Strategy to Enhance International Supply Chain Security
2007-07-01
as part of the effort to secure air passenger travel . The security assessment crew traveling by air, land or sea cannot be considered only a travel ...threats through its traveler screening and worker credentialing programs. The strategy to secure the supply chain reflects the larger security strategy of...living or traveling abroad. • Assisting U.S. businesses in the international marketplace. • Coordinating and providing support for international
2011-01-01
CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute, a federally funded...Marine Corps, the defense agencies, and the defense Intelligence Community. For more information on the International Security and Defense Policy
The International Criminal Court as a Component of U.S. National Security Strategy
2012-04-21
Security Strategy 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER LTC Jonathan R. Hirsch, U.S. Army...98) Prescribed by ANSI Std. Z39.18 USAWC CIVILIAN RESEARCH PROJECT THE INTERNATIONAL CRIMINAL COURT AS A COMPONENT OF U.S...Security Strategy FORMAT: Civilian Research Project DATE: 21 April 2012 WORD COUNT: 11,629 PAGES: 46 KEY TERMS: Lawfare, Contractor
Combating terrorism : linking threats to strategies and resources testimony
DOT National Transportation Integrated Search
2000-07-26
This is the statement of Norman J. Rabkin, Director, National Security Preparedness Issues, National Security and International Affairs division before the Subcommittee on National Security, Veterans Affairs, and International Relations, Committee on...
International Outreach and Coordination Strategy for the National Strategy for Maritime Security
2005-11-01
economic stability of the international community, all nations have a vital interest in ensuring that the maritime domain remains secure and open for the free and legitimate use of all. Public and private entities must work in concert to succeed. Accordingly, in order to enhance global maritime security, the Department of State will leverage its diplomatic resources and influence, while coordinating closely with other components of the US Government, to promote and enhance close cooperation among sovereign nations, international and regional organizations and the maritime
Strategy to Enhance International Supply Chain Security
2007-07-01
airports as part of the effort to secure air passenger travel . The security assessment crew traveling by air, land or sea cannot be considered only a... travel security issue. The assessment of a container ship’s crew or of a driver moving a truck into the secure area of a port are also supply chain...threats through its traveler screening and worker credentialing programs. The strategy to secure the supply chain reflects the larger security
Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy
2011-05-15
attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks
Maritime security report. October 1998 [U.S. international crime control strategy
DOT National Transportation Integrated Search
1998-10-01
To coordinate all relevant Federal agencies, the International Crime Control Strategy (ICCS) was developed. The ICCS is intended to provide a framework for integrating all facets for the Federal response to the direct and immediate threat internation...
Bourdeaux, Margaret; Kerry, Vanessa; Haggenmiller, Christian; Nickel, Karlheinz
2015-01-01
Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. Using case studies we published on international security forces' impacts on health systems in Haiti, Kosovo, Afghanistan and Libya, we conducted a comparative analysis that examined three questions: What aspects, or building blocks, of health systems did security forces impact across the cases and what was the nature of these impacts? What forums or mechanisms did international security forces use to interact with health system actors? What policies facilitated or hindered security forces from supporting health systems? We found international security forces impacted health system governance, information systems and indigenous health delivery organizations. Positive impacts included bolstering the authority, transparency and capability of health system leadership. Negative impacts included undermining the impartial nature of indigenous health institutions by using health projects to achieve security objectives. Interactions between security and health actors were primarily ad hoc, often to the detriment of health system support efforts. When international security forces were engaged in health system support activities, the most helpful communication and consultative mechanisms to manage their involvement were ones that could address a wide array of problems, were nimble enough to accommodate rapidly changing circumstances, leveraged the power of personal relationships, and were able to address the tensions that arose between security and health system supporting strategies. Policy barriers to international security organizations participating in health system support included lack of mandate, conflicts between security strategies and health system preservation, and lack of interoperability between security and indigenous health organizations with respect to logistics and sharing information. The cases demonstrate both the opportunities and risks of international security organizations involvement in health sector protection, recovery and reconstruction. We discuss two potential approaches to engaging these organizations in health system support that may increase the chances of realizing these opportunities while mitigating risks.
The Climate Change Strategy Gap: Crafting a Strategic Framework for the Department of Defense
2016-03-24
Climate Change Effects: Issues for International and US National Security (Alexandria, VA: The Institute for Defense Analyses, 2009), 3. 3 in...Security Needs Assessment, (New York: United Nations, 2012), 7. 50 Christine Youngblut, Climate Change Effects: Issues for International and US National...Master’s Thesis 3. DATES COVERED (From - To) 10-01-2015 - 03-19-2016 4. TITLE AND SUBTITLE The Climate Change Strategy Gap: Crafting a Strategic 5a
The Climate Change Strategy Gap: Crafting a Strategic Framework for the Department of Defense
2016-03-23
Climate Change Effects: Issues for International and US National Security (Alexandria, VA: The Institute for Defense Analyses, 2009), 3. 3 in...Security Needs Assessment, (New York: United Nations, 2012), 7. 50 Christine Youngblut, Climate Change Effects: Issues for International and US National...Master’s Thesis 3. DATES COVERED (From - To) 10-01-2015 - 03-19-2016 4. TITLE AND SUBTITLE The Climate Change Strategy Gap: Crafting a Strategic 5a
International Nuclear Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Doyle, James E.
2012-08-14
This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; andmore » (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.« less
Strategy for Peace. Annual U.S. Foreign Policy Conference (22nd, October 16-18, 1981).
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
Five discussion topics concerning peace were dealt with by conference participants, who included university faculty and officials from national and international agencies and organizations. The first topic, North-South relations and international security, considers U.S. security and the Third World, U.S. economic interests in the developing…
India’s Evolving Nuclear Force and Its Implications for U.S. Strategy in the Asia-Pacific
2016-06-01
concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic
A National Security Strategy for Sweden: Balancing Risks and Opportunities in the 21st Century
2010-04-01
Command and Staff College. International Security Studies: AY10 Coursebook . Montgomery, 2009. Air Command and Staff College. War Studies Course: AY10... Coursebook . Montgomery, 2009. Assadourian, Eric (Project Director at the World Watch Institute). Vital Signs 2007-2008; The Trends that are Shaping Our...Air Command and Staff College International Security Studies: AY10 Coursebook . Montgomery, 2009. Edgar, Johan, Linda Hjerten, Mira Micic and Eric
ERIC Educational Resources Information Center
Davies, Patrick T.; Forman, Evan M.; Rasi, Jennifer A.; Stevens, Kristopher I.
2002-01-01
Evaluated new self-report measure assessing children's strategies for preserving emotional security in context of interparental conflict. Factor analyses of the Security in the Interparental Subsystem (SIS) Scale supported a 7-factor solution. The SIS demonstrated satisfactory internal consistency and test-retest reliability. Support for test…
Beyond Conflict and Kinetics: Airpower Strategy for Human Security Operations
2014-08-26
America to a leadership role of the international community while dramatically altering its security environment. After World War II, American security...health, environmental, personal, community , and political security. At the same time it stopped short of providing a finite definition, instead...seven areas of human security are economic, food, health, environmental, personal, community and political security. These components are a “universal
Caribbean and Eastern Pacific Maritime Security: Regional Cooperation in Bridge and Insular States
The international cocaine market has transformed the Caribbean Basin into the most violent region in the world. Against the onslaught of drugs and... violence , interstate security cooperation and intelligence sharing are increasingly prominent features of state security strategies. The evolution of
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-12
... traders additional opportunities and strategies to hedge high priced securities. Currently, Exchange Rule... example if Apple, Inc. (``AAPL'') would trade at $310 \\6\\ with approximately two months remaining until...
ERIC Educational Resources Information Center
Johnson, Kenneth T.
2017-01-01
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
STATUS AND FUTURE POSSIBILITIES OF DOMESTIC FLIGHTS BY FOREIGN AIRLINES
NASA Astrophysics Data System (ADS)
Hibino, Naohiko; Kobayashi, Yuki; Morichi, Shigeru
As a regional strategy, it is very important for local cities that international flights are put into service to local airports and to increase tourists. It is problemati c for the airlines that their international flights are put into service directly between the local airport and the international airport since it is difficult for them to secure the number of passengers needed to operate the aircraft. Co ncerning 1-stop flights, there is a good possibility of securing number of passengers. Therefore, the study illustrated the possibilities of domestic airline flights by foreign airlines as international flights.
International Engagement Strategy
2017-06-14
agreements and issue legal guidance on international law and intellectual property issues. ICPO will play an important role in realizing this vision and...through international cooperation under the auspices of its formal international agreements with partner states and the European Commission, as well...International Engagement Opportunities for Homeland Security Research 11 S&T maintains formal bilateral agreements that provide a framework for cooperative
Conflict in Context: Understanding Local to Global Security.
ERIC Educational Resources Information Center
Mertz, Gayle; Lieber, Carol Miller
This multidisciplinary guide provides middle and high school teachers and students with inquiry-based tools to support their exploration of emerging local, national, international, and transboundary security issues. Students are introduced to critical thinking, problem solving, and peacemaking strategies that will help them better understand…
Brock, Rebecca L.; Kochanska, Grazyna
2015-01-01
Although the negative impact of marital conflict on children has been amply documented, few studies have examined the process of risk in a long-term, longitudinal design. We examined parent–child attachment security as a mechanism that may account for the impact of interparental conflict on children’s long-term risk of internalizing problems. Sixty-two community mothers, fathers, and children were followed from ages 2 to 10. Parents reported on their conflicts when their children were 2. Trained observers produced parent–child attachment security scores (Attachment Q-Set, Waters, 1987), based on lengthy naturalistic observations of the child with each parent. Parents rated children’s internalizing problems at age 10. A conditional process model and bootstrap approach were implemented to examine conditional indirect effects of conflict on child internalizing problems through attachment security for girls versus boys. Maladaptive marital conflict (destructive strategies, severity of arguments) increased internalizing problems 8 years later due to the undermined security for girls, whereas negative emotional aftermath of conflict (unresolved, lingering tension) increased internalizing problems for both boys and girls. The emotional aftermath of conflict is often overlooked, yet it appears to be a key dimension influencing emotional security in the family system, with significant consequences for children’s development. PMID:25797703
Brock, Rebecca L; Kochanska, Grazyna
2016-02-01
Although the negative impact of marital conflict on children has been amply documented, few studies have examined the process of risk in a long-term, longitudinal design. We examined parent-child attachment security as a mechanism that may account for the impact of interparental conflict on children's long-term risk of internalizing problems. Sixty-two community mothers, fathers, and children were followed from ages 2 to 10. Parents reported on their conflicts when their children were 2. Trained observers produced parent-child attachment security scores (Attachment Q-Set, Waters, 1987), based on lengthy naturalistic observations of the child with each parent. Parents rated children's internalizing problems at age 10. A conditional process model and bootstrap approach were implemented to examine conditional indirect effects of conflict on child internalizing problems through attachment security for girls versus boys. Maladaptive marital conflict (destructive strategies, severity of arguments) increased internalizing problems 8 years later due to the undermined security for girls, whereas negative emotional aftermath of conflict (unresolved, lingering tension) increased internalizing problems for both boys and girls. The emotional aftermath of conflict is often overlooked, yet it appears to be a key dimension influencing emotional security in the family system, with significant consequences for children's development.
[The comparative evaluation of level of security culture in medical organizations].
Roitberg, G E; Kondratova, N V; Galanina, E V
2016-01-01
The study was carried out on the basis of clinic “Medicine” in 2014-2015 concerning security culture. The sampling included 465 filled HSPSC questionnaires. The comparative analysis of received was implemented. The “Zubovskaia district hospital” Having no accreditation according security standards and group of clinics from USA functioning for many years in the system of patient security support were selected as objects for comparison. The evaluation was implemented concerning dynamics of security culture in organization at implementation of strategies of security of patients during 5 years and comparison of obtained results with USA clinics was made. The study results demonstrated that in conditions of absence of implemented standards of security in medical organization total evaluation of security remains extremely low. The study of security culture using HSPSC questionnaire is an effective tool for evaluating implementation of various strategies of security ofpatient. The functioning in the system of international standards of quality, primarily JCI standards, permits during several years to achieve high indices of security culture.
International Law and Military Operations
2008-01-01
Operations Concept, which addresses the operational principles that will be used by the services; 12 and the US Coast Guard Strategy for Maritime Safety ...Maslow’s hierarchy of human needs, the need fo r security is exceeded only by basic needs, e.g., food . 60 Professor Colin Gray asserts that "order is the...certainly for the Coast Guard and other interagency players with maritime safety and security missions. The new strategy must also acknowledge that
The East Mediterranean Triangle at Crossroads
2016-03-01
concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic
2011-05-01
Homeland Security (DHS) and the Department of State (DOS), and by changing the IC’s CPRC representative from the Director of Central Intelli- gence to the...Security Strategy of the United States of America (May 2010), p. 4. 2 Nuclear Posture Review Report (April 6, 2010), p. i 3 National Strategy for...ongoing efforts with GICNT, the Nuclear Forensics International Technical Working Group (ITWG), Forensics En - gagement Working Group (FEWG), NATO
ERIC Educational Resources Information Center
Glenn, E. S.; And Others
1977-01-01
Offers an alternative methodology for studying persuasive strategies by examining the persuasive strategies selected by professional persuaders representing those cultures being studied. Analyzes the persuasive styles of United States, Soviet Union and Arab diplomats involved in international negotiations in the Security Council of the United…
Mastering the Gray Zone: Understanding a Changing Era of Conflict
2015-12-01
debate concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...an international audience, and honor soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the...U.S. Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on
Preparing for War Moscow Facing an Arc of Crisis
2016-12-01
concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic
Maintaining the Status Quo in the Taiwan Strait
2013-03-01
of National Security and Strategy 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) U.S. Army...Count: 5,308 14. ABSTRACT In order to ensure vital U.S. interests concerning security and economic freedom in the region, the status quo in the...international/regional support of Taiwan, Taiwanese military deterrence backed by strategically ambiguous U.S. assurances of security , intertwined
2015-12-01
concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic
2016-12-01
as a Fulbright Scholar at Durham University’s Institute of Advanced Study . Dr. Manjikian’s publications in- clude Apocalypse and Post -Politics: The...concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S
Organizational Culture for Safety, Security, and Safeguards in New Nuclear Power Countries
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kovacic, Donald N
2015-01-01
This chapter will contain the following sections: Existing international norms and standards for developing the infrastructure to support new nuclear power programs The role of organizational culture and how it supports the safe, secure, and peaceful application of nuclear power Identifying effective and efficient strategies for implementing safety, security and safeguards in nuclear operations Challenges identified in the implementation of safety, security and safeguards Potential areas for future collaboration between countries in order to support nonproliferation culture
Components of a Course on National Security Policy.
ERIC Educational Resources Information Center
Quester, George H.
1987-01-01
Describes the components of a course on the formation of national security policy. Includes information on the amount of emphasis and instructional approach to take with each component of the course. Components include the nature of strategy, the role of war in international politics, disarmament and arms control, nuclear weapons and nuclear war,…
Taking The Guesswork Out of Strategy
2011-06-18
Intensity Conflict & Law Enforcement, Vol. 9, No.2 (Summer 2000): 63-69. 5 professionals avoid focusing on irrelevant or false strategy drivers and...to engage Africa on the security front is paramount to keeping America safe. Prosperity is another driver for strategy with Africa. Globalization...this front. Last, international order is yet another key driver to why strategy is important. The HIV/AIDS epidemic in Africa extends beyond its
Research and Development Strategy for the 1990s, 1990 Summer Study. Volume 1 Executive Summary
1990-10-01
Technology Security Administration ( DTSA ), but recently, JCS has been given a significant role. Also the Services play a significant role, especially...international arena: the Defense Security Assistance Agency (DSAA), dealing with foreign military sales; the Defense Technology Security Administration ( DTSA ...in these organizations. DSAA and DTSA report indirectly to the USD(P) and DUSD(P) reports to USD(A). The DDR&E, also reporting to USD(A), is
Updating energy security and environmental policy: Energy security theories revisited.
Proskuryakova, L
2018-06-18
The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.
2008-06-01
183 14. Ethical Issues in War: An Overview Martin L. Cook...185 15. Ethics and War in Comparative Religious Perspective...be guided by values and ethics with the intent of doing some type of good for parts of the international system, or the overall system in general
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-15
... to use their existing quotation systems to enter quotes for complex order strategies rather than... posted on the complex order book are not firm, nor included in the national market system. The Exchange... Complex Orders July 11, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the...
360 PORT MDA - A Strategy to Improve Port Security
2006-09-01
Participating Agencies (After: Executive Briefing..........................27 Table 6. Designated Joint Operations Center Participants (From: SAFE...Investigations CGIP Coast Guard Intelligence Program CHOC Charleston Harbor Operations Center CIO Command Intelligence Officer CMT Combating Maritime... EXECUTIVE SUMMARY Ports are critical to our economy and national security. Key hubs in the international trade network, U.S. ports accounted for more than
International Drug Trafficking--a Growing National Security Concern for Low Intensity Conflict
1990-03-01
nations were economically undermined by trade barriers against their exports to the U.S., e.g., coffee and sugar, which further degraded their financial...applied. A second focus of our strategy must be to discourage still minor cannabis producers in Central and South 76 International Initiatives America
Koblentz, Gregory D
2012-01-01
The Seventh Review Conference of the Biological Weapons Convention (BWC), the first international treaty to outlaw an entire class of weapons, was held in Geneva in December 2011. On 7 December, Secretary of State Hillary Clinton became the highest-ranking US government official to address a BWC meeting. Secretary Clinton told the assembled delegation that ‘we view the risk of bioweapons attack as both a serious national security challenge and a foreign policy priority’. At the same time, she warned that a large-scale disease outbreak ‘could cripple an already fragile global economy’. Secretary Clinton's speech reflected a new understanding that the range of biological threats to international security has expanded from state-sponsored biological warfare programmes to include biological terrorism, dual-use research and naturally occurring infectious diseases such as pandemics. Recognizing these changes, President Barack Obama released a new national strategy for countering biological threats in 2009. This strategy represents a shift in thinking away from the George W. Bush administration's focus on biodefence, which emphasized preparing for and responding to biological weapon attacks, to the concept of biosecurity, which includes measures to prevent, prepare for and respond to naturally occurring and man-made biological threats. The Obama administration's biosecurity strategy seeks to reduce the global risk of naturally occurring and deliberate disease outbreaks through prevention, international cooperation, and maximizing synergies between health and security. The biosecurity strategy is closely aligned with the Obama administration's broader approach to foreign policy, which emphasizes the pragmatic use of smart power, multilateralism and engagement to further the national interest. This article describes the Obama administration's biosecurity strategy; highlights elements of continuity and change from the policies of the Bush administration; discusses how it fits into Obama's broader foreign policy agenda; and analyses critical issues that will have to be addressed in order to implement the strategy successfully.
International Cooperation in Acquisition, Technology and Logistics (IC in AT&L) Handbook
2012-05-01
Information exchanges, for instance, may lead to a cooperative RD&A project . Figure 1-1 illustrates this “ building block” concept of international...support the National Security Strategy, including the need to strengthen alliances and build partnerships. CWP projects are selected for their... projects : prime contractor (with international teaming of subcontractors), consortium and joint venture. The selection of the best industrial
Aginam, Obijiofor
2006-12-01
The transnational spread of communicable and non-communicable diseases has opened new vistas in the discourse of global health security. Emerging and re-emerging pathogens, according to exponents of globalization of public health, disrespect the geo-political boundaries of nation-states. Despite the global ramifications of health insecurity in a globalizing world, contemporary international law still operates as a classic inter-state law within an international system exclusively founded on a coalition of nation-states. This article argues that the dynamic process of globalization has created an opportunity for the World Health Organization to develop effective synergy with a multiplicity of actors in the exercise of its legal powers. WHO's legal and regulatory strategies must transform from traditional international legal approaches to disease governance to a "post-Westphalian public health governance": the use of formal and informal sources from state and non-state actors, hard law (treaties and regulations) and soft law (recommendations and travel advisories) in global health governance. This article assesses the potential promise and problems of WHO's new International Health Regulations (IHR) as a regulatory strategy for global health governance and global health security.
National Economic Competitiveness and Innovation Strategy Act of 2010
Rep. Holt, Rush [D-NJ-12
2010-04-26
House - 07/26/2010 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
International Education in the Schools: The State of the Field
ERIC Educational Resources Information Center
Kagan, Sharon Lynn; Stewart, Vivien
2004-01-01
The improvement of international education in U.S. schools cries out for strong national leadership. The authors, guest editors of this special section, make the case that helping students become globally competent citizens is crucial to the future prosperity and security of the United States, and they discuss strategies for making this happen.…
The enhancement of security in healthcare information systems.
Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De
2012-06-01
With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the "Internet". For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.
2009-01-01
Cattle raiding and the effects of poaching would likely intensify as well. Fisheries may be adversely impacted due to climatic effects on coral...organized crime to set roots in southern Africa during the early 1990s. Chinese gangs have since diversified into trafficking of poached rhino horn...charged with poaching rhino horn for shipment to China.90 Intelligence sources developed by Botswana security personnel for anti- poaching purposes
Bullets, Bombs, and Bystanders: The Strategic Implications of Collateral Damage in Afghanistan
2010-05-15
military as an organization that it must adopt a strategy which focuses less on kinetic operations and more on social and political solutions. One of the...unknown.4 These three competing accounts spurred international media coverage and focused attention on the US and International Security Assistance...of collateral damage throughout the entire conflict. It is a topic of extreme interest for the host nation, its population, international media
Strategic Studies Quarterly (SSQ). Volume 11, Number 1. Spring 2017
2017-04-01
tour of the strategic horizon, noting the characteristics, proponents, and critics of each approach. The debate over grand strategy is a post –Cold...Winter 1996 issue of International Security.5 There, the authors sug- gested four rival grand strategies that might guide American post –Cold War...primacy the adopted grand strategy of the US government during the post –Cold War period? To some degree it was, although not to the extent that its
Wouters, P K
2004-01-01
The beneficial use of the world's transboundary waters raises difficult issues for drainage basin security on most parts of the globe. International law provides that each transboundary watercourse State is entitled to, and obliged to ensure, an "equitable and reasonable use" of these shared waters. The IWLRI developed and tested a Legal Assessment Model (LAM) through the work of interdisciplinary teams working in three different transboundary situations--China (upstream), Mozambique (downstream) and Palestine (shared groundwater). The LAM provides a tool for transboundary watercourse States to use in the preparation of their national water strategy for use at the national and international levels. The model should now be tested at the basin level, with a view to assisting to accomplish the peaceful and rational use of transboundary waters in line with the governing rule of international law and thereby to facilitate the overall policy objective of drainage basin security.
2018-01-02
become an economic superpower, and is a signatory to a number of International conventions regarding free trade. It is a valuable member of...Chinese people; the economic and military considerations of the rest of the international community are secondary at best. This paper assumes that the goal...SUBJECT TERMS China, Beijing, Grand Strategy, Economics , Globalization, Military Education, Allies 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a
The Private Military Industry: Economic Analysis, Uses & Considerations
2007-03-01
Intelligence US (cont.) Flour International SAIC Pacific Architects and Engineers Ibis Tek MVM Ibis Tek Samson Int’l Parsons ICI, Oregon New...Vinnell Meyer and Associates Prasons Parsons Worldwide Security MVM Protective Operation Corporate Training Raytheon New Bridge Strategies
Department of Defense International Space Cooperation Strategy
2017-01-01
Secretary of Defense on .January 18. 2017. the unclassified version provides DoD’s approach for invigorating cooperation and collaboration with trusted ...Cooperation Strategy (ISCS) establishes DoD’ s approach for invigorating cooperation and collaboration with trusted allies and partners across the...collaborating with trusted allies and partners to address shared security challenges by leveraging allies’ and partners ’ capabilities to enhance space mission
Global health interdependence and the international physicians' movement.
Gellert, G A
1990-08-01
International Physicians for the Prevention of Nuclear War has had an impressive public impact in the 1980s, helping to shatter the myths of surviving and medically responding to a nuclear attack. The 1990s present a new challenge for the medical community in a different social and international context characterized by increasing global interdependence. Another view of physician activism is presented to complement advocacy for nuclear disarmament in the promotion of peace. A framework for analysis is provided by "fateful visions"--accepted policy views of prospective superpower relations--drawn from practitioners of foreign policy, international relations, and security affairs. A perceptual gap may exist between physicians who wish to address underlying ethical and public health concerns on security issues and policy practitioners who are accustomed to discussion within existing policy frames of reference that can be pragmatically used. A strategy is proposed for physicians to use their specialized training and skills to evaluate trends in global health interdependence. The international physicians' movement may contribute substantively to the formulation of policy by expanding and interpreting an increasingly complex database on interdependence, and by creating a dialogue with policy formulators based on mutual recognition of the value and legitimacy of each professions' expertise and complementary contributions to international security policy.
Public Health in Serbia through the Lens of Security: A Review Article
ROKVIĆ, Vanja; JEFTIĆ, Zoran; AJZENHAMER, Vladimir
2016-01-01
Background: In recent years, the concept of health security has received an international dimension. However, despite evident links between health and security the concept of health security is not used in either academic or political discourse in Serbia. It comes as no surprise then that even though the issue of security challenges is present in Serbian legislation, it has not been incorporated into the National Security Strategy, by which health threats would be recognized as one of contemporary security priorities. Methods: The method applied is descriptive and analytical, in keeping with social studies research methodology and the aims of this study. Results: The 20th and the 21st century in Serbia have both been marked by events indicating a clear link between health and security. The most telling example of this connection is the events of the 1990s, namely civil wars, sanctions and the NATO bombing. The results of our research show that poor health conditions, an increasing number of reemerging diseases and pandemics of new diseases can have serious implications for the functioning of the state and devastating consequences for its population. What is most at risk are people’s lives, capability for work, the entire economy and the capacities of the army and overall national security. Conclusion: The results of this study indicate an inextricable link between health and security and the necessity of viewing health through the lens of health security and incorporating it as such into the National Security Strategy. PMID:27957458
Public Health in Serbia through the Lens of Security: A Review Article.
Rokvić, Vanja; Jeftić, Zoran; Ajzenhamer, Vladimir
2016-09-01
In recent years, the concept of health security has received an international dimension. However, despite evident links between health and security the concept of health security is not used in either academic or political discourse in Serbia. It comes as no surprise then that even though the issue of security challenges is present in Serbian legislation, it has not been incorporated into the National Security Strategy, by which health threats would be recognized as one of contemporary security priorities. The method applied is descriptive and analytical, in keeping with social studies research methodology and the aims of this study. The 20 th and the 21 st century in Serbia have both been marked by events indicating a clear link between health and security. The most telling example of this connection is the events of the 1990s, namely civil wars, sanctions and the NATO bombing. The results of our research show that poor health conditions, an increasing number of reemerging diseases and pandemics of new diseases can have serious implications for the functioning of the state and devastating consequences for its population. What is most at risk are people's lives, capability for work, the entire economy and the capacities of the army and overall national security. The results of this study indicate an inextricable link between health and security and the necessity of viewing health through the lens of health security and incorporating it as such into the National Security Strategy.
The Risks that Foreign Labor Poses to UAE National Security
2012-06-08
48“The Political Effects of Foreign Immigration” (A Seminar discussing Foreign Labour in the GCC, Arab Union Studies Centre August 2004), 485...through a development strategy based on comprehensive scientific planning and benefit from specialized international expertise. Achieving happiness
Borton, J
1996-12-01
This paper examines the co-ordination strategies developed to respond to the Great Lakes crisis following the events of April 1994. It analyses the different functions and mechanisms which sought to achieve a co-ordinated response--ranging from facilitation at one extreme to management and direction at the other. The different regimes developed to facilitate co-ordination within Rwanda and neighbouring countries, focusing on both inter-agency and inter-country co-ordination issues, are then analysed. Finally, the paper highlights the absence of mechanisms to achieve coherence between the humanitarian, political and security domains. It concludes that effective co-ordination is critical not only to achieve programme efficiency, but to ensure that the appropriate instruments and strategies to respond to complex political emergencies are in place. It proposes a radical re-shaping of international humanitarian, political and security institutions, particularly the United Nations, to improve the effectiveness of humanitarian and political responses to crises such as that in the Great Lakes.
Nuclear Coexistence: Rethinking U.S. Policy to Promote Stability in an Era of Proliferation
1994-04-01
The Spread of Nuclear Weapons 1989 -90 (Boulder: Westview Press, 1990). 22. See William C. Martel and Steven E. Miller, "Controlling Borders and Nuclear...Security, Fall 1989 , Vol. 14, No. 2, pp. 140-41, for J. Robert Oppenheimer’s concerns about the dangers of the develop- ment of thermonuclear weapons. 4...Paradox of Technology," International Security, Vol. 14, No. 2 (Fall 1989 ), pp. 198-202. 6. Some argue that the U.S. strategy has relatively little
NASA Astrophysics Data System (ADS)
Papa, Mauricio; Shenoi, Sujeet
The information infrastructure -- comprising computers, embedded devices, networks and software systems -- is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: - Themes and Issues - Infrastructure Security - Control Systems Security - Security Strategies - Infrastructure Interdependencies - Infrastructure Modeling and Simulation This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.
Nuclear security policy in the context of counter-terrorism in Cambodia
NASA Astrophysics Data System (ADS)
Khun, Vuthy; Wongsawaeng, Doonyapong
2016-01-01
The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the context of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.
Building Alternative-Energy Partnerships with Latin America
2007-03-30
both its National Energy Strategy and Foreign Policy. Endnotes 1 COL John Amidon, "Needed Now: A National Energy Security Manhattan Project ," Air... Manhattan Project ," Briefing to Headquarters U.S. Air Force, 21 March 2006. 30 U.S. Energy Information Agency, "International Petroleum Monthly
Reforestation strategies amid social instability: lessons from Afghanistan.
Groninger, John W
2012-04-01
Foreign and domestic government agencies and other international organizations pursue reforestation programs in rural upper watershed areas of Afghanistan over the past decade to alleviate poverty, combat the insurgency and rehabilitate a depleted forest resource base. Popular programs incorporate cash-for-work to conduct hillside terracing, check dam construction and tree-planting for nut production, fuel wood, timber, dune stabilization, and erosion abatement. Programmatic approaches have varied as a function of accessibility, security and local objectives. Uncertain land tenure and use rights, weak local environmental management capacity, and a focus on agricultural production to meet immediate needs limit interest, nationally and locally. Unreliable security, a lack of high quality tree planting stock, limited technical knowledge and coordination among government agencies, and poor security hamper program expansion. Reforestation success would be most likely where these issues are least acute. The Afghan government should focus on supporting community based natural resource management, developing and disseminating improved conservation tree nursery strategies, and promoting watershed management schemes that incorporate forestry, range management and agronomic production. Reforestation practitioners could benefit from the human and material resources now present as part of the international war effort. Successes and failures encountered in Afghanistan should be considered in order to address similar problems in insecure regions elsewhere when reforestation may help reverse environmental degradation and contribute to broader social stabilization efforts.
Reforestation Strategies Amid Social Instability: Lessons from Afghanistan
NASA Astrophysics Data System (ADS)
Groninger, John W.
2012-04-01
Foreign and domestic government agencies and other international organizations pursue reforestation programs in rural upper watershed areas of Afghanistan over the past decade to alleviate poverty, combat the insurgency and rehabilitate a depleted forest resource base. Popular programs incorporate cash-for-work to conduct hillside terracing, check dam construction and tree-planting for nut production, fuel wood, timber, dune stabilization, and erosion abatement. Programmatic approaches have varied as a function of accessibility, security and local objectives. Uncertain land tenure and use rights, weak local environmental management capacity, and a focus on agricultural production to meet immediate needs limit interest, nationally and locally. Unreliable security, a lack of high quality tree planting stock, limited technical knowledge and coordination among government agencies, and poor security hamper program expansion. Reforestation success would be most likely where these issues are least acute. The Afghan government should focus on supporting community based natural resource management, developing and disseminating improved conservation tree nursery strategies, and promoting watershed management schemes that incorporate forestry, range management and agronomic production. Reforestation practitioners could benefit from the human and material resources now present as part of the international war effort. Successes and failures encountered in Afghanistan should be considered in order to address similar problems in insecure regions elsewhere when reforestation may help reverse environmental degradation and contribute to broader social stabilization efforts.
The vulnerable do-gooders: security strategies of German aid agencies.
Schneiker, Andrea
2013-04-01
Humanitarian and development agencies have confronted growing insecurity in some of the regions in which they work over the course of the past decade. Consequently, aid agencies are changing their approach to security issues. Compared to aid agencies from other countries, especially the United Kingdom and the United States, German aid agencies have been relatively slow to adopt security measures. In addition, the security measures they have selected differ from one agency to another, even in comparable security contexts. The literature on organisational learning helps to explain these differences. The findings show that external and internal organisational factors influence an aid agency's choice of a particular security measure. The different responses of German aid agencies to the changing security environment demonstrate that security measures are not only influenced by an organisation's identity but also can be a way for them to demonstrate their identity and thereby distinguish themselves from other actors that deliver aid. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.
