials and activity limits for exempt consignments will be explained. Radioactive material shipments of excepted packages and Type A packages will be emphasized. The program is designed to meet the function specific DOT training requirements for shippers of medical radioactive materials. General awareness training and security awareness training can be obtained from two free DOT training CDs. Safety training and security awareness training is generally satisfied by the training required under the institution’s radioactive material license. For shippers of radioactive Yellow III labeled packages an in-depth written security plan and training are no longer required as of April 8, 2010. In general almost all shippers of medical radioactive material are now not required to have an in-depth security plan. Contents of general awareness training, security awareness training and in-depth security plans will be briefly outlined. It is the hazmat employer’s responsibility to ensure that each hazmat employee is properly trained. No third party can fulfill that requirement. It is the hazmat employer’s responsibility to determine the degree to which this course meets the employer’s requirements, including contents of the course and the examination. Participants will gain sufficient knowledge to prepare hazmat training programs for others in their institutions. A handout will be posted which should be printed out and brought to the course for reference during the presentation. The handout will also satisfy part of the training documentation required by DOT. A feature handout section is a composite table which provides A1, A2, RQ, Exempt Concentration, and Exempt Consignment values in a single table in both Becquerel and Curie units. Course attendance will be certified through the AAPM CEU documentation system. Learning Objectives: Understand the regulatory requirements for shipping radioactive materials. Understand the regulatory requirements for training of hazmat employees. Comprehend how to classify, package, mark, label, document, placard, and transport radioactive materials.« less

  4. SU-CD-PinS Room/Hall E-00: HAZMAT Training for the Medical Physicist - Part I

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    Medical Physicists are frequently involved in shipping radioactive materials or supervising those who do. Current U.S. Department of Transportation Hazardous Material Regulations, 49 CFR Parts 171 - 185, require hazmat employees to have documented training specified in 49 CFR 172 Subpart H. A hazmat employee is defined as an individual who: (1) loads, unloads or handles hazardous material; (2) manufactures, tests, reconditions, repairs, modifies, marks or otherwise represents containers, drums or packagings as qualified for use in the transportation of hazardous materials; (3) prepares hazardous materials for transportation; (4) is responsible for safety of transporting hazardous materials; or (5) operatesmore » a vehicle used to transport hazardous materials. Recurrent training is required at least once every three years. (The IATA two-year training interval is not applicable and is generally misunderstood.) FAA has escalated inspection and enforcement. Facilities who ship radiopharmaceuticals to other laboratories, return radiopharmaceuticals or radioactive sources to suppliers, or otherwise ship radioactive materials have been cited for failure to provide and document the required training. The interrelationship of transportation regulations, 49 CFR, IATA, ICAO and other transportation regulations, which are frequently misunderstood, will be explained. The course will cover typical shipments by air and highway which are encountered in a medical institution. Items such as fissile materials, highway route controlled quantities, rail shipments, vessel shipments and such will be omitted; although specific questions may be addressed. A major objective of the course is to present the process of shipping radioactive material in a sequential and logical fashion. How radioactive materials for transportation purposes are defined by activity concentrations for exempt materials and activity limits for exempt consignments will be explained. Radioactive material shipments of excepted packages and Type A packages will be emphasized. The program is designed to meet the function specific DOT training requirements for shippers of medical radioactive materials. General awareness training and security awareness training can be obtained from two free DOT training CDs. Safety training and security awareness training is generally satisfied by the training required under the institution’s radioactive material license. For shippers of radioactive Yellow III labeled packages an in-depth written security plan and training are no longer required as of April 8, 2010. In general almost all shippers of medical radioactive material are now not required to have an in-depth security plan. Contents of general awareness training, security awareness training and in-depth security plans will be briefly outlined. It is the hazmat employer’s responsibility to ensure that each hazmat employee is properly trained. No third party can fulfill that requirement. It is the hazmat employer’s responsibility to determine the degree to which this course meets the employer’s requirements, including contents of the course and the examination. Participants will gain sufficient knowledge to prepare hazmat training programs for others in their institutions. A handout will be posted which should be printed out and brought to the course for reference during the presentation. The handout will also satisfy part of the training documentation required by DOT. A feature handout section is a composite table which provides A1, A2, RQ, Exempt Concentration, and Exempt Consignment values in a single table in both Becquerel and Curie units. Course attendance will be certified through the AAPM CEU documentation system. Learning Objectives: Understand the regulatory requirements for shipping radioactive materials. Understand the regulatory requirements for training of hazmat employees. Comprehend how to classify, package, mark, label, document, placard, and transport radioactive materials.« less

  5. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Parker, R.

    Medical Physicists are frequently involved in shipping radioactive materials or supervising those who do. Current U.S. Department of Transportation Hazardous Material Regulations, 49 CFR Parts 171 - 185, require hazmat employees to have documented training specified in 49 CFR 172 Subpart H. A hazmat employee is defined as an individual who: (1) loads, unloads or handles hazardous material; (2) manufactures, tests, reconditions, repairs, modifies, marks or otherwise represents containers, drums or packagings as qualified for use in the transportation of hazardous materials; (3) prepares hazardous materials for transportation; (4) is responsible for safety of transporting hazardous materials; or (5) operatesmore » a vehicle used to transport hazardous materials. Recurrent training is required at least once every three years. (The IATA two-year training interval is not applicable and is generally misunderstood.) FAA has escalated inspection and enforcement. Facilities who ship radiopharmaceuticals to other laboratories, return radiopharmaceuticals or radioactive sources to suppliers, or otherwise ship radioactive materials have been cited for failure to provide and document the required training. The interrelationship of transportation regulations, 49 CFR, IATA, ICAO and other transportation regulations, which are frequently misunderstood, will be explained. The course will cover typical shipments by air and highway which are encountered in a medical institution. Items such as fissile materials, highway route controlled quantities, rail shipments, vessel shipments and such will be omitted; although specific questions may be addressed. A major objective of the course is to present the process of shipping radioactive material in a sequential and logical fashion. How radioactive materials for transportation purposes are defined by activity concentrations for exempt materials and activity limits for exempt consignments will be explained. Radioactive material shipments of excepted packages and Type A packages will be emphasized. The program is designed to meet the function specific DOT training requirements for shippers of medical radioactive materials. General awareness training and security awareness training can be obtained from two free DOT training CDs. Safety training and security awareness training is generally satisfied by the training required under the institution’s radioactive material license. For shippers of radioactive Yellow III labeled packages an in-depth written security plan and training are no longer required as of April 8, 2010. In general almost all shippers of medical radioactive material are now not required to have an in-depth security plan. Contents of general awareness training, security awareness training and in-depth security plans will be briefly outlined. It is the hazmat employer’s responsibility to ensure that each hazmat employee is properly trained. No third party can fulfill that requirement. It is the hazmat employer’s responsibility to determine the degree to which this course meets the employer’s requirements, including contents of the course and the examination. Participants will gain sufficient knowledge to prepare hazmat training programs for others in their institutions. A handout will be posted which should be printed out and brought to the course for reference during the presentation. The handout will also satisfy part of the training documentation required by DOT. A feature handout section is a composite table which provides A1, A2, RQ, Exempt Concentration, and Exempt Consignment values in a single table in both Becquerel and Curie units. Course attendance will be certified through the AAPM CEU documentation system. Learning Objectives: Understand the regulatory requirements for shipping radioactive materials. Understand the regulatory requirements for training of hazmat employees. Comprehend how to classify, package, mark, label, document, placard, and transport radioactive materials.« less

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Parker, R.

    Medical Physicists are frequently involved in shipping radioactive materials or supervising those who do. Current U.S. Department of Transportation Hazardous Material Regulations, 49 CFR Parts 171 - 185, require hazmat employees to have documented training specified in 49 CFR 172 Subpart H. A hazmat employee is defined as an individual who: (1) loads, unloads or handles hazardous material; (2) manufactures, tests, reconditions, repairs, modifies, marks or otherwise represents containers, drums or packagings as qualified for use in the transportation of hazardous materials; (3) prepares hazardous materials for transportation; (4) is responsible for safety of transporting hazardous materials; or (5) operatesmore » a vehicle used to transport hazardous materials. Recurrent training is required at least once every three years. (The IATA two year training interval is not applicable and is generally misunderstood.) FAA has escalated inspection and enforcement. Facilities who ship radiopharmaceuticals to other laboratories, return radiopharmaceuticals or radioactive sources to suppliers, or otherwise ship radioactive materials have been cited for failure to provide and document the required training. The interrelationship of transportation regulations, 49 CFR, IATA, ICAO and other transportation regulations, which are frequently misunderstood, will be explained. The course will cover typical shipments by air and highway which are encountered in a medical institution. Items such as fissile materials, highway route controlled quantities, rail shipments, vessel shipments and such will be omitted; although specific questions may be addressed. A major objective of the course is to present the process of shipping radioactive material in a sequential and logical fashion. How radioactive materials for transportation purposes are defined by activity concentrations for exempt materials and activity limits for exempt consignments will be explained. Radioactive material shipments of excepted packages and Type A packages will be emphasized. The program is designed to meet the function specific DOT training requirements for shippers of medical radioactive materials. General awareness training and security awareness training can be obtained from two free DOT training CDs. Safety training and security awareness training is generally satisfied by the training required under the institution’s radioactive material license. For shippers of radioactive Yellow III labeled packages an in-depth written security plan and training are no longer required as of April 8, 2010. In general almost all shippers of medical radioactive material are now not required to have an in-depth security plan. Contents of general awareness training, security awareness training and in-depth security plans will be briefly outlined. It is the hazmat employer’s responsibility to ensure that each hazmat employee is properly trained. No third party can fulfill that requirement. It is the hazmat employer’s responsibility to determine the degree to which this course meets the employer’s requirements, including contents of the course and the examination. Participants will gain sufficient knowledge to prepare hazmat training programs for others in their institutions. A handout will be posted which should be printed out and brought to the course for reference during the presentation. The handout will also satisfy part of the training documentation required by DOT. A feature handout section is a composite table which provides A1, A2, RQ, Exempt Concentration, and Exempt Consignment values in a single table in both Becquerel and Curie units. Course attendance will be certified through the AAPM CEU documentation system. Learning Objectives: Understand the regulatory requirements for shipping radioactive materials. Understand the regulatory requirements for training of hazmat employees. Comprehend how to classify, package, mark, label, document, placard, and transport radioactive materials.« less

  7. A Quantitative Study on the Relationship of Information Security Policy Awareness, Enforcement, and Maintenance to Information Security Program Effectiveness

    ERIC Educational Resources Information Center

    Francois, Michael T.

