Interface of Science, Technology and Security: Areas of Most Concern, Now and Ahead
2017-03-28
connectivity is creating new forms of security threats and exploitable instabilities. There is a need to develop secure software to reduce vulnerabilities...implications in the light of global population growth, industrialization and limited fossil fuel supplies. The continued improvement of generation, storage...national strategic concern is when the S&T-security nexus creates opportunities for misunderstanding. These opportunities assume two forms , rooted in
School Security and Student Misbehavior: A Multi-Level Examination
ERIC Educational Resources Information Center
Servoss, Timothy J.
2017-01-01
Despite a nationwide trend to increase security measures in schools, their effectiveness in reducing or preventing student misbehavior remains largely unexamined. In addition, there is concern that increased security may have unintended negative side effects and is applied inequitably across students of disparate racial/ethnic backgrounds. The…
Strategies to Minimize the Effects of Information Security Threats on Business Performance
ERIC Educational Resources Information Center
Okoye, Stella Ifeyinwa
2017-01-01
Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…
2018-01-01
Background The diffusion of health information technologies (HITs) within the health care sector continues to grow. However, there is no theory explaining how success of HITs influences patient care outcomes. With the increase in data breaches, HITs’ success now hinges on the effectiveness of data protection solutions. Still, empirical research has only addressed privacy concerns, with little regard for other factors of information assurance. Objective The objective of this study was to study the effectiveness of HITs using the DeLone and McLean Information Systems Success Model (DMISSM). We examined the role of information assurance constructs (ie, the role of information security beliefs, privacy concerns, and trust in health information) as measures of HIT effectiveness. We also investigated the relationships between information assurance and three aspects of system success: attitude toward health information exchange (HIE), patient access to health records, and perceived patient care quality. Methods Using structural equation modeling, we analyzed the data from a sample of 3677 cancer patients from a public dataset. We used R software (R Project for Statistical Computing) and the Lavaan package to test the hypothesized relationships. Results Our extension of the DMISSM to health care was supported. We found that increased privacy concerns reduce the frequency of patient access to health records use, positive attitudes toward HIE, and perceptions of patient care quality. Also, belief in the effectiveness of information security increases the frequency of patient access to health records and positive attitude toward HIE. Trust in health information had a positive association with attitudes toward HIE and perceived patient care quality. Trust in health information had no direct effect on patient access to health records; however, it had an indirect relationship through privacy concerns. Conclusions Trust in health information and belief in the effectiveness of information security safeguards increases perceptions of patient care quality. Privacy concerns reduce patients’ frequency of accessing health records, patients’ positive attitudes toward HIE exchange, and overall perceived patient care quality. Health care organizations are encouraged to implement security safeguards to increase trust, the frequency of health record use, and reduce privacy concerns, consequently increasing patient care quality. PMID:29643052
Automating Risk Analysis of Software Design Models
Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P.
2014-01-01
The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance. PMID:25136688
Automating risk analysis of software design models.
Frydman, Maxime; Ruiz, Guifré; Heymann, Elisa; César, Eduardo; Miller, Barton P
2014-01-01
The growth of the internet and networked systems has exposed software to an increased amount of security threats. One of the responses from software developers to these threats is the introduction of security activities in the software development lifecycle. This paper describes an approach to reduce the need for costly human expertise to perform risk analysis in software, which is common in secure development methodologies, by automating threat modeling. Reducing the dependency on security experts aims at reducing the cost of secure development by allowing non-security-aware developers to apply secure development with little to no additional cost, making secure development more accessible. To automate threat modeling two data structures are introduced, identification trees and mitigation trees, to identify threats in software designs and advise mitigation techniques, while taking into account specification requirements and cost concerns. These are the components of our model for automated threat modeling, AutSEC. We validated AutSEC by implementing it in a tool based on data flow diagrams, from the Microsoft security development methodology, and applying it to VOMS, a grid middleware component, to evaluate our model's performance.
Kisekka, Victoria; Giboney, Justin Scott
2018-04-11
The diffusion of health information technologies (HITs) within the health care sector continues to grow. However, there is no theory explaining how success of HITs influences patient care outcomes. With the increase in data breaches, HITs' success now hinges on the effectiveness of data protection solutions. Still, empirical research has only addressed privacy concerns, with little regard for other factors of information assurance. The objective of this study was to study the effectiveness of HITs using the DeLone and McLean Information Systems Success Model (DMISSM). We examined the role of information assurance constructs (ie, the role of information security beliefs, privacy concerns, and trust in health information) as measures of HIT effectiveness. We also investigated the relationships between information assurance and three aspects of system success: attitude toward health information exchange (HIE), patient access to health records, and perceived patient care quality. Using structural equation modeling, we analyzed the data from a sample of 3677 cancer patients from a public dataset. We used R software (R Project for Statistical Computing) and the Lavaan package to test the hypothesized relationships. Our extension of the DMISSM to health care was supported. We found that increased privacy concerns reduce the frequency of patient access to health records use, positive attitudes toward HIE, and perceptions of patient care quality. Also, belief in the effectiveness of information security increases the frequency of patient access to health records and positive attitude toward HIE. Trust in health information had a positive association with attitudes toward HIE and perceived patient care quality. Trust in health information had no direct effect on patient access to health records; however, it had an indirect relationship through privacy concerns. Trust in health information and belief in the effectiveness of information security safeguards increases perceptions of patient care quality. Privacy concerns reduce patients' frequency of accessing health records, patients' positive attitudes toward HIE exchange, and overall perceived patient care quality. Health care organizations are encouraged to implement security safeguards to increase trust, the frequency of health record use, and reduce privacy concerns, consequently increasing patient care quality. ©Victoria Kisekka, Justin Scott Giboney. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 11.04.2018.
Growing America's Energy Future
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
The emerging U.S. bioenergy industry provides a secure and growing supply of transportation fuels, biopower, and bioproducts produced from a range of abundant, renewable biomass resources. Bioenergy can help ensure a secure, sustainable, and economically sound future by reducing U.S. dependence on foreign oil, developing domestic clean energy sources, and generating domestic green jobs. Bioenergy can also help address growing concerns about climate change by reducing greenhouse gas emissions to create a healthier environment for current and future generations.
Attachment and prejudice: The mediating role of empathy.
Boag, Elle M; Carnelley, Katherine B
2016-06-01
In two studies, we examined the novel hypothesis that empathy is a mechanism through which the relationship between attachment patterns and prejudice can be explained. Study 1 examined primed attachment security (vs. neutral prime), empathy, and prejudice towards immigrants. Study 2 examined primed attachment patterns (secure, avoidant, anxious), empathy subscales (perspective taking, empathic concern, personal distress), and prejudice towards Muslims. Across both studies, empathy mediated the relationship between primed attachment security and low prejudice levels. The findings suggest that enhancing felt security and empathic skills in individuals high in attachment-avoidance may lead to reduced prejudice. © 2015 The British Psychological Society.
Joint Force Quarterly. Issue 58, 3rd Quarter
2010-06-01
rise to concerns over the future security of the Soviet nuclear arsenal. Anticipating the possibility of loosely controlled nuclear weapons inside...broader Cooperative Threat Reduction program—an unprecedented effort to reduce nuclear dangers by secur- ing or eliminating Russian weapons systems and...volume is about applications of the biological sciences, here called “biologi- cally inspired innovations,” to the military. Rather than treating
Privacy, confidentiality, and electronic medical records.
Barrows, R C; Clayton, P D
1996-01-01
The enhanced availability of health information in an electronic format is strategic for industry-wide efforts to improve the quality and reduce the cost of health care, yet it brings a concomitant concern of greater risk for loss of privacy among health care participants. The authors review the conflicting goals of accessibility and security for electronic medical records and discuss nontechnical and technical aspects that constitute a reasonable security solution. It is argued that with guiding policy and current technology, an electronic medical record may offer better security than a traditional paper record. PMID:8653450
Leveraging the laboratory response network model for the global health security agenda.
Mangal, Chris N; Maryogo-Robinson, Lucy
2014-01-01
Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks-natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern.
Leveraging the Laboratory Response Network Model for the Global Health Security Agenda
Maryogo-Robinson, Lucy
2014-01-01
Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks—natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern. PMID:25254916
49 CFR 1580.105 - Reporting significant security concerns.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Reporting significant security concerns. 1580.105... Hazardous Materials Receivers, and Private Cars § 1580.105 Reporting significant security concerns. (a... threats and significant security concerns to DHS by telephoning the Freedom Center at 1-866-615-5150. (c...
Johnson, Tyler; Ford, Eric W; Huerta, Timothy R
2017-01-01
Background As electronic health records (EHRs) become ubiquitous in the health care industry, privacy breaches are increasing and being made public. These breaches may make consumers wary of the technology, undermining its potential to improve care coordination and research. Objective Given the developing concerns around privacy of personal health information stored in digital format, it is important for providers to understand how views on privacy and security may be associated with patient disclosure of health information. This study aimed to understand how privacy concerns may be shifting patient behavior. Methods Using a pooled cross-section of data from the 2011 and 2014 cycles of the Health Information and National Trends Survey (HINTS), we tested whether privacy and security concerns, as well as quality perceptions, are associated with the likelihood of withholding personal health information from a provider. A fully interacted multivariate model was used to compare associations between the 2 years, and interaction terms were used to evaluate trends in the factors that are associated with withholding behavior. Results No difference was found regarding the effect of privacy and security concerns on withholding behavior between 2011 and 2014. Similarly, whereas perceived high quality of care was found to reduce the likelihood of withholding information from a provider in both 2011 (odds ratio [OR] 0.73, 95% confidence interval [CI] 0.56-0.94) and 2014 (OR 0.61, 95% CI 0.48-0.76), no difference was observed between years. Conclusions These findings suggest that consumers’ beliefs about EHR privacy and security, the relationship between technology use and quality, and intentions to share information with their health care provider have not changed. These findings are counter to the ongoing discussions about the implications of security failures in other domains. Our results suggest that providers could ameliorate privacy and security by focusing on the care quality benefits EHRs provide. PMID:28052843
DOT National Transportation Integrated Search
2003-09-09
After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...
2004-06-01
Viewpoint Component Viewpoint View Architecture Description of Enterprise or Infostructure View Security Concern Business Security Model Business...security concern, when applied to the different viewpoints, addresses both stakeholders, and is described as a business security model or component...Viewpoint View Architecture Description of Enterprise or Infostructure View Security Concern Business Security Model Business Stakeholder IT Architect
38 CFR 1.521 - Special restrictions concerning social security records.
Code of Federal Regulations, 2011 CFR
2011-07-01
... concerning social security records. 1.521 Section 1.521 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Records § 1.521 Special restrictions concerning social security records. Information received from the Social Security Administration may be filed in the veteran's claims folder without special provisions...
38 CFR 1.521 - Special restrictions concerning social security records.
Code of Federal Regulations, 2012 CFR
2012-07-01
... concerning social security records. 1.521 Section 1.521 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Records § 1.521 Special restrictions concerning social security records. Information received from the Social Security Administration may be filed in the veteran's claims folder without special provisions...
38 CFR 1.521 - Special restrictions concerning social security records.
Code of Federal Regulations, 2013 CFR
2013-07-01
... concerning social security records. 1.521 Section 1.521 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Records § 1.521 Special restrictions concerning social security records. Information received from the Social Security Administration may be filed in the veteran's claims folder without special provisions...
38 CFR 1.521 - Special restrictions concerning social security records.
Code of Federal Regulations, 2014 CFR
2014-07-01
... concerning social security records. 1.521 Section 1.521 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Records § 1.521 Special restrictions concerning social security records. Information received from the Social Security Administration may be filed in the veteran's claims folder without special provisions...
38 CFR 1.521 - Special restrictions concerning social security records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... concerning social security records. 1.521 Section 1.521 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Records § 1.521 Special restrictions concerning social security records. Information received from the Social Security Administration may be filed in the veteran's claims folder without special provisions...
49 CFR 1580.203 - Reporting significant security concerns.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Reporting significant security concerns. 1580.203... concerns. (a) Applicability. This section applies to: (1) Each passenger railroad carrier, including each... potential threats and significant security concerns to DHS by telephoning the Freedom Center at 1-866-615...
Walker, Daniel M; Johnson, Tyler; Ford, Eric W; Huerta, Timothy R
2017-01-04
As electronic health records (EHRs) become ubiquitous in the health care industry, privacy breaches are increasing and being made public. These breaches may make consumers wary of the technology, undermining its potential to improve care coordination and research. Given the developing concerns around privacy of personal health information stored in digital format, it is important for providers to understand how views on privacy and security may be associated with patient disclosure of health information. This study aimed to understand how privacy concerns may be shifting patient behavior. Using a pooled cross-section of data from the 2011 and 2014 cycles of the Health Information and National Trends Survey (HINTS), we tested whether privacy and security concerns, as well as quality perceptions, are associated with the likelihood of withholding personal health information from a provider. A fully interacted multivariate model was used to compare associations between the 2 years, and interaction terms were used to evaluate trends in the factors that are associated with withholding behavior. No difference was found regarding the effect of privacy and security concerns on withholding behavior between 2011 and 2014. Similarly, whereas perceived high quality of care was found to reduce the likelihood of withholding information from a provider in both 2011 (odds ratio [OR] 0.73, 95% confidence interval [CI] 0.56-0.94) and 2014 (OR 0.61, 95% CI 0.48-0.76), no difference was observed between years. These findings suggest that consumers' beliefs about EHR privacy and security, the relationship between technology use and quality, and intentions to share information with their health care provider have not changed. These findings are counter to the ongoing discussions about the implications of security failures in other domains. Our results suggest that providers could ameliorate privacy and security by focusing on the care quality benefits EHRs provide. ©Daniel M Walker, Tyler Johnson, Eric W Ford, Timothy R Huerta. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 04.01.2017.