Evaluating Online Dialogue on "Security" Using a Novel Instructional Design
ERIC Educational Resources Information Center
Arora, Payal
2008-01-01
This paper explores evaluation strategies to gauge the impact of a novel instructional design on international community participation online. This is done by conceptualizing and devising indicators for measuring "engagement" online amongst marginalized adult communities worldwide. In doing so, a review of online evaluation literature is…
Indonesias New Maritime Ambitions: Implications for U.S.Indonesian Engagement
2015-06-26
and national security strategy. The pillars of his doctrine are: Recognize Indonesia’s maritime culture. Develop maritime industry, focusing on... archipelagic nation’s focus has always been internal and ashore. In 2005, the Indonesian government adopted the Minimum Essential Force (MEF) concept—a 20
2014-12-01
Case Study P U Pc Pt Ft Pa 1 Clinical vs. Actuarial Geospatial Profiling Strategies X X 2 Route Security in Baghdad X X X X 3 International...Information Sciences , 176, 1570-1589. Burns, K., & Bonaceto, C. (2014). Integrated Cognitive-neuroscience Architectures for Understanding Sensemaking
75 FR 44031 - Goldman, Sachs & Co., et al.; Notice of Application and Temporary Order
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-27
... International (``GSAMI''), Goldman Sachs Hedge Fund Strategies LLC (``GSHFS''), Commonwealth Annuity and Life... marketing materials used in connection with residential mortgage-related securities offerings by Goldman... marketing materials, (iv) where Goldman Sachs is the lead underwriter of an offering of residential mortgage...
Cyber secure systems approach for NPP digital control systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCreary, T. J.; Hsu, A.
2006-07-01
Whether fossil or nuclear power, the chief operations goal is to generate electricity. The heart of most plant operations is the I and C system. With the march towards open architecture, the I and C system is more vulnerable than ever to system security attacks (denial of service, virus attacks and others), thus jeopardizing plant operations. Plant staff must spend large amounts of time and money setting up and monitoring a variety of security strategies to counter the threats and actual attacks to the system. This time and money is a drain on the financial performance of a plant andmore » distracts valuable operations resources from their real goals: product. The pendulum towards complete open architecture may have swung too far. Not all aspects of proprietary hardware and software are necessarily 'bad'. As the aging U.S. fleet of nuclear power plants starts to engage in replacing legacy control systems, and given the on-going (and legitimate) concern about the security of present digital control systems, decisions about how best to approach cyber security are vital to the specification and selection of control system vendors for these upgrades. The authors maintain that utilizing certain resources available in today's digital technology, plant control systems can be configured from the onset to be inherently safe, so that plant staff can concentrate on the operational issues of the plant. The authors postulate the concept of the plant I and C being bounded in a 'Cyber Security Zone' and present a design approach that can alleviate the concern and cost at the plant level of dealing with system security strategies. Present approaches through various IT cyber strategies, commercial software, and even postulated standards from various industry/trade organizations are almost entirely reactive and simply add to cost and complexity. This Cyber Security Zone design demonstrates protection from the four classes of cyber security attacks: 1)Threat from an intruder attempting to disrupt network communications by entering the system from an attached utility network or utilizing a modem connected to a control system PC that is in turn connected to a publicly accessible phone; 2)Threat from a user connecting an unauthorized computer to the control network; 3)Threat from a security attack when an unauthorized user gains access to a PC connected to the plant network;. 4)Threat from internal disruption (by plant staff, whether, malicious or otherwise) by unauthorized usage of files or file handling media that opens the system to security threat (as typified in current situation in most control rooms). The plant I and C system cyber security design and the plant specific procedures should adequately demonstrate protection from the four pertinent classes of cyber security attacks. The combination of these features should demonstrate that the system is not vulnerable to any analyzed cyber security attacks either from internal sources or through network connections. The authors will provide configurations that will demonstrate the Cyber Security Zone. (authors)« less
How do Student Clients of a University-based Food Bank Cope with Food Insecurity?
Farahbakhsh, Jasmine; Ball, Geoff D C; Farmer, Anna P; Maximova, Katerina; Hanbazaza, Mahitab; Willows, Noreen D
2015-12-01
To describe the food security status, food insecurity coping strategies, characteristics, and experiences of student clients of the Campus Food Bank (CFB) at the University of Alberta in Edmonton, Alberta, Canada. A convenience sample of 58 students completed a survey from April 2013 to April 2014. Food security status was determined using the "Adult Food Security Survey Module". Ninety percent of CFB student clients who participated in this study were food insecure, which included both moderately and severely food insecure groups. The most prevalent coping strategies for food insecurity included applying for a loan or bursary (86.2%), seeking employment or working more hours (84.5%), and purchasing food using a credit card (77.6%). Participants were a diverse mix of students, including graduate students (50.0%), international students (46.6%), and caregivers of children (24.1%). The most common primary sources of income were government student loans (29.3%) and research assistantships (20.7%). Most participants (82.8%) liked the food they received from the food bank. Food insecurity is highly prevalent among student clients of this university-based food bank. Students used a variety of coping strategies to increase their disposable income, highlighting the need for additional strategies to alleviate food insecurity among vulnerable students.
Nuclear security policy in the context of counter-terrorism in Cambodia
DOE Office of Scientific and Technical Information (OSTI.GOV)
Khun, Vuthy, E-mail: vuthy.khun@gmail.com; Wongsawaeng, Doonyapong
The risk of nuclear or dirty bomb attack by terrorists is one of the most urgent and threatening danger. The Cambodian national strategy to combat weapons of mass destruction (WMD) depicts a layered system of preventive measures ranging from securing materials at foreign sources to interdicting weapons or nuclear or other radioactive materials at ports, border crossings, and within the Cambodian institutions dealing with the nuclear security to manage the preventive programs. The aim of this study is to formulate guidance, to identify scenario of threat and risk, and to pinpoint necessary legal frameworks on nuclear security in the contextmore » of counterterrorism based on the International Atomic Energy Agency nuclear security series. The analysis of this study is guided by theoretical review, the review of international laws and politics, by identifying and interpreting applicable rules and norms establishing the nuclear security regime and how well enforcement of the regime is carried out and, what is the likelihood of the future reform might be. This study will examine the existing national legal frameworks of Cambodia in the context of counterterrorism to prevent acts of nuclear terrorism and the threat of a terrorist nuclear attack within the Cambodia territory. It will shed light on departmental lanes of national nuclear security responsibility, and provide a holistic perspective on the needs of additional resources and emphasis regarding nuclear security policy in the context of counterterrorism in Cambodia.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-06
... Agency's Chief Scientist and Director of the Agency's new Office of Science and Technology. Signing for... rolled out its global food security strategy, known as ``Feed the Future.'' This new initiative has... Agency's main program pillars will be expansion of research and development to increase agricultural...
NASA Astrophysics Data System (ADS)
Rath-Nagel, S.
1981-03-01
Systems analyses were carried out by the International Energy Agency for the participating 15 countries in order to work out strategies and scenarios for lessening the dependence on imported oil and for developing new energy technologies. MARKAL model computations show the technology and energy mixes necessary for achieving a reduction of oil imports by two thirds over the next 40 years. The scenario 'high social security' examines the projected rise in energy consumption, the development of oil substitutes, the increase in alternative heating sources, the development of markets for liquid energy products, the demand for gas, and the relative usage of various energy generation methods. The recommended strategy involves as the most important points an increase in coal consumption, greater nuclear energy reliance and development of alternative technologies.
2009-10-29
Presidential Initiative to End Hunger in Africa ( IEHA )—which represented the U.S. strategy to help fulfill the MDG goal of halving hunger by 2015...was constrained in funding and limited in scope. In 2005, USAID, the primary agency that implemented IEHA , committed to providing an estimated $200...Development Assistance (DA) and other accounts. IEHA was intended to build an African-led partnership to cut hunger and poverty by investing in efforts
Formulation of US international energy policies
NASA Astrophysics Data System (ADS)
1980-09-01
To find out how the United States develops international energy policy, GAO reviewed five major energy issues covering the period from early 1977 through 1979. The issues are: vulnerabilities to petroleum supply interruptions; long term national security strategy on imported oil prices; export of U.S. oil and gas production equipment and technology to the Soviety Union; World Bank initiatives to assist in financing oil and gas exploration and development in oil-importing developing countries; and the role of gas imports relative to the nation's future sources of gas.
[Important issues of biological safety].
Onishchenko, G G
2007-01-01
The problem of biological security raises alarm due to the real growth of biological threats. Biological security includes a wide scope of problems, the solution of which becomes a part of national security as a necessary condition for the constant development of the country. A number of pathogens, such as human immunodeficiency virus, exotic Ebola and Lassa viruses causing hemorrhagic fever,rotaviruses causing acute intestinal diseases, etc. were first discovered in the last century. Terrorist actions committed in the USA in 2001 using the anthrax pathogen made the problem of biological danger even more important. In Russian Federation, biological threats are counteracted through the united state policy being a part of general state security policy. The biological Security legislation of Russian Federation is chiefly based on the 1992 Federal Law on Security. On the basis of cumulated experience, the President of Russia ratified Basics of Russian Federation's State Policy for Chemical and Biological Security for the Period through 2010 and Beyond on 4 December, 2003. The document determines the main directions and stages of the state development in the area of chemical and biological security. The Federal target program Russian Federation's National Program for Chemical and Biological Security is being developed, and its development is to be completed soon in order to perfect the national system for biological security and fulfill Basics of Russian Federation's State Policy for Chemical and Biological Security for the Period through 2010 and Beyond, ratified by the President. The new global strategy for control over infectious diseases, presented in the materials of Saint Petersburg summit of the Group of Eight, as well as the substantive part of its elements in Sanitary International Standards, are to a large degree an acknowledgement of the Russian Federation's experience and the algorithm for fighting extremely dangerous infections. This Russia's experience has resulted in the following global achievements: smallpox elimination in the USSR (1936); the USSR's suggestions on the program of smallpox elimination in the world and 2 billion doses of the vaccine transferred to the possession of the WHO (since 1958); the global elimination of the disease (1980); effective control over avian influenza at the epizootic stage, recognized internationally at Beijing International Congress, 17-18 January, 2006.
The National Security Strategy Under the United Nations and International Law
2004-03-19
a result of that war." This was addressed in 1951 by Hans Kelsen in a legal analysis of fundamental problems with the UN Charter. He concluded that...www.zmag.org/content/print_article.cfm>; Internet; accessed 31 January 2004. 36 Charter of the United Nations, Article 107. 37 Kearly, 27–28. 38 Hans Kelsen
ERIC Educational Resources Information Center
Jones, Christopher G.; Vedd, Rishma; Yoon, Sung Wook
2008-01-01
The globalization of business has led to the adoption of International Financial Reporting Standards (IFRS) around the world. Recently, the Securities and Exchange Commission issued a roadmap for IFRS implementation starting in 2014, with earlier adoption permitted. Yet according to recent surveys, few U.S. universities have a strategy in place to…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-17
... to market participants that add or remove liquidity in the complex order book (``maker/taker fees and... quotations for complex order strategies in the complex order book.\\8\\ Given this enhancement to the complex... Customer orders, the Exchange has adopted maker fees that apply to transactions in the complex order book...
2010-07-01
Guns, and Money”: Transnational Threats and U.S. National Security ………………………………………………………………………………………...207 Paul Rexton Kan 16. Ethical ...Issues in War: An Overview …………………………………………………………215 Martin L. Cook III. Strategic Issues and Considerations 17. Ethics and War in Comparative...values and ethics with the intent of doing some type of good for parts of the international system, or the overall system in general. This might
Alotaibi, Badriah M; Yezli, Saber; Bin Saeed, Abdul-Aziz A; Turkestani, Abdulhafeez; Alawam, Amnah H; Bieh, Kingsley L
2017-05-01
Hajj is one of the largest and the most ethnically and culturally diverse mass gatherings worldwide. The use of appropriate surveillance systems ensures timely information management for effective planning and response to infectious diseases threats during the pilgrimage. The literature describes infectious diseases prevention and control strategies for Hajj but with limited information on the operations and characteristics of the existing Hajj infectious diseases surveillance systems. We reviewed documents, including guidelines and reports from the Saudi Ministry of Health's database, to describe the characteristics of the infectious diseases surveillance systems that were operational during the 2015 Hajj, highlighting best practices and gaps and proposing strategies for strengthening and improvement. Using Pubmed and Embase online search engines and a combination of search terms including, 'mass gatherings' 'Olympics' 'surveillance' 'Hajj' 'health security', we explored the existing literature and highlighted some lessons learnt from other international mass gatherings. A regular indicator-based infectious disease surveillance system generates routine reports from health facilities within the Kingdom to the regional and central public health directorates all year round. During Hajj, enhanced indicator-based notifiable diseases surveillance systems complement the existing surveillance tool to ensure timely reporting of event information for appropriate action by public health officials. There is need to integrate the existing Hajj surveillance data management systems and to implement syndromic surveillance as an early warning system for infectious disease control during Hajj. International engagement is important to strengthen Hajj infectious diseases surveillance and to prevent disease transmission and globalization of infectious agents which could undermine global health security. © International Society of Travel Medicine, 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com
Why the poor pay with their lives: oil pipeline vandalisation, fires and human security in Nigeria.
Onuoha, Freedom C
2009-07-01
Since its discovery in Nigeria in 1956 crude oil has been a source of mixed blessing to the country. It is believed to have generated enormous wealth, but it has also claimed a great many lives. Scholarly attention on the impact of oil on security in Nigeria has largely focused on internal conflicts rather than on how disasters associated with oil pipeline vandalisation have impacted on human security in terms of causing bodily injuries and death, destroying livelihoods and fracturing families. This paper examines how pipeline vandalisation affects human security in these ways. It identifies women and children as those who are hardest hit and questions why the poor are the most vulnerable in oil pipeline disasters in this country. It recommends the adoption of a comprehensive and integrated framework of disaster management that will ensure prompt response to key early warning signs, risk-reduction and appropriate mitigation and management strategies.
Crises Management in the Oil and Gas Industry: The Niger Delta Experience
NASA Astrophysics Data System (ADS)
Odemene, Glory C.
The Niger Delta crises escalated beyond the borders of the Nigerian nation to become an issue that affected individuals and corporations around the world. This study led to the discovery of how the local crises escalated with international implications. This discovery was accomplished by addressing how the Niger Delta crises escalated from villages to international scenes, with notable impacts on the environment, health, safety, security, and financial segments of local, international, private, and corporate entities. Using Sweeny's crisis decision theory and Lazarus and Folkman's coping theory, the study considered the coping strategies of community members, the decisions, and actions they took in response to the management approaches of the government and the oil and gas companies (OGCs). This qualitative study utilized historical narrative to collect data by interviewing 4 participants who lived and worked in the region during the crises. NVivo was used for manual and automatic coding of data, as well as for categorization and connection of codes. Content analysis of identified codes and categories revealed the themes and trends in the experiences narrated by participants. Findings include the root causes, trend of escalation, and management strategies of the government and the OGCs that influenced the crises. These findings will help to influence policies and practices in the region and enhance effective management of current and emerging conflicts, with possibilities of restoring stability and security in the areas and in the nation at large.
Johansen, Katrine Bindesbøl Holm; Tjørnhøj-Thomsen, Tine
2016-11-01
The purpose of this article is to explore: (1) how victims of stalking experience the phenomenon in their daily life, (2) how the nature of stalking informs the victim's internal coping strategies, and (3) how the victims' internal coping strategies negatively affect their daily life and well-being. Qualitative semi-structured interviews were conducted with 25 victims of stalking. Thematic content analysis was employed, and themes were primarily identified inductively and broad into dialogue with concepts, such as Foucault's panopticism. The results of the study indicate that rather than the stalkers' harassment itself; it is the unpredictability of the stalkers' potential actions that inform the victims' primary coping strategy-self-regulation. Self-regulation consists of various strategies victims employ to avoid the stalker. Our analysis shows that self-regulation as a coping strategy has social and psychological consequences for the victims, leading to various degrees of social isolation and apprehension. We conclude that it is necessary to consider how professionals advise victims to cope with their situation as how legal measures should focus on the security of victims.
Shift in the National Drug Strategy: Implications for the SOUTHCOM AOR
1994-06-17
NT.F:C.,ThON ! .’.NUI SER -4. 70,... l lOU R, -, Cf CE OF IL l NI l .. ELEV•ENT NO. . NO ACCESS’ON NO. 11. TITLE (. ict .*e Security Cla.ficaeionj SHIFT IN...illegal drugs and cooperate in international efforts.22 In Colombia, the Gaviria government challenged the violence of the Medellin Cartel capturing key
A Strategy for Improved System Assurance
2007-06-20
Quality (Measurements Life Cycle Safety, Security & Others) ISO /IEC 12207 * Software Life Cycle Processes ISO 9001 Quality Management System...14598 Software Product Evaluation Related ISO /IEC 90003 Guidelines for the Application of ISO 9001:2000 to Computer Software IEEE 12207 Industry...Implementation of International Standard ISO /IEC 12207 IEEE 1220 Standard for Application and Management of the System Engineering Process Use in
2015-04-13
Africa and for tourists to visit Mali for the annual Festival in the Desert, a music festival that featured native Tuareg and other African music ...economic investment. Recent attacks by the Islamic State have threatened foreign investment and the tourism industry, highlighting the importance of
Parcher, Jean W.; Page, William R.
2013-01-01
Historically, international borders were located far from the major political and economic capitals of their countries and rarely received adequate planning or infrastructure development. Today, as a result of global economics and increased movement of goods between nations, border regions play a much greater role in commerce, tourism, and transportation. For example, Mexico is the second largest destination for United States exports (Woodrow Wilson Center Mexico Institute, 2009). The rapid population and economic growth along the United States–Mexican border, undocumented human border crossings, and the unique natural diversity of resources in the Borderlands present challenges for border security and environmental protection. Assessing risks and implementing sustainable growth policies to protect the environment and quality of life greatly increase in complexity when the issues cross an international border, where social services, environmental regulations, lifestyles, and cultural beliefs are unique for each country. Shared airsheds, water and biological resources, national security issues, and disaster management needs require an integrated binational approach to assess risks and develop binational management strategies.
78 FR 51266 - International Security Advisory Board (ISAB) Meeting Notice
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-20
... DEPARTMENT OF STATE [Public Notice 8419] International Security Advisory Board (ISAB) Meeting.... App Sec. 10(a)(2), the Department of State announces a meeting of the International Security Advisory... all aspects of arms control, disarmament, political-military affairs, international security and...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security Zones; Waters... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay, California. (a) Locations. The following areas are security zones: (1) San...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zones; Waters... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay, California. (a) Locations. The following areas are security zones: (1) San...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security Zones; Waters... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay, California. (a) Locations. The following areas are security zones: (1) San...
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security Zones; Waters... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay, California. (a) Locations. The following areas are security zones: (1) San...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zones; Waters... Security Zones; Waters surrounding San Francisco International Airport and Oakland International Airport, San Francisco Bay, California. (a) Locations. The following areas are security zones: (1) San...
Moudy, Robin M; Ingerson-Mahar, Michael; Kanter, Jordan; Grant, Ashley M; Fisher, Dara R; Jones, Franca R
2014-01-01
In 2011, President Obama addressed the United Nations General Assembly and urged the global community to come together to prevent, detect, and fight every kind of biological danger, whether a pandemic, terrorist threat, or treatable disease. Over the past decade, the United States and key international partners have addressed these dangers through a variety of programs and strategies aimed at developing and enhancing countries' capacity to rapidly detect, assess, report, and respond to acute biological threats. Despite our collective efforts, however, an increasingly interconnected world presents heightened opportunities for human, animal, and zoonotic diseases to emerge and spread globally. Further, the technical capabilities required to develop biological agents into a weapon are relatively low. The launch of the Global Health Security Agenda (GHSA) provides an opportunity for the international community to enhance the linkages between the health and security sectors, accelerating global efforts to prevent avoidable epidemics and bioterrorism, detect threats early, and respond rapidly and effectively to biological threats. The US Department of Defense (DoD) plays a key role in achieving GHSA objectives through its force health protection, threat reduction, and biodefense efforts at home and abroad. This article focuses on GHSA activities conducted in the DoD Office of the Assistant Secretary of Defense for Nuclear, Chemical, and Biological Defense.
Poertner, Ephraim; Junginger, Mathias; Müller-Böker, Ulrike
2011-01-01
In Nepal, international labor migration to India and overseas, as well as internal migration to the rural Nepalese lowlands, is of high socioeconomic significance. Scholarly debates about migration in Nepal have gradually shifted from an economic to a more holistic perspective, also incorporating social dimensions. However, little evidence has been generated about internal migration to urban destinations and the potential linkages between international and internal migration. This article draws on Bourdieu's “Theory of Practice” and sees migration as a social practice. Accordingly, migration practice is regarded as a strategy social agents apply to increase or transfer capitals and ultimately secure or improve their social position. Evidence for this argument is based on a qualitative case study of rural to urban migrants in Far West Nepal conducted in July and August 2009. The study at hand addresses linkages between internal and international migration practices and provides insight about a social stratum that is often neglected in migration research: the middle class and, more precisely, government employees. The authors show that social relations are crucial for channeling internal migration to a specific destination. Furthermore, they unveil how internal migration is connected to the international labor migration of former generations. Finally, the authors examine how migration strategies adopted over generations create multi-local social networks rooted in the family's place of origin.
A Strategic Planning Approach: Defining Alternative Counterterrorism Strategies as an Illustration
2009-01-01
JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...Corporation, MR-1738-AF, 2003; Jennifer D. P. Moroney, Nancy E. Blacker, Renee Buhr, James McFadden, Cathryn Quantic Thurston, and Anny Wong...McFadden, Cathryn Quantic Thurston, and Anny Wong, Building Partner Capabilities for Coalition Operations, Santa Monica, Calif.: RAND Corporation, MG-635
Technology Against Terrorism: Structuring Security
1992-01-01
outbreak of non is global in scope and, unfortunately, continues hostilities in January 1991, the number of interna- to demand attention and protective...against non -combatants, ranging from attacks on clinics by foes of abortion to mass murder by sophisticated international terrorist groups (e.g., attacks...findings were reached The fourth chapter discusses strategies for design - that involved first, the overall Federal funding of ing integrated systems
The Rule of Law and the U.S. Quest for Security in El Salvador
2007-03-12
theoretical and practical meanings of the rule of law and follows with an examination of the centrality of the concept in U.S. strategic thinking...Defense Review Report, February 6, 2006 “Help Iraq strengthen the rule of law and promote civil rights.” Strategic Pillar Six, National Strategy for...53 Strategic Context: Globalization and the Rise of International Crime
Millennials at Work: The Advice of Great Leaders
2015-04-01
Millennials at Work The Advice of Great Leaders Carol Axten Axten has more than 30 years of experience in Defense Department engineering, program...management, and policy development. She has graduate degrees in business , engineering, international relations, and national security resource strategy...million members of the millennial generation will enter the workforce and by 2030 will make up 75 percent of all working professionals. As managers in the
26 CFR 1.1081-3 - Exchanges of stock or securities solely for stock or securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Exchanges of stock or securities solely for stock or securities. 1.1081-3 Section 1.1081-3 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF... § 1.1081-3 Exchanges of stock or securities solely for stock or securities. The exchange, without the...
National Strategy for Aviation Security
2007-03-26
for Aviation Security (hereafter referred to as the Strategy) to protect the Nation and its interests from threats in the Air Domain. The Secretary of... Aviation security is best achieved by integrating public and private aviation security global activities into a coordinated effort to detect, deter...might occur. The Strategy aligns Federal government aviation security programs and initiatives into a comprehensive and cohesive national effort
Redefining Security. A Report by the Joint Security Commission
1994-02-28
security policies. This report offers recommendations on developing new strategies for achieving security within our infor-mation systems, including...better, and we outline methods of improving government and industry personnel security poli- cies. We offer recommendations on developing new strategies ... strategies , sufficient funding, and management attention if our comput- ers and networks are to protect the confidentiality, integrity, and availability of
The common objectives of the European Nordic countries and the role of space
NASA Astrophysics Data System (ADS)
Lehnert, Christopher; Giannopapa, Christina; Vaudo, Ersilia
2016-11-01
The European Space Agency (ESA) has twenty two Member States with common goals of engaging in European space activities. However, the various Member States have a variety of governance structures, strategic priorities regarding space and other sectorial areas depending on their cultural and geopolitical aspirations. The Nordic countries, namely Denmark, Finland, Norway and Sweden, have similarities which result often in common geopolitical and cultural aspects. These in turn shape their respective priorities and interests in setting up their policies in a number of sectorial areas like shipping and fisheries, energy, immigration, agriculture, security and defence, infrastructures, climate change and the Arctic. Space technology, navigation, earth observation, telecommunication and integrated applications can assist the Nordic countries in developing, implementing and monitoring policies of common interest. This paper provides an in-depth overview and a comprehensive assessment of these common interests in policy areas where space can provide support in their realisation. The first part provides a synthesis of the Nordic countries respective priorities through analysing their government programmes and plans. The priorities are classified according to the six areas of sustainability: energy, environment and climate change, transport, knowledge and innovation, natural resources (fisheries, agriculture, forestry, mining, etc), and security and external relations. Although the national strategies present different national perspectives, at the same time, there are a number of similarities when it comes to overall policy objectives in a number of areas such as the Arctic and climate change. In other words, even though the Arctic plays a different role in each country's national context and there are clear differences as regards geography, access to resources and security policies, the strategies display common general interest in sustainable development and management of resources, protection of the environment, international cooperation and regional security. The second part of this paper focuses on the national space strategies and indicates the main priorities and trends. The priorities vary from one country to the other and can include science, navigation, earth observation, human space flight, launchers, technology development, and/or applications. The motivation for investing in space activities also change (e.g. international cooperation, industrial competitiveness, societal benefits, job creation).
Resolving Alliance Ruptures from an Attachment-Informed Perspective.
Miller-Bottome, Madeleine; Talia, Alessandro; Safran, Jeremy D; Muran, J Christopher
2018-04-01
In this article, we examine how the different attachment patterns enable or hinder the resolution of ruptures in the therapeutic alliance. We try to show that secure and insecure patients alike may experience ruptures in the therapeutic alliance, but that their ability to participate in resolving such ruptures differ markedly. Recent findings with the Patient Attachment Coding System (PACS) show that attachment classifications manifest in psychotherapy as distinct ways of communicating about present internal experience. Secure patients disclose their present experience openly and invite attunement from the therapist, while insecure patients either minimize their contributions to the dialogue (avoidant) or the contributions of the therapist (preoccupied). Using examples from session transcripts, we demonstrate how secure patients are particularly responsive to resolution strategies that focus on here-and-now experience, while insecure patients' characteristic ways of communicating pose significant challenges to the resolution process.
2009-02-02
aviation security . The approach to aviation security was largely shaped by past events, such as the bombing of Pan Am flight 103 in December 1988, rather...community. Following the September 11, 2001, attacks, U.S. aviation security policy and strategy was closely linked to the changes called for in the...have been considered security sensitive thus limiting public discourse on the DHS strategy for aviation security . However, in June 2006 President
Domestic water and sanitation as water security: monitoring, concepts and strategy
Bradley, David J.; Bartram, Jamie K.
2013-01-01
Domestic water and sanitation provide examples of a situation where long-term, target-driven efforts have been launched with the objective of reducing the proportion of people who are water-insecure, most recently through the millennium development goals (MDGs) framework. Impacts of these efforts have been monitored by an increasingly evidence-based system, and plans for the next period of international policy, which are likely to aim at universal coverage with basic water and sanitation, are being currently developed. As distinct from many other domains to which the concept of water security is applied, domestic or personal water security requires a perspective that incorporates the reciprocal notions of provision and risk, as the current status of domestic water and sanitation security is dominated by deficiency This paper reviews the interaction of science and technology with policies, practice and monitoring, and explores how far domestic water can helpfully fit into the proposed concept of water security, how that is best defined, and how far the human right to water affects the situation. It is considered that they fit well together in terms both of practical planning of targets and indicators and as a conceptual framework to help development. The focus needs to be broad, to extend beyond households, to emphasize maintenance as well as construction and to increase equity of access. International and subnational monitoring need to interact, and monitoring results need to be meaningful to service providers as well as users. PMID:24080628
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-13
...-0143-01] Second DRAFT NIST Interagency Report (NISTIR) 7628, Smart Grid Cyber Security Strategy and... (NIST) seeks comments on the second draft of NISTIR 7628, Smart Grid Cyber Security Strategy and..., vulnerability categories, bottom-up analysis, individual logical interface diagrams, and the cyber security...
Beyond Airmindedness: Managing Regional Affairs Strategists for Joint Strategic Effect
2017-06-01
FORCE A THESIS PRESENTED TO THE FACULTY OF THE SCHOOL OF ADVANCED AIR AND SPACE STUDIES FOR COMPLETION OF GRADUATION REQUIREMENTS SCHOOL OF...Strategy and Security Studies at the School of Advanced Air and Space Studies, for his review of the final draft and suggestions for improvement...Our forces must have the ability to effectively communicate with and understand the cultures of coalition forces, international partners, and local
Sustainable Development: A Strategy for Regaining Control of Northern Mali
2014-06-01
informal attempts to conduct evasive maneuvers to achieve desired end results. The Project for National Security Reform argued that at times “… end runs...recognizing the internal borders that France established in the early twentieth century . Still, Model II optimally assigns projects based on... Project Design 4. In the end , Model I allocated the projects while addressing the following supplemental research questions posed in chapters I and
ERIC Educational Resources Information Center
Westin, Susan S.
This statement examines the nature and impact of foreign language proficiency and personnel shortages in the Army, State Department, Central Intelligence Agency, and Federal Bureau of Investigation (FBI), discussing strategies used to address these shortages and efforts made to address current and projected shortages. All four agencies reported…
Strategic Information Warfare: Challenges for the United States.
1998-05-01
Professor Richard H. Shultz Jr. as Director of the International Security Studies Program at the Fletcher School, helped provide both the academic...of Information Warfare and Strategy at National Defense University; and Larry Rothenberg, Institute for Foreign Policy Analysis. Captain Richard P...War in the Information Age" in War in the Information Age. Robert L. Pfaltzgraff, Jr. and Richard P. Shultz, Jr., eds. London: Brassey’s, 1997
2008-01-02
aviation security . The approach to aviation security was largely shaped by past events, such as the bombing of Pan Am flight 103 in December 1988, rather...2001 attacks, U.S. aviation security policy and strategy was closely linked to the changes called for in the Aviation and Transportation Security Act...sensitive thus limiting public discourse on the DHS strategy for aviation security . However, in June 2006 President Bush directed the DHS to establish and
Strategies for implementing the new International Health Regulations in federal countries.
Wilson, Kumanan; McDougall, Christopher; Fidler, David P; Lazar, Harvey
2008-03-01
The International Health Regulations (IHR), the principal legal instrument guiding the international management of public health emergencies, have recently undergone an extensive revision process. The revised regulations, referred to as the IHR (2005), were unanimously approved in May 2005 by all Member States of the World Health Assembly (WHA) and came into effect on 15 June 2007. The IHR (2005) reflect a modernization of the international community's approach to public health and an acknowledgement of the importance of establishing an effective international strategy to manage emergencies that threaten global health security. The success of the IHR as a new approach to combating such threats will ultimately be determined by the ability of countries to live up to the obligations they assumed in approving the new international strategy. However, doing so may be particularly challenging for decentralized countries, specifically those with federal systems of government. Although the IHR (2005) are the product of an agreement among national governments, they cover a wide range of matters, some of which may not fall fully under the constitutional jurisdiction of the national government within many federations. This tension between the separation of powers within federal systems of government and the requirements of an evolving global public health governance regime may undermine national efforts towards compliance and could ultimately jeopardize the regime's success. We hosted a workshop to examine how federal countries could address some of the challenges they may face in implementing the IHR (2005). We present here a series of recommendations, synthesized from the workshop proceedings, on strategies that these countries might pursue to improve their ability to comply with the revised IHR.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-11
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64805; File No. SR-ISE-2011-30] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Complex Orders July 5, 2011. I. Introduction On May 23, 2011, the International Securities Exchange, LLC...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-19
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65548; File No. SR-ISE-2011-39] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Complex Orders October 13, 2011. I. Introduction On July 1, 2011, the International Securities Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-11
... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Temporarily... International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed with the Securities and Exchange... Clearing and Outsourcing Solutions, Inc. (``Apex Clearing'') as an ISE member organization, subject to Apex...
76 FR 81005 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-27
.... For more information, contact Richard W. Hartman II, Executive Director of the International Security..., 2011. Richard W. Hartman II, Executive Director, International Security Advisory Board, U.S. Department...
78 FR 66984 - International Security Advisory Board (ISAB); Meeting Notice; Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-07
... information, contact Richard W. Hartman II, Executive Director of the International Security Advisory Board, U.... Richard W. Hartman, II, Executive Director, International Security Advisory Board, U.S. Department of...
76 FR 58076 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-19
... information, contact Richard W. Hartman II, Executive Director of the International Security Advisory Board..., 2011. Richard W. Hartman II, Executive Director, International Security Advisory Board, U.S. Department...
Gender relations, "Hindu" nationalism, and NGO responses in India.