    2016-01-01

    Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…

  8. The Person-Event Data Environment: leveraging big data for studies of psychological strengths in soldiers

    PubMed Central

    Vie, Loryana L.; Griffith, Kevin N.; Scheier, Lawrence M.; Lester, Paul B.; Seligman, Martin E. P.

    2013-01-01

    The Department of Defense (DoD) strives to efficiently manage the large volumes of administrative data collected and repurpose this information for research and analyses with policy implications. This need is especially present in the United States Army, which maintains numerous electronic databases with information on more than one million Active-Duty, Reserve, and National Guard soldiers, their family members, and Army civilian employees. The accumulation of vast amounts of digitized health, military service, and demographic data thus approaches, and may even exceed, traditional benchmarks for Big Data. Given the challenges of disseminating sensitive personal and health information, the Person-Event Data Environment (PDE) was created to unify disparate Army and DoD databases in a secure cloud-based enclave. This electronic repository serves the ultimate goal of achieving cost efficiencies in psychological and healthcare studies and provides a platform for collaboration among diverse scientists. This paper provides an overview of the uses of the PDE to perform command surveillance and policy analysis for Army leadership. The paper highlights the confluence of both economic and behavioral science perspectives elucidating empirically-based studies examining relations between psychological assets, health, and healthcare utilization. Specific examples explore the role of psychological assets in major cost drivers such as medical expenditures both during deployment and stateside, drug use, attrition from basic training, and low reenlistment rates. Through creation of the PDE, the Army and scientific community can now capitalize on the vast amounts of personnel, financial, medical, training and education, deployment, and security systems that influence Army-wide policies and procedures. PMID:24379795

  9. The experiences and needs of individuals with disabilities exposed to chronic political violence.

    PubMed

    Shpigelman, Carmit-Noa; Gelkopf, Marc

    2017-01-01

    Purpose The main objective of this study was to understand, describe and map the experiences, challenges and needs of individuals with lifelong disabilities, who have been exposed to chronic politically violent events (terror, war or continuous missile attacks) in Israel. Method The study was conducted within the qualitative-constructivist paradigm. Three focus groups consisting of 18 individuals with lifelong disabilities were conducted; each focus group included a specific disability type (physical, visual and hearing impairment). Results The participants reported encountering environmental barriers, such as inaccessibly of the physical environment and information as well as dependency on others. These barriers limited the participants' functioning during emergency period and thus increased their level of distress. The participants also emphasized their physical, social and psychological needs. Conclusions The needs of individuals with disabilities in emergency situations can be met if they have a safe place to stay in, are with someone else, and plan every daily action in advance. It is also imperative to provide accessible services and information. Furthermore, it is recommended to develop training sessions for individuals with disabilities and for service providers regarding how to locate, communicate with and assist individuals with disabilities during security threat situations. Implications for Rehabilitation Successful coping of individuals with lifelong disabilities with chronic politically violent events depends on personal and organizational accommodations. Besides an accessible physical environment, the information provided should be available and accessible through mass media and assistive technologies. A comprehensive emergency service for various disabilities is needed. Service providers should be trained on how to locate, communicate with, and assist individuals with disabilities during security threat situations.

  10. The Person-Event Data Environment: leveraging big data for studies of psychological strengths in soldiers.

    PubMed

    Vie, Loryana L; Griffith, Kevin N; Scheier, Lawrence M; Lester, Paul B; Seligman, Martin E P

    2013-01-01

    The Department of Defense (DoD) strives to efficiently manage the large volumes of administrative data collected and repurpose this information for research and analyses with policy implications. This need is especially present in the United States Army, which maintains numerous electronic databases with information on more than one million Active-Duty, Reserve, and National Guard soldiers, their family members, and Army civilian employees. The accumulation of vast amounts of digitized health, military service, and demographic data thus approaches, and may even exceed, traditional benchmarks for Big Data. Given the challenges of disseminating sensitive personal and health information, the Person-Event Data Environment (PDE) was created to unify disparate Army and DoD databases in a secure cloud-based enclave. This electronic repository serves the ultimate goal of achieving cost efficiencies in psychological and healthcare studies and provides a platform for collaboration among diverse scientists. This paper provides an overview of the uses of the PDE to perform command surveillance and policy analysis for Army leadership. The paper highlights the confluence of both economic and behavioral science perspectives elucidating empirically-based studies examining relations between psychological assets, health, and healthcare utilization. Specific examples explore the role of psychological assets in major cost drivers such as medical expenditures both during deployment and stateside, drug use, attrition from basic training, and low reenlistment rates. Through creation of the PDE, the Army and scientific community can now capitalize on the vast amounts of personnel, financial, medical, training and education, deployment, and security systems that influence Army-wide policies and procedures.

  11. Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1979-12-05

    The airline and airport security measures currently in effect continue to provide increased safety for airline passengers and crews as well as...107 governing airport security . other ongoing programs which contributed significantly to airport security included the training of law enforce- ment...officers supporting airport security programs and the explosives detection K(9 team program. Highlights of these actions and programs are summarized

  12. A Security Framework for Online Distance Learning and Training.

    ERIC Educational Resources Information Center

    Furnell, S. M.; Onions, P. D.; Bleimann, U.; Gojny, U.; Knahl, M.; Roder, H. F.; Sanders, P. W.

    1998-01-01

    Presents a generic reference model for online distance learning and discusses security issues for each stage (enrollment, study, completion, termination, suspension). Discusses a security framework (authentication and accountability, access control, intrusion detection, network communications, nonrepudiation, learning resources provider…

  13. Developing and theoretically justifying innovative organizational practices in health information assurance

    NASA Astrophysics Data System (ADS)

    Collmann, Jeff R.

    2003-05-01

    This paper justifies and explains current efforts in the Military Health System (MHS) to enhance information assurance in light of the sociological debate between "Normal Accident" (NAT) and "High Reliability" (HRT) theorists. NAT argues that complex systems such as enterprise health information systems display multiple, interdependent interactions among diverse parts that potentially manifest unfamiliar, unplanned, or unexpected sequences that operators may not perceive or immediately understand, especially during emergencies. If the system functions rapidly with few breaks in time, space or process development, the effects of single failures ramify before operators understand or gain control of the incident thus producing catastrophic accidents. HRT counters that organizations with strong leadership support, continuous training, redundant safety features and "cultures of high reliability" contain the effects of component failures even in complex, tightly coupled systems. Building highly integrated, enterprise-wide computerized health information management systems risks creating the conditions for catastrophic breaches of data security as argued by NAT. The data security regulations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) implicitly depend on the premises of High Reliability Theorists. Limitations in HRT thus have implications for both safe program design and compliance efforts. MHS and other health care organizations should consider both NAT and HRT when designing and deploying enterprise-wide computerized health information systems.

  14. Technical Training Skills Needs of Youth for Sustainable Job Security in Rice Production in Ebonyi State, Nigeria

    ERIC Educational Resources Information Center

    Edu, Chukwuma Nwofe; Ogba, Ernest Ituma

    2016-01-01

    The study identifies technical training skills needs of youth for sustainable job security in rice production in Ebonyi State, Nigeria. This study was carried out in secondary schools in three educational zones in Ebonyi State, Nigeria. Ebonyi state is one of the states in the southeast geopolitical zone in Nigeria. Descriptive survey design was…

  15. New developments in technology-assisted supervision and training: a practical overview.

    PubMed

    Rousmaniere, Tony; Abbass, Allan; Frederickson, Jon

    2014-11-01

    Clinical supervision and training are now widely available online. In this article, three of the most accessible and widely adopted new developments in clinical supervision and training technology are described: Videoconference supervision, cloud-based file sharing software, and clinical outcome tracking software. Partial transcripts from two online supervision sessions are provided as examples of videoconference-based supervision. The benefits and limitations of technology in supervision and training are discussed, with an emphasis on supervision process, ethics, privacy, and security. Recommendations for supervision practice are made, including methods to enhance experiential learning, the supervisory working alliance, and online security. © 2014 Wiley Periodicals, Inc.

  16. A cloud-based semantic wiki for user training in healthcare process management.

    PubMed

    Papakonstantinou, D; Poulymenopoulou, M; Malamateniou, F; Vassilacopoulos, G

    2011-01-01

    Successful healthcare process design requires active participation of users who are familiar with the cooperative and collaborative nature of healthcare delivery, expressed in terms of healthcare processes. Hence, a reusable, flexible, agile and adaptable training material is needed with the objective to enable users instill their knowledge and expertise in healthcare process management and (re)configuration activities. To this end, social software, such as a wiki, could be used as it supports cooperation and collaboration anytime, anywhere and combined with semantic web technology that enables structuring pieces of information for easy retrieval, reuse and exchange between different systems and tools. In this paper a semantic wiki is presented as a means for developing training material for healthcare providers regarding healthcare process management. The semantic wiki should act as a collective online memory containing training material that is accessible to authorized users, thus enhancing the training process with collaboration and cooperation capabilities. It is proposed that the wiki is stored in a secure virtual private cloud that is accessible from anywhere, be it an excessively open environment, while meeting the requirements of redundancy, high performance and autoscaling.

  17. System Engineering Analysis For Improved Scout Business Information Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Van Slyke, D. A.