ERIC Educational Resources Information Center
Young, Harry F.
This atlas provides basic information about the North Atlantic Treaty Organization (NATO). Formed in response to growing concern for the security of Western Europe after World War II, NATO is a vehicle for Western efforts to reduce East-West tensions and the level of armaments. NATO promotes political and economic collaboration as well as military…
Bartfeld, Judith S; Ahn, Hong-Min
2011-03-01
The School Breakfast Program is an important component of the nutritional safety net and has been linked to positive changes in meal patterns and nutritional outcomes. By offering a breakfast, which for low-income children is available either at no cost or reduced price, the program also has the potential to increase household food security. This study examined the relationship between availability of the School Breakfast Program and household food security among low-income third-grade students by using data from the Early Childhood Longitudinal Survey-Kindergarten Cohort. The primary sample included 3010 students. Availability of school breakfast was assessed by surveys of school administrators. Food security was assessed by parents' reports by using the standard 18-item food security scale and considering 2 different food security thresholds. A probit model was estimated to measure the relationship between school breakfast availability and household food security while controlling for a range of other characteristics. Access to school breakfast reduced the risk of marginal food insecurity but not the risk of food insecurity at the standard threshold. That is, the program appeared beneficial in offsetting food-related concerns among at-risk families, although not necessarily in alleviating food insecurity once hardships had crossed the food insecurity threshold. Increasing the availability of school breakfast may be an effective strategy to maintain food security among low-income households with elementary school children.
ERIC Educational Resources Information Center
Francois, Michael T.
2016-01-01
Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…
A Hierarchical Security Architecture for Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Quanyan Zhu; Tamer Basar
2011-08-01
Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.
Agent of opportunity risk mitigation: people, engineering, and security efficacy.
Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R
2010-12-01
Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access controls; security personnel play dual roles of security and customer service, creating the negative perception that neither role is done well; and budget was described as an important factor in explaining the state of security controls. We determined that AMCs seeking to reduce AO risk should assess their institutionally unique AO risks, understand staff security perceptions, and install access controls that are responsive to the staff's tendency to defeat them. The development of AO attribute fact sheets is desirable for AO risk assessment; new funding and administrative or legislative tools to improve AMC security are required; and security practices and methods that are convenient and effective should be engineered.
2008-03-01
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited REDUCING THE...FUNDING NUMBERS 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION...relationships. While leaders did not demonstrate a high level of concern regarding the threat of a local terrorist act occurring in the next five years
The Global Education Agenda and the Delivery of Aid to Pacific Education
ERIC Educational Resources Information Center
Coxon, Eve; Munce, Karen
2008-01-01
In recent years the international development community's concern to redress the apparent failure of half a century of "development" efforts, has given rise to a number of global initiatives aimed at both reducing worldwide poverty and enhancing international security. One outcome of these initiatives has been a refocusing on the…
New thinking needed for emergency services.
Wankhade, Paresh
2017-07-13
Recent events in London and Manchester have highlighted the difficult and challenging role played by the emergency services. Their swift and professional response has drawn universal praise, but also raised concerns about reduced funding levels and job cuts against a heightened security threat. Transformational reforms are needed to improve our emergency services in a time of austerity.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-22
..., among other things, limit at this time the rule's application to credit default swaps that are security... to address concerns arising from systemic risk posed by CDS, including, among other things, risks to..., among other things, to enhance the authority of regulators to implement new rules designed to reduce...
Public attitudes toward health information exchange: perceived benefits and concerns.
Dimitropoulos, Linda; Patel, Vaishali; Scheffler, Scott A; Posnack, Steve
2011-12-01
To characterize consumers' attitudes regarding the perceived benefits of electronic health information exchange (HIE), potential HIE privacy and security concerns, and to analyze the intersection of these concerns with perceived benefits. A cross-sectional study. A random-digit-dial telephone survey of English-speaking adults was conducted in 2010. Multivariate logistic regression models examined the association between consumer characteristics and concerns related to the security of electronic health records (EHRs) and HIE. A majority of the 1847 respondents reported they were either "very" or "somewhat" concerned about privacy of HIE (70%), security of HIE (75%), or security of EHRs (82%). Concerns were significantly higher (P <.05) among employed individuals 40 to 64 years old and minorities. Many believed that HIE would confer benefits such as improved coordination of care (89%). Overall, 75% agreed that the benefits of EHRs outweighed risks to privacy and security, and 60% would permit HIE for treatment purposes even if the physician might not be able to protect their privacy all of the time. Over half (52%) wanted to choose which providers access and share their data. Greater participation by consumers in determining how HIE takes place could engender a higher degree of trust among all demographic groups, regardless of their varying levels of privacy and security concerns. Addressing the specific privacy and security concerns of minorities, individuals 40 to 64 years old, and employed individuals will be critical to ensuring widespread consumer participation in HIE.
Will you accept the government's friend request? Social networks and privacy concerns.
Siegel, David A
2013-01-01
Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.
Will You Accept the Government's Friend Request? Social Networks and Privacy Concerns
Siegel, David A.
2013-01-01
Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim. PMID:24312236
DOE Office of Scientific and Technical Information (OSTI.GOV)
Staats, E.B.
1978-01-04
A report entitled: The Force of the Public Utility Holding Company Act Has Been Greatly Reduced By Changes in the Securities and Exchange Commission's Enforcement Policies, was issued June 20, 1977 by the GAO. The report raised questions concerning the narrowness of the Commission's administration of a statute which the Congress had intended to be wide-ranging and pervasive. On June 30, 1977, the Securities and Exchange Commission issued comments rejecting all of the reports recommendations. This report summarizes the findings of GAO's earlier report. GAO's evaluation of the Commission comments is presented in Appendix I and the Commission's comments aremore » presented in Appendix II.« less
Environmental Security in Botswana
2011-10-01
concerns are vital to state survival. Upstream diversions of river water, poaching of wildlife or uncontrolled immigration can destroy ecosystems that would...gratefully accepted. Executing its first mission in October, 1987 the BDF immediately made positive impacts and dramatically reduced poaching ...experience large scale, organized cross-border poaching which overwhelmed the Botswana Department of Wildlife and National Parks. By 1987 the situation
Information Technology and the Evolution of the Library
2009-03-01
Resource Commons/ Repository/ Federated Search ILS (GLADIS/Pathfinder - Millenium)/ Catalog/ Circulation/ Acquisitions/ Digital Object Content...content management services to help centralize and distribute digi- tal content from across the institution, software to allow for seamless federated ... search - ing across multiple databases, and imaging software to allow for daily reimaging of ter- minals to reduce security concerns that otherwise
Under Siege: Schools as the New Battleground. Strategies To Protect Students, Staff, and Facilities.
ERIC Educational Resources Information Center
Agron, Joe, Ed.
1999-01-01
This American School and University supplement theme issue provides information from experts in the security industry concerning school violence and its prevention. Articles address the lessons learned from recent school shootings that may help reduce future occurrences, the need for a greater adherence to order in schools to set the stage for a…
ERIC Educational Resources Information Center
Sjoberg, Ola
2010-01-01
This article argues that unemployment benefits are providing a crucial but often overlooked function by reducing the insecurity associated with modern labor markets. Because job insecurity is associated with concerns about future financial security, economic support during unemployment may lessen the negative effects of job insecurity on employed…
ERIC Educational Resources Information Center
National Crime Prevention Centre, Ottawa (Ontario).
This document presents a policy framework for improving the personal security of women and girls. The document includes: (1) "Introduction"; (2) "Policy Background" (the concept of personal security, the societal context of women's personal security, consequences of violence for women and girls, long-term policy concern, and…
[The concept and measurement of food security].
Kim, Kirang; Kim, Mi Kyung; Shin, Young Jeon
2008-11-01
During the past two decades, food deprivation and hunger have been recognized to be not just the concerns of only underdeveloped or developing countries, but as problems for many affluent Western nations as well. Many countries have made numerous efforts to define and measure the extent of these problems. Based on these efforts, the theory and practice of food security studies has significantly evolved during the last decades. Thus, this study aims to provide a comprehensive review of the concept and measurement of food security. In this review, we introduce the definition and background of food security, we describe the impact of food insecurity on nutrition and health, we provide its measurements and operational instruments and we discuss its applications and implications. Some practical information for the use of the food security index in South Korea is also presented. Food security is an essential element in achieving a good nutritional and health status and it has an influence to reduce poverty. The information about the current understanding of food security can help scientists, policy makers and program practitioners conduct research and maintain outreach programs that address the issues of poverty and the promotion of food security.
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.
Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim
2016-06-15
Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.
ERIC Educational Resources Information Center
Moretti, Marlene M.; Obsuth, Ingrid
2009-01-01
Aggressive, violent and antisocial behaviour in children and adolescents is a growing concern across the globe. Targeting parent-teen relationships is critical in reducing problem behaviour. "Connect" is a manualized ten-week program for parents or alternative caregivers of at-risk teens that focuses on the building blocks of secure attachment:…
The security concern on internet banking adoption among Malaysian banking customers.
Sudha, Raju; Thiagarajan, A S; Seetharaman, A
2007-01-01
The existing literatures highlights that the security is the primary factor which determines the adoption of Internet banking technology. The secondary information on Internet banking development in Malaysia shows a very slow growth rate. Hence, this study aims to study the banking customers perception towards security concern and Internet banking adoption through the information collected from 150 sample respondents. The data analysis reveals that the customers have much concern about security and privacy issue in adoption of Internet banking, whether the customers are adopted Internet banking or not. Hence, it infers that to popularize Internet banking system there is a need for improvement in security and privacy issue among the banking customers.
Securing services in the cloud: an investigation of the threats and the mitigations
NASA Astrophysics Data System (ADS)
Farroha, Bassam S.; Farroha, Deborah L.
2012-05-01
The stakeholder's security concerns over data in the clouds (Voice, Video and Text) are a real concern to DoD, the IC and private sector. This is primarily due to the lack of physical isolation of data when migrating to shared infrastructure platforms. The security concerns are related to privacy and regulatory compliance required in many industries (healthcare, financial, law enforcement, DoD, etc) and the corporate knowledge databases. The new paradigm depends on the service provider to ensure that the customer's information is continuously monitored and is kept available, secure, access controlled and isolated from potential adversaries.
32 CFR 147.14 - Guideline L-Outside activities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Adjudication § 147.14 Guideline L—Outside activities. (a) The concern. Involvement in certain types of outside employment or activities is of security concern if it poses a conflict with an individual's security... outside employment or activity indicates that it does not pose a conflict with an individual's security...