Burlet, S
1999-03-01
This article explores the strategies employed by nongovernmental organizations (NGOs) to challenge the right wing nationalism that dominates Indian politics. The opposition of the NGOs to the current political climate has evolved a variety of strategies, depending on their links with northern NGOs or international organizations such as the UN, and their reliance on foreign funding. The organizations that have links with international NGO community primarily express their opposition through consciousness raising and networking strategies. Because NGOs activities at the national level have the potential to attract the attention and anger of nationalist actors, many choose to operate at local level for fear of harassment. Some get involved in initiatives such as direct-action campaigns which spring up when violence breaks out in a locality, or immediately afterwards. Another strategy being set up by NGOs is cooperative and cross-community initiatives to encourage as well as build on historic relationships of socioeconomic and political interdependence between Hindus and Muslims. These strategies seek to strengthen people's awareness of the distinction between personal spiritual beliefs, the true character of India's composite culture, and of the religious rhetoric being disseminated by nationalist for the purpose of securing political power. Although much effort has been exerted by these organizations, these strategies have limitations, which are discussed in this paper.
Preparation for the Recovery of Spent Nuclear Fuel (SNF) at Andreeva Bay, North West Russia - 13309
DOE Office of Scientific and Technical Information (OSTI.GOV)
Field, D.; McAtamney, N.
Andreeva Bay is located near Murmansk in the Russian Federation close to the Norwegian border. The ex-naval site was used to de-fuel nuclear-powered submarines and icebreakers during the Cold War. Approximately 22,000 fuel assemblies remain in three Dry Storage Units (DSUs) which means that Andreeva Bay has one of the largest stockpiles of highly enriched spent nuclear fuel (SNF) in the world. The high contamination and deteriorating condition of the SNF canisters has made improvements to the management of the SNF a high priority for the international community for safety, security and environmental reasons. International Donors have, since 2002, providedmore » support to projects at Andreeva concerned with improving the management of the SNF. This long-term programme of work has been coordinated between the International Donors and responsible bodies within the Russian Federation. Options for the safe and secure management of SNF at Andreeva Bay were considered in 2004 and developed by a number of Russian Institutes with international participation. This consisted of site investigations, surveys and studies to understand the technical challenges. A principal agreement was reached that the SNF would be removed from the site altogether and transported to Russia's reprocessing facility at Mayak in the Urals. The analytical studies provided the information necessary to develop the construction plan for the site. Following design and regulatory processes, stakeholders endorsed the technical solution in April 2007. This detailed the processes, facilities and equipment required to safely remove the SNF and identified other site services and support facilities required on the site. Implementation of this strategy is now well underway with the facilities in various states of construction. Physical works have been performed to address the most urgent tasks including weather protection over one of the DSUs, installation of shielding over the cells, provision of radiation protection infrastructure and general preparation of the site for construction of the facilities for the removal of the SNF. This paper describes the development and implementation of the strategy and work to improve the safe and secure management of SNF, preparing it for retrieval and removal from Andreeva Bay. (authors)« less
Code of Federal Regulations, 2011 CFR
2011-04-01
... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Security of certain information and material... GENERAL SECURITY INFORMATION REGULATIONS APPLICABLE TO CERTAIN INTERNATIONAL ENERGY PROGRAMS; RELATED MATERIAL § 9a.1 Security of certain information and material related to the International Energy Program...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-15
... Organizations; International Securities Exchange, LLC; Notice of Designation of a Longer Period for Commission Action on Proposed Rule Change To List and Trade Option Contracts Overlying 10 Shares of a Security August 9, 2012. On June 20, 2012, the International Securities Exchange, LLC (``Exchange'') filed with...
Migrants, refugees and insecurity. Current threats to peace?
Lohrmann, R
2000-01-01
Since the early 1980s, international migration has moved beyond humanitarian, economic development, labor market and societal integration concerns, raising complex interactive security implications for governments of migrant sending, receiving and transit countries, as well as for multilateral bodies. This article examines the effects of international migration on varied understandings and perceptions of international security. It discusses why international migration has come to be perceived as a security issue, both in industrialized and developing countries. Questions are raised on the migration-security nexus and the way in which the concepts "security" and "migration" are used. The real and perceived impacts of international migration upon national and regional security, both in industrialized and developing countries, are analyzed. The policies developed by governments and multilateral agencies since the mid-1980s to mitigate the destabilizing effects of certain kinds of international population movement and human displacement are examined. The conclusions stress the need for the establishment of a comprehensive framework of international cooperation among origin and receiving countries and international organizations to address the destabilizing implications of international migration.
Research on information security system of waste terminal disposal process
NASA Astrophysics Data System (ADS)
Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei
2017-05-01
Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.
Secure Payload Access to the International Space Station
NASA Technical Reports Server (NTRS)
Pitts, R. Lee; Reid, Chris
2002-01-01
The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.
Lessons from the 1999 Round of NATO Enlargement
2003-12-01
to maintain a strong level of association and cooperation for membership. Some of the newly independent countries of Europe see it as a first step...within the ranks as well as Soviet advisors being placed at the corps level of command.8 In its international dimension, the Warsaw Pact -- including...constitutions so as to provide a legal basis for defense as well as the drafting of national security strategies and defense doctrines; • The
Japan’s Roles in U.S. National Security Strategy: Strategic Ally and Economic Adversary
1991-06-01
the most substantial contributors to United Nations organizations, and are among the most influential members of the World Bank, the International...postwar occupation . This dominance allowed the U.S. to pursue broad policy objectives which included the assurance "...that Japan will not again...tive." 2 In effect, the vanquished nation yielded its des- tiny to occupation authorities. For all practical purposes, this equated to American
JPRS Report. Soviet Union: International Affairs
1988-04-07
Klyuchnikov. Asia’s Development Strategy 62 N. Voronchanina. The Algerian Cinema Is Struggling 63 G. Dymov. Regional Security in Asia: The View "From...together millions in capital in the theft of expensive computer parts has been eliminated, declared the chief of police of the Malaysian state of...Pinang, Ali Abu Bakar. After the successful operation, which entailed the arrest of six members of the Malaysian mafia, law and order forces in the
Army Air Commandos: A New Organization for Army Special Operations Aviation Foreign Internal Defense
2014-06-13
AFSOC-managed AvFID program? How can USASOAC assimilate the RWAvFID mission into its portfolio without unacceptable decrement to its other core...was exploring options to strengthen its FID portfolio .2 USSOCOM’s focus shift combined with the AvFID capability gap would begin a process that would...security environment, US national strategy, and present capabilities. For the joint force this has meant investment, divestment, and rebalancing across
Design of Firmware Update Strategy in Tower Mounted Amplifier
NASA Astrophysics Data System (ADS)
Lv, Yi; Han, Shuqin
With rapid development of radio communication, Tower mounted amplifier (TMA) that conform to AISG protocol will be increasingly applied. Remote firmware update function is essential for TMA. In this paper, a method about remote firmware update that conforms to AISG2.0 is proposed. In this paper, defect of traditional firmware storage is given, and the implementation procedure of firmware storing that based on internal flash of STR755 was introduced. According to corresponding specification in aisg2.0, the process of firmware download and activation are provided in detail. The key point of bootloader was given. Application result shows that the strategy is reliable and highly secure.
The Importance of International Technical Nuclear Forensics to Deter Illicit Trafficking
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, D K
2007-01-30
Illicit trafficking of nuclear materials is a transboundary problem that requires a cooperative approach involving international nuclear forensics to ensure all states understand the threat posed by nuclear smuggling as well as a means to best deter the movement of nuclear contraband. To achieve the objectives, all cases involving illicit trafficking of nuclear and radiological materials must be vigorously pursued and prosecuted when appropriate. The importance of outreach and formal government-to-government relationships with partner nations affected by nuclear trafficking cannot be under-estimated. States that are situated on smuggling routes may be well motivated to counter nuclear crimes to bolster theirmore » own border and transportation security as well as strengthen their economic and political viability. National law enforcement and atomic energy agencies in these states are aggressively pursuing a comprehensive strategy to counter nuclear smuggling through increasing reliance on technical nuclear forensics. As part of these activities, it is essential that these organizations be given adequate orientation to the best practices in this emerging discipline including the categorization of interdicted nuclear material, collection of traditional and nuclear forensic evidence, data analysis using optimized analytical protocols, and how to best fuse forensics information with reliable case input to best develop a law enforcement or national security response. The purpose of formalized USG relationship is to establish an institutional framework for collaboration in international forensics, improve standards of forensics practice, conduct joint exercises, and pursue case-work that benefits international security objectives. Just as outreach and formalized relationships are important to cultivate international nuclear forensics, linking nuclear forensics to ongoing national assistance in border and transpiration security, including port of entry of entry monitoring, nuclear safeguards, and emerging civilian nuclear power initiatives including the Global Nuclear Energy Partnership are crucial components of a successful nuclear detection and security architecture. Once illicit shipments of nuclear material are discovered at a border, the immediate next question will be the nature and the source of the material, as well as the identity of the individual(s) involved in the transfer as well as their motivations. The Nuclear Smuggling International Technical Working Group (ITWG) is a forum for the first responder, law enforcement, policy, and diplomatic community to partner with nuclear forensics experts worldwide to identify requirements and develop technical solutions in common. The ITWG was charted in 1996 and since that time approximately 30 member states and organizations have participated in 11 annual international meetings. The ITWG also works closely with the IAEA to provide countries with support for forensic analyses. Priorities include the development of common protocols for the collection of nuclear forensic evidence and laboratory investigations, organization of forensic round-robin analytical exercises and technical forensic assistance to requesting nations. To promote the science of nuclear forensics within the ITWG the Nuclear Forensics Laboratory Group was organized in 2004. A Model Action Plan for nuclear forensics was developed by the ITWG and published as an IAEA Nuclear security Series document to guide member states in their own forensics investigations. Through outreach, formalized partnerships, common approaches and security architectures, and international working groups, nuclear forensics provides an important contribution to promoting nuclear security and accountability.« less
International Competitiveness: A National Security Perspective
1989-06-01
Maxwell AFB AL 36112-5532. International Competitiveness A National Security Perspective 0 C 0 Thank you for your assistance / , ’I RELSEARCJ RhINORT NO...AU-ARI-88-11 International Competitiveness A National Security Perspective RONALD H. DABROWSKI, Maj, USAF Research Fellow Airpower Research Institute...26 International Competition ......................... 26 Identification of Firms Involved ..................... 26 Continued Leadership in
History of U.S. Nuclear Weapons Doctrine and a Path Forward
NASA Astrophysics Data System (ADS)
Chyba, Christopher
2007-04-01
During the Cold War, the United States considered a number of approaches for living in a world with nuclear weapons, including disarmament, preventive war, the incorporation of nuclear weapons into military strategy, passive and active defense, and deterrence. With the failure of early approaches to disarmament, and the rejection of preventive war against the Soviet Union (and later, China), deterrence became central to key nuclear relationships, though arms control continued to play an important role. The nuclear nonproliferation treaty made preventing the further spread of nuclear weapons another central component of U.S. policy. The Bush Administration has tried to devise a new policy for the post-Cold War period. Their approach has three salient pillars. First, it is characterized by an overall skepticism toward multilateral agreements, on the grounds that bad actors will not obey them, that agreements can lead to a false sense of security, and that such agreements are too often a way for the Lilliputians of the world to tie down Gulliver. The March 2005 U.S. National Defense Strategy declared that U.S. strength ``will continue to be challenged by those who employ a strategy of the weak, using international fora, judicial processes and terrorism.'' Second, the Bush Administration declared its intention to maintain a military dominance so great that other states simply would not try to catch up. The 2002 National Security Strategy states that ``Our forces will be strong enough to dissuade potential adversaries from pursuing a military build-up in hopes of surpassing, or equaling, the power of the United States.'' Third, the 2002 National Security Strategy (reaffirmed by the 2006 National Security Strategy) moved preventive war (which the strategies called ``preemptive war'') to a central position, rather than deterrence and nonproliferation. In part this was because of the claim that certain ``rogue'' states, and terrorist groups, were not deterrable. This talk will sketch this history, discuss the approach of the Bush Administration in more detail and assess its successes and failures, and suggest the lines of a new approach to U.S. nuclear weapons policy for the coming decades. This approach will follow that outlined in George Bunn and Christopher Chyba (eds.), ``U.S. Nuclear Weapons Policy: Confronting Today's Threats'' (Brookings, 2006, 340 pp.).
Betancourt, Theresa S; Williams, Timothy P; Kellner, Sarah E; Gebre-Medhin, Joy; Hann, Katrina; Kayiteshonga, Yvonne
2012-05-01
This study examines the core components of children's basic security and well-being in order to examine issues central to improving child protection in Rwanda. Sources of data included 15 focus groups with adults, 7 focus groups with children ages 10-17, and 11 key informant interviews with child protection stakeholders, including representatives from international NGOs, community-based groups, and the Rwandan Government, all of which took place in April and May of 2010. Participants painted a complex picture of threats to children's basic security in Rwanda. Three key themes were pervasive across all interviews: (1) deterioration of social and community cohesion in post-genocide Rwanda; (2) the cascading effects of poverty; and (3) the impact of caregiver illness and death on the caregiving environment. Consistent with the SAFE (Safety/freedom from harm; Access to basic physiological needs and healthcare; Family and connection to others; Education and economic security) model of child protection, participants rarely elaborated on a child protection threat independent of other basic security needs and rights. Findings suggest a need for integrated approaches to child protection that recognize this interrelatedness and extend beyond issue-specific child protection responses. This study contributes to a growing body of work highlighting the interrelated nature of child protection threats and the implications of adaptive and dangerous survival strategies that children and families engage in to meet their basic security needs. Analysis of this interrelatedness provides a roadmap for improving policies and implementing integrated and robust child protection strategies in Rwanda and other settings. Copyright © 2012 Elsevier Ltd. All rights reserved.
Risk Management in Agriculture for Food Security in Latin America and the Caribbean
NASA Astrophysics Data System (ADS)
Martinez, A.; National Research CouncilScientific; Technological Research (Conicet)
2013-05-01
The Americas are extremely important as a unique contributor to Food Security. It provides from tropical to temperate crops. Not only they are able to feed their own population, but contribute significantly to the food supply of the population in developed, emergent and underdeveloped countries. This fact has given the region a unique responsibility to develop a regional risk-management strategy to manage food insecurity at a local, national, regional and global level. Although international agencies such as UN Food and Agriculture Organization (FAO), Instituto Interamericano para la Cooperación en Agricultura (IICA) and the regional centres of the Consultative Group for International Agriculture Research (CGIAR) and the World Bank (WB), are engaged in actions for Risk Management in Agriculture for reducing Food Insecurity. However there is a need to build a framework and/or comprehensive regional strategy for the Americas. It would identify areas for promoting research projects where natural and social science work together for producing relevant scientific information and tools i.e. maps, indicators, models and scenarios, early warning systems, etc. to cooperate with both policy and decision makers in the public and private sectors. This would eventually lead to a comprehensive regional programme for reducing food insecurity. The purpose of International Council for Science-International Research and the International Research for Disaster Risk programme (ICSU-IRDR) and ICSU Regional Office for Latinamerica and the Caribbean (ICSU-ROLAC) is to promote the cooperation of the relevant scientific fields in both natural science and social science in a multi and trans-disciplinary approach on risk management to reduce food insecurity. Also both ICSU-IRDR and ICSU-ROLAC are building a case for the inclusion of the scientific community in the revision of the Hjogo Framework for Action for Disaster Reduction to be held in 2015 as risk management for reducing food insecurity is part of the agenda.
The impact of potential political security level on international tourism
Young-Rae Kim; Chang Huh; Seung Hyun Kim
2002-01-01
The purpose of this study was to investigate the impact of potential political security in an effort to fill in two foregoing research gaps in international tourism. To investigate the relationship between political security and international tourism, a simple regression model was employed. Secondary data were collected from a variety of sources, such as international...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... Interim Implementation Guide for the National Health Security Strategy of the United States of America...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-07
..., Office of Missile, Biological, and Chemical Nonproliferation, Bureau of International Security and... DEPARTMENT OF STATE [Public Notice: 7678] Bureau of International Security and Nonproliferation; Termination of Chemical and Biological Weapons (CBW) Proliferation Sanctions Against a Foreign Person AGENCY...
Climate change and nutrition: creating a climate for nutrition security.
Tirado, M C; Crahay, P; Mahy, L; Zanev, C; Neira, M; Msangi, S; Brown, R; Scaramella, C; Costa Coitinho, D; Müller, A
2013-12-01
Climate change further exacerbates the enormous existing burden of undernutrition. It affects food and nutrition security and undermines current efforts to reduce hunger and promote nutrition. Undernutrition in turn undermines climate resilience and the coping strategies of vulnerable populations. The objectives of this paper are to identify and undertake a cross-sectoral analysis of the impacts of climate change on nutrition security and the existing mechanisms, strategies, and policies to address them. A cross-sectoral analysis of the impacts of climate change on nutrition security and the mechanisms and policies to address them was guided by an analytical framework focused on the three 'underlying causes' of undernutrition: 1) household food access, 2) maternal and child care and feeding practices, 3) environmental health and health access. The analytical framework includes the interactions of the three underlying causes of undernutrition with climate change,vulnerability, adaptation and mitigation. Within broad efforts on climate change mitigation and adaptation and climate-resilient development, a combination of nutrition-sensitive adaptation and mitigation measures, climate-resilient and nutrition-sensitive agricultural development, social protection, improved maternal and child care and health, nutrition-sensitive risk reduction and management, community development measures, nutrition-smart investments, increased policy coherence, and institutional and cross-sectoral collaboration are proposed as a means to address the impacts of climate change to food and nutrition security. This paper proposes policy directions to address nutrition in the climate change agenda and recommendations for consideration by the UN Framework Convention on Climate Change (UNFCCC). Nutrition and health stakeholders need to be engaged in key climate change adaptation and mitigation initiatives, including science-based assessment by the Intergovernmental Panel on Climate Change (IPCC), and policies and actions formulated by the UN Framework Convention on Climate Change (UNFCCC). Improved multi-sectoral coordination and political will is required to integrate nutrition-sensitive actions into climate-resilient sustainable development efforts in the UNFCCC work and in the post 2015 development agenda. Placing human rights at the center of strategies to mitigate and adapt to the impacts of climate change and international solidarity is essential to advance sustainable development and to create a climate for nutrition security.
American Grand Strategy and Seapower. Conference Report
2011-11-01
Senior Fellow, Watson Institute for International Studies, Brown University 10 Speakers The Honorable Seth Cropsey, Senior Advisor, CNA; Senior...and the anticipation of future security challenges based on past experiences. Connections between seapower and prosperity Dr. Seth Cropsey noted...Force, is a second-rate Air Force. 91 Participant biographies Seth Cropsey Dr. Seth Cropsey served as Deputy Under Secretary of the Navy for
2006-10-31
International Security and Arms Control;: Stanford University Press, 1994. Lin, Chong-Pin. China’s Nuclear Weapons Strategy : Tradition within Evolution ...analysts tend to posit interests, emphasize strategic interaction , and discount bureaucratic influence. - Paul DiMaggio, “Culture and Cognition...Additional Sources - Henry Rowen, "The Evolution of Strategic Nuclear Doctrine," in Laurence Martin, ed., Strategic Thought in the Nuclear Age
2012-06-08
gained through the reading of the Bible and his Christian faith.120 He also began learning Hebrew , which would distinguish him as one of the few...some years and knew Arabic well, but since coming to Palestine had developed pronounced Zionist tendencies and was now learning Yiddish or Hebrew ...researched works on the period drawing from English, Arabic and Hebrew sources, see Porath, The Palestinian Arab National Movement: From Riots to
Honduras’ National Security Strategy To Combat Terrorism
2006-12-01
ENVIRONMENT Culture in “ancient” America was based in two major locations. In Mexico and Central America were the Aztecs and the Mayas, and in Peru were the...Colombia), the drugs transit via the West Indies, Central America and Mexico (fig. 2), which are the trafficking centers of the international mafia...by migrants.42 Some of the factors that contribute to the increase of gang activities in Central America, Mexico , and the U.S. are: income
The Use of Special Operations Forces in Support of American Strategic Security Strategies
2013-01-28
Operations Command (USSOCOM) global threats have morphed. The world has evolved from a bi-polar conflict characterized by the Cold War through what may be...the community of nations and create a more stable and thus, prosperous, world . This paper sets the strategic context for future operations, defines...transported gamers into the world of SOF on daring missions to save humanity from rogue states and international terrorists. While each is entertaining
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false (Item 308) Internal control over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD INSTRUCTIONS FOR FILING FORMS UNDER SECURITIES ACT OF 1933, SECURITIES EXCHANGE ACT OF 1934 AND ENERGY POLICY AND...
10 CFR 37.43 - General security program requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... overall security strategy to ensure the integrated and effective functioning of the security program required by this subpart. The security plan must, at a minimum: (i) Describe the measures and strategies... lessons learned; (iii) Relevant results of NRC inspections; and (iv) Relevant results of the licensee's...
Roadmap for an EArth Defense Initiative (READI)
NASA Astrophysics Data System (ADS)
Burke, J. D.; Hussain, A.; Soni, A.; Johnson-Freese, J.; Faull, J.; Schmidt, N.; Wilson, T.; Thangavelu, M.
2015-12-01
During the 2015 Space Studies Program of the International Space University, a team of thirty-four participants from seventeen countries carried out a team project on the subject of planetary defense against near-Earth object impacts. The READI Project presents the components of a complete architecture representing practical future strategies and methods for protecting our planet and life as we know it. The findings and recommendations of the project are as follows: for detection and tracking, add infrared instruments in space and radar in Earth's southern hemisphere, as well as dedicated ground telescopes and a program for spectroscopic and other characterization of asteroids and comets; for deflection, develop and space-qualify kinetic and nuclear interceptors, as well as long-range laser ablators; for education and outreach, develop programs aimed at the cohort of children aged 6-15 and their parents; and for evacuation and recovery, provide distributed shelters and increased emergency planning. The project recognizes that the enactment of any deflection strategy would require significant international collaboration; thus, we recommend the formation of a Mitigation Action Group (MAG) in addition to the existing organizations IAWN and SMPAG. The MAG should be chartered to recommend deflection strategies to the UN Security Council in the event of an imminent NEO impact and, upon approval, to lead international deflection action.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-19
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61317; File No. SR-ISE-2009-103] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Market Data Fees January 8, 2010. I. Introduction On November 25, 2009, the International...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-28
... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... on May 5, 2010, the International Securities Exchange, LLC (the ``Exchange'' or the ``ISE'') filed.... Specifically, the Exchange proposes to adopt a $0.18 per contract execution fee for ``professional customers...
Under Secretary of Defense for Policy > Home
Weapons of Mass Destruction Cyber Policy Space Policy ASD for International Security Affairs ASD for collapse content Assistant Secretary of Defense Robert Karem ASD for International Security Affairs Randall Assistant Secretary of Defense Katie Wheelbarger PDASD for International Security Affairs David Helvey PDASD
The Value of a European Security and Defense Policy
2007-05-08
Union, Theory in International Affairs, US Foreign and Security Policy, Crisis Management, Crisis Response, 16. SECURITY CLASSIFICATION OF: 17...1 2. The importance of theory in...will examine which paradigm of international relations is most suited to explain current developments in the EU and which theory in international
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-11
... DEPARTMENT OF STATE [Public Notice 8183] Bureau of International Security and Nonproliferation Imposition of Missile Sanctions on Two Chinese Foreign Persons AGENCY: Bureau of International Security and Nonproliferation, Department of State. ACTION: Notice. SUMMARY: A determination has been made that two foreign...
Usuzawa, Motoki; O Telan, Elizabeth; Kawano, Razel; S Dizon, Carmela; Alisjahbana, Bachti; Ashino, Yugo; Egawa, Shinichi; Fukumoto, Manabu; Izumi, Takako; Ono, Yuichi; Hattori, Toshio
2014-05-01
As the impacts of natural disasters have grown more severe, the importance of education for disaster medicine gains greater recognition. We launched a project to establish an international educational program for disaster medicine. In the present study, we surveyed medical personnel and medical/public health students in the Philippines (n = 45) and Indonesia (n = 67) for their awareness of the international frameworks related to disaster medicine: the Human Security (securing individual life and health), the Sphere Project (international humanitarian response), and the Hyogo Framework for Action 2005-2015 (international strategy for disaster reduction). In both countries, more than 50% responders were aware of human security, but only 2 to 12% were aware of the latter two. The survey also contained questions about the preferred subjects in prospective educational program, and risk perception on disaster and disaster-related infections. In the Philippines, significant disasters were geophysical (31.0%), hydrological (33.3%), or meteorological (24.8%), whereas in Indonesia, geophysical (63.0%) and hydrological (25.3%) were significant. Moreover, in the Philippines, leptospirosis (27.1%), dengue (18.6%), diarrhea (15.3%), and cholera (10.2%) were recognized common disaster-related infections. In Indonesia, diarrhea (22.0%) and respiratory infection (20.3%) are major disaster-related infections. Water-related infections were the major ones in both countries, but the profiles of risk perception were different (Pearson's chi-square test, p = 1.469e-05). The responders tended to overestimate the risk of low probability and high consequence such as geophysical disaster. These results are helpful for the development of a postgraduate course for disaster medicine in Asia Pacific countries.
Austrian Security Strategy: Need For Reformulation Due To Security Developments
2016-02-14
migration from Africa and the Middle East, and reality has overtaken the security strategy. The terrorist attacks in Paris and the sexual assaults on women...legitimate use of physical force” i.e., a state is a system based on the legitimate “relation of domination of man over man.”6, 7 Strategy is...called peace dividend to stimulate the economy and invest in infrastructure projects. Modern security policy must be assessed in all areas, since
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects ofmore » biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation around the following five axes/dimensions: Adapt to the change to global, market-driven dynamics; Address the land, water and resource implications of biofuel policies; Foster the transition from biofuels to comprehensive food-energy policies; Promote research and development; and, Develop methods and guidelines for coordinated food, Biofuels, and bio-energy policies at national and international levels.« less
Confidence-Building Measures in Philippine Security.
1998-05-01
service or government agency. STRATEGY RESEARCH PROJECT i CONFIDENCE-BUILDING MEASURES IN PHILIPPINE SECURITY BY LIEUTENANT COLONEL RAMON G...WAR COLLEGE, CARLISLE BARRACKS, PA 17013-5050 rimo*’^»®*raBl USAWC STRATEGY RESEARCH PROJECT CONFIDENCE-BUILDING MEASURES IN PHILIPPINE...Colonel Ramon Santos, Philippine Army TITLE: Confidence-Building Measures in Philippine Security FORMAT: Strategy Research Project DATE: 1
Israel security in the 21st century: Risks and opportunities. Research report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eisenkot, G.
Unlike the United States which publicizes its national security strategy and national military strategy in official public documents, Israel, does not produce such documents for the general public. This may appear paradoxical in that the State of Israel, from its very inception, has invested enormous energy in its security. Nevertheless, Israel has no detailed security doctrine approved and updated by the Cabinet, the Knesset (Israel`s parliament) or the General Staff. The lack of an official, published, security doctrine does not imply that Israel lacks a coherent political and military strategy based on doctrine-like concepts. Israel`s political and military successes aremore » proof to the contrary. Our purpose, then, is to identify a number of the critical Security Principles that have shaped Israeli strategy. This will provide us the foundation for our main discussion which is the risks and challenges to Israeli security in the 21st century and possible responses to those challenges.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Future Now Group, Inc., and Gammacan International, Inc.; Order of Suspension of Trading June 5, 2012. It appears to the Securities and Exchange... concerning the securities of Gammacan International, Inc. because it has not filed any periodic reports since...
The Impact of Regional Higher Education Spaces on the Security of International Students
ERIC Educational Resources Information Center
Forbes-Mewett, Helen
2016-01-01
The security of international students in regional higher education spaces in Australia has been overlooked. Contingency theory provides the framework for this case study to explore the organisational structure and support services relevant to a regional higher education space and how this impacts the security of international students. In-depth…
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the Securities...
McLaughlin, Katie A.; Zeanah, Charles H.; Fox, Nathan A.; Nelson, Charles A.
2011-01-01
Background Children reared in institutions experience elevated rates of psychiatric disorders. Inability to form a secure attachment relationship to a primary caregiver is posited to be a central mechanism in this association. We determined whether the ameliorative effect of a foster care (FC) intervention on internalizing disorders in previously institutionalized children was explained by the development of secure attachment among children placed in FC and evaluated the role of lack of attachment in an institutionalized sample on the etiology of internalizing disorders within the context of a randomized trial. Methods A sample of 136 children (aged 6-30 months) residing in institutions was recruited in Bucharest, Romania. Children were randomized to FC (n=68) or to care as usual (CAU; n=68). Foster parents were recruited, trained, and overseen by the investigative team. Attachment security at 42 months was assessed using the Strange Situation Procedure, and internalizing disorders at 54 months were assessed using the Preschool Age Psychiatric Assessment. Results Girls in FC had fewer internalizing disorders than girls in CAU (OR=0.17, p=006). The intervention had no effect on internalizing disorders in boys (OR=0.47, p=.150). At 42 months, girls in FC were more likely to have secure attachment than girls in CAU (OR=12.5, p<.001), but no difference was observed in boys (OR=2.0, p=.205). Greater attachment security predicted lower rates of internalizing disorders in both sexes. Development of attachment security fully mediated intervention effects on internalizing disorders in girls. Conclusion Placement into FC facilitated the development of secure attachment and prevented the onset of internalizing disorders in institutionalized girls. The differential effects of FC on attachment security in boys and girls explained gender differences in the intervention effects on psychopathology. Findings provide evidence for the critical role of disrupted attachment in the etiology of internalizing disorders in children exposed to institutionalization. PMID:21733136
Global climate change and international security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Karas, Thomas H.
2003-11-01
This report originates in a workshop held at Sandia National Laboratories, bringing together a variety of external experts with Sandia personnel to discuss 'The Implications of Global Climate Change for International Security.' Whatever the future of the current global warming trend, paleoclimatic history shows that climate change happens, sometimes abruptly. These changes can severely impact human water supplies, agriculture, migration patterns, infrastructure, financial flows, disease prevalence, and economic activity. Those impacts, in turn, can lead to national or international security problems stemming from aggravation of internal conflicts, increased poverty and inequality, exacerbation of existing international conflicts, diversion of national andmore » international resources from international security programs (military or non-military), contribution to global economic decline or collapse, or international realignments based on climate change mitigation policies. After reviewing these potential problems, the report concludes with a brief listing of some research, technology, and policy measures that might mitigate them.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-30
... continuing effort to attract more activity in large-sized FX options. \\3\\ See Securities Exchange Act Release... SECURITIES AND EXCHANGE COMMISSION [Release No. 3464743; File No. SR-ISE-2011-35] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed...
Institutionalization of Information Security: Case of the Indonesian Banking Sector
ERIC Educational Resources Information Center
Nasution, Muhamad Faisal Fariduddin Attar
2012-01-01
This study focuses on the institutionalization of information security in the banking sector. This study is important to pursue since it explicates the internalization of information security governance and practices and how such internalization develops an organizational resistance towards security breach. The study argues that information…
Strategy to Combat Transnational Organized Crime: Addressing Converging Threats to National Security
2011-07-01
routes and Western European markets. The Balkans region has become a new entry point for Latin American cocaine, a source of synthetic drugs, and a...of heroin, 69 tons of marijuana , 501 weapons, and 527 vehicles during the entire course of the operation. S T R AT E G Y TO CO M BAT T R A N S...Coordinate with international partners to prevent synthetic drug production, trafficking, and pre- cursor chemical diversion. Countering Illicit Finance for
2013-07-01
Strategic Dialogue UN United Nations UNHRD United Nations Humanitarian Response Depot (in Malaysia ) UNISDR United Nations International Strategy for...large-scale radioactive contamination , we focus our analysis on the former type of disaster, as it offers a better lens through with which to assess...to Security, Alan Dupont predicts that a failure to reverse the trends of the decline in energy, food and water sufficiency, and the increase in
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-04
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66880; File No. SR-ISE-2012-16] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Procedures for Executing the Stock Leg(s) of Stock-Option Orders April 30, 2012. I. Introduction On February 29, 2012, the International...
A study on laws related to women's welfare.
Kim, E
1991-01-01
Since 1980, the domestic policy of every Korean government has focused on the construction of a welfare society, yet real change remains elusive, leaving women particularly neglected. This study examines social security legislation, especially the laws that define the status and welfare of women with the goal of advancing women's welfare and eliminating sexual discrimination against them. Welfare laws and literature were collected and examined from Korea and aboard, and facilities were visited. This paper reviews: 1) the theoretical background of women's welfare including the feminist critique and strategies for the welfare state and social welfare, and the significance and necessity of women's welfare; 2) women's welfare: international treaties and trends, including the World Declaration of Human Rights, international agreements on human rights, the International Labor Organization Treaty, the UN Convention on the Elimination of Sexual Discrimination Against Women, and the women's development strategies toward the year 2000; 3) the analysis of the laws and regulations related to women's welfare, including the systematic organization of women's welfare law (judicial, and systematic organization by applicable clients), the constitutional basis of the women's welfare related legislation and legal principles, the main feature and problems of the women's welfare related legislation, e.g. the Social Security Act: the National Pensions Act, Medical Insurance Act, the Livelihood Protection Act, Mother-child Welfare Act, Child Welfare Act, the Anti-prostitution Act, and the Gender Equal Employment Act, and 4) the direction of revision of the women's welfare related legislation including the revision and legislation of women's welfare related laws, restructuring of the delivery system, and the formation of proper environment conducive to the realization of women's welfare.