    The project uses system engineering principles to address the need of Boy Scout leaders for an integrated system to facilitate advancement and awards records, leader training and planning for meetings and activities. Existing products to address needs of Scout leaders and relevant stakeholders function to support record keeping and some communication functions but opportunity exists for a better system to fully integrate these functions with training delivery and recording, activity planning along with feedback and information gathering from stakeholders. Key stakeholders for the sytem include Scouts and their families, leaders, training providers, sellers of supplies and awards, content generators andmore » facilities that serve Scout activities. Key performance parameters for the system are protection of personal information, availability of current information, information accuracy and information content that has depth. Implementation concepts considered for the system include (1) owned and operated by Boy Scouts of America, (2) Contracted out to a vendor (3) distributed system that functions with BSA managed interfaces. The selected concept is to contract out to a vendor to maximize the likelihood of successful integration and take advantage of the best technology. Development of requirements considers three key use cases (1) System facilitates planning a hike with training needed satisfied in advance and advancement recording real time (2) Scheduling and documenting in-person training, (3) Family interested in Scouting receives information and can request follow-up. Non-functional requirements are analyzed with the Quality Function Deployment tool. Requirement addressing frequency of backup, compatibility with legacy and new technology, language support, software update are developed to address system reliability and intuitive interface. System functions analyzed include update of activity database, maintenance of advancement status, archive of documents, and monitoring of content that is accessible. The study examines risks associated with information security, technological change and continued popularity of Scouting. Mitigation is based on system functions that are defined. The approach to developing an improved system for facilitating Boy Scout leader functions was iterative with insights into capabilities coming in the course of working through the used cases and sequence diagrams.« less

  18. 45 CFR 1182.15 - Institute responsibility for maintaining adequate technical, physical, and security safeguards to...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... record systems. These security safeguards shall apply to all systems in which identifiable personal data... data and automated systems shall be adequately trained in the security and privacy of personal data. (4... technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of manual and...

  19. 45 CFR 1159.15 - Who has the responsibility for maintaining adequate technical, physical, and security safeguards...

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... disclosure or destruction of manual and automatic record systems. These security safeguards shall apply to... use of records contained in a system of records are adequately trained to protect the security and... adequate technical, physical, and security safeguards to prevent unauthorized disclosure or destruction of...

  20. A layered trust information security architecture.

    PubMed

    de Oliveira Albuquerque, Robson; Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Buiati, Fábio; Kim, Tai-Hoon

    2014-12-01

    Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed.

  1. 32 CFR 2700.51 - Information Security Oversight Committee.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Information Security Oversight Committee. 2700... MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Implementation and Review § 2700.51 Information Security Oversight Committee. The OMSN Information Security Oversight Committee shall be chaired...

  2. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National... Information Security Oversight Office no later than Friday, March 16, 2012. The Information Security Oversight... FURTHER INFORMATION CONTACT: David O. Best, Senior Program Analyst, The Information Security Oversight...

  3. 32 CFR 2700.51 - Information Security Oversight Committee.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Oversight Committee. 2700... MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Implementation and Review § 2700.51 Information Security Oversight Committee. The OMSN Information Security Oversight Committee shall be chaired...

  4. 75 FR 49943 - New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-16

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration New Agency Information Collection Activity Under OMB Review: Pipeline System Operator Security Information AGENCY: Transportation... INFORMATION CONTACT: Joanna Johnson, Office of Information Technology, TSA-11, Transportation Security...

  5. Tractor Trailer Driver's Training Programs. Performance Report.

    ERIC Educational Resources Information Center

    New Hampshire Vocational Technical Coll., Nashua.

    This document describes a project to develop a 320-hour tractor trailer driver training program and a 20-hour commercial driver licensing upgrade training program. Of 34 graduates from the training program, 28 secured employment in the trucking industry. From August 1989 to June 1990, 725 students were trained in the upgrade training program with…

  6. Topic Detection in Online Chat

    DTIC Science & Technology

    2009-09-01

    CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18 . SECURITY CLASSIFICATION OF THIS PAGE Unclassified 19. SECURITY CLASSIFICATION...Documents and Author-Author Documents—Radial Kernel. .............. 66 Figure 18 . Classifiers Results: LDA Models Created by Textbook-Author...Trained on Two Classes............................................................................................... 72 Table 18 . Maximum

  7. Step to improve neural cryptography against flipping attacks.

    PubMed

    Zhou, Jiantao; Xu, Qinzhen; Pei, Wenjiang; He, Zhenya; Szu, Harold

    2004-12-01

    Synchronization of neural networks by mutual learning has been demonstrated to be possible for constructing key exchange protocol over public channel. However, the neural cryptography schemes presented so far are not the securest under regular flipping attack (RFA) and are completely insecure under majority flipping attack (MFA). We propose a scheme by splitting the mutual information and the training process to improve the security of neural cryptosystem against flipping attacks. Both analytical and simulation results show that the success probability of RFA on the proposed scheme can be decreased to the level of brute force attack (BFA) and the success probability of MFA still decays exponentially with the weights' level L. The synchronization time of the parties also remains polynomial with L. Moreover, we analyze the security under an advanced flipping attack.

  8. Fire/security staff member instructs STS-29 crew on fire extinguisher usage

    NASA Technical Reports Server (NTRS)

    1988-01-01

    STS-29 Discovery, Orbiter Vehicle (OV) 103, crewmembers are trained in procedures to follow in the event of a fire. Here, the crew is briefed on the correct handling of the fire extinguisher by Robert Fife (far left) of NASA's fire / security staff. Pictured, left to right are Pilot John E. Blaha, Commander Michael L. Coats, Mission Specialist (MS) Robert C. Springer, MS James F. Buchli, and MS James P. Bagian. The in fire fighting training took place at JSC's fire training pit across from the Gilruth Center Bldg 207.

  9. [Application of classified protection of information security in the information system of air pollution and health impact monitoring].

    PubMed

    Hao, Shuxin; Lü, Yiran; Liu, Jie; Liu, Yue; Xu, Dongqun

    2018-01-01

    To study the application of classified protection of information security in the information system of air pollution and health impact monitoring, so as to solve the possible safety risk of the information system. According to the relevant national standards and requirements for the information system security classified protection, and the professional characteristics of the information system, to design and implement the security architecture of information system, also to determine the protection level of information system. Basic security measures for the information system were developed in the technical safety and management safety aspects according to the protection levels, which effectively prevented the security risk of the information system. The information system established relatively complete information security protection measures, to enhanced the security of professional information and system service, and to ensure the safety of air pollution and health impact monitoring project carried out smoothly.

  10. 14 CFR 1203.201 - Information security objectives.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...

  11. 14 CFR 1203.201 - Information security objectives.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...

  12. Black Flags of Their Fathers: The Islamic States Returning Foreign Fighter Youths and the Implications for U.S. Domestic Security

    DTIC Science & Technology

    2017-12-01

    headquarters Services , Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the...indoctrination and training that give them the tools to plan, organize, and execute terrorist attacks. These children also have the motive, means, and...Tani Jr. Assistant to the Special Agent in Charge, U.S. Secret Service B.A., University of Mary Washington, 1998 Submitted in partial fulfillment of

  13. Proceedings of Interservice/Industry Training Systems and Education Conference (15th) Held November 29 - December 2, 1993

    DTIC Science & Technology

    1993-12-02

    community) or not knowing MPT analysis evaluates human-in- loop costs and how to exploit data that were available to represent capabilities w;th intent...specification b. There is no closed loop ; the process may statements. An agency is preparing a System Specification with minimal security information...Item is one which musk alweys be provided by the CMI system to be AICC compliant. Core Items are those which a lesson may always depend upon being

  14. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    Commission (IEC). “Information technology — Security techniques — Code of practice for information security management ( ISO /IEC 27002 ...Information technology — Security techniques — Information security management systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security...was a draft ISO standard on Systems and software engineering, Systems and software assurance [18]. Created by systems engineers for systems

  15. Security Assistance International Logistics, Training, and Technical Assistance Support Policy and Responsibilities

    DTIC Science & Technology

    2000-01-24

    Security Administration ( DTSA ). d. Reporting requirements (1) General. Army organizations with security assistance responsibility for ad- ministering...by the Department of State (DOS) and the Director, Defense Technology Security Administration ( DTSA ). The term “munitions case” includes in its scope...also formulate the Army position for ARSTAF coordination before responding to Defense Technology Security Agency ( DTSA ). AR 12-1 • 24 January 2000

  16. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-15

    ...] Information Collection; Implementation of Information Technology Security Provision AGENCY: General Services... collection requirement regarding Implementation of Information Technology Security Provision. Public comments... Information Collection 3090- 0294, Implementation of Information Technology Security Provision, by any of the...

  17. KSC-2013-4384

    NASA Image and Video Library

    2013-12-13

    CAPE CANAVERAL, Fla. – At a training location near Launch Complex 39 at NASA’s Kennedy Space Center in Florida, members of the Emergency Response Team, or ERT, participate in specialized training simulations in order to keep their skills current. They are wearing full protective gear and carrying non-lethal firearms, which are denoted in blue, for the training exercises. The ERT training supervisor, wearing a bright green vest, monitors the training exercise and reviews procedures. Recently, eight members of the ERT competed in the 31st Annual SWAT Roundup International competition in Orlando, Fla., and received recognition by placing in the top five overall. In keeping with NASA’s commitment to safety and security of workforce and assets, the ERT is part of Kennedy’s security team and is trained to respond in the event of an emergency at the center. Photo credit: NASA/Daniel Casper

  18. KSC-2013-4385

    NASA Image and Video Library

    2013-12-13

    CAPE CANAVERAL, Fla. – At a training location near Launch Complex 39 at NASA’s Kennedy Space Center in Florida, members of the Emergency Response Team, or ERT, participate in specialized training simulations in order to keep their skills current. They are wearing full protective gear and carrying non-lethal firearms, which are denoted in blue, for the training exercises. The ERT training supervisor, wearing a bright green vest, monitors the training exercise and reviews procedures. Recently, eight members of the ERT competed in the 31st Annual SWAT Roundup International competition in Orlando, Fla., and received recognition by placing in the top five overall. In keeping with NASA’s commitment to safety and security of workforce and assets, the ERT is part of Kennedy’s security team and is trained to respond in the event of an emergency at the center. Photo credit: NASA/Daniel Casper

  19. Electronic health information system at an opioid treatment programme: roadblocks to implementation

    PubMed Central

    Louie, Ben; Kritz, Steven; Brown, Lawrence S.; Chu, Melissa; Madray, Charles; Zavala, Roberto

    2012-01-01

    Rationale Electronic health systems are commonly included in health care reform discussions. However, their embrace by the health care community has been slow. Methods At Addiction Research and Treatment Corporation, a methadone maintenance programme that also provides primary medical care, HIV medical care and case management, substance abuse counselling and vocational services, we describe our experience in implementing an electronic health information system that encompasses all of these areas. Results We describe the challenges and opportunities of this process in terms of change management, hierarchy of corporate objectives, process mastering, training issues, information technology governance, electronic security, and communication and collaboration. Conclusion This description may provide practical insights to other institutions seeking to pursue this technology. PMID:21414111

  20. Electronic health information system at an opioid treatment programme: roadblocks to implementation.

    PubMed

    Louie, Ben; Kritz, Steven; Brown, Lawrence S; Chu, Melissa; Madray, Charles; Zavala, Roberto

    2012-08-01

    Electronic health systems are commonly included in health care reform discussions. However, their embrace by the health care community has been slow. At Addiction Research and Treatment Corporation, a methadone maintenance programme that also provides primary medical care, HIV medical care and case management, substance abuse counselling and vocational services, we describe our experience in implementing an electronic health information system that encompasses all of these areas. We describe the challenges and opportunities of this process in terms of change management, hierarchy of corporate objectives, process mastering, training issues, information technology governance, electronic security, and communication and collaboration. This description may provide practical insights to other institutions seeking to pursue this technology. © 2011 Blackwell Publishing Ltd.