Beckjord, Ellen; Moser, Richard P; Hughes, Penelope; Hesse, Bradford W
2015-01-01
Background Providers’ adoption of electronic health records (EHRs) is increasing and consumers have expressed concerns about the potential effects of EHRs on privacy and security. Yet, we lack a comprehensive understanding regarding factors that affect individuals’ perceptions regarding the privacy and security of their medical information. Objective The aim of this study was to describe national perceptions regarding the privacy and security of medical records and identify a comprehensive set of factors associated with these perceptions. Methods Using a nationally representative 2011-2012 survey, we reported on adults’ perceptions regarding privacy and security of medical records and sharing of health information between providers, and whether adults withheld information from a health care provider due to privacy or security concerns. We used multivariable models to examine the association between these outcomes and sociodemographic characteristics, health and health care experience, information efficacy, and technology-related variables. Results Approximately one-quarter of American adults (weighted n=235,217,323; unweighted n=3959) indicated they were very confident (n=989) and approximately half indicated they were somewhat confident (n=1597) in the privacy of their medical records; we found similar results regarding adults’ confidence in the security of medical records (very confident: n=828; somewhat confident: n=1742). In all, 12.33% (520/3904) withheld information from a health care provider and 59.06% (2100/3459) expressed concerns about the security of both faxed and electronic health information. Adjusting for other characteristics, adults who reported higher quality of care had significantly greater confidence in the privacy and security of their medical records and were less likely to withhold information from their health care provider due to privacy or security concerns. Adults with higher information efficacy had significantly greater confidence in the privacy and security of medical records and less concern about sharing of health information by both fax and electronic means. Individuals’ perceptions of whether their providers use an EHR was not associated with any privacy or security outcomes. Conclusions Although most adults are confident in the privacy and security of their medical records, many express concerns regarding sharing of information between providers; a minority report withholding information from their providers due to privacy and security concerns. Whether individuals thought their provider was using an EHR was not associated with negative privacy/security perceptions or withholding, suggesting the transition to EHRs is not associated with negative perceptions regarding the privacy and security of medical information. However, monitoring to see how this evolves will be important. Given that positive health care experiences and higher information efficacy were associated with more favorable perceptions of privacy and security, efforts should continue to encourage providers to secure medical records, provide patients with a “meaningful choice” in how their data are shared, and enable individuals to access information they need to manage their care. PMID:25843686
Patel, Vaishali; Beckjord, Ellen; Moser, Richard P; Hughes, Penelope; Hesse, Bradford W
2015-04-02
Providers' adoption of electronic health records (EHRs) is increasing and consumers have expressed concerns about the potential effects of EHRs on privacy and security. Yet, we lack a comprehensive understanding regarding factors that affect individuals' perceptions regarding the privacy and security of their medical information. The aim of this study was to describe national perceptions regarding the privacy and security of medical records and identify a comprehensive set of factors associated with these perceptions. Using a nationally representative 2011-2012 survey, we reported on adults' perceptions regarding privacy and security of medical records and sharing of health information between providers, and whether adults withheld information from a health care provider due to privacy or security concerns. We used multivariable models to examine the association between these outcomes and sociodemographic characteristics, health and health care experience, information efficacy, and technology-related variables. Approximately one-quarter of American adults (weighted n=235,217,323; unweighted n=3959) indicated they were very confident (n=989) and approximately half indicated they were somewhat confident (n=1597) in the privacy of their medical records; we found similar results regarding adults' confidence in the security of medical records (very confident: n=828; somewhat confident: n=1742). In all, 12.33% (520/3904) withheld information from a health care provider and 59.06% (2100/3459) expressed concerns about the security of both faxed and electronic health information. Adjusting for other characteristics, adults who reported higher quality of care had significantly greater confidence in the privacy and security of their medical records and were less likely to withhold information from their health care provider due to privacy or security concerns. Adults with higher information efficacy had significantly greater confidence in the privacy and security of medical records and less concern about sharing of health information by both fax and electronic means. Individuals' perceptions of whether their providers use an EHR was not associated with any privacy or security outcomes. Although most adults are confident in the privacy and security of their medical records, many express concerns regarding sharing of information between providers; a minority report withholding information from their providers due to privacy and security concerns. Whether individuals thought their provider was using an EHR was not associated with negative privacy/security perceptions or withholding, suggesting the transition to EHRs is not associated with negative perceptions regarding the privacy and security of medical information. However, monitoring to see how this evolves will be important. Given that positive health care experiences and higher information efficacy were associated with more favorable perceptions of privacy and security, efforts should continue to encourage providers to secure medical records, provide patients with a "meaningful choice" in how their data are shared, and enable individuals to access information they need to manage their care.
Giguere, Rebecca; Brown, William; Balán, Ivan C; Dolezal, Curtis; Ho, Titcha; Sheinfil, Alan; Ibitoye, Mobolaji; Lama, Javier R; McGowan, Ian; Cranston, Ross D; Carballo-Diéguez, Alex
2018-04-01
During a Phase 2 rectal microbicide trial, men who have sex with men and transgender women (n = 187) in 4 countries (Peru, South Africa, Thailand, United States) reported product use daily via short message service (SMS). To prevent disclosure of study participation, the SMS system program included privacy and security features. We evaluated participants' perceptions of privacy while using the system and acceptability of privacy/security features. To protect privacy, the SMS system: (1) confirmed participant availability before sending the study questions, (2) required a password, and (3) did not reveal product name or study participation. To ensure security, the system reminded participants to lock phone/delete messages. A computer-assisted self-interview (CASI), administered at the final visit, measured burden of privacy and security features and SMS privacy concerns. A subsample of 33 participants underwent an in-depth interview (IDI). Based on CASI, 85% had no privacy concerns; only 5% were very concerned. Most were not bothered by the need for a password (73%) or instructions to delete messages (82%). Based on IDI, reasons for low privacy concerns included sending SMS in private or feeling that texting would not draw attention. A few IDI participants found the password unnecessary and more than half did not delete messages. Most participants were not concerned that the SMS system would compromise their confidentiality. SMS privacy and security features were effective and not burdensome. Short ID-related passwords, ambiguous language, and reminders to implement privacy and security-enhancing behaviors are recommended for SMS systems.
Demonstration of an Environmentally Benign and Reduced Corrosion Runway Deicing Fluid
2011-01-01
ADDRESS(ES) Enviromental Security Technology Certification Program: 901 North Stuart Street, Suite 303, Arlington, Virginia 22203 10. SPONSOR...IMPLEMENTATION ISSUES Users may express concern because the Battelle-RDF is new and they may have reservations because of its potential damage to...several drivers for implementing a new , more environmentally friendly RDF. 1.3.1 Water Pollution Reduction The Clean Water Act (CWA) and its
Demonstration of an Environmentally Benign and Reduced Corrosion Runway Deicing Fluid
2011-01-01
43201 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) Enviromental Security Technology...laboratory to the airfields and airports across the country. Users may express concern because the Battelle-RDFs are new and they may have...airfield anti-icing and deicing at WPAFB. 1.3 REGULATORY DRIVERS There are several drivers for implementing a new , more environmentally friendly
A symmetrical image encryption scheme in wavelet and time domain
NASA Astrophysics Data System (ADS)
Luo, Yuling; Du, Minghui; Liu, Junxiu
2015-02-01
There has been an increasing concern for effective storages and secure transactions of multimedia information over the Internet. Then a great variety of encryption schemes have been proposed to ensure the information security while transmitting, but most of current approaches are designed to diffuse the data only in spatial domain which result in reducing storage efficiency. A lightweight image encryption strategy based on chaos is proposed in this paper. The encryption process is designed in transform domain. The original image is decomposed into approximation and detail components using integer wavelet transform (IWT); then as the more important component of the image, the approximation coefficients are diffused by secret keys generated from a spatiotemporal chaotic system followed by inverse IWT to construct the diffused image; finally a plain permutation is performed for diffusion image by the Logistic mapping in order to reduce the correlation between adjacent pixels further. Experimental results and performance analysis demonstrate the proposed scheme is an efficient, secure and robust encryption mechanism and it realizes effective coding compression to satisfy desirable storage.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Heyes, Alan
2007-07-01
Through the Global Partnership the UK continues to make a significant contribution to improve national and global security. Over the past year the UK has continued to implement a wide range of projects across the breadth of its Global Partnership Programme. As well as ensuring the Programme is robust and capable of dealing with new challenges, the UK has cooperated with other donor countries to help them progress projects associated with submarine dismantling, scientist redirection, enhancing nuclear security and Chemical Weapons Destruction. The Global Partnership, although only five years old, has already achieved a great deal. Some 23 states, plusmore » the European Union, are now working closer together under the Global Partnership, and collectively have enhanced global regional and national security by reducing the availability of Weapons of Mass Destruction (WMD) materials and expertise to both states of concern and terrorists. Considerable progress has already been made in, for example: - Improving the security of fissile materials, dangerous biological agents and chemical weapons stocks; - Reducing the number of sites containing radioactive materials; - Working towards closure of reactors still producing weapon-grade plutonium; - Improving nuclear safety to reduce the risks of further, Chernobyl style accidents; - Constructing facilities for destroying Chemical Weapons stocks, and starting actual destruction; - Providing sustainable employment for former WMD scientists to reduce the risk that their expertise will be misused by states or terrorists. By contributing to many of these activities, the UK has helped to make the world safer. This paper reports on the UK's practical and sustainable contribution to the Global Partnership and identifies a number of challenges that remain if it is to have a wider impact on reducing the threats from WMD material. (authors)« less
The Terrorist Threat to Inbound U.S. Passenger Flights: Inadequate Government Response
2009-01-01
and several passengers who assisted her in subduing the criminal. It was unfortunate that French airport security had no explosives detector at...foreign airport security authorities. It is true that a few nations have, on their own, begun to use trace detectors on outgoing flights, at least...airports to inform passengers bound for Haiti and Indonesia of security concerns there. Similar concerns over airport security – which could have led
NASA Astrophysics Data System (ADS)
Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede
2015-12-01
Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki
Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Selfmore » Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy proposed in this study, Indonesia energy security for 2025 could be improved to ranked 8 of 11 countries, better than Malaysia, Thailand and Singapore.« less
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice
Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim
2016-01-01
Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities. PMID:27314358
NASA Astrophysics Data System (ADS)
Asteria, Donna; Herdiansyah, Herdis; Wayan Agus Apriana, I.
2016-02-01
This study is about experience of women's role in environmental management to raise environmental security and form of women's emancipation movement. Environmental concerns conducted by residents of urban women who become environmental activists based on environmental literacy. Because of that, women's experience in interacting with both physic and social environment have differences in managing the environment including managing household waste by applying the principles of the 3Rs (reduce, reuse, recycle) and their persuasive efforts on their communities. This is the key to achieving sustainable development by anticipating environmental problem and preserving the environment. This study is conducted qualitative research method and its type is descriptive-explanative. The result of this study is environmental literacy of women activist on pro-environment action in their community that has achieved spiritual environmental literacy. Environmental literacy may differ due to internal and external condition of each individual. Pro-environment activities conducted as a form of responsibility of environmental concern such as eco-management, educational, and economic action, by persuading residents to proactively and consistently continue to do environmental management and develop a sense of community in shaping the networks of environmental concern in local context for global effect.
The Influence of Attachment Security on Preschool Children's Empathic Concern
ERIC Educational Resources Information Center
Murphy, Tia Panfile; Laible, Deborah J.
2013-01-01
The current study examined the direction of the association between children's attachment security and empathic responding. At 42 and 48 months of age, 69 children's empathic concern was observed, and mothers reported the children's attachment. Results indicated that attachment at 42 months predicted empathic concern at 48 months even after…
Environmental security in the Czech Republic: Status and concerns in the post Communist era
DOE Office of Scientific and Technical Information (OSTI.GOV)
Valley, P.J.
1998-10-01
The Czech Republic has made great strides toward reconciling its political and economic development with environmental protection and security issues since its recent democratization. Although new technological and legislative efforts continue to work at reducing emissions from automobiles, industries, power plants and coal mining, the Republic is committed to continuing its battle against air and water pollution, poor waste management, and needless destruction of nature. Shifting the structure of primary energy sources to qualitatively better fuels, along with the introduction of less energy-consuming technologies and the activation of new nuclear reactors, would eventually replace most of the output of coalmore » burning power plants. However, the use of nuclear power has been opposed by several political and environmental activists groups. At the international level, Austria`s opposition to the Temelin Nuclear Power plant is of great concern since Austria, as a non-nuclear state, propagates negative information about nuclear power to its citizens and other countries.« less
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2014 CFR
2014-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
Image Hashes as Templates for Verification
DOE Office of Scientific and Technical Information (OSTI.GOV)
Janik, Tadeusz; Jarman, Kenneth D.; Robinson, Sean M.
2012-07-17
Imaging systems can provide measurements that confidently assess characteristics of nuclear weapons and dismantled weapon components, and such assessment will be needed in future verification for arms control. Yet imaging is often viewed as too intrusive, raising concern about the ability to protect sensitive information. In particular, the prospect of using image-based templates for verifying the presence or absence of a warhead, or of the declared configuration of fissile material in storage, may be rejected out-of-hand as being too vulnerable to violation of information barrier (IB) principles. Development of a rigorous approach for generating and comparing reduced-information templates from images,more » and assessing the security, sensitivity, and robustness of verification using such templates, are needed to address these concerns. We discuss our efforts to develop such a rigorous approach based on a combination of image-feature extraction and encryption-utilizing hash functions to confirm proffered declarations, providing strong classified data security while maintaining high confidence for verification. The proposed work is focused on developing secure, robust, tamper-sensitive and automatic techniques that may enable the comparison of non-sensitive hashed image data outside an IB. It is rooted in research on so-called perceptual hash functions for image comparison, at the interface of signal/image processing, pattern recognition, cryptography, and information theory. Such perceptual or robust image hashing—which, strictly speaking, is not truly cryptographic hashing—has extensive application in content authentication and information retrieval, database search, and security assurance. Applying and extending the principles of perceptual hashing to imaging for arms control, we propose techniques that are sensitive to altering, forging and tampering of the imaged object yet robust and tolerant to content-preserving image distortions and noise. Ensuring that the information contained in the hashed image data (available out-of-IB) cannot be used to extract sensitive information about the imaged object is of primary concern. Thus the techniques are characterized by high unpredictability to guarantee security. We will present an assessment of the performance of our techniques with respect to security, sensitivity and robustness on the basis of a methodical and mathematically precise framework.« less
Third-year medical students' knowledge of privacy and security issues concerning mobile devices.
Whipple, Elizabeth C; Allgood, Kacy L; Larue, Elizabeth M
2012-01-01
The use of mobile devices are ubiquitous in medical-care professional settings, but information on privacy and security concerns of mobile devices for medical students is scarce. To gain baseline information about third-year medical students' mobile device use and knowledge of privacy and security issues concerning mobile devices. We surveyed 67 third-year medical students at a Midwestern university on their use of mobile devices and knowledge of how to protect information available through mobile devices. Students were also presented with clinical scenarios to rate their level of concern in regards to privacy and security of information. The most used features of mobile devices were: voice-to-voice (100%), text messaging (SMS) (94%), Internet (76.9%), and email (69.3%). For locking of one's personal mobile phone, 54.1% never physically lock their phone, and 58% never electronically lock their personal PDA. Scenarios considering definitely privacy concerns include emailing patient information intact (66.7%), and posting de-identified information on YouTube (45.2%) or Facebook (42.2%). As the ease of sharing data increases with the use of mobile devices, students need more education and training on possible privacy and security risks posed with mobile devices.