Noonan, Vanessa K; Thorogood, Nancy P; Joshi, Phalgun B; Fehlings, Michael G; Craven, B Catharine; Linassi, Gary; Fourney, Daryl R; Kwon, Brian K; Bailey, Christopher S; Tsai, Eve C; Drew, Brian M; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F
2013-05-01
Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. Copyright © 2013 Longwoods Publishing.
Noonan, Vanessa K.; Thorogood, Nancy P.; Joshi, Phalgun B.; Fehlings, Michael G.; Craven, B. Catharine; Linassi, Gary; Fourney, Daryl R.; Kwon, Brian K.; Bailey, Christopher S.; Tsai, Eve C.; Drew, Brian M.; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F.
2013-01-01
Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. PMID:23968640
NASA Astrophysics Data System (ADS)
Williams, Christopher
2000-07-01
The nature of international education as a field of studies has been affected by global changes over the past decade. At the same time, the concept of global security has emerged, bringing together studies related to development, the environment and the understanding of violence. Although much of the education literature reflects the global security approach, it is not a field that has been subjected to much analysis as a whole. This paper provides an assessment of international education as a discipline, and outlines the global security framework. It examines how this framework is reflected in the forms of analysis used by international educationists. Finally it suggests how the central purpose of global security, namely ensuring human survival, could be adopted within international education to provide a clear sense of direction. This has specific implications for such areas as curriculum, assessment, educational provision and planning.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70357; File No. SR-MIAX-2013-42] Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate... provisions of Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-20
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70873; File No. SR-ISE-2013-56] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-20
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70872; File No. SR-ISE-2013-57] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-06
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64562; File No. SR-ISE-2011-29] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Second Market Fees May 27, 2011. Pursuant to Section 19(b)(1) of the Securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-13
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65499; File No. SR-ISE-2011-64] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-21
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70884; File No. SR-ISE-2013-59] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... November 15, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-15
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64292; File No. SR-ISE-2011-22] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Network Fees April 11, 2011. Pursuant to Section 19(b)(1) of the Securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-13
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66525; File No. SR-ISE-2012-09] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Network Fees March 7, 2012. Pursuant to Section 19(b)(1) of the Securities...
Near-Term Options for Improving Security at Los Angeles International Airport
2004-09-26
the Transportation Security Administration (TSA), the Los Angeles Police Department ( LAPD ), and LAX to make sure the list was reasonable...World Airports; the Transportation Security Agency; the Los Angeles International Airport Police Department ; the Los Angeles Police Department ; the Los ...Airports. iii PREFACE This document assesses near-term security
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65087; File No. SR-ISE-2011-47] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... August 10, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1...
A Security Strategy for Cyber Threats on Neighbor Discovery in 6Lowpan Networks
2017-12-01
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. A SECURITY...STRATEGY FOR CYBER THREATS ON NEIGHBOR DISCOVERY IN 6LOWPAN NETWORKS by Cheng Hai Ang December 2017 Thesis Advisor: Preetha Thulasiraman...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE A SECURITY STRATEGY FOR CYBER THREATS ON NEIGHBOR DISCOVERY IN 6LOWPAN
Food and nutrition policies: what's being done in Turkey.
Pekcan, Gülden
2006-02-01
The aim of the present paper is to describe the development of the National Plan of Action for Food and Nutrition (NPAFN) for Turkey. Access to a safe and healthy variety of food, a fundamental human right, was stressed by the International Conference on Nutrition and by the World Food Summit. In the International Conference on Nutrition in December 1992, one major commitment was the preparation of NPAFN. The NPAFN for Turkey was designed according to this commitment. Turkey. To this end, under the coordination of the State Planning Organization, a Working Committee Report for National Food and Nutrition Strategy of Turkey was prepared and published, with the participation of different sectors. The goal of the prepared National Food and Nutrition Strategy for Turkey is to protect and promote health through and healthy nutrition and reduce the burden of diseases, while contributing to socio-economic development and a sustainable food security. In Turkey the NPAFN was developed and implementation has initiated. Nearly for all the actions, related projects are being developed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
He, Fulin; Cao, Yang; Zhang, Jun Jason
Ensuring flexible and reliable data routing is indispensable for the integration of Advanced Metering Infrastructure (AMI) networks, we propose a secure-oriented and load-balancing wireless data routing scheme. A novel utility function is designed based on security routing scheme. Then, we model the interactive security-oriented routing strategy among meter data concentrators or smart grid meters as a mixed-strategy network formation game. Finally, such problem results in a stable probabilistic routing scheme with proposed distributed learning algorithm. One contributions is that we studied that different types of applications affect the routing selection strategy and the strategy tendency. Another contributions is that themore » chosen strategy of our mixed routing can adaptively to converge to a new mixed strategy Nash equilibrium (MSNE) during the learning process in the smart grid.« less
Administrator, National Security Education Program
1993-01-19
1. Administer, direct, and manage the resources for the lit program. 2. Establish and direct an international education center, as approved by the...approve the hiring of, and evaluate the performance of personnel who staff the international education center. 4. Ensure appropriate internal management...Administrator, National Security Education Program * References: (a) DoD Directive 1025.2 , "National Security * Education Program," January 13, 1993
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-02
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of China Ruitai International Holdings Co., Ltd.; Order of Suspension of Trading September 30, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Ruitai International Holdings Co.,...
Cooling off health security hot spots: getting on top of it down under.
Murray, Kris A; Skerratt, Lee F; Speare, Rick; Ritchie, Scott; Smout, Felicity; Hedlefs, Robert; Lee, Jonathan
2012-11-01
Australia is free of many diseases, pests and weeds found elsewhere in the world due to its geographical isolation and relatively good health security practices. However, its health security is under increasing pressure due to a number of ecological, climatic, demographic and behavioural changes occurring globally. North Queensland is a high risk area (a health security hot spot) for Australia, due in part to its connection to neighbouring countries via the Torres Strait and the Indo-Papuan conduit, its high diversity of wildlife reservoirs and its environmental characteristics. Major outbreaks of exotic diseases, pests and weeds in Australia can cost in excess of $1 billion; however, most expenditure on health security is reactive apart from preventive measures undertaken for a few high profile diseases, pests and weeds. Large gains in health security could therefore be made by spending more on pre-emptive approaches to reduce the risk of outbreaks, invasion/spread and establishment, despite these gains being difficult to quantify. Although biosecurity threats may initially have regional impacts (e.g. Hendra virus), a break down in security in health security hot spots can have national and international consequences, as has been seen recently in other regions with the emergence of SARS and pandemic avian influenza. Novel approaches should be driven by building research and management capacity, particularly in the regions where threats arise, a model that is applicable both in Australia and in other regions of the world that value and therefore aim to improve their strategies for maintaining health security. Copyright © 2012 Elsevier Ltd. All rights reserved.
Why information security belongs on the CFO's agenda.
Quinnild, James; Fusile, Jeff; Smith, Cindy
2006-02-01
Healthcare financial executives need to understand the complex and growing role of information security in supporting the business of health care. The biggest security gaps in healthcare organizations occur in strategy and centralization, business executive preparation, and protected health information. CFOs should collaborate with the CIO in engaging a comprehensive framework to develop, implement, communicate, and maintain an enterprisewide information security strategy.
Physical-enhanced secure strategy in an OFDM-PON.
Zhang, Lijia; Xin, Xiangjun; Liu, Bo; Yu, Jianjun
2012-01-30
The physical layer of optical access network is vulnerable to various attacks. As the dramatic increase of users and network capacity, the issue of physical-layer security becomes more and more important. This paper proposes a physical-enhanced secure strategy for orthogonal frequency division multiplexing passive optical network (OFDM-PON) by employing frequency domain chaos scrambling. The Logistic map is adopted for the chaos mapping. The chaos scrambling strategy can dynamically allocate the scrambling matrices for different OFDM frames according to the initial condition, which enhance the confidentiality of the physical layer. A mathematical model of this secure system is derived firstly, which achieves a secure transmission at physical layer in OFDM-PON. The results from experimental implementation using Logistic mapped chaos scrambling are also given to further demonstrate the efficiency of this secure strategy. An 10.125 Gb/s 64QAM-OFDM data with Logistic mapped chaos scrambling are successfully transmitted over 25-km single mode fiber (SMF), and the experimental results show that proposed security scheme can protect the system from eavesdropper and attacker, while keep a good performance for the legal ONU.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-23
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62523; File No. SR-ISE-2010-73] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change Relating to... Securities Exchange Act of 1934 (``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71066; File No. SR-ISE-2013-66] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed.... Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70362; File No. SR-ISE-2013-42] Self-Regulatory..., 2013, International Securities Exchange, LLC (``Exchange'') filed with the Securities and Exchange...\\ and Rule 19b-4 thereunder,\\2\\ a proposed rule change to list and trade options on the Nations VolDex...
NASA Astrophysics Data System (ADS)
Hamid, Nasri A.; Mujaini, Madihah; Mohamed, Abdul Aziz
2017-01-01
The Center for Nuclear Energy (CNE), College of Engineering, Universiti Tenaga Nasional (UNITEN) has a great responsibility to undertake educational activities that promote developing human capital in the area of nuclear engineering and technology. Developing human capital in nuclear through education programs is necessary to support the implementation of nuclear power projects in Malaysia in the near future. In addition, the educational program must also meet the nuclear power industry needs and requirements. In developing a certain curriculum, the contents must comply with the university's Outcomes Based Education (OBE) philosophy. One of the important courses in the nuclear curriculum is in the area of nuclear security. Basically the nuclear security course covers the current issues of law, politics, military strategy, and technology with regard to weapons of mass destruction and related topics in international security, and review legal regulations and political relationship that determine the state of nuclear security at the moment. In addition, the course looks into all aspects of the nuclear safeguards, builds basic knowledge and understanding of nuclear non-proliferation, nuclear forensics and nuclear safeguards in general. The course also discusses tools used to combat nuclear proliferation such as treaties, institutions, multilateral arrangements and technology controls. In this paper, we elaborate the development of undergraduate nuclear security course at the College of Engineering, Universiti Tenaga Nasional. Since the course is categorized as mechanical engineering subject, it must be developed in tandem with the program educational objectives (PEO) of the Bachelor of Mechanical Engineering program. The course outcomes (CO) and transferrable skills are also identified. Furthermore, in aligning the CO with program outcomes (PO), the PO elements need to be emphasized through the CO-PO mapping. As such, all assessments and distribution of Bloom Taxonomy levels are assigned in accordance with the CO-PO mapping. Finally, the course has to fulfill the International Engineering Alliance (IEA) Graduate Attributes of the Washington Accord.
14 CFR 1203.304 - Internal effect.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.304 Internal effect. The effect of security protection on... effects and added costs inherent in a security classification must be assessed in light of the detrimental...
14 CFR 1203.304 - Internal effect.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Classification Principles and Considerations § 1203.304 Internal effect. The effect of security protection on... effects and added costs inherent in a security classification must be assessed in light of the detrimental...
Global health goals: lessons from the worldwide effort to eradicate poliomyelitis.
Aylward, R Bruce; Acharya, Arnab; England, Sarah; Agocs, Mary; Linkins, Jennifer
2003-09-13
The Global Polio Eradication Initiative was launched in 1988. Assessment of the politics, production, financing, and economics of this international effort has suggested six lessons that might be pertinent to the pursuit of other global health goals. First, such goals should be based on technically sound strategies with proven operational feasibility in a large geographical area. Second, before launching an initiative, an informed collective decision must be negotiated and agreed in an appropriate international forum to keep to a minimum long-term risks in financing and implementation. Third, if substantial community engagement is envisaged, efficient deployment of sufficient resources at that level necessitates a defined, time-limited input by the community within a properly managed partnership. Fourth, although the so-called fair-share concept is arguably the best way to finance such goals, its limitations must be recognised early and alternative strategies developed for settings where it does not work. Fifth, international health goals must be designed and pursued within existing health systems if they are to secure and sustain broad support. Finally, countries, regions, or populations most likely to delay the achievement of a global health goal should be identified at the outset to ensure provision of sufficient resources and attention. The greatest threats to poliomyelitis eradication are a financing gap of US 210 million dollars and difficulties in strategy implementation in at most five countries.
Egbon, I N; Ayertey, J N
2013-05-01
In recent times, the unusual presence of Sitophilus on cowpea has become an issue in Ghana as it constitutes a threat to food sufficiency and food security; this, by extension, necessitated the execution of this survey to establish the specific identity of the insect and its incidence, on stored cowpea in Ghana and consequently assess the level of awareness of traders and the management strategies employed. Using internal morphological identification techniques, the insect was identified as Sitophilus oryzae with an incidence rate of 12, 22 and 20% as against 50, 41 and 42% incidence rate of Callosobruchus maculatus after 30, 60 and 90 days respectively, of undisturbed storage of cowpea within the marketing systems in Accra, Ghana. Relatively low number of retailers (35.44%, N = 79) was aware of this occurrence, with 91.14% of this employing the energy-demanding and time-consuming sieving techniques as their main control strategies. This paper draws attention to the possible worsening of food insecurity already eminent in Africa for insects are no respecters of international or geo-political boundaries as they can spread to other countries, should this observation be left unchecked.
Stucki, Gerold; Bickenbach, Jerome; Melvin, John
2017-09-01
A complete understanding of the experience of health requires information relevant not merely to the health indicators of mortality and morbidity but also to functioning-that is, information about what it means to live in a health state, "the lived experience of health." Not only is functioning information relevant to healthcare and the overall objectives of person-centered healthcare but to the successful operation of all components of health systems.In light of population aging and major epidemiological trends, the health strategy of rehabilitation, whose aim has always been to optimize functioning and minimize disability, will become a key health strategy. The increasing prominence of the rehabilitative strategy within the health system drives the argument for the integration of functioning information as an essential component in national health information systems.Rehabilitation professionals and researchers have long recognized in WHO's International Classification of Functioning, Disability and Health the best prospect for an internationally recognized, sufficiently complete and powerful information reference for the documentation of functioning information. This paper opens the discussion of the promise of integrating the ICF as an essential component in national health systems to secure access to functioning information for rehabilitation, across health systems and countries.
McLaughlin, Katie A; Zeanah, Charles H; Fox, Nathan A; Nelson, Charles A
2012-01-01
Children reared in institutions experience elevated rates of psychiatric disorders. Inability to form a secure attachment relationship to a primary caregiver is posited to be a central mechanism in this association. We determined whether the ameliorative effect of a foster care (FC) intervention on internalizing disorders in previously institutionalized children was explained by the development of secure attachment among children placed in FC. Second we evaluated the role of lack of attachment in an institutionalized sample on the etiology of internalizing disorders within the context of a randomized trial. A sample of 136 children (aged 6-30 months) residing in institutions was recruited in Bucharest, Romania. Children were randomized to FC (n = 68) or to care as usual (CAU; n = 68). Foster parents were recruited, trained, and overseen by the investigative team. Attachment security at 42 months was assessed using the Strange Situation Procedure, and internalizing disorders at 54 months were assessed using the Preschool Age Psychiatric Assessment. Girls in FC had fewer internalizing disorders than girls in CAU (OR = 0.17, p = .006). The intervention had no effect on internalizing disorders in boys (OR = 0.47, p = .150). At 42 months, girls in FC were more likely to have secure attachment than girls in CAU (OR = 12.5, p < .001), but no difference was observed in boys (OR = 2.0, p = .205). Greater attachment security predicted lower rates of internalizing disorders in both sexes. Development of attachment security fully mediated intervention effects on internalizing disorders in girls. Placement into FC facilitated the development of secure attachment and prevented the onset of internalizing disorders in institutionalized girls. The differential effects of FC on attachment security in boys and girls explained gender differences in the intervention effects on psychopathology. Findings provide evidence for the critical role of disrupted attachment in the etiology of internalizing disorders in children exposed to institutionalization. © 2011 The Authors. Journal of Child Psychology and Psychiatry © 2011 Association for Child and Adolescent Mental Health.
The 2015 National Security Strategy: Authorities, Changes, Issues for Congress
2016-02-26
climate change ; ensure access to shared spaces (expanding cyberspace and including outer space and air and maritime security); and increase global...hand, one could conclude that these, along with confronting climate change , convey both a wider range of national security challenges in terms of...The 2015 National Security Strategy: Authorities, Changes , Issues for Congress Nathan J. Lucas, Coordinator Section Research Manager Kathleen
China’s Energy Security: The Grand Hedging Strategy
2010-05-01
spotlight. The key to sustaining this dynamic economic growth is access to petroleum resources. The central question of this monograph is as follows...Is China’s energy security strategy liberal-institutionalist or realist-mercantilist? Using a qualitative case study methodology that explores the...dependent variable -- energy security -- using three independent variables (cost of supply, reliability of supply, and security of supply), China’s
Focusing America’s National Powers
2006-04-14
governments with market economies. 15. SUBJECT TERMS National Security, National Powers, Sources of Power, National Security Council, National Security... Strategy , Six-phased Campaign Plan, JIACG, DIME 16. SECURITY CLASSIFICATION OF: Unclassified 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME...satisfaction of the requirements of a Master of Science Degree in Joint Campaign Planning and Strategy . The contents of this paper reflect my own
Energy Security Strategies: An Analysis of Tanzania and Mozambique
2016-06-01
prioritizes domestic consumption or export of energy resources. The strategy a government chooses affects the overall energy security of that country...This thesis seeks to explain why countries pursue energy strategies that focus on domestic consumption of indigenous energy resources instead of...energy strategy that either prioritizes domestic consumption or export of energy resources. The strategy a government chooses affects the overall
Taking a climate chance: a procedural critique of Vietnam's climate change strategy.
Fortier, François
2010-01-01
This article asks through what processes and for which interests the emerging Vietnamese climate change strategy is being designed, and if, ultimately, it is likely or not to be effective in the face of the looming threat. Through a review of an emerging body of literature and field observations, the paper finds the strategy partial and problematic in several ways. Its technocratic process prevents a pluralist representation of interests, obfuscating and perpetuating sectorial ones, at the expense of a more transparent and democratic resource allocation. The strategy therefore reflects and reinforces existing power relations in both politics and production. It feeds into a business-as-usual complacency, protecting national and international interests vested in unchallenged continuity, even when considering post-carbon technological fixes, which largely serve to expand capital accumulation opportunities. The article concludes that the national climate change strategy provides an illusion of intervention and security, but largely fails to identify and mitigate the underlying causes of climate change, or to lay the ground for a robust mid- and long-term adaptation strategy that can cope with yet unknown levels of climatic and other structural changes.
17 CFR 229.308 - (Item 308) Internal control over financial reporting.
Code of Federal Regulations, 2010 CFR
2010-04-01
... over financial reporting. 229.308 Section 229.308 Commodity and Securities Exchanges SECURITIES AND... § 229.308 (Item 308) Internal control over financial reporting. (a) Management's annual report on internal control over financial reporting. Provide a report of management on the registrant's internal...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Internal risk management control system requirements for supervised investment bank holding companies. 240.17i-4 Section 240.17i-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Internal risk management control system requirements for supervised investment bank holding companies. 240.17i-4 Section 240.17i-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934...
Kim, Bo-Ram; Stifter, Cynthia A.; Philbrook, Lauren E.; Teti, Douglas M.
2014-01-01
The present study examines the influences of mothers’ emotional availability towards their infants during bedtime, infant attachment security, and interactions between bedtime parenting and attachment with infant temperamental negative affectivity, on infants’ emotion regulation strategy use at 12 and 18 months. Infants’ emotion regulation strategies were assessed during a frustration task that required infants to regulate their emotions in the absence of parental support. Whereas emotional availability was not directly related to infants’ emotion regulation strategies, infant attachment security had direct relations with infants’ orienting towards the environment and tension reduction behaviors. Both maternal emotional availability and security of the mother-infant attachment relationship interacted with infant temperamental negative affectivity to predict two strategies that were less adaptive in regulating frustration. PMID:24995668
Availability of health data: requirements and solutions.
Espinosa, A L
1998-03-01
There is an increasing recognition of the importance of the health data available for the corporate healthcare system model with the electronic patient record as the central unit of the healthcare information systems. There is also increasing recognition of the importance of developing simple international standards for record components, including clinical and administrative requirements. Aspects of security and confidentiality have to be reviewed in detail. The advantages of having health data available when and where it is required will modify healthcare delivery and support cost control with economies of scale and sharing of resources. The infrastructure necessary to make this model a reality is being developed through different international initiatives, which have to be integrated and co-ordinated to have common disaster planning strategies and better funding alternatives.
77 FR 45354 - Notification of Single Source Cooperative Agreement Award for Project Hope
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-31
... Support of National Health Security Strategy (2009) and Implementation Plan (2012) and Homeland Security... Directive-21 (2007) and the National Health Security Strategy (2009) and Implementation Plan (2012). In the... of a Health Affairs thematic issue that will identify, explore and propose policy options for...
Development of Approach for Long-Term Management of Disused Sealed Radioactive Sources - 13630
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kinker, M.; Reber, E.; Mansoux, H.
Radioactive sources are used widely throughout the world in a variety of medical, industrial, research and military applications. When such radioactive sources are no longer used and are not intended to be used for the practice for which an authorization was granted, they are designated as 'disused sources'. Whether appropriate controls are in place during the useful life of a source or not, the end of this useful life is often a turning point after which it is more difficult to ensure the safety and security of the source over time. For various reasons, many disused sources cannot be returnedmore » to the manufacturer or the supplier for reuse or recycling. When these attempts fail, disused sources should be declared as radioactive waste and should be managed as such, in compliance with relevant international legal instruments and safety standards. However, disposal remains an unresolved issue in many counties, due to in part to limited public acceptance, insufficient funding, and a lack of practical examples of strategies for determining suitable disposal options. As a result, disused sources are often stored indefinitely at the facilities where they were once used. In order to prevent disused sources from becoming orphan sources, each country must develop and implement a comprehensive waste management strategy that includes disposal of disused sources. The International Atomic Energy Agency (IAEA) fosters international cooperation between countries and encourages the development of a harmonized 'cradle to grave' approach to managing sources consistent with international legal instruments, IAEA safety standards, and international good practices. This 'cradle to grave' approach requires the development of a national policy and implementing strategy, an adequate legal and regulatory framework, and adequate resources and infrastructure that cover the entire life cycle, from production and use of radioactive sources to disposal. (authors)« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Patch International, Inc., QuadTech International, Inc., Strategic Resources, Ltd., and Virtual Medical Centre, Inc.; Order of Suspension of Trading... lack of current and accurate information concerning the securities of Virtual Medical Centre, Inc...
Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.
Abdalzaher, Mohamed S; Seddik, Karim; Elsabrouty, Maha; Muta, Osamu; Furukawa, Hiroshi; Abdel-Rahman, Adel
2016-06-29
We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.
The 2015 National Security Strategy: Authorities, Changes, Issues for Congress
2016-04-05
Strategy: Authorities, Changes, Issues for Congress Congressional Research Service 3 reverse the spread of nuclear and biological weapons and...secure nuclear materials; advance peace, security, and opportunity in the greater Middle East; invest in the capacity of strong and capable...and norms on issues ranging from maritime security to trade and human rights.” 6 On Russia, the document says, “... we will continue to impose
Managing the Aviation Insider Threat
2010-12-01
World Airport NSAS National Strategy for Aviation Security OIS Office of Intelligence SIDA Security Identification Display Area STA Security...Security of the secured area”, 1542.205, “Security of the security identification display area ( SIDA )”, and 1542.209, “Fingerprint-based criminal
17 CFR 200.72 - Supervision of internal organization.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Supervision of internal organization. 200.72 Section 200.72 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Canons of Ethics § 200.72 Supervision of...
17 CFR 200.72 - Supervision of internal organization.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Supervision of internal organization. 200.72 Section 200.72 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Canons of Ethics § 200.72 Supervision of...
17 CFR 200.72 - Supervision of internal organization.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Supervision of internal organization. 200.72 Section 200.72 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Canons of Ethics § 200.72 Supervision of...
17 CFR 200.72 - Supervision of internal organization.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Supervision of internal organization. 200.72 Section 200.72 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Canons of Ethics § 200.72 Supervision of...
17 CFR 200.72 - Supervision of internal organization.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Supervision of internal organization. 200.72 Section 200.72 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Canons of Ethics § 200.72 Supervision of...
75 FR 881 - Meeting of Advisory Committee on International Communications and Information Policy
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-06
... development issues, international spectrum requirements and harmonization, cyber-security, and data protection... will discuss key issues of importance to U.S. communications policy interests including future... Bureau of Diplomatic Security to enhance the Department's security by tracking visitor traffic and to...
17 CFR 240.15c3-4 - Internal risk management control systems for OTC derivatives dealers.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Internal risk management control systems for OTC derivatives dealers. 240.15c3-4 Section 240.15c3-4 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL RULES AND REGULATIONS, SECURITIES EXCHANGE ACT OF 1934 Rules and Regulations Under the...
The Relative Ineffectiveness of Criminal Network Disruption
Duijn, Paul A. C.; Kashirin, Victor; Sloot, Peter M. A.
2014-01-01
Researchers, policymakers and law enforcement agencies across the globe struggle to find effective strategies to control criminal networks. The effectiveness of disruption strategies is known to depend on both network topology and network resilience. However, as these criminal networks operate in secrecy, data-driven knowledge concerning the effectiveness of different criminal network disruption strategies is very limited. By combining computational modeling and social network analysis with unique criminal network intelligence data from the Dutch Police, we discovered, in contrast to common belief, that criminal networks might even become ‘stronger’, after targeted attacks. On the other hand increased efficiency within criminal networks decreases its internal security, thus offering opportunities for law enforcement agencies to target these networks more deliberately. Our results emphasize the importance of criminal network interventions at an early stage, before the network gets a chance to (re-)organize to maximum resilience. In the end disruption strategies force criminal networks to become more exposed, which causes successful network disruption to become a long-term effort. PMID:24577374
The relative ineffectiveness of criminal network disruption.
Duijn, Paul A C; Kashirin, Victor; Sloot, Peter M A
2014-02-28
Researchers, policymakers and law enforcement agencies across the globe struggle to find effective strategies to control criminal networks. The effectiveness of disruption strategies is known to depend on both network topology and network resilience. However, as these criminal networks operate in secrecy, data-driven knowledge concerning the effectiveness of different criminal network disruption strategies is very limited. By combining computational modeling and social network analysis with unique criminal network intelligence data from the Dutch Police, we discovered, in contrast to common belief, that criminal networks might even become 'stronger', after targeted attacks. On the other hand increased efficiency within criminal networks decreases its internal security, thus offering opportunities for law enforcement agencies to target these networks more deliberately. Our results emphasize the importance of criminal network interventions at an early stage, before the network gets a chance to (re-)organize to maximum resilience. In the end disruption strategies force criminal networks to become more exposed, which causes successful network disruption to become a long-term effort.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Caskey, D.L.; Olascoaga, M.T.
1990-01-01
Sandia National Laboratories has been involved in designing, installing and evaluating security systems for various applications during the past 15 years. A systems approach to security that evolved from this experience was applied to aviation security for the Federal Aviation Administration. A general systems study of aviation security in the United States was concluded in 1987. One result of the study was a recommendation that an enhanced security system concept designed to meet specified objectives be demonstrated at an operational airport. Baltimore-Washington International Airport was selected as the site for the demonstration project which began in 1988 and will bemore » completed in 1992. This article introduced the systems approach to airport security and discussed its application at Baltimore-Washington International Airport. Examples of design features that could be included in an enhanced security concept also were presented, including details of the proposed Ramps Area Intrusion Detection System (RAIDS).« less
International perspectives on sexual harassment of college students: the sounds of silence.
Paludi, Michele; Nydegger, Rudy; Desouza, Eros; Nydegger, Liesl; Dicker, Kelsey Allen
2006-11-01
The incidence, psychological dimensions, reporting, and impact of sexual harassment of college students throughout the world are reviewed. Special attention is paid to methodological constraints in conducting cross-cultural research in sexual harassment, including difficulty in securing research participants, different methodologies to collect incidence data, use of retrospective data, and varying, definitions of sexual harassment. Recommendations for implementing intervention programs are offered. The strategies suggested deal with the social causes that maintain the harassment, including renegotiating the balance of power between men and women.
2013-12-12
self-government and economic growth. The United States Government should reaffirm the 2011 International Strategy for Cyberspace. It should stress ...intimidated, or cowed by government officials. If they are, it is “We the People” who will suffer. Part of the responsibility of our free press is...noted that if a similar or worse incident or series of attacks were to occur in the future, many Americans, in the fear and heat of the moment
Strategies to Minimize the Effects of Information Security Threats on Business Performance
ERIC Educational Resources Information Center
Okoye, Stella Ifeyinwa
2017-01-01
Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…
2010-06-01
Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century, 947. 11 Marco A. Ferroni and Ashoka Mody, International Public...Security and Defence Policy, 67–70; Howorth, Security and Defence Policy in the European Union, 152–154. 47 Hubert Zimmermann, “Security Exporters...consilium.europa.eu/showPage.aspx?id=1519&lang=en (accessed 12 March 2010). Ferroni, Marco A. and Ashoka Mody. International Public Goods: Incentives
The Social and Economic Security of International Students: A New Zealand Study
ERIC Educational Resources Information Center
Sawir, Erlenawati; Marginson, Simon; Nyland, Chris; Ramia, Gaby; Rawlings-Sanaei, Felicity
2009-01-01
International education has generated complex problems of governance. As well as being beneficiaries of educational services and consumers of a product, international students are also migrants, workers and beings with civil rights. Arguably, the regulation of international student security as consumer protection fails to recognize this full range…
Kim, Bo-Ram; Stifter, Cynthia A; Philbrook, Lauren E; Teti, Douglas M
2014-11-01
The present study examines the influences of mothers' emotional availability toward their infants during bedtime, infant attachment security, and interactions between bedtime parenting and attachment with infant temperamental negative affectivity, on infants' emotion regulation strategy use at 12 and 18 months. Infants' emotion regulation strategies were assessed during a frustration task that required infants to regulate their emotions in the absence of parental support. Whereas emotional availability was not directly related to infants' emotion regulation strategies, infant attachment security had direct relations with infants' orienting toward the environment and tension reduction behaviors. Both maternal emotional availability and security of the mother-infant attachment relationship interacted with infant temperamental negative affectivity to predict two strategies that were less adaptive in regulating frustration. Copyright © 2014 Elsevier Inc. All rights reserved.
2013-05-24
Secretary of Homeland Security also has the responsibility for establishing International Security Cooperation with the countries of Canada and Mexico ...and goals”84 to improve its culture and morale issues. However, further study is required to determine ways to: de -conflict the overlap of...National Preparedness Description is one of the requirements for Presidental Policy Directive-8. 55 the Joint Staff integrates internal and external
Trub, Leora; Quinlan, Ella; Starks, Tyrel J; Rosenthal, Lisa
2017-09-01
With increasing numbers of same-sex couples raising children in the United States, discriminatory attitudes toward children of same-sex parents (ACSSP) are of increasing concern. As with other forms of stigma and discrimination, lesbian, gay, and bisexual (LGB) individuals are at risk for internalizing these societal attitudes, which can negatively affect parenting-related decisions and behaviors and the mental and physical health of their children. Secure attachment is characterized by positive views of the self as loveable and worthy of care that are understood to develop in early relationships with caregivers. Secure attachment has been associated with positive mental and physical health, including among LGB individuals and couples. This study aimed to test the potential buffering role of secure attachment against stigma internalization by examining associations among secure attachment, discrimination, internalized homonegativity (IH), and ACSSP in an online survey study of 209 U.S. adults in same-sex relationships. Bootstrap analyses supported our hypothesized moderated mediation model, with secure attachment being a buffer. Greater discrimination was indirectly associated with more negative ACSSP through greater IH for individuals with mean or lower levels, but not for individuals with higher than average levels of secure attachment, specifically because among those with higher levels of secure attachment, discrimination was not associated with IH. These findings build on and extend past research, with important implications for future research and clinical work with LGB individuals, same-sex couples, and their families, including potential implementation of interventions targeting attachment security. © 2016 Family Process Institute.
NASA Astrophysics Data System (ADS)
Blount, P. J.