  1. Medicare and state health care programs: fraud and abuse; safe harbors for certain electronic prescribing and electronic health records arrangements under the anti-kickback statute. Final rule.

    PubMed

    2006-08-08

    As required by the Medicare Prescription Drug, Improvement, and Modernization Act of 2003 (MMA), Public Law 108-173, this final rule establishes a new safe harbor under the Federal anti-kickback statute for certain arrangements involving the provision of electronic prescribing technology. Specifically, the safe harbor would protect certain arrangements involving hospitals, group practices, and prescription drug plan (PDP) sponsors and Medicare Advantage (MA) organizations that provide to specified recipients certain nonmonetary remuneration in the form of hardware, software, or information technology and training services necessary and used solely to receive and transmit electronic prescription information. In addition, in accordance with section 1128B(b)(3)(E) of the Social Security Act (the Act), this final rule creates a separate new safe harbor for certain arrangements involving the provision of nonmonetary remuneration in the form of electronic health records software or information technology and training services necessary and used predominantly to create, maintain, transmit, or receive electronic health records.

  2. A Decade of Experience: Which Network Structures Maximize Fire Service Capacity for Homeland Security Incidents in Metropolitan Regions?

    DTIC Science & Technology

    2011-12-01

    Pennsylvania Emergency Management Agency QHSR Quadrennial Homeland Security Review Report RCP Regional Catastrophic Preparedness SAA State...service has evolved from a single-purpose service focused on controlling fires to a multidimensional response element responsible for pre- hospital ... hospital preparedness program Preparedness Training for all personnel; training and network activities during prior year assist in preparedness

  3. Testing the Waters: Climate Change in Africa and Anticipating Regional Conflicts

    DTIC Science & Technology

    2011-05-04

    be adequately assessed without careful consideration of the history of economic change and political activities within populations‟ respective areas...to the defined National Security objectives of the USG in Africa. This training often consists of operational activities such as counter-piracy...thus, the USG. However, it is telling that African military leaders have identified security forces training in more fundamental activities such as

  4. 2008 Homeland Security S and T Stakeholders Conference West. Volume 4. Wednesday

    DTIC Science & Technology

    2008-01-16

    www.npia.police.uk Polonium 210 Interoperability - lessons Major Incident - CBRN Images courtesy of BBC www.npia.police.uk Boscastle 2007...Washington Training Session 37: Preparing First Responders for Food Systems Disasters Jerry Gillespie, DVM, PhD Director, Western Institute for... Food Safety and Security Training Session 39: Technology Adoption & Innovation 1 Dr. Neal Thornberry, Innovation Chair Graduate School of

  5. 44 CFR 8.3 - Senior FEMA official responsible for the information security program.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... responsible for the information security program. 8.3 Section 8.3 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY GENERAL NATIONAL SECURITY INFORMATION § 8.3 Senior FEMA official responsible for the information security program. The Director of the Security...

  6. 75 FR 44800 - Notice of Meeting of the Homeland Security Information Network Advisory Committee, Tuesday...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-29

    ... DEPARTMENT OF HOMELAND SECURITY Notice of Meeting of the Homeland Security Information Network... Security. ACTION: Notice of open meeting. SUMMARY: The Homeland Security Information Network Advisory... (Pub. L. 92-463). The mission of the Homeland Security Information Network Advisory Committee is to...

  7. Building Capacity for Earth Observations in Support of the United Nations Sustainable Development Goals

    NASA Astrophysics Data System (ADS)

    Blevins, B.; Prados, A. I.; Hook, E.

    2017-12-01

    The Group on Earth Observations (GEO) looks to build a future where the international community uses Earth observations to make better, informed decisions. This includes application in international agreements such as the UN Sustainable Development Goals (SDGs), the Sendai Framework for Disaster Risk Reduction, and the Convention on Biological Diversity. To do this, decision makers first need to build the necessary skills. NASA's Applied Remote Sensing Training program (ARSET) seeks to build capacity through remote sensing training. In-person and online trainings raise awareness, enable data access, and demonstrate applications of Earth observations. Starting in 2017, ARSET began offering training focused on applying Earth data to the UN SDGs. These trainings offer insight into applications of satellite data in support of implementing, monitoring, and evaluating the SDGs. This presentation will provide an overview of the use of NASA satellite data to track progress towards increased food security, disaster risk reduction, and conservation of natural resources for societal benefit. It will also include a discussion on capacity building best practices and lessons learned for using Earth observations to meet SDG targets, based on feedback from engaging over 800 participants from 89 nations and 580 organizations in ARSET SDG trainings.

  8. Systems Security Engineering

    DTIC Science & Technology

    2010-08-22

    practice for information security management ( ISO /IEC 27002 ),” “Information technology — Security techniques — Information security management...systems —Requirements ( ISO /IEC 27002 ),”, “Information technology — Security techniques — Information security risk management ( ISO /IEC 27005).” from...associated practice aids. Perhaps the most germane discovery from this effort was a draft ISO standard on Systems and software engineering, Systems and

  9. 12 CFR 605.501 - Information Security Officer.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 6 2011-01-01 2011-01-01 false Information Security Officer. 605.501 Section... Information Security Officer. (a) The Information Security Officer of the Farm Credit Administration shall be responsible for implementation and oversight of the information security program and procedures adopted by the...

  10. 12 CFR 605.501 - Information Security Officer.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Information Security Officer. 605.501 Section... Information Security Officer. (a) The Information Security Officer of the Farm Credit Administration shall be responsible for implementation and oversight of the information security program and procedures adopted by the...

  11. Smart Grid Information Clearinghouse (SGIC)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rahman, Saifur

    Since the Energy Independence and Security Act of 2007 was enacted, there has been a large number of websites that discusses smart grid and relevant information, including those from government, academia, industry, private sector and regulatory. These websites collect information independently. Therefore, smart grid information was quite scattered and dispersed. The objective of this work was to develop, populate, manage and maintain the public Smart Grid Information Clearinghouse (SGIC) web portal. The information in the SGIC website is comprehensive that includes smart grid information, research & development, demonstration projects, technical standards, costs & benefit analyses, business cases, legislation, policy &more » regulation, and other information on lesson learned and best practices. The content in the SGIC website is logically grouped to allow easily browse, search and sort. In addition to providing the browse and search feature, the SGIC web portal also allow users to share their smart grid information with others though our online content submission platform. The Clearinghouse web portal, therefore, serves as the first stop shop for smart grid information that collects smart grid information in a non-bias, non-promotional manner and can provide a missing link from information sources to end users and better serve users’ needs. The web portal is available at www.sgiclearinghouse.org. This report summarizes the work performed during the course of the project (September 2009 – August 2014). Section 2.0 lists SGIC Advisory Committee and User Group members. Section 3.0 discusses SGIC information architecture and web-based database application functionalities. Section 4.0 summarizes SGIC features and functionalities, including its search, browse and sort capabilities, web portal social networking, online content submission platform and security measures implemented. Section 5.0 discusses SGIC web portal contents, including smart grid 101, smart grid projects, deployment experience (i.e., use cases, lessons learned, cost-benefit analyses and business cases), in-depth information (i.e., standards, technology, cyber security, legislation, education and training and demand response), as well as international information. Section 6.0 summarizes SGIC statistics from the launch of the portal on July 07, 2010 to August 31, 2014. Section 7.0 summarizes publicly available information as a result of this work.« less

  12. Evaluating the Use of Remote Sensing Data in the U.S. Agency for International Development Famine Early Warning Systems Network

    NASA Technical Reports Server (NTRS)

    Brown, Molly Elizabeth; Brickley, Elizabeth B

    2012-01-01

    The U.S. Agency for International Development (USAID)'s Famine Early Warning System Network (FEWS NET) provides monitoring and early warning support to decision makers responsible for responding to food insecurity emergencies on three continents. FEWS NET uses satellite remote sensing and ground observations of rainfall and vegetation in order to provide information on drought, floods, and other extreme weather events to decision makers. Previous research has presented results from a professional review questionnaire with FEWS NET expert end-users whose focus was to elicit Earth observation requirements. The review provided FEWS NET operational requirements and assessed the usefulness of additional remote sensing data. We analyzed 1342 food security update reports from FEWS NET. The reports consider the biophysical, socioeconomic, and contextual influences on the food security in 17 countries in Africa from 2000 to 2009. The objective was to evaluate the use of remote sensing information in comparison with other important factors in the evaluation of food security crises. The results show that all 17 countries use rainfall information, agricultural production statistics, food prices, and food access parameters in their analysis of food security problems. The reports display large-scale patterns that are strongly related to history of the FEWS NET program in each country. We found that rainfall data were used 84% of the time, remote sensing of vegetation 28% of the time, and gridded crop models 10% of the time, reflecting the length of use of each product in the regions. More investment is needed in training personnel on remote sensing products to improve use of data products throughout the FEWS NET system.