Seven layers of security to help protect biomedical research facilities.
Mortell, Norman
2010-04-01
In addition to risks such as theft and fire that can confront any type of business, the biomedical research community often faces additional concerns over animal rights extremists, infiltrations, data security and intellectual property rights. Given these concerns, it is not surprising that the industry gives a high priority to security. This article identifies security threats faced by biomedical research companies and shows how these threats are ranked in importance by industry stakeholders. The author then goes on to discuss seven key 'layers' of security, from the external environment to the research facility itself, and how these layers all contribute to the creation of a successfully secured facility.
Bridging the Cyberspace Gap: Washington and Silicon Valley
2017-12-21
distant concern, if not an outright impediment. Still, the two sides worked together to advocate for free speech and open access online, reduce...worked to control the destabilizing influence of the internet and the free flow of information through domestic laws and the deployment of filtering...renegotiating the North American Free Trade Agreement does include provisions to “secure commitments not to impose customs duties on digital products
Code of Federal Regulations, 2010 CFR
2010-04-01
... Securities and Exchange Commission concerning subpoenas to members of the news media. 202.10 Section 202.10... media. Freedom of the press is of vital importance to the mission of the Securities and Exchange... the issuance of subpoenas to members of the media that might impair the news gathering and reporting...
Code of Federal Regulations, 2011 CFR
2011-04-01
... Securities and Exchange Commission concerning subpoenas to members of the news media. 202.10 Section 202.10... media. Freedom of the press is of vital importance to the mission of the Securities and Exchange... the issuance of subpoenas to members of the media that might impair the news gathering and reporting...
Code of Federal Regulations, 2014 CFR
2014-04-01
... Securities and Exchange Commission concerning subpoenas to members of the news media. 202.10 Section 202.10... media. Freedom of the press is of vital importance to the mission of the Securities and Exchange... the issuance of subpoenas to members of the media that might impair the news gathering and reporting...
Code of Federal Regulations, 2012 CFR
2012-04-01
... Securities and Exchange Commission concerning subpoenas to members of the news media. 202.10 Section 202.10... media. Freedom of the press is of vital importance to the mission of the Securities and Exchange... the issuance of subpoenas to members of the media that might impair the news gathering and reporting...
Code of Federal Regulations, 2013 CFR
2013-04-01
... Securities and Exchange Commission concerning subpoenas to members of the news media. 202.10 Section 202.10... media. Freedom of the press is of vital importance to the mission of the Securities and Exchange... the issuance of subpoenas to members of the media that might impair the news gathering and reporting...
Study Calls for Improvements to U.S. Visa Process for Students, Scholars
NASA Astrophysics Data System (ADS)
Showstack, Randy
2004-03-01
U.S. federal agencies are implementing some measures to reduce delays in providing foreign scientists and students with non-immigrant visas, although additional steps could help to improve the cumbersome process, according to a government study released on 25 February by the U.S. General Accounting Office (GAO). The study, which was requested by the House of Representatives Science Committee, reviewed the issuance of F-1 and J-1 visas in light of national security measures put in place after September 11, 2001. The committee has expressed concerns about whether new security measures are detrimental to scientific research by unnecessarily delaying the issuance of visas to foreign students and scholars.
Proof Compression and the Mobius PCC Architecture for Embedded Devices
NASA Technical Reports Server (NTRS)
Jensen, Thomas
2009-01-01
The EU Mobius project has been concerned with the security of Java applications, and of mobile devices such as smart phones that execute such applications. In this talk, I'll give a brief overview of the results obtained on on-device checking of various security-related program properties. I'll then describe in more detail how the concept of certified abstract interpretation and abstraction-carrying code can be applied to polyhedral-based analysis of Java byte code in order to verify properties pertaining to the usage of resources of a down-loaded application. Particular emphasis has been on finding ways of reducing the size of the certificates that accompany a piece of code.
Pereira, Stacey; Robinson, Jill Oliver; Gutierrez, Amanda M.; Majumder, Mary A.; McGuire, Amy L.; Rothstein, Mark A.
2017-01-01
Background The importance of health privacy protections in the era of the “Facebook Generation” has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents’ views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Methods Using Amazon’s Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. Results 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P < 0.05). Time spent online and social media use were not predictors of level of concern about privacy or security of online or health information (all P > 0.05). Limitations This study is limited by the non-representativeness of our sample. Conclusions Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously. PMID:28926626
Pereira, Stacey; Robinson, Jill Oliver; Peoples, Hayley A; Gutierrez, Amanda M; Majumder, Mary A; McGuire, Amy L; Rothstein, Mark A
2017-01-01
The importance of health privacy protections in the era of the "Facebook Generation" has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents' views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Using Amazon's Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P < 0.05). Time spent online and social media use were not predictors of level of concern about privacy or security of online or health information (all P > 0.05). This study is limited by the non-representativeness of our sample. Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously.
Olupot-Olupot, Peter; Katawera, Andrew; Cooper, Curtis; Small, Will; Anema, Aranka; Mills, Edward
2008-09-12
We aimed to determine patient and health worker concerns regarding antiretroviral adherence in a conflict-affected population using focus groups (n = 40) and semi-structured interviews (n = 11). Patient concerns include security attending clinics, food security, distance to health centers and access to health providers. During periods of famine and flooding, the lack of food security and only single daily meals makes taking multiple doses impossible. Possible facilitating strategies included mobile teams, increased security and regularity of drug stocks.
Privacy and Security: A Bibliography.
ERIC Educational Resources Information Center
Computer and Business Equipment Manufacturers Association, Washington, DC.
Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…
The relationship between substance use and exit security on psychiatric wards.
Simpson, Alan; Bowers, Len; Haglund, Kristina; Muir-Cochrane, Eimear; Nijman, Henk; Van der Merwe, Marie
2011-03-01
In this paper we report on the rates of drug/alcohol use on acute psychiatric wards in relation to levels and intensity of exit security measures. Many inpatient wards have become permanently locked, with staff concerned about the risk of patients leaving the ward and harming themselves or others, and of people bringing illicit substances into the therapeutic environment. In 2004/2005, a cross sectional survey on 136 acute psychiatric wards across three areas of England was undertaken. A comprehensive range of data including door locking and drug/alcohol use were collected over 6 months on each ward. In 2006, supplementary data on door locking and exit security were collected. Door locking, additional exit security measures and substance misuse rates of the 136 wards were analysed and the associations between these were investigated. No consistent relationships were found with exit security features, intensity of drug/alcohol monitoring procedures, or the locking of the ward door. There were indications that use of breath testing for alcohol might reduce usage and that the use of 'sniffer' dogs was associated with greater alcohol use. Greater exit security or locking of the ward door had no influence on rates of use of alcohol or illicit drugs by inpatients and thus cannot form part of any strategy to control substance use by inpatients. There are some grounds to believe that a greater use of screening might help reduce the frequency of alcohol/substance use on wards and may lead to a reduction in verbal abuse. © 2010 The Authors. Journal of Advanced Nursing © 2010 Blackwell Publishing Ltd.
Computing Game-Theoretic Solutions for Security in the Medium Term
This project concerns the design of algorithms for computing game- theoretic solutions . (Game theory concerns how to act in a strategically optimal...way in environments with other agents who also seek to act optimally but have different , and possibly opposite, interests .) Such algorithms have...recently found application in a number of real-world security applications, including among others airport security, scheduling Federal Air Marshals, and
78 FR 40131 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-03
... Concerning Peaceful Uses of Nuclear Energy and the Agreement Between the Government of the United States of America and Australia Concerning Peaceful Uses of Nuclear Energy. DATES: This subsequent arrangement will... Nonproliferation and International Security, National Nuclear Security Administration, Department of Energy...
Pavone, Vincenzo; Esposti, Sara Degli
2012-07-01
As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.
Effectiveness of the Civil Aviation Security Program.
1980-05-22
SECURITY. - CONTINUED TRAINING OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. - SECURITY PROGRAMS IMPLEMENTED BY AIR FREIGHT...cooperation by all concerned. (See Exhibit 14) Airport Security - Ongoing activities which contributed significantly to airport security included full...implementation of the revised Federal Aviation Regulations (FAR) Part 107 governing airport security , training of law enforcement officers supporting
[The comparative evaluation of level of security culture in medical organizations].
Roitberg, G E; Kondratova, N V; Galanina, E V
2016-01-01
The study was carried out on the basis of clinic “Medicine” in 2014-2015 concerning security culture. The sampling included 465 filled HSPSC questionnaires. The comparative analysis of received was implemented. The “Zubovskaia district hospital” Having no accreditation according security standards and group of clinics from USA functioning for many years in the system of patient security support were selected as objects for comparison. The evaluation was implemented concerning dynamics of security culture in organization at implementation of strategies of security of patients during 5 years and comparison of obtained results with USA clinics was made. The study results demonstrated that in conditions of absence of implemented standards of security in medical organization total evaluation of security remains extremely low. The study of security culture using HSPSC questionnaire is an effective tool for evaluating implementation of various strategies of security ofpatient. The functioning in the system of international standards of quality, primarily JCI standards, permits during several years to achieve high indices of security culture.
The Challenges of Seeking Security While Respecting Privacy
NASA Astrophysics Data System (ADS)
Kantor, Paul B.; Lesk, Michael E.
Security is a concern for persons, organizations, and nations. For the individual members of organizations and nations, personal privacy is also a concern. The technologies for monitoring electronic communication are at the same time tools to protect security and threats to personal privacy. Participants in this workshop address the interrelation of personal privacy and national or societal security, from social, technical and legal perspectives. The participants represented industry, the academy and the United States Government. The issues addressed have become, if anything, even more pressing today than they were when the conference was held.
NASA Astrophysics Data System (ADS)
Gunda, T.; Hornberger, G. M.
2017-12-01
Concerns over water resources have evolved over time, from physical availability to economic access and recently, to a more comprehensive study of "water security," which is inherently interdisciplinary because a secure water system is influenced by and affects both physical and social components. The concept of water security carries connotations of both an adequate supply of water as well as water that meets certain quality standards. Although the term "water security" has many interpretations in the literature, the research field has not yet developed a synthetic analysis of water security as both a quantity (availability) and quality (contamination) issue. Using qualitative comparative and multi-regression analyses, we evaluate the primary physical and social factors influencing U.S. states' water security from a quantity perspective and from a quality perspective. Water system characteristics are collated from academic and government sources and include access/use, governance, and sociodemographic, and ecosystem metrics. Our analysis indicates differences in variables driving availability and contamination concerns; for example, climate is a more significant determinant in water quantity-based security analyses than in water quality-based security analyses. We will also discuss coevolution of system traits and the merits of constructing a robust water security index based on the relative importance of metrics from our analyses. These insights will improve understanding of the complex interactions between quantity and quality aspects and thus, overall security of water systems.
Energy efficiency in buildings, industry and transportation
NASA Astrophysics Data System (ADS)
Milovanovic, Dobrica; Babic, Milun; Jovicic, Nebojsa; Gordic, Dusan
2012-11-01
This paper reviews the literature concerning the energy saving and outlines the importance of energy efficiency, particularly in three the most important areas: buildings, industry and transportation. Improving energy efficiency plays a crucial role in minimizing the societal and environmental impacts of economic growth and offers a powerful tool for achieving sustainable development by reducing the need for investment in new infrastructure, by cutting fuel costs, and by increasing competitiveness for businesses and welfare for consumers. It creates environmental benefits through reduced emissions of greenhouse gases and local air pollutants. It can offer social benefits in the form of increased energy security (through reduced dependence on fossil fuels, particularly when imported) and better energy services.
Promoting de-escalation of commitment: a regulatory-focus perspective on sunk costs.
Molden, Daniel C; Hui, Chin Ming
2011-01-01
People frequently escalate their commitment to failing endeavors. Explanations for such behavior typically involve loss aversion, failure to recognize other alternatives, and concerns with justifying prior actions; all of these factors produce recommitment to previous decisions with the goal of erasing losses and vindicating these decisions. Solutions to escalation of commitment have therefore focused on external oversight and divided responsibility during decision making to attenuate loss aversion, blindness to alternatives, and justification biases. However, these solutions require substantial resources and have additional adverse effects. The present studies tested an alternative method for de-escalating commitment: activating broad motivations for growth and advancement (promotion). This approach should reduce concerns with loss and increase perceptions of alternatives, thereby attenuating justification motives. In two studies featuring hypothetical financial decisions, activating promotion motivations reduced recommitment to poorly performing investments as compared with both not activating any additional motivations and activating motivations for safety and security (prevention).
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-10
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of Proposed Rule Change Regarding Professional Qualifications and Information Concerning Associated Persons November 3... information concerning associated persons. The proposed rule change was published for comment in the Federal...
78 FR 14400 - Southern USA Resources, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-05
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Southern USA Resources, Inc., Order of... lack of current and accurate information concerning the securities of Southern USA Resources, Inc. (``Southern USA'') because of questions regarding the accuracy of publicly-disseminated information concerning...