2017-06-01
Since the very beginning of the space age, security has been the critical, overriding concern at the heart of both international and domestic space law regimes. While these regimes certainly encompass broader interests, such as commercial uses of outer space, they are built on a legal foundation that is largely intended to regularize interactions among space actors to ensure security, safety, and sustainability in the space environment. Space security law, as a result, has central goals of both maintaining peace and providing security as a public good for the benefit of humankind. The idea of security is a technical and political construct. The law is a tool that is used to articulate that construct as concept and operationalize it as a value. As such, space security law is a network of law and regulation that governs a wide variety of space activities. There are four broad categories that typify the various manifestations of space security law: international peace and security; national security; human security; and space safety and sustainability. International peace and security, the first category, is directly concerned with the international law and norms that have been adopted to decrease the risk of conflict between states. National security, category two, consists of domestic law that implements, at the national level, the obligations found in the first category as well as law that promotes other national security goals. Human security, the third category, is the loose set of law and policy directed at the use of space for the protection of human populations, such as disaster response and planetary protection. Finally, the fourth category, space safety and security, represents the emerging body of law and policy that seeks to protect the space environment through measures that address space debris and harmful contamination. Obviously, these categories overlap and laws can serve duplicative purposes, but this compartmentalization reveals much about the legal structures that surround core security projects being pursued in and through space.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-29
... Secure Solutions USA, SBM Management Services, LP, ALSCO Portland Industrial, VWR International, Inc... G4S Secure Solutions USA, SBM Management Services, LP, Alsco Portland Industrial, VWR International... workers from Express Temporaries, Aerotek Commercial Staffing, G4S Secure Solutions USA, SBM Management...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-20
... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Amend the...'') filed with the Securities and Exchange Commission (``Commission'') the proposed rule change as described... Commission is publishing this notice to solicit comments on the proposed rule change from interested persons...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-27
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68491; File No. SR-ISE-2012-101] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate... Prices Until the Close of Trading on the Second Business Day Prior to Monthly Expiration in Unusual...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-04
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69659; File No. SR-MIAX-2013-22] Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate... the Second Business Day Prior to Expiration in Unusual Market Conditions May 29, 2013. Pursuant to...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62280] Order Granting Application for Extension... International Securities Exchange, LLC Relating to the Ownership Interest of International Securities Exchange Holdings, Inc. in an Electronic Communications Network June 11, 2010. I. Introduction On December 22, 2008...
Measuring Global Water Security Towards Sustainable Development Goals
NASA Technical Reports Server (NTRS)
Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide
2016-01-01
Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-04-01
This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important tomore » leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.« less
Peace-enforcement: Mission, strategy, and doctrine. Monograph report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kohler, J.B.
This monograph examines a new military mission-peace-enforcement. It does so through a five part strategic process that links national interests and national security strategy to tactical operations. it asserts that US national security strategy is evolving as a result of the end of the Cold War and that a new strategy will lead to new military missions. The monograph first describes a limited spectrum of military operations that comprise a peace-enforcement mission. Next, it reviews enduring US national interests then analyzes evolving national security strategy to determine if these elements of strategy support the need for a peace-enforcement mission. Themore » monograph then examines national military strategy, operational level strategy and joint guidance, and finally, US tactical doctrine to determine if peace-enforcement is a mission the US military can execute today. The monograph concludes that national interests and evolving national security strategy will emphasize promotion of democracy and stability in lieu of Cold War deterrence. The national military strategy partially supports this shift; support should increase as the Clinton administration clarifies its policy and solidifies the shift from containment. Lastly, the monograph finds there is sufficient operational and tactical level guidance to conduct the mission and recommends formal acceptance of the peace-enforcement mission into joint doctrine.« less
Spousal Coping Strategies in the Shadow of Terrorism.
Shechory-Bitton, Mally; Cohen-Louck, Keren
2017-11-01
The present study focuses on spousal differences in reaction to ongoing exposure to terror and security threats. Sixty-eight married couples with children living in a region exposed to ongoing security threats were evaluated. All participants completed questionnaires on objective exposure (number of incidents) and subjective exposure (sense of fear) to terrorism and security threats, posttraumatic stress disorder (PTSD) symptoms, and their coping strategies with this ongoing exposure. Mothers reported higher levels of fear and PTSD symptoms, although their objective levels of exposure did not differ from those of their husbands. Similarities were found in coping strategies adopted by mothers and fathers to cope with life in the shadow of terrorism. Both mothers and fathers integrated emotion- and problem-focused coping strategies, with greater use of the latter. These similarities partially contradict research findings suggesting gender differences in coping with exposure to security threats. The results support the need for further research into investigating the role of dyadic coping in the context of prolonged exposure to security threats.
VanTieghem, Michelle R.; Gabard-Durnam, Laurel; Goff, Bonnie; Flannery, Jessica; Humphreys, Kathryn L.; Telzer, Eva H.; Caldera, Christina; Louie, Jennifer Y.; Shapiro, Mor; Bolger, Niall; Tottenham, Nim
2018-01-01
Institutional caregiving is associated with significant deviations from species-expected caregiving, altering the normative sequence of attachment formation and placing children at risk for long-term emotional difficulties. However, little is known about factors that can promote resilience following early institutional caregiving. In the current study, we investigated how adaptations in affective processing (i.e. positive valence bias) and family-level protective factors (i.e. secure parent-child relationships) moderate risk for internalizing symptoms in Previously Institutionalized (PI) youth. Children and adolescents with and without a history of institutional care performed a laboratory-based affective processing task and self-reported measures of parent-child relationship security. PI youth were more likely than comparison youth to show positive valence biases when interpreting ambiguous facial expressions. Both positive valence bias and parent-child relationship security moderated the association between institutional care and parent-reported internalizing symptoms, such that greater positive valence bias and more secure parent-child relationships predicted fewer symptoms in PI youth. However, when both factors were tested concurrently, parent-child relationship security more strongly moderated the link between PI status and internalizing symptoms. These findings suggest that both individual-level adaptations in affective processing and family-level factors of secure parent-child relationships may ameliorate risk for internalizing psychopathology following early institutional caregiving. PMID:28401841
Vantieghem, Michelle R; Gabard-Durnam, Laurel; Goff, Bonnie; Flannery, Jessica; Humphreys, Kathryn L; Telzer, Eva H; Caldera, Christina; Louie, Jennifer Y; Shapiro, Mor; Bolger, Niall; Tottenham, Nim
2017-05-01
Institutional caregiving is associated with significant deviations from species-expected caregiving, altering the normative sequence of attachment formation and placing children at risk for long-term emotional difficulties. However, little is known about factors that can promote resilience following early institutional caregiving. In the current study, we investigated how adaptations in affective processing (i.e., positive valence bias) and family-level protective factors (i.e., secure parent-child relationships) moderate risk for internalizing symptoms in previously institutionalized (PI) youth. Children and adolescents with and without a history of institutional care performed a laboratory-based affective processing task and self-reported measures of parent-child relationship security. PI youth were more likely than comparison youth to show positive valence biases when interpreting ambiguous facial expressions. Both positive valence bias and parent-child relationship security moderated the association between institutional care and parent-reported internalizing symptoms, such that greater positive valence bias and more secure parent-child relationships predicted fewer symptoms in PI youth. However, when both factors were tested concurrently, parent-child relationship security more strongly moderated the link between PI status and internalizing symptoms. These findings suggest that both individual-level adaptations in affective processing and family-level factors of secure parent-child relationships may ameliorate risk for internalizing psychopathology following early institutional caregiving.
Roles for international military medical services in stability operations (security sector reform).
Bricknell, M C M; Thompson, D
2007-06-01
This is the second in a series of three papers that examine the role of international military medical services in stability operations in unstable countries. The paper discusses security sector reform in general terms and highlights the interdependency of the armed forces, police, judiciary and penal systems in creating a 'secure environment'. The paper then looks at components of a local military medical system for a counter-insurgency campaign operating on interior lines and the contribution and challenges faced by the international military medical community in supporting the development of this system. Finally the paper highlights the importance of planning the medical support of the international military personnel who will be supporting wider aspects of security sector reform. The paper is based on background research and my personal experience as Medical Director in the Headquarters of the NATO International Stability Assistance Force in Afghanistan in 2006.
77 FR 59690 - Titan Resources International, Corp.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-28
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Titan Resources International, Corp.; Order of... a lack of current and accurate information concerning the securities of Titan Resources International, Corp. (``Titan''). Titan is a Wyoming corporation purportedly based in Ontario, Canada. Questions...
17 CFR 229.308T - (Item 308T) Internal control over financial reporting.
Code of Federal Regulations, 2010 CFR
2010-04-01
... over financial reporting. 229.308T Section 229.308T Commodity and Securities Exchanges SECURITIES AND... § 229.308T (Item 308T) Internal control over financial reporting. Note to Item 308T: This is a special... internal control over financial reporting. Provide a report of management on the registrant's internal...
CMMI(Registered) for Acquisition, Version 1.3. CMMI-ACQ, V1.3
2010-11-01
and Software Engineering – System Life Cycle Processes [ ISO 2008b] ISO /IEC 27001 :2005 Information technology – Security techniques – Information...International Organization for Standardization and International Electrotechnical Commission. ISO /IEC 27001 Information Technology – Security Techniques...International Organization for Standardization/International Electrotechnical Commission ( ISO /IEC) body of standards. CMMs focus on improving processes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pfaltzgraff, R.L.; Dougherty, J.E.; Davis, J.K.
1984-04-11
This study addresses the international security perspectives of the Republic of Korea (South Korea). Particular emphasis is placed on the way in which American, Soviet, Chinese and Japanese interests intersect on the Korean Peninsula and on their impact upon the military balance between North and South Korea. A major portion of this analysis is devoted as well to an examination of inter-Korean relations, spotlighting the varying security implications of the continued partition, as opposed to the eventual reunification of the two Koreas. The importance to South Korea of the Seoul-Washington-Tokyo relationship is discussed, as well as the effect of themore » Sino-Soviet dispute on South Korean defense and foreign policies. In order to clarify further the strategic perspectives of key decision makers in Seoul, the study reviewed and assessed South Korean views on such controversial issues as the expansion of Japan's self-defense forces, the withdrawal of the U.S. ground troops from the Korean peninsula, Sino-Soviet moves toward rapprochement, and the proliferation of nuclear weapons in Northeast Asia.« less
Afzal, Zabia; Muntaner, Carles; Chung, Haejoo; Mahmood, Qamar; Ng, Edwin; Schrecker, Ted
2013-01-01
Flexicurity, or the integration of labor market flexibility with social security and active labor market policies, has figured prominently in economic and social policy discussions in Europe since the mid-1990s. Such policies are designed to transcend traditional labor-capital conflicts and to form a mutually supportive nexus of flexibility and security within a climate of intensified competition and rapid technological change. International bodies have marketed flexicurity as an innovative win-win strategy for employers and workers alike, commonly citing Denmark and The Netherlands as exemplars of best practice. In this article, we apply a social determinants of health framework to conduct a scoping review of the academic and gray literature to: (a) better understand the empirical associations between flexicurity practices and population health in Denmark and (b) assess the relevance and feasibility of implementing such policies to improve health and reduce health inequalities in Ontario, Canada. Based on 39 studies meeting our full inclusion criteria, preliminary findings suggest that flexicurity is limited as a potential health promotion strategy in Ontario, offers more risks to workers' health than benefits, and requires the strengthening of other social protections before it could be realistically implemented within a Canadian context.
Leveraging the laboratory response network model for the global health security agenda.
Mangal, Chris N; Maryogo-Robinson, Lucy
2014-01-01
Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks-natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern.
Leveraging the Laboratory Response Network Model for the Global Health Security Agenda
Maryogo-Robinson, Lucy
2014-01-01
Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks—natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern. PMID:25254916
31 CFR 10.6 - Enrollment as an enrolled agent or enrolled retirement plan agent.
Code of Federal Regulations, 2011 CFR
2011-07-01
... or enrolled retirement plan agent's name, prior address, new address, social security number or tax... individuals licensed to practice before the Internal Revenue Service who have a social security number or tax... Internal Revenue Service who have a social security number or tax identification number that ends with the...
33 CFR 165.113 - Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA 165.113 Section 165.113 Navigation and Navigable Waters..., MA (a) Location. The permanent security zone consists of four sectors that may be activated in part...
33 CFR 165.113 - Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA 165.113 Section 165.113 Navigation and Navigable Waters..., MA (a) Location. The permanent security zone consists of four sectors that may be activated in part...
33 CFR 165.113 - Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA. 165.113 Section 165.113 Navigation and Navigable Waters..., MA. (a) Location. The permanent security zone consists of four sectors that may be activated in part...
33 CFR 165.113 - Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA. 165.113 Section 165.113 Navigation and Navigable Waters..., MA. (a) Location. The permanent security zone consists of four sectors that may be activated in part...
33 CFR 165.113 - Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security Zone: Dignitary arrival/departure Logan International Airport, Boston, MA 165.113 Section 165.113 Navigation and Navigable Waters..., MA (a) Location. The permanent security zone consists of four sectors that may be activated in part...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-02
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63955; File No. SR-ISE-2010-73] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Granting Approval of a Proposed Rule Change To Modify Qualified Contingent Cross Order Rules February 24, 2011. I. Introduction On July 14, 2010, the...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-27
... the provisions of the Department of Defense National Industrial Security Program Operating Manual, an... Department of Defense National Industrial Security Program Operating Manual (unless such requirements are in..., Arms Control and International Security, Department of State. [FR Doc. 2010-21450 Filed 8-26-10; 8:45...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-20
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70877; File No. SR-MIAX-2013-48] Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change To Amend MIAX Rules 1302, 1304 and the MIAX Options Fee Schedule...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-21
... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Related to Limit Up/Limit Down March 15, 2013. Pursuant to Section 19(b)(1) of the... Securities and Exchange Commission (``Commission'') the proposed rule change as described in Items I and II...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-07
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65861; File No. SR-ISE-2011-77] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Network and Gateway Fees December 1, 2011. Pursuant to Section 19(b)(1) of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-31
...); ISE Semiconductors (BYT); ISE Electronic Trading (DMA); ISE-Revere Natural Gas (FUM); ISE Water (HHO... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63761; File No. SR-ISE-2011-04] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Establish a...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-21
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65583; File No. SR-ISE-2011-68] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Amend the Volume Threshold for Tier-Based Rebates for Qualified Contingent Cross Orders and Solicitation Orders Executed...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-12
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65898; File No. SR-ISE-2011-78] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Amend the Threshold Levels for Tier-Based Rebates for Qualified Contingent Cross Orders and Solicitation Orders Executed...
Weber, Michael Fred
2017-02-01
The world is experiencing change at an unprecedented pace, as reflected in social, cultural, economic, political, and technological advances around the globe. Regulatory agencies, like the U.S. Nuclear Regulatory Commission (NRC), must also transform in response to and in preparation for these changes. In 2014, the NRC staff commenced Project Aim 2020 to transform the agency by enhancing efficiency, agility, and responsiveness, while accomplishing NRC's safety and security mission. Following Commission review and approval in 2015, the NRC began implementing the approved strategies, including strategic workforce planning to provide confidence that NRC will have employees with the right skills and talents at the right time to accomplish the agency's mission. Based on the work conducted so far, ensuring an adequate pipeline of radiation protection professionals is a significant need that NRC shares with states and other government agencies, private industry, academia, as well as international counterparts. NRC is working to ensure that sufficient radiation protection professionals will be available to fulfill its safety and security mission and leverage the work of the National Council on Radiation Protection and Measurements, the Conference of Radiation Control Program Directors, the Health Physics Society, the Organization of Agreement States, the International Atomic Energy Agency, the Nuclear Energy Agency, and others.
Strategies for online test security.
Hart, Leigh; Morgan, Lesley
2009-01-01
As online courses continue to increase, maintaining academic integrity in student evaluation is a challenge. The authors review several strategies, with varying degrees of cost and technology, to improve test security in the online classroom.
Building community resilience: what can the United States learn from experiences in other countries?
Moore, Melinda; Chandra, Anita; Feeney, Kevin C
2013-06-01
Community resilience (CR) is emerging as a major public policy priority within disaster management and is one of two key pillars of the December 2009 US National Health Security Strategy. However, there is no clear agreement on what key elements constitute CR. We examined exemplary practices from international disaster management to validate the elements of CR, as suggested by Homeland Security Presidential Directive 21 (HSPD-21), to potentially identify new elements and to identify practices that could be emulated or adapted to help build CR. We extracted detailed information relevant to CR from unpublished case studies we had developed previously, describing exemplary practices from international natural disasters occurring between 1985 and 2005. We then mapped specific practices against the five elements of CR suggested by HSPD-21. We identified 49 relevant exemplary practices from 11 natural disasters in 10 countries (earthquakes in Mexico, India, and Iran; volcanic eruption in Philippines; hurricanes in Honduras and Cuba; floods in Bangladesh, Vietnam, and Mozambique; tsunami in Indian Ocean countries; and typhoon in Vietnam). Of these, 35 mapped well against the five elements of CR: community education, community empowerment, practice, social networks, and familiarity with local services; 15 additional practices were related to physical security and economic security. The five HSPD-21 CR elements and two additional ones we identified were closely related to one another; social networks were especially important to CR. While each disaster is unique, the elements of CR appear to be broadly applicable across countries and disaster settings. Our descriptive study provides retrospective empirical evidence that helps validate, and adds to, the elements of CR suggested by HSPD-21. It also generates hypotheses about factors contributing to CR that can be tested in future analytic or experimental research.
Building Partner Country Capacity for Stability Operations
2011-01-01
international aFFairs law and Business national seCurity population and aging puBliC saFety sCienCe and teChnology terrorism and homeland seCurity this... Quantic Thurston, MG-942-A, 2010 (available at http://www.rand.org/pubs/monographs/MG942.html). This research brief was written by Kristin J. Leuschner...AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY TERRORISM AND HOMELAND SECURITY
Information Systems Security Management: A Review and a Classification of the ISO Standards
NASA Astrophysics Data System (ADS)
Tsohou, Aggeliki; Kokolakis, Spyros; Lambrinoudakis, Costas; Gritzalis, Stefanos
The need for common understanding and agreement of functional and non-functional requirements is well known and understood by information system designers. This is necessary for both: designing the "correct" system and achieving interoperability with other systems. Security is maybe the best example of this need. If the understanding of the security requirements is not the same for all involved parties and the security mechanisms that will be implemented do not comply with some globally accepted rules and practices, then the system that will be designed will not necessarily achieve the desired security level and it will be very difficult to securely interoperate with other systems. It is therefore clear that the role and contribution of international standards to the design and implementation of security mechanisms is dominant. In this paper we provide a state of the art review on information security management standards published by the International Organization for Standardization and the International Electrotechnical Commission. Such an analysis is meaningful to security practitioners for an efficient management of information security. Moreover, the classification of the standards in the clauses of ISO/IEC 27001:2005 that results from our analysis is expected to provide assistance in dealing with the plethora of security standards.
12 CFR 220.108 - International Bank Securities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 3 2011-01-01 2011-01-01 false International Bank Securities. 220.108 Section 220.108 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CREDIT BY BROKERS AND DEALERS (REGULATION T) Interpretations § 220.108 International Bank...
12 CFR 220.108 - International Bank Securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 12 Banks and Banking 3 2010-01-01 2010-01-01 false International Bank Securities. 220.108 Section 220.108 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM CREDIT BY BROKERS AND DEALERS (REGULATION T) Interpretations § 220.108 International Bank...
Defense.gov Special Report: Travels With Hagel
Halifax International Security Forum. Story U.S., Canada Sign Asia-Pacific Cooperation Framework Defense Cooperation Framework as both leaders take part in the Halifax International Security Forum. Story Travel Visits First Zumwalt-class Destroyer Photo Essays Photo Essay: Hagel Attends Halifax International
Should the United Nations Framework Convention on Climate Change recognize climate migrants?
NASA Astrophysics Data System (ADS)
Gibb, Christine; Ford, James
2012-12-01
Climate change is expected to increase migration flows, especially from socially and environmentally vulnerable populations. These ‘climate migrants’ do not have any official protection under international law, which has implications for the human security of migrants. This work argues that the United Nations Framework Convention on Climate Change (UNFCCC) can and should recognize climate migrants, and is the most relevant international framework for doing so. While not legally binding, the acknowledgment of climate displacement, migration and planned relocation issues in the UNFCCC’s Cancun Adaptation Framework indicates a willingness to address the issue through an adaptation lens. Herein, the paper proposes a framework for setting the institutional groundwork for recognizing climate migrants, focusing on the most vulnerable, promoting targeted research and policy agendas, and situating policies within a comprehensive strategy.
Health education needs of incarcerated women.
Dinkel, Shirley; Schmidt, Katie
2014-07-01
This study identifies the healthcare education needs of incarcerated women in a state corrections facility. This was a naturalistic qualitative study. Focus groups included two groups of adult women incarcerated in a state corrections facility. One group consisted of women housed in maximum security, and one group consisted of women housed in medium security. Data were analyzed using a constant comparison approach. Three guiding questions provided the foundation for the identified themes. Themes included six healthcare education topics important to incarcerated women and three related to health education strategies best suited for incarcerated women. Trust, respect and empowerment are key concepts in educating incarcerated women about their personal health and health of their families. With over 200,000 women incarcerated in the United States today, creating policies and practices that focus on the healthcare education needs of women that are woman focused may enhance knowledge and skills and may ultimately lead to reduced recidivism. © 2014 Sigma Theta Tau International.
Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey
Abdalzaher, Mohamed S.; Seddik, Karim; Elsabrouty, Maha; Muta, Osamu; Furukawa, Hiroshi; Abdel-Rahman, Adel
2016-01-01
We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs. PMID:27367700
Space weapon technology and policy
NASA Astrophysics Data System (ADS)
Hitchens, Theresa
2017-11-01
The military use of space, including in support of nuclear weapons infrastructure, has greatly increased over the past 30 years. In the current era, rising geopolitical tensions between the United States and Russia and China have led to assumptions in all three major space powers that warfighting in space now is inevitable, and possible because of rapid technological advancements. New capabilities for disrupting and destroying satellites include radio-frequency jamming, the use of lasers, maneuverable space objects and more capable direct-ascent anti-satellite weapons. This situation, however, threatens international security and stability among nuclear powers. There is a continuing and necessary role for diplomacy, especially the establishment of normative rules of behavior, to reduce risks of misperceptions and crisis escalation, including up to the use of nuclear weapons. U.S. policy and strategy should seek a balance between traditional military approaches to protecting its space assets and diplomatic tools to create a more secure space environment.
Research of Energy Substitution Strategy of China
NASA Astrophysics Data System (ADS)
Zhang, Lifeng; kai, Chen
For a long time, China's energy endowment structure determines the production structure and consumption structure of energy are coal-based.This situation is difficult to change for quite a long time. With the rapid economic growth, industrialization and urbanization, the demand for energy, especially for oil, natural gas will continue to increase. But the oil and gas supply can not meet the needs of rapid growth. The most direct way is to import, and imports will be charged by the international energy situation, and will affect energy and economic security. In view of our country abundant coal resources, we can consider to use coal substituting oil and natural gas to reduce dependence on foreign energy, to strengthen energy and economic security. Therefore, using translog production function, the text forecasts substitution elasticity and the marginal substitution rate between the capital, coal, oil and natural gas, and puts forward substitution program.
2011-12-01
in the Social Sciences (George & Bennett, 2005), the main challenges of this thesis are: 9 To test the hypothesis of whether the implications of...Americas´ security chain; To test whether the new concept of balloon-effect counter-pressure coming from the Mexican strategy is influencing latent...balloon effects against U.S. homeland security; To test whether those balloon effects created by the Mexican strategy inside Mexico are a
Science and Strategic - Climate Implications
NASA Astrophysics Data System (ADS)
Tindall, J. A.; Moran, E. H.
2008-12-01
Energy of weather systems greatly exceeds energy produced and used by humans. Variation in this energy causes climate variability potentially resulting in local, national, and/or global catastrophes beyond our ability to deter the loss of life and economic destabilization. Large scale natural disasters routinely result in shortages of water, disruption of energy supplies, and destruction of infrastructure. The resulting unforeseen and disastrous events occurring beyond national emergency preparation, as related to climate variability, could insight civil unrest due to dwindling and/or inaccessible resources necessary for survival. Lack of these necessary resources in impacted countries often leads to wars. Climate change coupled with population growth, which exposes more of the population to potential risks associated with climate and environmental change, demands faster technological response. Understanding climate/associated environmental changes, the relation to human activity and behavior, and including this in national and international emergency/security management plans would alleviate shortcomings in our present and future technological status. The scale of environmental change will determine the potential magnitude of civil unrest at the local, national, and/or global level along with security issues at each level. Commonly, security issues related to possible civil unrest owing to temporal environmental change is not part of a short and/or long-term strategy, yet recent large-scale disasters are reminders that system failures (as in hurricane Katrina) include acknowledged breaches to individual, community, and infrastructure security. Without advance planning and management concerning environmental change, oncoming and climate related events will intensify the level of devastation and human catastrophe. Depending upon the magnitude and period of catastrophic events and/or environmental changes, destabilization of agricultural systems, energy supplies, and other lines of commodities often results in severely unbalanced supply and demand ratios, which eventually affect the entire global community. National economies potentially risk destabilization, which is especially important since economics plays a major role in strategic planning. This presentation will address these issues and the role that science can play in human sustainability and local, national, and international security.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-07
...-AA87 Security Zone; 23rd Annual North American International Auto Show, Detroit River, Detroit, MI... officials at the 23rd Annual North American International Auto Show (NAIAS) being held at Cobo Hall in... 23rd Annual North American International Auto Show (NAIAS) being held at Cobo Hall in downtown Detroit...
Information Badging Information Foreign National Requirements SLAC Internal Gate Information Site Entry Form this is a SLAC-Internal page for videos on how to use the automated gates. Security Assistance The Main and holidays. See Gate Information this is a SLAC-Internal page for more information about the
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-17
... Contract Services, Encore, International Business Machines (IBM), Akzo Nobel, US Security, ASF Logistics... Services, Encore, International Business Machines (IBM), Akzo Nobel, US Security, ASF Logistics, LLC... class 4-8 trucks. The company reports that workers leased from Encore, International Business Machines...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-07
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-818] Certain Devices With Secure... AGENCY: U.S. International Trade Commission. ACTION: Notice. SUMMARY: Notice is hereby given that a complaint was filed with the U.S. International Trade Commission on November 4, 2011, under section 337 of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-24
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62125; File No. SR-ISE-2010-48] Self-Regulatory Organizations; Notice of Filing of Proposed Rule Change by International Securities Exchange LLC To Amend ISE Rule 2102 To Provide for a Trading Pause for Individual Securities When the Price Moves Ten Percent or...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-12
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65054; File No. SR-ISE-2011-36] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Adopt the Content Outline for the Proprietary Traders Examination (Series 56) August 8, 2011. Pursuant to Section 19(b)(1...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-28
... change from interested persons. \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63758; File No. SR-ISE-2011-05] Self-Regulatory... Purchase of Equity Interests by International Securities Exchange Holdings, Inc. in Ballista Holdings LLC...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69114; File No. SR-ISE-2013-18] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Address Order Handling Under the Options Order Protection and Locked/Crossed Market Plan, the Authority of the Exchange To Cancel Orders When a...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-31
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71182; File No. SR-ISE-2013-71] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To More Specifically Address the Number and Size of Contra- Parties to a Qualified Contingent Cross Order December 24, 2013....
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-17
...., International Securities Exchange LLC, The NASDAQ Stock Market LLC, New York Stock Exchange LLC, NYSE Amex LLC... include all remaining National Market System (``NMS'') stocks (``Phase III Securities'').\\9\\ The new pilot... executions, so that the rule will continue to operate in the same manner after changes to the single stock...
17 CFR 240.17Ad-13 - Annual study and evaluation of internal accounting control.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Annual study and evaluation of internal accounting control. 240.17Ad-13 Section 240.17Ad-13 Commodity and Securities Exchanges SECURITIES... System, the Office of the Comptroller of the Currency or the Federal Deposit Insurance Corporation...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... Organizations; International Securities Exchange, LLC; Notice of Designation of a Longer Period for Commission Action on Proposed Rule Change To List and Trade Option Contracts Overlying 10 Shares of a Security June... Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ a proposed rule change to list and trade...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-27
... Organizations; International Securities Exchange, LLC; Notice of Withdrawal of Proposed Rule Change To List and... proposed rule change to list and trade option contracts overlying 10 shares of a security. Notice of the proposed rule change was published in the Federal Register on April 24, 2012.\\3\\ The Commission received...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-09
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66084; File No. SR-ISE-2011-84] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Fees for Certain Complex Orders Executed on the Exchange January 3, 2012. Pursuant to Section 19(b)(1) of the...
NASA Astrophysics Data System (ADS)
Kurnianto, Ari; Isnanto, Rizal; Widodo, Aris Puji
2018-02-01
Information security is a problem effected business process of an organization, so it needs special concern. Information security assessment which is good and has international standard is done using Information Security Management System (ISMS) ISO/IEC 27001:2013. In this research, the high level assessment has been done using ISO/IEC 27001:2013 to observe the strength of information secuity in Ministry of Internal Affairs. The research explains about the assessment of information security management which is built using PHP. The input data use primary and secondary data which passed observation. The process gets maturity using the assessment of ISO/IEC 27001:2013. GAP Analysis observes the condition now a days and then to get recommendation and road map. The result of this research gets all of the information security process which has not been already good enough in Ministry of Internal Affairs, gives recommendation and road map to improve part of all information system being running. It indicates that ISO/IEC 27001:2013 is good used to rate maturity of information security management. As the next analyzation, this research use Clause and Annex in ISO/IEC 27001:2013 which is suitable with condition of Data Center and Data Recovery Center, so it gets optimum result and solving problem of the weakness information security.
ERIC Educational Resources Information Center
Gray, David H.
2008-01-01
Since the attacks of September 11, national and international security has been driven to the center stage of our present-day society, thus becoming a primary concern and focus in the United States. The purpose of this study was to conduct an instructional needs assessment for the establishment of a Masters of Arts program in International Studies…
77 FR 21142 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-09
..., international security, nuclear proliferation, and diplomacy. For more information, contact Richard W. Hartman..., DC 20520, telephone: (202) 736-4290. Dated: March 28, 2012. Richard W. Hartman II, Executive Director...
76 FR 36167 - International Security Advisory Board (ISAB) Meeting Notice; Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-21
..., international security, nuclear proliferation, and diplomacy. For more information, contact Richard W. Hartman..., DC 20520, telephone: (202) 736-4290. Dated: June 13, 2011. Richard W. Hartman, II., Executive...
Homeland Security - Can It be Done?
2003-04-07
and get past the shenanigans in Congress and implement homeland security strategies.ř The new DHS is scheduled to move 22 federal agencies and...uniform laws to license and regulate certain financial services, since terrorists exploit such services. The strategy also takes care with definitions...initiative from organizations interested in the security of sensitive information, such as financial services, healthcare, and government. 47Joseph R. Barnes
Airline Security and a Strategy for Change
2006-01-15
21 KEY TERMS: Biometrics, Federal Flight Deck Officer, Positive Passenger Bag Match , Airline Security CLASSIFICATION: Unclassified On September 11...subsequent to 9/11, then offers a recommended strategy which could provide both an improved security posture and the peace of mind demanded by travelers...expanding the Positive Passenger Bag Match criteria, and gathering information on passengers about special capabilities they might have for use by Captains
Secure relay selection based on learning with negative externality in wireless networks
NASA Astrophysics Data System (ADS)
Zhao, Caidan; Xiao, Liang; Kang, Shan; Chen, Guiquan; Li, Yunzhou; Huang, Lianfen
2013-12-01
In this paper, we formulate relay selection into a Chinese restaurant game. A secure relay selection strategy is proposed for a wireless network, where multiple source nodes send messages to their destination nodes via several relay nodes, which have different processing and transmission capabilities as well as security properties. The relay selection utilizes a learning-based algorithm for the source nodes to reach their best responses in the Chinese restaurant game. In particular, the relay selection takes into account the negative externality of relay sharing among the source nodes, which learn the capabilities and security properties of relay nodes according to the current signals and the signal history. Simulation results show that this strategy improves the user utility and the overall security performance in wireless networks. In addition, the relay strategy is robust against the signal errors and deviations of some user from the desired actions.
Trading Off Global Fuel Supply, CO2 Emissions and Sustainable Development.
Wagner, Liam; Ross, Ian; Foster, John; Hankamer, Ben
2016-01-01
The United Nations Conference on Climate Change (Paris 2015) reached an international agreement to keep the rise in global average temperature 'well below 2°C' and to 'aim to limit the increase to 1.5°C'. These reductions will have to be made in the face of rising global energy demand. Here a thoroughly validated dynamic econometric model (Eq 1) is used to forecast global energy demand growth (International Energy Agency and BP), which is driven by an increase of the global population (UN), energy use per person and real GDP (World Bank and Maddison). Even relatively conservative assumptions put a severe upward pressure on forecast global energy demand and highlight three areas of concern. First, is the potential for an exponential increase of fossil fuel consumption, if renewable energy systems are not rapidly scaled up. Second, implementation of internationally mandated CO2 emission controls are forecast to place serious constraints on fossil fuel use from ~2030 onward, raising energy security implications. Third is the challenge of maintaining the international 'pro-growth' strategy being used to meet poverty alleviation targets, while reducing CO2 emissions. Our findings place global economists and environmentalists on the same side as they indicate that the scale up of CO2 neutral renewable energy systems is not only important to protect against climate change, but to enhance global energy security by reducing our dependence of fossil fuels and to provide a sustainable basis for economic development and poverty alleviation. Very hard choices will have to be made to achieve 'sustainable development' goals.