  13. 75 FR 63867 - DTE Energy; Enrico Fermi Atomic Power Plant Unit 1, Exemption From Certain Security Requirements

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-18

    ... procedures, physical security plan, guard training and qualification plan, or cyber security plan for the... Power Plant Unit 1, Exemption From Certain Security Requirements 1.0 Background DTE Energy (DTE) is the... atmospheric pressure. In November 1972, the Power Reactor Development Company (PRDC), the licensee at that...

  14. 20 CFR 638.528 - Social Security.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 3 2011-04-01 2011-04-01 false Social Security. 638.528 Section 638.528... TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.528 Social Security. The Act provides that students are covered by title II of the Social Security Act (42 U.S.C. 401 et seq.) and shall...

  15. 20 CFR 638.528 - Social Security.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 3 2012-04-01 2012-04-01 false Social Security. 638.528 Section 638.528... TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.528 Social Security. The Act provides that students are covered by title II of the Social Security Act (42 U.S.C. 401 et seq.) and shall...

  16. Auditing Organizational Security

    DTIC Science & Technology

    2017-01-01

    Managing organizational security is no different from managing any other of the command’s missions. Establish your policies, goals and risk...parameters; implement, train, measure and benchmark them. And then audit, audit, audit. Today, more than ever, Organizational Security is an essential...not be regarded as independent or standing alone. Cybersecurity is an indispensable element of organizational security, which is the subject of

  17. 20 CFR 638.528 - Social Security.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Social Security. 638.528 Section 638.528... TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.528 Social Security. The Act provides that students are covered by title II of the Social Security Act (42 U.S.C. 401 et seq.) and shall...

  18. Introduction

    NASA Astrophysics Data System (ADS)

    Thoma, Klaus; Hiller, Daniel

    Security research as a practical discipline has a long-standing history. Faced with myriad hazards throughout its past, mankind has developed sophisticated means to counter such threats. The latter include natural disasters such as earthquakes, floods and fires, but also encompass man-made hazards such as military aggression, terrorist attacks or threats resulting from the malicious application of technological developments. Since the end of the Cold War major armed conflicts between nations of the Western hemisphere have become highly unlikely and genuinely different security issues have become the focus of concern. The terrorist attacks of 2001 against the United States, the train bombings of Madrid in 2004 and the bombings of London in 2005 were horrific embodiments of a new security environment that has evolved on a global scale. One could list numerous other examples of both executed attacks and successfully deterred attempts from around the world. Our modern industrial societies are interlinked with infrastructure networks, providing citizens with mobility, energy and information flows, which also open the door to a whole new dimension of vulnerabilities. Security research, once anything but a practical discipline with a capacity for reacting to short-term demands, has in the span of only a few years evolved into an entirely new scientific discipline uniting various fields of research. Today, security research (in Europe) encompasses a broad community of natural/engineering and social sciences.

  19. A Layered Trust Information Security Architecture

    PubMed Central

    de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Sandoval Orozco, Ana Lucila; Buiati, Fábio; Kim, Tai-Hoon

    2014-01-01

    Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed. PMID:25470490

  20. On the improvement of neural cryptography using erroneous transmitted information with error prediction.

    PubMed

    Allam, Ahmed M; Abbas, Hazem M

    2010-12-01

    Neural cryptography deals with the problem of "key exchange" between two neural networks using the mutual learning concept. The two networks exchange their outputs (in bits) and the key between the two communicating parties is eventually represented in the final learned weights, when the two networks are said to be synchronized. Security of neural synchronization is put at risk if an attacker is capable of synchronizing with any of the two parties during the training process. Therefore, diminishing the probability of such a threat improves the reliability of exchanging the output bits through a public channel. The synchronization with feedback algorithm is one of the existing algorithms that enhances the security of neural cryptography. This paper proposes three new algorithms to enhance the mutual learning process. They mainly depend on disrupting the attacker confidence in the exchanged outputs and input patterns during training. The first algorithm is called "Do not Trust My Partner" (DTMP), which relies on one party sending erroneous output bits, with the other party being capable of predicting and correcting this error. The second algorithm is called "Synchronization with Common Secret Feedback" (SCSFB), where inputs are kept partially secret and the attacker has to train its network on input patterns that are different from the training sets used by the communicating parties. The third algorithm is a hybrid technique combining the features of the DTMP and SCSFB. The proposed approaches are shown to outperform the synchronization with feedback algorithm in the time needed for the parties to synchronize.

  1. 10 CFR 95.35 - Access to matter classified as National Security Information and Restricted Data.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY CLEARANCE AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA Control of Information § 95.35 Access to matter classified as National Security Information and Restricted Data. (a... have access to matter revealing Secret or Confidential National Security Information or Restricted Data...

  2. Implementing an Information Security Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to covermore » information security best practices, planning for an information security management system, and implementing security controls for information security.« less

  3. The Use of BS7799 Information Security Standard to Construct Mechanisms for the Management of Medical Organization Information Security

    NASA Astrophysics Data System (ADS)

    Liu, Shu-Fan; Chueh, Hao-En; Liao, Kuo-Hsiung

    According to surveys, 80 % of security related events threatening information in medical organizations is due to improper management. Most research on information security has focused on information and security technology, such as network security and access control; rarely addressing issues at the management issues. The main purpose of this study is to construct a BS7799 based mechanism for the management of information with regard to security as it applies to medical organizations. This study analyzes and identifies the most common events related to information security in medical organizations and categorizes these events as high-risk, transferable-risk, and controlled-risk to facilitate the management of such risk.

  4. Security and health research databases: the stakeholders and questions to be addressed.

    PubMed

    Stewart, Sara

    2006-01-01

    Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.

  5. Interactive Programming Support for Secure Software Development

    ERIC Educational Resources Information Center

    Xie, Jing

    2012-01-01

    Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…

  6. Precision Strike Annual Programs Review

    DTIC Science & Technology

    2008-04-16

    SW For Precise Targeting 8 “Secure the High Ground” Evolution of Deployable HEL Weapons Capability THEL ACTD C5 Galaxy HEL TD C17 Globemaster Future...Security Ranger Training Maritime Ops CT Coastal SecurityERITREA African Union CA Wells, Schools MED / VETCAPs CA MED / VET Bilateral Military

  7. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program

    DTIC Science & Technology

    1988-11-01

    secure Zround environment and for providing local law enforcement support for airline and airport security measures. Finally, the passengers, the...operating environment for these air carriers. Airport security programs are designed to meet the threat to the specific airport. Of the 402 airports...assistance during this project. Responding to urgent requests from the Government of Liberia for onsite training of its airport security forces, FAA

  8. 12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Establishing Information Security Standards Table of Contents I. Introduction A. Scope B. Preservation of... Security Program B. Objectives III. Development and Implementation of Customer Information Security Program.... Introduction The Interagency Guidelines Establishing Information Security Standards (Guidelines) set forth...

  9. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0107] Homeland Security Information Network... Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network Advisory Committee (HSINAC) is necessary and in the...

  10. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0005] Homeland Security Information Network... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet... received by the (Homeland Security Information Network Advisory Committee), go to http://www.regulations...

  11. 78 FR 34665 - Homeland Security Information Network Advisory Committee (HSINAC); Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-10

    ... DEPARTMENT OF HOMELAND SECURITY [DHS-2013-0037] Homeland Security Information Network Advisory... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSINAC) will meet... posted beforehand at this link: http://www.dhs.gov/homeland-security-information-network-advisory...

  12. Telemedicine systems and telecommunications.

    PubMed

    Harnett, Brett

    2006-01-01

    Successful telemedicine requires appropriate equipment and some kind of telecommunications medium. However, successful telemedicine requires more than just technology. The three essential components are the personnel, the technology and a liberal measure of perseverance. Before the technology can be selected, it is necessary to consider the nature of the information to be transmitted between the sites and the time frame over which it must be sent to achieve the desired clinical goals, because this will determine the choice of equipment and the telecommunications network. Factors to be considered include the types of information to be transmitted, the quantity of information to be transferred, and security and privacy (e.g. in Europe and the USA there has been recent legislation about data security). The choice of transmission method for any telemedicine application is, in practice, a compromise between what one would like and what one can afford. In practice, various trade-offs have to be made, which include cost, availability of the service (i.e. the coverage), bandwidth, reliability and quality of service. Equipment and the telecommunications medium are a necessary, but not sufficient, pre-requisite for a successful telemedicine programme. The right people are also required and they must be properly trained.

  13. Assessment of the work environment of faculty of a Medical College in Pakistan.

    PubMed

    Saeed, Abid; Butt, Zahid Ahmad

    2014-01-01

    Extensive research is done on nursing work environments but less is known about the job conditions and environments of other health professionals. This study was aimed to fill this information gap by highlighting the factors affecting the work environment and stressors causing turnover of staff. A cross sectional study was conducted in Bolan Medical College Quetta for the assessment of working environment of the faculty from 22nd April to 22nd July 2012. All permanent teaching staff was included. A structured questionnaire was adopted fromI health sciences association of Alberta (HSSA), 2006 work Environment Survey. An observational check list for assessment of the physical environment /infrastructure and other general physical stuff was used. The faculty menibers were-not-satisfied with the security and safety of their work place but were satisfied with salaries, employer, and management. Work teams and relationship between employees and employers were respectful with good communication. Majority found their work times stressful and opportunities for on job trainings and professional development, adequate tools, equipment and conditions were mostly lacking. The overall working environment is not that good and few areas need serious attention like: professional development, trainings, adequate equipment, and security.

  14. Physics and Its Multiple Roles in the International Atomic Energy Agency

    NASA Astrophysics Data System (ADS)

    Massey, Charles D.

    2017-01-01

    The IAEA is the world's centre for cooperation in the nuclear field. It was set up as the world's ``Atoms for Peace'' organization in 1957 within the United Nations family. The Agency works with its Member States and multiple partners worldwide to promote the safe, secure and peaceful use of nuclear technologies. Three main areas of work underpin the IAEA's mission: Safety and Security, Science and Technology, and Safeguards and Verification. To carry out its mission, the Agency is authorized to encourage and assist research on, and development and practical application of, atomic energy for peaceful uses throughout the world; foster the exchange of scientific and technical information on peaceful uses of atomic energy; and encourage the exchange of training of scientists and experts in the field of peaceful uses of atomic energy. Nowadays, nuclear physics and nuclear technology are applied in a great variety of social areas, such as power production, medical diagnosis and therapies, environmental protection, security control, material tests, food processing, waste treatments, agriculture and artifacts analysis. This presentation will cover the role and practical application of physics at the IAEA, and, in particular, focus on the role physics has, and will play, in nuclear security.