Richardson, Joshua E.; Ancker, Jessica S.
2015-01-01
Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician’s electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p < .001). There were no similar changes in privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized. PMID:26958246
Richardson, Joshua E; Ancker, Jessica S
2015-01-01
Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician's electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p < .001). There were no similar changes in privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized.
NASA Technical Reports Server (NTRS)
Marks, V. J.; Benigue, C. E.
1983-01-01
Four programs deal with intruders and resource managment. Package available from COSMIC provides DEC VAX-11/780 with certain "deterent" security features. Although packages is not comprehensive security system, of interest for any VAX installation where security is concern.
77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-02
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0016] President's National Security Telecommunications Advisory Committee; Correction AGENCY: National Protection and Programs Directorate, DHS. [[Page... April 25, 2012, concerning the President's National Security Telecommunications Advisory Committee...
The Evolution of the Automated Continuous Evaluation System (ACES) for Personnel Security
2013-11-12
information. It applies business rules to the data, produces a report that flags issues of potential security concern, and electronically transmits...Form 86 (SF- 86) to check these data sources, verify what has been submitted, and collect more information. It applies business rules to the data...subject information. It applies business rules to analyze the data returned, produces a report that flags issues of potential security concern, and
An approach to quality and security of supply for single-use bioreactors.
Barbaroux, Magali; Gerighausen, Susanne; Hackel, Heiko
2014-01-01
Single-use systems (also referred to as disposables) have become a huge part of the bioprocessing industry, which raised concern in the industry regarding quality and security of supply. Processes must be in place to assure the supply and control of outsourced activities and quality of purchased materials along the product life cycle. Quality and security of supply for single-use bioreactors (SUBs) are based on a multidisciplinary approach. Developing a state-of-the-art SUB-system based on quality by design (QbD) principles requires broad expertise and know-how including the cell culture application, polymer chemistry, regulatory requirements, and a deep understanding of the biopharmaceutical industry. Using standardized products reduces the complexity and strengthens the robustness of the supply chain. Well-established supplier relations including risk mitigation strategies are the basis for achieving long-term security of supply. Well-developed quality systems including change control approaches aligned with the requirements of the biopharmaceutical industry are a key factor in supporting long-term product availability. This chapter outlines the approach to security of supply for key materials used in single-use production processes for biopharmaceuticals from a supplier perspective.
Materialism and food security.
Allen, M W; Wilson, M
2005-12-01
The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... lack of current and accurate information concerning the securities of Cargo Connection Logistics... Group BDC, Inc., Cargo Connection Logistics Holding, Inc., Diapulse Corporation of America, Globus... current and accurate information concerning the securities of Altus Pharmaceuticals, Inc. because it has...
Assuring the privacy and security of transmitting sensitive electronic health information.
Peng, Charlie; Kesarinath, Gautam; Brinks, Tom; Young, James; Groves, David
2009-11-14
The interchange of electronic health records between healthcare providers and public health organizations has become an increasingly desirable tool in reducing healthcare costs, improving healthcare quality, and protecting population health. Assuring privacy and security in nationwide sharing of Electronic Health Records (EHR) in an environment such as GRID has become a top challenge and concern. The Centers for Disease Control and Prevention's (CDC) and The Science Application International Corporation (SAIC) have jointly conducted a proof of concept study to find and build a common secure and reliable messaging platform (the SRM Platform) to handle this challenge. The SRM Platform is built on the open standards of OASIS, World Wide Web Consortium (W3C) web-services standards, and Web Services Interoperability (WS-I) specifications to provide the secure transport of sensitive EHR or electronic medical records (EMR). Transmitted data may be in any digital form including text, data, and binary files, such as images. This paper identifies the business use cases, architecture, test results, and new connectivity options for disparate health networks among PHIN, NHIN, Grid, and others.
Code of Federal Regulations, 2010 CFR
2010-10-01
... information requested by TSA concerning Security Threat Assessments. (viii) A statement acknowledging and ensuring that each individual will successfully complete a Security Threat Assessment under § 1549.111... Security Coordinator for an applicant successfully completes a security threat assessment, TSA will provide...
A Security Checklist for ERP Implementations
ERIC Educational Resources Information Center
Hughes, Joy R.; Beer, Robert
2007-01-01
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Agaku, Israel T; Adisa, Akinyele O; Ayo-Yusuf, Olalekan A; Connolly, Gregory N
2014-01-01
Introduction This study assessed the perceptions and behaviors of US adults about the security of their protected health information (PHI). Methods The first cycle of the fourth wave of the Health Information National Trends Survey was analyzed to assess respondents’ concerns about PHI breaches. Multivariate logistic regression was used to assess the effect of such concerns on disclosure of sensitive medical information to a healthcare professional (p<0.05). Results Most respondents expressed concerns about data breach when their PHI was being transferred between healthcare professionals by fax (67.0%; 95% CI 64.2% to 69.8%) or electronically (64.5%; 95% CI 61.7% to 67.3%). About 12.3% (95% CI 10.8% to 13.8%) of respondents had ever withheld information from a healthcare provider because of security concerns. The likelihood of information withholding was higher among respondents who perceived they had very little say about how their medical records were used (adjusted OR=1.42; 95% CI 1.03 to 1.96). Conclusions This study underscores the need for enhanced measures to secure patients’ PHI to avoid undermining their trust. PMID:23975624
Agaku, Israel T; Adisa, Akinyele O; Ayo-Yusuf, Olalekan A; Connolly, Gregory N
2014-01-01
This study assessed the perceptions and behaviors of US adults about the security of their protected health information (PHI). The first cycle of the fourth wave of the Health Information National Trends Survey was analyzed to assess respondents' concerns about PHI breaches. Multivariate logistic regression was used to assess the effect of such concerns on disclosure of sensitive medical information to a healthcare professional (p<0.05). Most respondents expressed concerns about data breach when their PHI was being transferred between healthcare professionals by fax (67.0%; 95% CI 64.2% to 69.8%) or electronically (64.5%; 95% CI 61.7% to 67.3%). About 12.3% (95% CI 10.8% to 13.8%) of respondents had ever withheld information from a healthcare provider because of security concerns. The likelihood of information withholding was higher among respondents who perceived they had very little say about how their medical records were used (adjusted OR=1.42; 95% CI 1.03 to 1.96). This study underscores the need for enhanced measures to secure patients' PHI to avoid undermining their trust.
Code of Federal Regulations, 2012 CFR
2012-07-01
... (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.630 Prohibition on correspondent accounts for foreign shell banks; records concerning...
Code of Federal Regulations, 2013 CFR
2013-07-01
... (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.630 Prohibition on correspondent accounts for foreign shell banks; records concerning...
Code of Federal Regulations, 2014 CFR
2014-07-01
... (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.630 Prohibition on correspondent accounts for foreign shell banks; records concerning...
Code of Federal Regulations, 2011 CFR
2011-07-01
... (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.630 Prohibition on correspondent accounts for foreign shell banks; records concerning...
A secure distributed logistic regression protocol for the detection of rare adverse drug events
El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat
2013-01-01
Background There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. Objective To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. Methods We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. Results The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. Conclusion The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through generalized estimating equations, and to accommodate other link functions by extending it to generalized linear models. PMID:22871397
A secure distributed logistic regression protocol for the detection of rare adverse drug events.
El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat
2013-05-01
There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through generalized estimating equations, and to accommodate other link functions by extending it to generalized linear models.
FAA computer security : concerns remain due to personnel and other continuing weaknesses
DOT National Transportation Integrated Search
2000-08-01
FAA has a history of computer security weaknesses in a number of areas, including its physical security management at facilities that house air traffic control (ATC) systems, systems security for both operational and future systems, management struct...
10 CFR 712.16 - DOE security review.
Code of Federal Regulations, 2010 CFR
2010-01-01
... of the HRP process, the HRP certifying official must be notified and the security concern evaluated... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...
Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming
2017-06-23
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.
Is Seeing Believing? Training Users on Information Security: Evidence from Java Applets
ERIC Educational Resources Information Center
Ayyagari, Ramakrishna; Figueroa, Norilyz
2017-01-01
Information Security issues are one of the top concerns of CEOs. Accordingly, information systems education and research have addressed security issues. One of the main areas of research is the behavioral issues in Information Security, primarily focusing on users' compliance to information security policies. We contribute to this literature by…
ERIC Educational Resources Information Center
Imam, Abbas H.
2013-01-01
Complexity of information security has become a major issue for organizations due to incessant threats to information assets. Healthcare organizations are particularly concerned with security owing to the inherent vulnerability of sensitive information assets in health informatics. While the non-technical security management elements have been at…
Code of Federal Regulations, 2010 CFR
2010-10-01
... requested by TSA concerning Security Threat Assessments. (ix) A statement acknowledging and ensuring that each employee and agent will successfully complete a Security Threat Assessment under § 1548.15 before... training and Security Threat Assessments by relevant personnel. (4) Duration of security program. The...
An updated look at document security: from initiation to storage or shredder.
McConnell, Charles R
2014-01-01
In these days of close attention to security of information handled electronically, there is often a tendency to overlook the security of hard-copy documents. Document security can involve many areas of business, but the health care department manager's concerns are primarily for patient records and employee documentation. Document security is closely related to growing concerns for individual privacy; guidelines are furnished for protecting employee privacy by separating retention practices for business information from personal information. Sensitive documentation requires rules and procedures for processing, retaining, accessing, storing, and eventually destroying. Also, documents that are missing or incomplete at times present unique problems for the organization. The department manager is provided with some simple rules for safeguarding employee and patient documentation.
76 FR 20433 - MaxLife Fund Corp.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-12
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] MaxLife Fund Corp.; Order of Suspension of... current and accurate information concerning the securities of MaxLife Fund Corp. (``MaxLife'') because of questions that have arisen concerning representations made by MaxLife, the control of its stock, its market...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-26
... Pharmaceutical Corp., BBV Vietnam SE.A. Acquisition Corp., Cash Technologies, Inc., Conspiracy Entertainment... that there is a lack of current and accurate information concerning the securities of Cash Technologies... concerning the securities of Conspiracy Entertainment Holdings, Inc. because it has not filed any periodic...
From Charity to Security: The Emergence of the National School Lunch Program
ERIC Educational Resources Information Center
Rutledge, Jennifer Geist
2015-01-01
This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-01
... Environmental Services, Inc., Dupont Direct Financial Holdings, Inc., New Paradigm Software Corp. (n/k/a Brunton... concerning the securities of Commodore Environmental Services, Inc. because it has not filed any periodic... accurate information concerning the securities of New Paradigm Software Corp. (n/k/a Brunton Vineyards...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-30
... the Standard Review Plan (SRP), concerning the physical security reviews of design certification... NRC staff with the physical security review of applications for design certifications, incorporate... NUCLEAR REGULATORY COMMISSION [NRC-2013-0225] Proposed Revision to Physical Security--Standard...
76 FR 15368 - Minimum Security Devices and Procedures
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-21
... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures... concerning the following information collection. Title of Proposal: Minimum Security Devices and Procedures... establish a written security program is necessitated by the Bank Protection Act (12 U.S.C. 1881-1884), which...
Reducing losses from earthquakes through personal preparedness
Kockelman, W.J.
1985-01-01
A prerequisite to personal preparedness is familiarity with and concern about the other hazard-reduction phases. Strengthening the structure of the home, storing water, and showing family members how to shut off utility-supply lines are only a part of personal preparedness. Equally important are other phases such as picking up children from an evacuated school, securing heavy objects at the work palce as well as in the home, and retrofitting the commuter-highway overpasses needed to reunite a family.
Best Practice for After-Hours Hospice Symptom Management: A Literature Review.
Slack, Cheryl
2015-10-01
Medicare-certified hospice home care agencies must provide a 24/7 on-call system to respond to patient and caregiver concerns. How these calls are handled impacts patient and family outcomes and satisfaction. Ideally, hospice nurses provide adequate caregiver education during routine visits to minimize the need for after-hours calls. A literature review provided evidence that hospice nurse education and appropriate telephone support improves symptom management, enhances family support, provides a sense of security, reduces anxiety, and promotes comfort.
49 CFR 1549.109 - Security Directives and Information Circulars.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... SCREENING PROGRAM Operations § 1549.109 Security Directives and Information Circulars. (a) TSA may issue an Information Circular to notify certified cargo screening facilities of security concerns. (b) When TSA...
Reducing Food Loss and Waste to Enhance Food Security and Environmental Sustainability.
Shafiee-Jood, Majid; Cai, Ximing
2016-08-16
While food shortage remains a big concern in many regions around the world, almost one-third of the total food production is discarded as food loss and waste (FLW). This is associated with about one-quarter of land, water, and fertilizer used for crop production, even though resources and environmental constraints are expected to limit food production around the world. FLW reduction represents a potential opportunity to enhance both food security and environmental sustainability and therefore has received considerable attention recently. By reviewing the recent progress and new developments in the literature, this paper highlights the importance of FLW prevention as a complementary solution to address the Grand Challenge of global food security and environmental sustainability. However, raising awareness only is not enough to realize the expected FLW reduction. We identify the knowledge gaps and opportunities for research by synthesizing the strategies of FLW reduction and the barriers, including (1) filling the data gaps, (2) quantifying the socioeconomic and environmental impacts of FLW reduction strategies, (3) understanding the scale effects, and (4) exploring the impacts of global transitions. It is urgent to take more aggressive yet scientifically based actions to reduce FLW, which require everyone's involvement along the food supply chain, including policy makers, food producers and suppliers, and food consumers.