Trading Off Global Fuel Supply, CO2 Emissions and Sustainable Development
Wagner, Liam; Ross, Ian; Foster, John; Hankamer, Ben
2016-01-01
The United Nations Conference on Climate Change (Paris 2015) reached an international agreement to keep the rise in global average temperature ‘well below 2°C’ and to ‘aim to limit the increase to 1.5°C’. These reductions will have to be made in the face of rising global energy demand. Here a thoroughly validated dynamic econometric model (Eq 1) is used to forecast global energy demand growth (International Energy Agency and BP), which is driven by an increase of the global population (UN), energy use per person and real GDP (World Bank and Maddison). Even relatively conservative assumptions put a severe upward pressure on forecast global energy demand and highlight three areas of concern. First, is the potential for an exponential increase of fossil fuel consumption, if renewable energy systems are not rapidly scaled up. Second, implementation of internationally mandated CO2 emission controls are forecast to place serious constraints on fossil fuel use from ~2030 onward, raising energy security implications. Third is the challenge of maintaining the international ‘pro-growth’ strategy being used to meet poverty alleviation targets, while reducing CO2 emissions. Our findings place global economists and environmentalists on the same side as they indicate that the scale up of CO2 neutral renewable energy systems is not only important to protect against climate change, but to enhance global energy security by reducing our dependence of fossil fuels and to provide a sustainable basis for economic development and poverty alleviation. Very hard choices will have to be made to achieve ‘sustainable development’ goals. PMID:26959977
Understanding the Value of a Computer Emergency Response Capability for Nuclear Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gasper, Peter Donald; Rodriguez, Julio Gallardo
The international nuclear community has a great understanding of the physical security needs relating to the prevention, detection, and response of malicious acts associated with nuclear facilities and radioactive material. International Atomic Energy Agency (IAEA) Nuclear Security Recommendations (INFCIRC_225_Rev 5) outlines specific guidelines and recommendations for implementing and maintaining an organization’s nuclear security posture. An important element for inclusion into supporting revision 5 is the establishment of a “Cyber Emergency Response Team (CERT)” focused on the international communities cybersecurity needs to maintain a comprehensive nuclear security posture. Cybersecurity and the importance of nuclear cybersecurity require that there be a specificmore » focus on developing an International Nuclear CERT (NS-CERT). States establishing contingency plans should have an understanding of the cyber threat landscape and the potential impacts to systems in place to protect and mitigate malicious activities. This paper will outline the necessary components, discuss the relationships needed within the international community, and outline a process by which the NS-CERT identifies, collects, processes, and reports critical information in order to establish situational awareness (SA) and support decision-making« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-27
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Tornado Gold International Corp., Twin Faces East Entertainment Corp., Universal Ice Blast, Inc., US Farms, Inc., US Microbics... concerning the securities of Tornado Gold International Corp. because it has not filed any periodic reports...
75 FR 1455 - Custody of Funds or Securities of Clients by Investment Advisers
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-11
... the internal controls relating to the custody of those assets from an independent public accountant... must obtain or receive an internal control report within six months of the effective date. Section III... securities (SIFMA(AMG) Letter), requiring an internal control report only instead of both the report and a...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: BP International, Inc., CyGene Laboratories, Inc., Delek Resources, Inc., Flooring America, Inc., International Diversified... there is a lack of current and accurate information concerning the securities of CyGene Laboratories...
32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...
Choices in International Conflict: With a Focus on Security Issues in Asia.
ERIC Educational Resources Information Center
Francis, Gregory; Mukai, Gary; Kim, Pearl; Leininger, James
Many world leaders and scholars feel that the U.S.-Japan Security Alliance is essential for long-term peace, prosperity, and stability in Asia. The purpose of this curriculum unit is to examine this alliance by introducing students to case studies of international conflict, with a focus on security issues in Asia. Through each of the lessons…
32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...
32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...
32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 6 2014-07-01 2014-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...
32 CFR Appendix A to Part 1292 - Section 21 of the Internal Security Act of 1950
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 6 2012-07-01 2012-07-01 false Section 21 of the Internal Security Act of 1950 A Appendix A to Part 1292 National Defense Other Regulations Relating to National Defense DEFENSE LOGISTICS AGENCY MISCELLANEOUS SECURITY OF DLA ACTIVITIES AND RESOURCES Pt. 1292, App. A Appendix A to Part...
An Evaluation Methodology for the Usability and Security of Cloud-based File Sharing Technologies
2012-09-01
FISMA, ISO 27001 , FIPS 140-2, and ISO 270001) indicate a cloud-based service’s compliance with industry standard security controls, management and...Information Assurance IEEE Institute of Electrical and Electronics Engineers IT Information Technology ITS Insider Threat Study ISO International...effectively, efficiently and with satisfaction” (International Organization for Standardization [ ISO ], 1998). Alternately, information security
stability Science & Innovation Collaboration Careers Community Environment Science & Innovation . Provide a safe, secure, and effective stockpile Protect against the nuclear threat Counter emerging excellence STRATEGY We will create a modern workplace that is environmentally responsible, safe, and secure
Strategic Pivot Toward the Asia-Pacific: Implications for USMC
2013-03-01
S) AND ADDRESS(ES) Dr. Gabriel Marcella Department of National Security and Strategy 8. PERFORMING ORGANIZATION REPORT NUMBER 9...Gabriel Marcella Department of National Security and Strategy Project Adviser This manuscript is submitted in partial fulfillment of the
Ethical Hacking in Information Security Curricula
ERIC Educational Resources Information Center
Trabelsi, Zouheir; McCoey, Margaret
2016-01-01
Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…
Developing a computer security training program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1990-01-01
We all know that training can empower the computer protection program. However, pushing computer security information outside the computer security organization into the rest of the company is often labeled as an easy project or a dungeon full of dragons. Used in part or whole, the strategy offered in this paper may help the developer of a computer security training program ward off dragons and create products and services. The strategy includes GOALS (what the result of training will be), POINTERS (tips to ensure survival), and STEPS (products and services as a means to accomplish the goals).
A Learning-Based Approach to Reactive Security
NASA Astrophysics Data System (ADS)
Barth, Adam; Rubinstein, Benjamin I. P.; Sundararajan, Mukund; Mitchell, John C.; Song, Dawn; Bartlett, Peter L.
Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the reactive defender learns from past attacks instead of myopically overreacting to the last attack. Our game-theoretic model follows common practice in the security literature by making worst-case assumptions about the attacker: we grant the attacker complete knowledge of the defender's strategy and do not require the attacker to act rationally. In this model, we bound the competitive ratio between a reactive defense algorithm (which is inspired by online learning theory) and the best fixed proactive defense. Additionally, we show that, unlike proactive defenses, this reactive strategy is robust to a lack of information about the attacker's incentives and knowledge.
77 FR 64150 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-18
...) requires an annual study and evaluation of internal accounting controls under the Securities Exchange Act... an annual report on the adequacy of their internal accounting controls from an independent accountant... service only their own companies' securities. [[Page 64151
Addressing cargo security with strategies involving private sector.
DOT National Transportation Integrated Search
2008-12-01
The public and private sectors contributing to goods movement agree that cargo security has : not been addressed nearly as much as physical and vessel security. Addressing cargo security : will require additional operational data that is not currentl...
India’s Emerging Security Strategy, Missile Defense, and Arms Control
2004-06-01
and contemplate a security strategy. Starting in July 1998, a series of negotiations between Foreign Minister Jaswant Singh and US envoy Strobe...arms control.46 The Singh -Talbott discussions eventually led to the reaffirmation of civilian command-and-control and a doctrine of “minimum...Council (NSC), including Prime Minister Vajpayee, Minister of Foreign Affairs Singh , and Minister of Defense Fernandes, and appointed a National Security
Century of the Seas: Unlocking Indian Maritime Strategy in the 21st Century
2017-09-01
Ensuring Secure Seas. Finally, this thesis examines India’s economic policies, specifically maritime trade, as well as domestic politics, to see how...they engage and shape Indian maritime strategy. These findings present a combined analysis of economic , security, and political factors mentioned above...Ensuring Secure Seas. Finally, this thesis examines India’s economic policies, specifically maritime trade, as well as domestic politics, to see how
The Role of Cultural Understanding and Language Training in Unconventional Warfare
2004-12-01
National Security Strategy (NSS), while acknowledging the dangers posed by non-military actions which can affect economic, financial, social and...security by causing direct or indirect consequences on the country’s economic and social life” (Security Strategy, 1999, Chapter 4). Among Romania’s...we rely on our allies help to defend our national integrity” (Iliescu, 2004, Pro memoria ). As a direct result of the progress in achieving its
Measuring Transnational Organized Crime Threats to US National Security
2016-05-26
typology is not designed to score TOC networks, so it is not an obvious choice, but it could be easily modified by the TMWG to rank-order TOC networks...States Strategy to Combat Transnational Organized Crime (SCTOC). The strategy identified Transnational Organized Crime ( TOC ) as a national security...identify the TOC groups that present the national security threat defined in the SCTOC? A literature review of existing organized crime assessments
MCloud: Secure Provenance for Mobile Cloud Users
2016-10-03
Feasibility of Smartphone Clouds , 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid). 04-MAY- 15, Shenzhen, China...final decision. MCloud: Secure Provenance for Mobile Cloud Users Final Report Bogdan Carbunar Florida International University Computing and...Release; Distribution Unlimited UU UU UU UU 03-10-2016 31-May-2013 30-May-2016 Final Report: MCloud: Secure Provenance for Mobile Cloud Users The views
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
... Under Secretary for Arms Control and International Security of Authority To Submit Reports Regarding the... by law, I hereby delegate to the Under Secretary for Arms Control and International Security the... Resolution); with the Director of National Intelligence, at the direction of the President, preparing the...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 7 2010-04-01 2010-04-01 true Bad debts, losses, and gains with respect to securities held by financial institutions. 1.582-1 Section 1.582-1 Internal Revenue INTERNAL REVENUE SERVICE, DEPARTMENT OF THE TREASURY (CONTINUED) INCOME TAX (CONTINUED) INCOME TAXES (CONTINUED) Banking Institutions...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-15
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] ROK Entertainment Group, Inc., RussOil Corp., Tricell, Inc., Tunex International, Inc. (n/k/a Aone Dental International Group, Inc.), and Wireless Age... there is a lack of current and accurate information concerning the securities of Wireless Age...
Promoting Health Equity Research: Insights from a Canadian Initiative.
Stewart, Miriam J; Kushner, Kaysi Eastlick
2014-03-01
In 2002 the Canadian Institutes of Health Research launched a national initiative to promote health equity research reflecting the World Health Organization imperative of investment in health equity research. Funded researchers and teams have investigated health disparities faced by vulnerable populations, analyzed interactions of health determinants, and tested innovative interventions. Strategies for building research capacity have supported students, postdoctoral fellows, new investigators, and interdisciplinary research teams. Partnerships have been created with 10 national and 7 international organizations. Strategies used to secure and sustain this research initiative could be adapted to other contexts. Nurse scholars led the launch and have sustained the legacy of this national research initiative. Moreover, nurse researchers and research trainees, supported by the initiative, have contributed to the expansion and translation of the health equity knowledge base. Copyright© by Ingram School of Nursing, McGill University.
America Promises to Come Back: Our New National Security Strategy
1991-10-23
Captain Larry Seaquist, U.S. Navy, Office of the Principal Deputy Under Secretary of Defense (Strategy and Resources); Vice Admiral James Service...to be primarily based on U.S. forces in being. Under the new national security strategy, deterrence of the Soviet threat will largely be based upon a...Cheney’s IISS remarks were followed by I. Lewis "Scooter" Libby, Principal Deputy Under Secretary of Defense (Strategy and Resources), who provided
Parents' experience of hospitalization: different strategies for feeling secure.
Kristensson-Hallström, I; Elander, G
1997-01-01
Twenty parents of boys (ages 2-14 years) hospitalized for hypospadias repair in a pediatric surgery department in Sweden, were interviewed concerning their experience when their child was hospitalized. A qualitative analysis of the interviews indicated that the most important issue to the parents was finding security at the hospital. Parents manifested one of three different strategies that enabled them to feel secure at the hospital; (a) relinquishing the care of their children to the nursing staff; (b) obtaining a measure of control over their children's care; and (c) relying on knowing their child best. The parental strategy adopted to feel secure was found to correspond with the way parents experienced the hospitalization. Differences were found in their children's experiences of pain and the alleviation of the pain during the hospitalization.
Application of the API/NPRA SVA methodology to transportation security issues.
Moore, David A
2006-03-17
Security vulnerability analysis (SVA) is becoming more prevalent as the issue of chemical process security is of greater concern. The American Petroleum Institute (API) and the National Petrochemical and Refiner's Association (NPRA) have developed a guideline for conducting SVAs of petroleum and petrochemical facilities in May 2003. In 2004, the same organizations enhanced the guidelines by adding the ability to evaluate transportation security risks (pipeline, truck, and rail). The importance of including transportation and value chain security in addition to fixed facility security in a SVA is that these issues may be critically important to understanding the total risk of the operation. Most of the SVAs done using the API/NPRA SVA and other SVA methods were centered on the fixed facility and the operations within the plant fence. Transportation interfaces alone are normally studied as a part of the facility SVA, and the entire transportation route impacts and value chain disruption are not commonly considered. Particularly from a national, regional, or local infrastructure analysis standpoint, understanding the interdependencies is critical to the risk assessment. Transportation risks may include weaponization of the asset by direct attack en route, sabotage, or a Trojan Horse style attack into a facility. The risks differ in the level of access control and the degree of public exposures, as well as the dynamic nature of the assets. The public exposures along the transportation route need to be carefully considered. Risks may be mitigated by one of many strategies including internment, staging, prioritization, conscription, or prohibition, as well as by administrative security measures and technology for monitoring and isolating the assets. This paper illustrates how these risks can be analyzed by the API/NPRA SVA methodology. Examples are given of a pipeline operation, and other examples are found in the guidelines.
Measuring global water security towards sustainable development goals
NASA Astrophysics Data System (ADS)
Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide
2016-12-01
Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience ‘low water security’ over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated—physical and socio-economic—approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term ‘security’ is conceptualized as a function of ‘availability’, ‘accessibility to services’, ‘safety and quality’, and ‘management’. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.
Clinton administration forging population-foreign policy links.
De Sherbinin, A
1994-12-01
In the US, the Clinton administration has renewed the link between global population and national security issues. These so-called "soft security issues" receive attention from the Under-Secretary of State for Global Affairs, Tim Wirth, and the senior director of the Global Environmental Affairs branch of the National Security Council, Eileen Claussen. Wirth and Claussen draft the US response to soft security issues such as environmental security, refugee and migration movements, political instability, and religious and ethnic conflict as well as the other nonmilitary threats of illegal drug trafficking, terrorism, and international organized crime. Population was first considered a foreign policy concern in the 1960s. By 1965, President Johnson decided that the US would provide family planning supplies and technical assistance to any country which asked for help. The initial justification for assuming a leading role in developing innovative population strategies for less developed countries was a humanitarian desire to forward economic development, the self-interest of maintaining access to resources, and concern that rapid growth produced more communists. Today the US remains concerned about resource access and economic development and is also wary of spill-over environmental effects, economic migration, diminished US trade opportunities, political asylum seekers and refugees, and increasing demand for US peacekeepers. It is also believed that rapid population growth leads to political destabilization. Critics of these views blame the development difficulties of less developed countries on poor governing decisions (inadequate institutions, trade barriers, or indifference). Women's reproductive rights advocates fear that using security as a rationale for population assistance could lead to restrictions on women's rights to choose the number and spacing of births. Despite such objections, the belief that population growth is an underlying problem in imploding states like Haiti, Rwanda, and Somalia has turned the attention of US policy-makers to these soft security issues.
Assumptions and Grand Strategy
2011-01-01
Germany; The Continuity of Change,” in National Security Cultures: Patterns of Global Governance, ed. Emil Kirchner and James Sperling (London...Britain in an Age of Uncertainty: The National Security Strategy (October 2010), 10. 25. Carl von Clausewitz, On War, edited and translated by Michael E
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-15
... Rule Change Relating To Amending the Direct Edge ECN Fee Schedule; Correction AGENCY: Securities and... Effectiveness of Proposed Rule Change Relating to Amending the Direct Edge ECN Fee Schedule by the International...
A new information architecture, website and services for the CMS experiment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Taylor, Lucas; Rusack, Eleanor; Zemleris, Vidmantas
2012-01-01
The age and size of the CMS collaboration at the LHC means it now has many hundreds of inhomogeneous web sites and services, and hundreds of thousands of documents. We describe a major initiative to create a single coherent CMS internal and public web site. This uses the Drupal web Content Management System (now supported by CERN/IT) on top of a standard LAMP stack (Linux, Apache, MySQL, and php/perl). The new navigation, content and search services are coherently integrated with numerous existing CERN services (CDS, EDMS, Indico, phonebook, Twiki) as well as many CMS internal Web services. We describe themore » information architecture, the system design, implementation and monitoring, the document and content database, security aspects, and our deployment strategy, which ensured continual smooth operation of all systems at all times.« less
A new Information Architecture, Website and Services for the CMS Experiment
NASA Astrophysics Data System (ADS)
Taylor, Lucas; Rusack, Eleanor; Zemleris, Vidmantas
2012-12-01
The age and size of the CMS collaboration at the LHC means it now has many hundreds of inhomogeneous web sites and services, and hundreds of thousands of documents. We describe a major initiative to create a single coherent CMS internal and public web site. This uses the Drupal web Content Management System (now supported by CERN/IT) on top of a standard LAMP stack (Linux, Apache, MySQL, and php/perl). The new navigation, content and search services are coherently integrated with numerous existing CERN services (CDS, EDMS, Indico, phonebook, Twiki) as well as many CMS internal Web services. We describe the information architecture; the system design, implementation and monitoring; the document and content database; security aspects; and our deployment strategy, which ensured continual smooth operation of all systems at all times.
Moisan, Frédéric; Gonzalez, Cleotilde
2017-01-01
Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain) and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive) in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies. PMID:28690557
Security Systems Consideration: A Total Security Approach
NASA Astrophysics Data System (ADS)
Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.
2007-12-01
The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.
NATO Transformation and Operational Support in the Canadian Forces: Part 1: The Political Dimension
2010-11-01
David Rudd; DRDC CORA TR 2010-244; R & D pour la défense Canada –CARO; Novembre 2010. Contexte: L’Organisation du Traité de l’Atlantique Nord (OTAN...Alliance as a tool through which it pursues a globalized security strategy. 13 At the 2010 Munich Conference on Security Policy, Defense Secretary... 13 National Security Strategy May 2010, p. 41. http://www.whitehouse.gov/sites/default/files
2015-06-12
Security Strategy to integrate government security agency participation for increased national security.33 Morris , Morris , and Jones posit ICA occurs...New National Strategy Takes Whole-of-Government Approach,” American Forces Press Services (Washington, DC: DoD News, 2010), 1. 34 John C. Morris ...Elizabeth D. Morris , and Dale M. Jones, “Reaching for the Philosopher’s Stone: Contingent Coordination and the Military’s Response to Hurricane Katrina
Operating in the Gray Zone: An Alternative Paradigm for U.S. Military Strategy
2016-04-01
labeling, or re-labeling, may have been to draw the attention of busy policymakers to rapidly emerging security issues , it has evolved into something... issues affecting the national security community. The Peacekeeping and Stability Operations Institute provides subject matter expertise, technical...SSI) is part of the U.S. Army War College and is the strategic-level study agent for issues related to national security and military strategy with
1988-05-27
Competitive Strategies Individual Essay 6. PERFORMING ORG. REPORT NUMBER 7. AUTHOR(@) S. CONTRACT OR GRANT NUMBER( e ) Robert M. Davis, LTC, AD S...DO FOe 1473 emIotN or, Nov es IS OBSOLETE -JA I Unclassifi fed SECURITY CLASSIFICATION OF THIS PA7. E (Whrn Does Entered) Unclassified SECURITY...focus within the Department of Defense to provide technical and tactical leverage over the Soviets. Competitive Strategies are a management tool which
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weston, B.H.
This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.
Jasso-Aguilar, Rebeca; Waitzkin, Howard; Landwehr, Angela
2004-01-01
In this article we analyze the corporate dominance of health care in the United States and the dynamics that have motivated the international expansion of multinational health care corporations, especially to Latin America. We identify the strategies, actions, and effects of multinational corporations in health care delivery and public health policies. Our methods have included systematic bibliographical research and in-depth interviews in the United States, Mexico, and Brazil. Influenced by public policy makers in the United States, such organizations as the World Bank, International Monetary Fund, and World Trade Organization have advocated policies that encourage reduction and privatization of health care and public health services previously provided in the public sector. Multinational managed care organizations have entered managed care markets in several Latin American countries at the same time as they were withdrawing from managed care activities in Medicaid and Medicare within the United States. Corporate strategies have culminated in a marked expansion of corporations' access to social security and related public sector funds for the support of privatized health services. International financial institutions and multinational corporations have influenced reforms that, while favorable to corporate interests, have worsened access to needed services and have strained the remaining public sector institutions. A theoretical approach to these problems emphasizes the falling rate of profit as an economic motivation of corporate actions, silent reform, and the subordination of polity to economy. Praxis to address these problems involves opposition to policies that enhance corporate interests while reducing public sector services, as well as alternative models that emphasize a strengthened public sector
JASSO-AGUILAR, REBECA; WAITZKIN, HOWARD; LANDWEHR, ANGELA
2010-01-01
In this article we analyze the corporate dominance of health care in the United States and the dynamics that have motivated the international expansion of multinational health care corporations, especially to Latin America. We identify the strategies, actions, and effects of multinational corporations in health care delivery and public health policies. Our methods have included systematic bibliographical research and in-depth interviews in the United States, Mexico, and Brazil. Influenced by public policy makers in the United States, such organizations as the World Bank, International Monetary Fund, and World Trade Organization have advocated policies that encourage reduction and privatization of health care and public health services previously provided in the public sector. Multinational managed care organizations have entered managed care markets in several Latin American countries at the same time as they were withdrawing from managed care activities in Medicaid and Medicare within the United States. Corporate strategies have culminated in a marked expansion of corporations’ access to social security and related public sector funds for the support of privatized health services. International financial institutions and multinational corporations have influenced reforms that, while favorable to corporate interests, have worsened access to needed services and have strained the remaining public sector institutions. A theoretical approach to these problems emphasizes the falling rate of profit as an economic motivation of corporate actions, silent reform, and the subordination of polity to economy. Praxis to address these problems involves opposition to policies that enhance corporate interests while reducing public sector services, as well as alternative models that emphasize a strengthened public sector. PMID:15779471
The USEPA's National Homeland Security Research Center (NHSRC)Technology Testing and Evaluation Program (TTEP) is carrying out performance tests on homeland security technologies. Under TTEP, Battelle recently evaluated the performance of the Science Applications International Co...
Rep. Hastings, Alcee L. [D-FL-23
2009-01-15
House - 03/16/2009 Referred to the Subcommittee on Immigration, Citizenship, Refugees, Border Security, and International Law. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Dodo, Mahamat K
2014-01-01
Climate Change like many global problems nowadays is recognized as a threat to the international security and cooperation. In theoretical terms, it is being securitized and included in the traditional security studies. Climate change and its accompanying environmental degradation are perceived to be a threat that can have incalculable consequences on the international community. The consequences are said to have more effects in small island developing nations and Africa where many States are fragile and overwhelmed with mounting challenges. In recent years, the security implications of the climate change are being addressed from national, regional and multilateral level. Against this backdrop, this paper intends to contribute to the debate on climate change and international security and present a broader perspective on the discussion. The paper will draw from the EU-Africa partnership on climate change and is structured as follows: the first part introduces the background of the international climate change policy and its securitization, the second part covers the EU-Africa relations and EU-Africa partnership on climate change, and the third part discusses the Congo Basin Forest Partnership as a concrete example of EU-Africa Partnership on Climate Change. Lastly, the paper concludes by drawing some conclusions and offers some policy perspectives and recommendations. Q54; 055; 052; 01;
2011-08-25
Security Cooperation Agency INL Bureau of International Narcotics and Law Enforcement Affairs JSSP Justice Sector Security Program PAE Pacific...regional training centers. The programs were the Justice Sector Security Program ( JSSP ), the Corrections System Support Program (CSSP), and the...Civilian Police International. JSSP and CSSP are considered rule of law programs. Rule of law is most commonly understood to be a foundational
Code of Federal Regulations, 2010 CFR
2010-04-01
... attestation reports on internal control over financial reporting. 210.2-02T Section 210.2-02T Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORM AND CONTENT OF AND REQUIREMENTS FOR FINANCIAL... attestation reports on internal control over financial reporting. (a) The requirements of § 210.2-02(f) shall...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-13
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Amerex Group, Inc., AmeriChip International, Inc., Amish Naturals, Inc., Banker's Store Inc. (The), Champion Parts, Inc., and Gray Peaks, Inc... securities of AmeriChip International, Inc. because it has not filed any periodic reports since the period...
2004-03-19
informal management style used during the war years was not suited to the longer-term security issues of the post-war era. As US grand strategy became...Eisenhower Doctrine in 1957. THE CASE OF LEBANON Each of the above mentioned security policies were products of American diplomacy aimed at managing the...consisting of its East and West entities, found itself a principle player in the American-led security alliance structure designed to check Soviet
Moghaddasi, Hamid; Sajjadi, Samad; Kamkarhaghighi, Mehran
2016-01-01
Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. The "data security models" presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the "needs and improvement" cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced.
Moghaddasi, Hamid; Kamkarhaghighi, Mehran
2016-01-01
Introduction: Any information which is generated and saved needs to be protected against accidental or intentional losses and manipulations if it is to be used by the intended users in due time. As such, information managers have adopted numerous measures to achieve data security within data storage systems, along with the spread of information technology. Background: The “data security models” presented thus far have unanimously highlighted the significance of data security management. For further clarification, the current study first introduces the “needs and improvement” cycle; the study will then present some independent definitions, together with a support umbrella, in an attempt to shed light on the data security management. Findings: Data security focuses on three features or attributes known as integrity, identity of sender(s) and identity of receiver(s). Management in data security follows an endless evolutionary process, to keep up with new developments in information technology and communication. In this process management develops new characteristics with greater capabilities to achieve better data security. The characteristics, continuously increasing in number, with a special focus on control, are as follows: private zone, confidentiality, availability, non-repudiation, possession, accountability, authenticity, authentication and auditability. Conclusion: Data security management steadily progresses, resulting in more sophisticated features. The developments are in line with new developments in information and communication technology and novel advances in intrusion detection systems (IDS). Attention to differences between data security and data security management by international organizations such as the International Standard Organization (ISO), and International Telecommunication Union (ITU) is necessary if information quality is to be enhanced. PMID:27857823
75 FR 22151 - National Maritime Security Advisory Committee; Vacancies
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-27
... field are encouraged to apply: Port Operations Management/Port Authorities. Maritime Security Operations and Training. Marine Salvage Operations. Maritime Security Related Academics/Public Policy. Marine Facilities and Terminals Security Management. Vessel Owners/Operators. Maritime Labor. International and...
Defense Security Cooperation Agency Vision 2020. Update 1
2015-10-01
the feasibility and pros/ cons of developing a DoD- wide security cooperation workforce development and management program including training...Synchronizing Security Cooperation Activities ..................................................................................... 7 Meeting...Security Cooperation ............................. 15 6. Remaining a Provider of Choice for Our International Customers
Homeland Security and Information.
ERIC Educational Resources Information Center
Relyea, Harold C.
2002-01-01
Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)
2020 Foresight Forging the Future of Lawrence Livermore National Laboratory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chrzanowski, P.
2000-01-01
The Lawrence Livermore National Laboratory (LLNL) of 2020 will look much different from the LLNL of today and vastly different from how it looked twenty years ago. We, the members of the Long-Range Strategy Project, envision a Laboratory not defined by one program--nuclear weapons research--but by several core programs related to or synergistic with LLNL's national security mission. We expect the Laboratory to be fully engaged with sponsors and the local community and closely partnering with other research and development (R&D) organizations and academia. Unclassified work will be a vital part of the Laboratory of 2020 and will visibly demonstratemore » LLNL's international science and technology strengths. We firmly believe that there will be a critical and continuing role for the Laboratory. As a dynamic and versatile multipurpose laboratory with a national security focus, LLNL will be applying its capabilities in science and technology to meet the needs of the nation in the 21st century. With strategic investments in science, outstanding technical capabilities, and effective relationships, the Laboratory will, we believe, continue to play a key role in securing the nation's future.« less
Elbe, Stefan
2014-12-01
Pharmaceuticals are now critical to the security of populations. Antivirals, antibiotics, next-generation vaccines, and antitoxins are just some of the new 'medical countermeasures' that governments are stockpiling in order to defend their populations against the threat of pandemics and bioterrorism. How has security policy come to be so deeply imbricated with pharmaceutical logics and solutions? This article captures, maps, and analyses the 'pharmaceuticalisation' of security. Through an in-depth analysis of the prominent antiviral medication Tamiflu , it shows that this pharmaceutical turn in security policy is intimately bound up with the rise of a molecular vision of life promulgated by the biomedical sciences. Caught in the crosshairs of powerful commercial, political, and regulatory pressures, governments are embracing a molecular biomedicine promising to secure populations pharmaceutically in the twenty-first century. If that is true, then the established disciplinary view of health as a predominantly secondary matter of 'low' international politics is mistaken. On the contrary, the social forces of health and biomedicine are powerful enough to influence the core practices of international politics - even those of security. For a discipline long accustomed to studying macrolevel processes and systemic structures, it is in the end also our knowledge of the minute morass of molecules that shapes international relations.
Investigation on Covert Channel Attacks and Countermeasures in the Cloud
2017-03-29
ahead of the game and continue improving our security systems. Thus, investigating novel attack strategies and tactics is crucial to shaping the...step to stay ahead of the game and continue improving our security systems. Thus, investigating novel attack strategies and tactics is crucial to
Crime Control Strategies in School: Chicanas'/os' Perceptions and Criminalization
ERIC Educational Resources Information Center
Portillos, Edwardo L.; Gonzalez, Juan Carlos; Peguero, Anthony A.
2012-01-01
High schools throughout the United States experience problems with violence, drugs, and crime. School administrators have responded with policies and strategies designed to prevent school violence such as zero tolerance approaches, partnerships with law enforcement agencies, security camera installations, and hiring additional security personnel…
2010-12-01
Methodology RMAT Risk Management Assessment Tool SIDA Security Identification Display Area SIGINT Signals Intelligence SO18 Aviation Security...aircraft operate (§ 1542.203); • Provide detection and physical security measures for the “Security Identification Display Area” ( SIDA ), i.e., the area
Security Metrics: A Solution in Search of a Problem
ERIC Educational Resources Information Center
Rosenblatt, Joel
2008-01-01
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Analysis of information security management systems at 5 domestic hospitals with more than 500 beds.
Park, Woo-Sung; Seo, Sun-Won; Son, Seung-Sik; Lee, Mee-Jeong; Kim, Shin-Hyo; Choi, Eun-Mi; Bang, Ji-Eon; Kim, Yea-Eun; Kim, Ok-Nam
2010-06-01
The information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on information security and security countermeasures which meet both international standards and the needs of individual hospitals. The ISMS check-list derived from international/domestic standards was distributed to each hospital to complete and the staff of each hospital was interviewed. Information Security Indicator and Information Security Values were used to estimate the present security levels and evaluate the application of each hospital's current system. With regard to the moderate clause of the ISMS, the hospitals were determined to be in compliance. The most vulnerable clause was asset management, in particular, information asset classification guidelines. The clauses of information security incident management and business continuity management were deemed necessary for the establishment of successful ISMS. The level of current ISMS in the hospitals evaluated was determined to be insufficient. Establishment of adequate ISMS is necessary to ensure patient privacy and the safe use of medical records for various purposes. Implementation of ISMS which meet international standards with a long-term and comprehensive perspective is of prime importance. To reflect the requirements of the varied interests of medical staff, consumers, and institutions, the establishment of political support is essential to create suitable hospital ISMS.
DOT National Transportation Integrated Search
1996-09-01
While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...
Interpreting international governance standards for health IT use within general medical practice.
Mahncke, Rachel J; Williams, Patricia A H
2014-01-01
General practices in Australia recognise the importance of comprehensive protective security measures. Some elements of information security governance are incorporated into recommended standards, however the governance component of information security is still insufficiently addressed in practice. The International Organistion for Standardisation (ISO) released a new global standard in May 2013 entitled, ISO/IEC 27014:2013 Information technology - Security techniques - Governance of information security. This standard, applicable to organisations of all sizes, offers a framework against which to assess and implement the governance components of information security. The standard demonstrates the relationship between governance and the management of information security, provides strategic principles and processes, and forms the basis for establishing a positive information security culture. An analysis interpretation of this standard for use in Australian general practice was performed. This work is unique as such interpretation for the Australian healthcare environment has not been undertaken before. It demonstrates an application of the standard at a strategic level to inform existing development of an information security governance framework.