  15. 32 CFR 2103.51 - Information Security Oversight Committee.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Information Security Oversight Committee. 2103... BE DECLASSIFIED Implementation and Review § 2103.51 Information Security Oversight Committee. The NCS Information Security Oversight Committee shall be chaired by the Staff Counsel of the National Security...

  16. 32 CFR 2103.51 - Information Security Oversight Committee.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Information Security Oversight Committee. 2103... BE DECLASSIFIED Implementation and Review § 2103.51 Information Security Oversight Committee. The NCS Information Security Oversight Committee shall be chaired by the Staff Counsel of the National Security...

  17. Research review of nongovernmental organizations' security policies for humanitarian programs in war, conflict, and postconflict environments.

    PubMed

    Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert

    2013-06-01

    To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.

  18. KSC-2013-4386

    NASA Image and Video Library

    2013-12-13

    CAPE CANAVERAL, Fla. – At a training location near Launch Complex 39 at NASA’s Kennedy Space Center in Florida, members of the Emergency Response Team, or ERT, participate in specialized training simulations in order to keep their skills current. They are wearing full protective gear and carrying non-lethal firearms, which are denoted in blue, for the training exercises. In the background, the ERT training supervisor, wearing a bright green vest, monitors the training exercise and reviews procedures. Recently, eight members of the ERT competed in the 31st Annual SWAT Roundup International competition in Orlando, Fla., and received recognition by placing in the top five overall. In keeping with NASA’s commitment to safety and security of workforce and assets, the ERT is part of Kennedy’s security team and is trained to respond in the event of an emergency at the center. Photo credit: NASA/Daniel Casper

  19. KSC-2013-4387

    NASA Image and Video Library

    2013-12-13

    CAPE CANAVERAL, Fla. – At a training location near Launch Complex 39 at NASA’s Kennedy Space Center in Florida, members of the Emergency Response Team, or ERT, participate in specialized training simulations in order to keep their skills current. They are wearing full protective gear and carrying non-lethal firearms, which are denoted in blue, for the training exercises. In the background, the ERT training supervisor, wearing a bright green vest, monitors the training exercise and reviews procedures. Recently, eight members of the ERT competed in the 31st Annual SWAT Roundup International competition in Orlando, Fla., and received recognition by placing in the top five overall. In keeping with NASA’s commitment to safety and security of workforce and assets, the ERT is part of Kennedy’s security team and is trained to respond in the event of an emergency at the center. Photo credit: NASA/Daniel Casper

  20. 46 CFR 109.213 - Emergency training and drills.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Emergency training and drills. 109.213 Section 109.213 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS OPERATIONS Tests, Drills, and Inspections § 109.213 Emergency training and drills. (a) Training materials...

  1. 46 CFR 109.213 - Emergency training and drills.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Emergency training and drills. 109.213 Section 109.213 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS OPERATIONS Tests, Drills, and Inspections § 109.213 Emergency training and drills. (a) Training materials...

  2. 46 CFR 109.213 - Emergency training and drills.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Emergency training and drills. 109.213 Section 109.213 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS OPERATIONS Tests, Drills, and Inspections § 109.213 Emergency training and drills. (a) Training materials...

  3. 46 CFR 109.213 - Emergency training and drills.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Emergency training and drills. 109.213 Section 109.213 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS OPERATIONS Tests, Drills, and Inspections § 109.213 Emergency training and drills. (a) Training materials...

  4. 46 CFR 109.213 - Emergency training and drills.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Emergency training and drills. 109.213 Section 109.213 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS OPERATIONS Tests, Drills, and Inspections § 109.213 Emergency training and drills. (a) Training materials...

  5. The Essentials of Safety and Security Management.

    ERIC Educational Resources Information Center

    Jones, Lance D.

    2003-01-01

    Presents a road map for colleges and universities to follow when establishing an in-house protective services department, focusing on: the leadership and command structure, screening and hiring of security officers, training of campus security personnel, documentation of officers' actions, policies and procedures (particularly regarding the use of…

  6. 33 CFR 104.220 - Company or vessel personnel with security duties.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... measures; (e) Crowd management and control techniques; (f) Security related communications; (g) Knowledge... duties must maintain a TWIC, and must have knowledge, through training or equivalent job experience, in the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition...

  7. 33 CFR 104.220 - Company or vessel personnel with security duties.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... measures; (e) Crowd management and control techniques; (f) Security related communications; (g) Knowledge... duties must maintain a TWIC, and must have knowledge, through training or equivalent job experience, in the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition...

  8. 33 CFR 104.220 - Company or vessel personnel with security duties.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... measures; (e) Crowd management and control techniques; (f) Security related communications; (g) Knowledge... duties must maintain a TWIC, and must have knowledge, through training or equivalent job experience, in the following, as appropriate: (a) Knowledge of current security threats and patterns; (b) Recognition...

  9. ENHANCING RESEARCH ETHICS REVIEW SYSTEMS IN EGYPT: THE FOCUS OF AN INTERNATIONAL TRAINING PROGRAM INFORMED BY AN ECOLOGICAL DEVELOPMENTAL APPROACH TO ENHANCING RESEARCH ETHICS CAPACITY

    PubMed Central

    Edwards, Hillary Anne; Hifnawy, Tamer; Silverman, Henry

    2014-01-01

    Recently, training programs in research ethics have been established to enhance individual and institutional capacity in research ethics in the developing world. However, commentators have expressed concern that the efforts of these training programs have placed “too great an emphasis on guidelines and research ethics review”, which will have limited effect on ensuring ethical conduct in research. What is needed instead is a culture of ethical conduct supported by national and institutional commitment to ethical practices that are reinforced by upstream enabling conditions (strong civil society, public accountability, and trust in basic transactional processes), which are in turn influenced by developmental conditions (basic freedoms of political freedoms, economic facilities, social opportunities, transparency guarantees, and protective security). Examining this more inclusive understanding of the determinants of ethical conduct enhances at once both an appreciation of the limitations of current efforts of training programs in research ethics and an understanding of what additional training elements are needed to enable trainees to facilitate national and institutional policy changes that enhance research practices. We apply this developmental model to a training program focused in Egypt to describe examples of such additional training activities. PMID:24894063

  10. Enhancing Research Ethics Review Systems in Egypt: The Focus of an International Training Program Informed by an Ecological Developmental Approach to Enhancing Research Ethics Capacity.

    PubMed

    Edwards, Hillary Anne; Hifnawy, Tamer; Silverman, Henry

    2015-12-01

    Recently, training programs in research ethics have been established to enhance individual and institutional capacity in research ethics in the developing world. However, commentators have expressed concern that the efforts of these training programs have placed 'too great an emphasis on guidelines and research ethics review', which will have limited effect on ensuring ethical conduct in research. What is needed instead is a culture of ethical conduct supported by national and institutional commitment to ethical practices that are reinforced by upstream enabling conditions (strong civil society, public accountability, and trust in basic transactional processes), which are in turn influenced by developmental conditions (basic freedoms of political freedoms, economic facilities, social opportunities, transparency guarantees, and protective security). Examining this more inclusive understanding of the determinants of ethical conduct enhances at once both an appreciation of the limitations of current efforts of training programs in research ethics and an understanding of what additional training elements are needed to enable trainees to facilitate national and institutional policy changes that enhance research practices. We apply this developmental model to a training program focused in Egypt to describe examples of such additional training activities. © 2014 John Wiley & Sons Ltd.

  11. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists.

    PubMed

    Kraemer, Sara; Carayon, Pascale

    2007-03-01

    This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.

  12. Security Shift in Future Network Architectures

    DTIC Science & Technology

    2010-11-01

    RTO-MP-IST-091 2 - 1 Security Shift in Future Network Architectures Tim Hartog, M.Sc Information Security Dept. TNO Information and...current practice military communication infrastructures are deployed as stand-alone networked information systems. Network -Enabled Capabilities (NEC) and...information architects and security specialists about the separation of network and information security, the consequences of this shift and our view

  13. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 4 2011-10-01 2011-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  14. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 4 2014-10-01 2014-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  15. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 4 2012-10-01 2012-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  16. 48 CFR 552.239-70 - Information Technology Security Plan and Security Authorization.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 4 2013-10-01 2013-10-01 false Information Technology... Text of Provisions and Clauses 552.239-70 Information Technology Security Plan and Security Authorization. As prescribed in 539.7002(a), insert the following provision: Information Technology Security...

  17. 75 FR 57904 - Announcing a Meeting of the Information Security and Privacy Advisory Board

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-23

    ... Office, --Update of NIST Computer Security Division, and --Information Security and Privacy Advisory... Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and Technology, Commerce. ACTION: Notice. SUMMARY: The Information Security and Privacy Advisory Board (ISPAB) will meet...

  18. The Effectiveness of Homeland Security Training for Rural Communities: A Comparative Analysis of Web-Based and Instructor-Led Training Delivery

    ERIC Educational Resources Information Center

    Baggett, Ryan K.

    2012-01-01

    The development of advanced training technologies such as Web Based Training (WBT), coupled with the proliferation of computer and Internet availability, has increased training opportunities for rural communities. This advancement is critical to meeting the training needs of emergency response personnel in rural communities who routinely face the…

  19. Interpreting international governance standards for health IT use within general medical practice.

    PubMed

    Mahncke, Rachel J; Williams, Patricia A H

    2014-01-01

    General practices in Australia recognise the importance of comprehensive protective security measures. Some elements of information security governance are incorporated into recommended standards, however the governance component of information security is still insufficiently addressed in practice. The International Organistion for Standardisation (ISO) released a new global standard in May 2013 entitled, ISO/IEC 27014:2013 Information technology - Security techniques - Governance of information security. This standard, applicable to organisations of all sizes, offers a framework against which to assess and implement the governance components of information security. The standard demonstrates the relationship between governance and the management of information security, provides strategic principles and processes, and forms the basis for establishing a positive information security culture. An analysis interpretation of this standard for use in Australian general practice was performed. This work is unique as such interpretation for the Australian healthcare environment has not been undertaken before. It demonstrates an application of the standard at a strategic level to inform existing development of an information security governance framework.