46 CFR 503.53 - Oversight Committee.
Code of Federal Regulations, 2011 CFR
2011-10-01
... FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security... provisions of Executive Order 13526 and directives of the Information Security Oversight Office. The program... and complaints concerning the Commission's information security program; (d) Recommend appropriate...
46 CFR 503.53 - Oversight Committee.
Code of Federal Regulations, 2010 CFR
2010-10-01
... FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security... provisions of Executive Order 12958 and directives of the Information Security Oversight Office. The program... and complaints concerning the Commission's information security program; (d) Recommend appropriate...
Do You Take Credit Cards? Security and Compliance for the Credit Card Payment Industry
ERIC Educational Resources Information Center
Willey, Lorrie; White, Barbara Jo
2013-01-01
Security is a significant concern in business and in information systems (IS) education from both a technological and a strategic standpoint. Students can benefit from the study of information systems security when security concepts are introduced in the context of real-world industry standards. The development of a data security standard for…
7 CFR 4290.610 - Required certifications for Loans and Investments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... to a Rural Business Concern or Smaller Enterprise, a certification by the Portfolio Concern stating... by the Portfolio Concern certifying that the concern is a Small Business Concern. For securities... is a Small Business Concern. (c) A certification by the Portfolio Concern that it will not...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-01
... Significant Impact Concerning a Proposal To Award a Contract to House Federal, Low- Security, Criminal Aliens... aliens within one or more existing contractor-owned and operated correctional facilities. Background... Federal, low-security, adult male, non-U.S. citizen, criminal aliens within one or more existing...
Securing the Human: The Journey Toward World Law and Justice. The Whole Earth Papers, No. 14.
ERIC Educational Resources Information Center
Mische, Patricia; And Others
The document contains a variety of papers that examine the linkages between local concerns and global concerns and explore alternative world futures. An introductory article, "Securing the Human," discusses how the world community needs to develop adequate means to deal with crimes against humans. These means include sound analysis, spiritual…
Security Aspects of an Enterprise-Wide Network Architecture.
ERIC Educational Resources Information Center
Loew, Robert; Stengel, Ingo; Bleimann, Udo; McDonald, Aidan
1999-01-01
Presents an overview of two projects that concern local area networks and the common point between networks as they relate to network security. Discusses security architectures based on firewall components, packet filters, application gateways, security-management components, an intranet solution, user registration by Web form, and requests for…
Security Management Strategies for Protecting Your Library's Network.
ERIC Educational Resources Information Center
Ives, David J.
1996-01-01
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
Developing an Undergraduate Information Systems Security Track
ERIC Educational Resources Information Center
Sharma, Aditya; Murphy, Marianne C.; Rosso, Mark A.; Grant, Donna
2013-01-01
Information Systems Security as a specialized area of study has mostly been taught at the graduate level. This paper highlights the efforts of establishing an Information Systems (IS) Security track at the undergraduate level. As there were many unanswered questions and concerns regarding the Security curriculum, focus areas, the benefit of…
17 CFR 403.7 - Effective dates.
Code of Federal Regulations, 2010 CFR
2010-04-01
... THE SECURITIES EXCHANGE ACT OF 1934 PROTECTION OF CUSTOMER SECURITIES AND BALANCES § 403.7 Effective... referred to in § 403.4 concerning the Securities Investor Protection Act of 1970, and (ii) if applicable... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Effective dates. 403.7 Section...
Security, Extremism and Education: Safeguarding or Surveillance?
ERIC Educational Resources Information Center
Davies, Lynn
2016-01-01
This article analyses how education is positioned in the current concerns about security and extremism. This means firstly examining the different meanings of security (national, human and societal) and who provides security for whom. Initially, a central dilemma is acknowledged: that schooling appears to be simultaneously irrelevant to the huge…
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
Marketing and reputation aspects of neonatal safeguards and hospital-security systems.
Smith, Alan D
2009-01-01
Technological advancements have migrated from personal-use electronics into the healthcare setting for security enhancements. Within maternity wards and nurseries, technology was seen as one of best way to protect newborns from abduction. The present study is a focus on what systems and methods are used in neonatal security, the security arrangements, staff training, and impacts outside the control of the hospital, customer satisfaction and customer relations management. Through hypothesis-testing and exploratory analysis, gender biases and extremely high levels of security were found within a web-enabled and professional sample of 200 respondents. The factor-based constructs were found to be, in order of the greatest explained variance: security concerns, personal technology usage, work technology applications, and demographic maturity concerns, resulting in four factor-based scores with significant combined variance of 61.5%. It was found that through a better understanding on the importance and vital need for hospitals to continue to improve on their technology-based security policies significantly enhanced their reputation in the highly competitive local healthcare industry.
14 CFR 1203.901 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.901 Responsibilities. (a) The Chairperson reports to the Administrator concerning the management and direction of the NASA Information Security Program as provided for...
ERIC Educational Resources Information Center
Social and Labour Bulletin, 1983
1983-01-01
This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)
14 CFR 1203.901 - Responsibilities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.901 Responsibilities. (a) The Chairperson reports to the Administrator concerning the management and direction of the NASA Information Security Program as provided for...
The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Russell, J. W.; Ahumada, A. D.; Blanchard, T. A.
After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a “dirty bomb.” In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilianmore » sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRI’s Russia Orphan Source Recovery Project, managed at the Nevada National Security Site’s North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company “Isotope” has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.« less
Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming
2017-01-01
In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients’ physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu–Chung’s scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP. PMID:28644381
Atienza, Audie A; Zarcadoolas, Christina; Vaughon, Wendy; Hughes, Penelope; Patel, Vaishali; Chou, Wen-Ying Sylvia; Pritts, Joy
2015-01-01
This study examined consumers' attitudes and perceptions regarding mobile health (mHealth) technology use in health care. Twenty-four focus groups with 256 participants were conducted in 5 geographically diverse locations. Participants were also diverse in age, education, race/ethnicity, gender, and rural versus urban settings. Several key themes emerged from the focus groups. Findings suggest that consumer attitudes regarding mHealth privacy/security are highly contextualized, with concerns depending on the type of information being communicated, where and when the information is being accessed, who is accessing or seeing the information, and for what reasons. Consumers frequently considered the tradeoffs between the privacy/security of using mHealth technologies and the potential benefits. Having control over mHealth privacy/security features and trust in providers were important issues for consumers. Overall, this study found significant diversity in attitudes regarding mHealth privacy/security both within and between traditional demographic groups. Thus, to address consumers' concerns regarding mHealth privacy and security, a one-size-fits-all approach may not be adequate. Health care providers and technology developers should consider tailoring mHealth technology according to how various types of information are communicated in the health care setting, as well as according to the comfort, skills, and concerns individuals may have with mHealth technology.
ERIC Educational Resources Information Center
Bracy, Nicole L.
2009-01-01
Public schools have transformed significantly over the past several decades in response to broad concerns about rising school violence. Today's public schools are high security environments employing tactics commonly found in jails and prisons such as police officers, security cameras, identification systems, and secure building strategies.…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
...; Submission for OMB Review; Contractors Performing Private Security Functions Outside the United States... new information collection requirement concerning Contractors Performing Private Security Functions... identified by Information Collection 9000- 0184, Contractors Performing Private Security Functions Outside...
ERIC Educational Resources Information Center
Comp, David J.
2013-01-01
The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…
A novel key management solution for reinforcing compliance with HIPAA privacy/security regulations.
Lee, Chien-Ding; Ho, Kevin I-J; Lee, Wei-Bin
2011-07-01
Digitizing medical records facilitates the healthcare process. However, it can also cause serious security and privacy problems, which are the major concern in the Health Insurance Portability and Accountability Act (HIPAA). While various conventional encryption mechanisms can solve some aspects of these problems, they cannot address the illegal distribution of decrypted medical images, which violates the regulations defined in the HIPAA. To protect decrypted medical images from being illegally distributed by an authorized staff member, the model proposed in this paper provides a way to integrate several cryptographic mechanisms. In this model, the malicious staff member can be tracked by a watermarked clue. By combining several well-designed cryptographic mechanisms and developing a key management scheme to facilitate the interoperation among these mechanisms, the risk of illegal distribution can be reduced.
Social Security and Part-Time Employment.
ERIC Educational Resources Information Center
Euzeby, Alain
1988-01-01
Discusses rules governing social security and their implications for part-time employees in various countries. Topics include (1) methods of financing social security, (2) benefits, (3) measures concerning the unemployed, (4) a floor for employers' contributions, (5) graduated contribution rates, and (6) financial incentives. (CH)
76 FR 81359 - National Security Personnel System
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-28
... contains regulatory documents #0;having general applicability and legal effect, most of which are keyed #0... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization...
The Curious National Security Pendulum: Openness and/or Censorship.
ERIC Educational Resources Information Center
Marwick, Christine M.
1979-01-01
Lawsuits illustrate the increasing concern over national security in regulating the security classification system, and government attitudes toward information have shifted from secrecy to openness to censorship. The Central Intelligence Agency's suppression of unclassified printed information is a case in point. (SW)
Health Sector Evolution Plan in Iran; Equity and Sustainability Concerns.
Moradi-Lakeh, Maziar; Vosoogh-Moghaddam, Abbas
2015-08-31
In 2014, a series of reforms, called as the Health Sector Evolution Plan (HSEP), was launched in the health system of Iran in a stepwise process. HSEP was mainly based on the fifth 5-year health development national strategies (2011-2016). It included different interventions to: increase population coverage of basic health insurance, increase quality of care in the Ministry of Health and Medical Education (MoHME) affiliated hospitals, reduce out-of-pocket (OOP) payments for inpatient services, increase quality of primary healthcare, launch updated relative value units (RVUs) of clinical services, and update tariffs to more realistic values. The reforms resulted in extensive social reaction and different professional feedback. The official monitoring program shows general public satisfaction. However, there are some concerns for sustainability of the programs and equity of financing. Securing financial sources and fairness of the financial contribution to the new programs are the main concerns of policy-makers. Healthcare providers' concerns (as powerful and influential stakeholders) potentially threat the sustainability and efficiency of HSEP. Previous experiences on extending health insurance coverage show that they can lead to a regressive healthcare financing and threat financial equity. To secure financial sources and to increase fairness, the contributions of people to new interventions should be progressive by their income and wealth. A specific progressive tax would be the best source, however, since it is not immediately feasible, a stepwise increase in the progressivity of financing must be followed. Technical concerns of healthcare providers (such as nonplausible RVUs for specific procedures or nonefficient insurance-provider processes) should be addressed through proper revision(s) while nontechnical concerns (which are derived from conflicting interests) must be responded through clarification and providing transparent information. The requirements of HSEP and especially the key element of progressive tax should be considered properly in the coming sixth national development plan (2016-2021). © 2015 by Kerman University of Medical Sciences.
Health Sector Evolution Plan in Iran; Equity and Sustainability Concerns
Moradi-Lakeh, Maziar; Vosoogh-Moghaddam, Abbas
2015-01-01
In 2014, a series of reforms, called as the Health Sector Evolution Plan (HSEP), was launched in the health system of Iran in a stepwise process. HSEP was mainly based on the fifth 5-year health development national strategies (2011-2016). It included different interventions to: increase population coverage of basic health insurance, increase quality of care in the Ministry of Health and Medical Education (MoHME) affiliated hospitals, reduce out-of-pocket (OOP) payments for inpatient services, increase quality of primary healthcare, launch updated relative value units (RVUs) of clinical services, and update tariffs to more realistic values. The reforms resulted in extensive social reaction and different professional feedback. The official monitoring program shows general public satisfaction. However, there are some concerns for sustainability of the programs and equity of financing. Securing financial sources and fairness of the financial contribution to the new programs are the main concerns of policy-makers. Healthcare providers’ concerns (as powerful and influential stakeholders) potentially threat the sustainability and efficiency of HSEP. Previous experiences on extending health insurance coverage show that they can lead to a regressive healthcare financing and threat financial equity. To secure financial sources and to increase fairness, the contributions of people to new interventions should be progressive by their income and wealth. A specific progressive tax would be the best source, however, since it is not immediately feasible, a stepwise increase in the progressivity of financing must be followed. Technical concerns of healthcare providers (such as nonplausible RVUs for specific procedures or nonefficient insurance-provider processes) should be addressed through proper revision(s) while nontechnical concerns (which are derived from conflicting interests) must be responded through clarification and providing transparent information. The requirements of HSEP and especially the key element of progressive tax should be considered properly in the coming sixth national development plan (2016-2021). PMID:26673172
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-22
..., Inc., Bonanza Oil & Gas, Inc., and Gulf Coast Oil & Gas, Inc.; Order of Suspension of Trading July 18... Commission that there is a lack of current and accurate information concerning the securities of Bonanza Oil... concerning the securities of Gulf Coast Oil & Gas, Inc. because it has not filed any periodic reports since...