Specifying Skill-Based Training Strategies and Devices: A Model Description
1990-06-01
Technical Report 897 Specifying Skill-Based Training N Strategies and Devices: A Model Description I Paui J. Sticha and Mark Schlager Human Resources...unlimied 90 ’ Technical Report 897 Specifying Skill-Based Training Strategies and Devices: A Model Description Paul J. Sticha and Mark Schlager Human...SECURITY CLASSIFICATION OF THIS PAGE Form Approved REPORT DOCUMENTATION PAGE FMNo o7 ote la. REPORT SECURITY CLASSIFICATION lb. RESTRICTWE MARKINGS
A European Perspective on Security Research
NASA Astrophysics Data System (ADS)
Liem, Khoen; Hiller, Daniel; Castex, Christoph
Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.
Child rights, right to water and sanitation, and human security.
Pink, Ross
2012-06-15
The article explores the intersection between child rights, water scarcity, sanitation, and the human security paradigm. The recognition of child rights has been advanced through the 1989 Convention on the Rights of the Child and other international legal instruments, while water rights are increasingly affirmed in international law and through the historic July 2010 United Nations General Assembly resolution that strengthened the legal foundation for water security and human rights. Yet there remains a development gap in terms of child access to clean and secure water sources for basic human development needs. The human security paradigm provides a legal and humanitarian foundation for the extension of child rights related to water and sanitation. Copyright © 2012 Pink.
Sandia National Laboratories: National Security Missions: International
Transportation Energy Energy Research Global Security WMD Counterterrorism & Response Global Threat Reduction Homeland Defense & Force Protection Homeland Security Cyber & Infrastructure Security Global Business Procurement Technical Assistance Program (PTAP) Current Suppliers iSupplier Account Accounts
Maritime security report. June 1999 [Inter-American Port Security Program
DOT National Transportation Integrated Search
1999-06-01
Three international port security training courses were organized and managed by the U.S. Maritime Administration (MARAD) and conducted during the fall of 1998 in Panama, Peru, and Barbados as principal activities of the Inter-American Port Security ...
2007-12-01
Media Issues in Combating Terrorism • International Approaches • Ethics and Combating Terrorism • Restructuring the Security Sector for...Terrorism • Organized Crime and Terrorism • Civil-Military Cooperation and Terrorism • Ethics and Combating Terrorism • Border Control • Consequence...Simon. “Confl ict, Ecology and the Politics of Envrionmental Security.” Global Environmental Politics 2, No. 4 (November 2002): pp 25-130. 28
A Computer Security Course in the Undergraduate Computer Science Curriculum.
ERIC Educational Resources Information Center
Spillman, Richard
1992-01-01
Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…
77 FR 26564 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-04
... National Strategy for Global Supply Chain Security. The work of the Trade Facilitation Subcommittee... Strategy for Global Supply Chain Security as it relates to the Committee's effort to solicit, consolidate... chain management project. The Anti-Dumping/Countervailing Duties Subcommittee work on educational...
Beyond Iraq: The Lessons of a Hard Place
2007-07-01
Hegemony or Survival, widely read since Venezuelan President Huga Chavez called attention to it in his UN General Assembly speech in the fall of 2006, Noam ... Chomsky makes a sport of attacking the 2002 National Security Strategy upon which the 2004 NMS is based. 39. 2006 National Security Strategy
26 CFR 301.6511(d)-1 - Overpayment of income tax on account of bad debts, worthless securities, etc.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Overpayment of income tax on account of bad debts, worthless securities, etc. 301.6511(d)-1 Section 301.6511(d)-1 Internal Revenue INTERNAL REVENUE... Limitations Limitations on Assessment and Collection § 301.6511(d)-1 Overpayment of income tax on account of...
42 CFR 433.37 - Reporting provider payments to Internal Revenue Service.
Code of Federal Regulations, 2010 CFR
2010-10-01
... identification of providers by— (1) Social security number if— (i) The provider is in solo practice; or (ii) The... security number or employer identification number. ... identification number for all other providers. (c) Compliance with section 6041 of the Internal Revenue Code. The...
Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar
NASA Astrophysics Data System (ADS)
Botel, Gabriel
This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive literature in human security rarely applied in this context. This includes a brief review of human security and Sino-Myanmar relations, and is grounded in an empirical analysis of Chinese investment in Myanmar's hydropower and oil and gas sectors. Ultimately, this thesis argues that, while insightful, many traditional interpretations of Sino-Myanmar energy cooperation overlook the security interests of those worst affected. Furthermore, that the worst excesses of Chinese companies in Myanmar are not unique to China, but common across all investors in the regime, Western or otherwise.
Siu, B W M; Au-Yeung, C C Y; Chan, A W L; Chan, L S Y; Yuen, K K; Leung, H W; Yan, C K; Ng, K K; Lai, A C H; Davies, S; Collins, M
Mapping forensic psychiatric services with the security needs of patients is a salient step in service planning, audit and review. A valid and reliable instrument for measuring the security needs of Chinese forensic psychiatric inpatients was not yet available. This study aimed to develop and validate the Chinese version of the Security Needs Assessment Profile for measuring the profiles of security needs of Chinese forensic psychiatric inpatients. The Security Needs Assessment Profile by Davis was translated into Chinese. Its face validity, content validity, construct validity and internal consistency reliability were assessed by measuring the security needs of 98 Chinese forensic psychiatric inpatients. Principal factor analysis for construct validity provided a six-factor security needs model explaining 68.7% of the variance. Based on the Cronbach's alpha coefficient, the internal consistency reliability was rated as acceptable for procedural security (0.73), and fair for both physical security (0.62) and relational security (0.58). A significant sex difference (p=0.002) in total security score was found. The Chinese version of the Security Needs Assessment Profile is a valid and reliable instrument for assessing the security needs of Chinese forensic psychiatric inpatients. Copyright © 2017 Elsevier Ltd. All rights reserved.
77 FR 14525 - Statement of Organization, Functions, and Delegations of Authority
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-12
... maintains the CDC Computer Security Incident Response Team; (4) performs cyber security incident reporting... systems planning and support; internal security and emergency preparedness; and management analysis and... security; education, training, and workforce development in information and IT disciplines; development and...
[Chemical safety, health, and environment: prospects for governance in the Brazilian context].
Freitas, Carlos Machado de; Porto, Marcelo Firpo S; Moreira, Josino Costa; Pivetta, Fatima; Machado, Jorge M Huet; Freitas, Nilton B B de; Arcuri, Arline S
2002-01-01
Chemical safety is acknowledged by Agenda 21 as one of the most serious problems worldwide, involving governance at the national and international levels. In Brazil, chemical safety problems have increased in intensity and extent, far beyond the capacity to deal with them. The problems are all the more serious in Brazil because issues of democracy, security, sustainability, and equity, all fundamental to governance, are still incipient and still far from being solved. New societal arrangements and a new, contextualized and more participatory science form the basis for developing and expanding strategies for governance to deal with the problem of chemical safety.
76 FR 81477 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-28
... sessions will be open to the public. The ISPAB was established by the Computer Security Act of 1987 (Pub. L... Secure Mobile Devices, --Panel Discussion on cyber R&D Strategy, and --Update of NIST Computer Security... of the Information Security and Privacy Advisory Board AGENCY: National Institute of Standards and...
26 CFR 1.165-5 - Worthless securities.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 26 Internal Revenue 2 2014-04-01 2014-04-01 false Worthless securities. 1.165-5 Section 1.165-5... securities. (a) Definition of security. As used in section 165(g) and this section, the term “security” means.... (b) Ordinary loss. If any security which is not a capital asset becomes wholly worthless during the...
26 CFR 1.165-5 - Worthless securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 2 2010-04-01 2010-04-01 false Worthless securities. 1.165-5 Section 1.165-5... securities. (a) Definition of security. As used in section 165(g) and this section, the term “security” means.... (b) Ordinary loss. If any security which is not a capital asset becomes wholly worthless during the...
26 CFR 1.165-5 - Worthless securities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 26 Internal Revenue 2 2011-04-01 2011-04-01 false Worthless securities. 1.165-5 Section 1.165-5... securities. (a) Definition of security. As used in section 165(g) and this section, the term “security” means.... (b) Ordinary loss. If any security which is not a capital asset becomes wholly worthless during the...
26 CFR 1.165-5 - Worthless securities.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 26 Internal Revenue 2 2013-04-01 2013-04-01 false Worthless securities. 1.165-5 Section 1.165-5... securities. (a) Definition of security. As used in section 165(g) and this section, the term “security” means.... (b) Ordinary loss. If any security which is not a capital asset becomes wholly worthless during the...
Teaching RFID Information Systems Security
ERIC Educational Resources Information Center
Thompson, Dale R.; Di, Jia; Daugherty, Michael K.
2014-01-01
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
The nature of international health security.
Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N
2009-01-01
Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.
2012-09-01
and Rescue (US&R) teams be used more effectively and efficiently in the Homeland Security Enterprise ( HSE )? 1. Are there other strategies that would...allow the FEMA US&R resources to be more adaptable in the HSE ? 2. What other disciplines could be integrated with the FEMA US&R task forces to...consideration of the questions: 1. Can the FEMA US&R teams be used more effectively in the Homeland Security Enterprise ( HSE )? 2. Are there other
Lamagna, Jerry; Gleiser, Kari A
2007-01-01
In this paper, we introduce Intra-Relational AEDP (I-R) as an attachment-based experiential approach to trauma treatment. Integrating Accelerated Experiential Dynamic Psychotherapy (AEDP) (Fosha, 2000a,b, 2002, 2003) with ego-state methodology, intra-relational interventions specifically seeks to help clients by (1) fostering capacities for self-regulation through shared states of affective resonance between therapist, client, and dissociated self-states; (2) facilitating authentic, open internal dialogue between self-states which can alter engrained patterns of intra-psychic conflict and self-punishment; (3) developing abilities for self-reflection and emotional processing by co-mingling previously disowned affect and emotional memories with here and now experience; and (4) attending to positive affects evoked through experiences of transformation, self-compassion, and self-affirmation. Drawing from object relations and attachment theory, intra-relational interventions places particular emphasis on internal attachment relationships formed through interactions between the client's subjective selves (internal subjects) and reflective selves (internal objects). Through visual imagery, internal dialogue, and explicit relational techniques, intra-relational interventions aims to develop this subjective-reflective dyad's capacity for reciprocal attunement, resonance, and responsiveness. Such clinical strategies aim to foster healing and psychological integration between the client and heretofore disavowed aspects of self.
75 FR 75952 - U.S. Agency for International Mandatory Declassification Review Address
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-07
... Development. ACTION: Notice. SUMMARY: Pursuant to the Information Security Oversight Offices Classified National Security Information Directive No. 1, this notice provides the U.S. Agency for International... public in advising them where to send such requests for declassification review. FOR FURTHER INFORMATION...
The population health record: concepts, definition, design, and implementation.
Friedman, Daniel J; Parrish, R Gibson
2010-01-01
In 1997, the American Medical Informatics Association proposed a US information strategy that included a population health record (PopHR). Despite subsequent progress on the conceptualization, development, and implementation of electronic health records and personal health records, minimal progress has occurred on the PopHR. Adapting International Organization for Standarization electronic health records standards, we define the PopHR as a repository of statistics, measures, and indicators regarding the state of and influences on the health of a defined population, in computer processable form, stored and transmitted securely, and accessible by multiple authorized users. The PopHR is based upon an explicit population health framework and a standardized logical information model. PopHR purpose and uses, content and content sources, functionalities, business objectives, information architecture, and system architecture are described. Barriers to implementation and enabling factors and a three-stage implementation strategy are delineated.
Ecosystem approach to inland fisheries: research needs and implementation strategies
Beard, T. Douglas; Arlinghaus, Robert; Cooke, Steven J.; McIntyre, Peter B.; De Silva, Sena; Bartley, Devin; Cowx, Ian G.
2011-01-01
Inland fisheries are a vital component in the livelihoods and food security of people throughout the world, as well as contributing huge recreational and economic benefits. These valuable assets are jeopardized by lack of research-based understanding of the impacts of fisheries on inland ecosystems, and similarly the impact of human activities associated with inland waters on fisheries and aquatic biodiversity. To explore this topic, an international workshop was organized in order to examine strategies to incorporate fisheries into ecosystem approaches for management of inland waters. To achieve this goal, a new research agenda is needed that focuses on: quantifying the ecosystem services provided by fresh waters; quantifying the economic, social and nutritional benefits of inland fisheries; improving assessments designed to evaluate fisheries exploitation potential; and examining feedbacks between fisheries, ecosystem productivity and aquatic biodiversity. Accomplishing these objectives will require merging natural and social science approaches to address coupled social–ecological system dynamics. PMID:21325307
Ecosystem approach to inland fisheries: Research needs and implementation strategies
Beard, T.D.; Arlinghaus, R.; Cooke, S.J.; McIntyre, P.B.; De Silva, S.; Bartley, D.; Cowx, I.G.
2011-01-01
Inland fisheries are a vital component in the livelihoods and food security of people throughout the world, as well as contributing huge recreational and economic benefits. These valuable assets are jeopardized by lack of research-based understanding of the impacts of fisheries on inland ecosystems, and similarly the impact of human activities associated with inland waters on fisheries and aquatic biodiversity. To explore this topic, an international workshop was organized in order to examine strategies to incorporate fisheries into ecosystem approaches for management of inland waters. To achieve this goal, a new research agenda is needed that focuses on: quantifying the ecosystem services provided by fresh waters; quantifying the economic, social and nutritional benefits of inland fisheries; improving assessments designed to evaluate fisheries exploitation potential; and examining feedbacks between fisheries, ecosystem productivity and aquatic biodiversity. Accomplishing these objectives will require merging natural and social science approaches to address coupled social-ecological system dynamics. ?? 2010 The Royal Society.
Ecosystem approach to inland fisheries: research needs and implementation strategies
Beard, T. Douglas; Arlinghaus, Robert; Cooke, Steven J.; McIntyre, Peter B.; De Silva, Sena; Bartley, Devin M.; Cowx, Ian G.
2011-01-01
Inland fisheries are a vital component in the livelihoods and food security of people throughout the world, as well as contributing huge recreational and economic benefits. These valuable assets are jeopardized by lack of research-based understanding of the impacts of fisheries on inland ecosystems, and similarly the impact of human activities associated with inland waters on fisheries and aquatic biodiversity. To explore this topic, an international workshop was organized in order to examine strategies to incorporate fisheries into ecosystem approaches for management of inland waters. To achieve this goal, a new research agenda is needed that focuses on: quantifying the ecosystem services provided by fresh waters; quantifying the economic, social and nutritional benefits of inland fisheries; improving assessments designed to evaluate fisheries exploitation potential; and examining feedbacks between fisheries, ecosystem productivity and aquatic biodiversity. Accomplishing these objectives will require merging natural and social science approaches to address coupled social–ecological system dynamics.
Lyerly, W H
1996-01-01
Unlike most infectious diseases in Africa, HIV/AIDS affects the urban elite as well as the rural poor, and generally during their most economically productive years. An increase in deaths among young adults of the magnitude predicted is likely to have substantial adverse effects on economic, political, and military/security stability throughout Africa. AIDS is causing increased stress on fragile African economic infrastructures as labor productivity declines, particularly in agricultural, labor-dependent economies. AIDS is causing obstacles to trade, foreign investment and tourism. Health systems and social coping mechanisms already are overburdened. High rates of HIV infection among police and military personnel threaten internal security. Furthermore, the demobilization of military forces in Africa may exacerbate the epidemic when HIV-infected soldiers return home and spread the virus. This presentation will illustrate why African AIDS Programs must be expanded to mitigate the multisectoral impact of the epidemic while preserving its spread.
The water-land-food nexus of first-generation biofuels
NASA Astrophysics Data System (ADS)
Rulli, Maria Cristina; Bellomi, Davide; Cazzoli, Andrea; de Carolis, Giulia; D'Odorico, Paolo
2016-03-01
Recent energy security strategies, investment opportunities and energy policies have led to an escalation in biofuel consumption at the expenses of food crops and pastureland. To evaluate the important impacts of biofuels on food security, the food-energy nexus needs to be investigated in the context of its linkages with the overall human appropriation of land and water resources. Here we provide a global assessment of biofuel crop production, reconstruct global patterns of biofuel crop/oil trade and determine the associated displacement of water and land use. We find that bioethanol is mostly produced with domestic crops while 36% of biodiesel consumption relies on international trade, mainly from Southeast Asia. Altogether, biofuels rely on about 2-3% of the global water and land used for agriculture, which could feed about 30% of the malnourished population. We evaluate the food-energy tradeoff and the impact an increased reliance on biofuel would have on the number of people the planet can feed.
The water-land-food nexus of first-generation biofuels
Rulli, Maria Cristina; Bellomi, Davide; Cazzoli, Andrea; De Carolis, Giulia; D’Odorico, Paolo
2016-01-01
Recent energy security strategies, investment opportunities and energy policies have led to an escalation in biofuel consumption at the expenses of food crops and pastureland. To evaluate the important impacts of biofuels on food security, the food-energy nexus needs to be investigated in the context of its linkages with the overall human appropriation of land and water resources. Here we provide a global assessment of biofuel crop production, reconstruct global patterns of biofuel crop/oil trade and determine the associated displacement of water and land use. We find that bioethanol is mostly produced with domestic crops while 36% of biodiesel consumption relies on international trade, mainly from Southeast Asia. Altogether, biofuels rely on about 2-3% of the global water and land used for agriculture, which could feed about 30% of the malnourished population. We evaluate the food-energy tradeoff and the impact an increased reliance on biofuel would have on the number of people the planet can feed. PMID:26936679
Scharf, Miri; Mayseless, Ofra
2009-03-01
Elementary school teachers identified characteristics in 4 major socioemotional domains associated with children's social leadership: self-perception, social anxiety, attachment orientation with peers, and interpersonal goals and skills in close friendships. Participants were 260 4th- and 5th-grade students (126 boys, 134 girls) from 10 classes in a school in northern Israel. Social leadership skills were associated with positive self-perceptions in various domains, low social anxiety, secure orientation to peers, higher levels of relationship-maintenance goal, lower levels of revenge goal in close friendships, and-unexpectedly-lower levels of accommodation as a strategy to solve conflicts with a friend. Positive self-concept and attachment security were indirectly associated with leadership qualities through their significant association with prosocial orientation skills. The authors discuss these findings as reflecting an internalization of positive model of self and positive model of others in children who exhibit social leadership qualities. The authors also discuss implications of these qualities for school and class ecology, as well as the importance of culture.
Security Approaches in Using Tablet Computers for Primary Data Collection in Clinical Research
Wilcox, Adam B.; Gallagher, Kathleen; Bakken, Suzanne
2013-01-01
Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues associated with the potential use of cloud-based data storage approaches. This paper identifies and describes major security considerations for primary data collection with tablets; proposes a set of architectural strategies for implementing data collection forms with tablet computers; and discusses the security, cost, and workflow of each strategy. The paper briefly reviews the strategies with respect to their implementation for three primary data collection activities for the WICER project. PMID:25848559
Security approaches in using tablet computers for primary data collection in clinical research.
Wilcox, Adam B; Gallagher, Kathleen; Bakken, Suzanne
2013-01-01
Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues associated with the potential use of cloud-based data storage approaches. This paper identifies and describes major security considerations for primary data collection with tablets; proposes a set of architectural strategies for implementing data collection forms with tablet computers; and discusses the security, cost, and workflow of each strategy. The paper briefly reviews the strategies with respect to their implementation for three primary data collection activities for the WICER project.
The alliance relationship analysis of international terrorist organizations with link prediction
NASA Astrophysics Data System (ADS)
Fang, Ling; Fang, Haiyang; Tian, Yanfang; Yang, Tinghong; Zhao, Jing
2017-09-01
Terrorism is a huge public hazard of the international community. Alliances of terrorist organizations may cause more serious threat to national security and world peace. Understanding alliances between global terrorist organizations will facilitate more effective anti-terrorism collaboration between governments. Based on publicly available data, this study constructed a alliance network between terrorist organizations and analyzed the alliance relationships with link prediction. We proposed a novel index based on optimal weighted fusion of six similarity indices, in which the optimal weight is calculated by genetic algorithm. Our experimental results showed that this algorithm could achieve better results on the networks than other algorithms. Using this method, we successfully digged out 21 real terrorist organizations alliance from current data. Our experiment shows that this approach used for terrorist organizations alliance mining is effective and this study is expected to benefit the form of a more powerful anti-terrorism strategy.
NASA Astrophysics Data System (ADS)
Veziroglu, T. N.
The objective of the Miami International Symposium on the Biosphere was to provide a forum for the presentation of the latest research findings on the environmental effects of human activities. The topics discussed are related to biosphere reserves, environmental aspects of hydrocarbon fuels, radioactivity and nuclear waste, land management, acid rains, water quality, water resources, coastal resources management, the pollution of rivers, industrial waste, economic development and the environment, health hazards and solutions, endangered species, environmentally compatible systems, space pollution, and global considerations. Attention is given to questions regarding global security and sustainable development, environethics as a global strategy for environmental quality, a gestalt approach to the environment, potential indicators for monitoring biosphere reserves, a review of regional impacts associated with the development of U.S. synthetic fuel resources, water resources in the Soviet Union, and pollution-free pesticides.
Forced displacement and women's security in Colombia.
Meertens, Donny
2010-04-01
In the protracted Colombian conflict, assistance to internally displaced persons has developed in the context of contradictory political processes. The Colombian government's launching of a transitional justice process in the midst of armed conflict has generated a complex situation displaying both conflict and post-conflict characteristics. The progressive Constitutional Court rulings on internal displacement, in particular the gender-sensitive Auto 092, constitute an attempt to bring together humanitarian interventions and transitional justice measures in a rights-based framework. However, the national government is reluctant to adopt them fully and local realities still hamper their integrated implementation. Displaced women, therefore, remain in an especially vulnerable position. This paper argues that gender-sensitive humanitarian interventions must take into account all of these complexities of scale and political process in order to make legal frameworks more effective at the local level. In these contexts, interventions should pay particular attention to strategies that contribute to transforming pre-existing gender regimes.
2011-05-04
Nations General Assembly. China looks to secure the support and votes of these African states to help influence international politics moving forward. 1S...support and votes of th~se African states to help influence international politics moving forward. . . Conclusion: China’s declaration of their... international focus with the recognition of a new advei·sary. The attack on the World Trade Center brought telTorism to the forefront of the natiohal security
Security Management Strategies for Protecting Your Library's Network.
ERIC Educational Resources Information Center
Ives, David J.
1996-01-01
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Security: Progress and Challenges
ERIC Educational Resources Information Center
Luker, Mark A.
2004-01-01
The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badwan, Faris M.; Demuth, Scott F
Department of Energy’s Office of Nuclear Energy, Fuel Cycle Research and Development develops options to the current commercial fuel cycle management strategy to enable the safe, secure, economic, and sustainable expansion of nuclear energy while minimizing proliferation risks by conducting research and development focused on used nuclear fuel recycling and waste management to meet U.S. needs. Used nuclear fuel is currently stored onsite in either wet pools or in dry storage systems, with disposal envisioned in interim storage facility and, ultimately, in a deep-mined geologic repository. The safe management and disposition of used nuclear fuel and/or nuclear waste is amore » fundamental aspect of any nuclear fuel cycle. Integrating safety, security, and safeguards (3Ss) fully in the early stages of the design process for a new nuclear facility has the potential to effectively minimize safety, proliferation, and security risks. The 3Ss integration framework could become the new national and international norm and the standard process for designing future nuclear facilities. The purpose of this report is to develop a framework for integrating the safety, security and safeguards concept into the design of Used Nuclear Fuel Storage Facility (UNFSF). The primary focus is on integration of safeguards and security into the UNFSF based on the existing Nuclear Regulatory Commission (NRC) approach to addressing the safety/security interface (10 CFR 73.58 and Regulatory Guide 5.73) for nuclear power plants. The methodology used for adaptation of the NRC safety/security interface will be used as the basis for development of the safeguards /security interface and later will be used as the basis for development of safety and safeguards interface. Then this will complete the integration cycle of safety, security, and safeguards. The overall methodology for integration of 3Ss will be proposed, but only the integration of safeguards and security will be applied to the design of the UNFSF. The framework for integration of safeguards and security into the UNFSF will include 1) identification of applicable regulatory requirements, 2) selection of a common system that share dual safeguard and security functions, 3) development of functional design criteria and design requirements for the selected system, 4) identification and integration of the dual safeguards and security design requirements, and 5) assessment of the integration and potential benefit.« less
Radiation Detection for Homeland Security Applications
NASA Astrophysics Data System (ADS)
Ely, James
2008-05-01
In the past twenty years or so, there have been significant changes in the strategy and applications for homeland security. Recently there have been significant at deterring and interdicting terrorists and associated organizations. This is a shift in the normal paradigm of deterrence and surveillance of a nation and the `conventional' methods of warfare to the `unconventional' means that terrorist organizations resort to. With that shift comes the responsibility to monitor international borders for weapons of mass destruction, including radiological weapons. As a result, countries around the world are deploying radiation detection instrumentation to interdict the illegal shipment of radioactive material crossing international borders. These efforts include deployments at land, rail, air, and sea ports of entry in the US and in European and Asian countries. Radioactive signatures of concern include radiation dispersal devices (RDD), nuclear warheads, and special nuclear material (SNM). Radiation portal monitors (RPMs) are used as the main screening tool for vehicles and cargo at borders, supplemented by handheld detectors, personal radiation detectors, and x-ray imaging systems. This talk will present an overview of radiation detection equipment with emphasis on radiation portal monitors. In the US, the deployment of radiation detection equipment is being coordinated by the Domestic Nuclear Detection Office within the Department of Homeland Security, and a brief summary of the program will be covered. Challenges with current generation systems will be discussed as well as areas of investigation and opportunities for improvements. The next generation of radiation portal monitors is being produced under the Advanced Spectroscopic Portal program and will be available for deployment in the near future. Additional technologies, from commercially available to experimental, that provide additional information for radiation screening, such as density imaging equipment, will be reviewed. Opportunities for further research and development to improve the current equipment and methodologies for radiation detection for the important task of homeland security will be the final topic to be discussed.
Tobe, Chris
2003-10-01
Certain strategies can offer not-for-profit hospitals potentially greater investment yields while maintaining stability and principal safety. Treasury inflation-indexed securities can offer good returns, low volatility, and inflation protection. "Enhanced cash" strategies offer liquidity and help to preserve capital. Stable value "wrappers" allow hospitals to pursue higher-yielding fixed-income securities without an increase in volatility.
Infants and Toddlers: Soothing and Comforting Babies
ERIC Educational Resources Information Center
Honig, Alice Sterling
2004-01-01
Babies thrive on security. In early months, secure feelings stem from being warm, cuddled closely, and comfortable in their tummies (and in having clean bottoms!). In this article, the author discusses how to soothe infants and toddlers. The strategies to help ease babies' distress are described. Some of the recommended strategies include: (1) to…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-04
... Industry Regulatory Authority, Inc.; International Securities Exchange LLC; The NASDAQ Stock Market LLC... Whether To Disapprove Proposed Rule Changes Relating to Trading Halts Due to Extraordinary Market.... (``FINRA''), International Securities Exchange LLC (``ISE''), The NASDAQ Stock Market LLC (``Nasdaq...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Amend Rule 604, Continuing Education for Registered Persons, and To Adopt a... proposing to amend Rule 604 to clarify the current continuing education requirements for registered persons...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-11
...-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change To Establish an Administrative Information Subscriber (AIS) and AIS Port...-Regulatory Organization's Statement of the Terms of Substance of the Proposed Rule Change The Exchange is...
Cost Comparison Among Provable Data Possession Schemes
2016-03-01
possession,” in Proceedings of the 11th International Conference on Ap- plied Cryptography and Network Security. Berlin, Heidelberg: Springer-Verlag, 2013...curves,” in Security and Cryptography (SECRYPT), 2013 International Conference on, July 2013, pp. 1–12. [19] R. S. Kumar and A. Saxena, “Data integrity
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Axcess International, Inc., Gamma Pharmaceuticals, Inc., Innovex, Inc, Knight Energy Corp., Komodo, Inc., Uphonia, Inc., and Wilson Brothers USA, Inc., Order of Suspension of Trading September 12, 2013. It appears to the Securities and Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-25
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Fearless International, Inc., Glassmaster Company, Global Entertainment Holdings/Equities, Inc., Global Realty Development Corp., Global... concerning the securities of Global Entertainment Holdings/Equities, Inc. because it has not filed any...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-01
... International Securities Exchange, LLC Amended and Restated Constitution January 28, 2013. Pursuant to Section... Restated Constitution \\3\\ (the ``Constitution'') to: (i) Declassify the Non- Industry Directors (including... Constitution requires, in part, that Non-Industry Directors (including the Public Directors) \\4\\ and Exchange...
Analysis of Information Security Management Systems at 5 Domestic Hospitals with More than 500 Beds
Park, Woo-Sung; Son, Seung-Sik; Lee, Mee-Jeong; Kim, Shin-Hyo; Choi, Eun-Mi; Bang, Ji-Eon; Kim, Yea-Eun; Kim, Ok-Nam
2010-01-01
Objectives The information security management systems (ISMS) of 5 hospitals with more than 500 beds were evaluated with regards to the level of information security, management, and physical and technical aspects so that we might make recommendations on information security and security countermeasures which meet both international standards and the needs of individual hospitals. Methods The ISMS check-list derived from international/domestic standards was distributed to each hospital to complete and the staff of each hospital was interviewed. Information Security Indicator and Information Security Values were used to estimate the present security levels and evaluate the application of each hospital's current system. Results With regard to the moderate clause of the ISMS, the hospitals were determined to be in compliance. The most vulnerable clause was asset management, in particular, information asset classification guidelines. The clauses of information security incident management and business continuity management were deemed necessary for the establishment of successful ISMS. Conclusions The level of current ISMS in the hospitals evaluated was determined to be insufficient. Establishment of adequate ISMS is necessary to ensure patient privacy and the safe use of medical records for various purposes. Implementation of ISMS which meet international standards with a long-term and comprehensive perspective is of prime importance. To reflect the requirements of the varied interests of medical staff, consumers, and institutions, the establishment of political support is essential to create suitable hospital ISMS. PMID:21818429
The deregulated global economy: women workers and strategies of resistance.
Hale, A
1996-10-01
This article discusses the lack of input from women in international debates about the global economy. Women in the South are the most vulnerable to exploitation and most ignored in international discussions of how to protect fair labor standards. Restructuring has led to loss of secure jobs in the public sector and the expansion of female employment in low-paid, insecure, unskilled jobs. Businesses desire a cheap and flexible workforce. Declines in social services, the elimination of subsidies on basic goods, and the introduction of user fees puts pressure on women to supplement family income. A parallel outcome is reduced employment rights, neglect of health and safety standards, and increased disregard among women for their domestic responsibilities. There is a need for alternative models of development. The Self-Employed Women's Organization in India serves as a model for resisting exploitation among self-employed and home-based employees. Female industrial strikers are demanding attention to excessive hours of work, enforced overtime, bullying, and lack of sanitary and medical facilities. There is always fear that organized resistance will lead to industrial relocation or loss of jobs. The International Labor Organization has had a code for 20 years, but the threat of exposure to the press is sometimes more effective. There must be regulation throughout subcontracting chains of transnational companies. International alliances should revolve around issues/strategies identified by workers. International alliances are needed for influencing multinational companies and national governments and lobbying global economic and financial institutions. Standards that are included in social clause discussions are minimum requirements that do not address gender-specific issues. Women Working Worldwide is developing a position statement of social clauses that incorporates a women's perspective.
Securing the Internet frontier.
Morrissey, J
1996-10-21
Just as in the Wild West, security strategies are being mobilized for the untamed Internet frontier. Technology developed by settlers from the banking and merchandising industries is being retooled for healthcare, where security-conscious industries see a big market opportunity.
NASA Astrophysics Data System (ADS)
Chen, Shaobo; Chen, Pingxiuqi; Shao, Qiliang; Basha Shaik, Nazeem; Xie, Jiafeng
2017-05-01
The elliptic curve cryptography (ECC) provides much stronger security per bits compared to the traditional cryptosystem, and hence it is an ideal role in secure communication in smart grid. On the other side, secure implementation of finite field multiplication over GF(2 m ) is considered as the bottle neck of ECC. In this paper, we present a novel obfuscation strategy for secure implementation of systolic field multiplier for ECC in smart grid. First, for the first time, we propose a novel obfuscation technique to derive a novel obfuscated systolic finite field multiplier for ECC implementation. Then, we employ the DNA cryptography coding strategy to obfuscate the field multiplier further. Finally, we obtain the area-time-power complexity of the proposed field multiplier to confirm the efficiency of the proposed design. The proposed design is highly obfuscated with low overhead, suitable for secure cryptosystem in smart grid.
Security Strategy of the Bureau of Diplomatic Security.
2011-06-10
Williams, M.A. , Member John A. Dyson, MBA , Member Gregory Scott Hospodor, Ph.D Accepted this 10th day of June 2011 by...ACRONYMS AAR After Action Review ASOS Advance Security Overseas Seminar ATA Antiterrorism Assistance Program BRSO Regional Security Officer Course ...BSAC Basic Special Agent Course DS Bureau of Diplomatic Security FACT Foreign Affairs Counter Threat FAH Foreign Affairs Handbook FAM Foreign
26 CFR 1.475(c)-2 - Definitions-security.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 26 Internal Revenue 6 2013-04-01 2013-04-01 false Definitions-security. 1.475(c)-2 Section 1.475(c... (CONTINUED) INCOME TAXES (CONTINUED) Inventories § 1.475(c)-2 Definitions—security. (a) Items that are not securities. The following items are not securities within the meaning of section 475(c)(2) with respect to a...