  20. KSC-04pd1653

    NASA Image and Video Library

    2004-08-05

    KENNEDY SPACE CENTER, FLA. - Dave Saleeba, assistant administrator with the Office of Security Management and Safeguards at NASA Headquarters, speaks to guests at the ribbon cutting for the Enhanced Firing Range on Schwartz Rd. at Kennedy Space Center. NASA’s Federal Law Enforcement Training Academy’s firing range has been upgraded to include a “rifle-grade” shoot house, a portable, tactical “shoot-back” trailer for cover and concealment drills, automated running targets and a new classroom facility. They are added to the existing three firearms ranges, “pistol-grade” shoot house, obstacle course and rappel tower. NASA’s Security Management and Safeguards Office funded the enhancements in order to improve ability to train the KSC security force and to support local, state and federal law enforcement agencies in Homeland Security.

  1. Information Security: Computer Hacker Information Available on the Internet

    DTIC Science & Technology

    1996-06-05

    INFORMATION SECURITY Computer Hacker Information Available on the Internet Statement for the Record of...Report Type N/A Dates Covered (from... to) - Title and Subtitle INFORMATION SECURITY Computer Hacker Information Available on the Internet Contract...1996 4. TITLE AND SUBTITLE Information Security: Computer Hacker Information Available on the Internet 5. FUNDING NUMBERS 6. AUTHOR(S) Jack L.

  2. Building a Practical Framework for Enterprise-Wide Security Management

    DTIC Science & Technology

    2004-04-28

    management. They have found that current efforts to manage security vulnerabilities and security risks only take an enterprise so far, with results...analyzed reports to determine the cause of the increase. Slide 5 © 2004 by Carnegie Mellon University Version 1.0 Secure IT 2004 - page 5 Attack...Nearly 1 in 5 of those surveyed reported that none of their IT staff have any formal security training. [A survey of 896 Computing Technology

  3. Sensory Augmentation for the Blind

    PubMed Central

    Kärcher, Silke M.; Fenzlaff, Sandra; Hartmann, Daniela; Nagel, Saskia K.; König, Peter

    2012-01-01

    Common navigational aids used by blind travelers during large-scale navigation divert attention away from important cues of the immediate environment (i.e., approaching vehicles). Sensory augmentation devices, relying on principles similar to those at work in sensory substitution, can potentially bypass the bottleneck of attention through sub-cognitive implementation of a set of rules coupling motor actions with sensory stimulation. We provide a late blind subject with a vibrotactile belt that continually signals the direction of magnetic north. The subject completed a set of behavioral tests before and after an extended training period. The tests were complemented by questionnaires and interviews. This newly supplied information improved performance on different time scales. In a pointing task we demonstrate an instant improvement of performance based on the signal provided by the device. Furthermore, the signal was helpful in relevant daily tasks, often complicated for the blind, such as keeping a direction over longer distances or taking shortcuts in familiar environments. A homing task with an additional attentional load demonstrated a significant improvement after training. The subject found the directional information highly expedient for the adjustment of his inner maps of familiar environments and describes an increase in his feeling of security when exploring unfamiliar environments with the belt. The results give evidence for a firm integration of the newly supplied signals into the behavior of this late blind subject with better navigational performance and more courageous behavior in unfamiliar environments. Most importantly, the complementary information provided by the belt lead to a positive emotional impact with enhanced feeling of security. The present experimental approach demonstrates the positive potential of sensory augmentation devices for the help of handicapped people. PMID:22403535

  4. A review of security of electronic health records.

    PubMed

    Win, Khin Than

    The objective of this study is to answer the research question, "Are current information security technologies adequate for electronic health records (EHRs)?" In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.

  5. 49 CFR 1548.19 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... CARRIER SECURITY § 1548.19 Security Directives and Information Circulars. (a) TSA may issue an Information... security measures are necessary to respond to a threat assessment, or to a specific threat against civil...

  6. 78 FR 11701 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-19

    ... agencies will also have to provide training to staff members using the Electronic Form 19b-4 Filing System... will spend approximately 20 hours training all staff members who will use EFFS to submit Security-Based... training new compliance staff members and updating the training of existing compliance staff members to use...

  7. Marine Corps Forces South

    Science.gov Websites

    Survival Training Course U.S. Marine Corps Capt. Joseph with Security Cooperation Training Team 18, U.S . Marine Corps Forces, South, supervises a water survival training course at Soto Cano Air Base, Honduras . The course consisted of five training days dedicated to strengthening swimmers' skill sets and

  8. 49 CFR 1552.21 - Scope and definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.21 Scope and definitions. (a) Scope. This subpart applies to flight schools that provide instruction under 49 U.S.C. Subtitle VII, Part A, in the operation of aircraft or aircraft simulators, and to...

  9. 49 CFR 1552.21 - Scope and definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.21 Scope and definitions. (a) Scope. This subpart applies to flight schools that provide instruction under 49 U.S.C. Subtitle VII, Part A, in the operation of aircraft or aircraft simulators, and to...

  10. 49 CFR 1552.21 - Scope and definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.21 Scope and definitions. (a) Scope. This subpart applies to flight schools that provide instruction under 49 U.S.C. Subtitle VII, Part A, in the operation of aircraft or aircraft simulators, and to...

  11. 49 CFR 1552.21 - Scope and definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.21 Scope and definitions. (a) Scope. This subpart applies to flight schools that provide instruction under 49 U.S.C. Subtitle VII, Part A, in the operation of aircraft or aircraft simulators, and to...

  12. 49 CFR 1552.21 - Scope and definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.21 Scope and definitions. (a) Scope. This subpart applies to flight schools that provide instruction under 49 U.S.C. Subtitle VII, Part A, in the operation of aircraft or aircraft simulators, and to...

  13. 33 CFR 106.220 - Security training for all other OCS facility personnel.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... procedures and contingency plans; (c) Recognition and detection of dangerous substances and devices; (d) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; and (e) Recognition of techniques used to circumvent security measures. (f) Familiarity with all relevant aspects of...

  14. 33 CFR 106.220 - Security training for all other OCS facility personnel.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... procedures and contingency plans; (c) Recognition and detection of dangerous substances and devices; (d) Recognition of characteristics and behavioral patterns of persons who are likely to threaten security; and (e) Recognition of techniques used to circumvent security measures. (f) Familiarity with all relevant aspects of...

  15. 48 CFR 3052.209-71 - Reserve Officer Training Corps and military recruiting on campus.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) CLAUSES AND FORMS... with the Department of Homeland Security; and (2) The Government will terminate this contract for... ineligible for contract award if the Secretary of Defense determines that the institution has a policy or...

  16. 48 CFR 3052.209-71 - Reserve Officer Training Corps and military recruiting on campus.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) CLAUSES AND FORMS... with the Department of Homeland Security; and (2) The Government will terminate this contract for... ineligible for contract award if the Secretary of Defense determines that the institution has a policy or...

  17. A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions

    ERIC Educational Resources Information Center

    Waddell, Stanie Adolphus

    2013-01-01

    Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…

  18. 48 CFR 1339.107-70 - Information security.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Information security. 1339... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... coordinate with the designated Contracting Officer Representative (COR) to complete the Information Security...

  19. 48 CFR 1339.107-70 - Information security.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Information security. 1339... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... coordinate with the designated Contracting Officer Representative (COR) to complete the Information Security...

  20. 49 CFR 8.9 - Information Security Review Committee.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 49 Transportation 1 2011-10-01 2011-10-01 false Information Security Review Committee. 8.9 Section.../DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.9 Information Security Review Committee. (a) There is hereby established a Department of Transportation Information Security Review Committee...

  1. 48 CFR 1339.107-70 - Information security.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... Clause 1352.239-73, Security Requirements for Information Technology Resources, is needed, contracting... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Information security. 1339...

  2. 49 CFR 8.9 - Information Security Review Committee.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false Information Security Review Committee. 8.9 Section.../DECLASSIFICATION/ACCESS Classification/Declassification of Information § 8.9 Information Security Review Committee. (a) There is hereby established a Department of Transportation Information Security Review Committee...

  3. 48 CFR 1339.107-70 - Information security.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Information security. 1339... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... coordinate with the designated Contracting Officer Representative (COR) to complete the Information Security...

  4. Defining Information Security.

    PubMed

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  5. Common object request broker architecture (CORBA)-based security services for the virtual radiology environment.

    PubMed

    Martinez, R; Cole, C; Rozenblit, J; Cook, J F; Chacko, A K

    2000-05-01

    The US Army Great Plains Regional Medical Command (GPRMC) has a requirement to conform to Department of Defense (DoD) and Army security policies for the Virtual Radiology Environment (VRE) Project. Within the DoD, security policy is defined as the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Security policy in the DoD is described by the Trusted Computer System Evaluation Criteria (TCSEC), Army Regulation (AR) 380-19, Defense Information Infrastructure Common Operating Environment (DII COE), Military Health Services System Automated Information Systems Security Policy Manual, and National Computer Security Center-TG-005, "Trusted Network Interpretation." These documents were used to develop a security policy that defines information protection requirements that are made with respect to those laws, rules, and practices that are required to protect the information stored and processed in the VRE Project. The goal of the security policy is to provide for a C2-level of information protection while also satisfying the functional needs of the GPRMC's user community. This report summarizes the security policy for the VRE and defines the CORBA security services that satisfy the policy. In the VRE, the information to be protected is embedded into three major information components: (1) Patient information consists of Digital Imaging and Communications in Medicine (DICOM)-formatted fields. The patient information resides in the digital imaging network picture archiving and communication system (DIN-PACS) networks in the database archive systems and includes (a) patient demographics; (b) patient images from x-ray, computed tomography (CT), magnetic resonance imaging (MRI), and ultrasound (US); and (c) prior patient images and related patient history. (2) Meta-Manager information to be protected consists of several data objects. This information is distributed to the Meta-Manager nodes and includes (a) radiologist schedules; (b) modality worklists; (c) routed case information; (d) DIN-PACS and Composite Health Care system (CHCS) messages, and Meta-Manager administrative and security information; and (e) patient case information. (3) Access control and communications security is required in the VRE to control who uses the VRE and Meta-Manager facilities and to secure the messages between VRE components. The CORBA Security Service Specification version 1.5 is designed to allow up to TCSEC's B2-level security for distributed objects. The CORBA Security Service Specification defines the functionality of several security features: identification and authentication, authorization and access control, security auditing, communication security, nonrepudiation, and security administration. This report describes the enhanced security features for the VRE and their implementation using commercial CORBA Security Service software products.