Geospatial Informational Security Risks and Concerns of the U.S. Air Force GeoBase Program
2007-03-01
multiple governmental directives such as the Government Performance and Results Act (GPRA), Paperwork Reduction Act (PRA), and Office of Management and... governments , non- governmental organizations (NGOs), universities, and commercial sector contractors (Lachman, 2006). One command noted that over...Defense, or the United States Government . AFIT/GEM/ENV/07-M1 GEOSPATIAL INFORMATIONAL SECURITY RISKS AND CONCERNS OF THE UNITED STATES
Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model
ERIC Educational Resources Information Center
Kassa, Woldeloul
2016-01-01
Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…
Security and health research databases: the stakeholders and questions to be addressed.
Stewart, Sara
2006-01-01
Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.
Cook, John T; Frank, Deborah A; Casey, Patrick H; Rose-Jacobs, Ruth; Black, Maureen M; Chilton, Mariana; Ettinger de Cuba, Stephanie; Appugliese, Danielle; Coleman, Sharon; Heeren, Timothy; Berkowitz, Carol; Cutts, Diana B
2008-10-01
Household energy security has not been measured empirically or related to child health and development but is an emerging concern for clinicians and researchers as energy costs increase. The objectives of this study were to develop a clinical indicator of household energy security and assess associations with food security, health, and developmental risk in children <36 months of age. A cross-sectional study that used household survey and surveillance data was conducted. Caregivers were interviewed in emergency departments and primary care clinics form January 2001 through December 2006 on demographics, public assistance, food security, experience with heating/cooling and utilities, Parents Evaluation of Developmental Status, and child health. The household energy security indicator includes energy-secure, no energy problems; moderate energy insecurity, utility shutoff threatened in past year; and severe energy insecurity, heated with cooking stove, utility shutoff, or >or=1 day without heat/cooling in past year. The main outcome measures were household and child food security, child reported health status, Parents Evaluation of Developmental Status concerns, and hospitalizations. Of 9721 children, 11% (n = 1043) and 23% (n = 2293) experienced moderate and severe energy insecurity, respectively. Versus children with energy security, children with moderate energy insecurity had greater odds of household food insecurity, child food insecurity, hospitalization since birth, and caregiver report of child fair/poor health, adjusted for research site and mother, child, and household characteristics. Children with severe energy insecurity had greater adjusted odds of household food insecurity, child food insecurity, caregivers reporting significant developmental concerns on the Parents Evaluation of Developmental Status scale, and report of child fair/poor health. No significant association was found between energy security and child weight for age or weight for length. As household energy insecurity increases, infants and toddlers experienced increased odds of household and child food insecurity and of reported poor health, hospitalizations, and developmental risks.
76 FR 28960 - National Security Education Board Members Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-19
... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... Education Board. The purpose of the meeting is to review and make recommendations to the Secretary of Defense concerning requirements established by the David L. Boren National Security Education Act, Title...
77 FR 27739 - National Security Education Board Members Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-11
... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... Education Board. The purpose of the meeting is to review and make recommendations to the Secretary of Defense concerning requirements established by the David L. Boren National Security Education Act, Title...
78 FR 48697 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-09
... INFORMATION: FEMA's Homeland Security Grant Program (HSGP) is an important part of the Administration's larger... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0034... concerning the collection of information to administer the Homeland Security Grant Program (HSGP). DATES...
NASA Astrophysics Data System (ADS)
Hossain, Kamrul
2016-09-01
The theory of securitization-the so-called Copenhagen school-centers the concept of security on various identified threats. Security based on the collective identity by which a society preserves its essential characteristics has been defined as community security, or societal security. The underlying principle of the Copenhagen school is that state-based, sovereignty-oriented security is ineffective unless the other components of security threats are addressed. The concept of human security, developed nearly simultaneously to that of securitization, identifies threat components at the sub-state level which are not traditionally understood as security concerns. Both schools of security thought are similar as they offer nontraditional approaches to understanding the concept of security. In this article, I explore securitization theory and the concept of human security to elaborate community perspectives in the understanding of security. In a case study, I investigate the security concerns of the indigenous peoples of the Arctic. The transformation of the Arctic by climate change and its impacts has resulted in new challenges and opportunities, so I explore how indigenous peoples in general and the Sámi in particular understand security which promotes their societal security. Although I show that this group of people deserves recognition and the ability to exercise greater authority, I conclude that diverse concepts of security do not by any means undermine the core traditional concept of security. These aspects of security remain subject to scrutiny by states and exist in a vertical structure. The Sámi, therefore, rely on affirmative actions by states to enjoy greater rights to maintain their community security.
Mahat-Shamir, Michal; Hamama-Raz, Yaira; Ben-Ezra, Menachem; Pitcho-Prelorentzos, Shani; Zaken, Adi; David, Udi Y; Bergman, Yoav S
2018-03-01
The current study examined whether emotional concern over one's security situation is connected with death anxiety during an ongoing terror wave, and whether type of exposure (media exposure vs. contact with witnesses) moderates this connection. A total of 345 individuals, aged 18-70, were sampled during an ongoing wave of terror in Israel and filled out scales measuring death anxiety, concern over security situation, and type of exposure. Results indicated that increased concern was connected with enhanced death anxiety. Moreover, this connection was more pronounced among individuals exposed to the events through the media, in comparison with individuals who had first-hand contact with witnesses.
Thallium-201 for cardiac stress tests: residual radioactivity worries patients and security.
Geraci, Matthew J; Brown, Norman; Murray, David
2012-12-01
A 47-year-old man presented to the Emergency Department (ED) in duress and stated he was "highly radioactive." There were no reports of nuclear disasters, spills, or mishaps in the local area. This report discusses the potential for thallium-201 (Tl-201) patients to activate passive radiation alarms days to weeks after nuclear stress tests, even while shielded inside industrial vehicles away from sensors. Characteristics of Tl-201, as used for medical imaging, are described. This patient was twice detained by Homeland Security Agents and searched after he activated radiation detectors at a seaport security checkpoint. Security agents deemed him not to be a threat, but they expressed concern regarding his health and level of personal radioactivity. The patient was subsequently barred from his job and sent to the hospital. Tl-201 is a widely used radioisotope for medical imaging. The radioactive half-life of Tl-201 is 73.1h, however, reported periods of extended personal radiation have been seen as far out as 61 days post-administration. This case describes an anxious, but otherwise asymptomatic patient presenting to the ED with detection of low-level personal radiation. Documentation should be provided to and carried by individuals receiving radionuclides for a minimum of five to six half-lives of the longest-lasting isotope provided. Patients receiving Tl-201 should understand the potential for security issues; reducing probable tense moments, confusion, and anxiety to themselves, their employers, security officials, and ED staff. Copyright © 2012 Elsevier Inc. All rights reserved.
Jacquez, Geoffrey M; Essex, Aleksander; Curtis, Andrew; Kohler, Betsy; Sherman, Recinda; Emam, Khaled El; Shi, Chen; Kaufmann, Andy; Beale, Linda; Cusick, Thomas; Goldberg, Daniel; Goovaerts, Pierre
2017-07-01
As the volume, accuracy and precision of digital geographic information have increased, concerns regarding individual privacy and confidentiality have come to the forefront. Not only do these challenge a basic tenet underlying the advancement of science by posing substantial obstacles to the sharing of data to validate research results, but they are obstacles to conducting certain research projects in the first place. Geospatial cryptography involves the specification, design, implementation and application of cryptographic techniques to address privacy, confidentiality and security concerns for geographically referenced data. This article defines geospatial cryptography and demonstrates its application in cancer control and surveillance. Four use cases are considered: (1) national-level de-duplication among state or province-based cancer registries; (2) sharing of confidential data across cancer registries to support case aggregation across administrative geographies; (3) secure data linkage; and (4) cancer cluster investigation and surveillance. A secure multi-party system for geospatial cryptography is developed. Solutions under geospatial cryptography are presented and computation time is calculated. As services provided by cancer registries to the research community, de-duplication, case aggregation across administrative geographies and secure data linkage are often time-consuming and in some instances precluded by confidentiality and security concerns. Geospatial cryptography provides secure solutions that hold significant promise for addressing these concerns and for accelerating the pace of research with human subjects data residing in our nation's cancer registries. Pursuit of the research directions posed herein conceivably would lead to a geospatially encrypted geographic information system (GEGIS) designed specifically to promote the sharing and spatial analysis of confidential data. Geospatial cryptography holds substantial promise for accelerating the pace of research with spatially referenced human subjects data.
2006-03-01
20 6. Community Concerns........................................................................21 G ...44 viii 6. Community Concerns........................................................................45 G ...
Education, Underdevelopment, Unnecessary War and Human Security in Kosovo/Kosova
ERIC Educational Resources Information Center
Nelles, W.
2005-01-01
This paper examines educational linkages to persistent conflicts and contemporary security challenges in Kosovo. It reviews some historic foundations, debates and socioeconomic contexts concerning education as a security issue. It argues that poverty and underdevelopment coupled with failed diplomacy (particularly surrounding a 1996 ''Education…
77 FR 75223 - Spencer Pharmaceutical Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-19
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Spencer Pharmaceutical Inc.; Order of Suspension of Trading December 17, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Spencer Pharmaceutical Inc...
ERIC Educational Resources Information Center
Cianciolo, Patricia K.; Henderson, Tammy L.
2003-01-01
Describes modules on Social Security and Medicare for gerontology policy courses. Discusses collaborative exercises in which students explore Internet resources on Social Security and health care finance, identity major concerns about reforms, and enact scenarios about retirees with varying degrees of income and health care security. (Contains 33…
ERIC Educational Resources Information Center
Brown, David A.
2017-01-01
Information security is a concern for managers implementing protection measures. Implementing information security measures requires communicating both the reason and remediation for the protection measure. Examining how an anti-spyware security communication affects an individual's intention to implement a protection measure could help improve…
European Perceptions of Plan Colombia: A Virtual Contribution to a Virtual War and Peace Plan?
2001-05-01
government for more effective control of the paramilitary forces may help. A greater surge of European activism backed by development assistance funds and...economic, security, and political spillover effects for neighboring countries. Finally and logically, the author reflects the European concern that...economic, security, and political spillover effects for neighboring countries. Finally and logically, Roy reflects the European concern that whatever
ERIC Educational Resources Information Center
Holmes, Ryan Clevis
2014-01-01
Campus safety has been a source of concern since the 1990s. However, in 2007, the tragedy at the Virginia Polytechnic and State University sent a sense of alarm through many institutions of higher education. Immediately following this tragedy, institutions across the country began to evaluate and question their safety and security practices. While…
Flattening the organization: implementing self-directed work groups.
Brandon, G M
1996-01-01
In response to tremendous growth of managed care and threats to financial stability and job security, the Greater Baltimore Medical Center (GBMC) restructured itself into independent business units. The radiology department at GBMC resolved to reduce cost per unit-of-service, improve service, determine optimal staffing levels and reduce the number of layers of organization. It was decided to achieve those goals by implementing self-directed work groups. Staff buy-in was critical to success of the project. To begin, the staff was educated intensively about current trends in healthcare, managed care and potential changes in the job market. The radiology department was allowed to reduce the size of its staff through attrition and worked hard to focus staff concern on the impact each individual could have on the bottom line and the resultant effect on job security. Self-directed work groups were designed on a matrix that used small "service teams" in combinations to form larger "work groups." Actual work and daily activities occur at the service team level; information exchange and major decisions occue at the work group level. Seventeen months after beginning the project and 10 months after implementation, the organization has flattened, staff members have adjusted well to new roles, there have been no lay-offs, and the matrix system of small and large groups have proved particularly valuable.
16 CFR 602.1 - Effective dates.
Code of Federal Regulations, 2010 CFR
2010-01-01
... security number in a consumer report; (iv) Section 151(a)(1), concerning the summary of rights of identity..., concerning the prevention of repollution of consumer reports; (viii) Section 155, concerning notice by debt... consumers; (x) Section 212(a)-(d), concerning the disclosure of credit scores; (xi) Section 213(c...
76 FR 53164 - Puda Coal, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-25
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Puda Coal, Inc.; Order of Suspension of Trading August 19, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Puda Coal, Inc. (``Puda'') because (1) Puda...
75 FR 8156 - Electronic Game Card, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-23
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Electronic Game Card, Inc.; Order of Suspension of Trading February 19, 2010. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Electronic Game Card, Inc...
76 FR 49836 - Proposed Collection; Comment Request for Form 8846
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-11
... concerning Form 8846, Credit for Employer Social Security and Medicare Taxes Paid on Certain Employee Tips... Social Security and Medicare Taxes Paid on Certain Employee Tips. OMB Number: 1545-1414. Form Number... income tax credit for the amount of social security and Medicare taxes paid (employer's share) on tips...
78 FR 62931 - Pacific Clean Water Technologies, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Pacific Clean Water Technologies, Inc.; Order of Suspension of Trading October 11, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Pacific Clean Water...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-28
... accommodate customer clearing of credit default swaps that reference government securities. Treasury is also... regulations impose obligations concerning financial responsibility, protection of customer securities and... clearance of credit default swaps (CDS)\\8\\ transactions on behalf of customers of ICE Trust clearing members...
75 FR 22168 - Global Medical Products Holdings, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-27
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Global Medical Products Holdings, Inc., Order of Suspension of Trading April 23, 2010. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Global Medical Products...