26 CFR 1.475(c)-2 - Definitions-security.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 26 Internal Revenue 6 2014-04-01 2014-04-01 false Definitions-security. 1.475(c)-2 Section 1.475(c... (CONTINUED) INCOME TAXES (CONTINUED) Inventories § 1.475(c)-2 Definitions—security. (a) Items that are not securities. The following items are not securities within the meaning of section 475(c)(2) with respect to a...
26 CFR 1.475(c)-2 - Definitions-security.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 26 Internal Revenue 6 2012-04-01 2012-04-01 false Definitions-security. 1.475(c)-2 Section 1.475(c... (CONTINUED) INCOME TAXES (CONTINUED) Inventories § 1.475(c)-2 Definitions—security. (a) Items that are not securities. The following items are not securities within the meaning of section 475(c)(2) with respect to a...
26 CFR 1.475(c)-2 - Definitions-security.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 26 Internal Revenue 6 2011-04-01 2011-04-01 false Definitions-security. 1.475(c)-2 Section 1.475(c... (CONTINUED) INCOME TAXES (CONTINUED) Inventories § 1.475(c)-2 Definitions—security. (a) Items that are not securities. The following items are not securities within the meaning of section 475(c)(2) with respect to a...
Children's perceptions of emotion regulation strategy effectiveness: links with attachment security.
Waters, Sara F; Thompson, Ross A
2016-08-01
Six- and nine-year-old children (N = 97) heard illustrated stories evoking anger in a story character and provided evaluations of the effectiveness of eight anger regulation strategies. Half the stories involved the child's mother as social partner and the other half involved a peer. Attachment security was assessed via the Security Scale. Children reported greater effectiveness for seeking support from adults and peers in the peer context than the mother context, but perceived venting as more effective with mothers. Children with higher security scores were more likely to endorse problem solving and less likely to endorse aggression in both social contexts than those with lower security scores. Early evidence for gender differences was found in that boys endorsed the effectiveness of distraction while girls endorsed venting their emotion.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pepper, Susan E.
2014-10-10
Brookhaven National Laboratory’s (BNL’s) Nonproliferation and National Security Department contributes to the National Nuclear Security Administration Office of Nonproliferation and International Security Next Generation Safeguards Initiative (NGSI) through university engagement, safeguards internships, safeguards courses, professional development, recruitment, and other activities aimed at ensuring the next generation of international safeguards professionals is adequately prepared to support the U.S. safeguards mission. This report is a summary of BNL s work under the NGSI program in Fiscal Year 2014.
2001-07-01
and it (usu ally) takes the in put of ju niors to help a se nior strat e gist ar rive at his con clu sions. 3 Lieutenant General Richard Chilcoat...Major General Richard A. Chilcoat, Strategic Art: The New Discipline for 21st Century Leaders, Carlisle Barracks, PA: Strategic Studies Institute...beyond the scope of this chapter, Richard Betts’ insightful essay on the importance of strategic studies supports the notion that security studies is
The Use of Private Security by the United Kingdom and the Subsequent Impacts on Operational Planning
2014-05-22
2003 and 2008.4 The UK and US dominate the global market for private military companies.5 Therefore, scholarly research on the UK should help explain...provide a certain military skill applicable to the conduct of warfare. Deborah Avant, in her 2005 work The Market for Force : The Consequences of...International Security," International Security 26, no. 3 (Winter 2001-2002): 186. 14Deborah D. Avant, The Market for Force : The Consequences of Privatizing
2013-06-14
ever-evolving contemporary nature of external and internal threats to the safety and security of the American homeland, it becomes increasingly...Major Justin P. Hurt, 146 pages. With the ever-evolving contemporary nature of external and internal threats to the safety and security of the American...HAZMAT Hazardous Materials HRF Homeland Response Force HSPD Homeland Security Presidential Directive JFHQ Joint Force
Cybersecurity in Hospitals: A Systematic, Organizational Perspective
Kaiser, Jessica P
2018-01-01
Background Cybersecurity incidents are a growing threat to the health care industry in general and hospitals in particular. The health care industry has lagged behind other industries in protecting its main stakeholder (ie, patients), and now hospitals must invest considerable capital and effort in protecting their systems. However, this is easier said than done because hospitals are extraordinarily technology-saturated, complex organizations with high end point complexity, internal politics, and regulatory pressures. Objective The purpose of this study was to develop a systematic and organizational perspective for studying (1) the dynamics of cybersecurity capability development at hospitals and (2) how these internal organizational dynamics interact to form a system of hospital cybersecurity in the United States. Methods We conducted interviews with hospital chief information officers, chief information security officers, and health care cybersecurity experts; analyzed the interview data; and developed a system dynamics model that unravels the mechanisms by which hospitals build cybersecurity capabilities. We then use simulation analysis to examine how changes to variables within the model affect the likelihood of cyberattacks across both individual hospitals and a system of hospitals. Results We discuss several key mechanisms that hospitals use to reduce the likelihood of cybercriminal activity. The variable that most influences the risk of cyberattack in a hospital is end point complexity, followed by internal stakeholder alignment. Although resource availability is important in fueling efforts to close cybersecurity capability gaps, low levels of resources could be compensated for by setting a high target level of cybersecurity. Conclusions To enhance cybersecurity capabilities at hospitals, the main focus of chief information officers and chief information security officers should be on reducing end point complexity and improving internal stakeholder alignment. These strategies can solve cybersecurity problems more effectively than blindly pursuing more resources. On a macro level, the cyber vulnerability of a country’s hospital infrastructure is affected by the vulnerabilities of all individual hospitals. In this large system, reducing variation in resource availability makes the whole system less vulnerable—a few hospitals with low resources for cybersecurity threaten the entire infrastructure of health care. In other words, hospitals need to move forward together to make the industry less attractive to cybercriminals. Moreover, although compliance is essential, it does not equal security. Hospitals should set their target level of cybersecurity beyond the requirements of current regulations and policies. As of today, policies mostly address data privacy, not data security. Thus, policy makers need to introduce policies that not only raise the target level of cybersecurity capabilities but also reduce the variability in resource availability across the entire health care system. PMID:29807882
Safety Versus Passenger Service: The Flight Attendants’ Dilemma
Damos, Diane L.; Boyett, Kimberly S.; Gibbs, Patt
2013-01-01
After 9/11, new security duties were instituted at many U.S. air carriers and existing safety and security duties received increased emphasis. Concurrently, in-flight services were changed and in many cases, cabin crews were reduced. This article examines the post-9/11 conflict between passenger service and the timely performance of safety and security duties at 1 major U.S. air carrier. In-flight data were obtained on both international and domestic flights. The data suggest that the prompt performance of the safety and security duties is adversely affected by the number of service duties occurring in the later part of both international and domestic flights. PMID:23667300
The Role of Pulsed Power in International Security and Counterterrorism
2013-06-01
penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE JUN 2003...2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE The Role Of Pulsed Power In International Security And Counterterrorism 5a...In spite of the international sanctions, the Third Reich enjoyed the second-largest industrial base on earth . In a number of technical disciplines
CrossTalk: The Journal of Defense Software Engineering. Volume 20, Number 3, March 2007
2007-03-01
Capability Maturity Model ® Integration (CMMI®). CMU Software Engineering Institute <www.sei.cmu.edu/cmmi>. 5. ISO /IEC 27001 :2005. Information Security...international standards bodies – International Organization for Standardi- zation ( ISO ) and International Electro- technical Commission (IEC) – are working on a...number of projects that affect soft- ware security: • The ISO Technical Management Board (TMB) performs strategic planning and coordination for ISO
Synthesis of securement device options and strategies
DOT National Transportation Integrated Search
2002-03-01
The Americans with Disabilities Act of 1990 (ADA) requires that public transit vehicles be equipped with securement location(s) and device(s) that are able to secure common wheelchairs," as defined in the ADA regulations. The definition and size spec...
26 CFR 301.7701-11 - Social security number.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 26 Internal Revenue 18 2011-04-01 2011-04-01 false Social security number. 301.7701-11 Section 301... ADMINISTRATION PROCEDURE AND ADMINISTRATION Definitions § 301.7701-11 Social security number. For purposes of this chapter, the term social security number means the taxpayer identifying number of an individual or...
26 CFR 1.544-5 - Convertible securities.
Code of Federal Regulations, 2013 CFR
2013-04-01
...) INCOME TAXES (CONTINUED) Personal Holding Companies § 1.544-5 Convertible securities. Under section 544(b) outstanding securities of a corporation such as bonds, debentures, or other corporate obligations, convertible... 26 Internal Revenue 7 2013-04-01 2013-04-01 false Convertible securities. 1.544-5 Section 1.544-5...
26 CFR 1.544-5 - Convertible securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
...) INCOME TAXES (CONTINUED) Personal Holding Companies § 1.544-5 Convertible securities. Under section 544(b) outstanding securities of a corporation such as bonds, debentures, or other corporate obligations, convertible... 26 Internal Revenue 7 2010-04-01 2010-04-01 true Convertible securities. 1.544-5 Section 1.544-5...
26 CFR 1.544-5 - Convertible securities.
Code of Federal Regulations, 2011 CFR
2011-04-01
...) INCOME TAXES (CONTINUED) Personal Holding Companies § 1.544-5 Convertible securities. Under section 544(b) outstanding securities of a corporation such as bonds, debentures, or other corporate obligations, convertible... 26 Internal Revenue 7 2011-04-01 2009-04-01 true Convertible securities. 1.544-5 Section 1.544-5...
26 CFR 1.544-5 - Convertible securities.
Code of Federal Regulations, 2012 CFR
2012-04-01
...) INCOME TAXES (CONTINUED) Personal Holding Companies § 1.544-5 Convertible securities. Under section 544(b) outstanding securities of a corporation such as bonds, debentures, or other corporate obligations, convertible... 26 Internal Revenue 7 2012-04-01 2012-04-01 false Convertible securities. 1.544-5 Section 1.544-5...
26 CFR 1.544-5 - Convertible securities.
Code of Federal Regulations, 2014 CFR
2014-04-01
...) INCOME TAXES (CONTINUED) Personal Holding Companies § 1.544-5 Convertible securities. Under section 544(b) outstanding securities of a corporation such as bonds, debentures, or other corporate obligations, convertible... 26 Internal Revenue 7 2014-04-01 2013-04-01 true Convertible securities. 1.544-5 Section 1.544-5...
26 CFR 301.7701-11 - Social security number.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 26 Internal Revenue 18 2012-04-01 2012-04-01 false Social security number. 301.7701-11 Section 301... ADMINISTRATION PROCEDURE AND ADMINISTRATION Definitions § 301.7701-11 Social security number. For purposes of this chapter, the term social security number means the taxpayer identifying number of an individual or...
26 CFR 301.7701-11 - Social security number.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 26 Internal Revenue 18 2014-04-01 2014-04-01 false Social security number. 301.7701-11 Section 301... ADMINISTRATION PROCEDURE AND ADMINISTRATION Definitions § 301.7701-11 Social security number. For purposes of this chapter, the term social security number means the taxpayer identifying number of an individual or...
26 CFR 301.7701-11 - Social security number.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 26 Internal Revenue 18 2013-04-01 2013-04-01 false Social security number. 301.7701-11 Section 301... ADMINISTRATION PROCEDURE AND ADMINISTRATION Definitions § 301.7701-11 Social security number. For purposes of this chapter, the term social security number means the taxpayer identifying number of an individual or...
26 CFR 301.7701-11 - Social security number.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Social security number. 301.7701-11 Section 301... ADMINISTRATION PROCEDURE AND ADMINISTRATION Definitions § 301.7701-11 Social security number. For purposes of this chapter, the term social security number means the taxpayer identifying number of an individual or...
ERIC Educational Resources Information Center
Bracy, Nicole L.
2009-01-01
Public schools have transformed significantly over the past several decades in response to broad concerns about rising school violence. Today's public schools are high security environments employing tactics commonly found in jails and prisons such as police officers, security cameras, identification systems, and secure building strategies.…
Effective Management of Information Security and Privacy
ERIC Educational Resources Information Center
Anderson, Alicia
2006-01-01
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G; Muhammed, Ado J G
2016-05-01
The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. © 2016 World Health Organization; licensee Oxford Journals.
Hamisu, Abdullahi Walla; Johnson, Ticha Muluh; Craig, Kehinde; Mkanda, Pascal; Banda, Richard; Tegegne, Sisay G.; Oyetunji, Ajiboye; Ningi, Nuhu; Mohammed, Said M.; Adamu, Mohammed Isa; Abdulrahim, Khalid; Nsubuga, Peter; Vaz, Rui G.; Muhammed, Ado J. G.
2016-01-01
Background. The security-challenged states of Adamawa, Borno, and Yobe bear most of the brunt of the Boko Haram insurgency in Nigeria. The security challenge has led to the killing of health workers, destruction of health facilities, and displacement of huge populations. To identify areas of polio transmission and promptly detect possible cases of importation in these states, polio surveillance must be very sensitive. Methods. We conducted a retrospective review of acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using the acute flaccid paralysis database at the World Health Organization Nigeria Country Office. We also reviewed the reports of surveillance activities conducted in these security-challenged states, to identify strategies that were implemented to improve polio surveillance. Results. Environmental surveillance was implemented in Borno in 2013 and in Yobe in 2014. All disease surveillance and notification officers in the 3 security-challenged states now receive annual training, and the number of community informants in these states has dramatically increased. Media-based messaging (via radio and television) is now used to sensitize the public to the importance of surveillance, and contact samples have been regularly collected in both states since 2014. Conclusions. The strategies implemented in the security-challenged states improved the quality of polio surveillance during the review period. PMID:26655842
Friedman, Charles P; Iakovidis, Ilias; Debenedetti, Laurent; Lorenzi, Nancy M
2009-11-01
Countries on both sides of the Atlantic Ocean have invested in health information and communication technologies. Since eHealth challenges cross borders a European Union-United States of America conference on public policies relating to health IT and eHealth was held October 20-21, 2008 in Paris, France. The conference was organized around the four themes: (1) privacy and security, (2) health IT interoperability, (3) deployment and adoption of health IT, and (4) Public Private Collaborative Governance. The four key themes framed the discussion over the two days of plenary sessions and workshops. Key findings of the conference were organized along the four themes. (1) Privacy and security: Patients' access to their own data and key elements of a patient identification management framework were discussed. (2) Health IT interoperability: Three significant and common interoperability challenges emerged: (a) the need to establish common or compatible standards and clear guidelines for their implementation, (b) the desirability for shared certification criteria and (c) the need for greater awareness of the importance of interoperability. (3) Deployment and adoption of health IT: Three major areas of need emerged: (a) a shared knowledge base and assessment framework, (b) public-private collaboration and (c) and effective organizational change strategies. (4) Public Private Collaborative Governance: Sharing and communication are central to success in this area. Nations can learn from one another about ways to develop harmonious, effective partnerships. Three areas that were identified as highest priority for collaboration included: (1) health data security, (2) developing effective strategies to ensure healthcare professionals' acceptance of health IT tools, and (3) interoperability.
Hagman, Ingela; Tegern, Matthias; Broman, Lisbet; Larsson, Helena
2018-01-01
Background Musculoskeletal complaints and injuries (MSCI) are common in military populations. However, only a limited number of studies have followed soldiers during international deployments and investigated the prevalence of MSCI during and at the end of their deployment. The aim was to describe the prevalence of MSCI in different military occupational specialties and categorise their most common tasks in terms of exposures to physical workloads during a six-month long international deployment in Afghanistan. Methods Cross-sectional survey, including 325 soldiers (300 men), aged 20–62 participating in an international deployment in Afghanistan during the spring of 2012. Soldiers were clustered into different military occupational specialties: Infantry, Administration, Logistics, Logistics/Camp, Medical and Other. Data were collected through the use of the Musculoskeletal Screening Protocol at the end of the international mission. Results Forty-seven percent reported MSCI during deployment, with 28% at the end. The most common locations of MSCI during the mission were lower back, knee, shoulders, upper back, neck and foot, while the knee and lower back prevailed at the end of the mission. Almost half of the soldiers who had MSCI reported affected work ability. The most common duties during the mission were vehicle patrolling, staff duties, guard/security duties, foot patrols and transportation. Soldiers reported that vehicle patrolling, staff duties and transportation were demanding with respect to endurance strength, guard/security duties challenged both maximum and endurance strength while foot patrolling challenged maximum and endurance strength, aerobic and anaerobic endurance and speed. Conclusions MSCI during international deployment are common among Swedish soldiers. The results indicate the need to further develop strategies focusing on matching the soldiers’ capacity to the job requirements, with relevant and fair physical selection-tests during the recruitment process and proactive interventions targeting MSCI before and during deployment, in order to enhance soldiers’ readiness and promote operational readiness. PMID:29621324
Indicators of economic security of the region: a risk-based approach to assessing and rating
NASA Astrophysics Data System (ADS)
Karanina, Elena; Loginov, Dmitri
2017-10-01
The article presents the results of research of theoretical and methodical problems of strategy development for economic security of a particular region, justified by the composition of risk factors. The analysis of those risk factors is performed. The threshold values of indicators of economic security of regions were determined using the methods of socioeconomic statistics. The authors concluded that in modern Russian conditions it is necessary to pay great attention to the analysis of the composition and level of indicators of economic security of the region and, based on the materials of this analysis, to formulate more accurate decisions concerning the strategy of socio-economic development.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-28
... teleconference. The meeting is limited to one topic, the 2010 National Strategy for Global Supply Chain Security... COAC will meet to discuss its views on the development of the 2010 National Strategy for Global Supply Chain Security. Public Participation: This meeting is open to the public; however, participation in COAC...
Exploring the Future of Security in the Caribbean: a Regional Security Partnership?
2007-12-14
by these organizations and their members. 25 CHAPTER 2 LITERATURE REVIEW Psychologist Abraham Maslow posited that safety [read security] is one...addressing the security needs of the Caribbean Basin and the United States? Of necessity , there are several secondary questions which must be...development of models/ theories of security. These theories of security abound, and have evolved as the international arena has changed. Realists, idealists and
ERIC Educational Resources Information Center
Cachola, Ellen-Rae Cabebe
2014-01-01
This dissertation describes the International Women's Network Against Militarism's (IWNAM) political epistemology of security from an archival perspective, and how they create community archives to evidence this epistemology. This research examines records created by Women for Genuine Security (WGS) and Women's Voices Women Speak (WVWS), U.S. and…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-05
.... Introduction On May 21, 2012, the International Securities Exchange, LLC (``ISE'' or ``Exchange'') filed with... its Short Term Option Series Program (``STOS Program'') to permit, during the expiration week of an... open for trading Short Term Option Series at $0.50 strike price intervals for option classes that trade...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-02
... methodology developed by NationsShares, a firm that develops proprietary derivatives-based indexes and options... Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To List Options... the Exchange of options on the Nations VolDex index, a new index that measures changes in implied...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-22
... Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... at or under the threshold are charged the constituent's prescribed execution fee. This waiver applies... members to execute large-sized FX options orders on the Exchange in a manner that is cost effective. The...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-02
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Accreditation and Approval of Coastal Gulf and International, Inc. as a Commercial Gauger and Laboratory AGENCY: U.S. Customs and Border Protection, Department of Homeland Security. ACTION: Notice of accreditation and approval of Coastal Gulf and...
Code of Federal Regulations, 2014 CFR
2014-01-01
... of significant financial stress appropriate to the security or category of securities. (5) An FDIC... significant financial stress used to calculate the FDIC-supervised institution's own internal estimates for... significant financial stress in the calculation of own internal estimates for haircuts. (7) An FDIC-supervised...
The Contribution of University Accommodation to International Student Security
ERIC Educational Resources Information Center
Paltridge, Toby; Mayson, Susan; Schapper, Jan
2010-01-01
In this paper we argue that living in university accommodation is a possible means of improving the security of international students. Our argument is supported by a qualitative case study of a single Hall of Residence on Monash University's Clayton campus. Data were collected primarily from interviews with three groups of participants--six…
26 CFR 1.1081-9 - Requirements with respect to order of Securities and Exchange Commission.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Securities and Exchange Commission must recite that the exchange, expenditure, investment, distribution, or... investment, the investment to be made, so as clearly to identify such property. (c) The exchange, acquisition... and Exchange Commission. 1.1081-9 Section 1.1081-9 Internal Revenue INTERNAL REVENUE SERVICE...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] BluePoint Linux Software Corp., China Bottles Inc., Long-e International, Inc., and Nano Superlattice Technology, Inc.; Order of Suspension of... current and accurate information concerning the securities of BluePoint Linux Software Corp. because it...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-27
... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board; Task Force on Trends and Implications of Climate Change for National and International Security AGENCY: Department of Defense (DoD... and Implications of Climate Change for National and International Security will meet in closed session...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-17
... DEPARTMENT OF DEFENSE Office of the Secretary Defense Science Board Task Force on Trends and Implications of Climate Change for National and International Security AGENCY: Department of Defense (DoD... and Implications of Climate Change for National and International Security will meet in closed session...
SEVIS: The Impact of Homeland Security on American Colleges and Universities
ERIC Educational Resources Information Center
Danley, Janet V.
2010-01-01
This chapter covers the impact of homeland security mandates on institutions and international students and scholars. The author traces the history of interest by the Immigration and Naturalization Service (INS) in developing a management system for international students and scholars that eventually resulted in the birth of Student and Exchange…
2016-06-08
Affairs June 8, 2016 Congressional Research Service 7-5700 www.crs.gov R43838 A Shift in the International Security Environment: Potential...Implications for Defense Congressional Research Service Summary World events have led some observers, starting in late 2013, to conclude that the...Defense Congressional Research Service Contents Introduction
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-09
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2009-0066] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Internal Revenue Service (IRS))--Match 1305 AGENCY: Social Security... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub. L.) 100-503...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-12
... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2010-0015] Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Internal Revenue Service (IRS))--Match Number 1016 AGENCY: Social Security... regarding protections for such persons. The Privacy Act, as amended, regulates the use of computer matching...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Juhui; School of Computatioal Sciences, Korea Institute for Advanced Study, Seoul 130-722; Lee, Soojoon
Extending the eavesdropping strategy devised by Zhang, Li, and Guo [Zhang, Li, and Guo, Phys. Rev. A 63, 036301 (2001)], we show that the multiparty quantum communication protocol based on entanglement swapping, which was proposed by Cabello (e-print quant-ph/0009025), is not secure. We modify the protocol so that entanglement swapping can secure multiparty quantum communication, such as multiparty quantum key distribution and quantum secret sharing of classical information, and show that the modified protocol is secure against the Zhang-Li-Guo strategy for eavesdropping as well as the basic intercept-resend attack.0.
Kluge, Hans; Martín-Moreno, Jose Maria; Emiroglu, Nedret; Rodier, Guenael; Kelley, Edward; Vujnovic, Melitta; Permanand, Govin
2018-01-01
The International Health Regulations (IHR) 2005, as the overarching instrument for global health security, are designed to prevent and cope with major international public health threats. But poor implementation in countries hampers their effectiveness. In the wake of a number of major international health crises, such as the 2014 Ebola and 2016 Zika outbreaks, and the findings of a number of high-level assessments of the global response to these crises, it has become clear that there is a need for more joined-up thinking between health system strengthening activities and health security efforts for prevention, alert and response. WHO is working directly with its Member States to promote this approach, more specifically around how to better embed the IHR (2005) core capacities into the main health system functions. This paper looks at how and where the intersections between the IHR and the health system can be best leveraged towards developing greater health system resilience. This merging of approaches is a key component in pursuit of Universal Health Coverage and strengthened global health security as two mutually reinforcing agendas. PMID:29379650
Kluge, Hans; Martín-Moreno, Jose Maria; Emiroglu, Nedret; Rodier, Guenael; Kelley, Edward; Vujnovic, Melitta; Permanand, Govin
2018-01-01
The International Health Regulations (IHR) 2005, as the overarching instrument for global health security, are designed to prevent and cope with major international public health threats. But poor implementation in countries hampers their effectiveness. In the wake of a number of major international health crises, such as the 2014 Ebola and 2016 Zika outbreaks, and the findings of a number of high-level assessments of the global response to these crises, it has become clear that there is a need for more joined-up thinking between health system strengthening activities and health security efforts for prevention, alert and response. WHO is working directly with its Member States to promote this approach, more specifically around how to better embed the IHR (2005) core capacities into the main health system functions. This paper looks at how and where the intersections between the IHR and the health system can be best leveraged towards developing greater health system resilience. This merging of approaches is a key component in pursuit of Universal Health Coverage and strengthened global health security as two mutually reinforcing agendas.
NASA Astrophysics Data System (ADS)
Correia, Victor; Allington, Ruth; Keane, Christopher
2016-04-01
A secure supply of raw materials is a European priority that extends beyond country borders and national policies. Recent European initiatives have pioneered the development of an EU strategy on raw materials emphasizing the concept of the "added value chain", which continues to pursue the three pillar strategy to: (1) ensure the fair and sustainable supply of raw materials from international markets, promoting international cooperation with developed and developing countries; (2) foster sustainable supply of raw materials from European sources, and (3) reduce consumption of primary raw materials by increasing resource efficiency and promoting recycling. This contribution presents the Horizon 2020 funded project INTRAW, the objective of which is to establish the European Union's International Observatory for Raw Materials. The creation and maintenance of the European Union's International Observatory for Raw Materials is designed to have a strong impact in two dimensions: 1. To narrow the existing gap in aspects of the raw materials knowledge infrastructure in the EU by providing a link with the same knowledge infrastructure in technologically advanced reference countries. This should contribute to the harmonization of mineral policies all over the EU, by providing data that enables evidence-based policies and appropriate, cost-effective management, planning and adaptation decisions by the public sector. This will benefit businesses, industry and society. The Observatory will also provide to policy makers in the EU and its Member States the data they need to facilitate discussion in multilateral forums. 2. To enable a better alignment of the R&I activities among the individual EU members and international cooperation countries AND between the European Union and international cooperation countries by boosting synergies with international research and innovation programmes. This way the EU's role and scientific capabilities in the raw materials area will be reinforced in the mid-term, and the conditions for sustainable access and supply of raw materials in the EU will benefit from the international cooperation. The authors will describe the key stages of the INTRAW project and explain how it aims to establish (and promote the continuation of) international cooperation at every stage of the raw materials value chain and to build a repository of information and analysis to support the development and strengthening of EU raw materials strategies. Key elements of the value chain upon which the project focuses are: industry and trade; education and outreach; and research and innovation. The roles of geoscientists in delivering the aims and objectives of INTRAW will be emphasised.
Security Assistance Dependence - Wielding American Power
2002-12-09
national security objectives. One vehicle of this power brokering is the well-developed international security assistance program – oftentimes...incorrectly referred to exclusively as foreign military sales. There is nothing simple about the security assistance program as it has developed today...For the USG, there are many agencies influencing today’s security assistance program to execute complex, integrated tasks directly impacting U.S
Food security and development in South Sudan: a call to action.
Tappis, Hannah; Doocy, Shannon; Paul, Amy; Funna, Sonya
2013-09-01
To examine household food insecurity and coping mechanisms in two relatively politically stable states of South Sudan. Cross-sectional assessment including structured interviews and focus group discussions with food aid programme beneficiaries and staff. Structured interview findings were analysed with descriptive statistics using the statistical software package STATA version 11. Rural households in four payams (sub-county administrative districts) benefiting from a multi-year assistance programme funded by the US Agency for International Development. The study was conducted in January 2012, six months after independence. Study subjects included eighty mothers of children aged 6–23 months in structured interviews and eight focus groups, each with six to ten participants, of mothers of children aged 6–23 months. Ninety-three per cent of households surveyed in Warrap and 100% of households in Northern Bahr el Ghazal states were severely food access insecure. Nearly all households (97?5%) surveyed in both states reported there were months in 2011 without enough food to eat. The majority of households (88%) reported sometimes or often going to bed hungry in the month preceding the study. A number of coping mechanisms were used when households did not have enough food, including reduced meal size, skipping meals, selling assets and engaging in some kind business in order to generate money to buy food. Given the highly volatile political, economic and humanitarian situation in South Sudan, the priorities of the international community are understandably focused on securing greater stability in South Sudan and preventing humanitarian needs from escalating significantly. There is a need, however, for simultaneous emphasis on food assistance and longer-term development strategies throughout South Sudan, particularly in areas of agriculture, livelihoods and food security.
Complexity Studies and Security in the Complex World: An Epistemological Framework of Analysis
NASA Astrophysics Data System (ADS)
Mesjasz, Czeslaw
The impact of systems thinking can be found in numerous security-oriented research, beginning from the early works on international system: Pitrim Sorokin, Quincy Wright, first models of military conflict and war: Frederick Lanchester, Lewis F. Richardson, national and military security (origins of RAND Corporation), through development of game theory-based conflict studies, International Relations, classical security studies of Morton A. Kaplan, Karl W. Deutsch [Mesjasz 1988], and ending with contemporary ideas of broadened concepts of security proposed by the Copenhagen School [Buzan et al 1998]. At present it may be even stated that the new military and non-military threats to contemporary complex society, such as low-intensity conflicts, regional conflicts, terrorism, environmental disturbances, etc. cannot be embraced without ideas taken from modern complex systems studies.
International migration: security concerns and human rights standards.
Crépeau, François; Nakache, Delphine; Atak, Idil
2007-09-01
Over the last two decades, the reinforcement of security-related migration policies has resulted in the perception of the foreigner, and especially the irregular migrant, as a category outside the circle of legality. The rights of foreigners in host countries have deteriorated due to the connection made between immigration and criminality. Restrictions imposed upon irregular migrants' basic political and civil rights have been accompanied by major obstacles to their access to economic and social rights, including the right to health. The events of 9/11 further contributed to this trend, which contradicts the basic premises of the human rights paradigm. Recent policy developments and ongoing international cooperation implementing systematic interception and interdiction mechanisms have led to the securitization of migration. The preventive and deterrent measures reinforce the security paradigm. By contrast, various national and international actors have been successful in defending irregular migrants' rights. At the domestic level, the involvement of the judiciary and civil society enhances the rights-based approach to foreigners. The role of judges is vital in holding policy-makers accountable for respecting the high national standards of human rights protection. This article elaborates on the dichotomy between the state's legitimate interest to ensure national security, and its domestic and international obligations to protect human rights for all, including irregular migrants. It focuses on the changing relationship between migration and security, on the one hand, and between state and individual, on the other hand. It affirms the necessity to recognize the pre-eminence of fundamental rights upon security concerns.
The Role Of Moral Awareness In Computer Security
NASA Astrophysics Data System (ADS)
Stawinski, Arthur
1984-08-01
Maintaining security of databases and other computer systems requires constraining the behavior of those persons who are able to access these systems so that they do not obtain, alter, or abuse the information contained in these systems. Three types of constraints are available: Physical contraints are obstructions designed to prevent (or at least make difficult) access to data by unauthorized persons; external constraints restrict behavior through threat of detection and punishment; internal constraints are self-imposed limitations on behavior which are derived from a person's moral standards. This paper argues that an effective computer security program will require attention to internal constraints as well as physical and external ones. Recent developments in moral philosophy and the psychology of moral development have given us new understanding of how individuals grow in moral awareness and how this growth can be encouraged. These insights are the foundation for some practical proposals for encouraging morally responsible behavior by computer professionals and others with access to confidential data. The aim of this paper is to encourage computer security professionals to discuss, refine and incorporate systems of internal constraints in developing methods of maintaining security.
Large scale land acquisitions and REDD+: a synthesis of conflicts and opportunities
NASA Astrophysics Data System (ADS)
Carter, Sarah; Manceur, Ameur M.; Seppelt, Ralf; Hermans-Neumann, Kathleen; Herold, Martin; Verchot, Lou
2017-03-01
Large scale land acquisitions (LSLA), and Reducing Emissions from Deforestation and forest Degradation (REDD+) are both land based phenomena which when occurring in the same area, can compete with each other for land. A quantitative analysis of country characteristics revealed that land available for agriculture, accessibility, and political stability are key explanatory factors for a country being targeted for LSLA. Surprisingly LSLA occur in countries with lower accessibility. Countries with good land availability, poor accessibility and political stability may become future targets if they do not already have LSLA. Countries which high levels of agriculture-driven deforestation and LSLA, should develop interventions which reduce forest loss driven either directly or indirectly by LSLA as part of their REDD+ strategies. Both host country and investor-side policies have been identified which could be used more widely to reduce conflicts between LSLA and REDD+. Findings from this research highlight the need for and can inform the development of national and international policies on land acquisitions including green acquisitions such as REDD+. Land management must be considered with all its objectives—including food security, biodiversity conservation, and climate change mitigation—in a coherent strategy which engages relevant stakeholders. This is not currently occurring and might be a key ingredient to achieve the targets under the Sustainable Development Goals 2 and 15 and 16 (related to food security and sustainable agriculture and the protection of forests) among others.