  6. KSC-2013-4388

    NASA Image and Video Library

    2013-12-13

    CAPE CANAVERAL, Fla. – At a training location near Launch Complex 39 at NASA’s Kennedy Space Center in Florida, members of the Emergency Response Team, or ERT, participate in specialized training simulations in order to keep their skills current. They are wearing full protective gear and carrying non-lethal firearms, which are denoted in blue, for the training exercises. Often, ERT leadership serves as simulated suspects to add realism to the training exercises. Recently, eight members of the ERT competed in the 31st Annual SWAT Roundup International competition in Orlando, Fla., and received recognition by placing in the top five overall. In keeping with NASA’s commitment to safety and security of workforce and assets, the ERT is part of Kennedy’s security team and is trained to respond in the event of an emergency at the center. Photo credit: NASA/Daniel Casper

  7. 6 CFR 27.200 - Information regarding security risk for a chemical facility.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Information regarding security risk for a chemical facility. 27.200 Section 27.200 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.200 Information...

  8. Return with Honor: Code of Conduct Training in the National Military Strategy Security Environment

    DTIC Science & Technology

    2004-09-01

    maximize the number of deaths and injuries among the most vulnerable civilians, such as children, women and the elderly… The terrorist leaders - who do...Return with Honor: Code of Conduct Training in the National Military Strategy Security Environment 6. AUTHOR(S) Major Laura M. Ryan 5. FUNDING NUMBERS ...7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER

  9. What Can History Teach Us A Comparative Historical Analysis On the Reserve Officer Training Corps and the Department of Homeland Security

    DTIC Science & Technology

    2015-12-01

    professional development aspirations. An organization that realized a very similar narrative as the DHS is the Department of Defense (DOD), more...is one that finds itself imbedded in several debates surrounding the development of formalized education/preparatory efforts for its core civilian... development of formalized education efforts for its workforce. There is formalized preparatory training for several different kinds of homeland security

  10. Security training symposium: Meeting the challenge: Firearms and explosives recognition and detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    1990-09-01

    These conference proceedings have been prepared in support of the US Nuclear Regulatory Commission's Security Training Symposium on Meeting the Challenge -- Firearms and Explosives Recognition and Detection,'' November 28 through 30, 1989, in Bethesda, Maryland. This document contains the edited transcripts of the guest speakers. It also contains some of the speakers' formal papers that were distributed and some of the slides that were shown at the symposium (Appendix A).

  11. USSOCOM Research Topics 2011

    DTIC Science & Technology

    2010-01-01

    Law and legal institutions G31. U.S. SOF training of foreign military/security forces “to enhance their capacity” in counterterrorism, COIN, and...engagement advice to SOF. G31. U.S. SOF training of foreign military/security forces “to enhance their capacity” in counterterrorism, COIN, and FID is a...AND SUBTITLE USSOCOM Research Topics 2011 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e

  12. Establishment of CDC Global Rapid Response Team to Ensure Global Health Security.

    PubMed

    Stehling-Ariza, Tasha; Lefevre, Adrienne; Calles, Dinorah; Djawe, Kpandja; Garfield, Richard; Gerber, Michael; Ghiselli, Margherita; Giese, Coralie; Greiner, Ashley L; Hoffman, Adela; Miller, Leigh Ann; Moorhouse, Lisa; Navarro-Colorado, Carlos; Walsh, James; Bugli, Dante; Shahpar, Cyrus

    2017-12-01

    The 2014-2016 Ebola virus disease epidemic in West Africa highlighted challenges faced by the global response to a large public health emergency. Consequently, the US Centers for Disease Control and Prevention established the Global Rapid Response Team (GRRT) to strengthen emergency response capacity to global health threats, thereby ensuring global health security. Dedicated GRRT staff can be rapidly mobilized for extended missions, improving partner coordination and the continuity of response operations. A large, agencywide roster of surge staff enables rapid mobilization of qualified responders with wide-ranging experience and expertise. Team members are offered emergency response training, technical training, foreign language training, and responder readiness support. Recent response missions illustrate the breadth of support the team provides. GRRT serves as a model for other countries and is committed to strengthening emergency response capacity to respond to outbreaks and emergencies worldwide, thereby enhancing global health security.

  13. One Health in food safety and security education: A curricular framework.

    PubMed

    Angelos, J; Arens, A; Johnson, H; Cadriel, J; Osburn, B

    2016-02-01

    The challenges of producing and distributing the food necessary to feed an anticipated 9 billion people in developed and developing societies by 2050 without destroying Earth's finite soil and water resources present extremely complex problems that lack simple solutions. The ability of modern societies to adequately address these and other food-related problems will require an educated workforce trained not only in traditional food safety, security, and public health, but also in other areas including food production, sustainable practices, and ecosystem health. To help address the need for such an educated workforce, a curricular framework was developed to assist those tasked with designing education and training for future food systems workers. One sentence summary: A curricular framework for education and training in food safety and security was developed that incorporates One Health concepts. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  14. International Cooperation for the Training of Water Managers from Developing Countries

    NASA Astrophysics Data System (ADS)

    Aswathanarayana, U.

    2007-12-01

    Water is the key to the well being of a community. On one hand, water security is linked to food security, as food cannot be grown without water. On the other hand, water security is linked to environmental security, as water is needed to maintain the health of a community. International cooperation is proposed for the training in Hyderabad, India, with international faculty, of ~ 300 water managers from the developing countries at an estimated cost of ~USD 3300/- per candidate (including ~ USD 1800/- for international travel), through ten interactive and customized training programmes during the period of five years, to enable them to address two crucial issues affecting the poor in the developing countries, namely, access to affordable water and coping with water scarcity. Ways of Good governance and geographical targeting of poverty alleviation programmes are built into each training programme. Each training programme will be for about three weeks (inclusive of field work). Each course will have a component common to all, plus a component customized to the biophysical and socioeconomic situation in a candidate's country. Ten course manuals will be produced. which can later be published commercially as low-cost volumes, for the benefit of the readership in the Developing countries . Each candidate will be provided his own computer, and software, and individual faculty adviser. On the basis of the training received, a candidate should be able to carry with him at the end of the course a draft outline of techno-socio-economic action plan for his country/area in respect of the theme of the course, prepared by himself/herself. A copy of this outline would be provided to the World Bank, and relevant organizations for follow- up activity

  15. Examining the Impact of Non-Technical Security Management Factors on Information Security Management in Health Informatics

    ERIC Educational Resources Information Center

    Imam, Abbas H.

    2013-01-01

    Complexity of information security has become a major issue for organizations due to incessant threats to information assets. Healthcare organizations are particularly concerned with security owing to the inherent vulnerability of sensitive information assets in health informatics. While the non-technical security management elements have been at…

  16. 14 CFR 1203.202 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.202 Responsibilities. (a) The Chairperson, NASA Information Security...) Ensuring effective compliance with and implementation of “the Order” and the Information Security Oversight...

  17. 14 CFR 1203.202 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.202 Responsibilities. (a) The Chairperson, NASA Information Security...) Ensuring effective compliance with and implementation of “the Order” and the Information Security Oversight...

  18. 77 FR 22835 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-17

    ... Description of Projects Approved for Collection and Use: Install primary crash network. Security enhancements--access control 1. Acquire computer based interactive training system. Security enhancements--access...

  19. The Rules of Engagement: Perspectives on Secure Messaging From Experienced Ambulatory Patient Portal Users

    PubMed Central

    Schnierle, Jeanette; Florian, Hannah; Agarwal, Aradhna; Rundell, Kristen; McAlearney, Ann Scheck

    2017-01-01

    Background Patient portals have shown promise in engaging individuals in self-management of chronic conditions by allowing patients to input and track health information and exchange secure electronic messages with their providers. Past studies have identified patient barriers to portal use including usability issues, low health literacy, and concerns about loss of personal contact as well as provider concerns such as increased time spent responding to messages. However, to date, studies of both patient and provider perspectives on portal use have focused on the pre-implementation or initial implementation phases and do not consider how these issues may change as patients and providers gain greater experience with portals. Objective Our study examined the following research question: Within primary care offices with high rates of patient-portal use, what do experienced physician and patient users of the ambulatory portal perceive as the benefits and challenges of portal use in general and secure messaging in particular? Methods This qualitative study involved 42 interviews with experienced physician and patient users of an ambulatory patient portal, Epic’s MyChart. Participants were recruited from the Department of Family Medicine at a large Academic Medical Center (AMC) and included providers and their patients, who had been diagnosed with at least one chronic condition. A total of 29 patients and 13 primary care physicians participated in the interviews. All interviews were conducted by telephone and followed a semistructured interview guide. Interviews were transcribed verbatim to permit rigorous qualitative analysis. Both inductive and deductive methods were used to code and analyze the data iteratively, paying particular attention to themes involving secure messaging. Results Experienced portal users discussed several emergent themes related to a need for greater clarity on when and how to use the secure messaging feature. Patient concerns included worry about imposing on their physician’s time, the lack of provider compensation for responding to secure messages, and uncertainty about when to use secure messaging to communicate with their providers. Similarly, providers articulated a lack of clarity as to the appropriate way to communicate via MyChart and suggested that additional training for both patients and providers might be important. Patient training could include orienting patients to the “rules of engagement” at portal sign-up, either in the office or through an online tutorial. Conclusions As secure messaging through patient portals is increasingly being used as a method of physician-patient communication, both patients and providers are looking for guidance on how to appropriately engage with each other using this tool. Patients worry about whether their use is appropriate, and providers are concerned about the content of messages, which allow them to effectively manage patient questions. Our findings suggest that additional training may help address the concerns of both patients and providers, by providing “rules of engagement” for communication via patient portals. PMID:28676467

  20. 12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Part 364—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and...

Top