75 FR 27847 - China Technology Global Corp.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-18
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Technology Global Corp.; Order of Suspension of Trading May 14, 2010. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Technology Global Corp...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-24
... Activities; Proposed Information Collection; Comment Request; Securities Exchange Act Disclosure Rules (12 CFR Part 11) and Securities of Federal Savings Associations (12 CFR Part 194) AGENCY: Office of the... concerning its information collection titled, ``Securities Exchange Act Disclosure Rules (12 CFR part 11) and...
76 FR 6170 - Andresmin Gold Corp., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-03
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Andresmin Gold Corp., Order of Suspension of Trading February 1, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Andresmin Gold Corp. because it has not...
Student Perceptions of High-Security School Environments
ERIC Educational Resources Information Center
Bracy, Nicole L.
2011-01-01
Public schools have transformed significantly over the past several decades in response to concerns about rising school violence. Today, most public schools are high-security environments employing police officers, security cameras, and metal detectors, as well as strict discipline policies to keep students in line and maintain safe campuses.…
77 FR 58424 - China Mobile Media Technology, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Mobile Media Technology, Inc., Order of Suspension of Trading September 18, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Mobile Media...
78 FR 58376 - Home System Group, Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-23
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Home System Group, Order of Suspension of Trading September 19, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Home System Group because Home System Group...
78 FR 71021 - Life Stem Genetics Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-27
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Life Stem Genetics Inc.; Order of Suspension of Trading November 25, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Life Stem Genetics Inc. because...
77 FR 76160 - New Generation Biofuels Holdings, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-26
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] New Generation Biofuels Holdings, Inc.; Order of Suspension of Trading December 21, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of New Generation Biofuels...
77 FR 26796 - HydroGenetics, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-07
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGenetics, Inc.; Order of Suspension of... and accurate information concerning the securities of HydroGenetics, Inc. (``HydroGenetics'') because... require a suspension of trading in the securities of HydroGenetics. Therefore, it is ordered, pursuant to...
Computer Security Primer: Systems Architecture, Special Ontology and Cloud Virtual Machines
ERIC Educational Resources Information Center
Waguespack, Leslie J.
2014-01-01
With the increasing proliferation of multitasking and Internet-connected devices, security has reemerged as a fundamental design concern in information systems. The shift of IS curricula toward a largely organizational perspective of security leaves little room for focus on its foundation in systems architecture, the computational underpinnings of…
78 FR 77769 - CompuSonics Video Corporation, Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-24
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] CompuSonics Video Corporation, Order of Suspension of Trading December 20, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of CompuSonics Video Corporation...
78 FR 32696 - Jupiter Enterprises, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-31
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Jupiter Enterprises, Inc., Order of Suspension of Trading May 29, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Jupiter Enterprises, Inc. because it has not...
Global hunger: a challenge to agricultural, food, and nutritional sciences.
Wu, Shiuan-Huei; Ho, Chi-Tang; Nah, Sui-Lin; Chau, Chi-Fai
2014-01-01
Hunger has been a concern for generations and has continued to plague hundreds of millions of people around the world. Although many efforts have been devoted to reduce hunger, challenges such as growing competitions for natural resources, emerging climate changes and natural disasters, poverty, illiteracy, and diseases are posing threats to food security and intensifying the hunger crisis. Concerted efforts of scientists to improve agricultural and food productivity, technology, nutrition, and education are imperative to facilitate appropriate strategies for defeating hunger and malnutrition. This paper provides some aspects of world hunger issues and summarizes the efforts and measures aimed to alleviate food problems from the food and nutritional sciences perspectives. The prospects and constraints of some implemented strategies for alleviating hunger and achieving sustainable food security are also discussed. This comprehensive information source could provide insights into the development of a complementary framework for dealing with the global hunger issue.
Pedraza, Franciso I; Nichols, Vanessa Cruz; LeBrón, Alana M W
2017-10-01
Research shows that health care use among Latino immigrants is adversely affected by restrictive immigration policy. A core concern is that immigrants shy away from sharing personal information in response to policies that expand bureaucratic monitoring of citizenship status across service-providing organizations. This investigation addresses the concern that immigration politics also negatively influences health care utilization among Latino US citizens. One implication is that health insurance expansions may not reduce health care inequities among Latinos due to concern about exposure to immigration law enforcement authorities. Using data from the 2015 Latino National Health and Immigration Survey, we examine the extent to which the politics of immigration deters individuals from going to health care providers and service-providing institutions. Results indicate that Latino US citizens are less likely to make an appointment to see a health care provider when the issue of immigration is mentioned. Additionally, Latino US citizens who know someone who has been deported are more inclined to perceive that information shared with health care providers is not secure. We discuss how cautious citizenship, or risk-avoidance behaviors toward public institutions in order to avoid scrutiny of citizenship status, informs debates about reducing health care inequities. Copyright © 2017 by Duke University Press.
10 CFR 95.27 - Protection while in use.
Code of Federal Regulations, 2011 CFR
2011-01-01
... SECURITY INFORMATION AND RESTRICTED DATA Physical Security § 95.27 Protection while in use. While in use... disclosure authorization (see § 95.36 for additional information concerning disclosure authorizations). [64...
Cybercrimes vs. Cyberliberties
NASA Astrophysics Data System (ADS)
Strossen, Nadine
This new Introduction explains how all of the themes and conclusions of the original chapter remain valid despite intervening developments, including the 2001 terrorist attacks. It shows that the major points that the 1999 chapter made about one particular medium, at one particular historical point, concerning particular safety and security issues that were then at the forefront of public concern, apply more universally to other media, during other historical periods, and regarding other safety and security concerns. The Introduction supports this generalization by analyzing two sets of subsequent developments. First, it shows that post-911 surveillance measures that target communications, including Internet communications, violate freedom of speech and privacy without sufficient countervailing security benefits. Second, it shows that the government’s continuing efforts to suppress online sexual expression, in order to protect children from seeing it, continue appropriately to be struck down by the courts as violating free speech rights without sufficient countervailing benefits.
Rosenbaum, Benjamin P
2014-03-01
Radio frequency identification (RFID) technology has been implemented in a wide variety of industries. Health care is no exception. This article explores implementations and limitations of RFID in several health care domains: authentication, medication safety, patient tracking, and blood transfusion medicine. Each domain has seen increasing utilization of unique applications of RFID technology. Given the importance of protecting patient and data privacy, potential privacy and security concerns in each domain are discussed. Such concerns, some of which are inherent to existing RFID hardware and software technology, may limit ubiquitous adoption. In addition, an apparent lack of security standards within the RFID domain and specifically health care may also hinder the growth and utility of RFID within health care for the foreseeable future. Safeguarding the privacy of patient data may be the most important obstacle to overcome to allow the health care industry to take advantage of the numerous benefits RFID technology affords.
NASA Astrophysics Data System (ADS)
Abdulghafoor, O. B.; Shaat, M. M. R.; Ismail, M.; Nordin, R.; Yuwono, T.; Alwahedy, O. N. A.
2017-05-01
In this paper, the problem of resource allocation in OFDM-based downlink cognitive radio (CR) networks has been proposed. The purpose of this research is to decrease the computational complexity of the resource allocation algorithm for downlink CR network while concerning the interference constraint of primary network. The objective has been secured by adopting pricing scheme to develop power allocation algorithm with the following concerns: (i) reducing the complexity of the proposed algorithm and (ii) providing firm power control to the interference introduced to primary users (PUs). The performance of the proposed algorithm is tested for OFDM- CRNs. The simulation results show that the performance of the proposed algorithm approached the performance of the optimal algorithm at a lower computational complexity, i.e., O(NlogN), which makes the proposed algorithm suitable for more practical applications.
Information security : is your information safe?
DOT National Transportation Integrated Search
1999-01-01
This article characterizes the problem of cyber-terrorism, outlines the Federal government's response to several security-related concerns, and describes the Volpe Center's critical support to this response. The possibility of catastrophic terrorist ...
Rethinking the causes of deforestation: lessons from economic models.
Angelsen, A; Kaimowitz, D
1999-02-01
Concern is rising over the deleterious effects of tropical deforestation. For example, the loss of forest cover influences the climate and reduces biodiversity, while reduced timber supplies, siltation, flooding, and soil degradation affect economic activity and threaten the livelihoods and cultural integrity of forest-dependent people. Such concerns have led economists to expand their efforts to model why, where, and to what extent forests are being converted to other land uses. This synthesis of the results of more than 140 economic models analyzing the causes of tropical deforestation brings into question many conventional hypotheses upon deforestation. More roads, higher agricultural prices, lower wages, and a shortage of off-farm employment generally lead to more deforestation. However, it is not known how technical change, agricultural input prices, household income levels, and tenure security affect deforestation. The role of macroeconomic factors such as population growth, poverty reduction, national income, economic growth, and foreign debt is also unclear. The authors nonetheless determine through their review that policy reforms included in current economic liberalization and adjustment efforts may increase pressure upon forests.
76 FR 16462 - In the Matter of Heli Electronics Corp., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-23
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Heli Electronics Corp., Order of Suspension of Trading March 21, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Heli Electronics Corp...
Security basics for long-term care facilities.
Green, Martin
2015-01-01
The need for Long-Term Care (LTC) facilities is growing, the author reports, and along with it the need for programs to address the major security concerns of such facilities. In this article he explains how to apply the IAHSS Healthcare Security Industry Guidelines and the Design Guidelines to achieve a safer LTC facility.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Future Now Group, Inc., and Gammacan International, Inc.; Order of Suspension of Trading June 5, 2012. It appears to the Securities and Exchange... concerning the securities of Gammacan International, Inc. because it has not filed any periodic reports since...
76 FR 6499 - China 9D Construction Group; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-04
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China 9D Construction Group; Order of Suspension of Trading February 2, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China 9D Construction Group...
33 CFR 105.405 - Format and content of the Facility Security Plan (FSP).
Code of Federal Regulations, 2010 CFR
2010-07-01
... Vulnerability and Security Measures Summary (Form CG-6025) in appendix A to part 105-Facility Vulnerability and... resubmission of the FSP. (c) The Facility Vulnerability and Security Measures Summary (Form CG-6025) must be completed using information in the FSA concerning identified vulnerabilities and information in the FSP...
78 FR 55134 - China Cablecom Holdings Ltd., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-09
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Cablecom Holdings Ltd., Order of Suspension of Trading September 5, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Cablecom Holdings Ltd. (n/k...
78 FR 50480 - In the Matter of Redfin Network, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-19
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Redfin Network, Inc.; Order of Suspension of Trading August 15, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Redfin Network, Inc...
76 FR 28117 - Order of Suspension of Trading; City Network, Inc.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-13
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading; City Network, Inc. May 11, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of City Network, Inc. because it has not filed...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-24
... particular security. Savings associations, regardless of size, should not purchase securities for which they... characteristics to be purchased and held by insured savings associations. Under section 362.11(b), a savings... management's credit risk analysis and its use in examiner decisions concerning investment security risk...
Database Security: What Students Need to Know
ERIC Educational Resources Information Center
Murray, Meg Coffin
2010-01-01
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
78 FR 55769 - North China Horticulture, Inc., File No. 500-1; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-11
... SECURITIES AND EXCHANGE COMMISSION North China Horticulture, Inc., File No. 500-1; Order of Suspension of Trading September 6, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of North China Horticulture, Inc...
An Autonomic Framework for Integrating Security and Quality of Service Support in Databases
ERIC Educational Resources Information Center
Alomari, Firas
2013-01-01
The back-end databases of multi-tiered applications are a major data security concern for enterprises. The abundance of these systems and the emergence of new and different threats require multiple and overlapping security mechanisms. Therefore, providing multiple and diverse database intrusion detection and prevention systems (IDPS) is a critical…
78 FR 21634 - Order of Suspension of Trading; in the Matter of Integrity Bancshares, Inc.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-11
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading; in the Matter of Integrity Bancshares, Inc. April 9, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Integrity...
78 FR 4481 - Order of Suspension of Trading; in the Matter of Medex, Inc.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-22
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading; in the Matter of Medex, Inc. January 17, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Medex, Inc. (``Medex'') because...
78 FR 47813 - In the Matter of Bergamo Acquisition Corp.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Bergamo Acquisition Corp.; Order of Suspension of Trading August 2, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Bergamo Acquisition...
77 FR 31682 - In the Matter of Indocan Resources, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-29
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Indocan Resources, Inc.; Order of Suspension of Trading May 24, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Indocan Resources, Inc...
Information Systems Security and Computer Crime in the IS Curriculum: A Detailed Examination
ERIC Educational Resources Information Center
Foltz, C. Bryan; Renwick, Janet S.
2011-01-01
The authors examined the extent to which information systems (IS) security and computer crime are covered in information systems programs. Results suggest that IS faculty believe security coverage should be increased in required, elective, and non-IS courses. However, respondent faculty members are concerned that existing curricula leave little…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-25
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Channel America Television Network, Inc., EquiMed, Inc., Kore Holdings, Inc., Robotic Vision Systems, Inc. (n/k/a Acuity Cimatrix, Inc.), Security... information concerning the securities of Channel America Television Network, Inc. because it has not filed any...
Cyber Security Threats to Safety-Critical, Space-Based Infrastructures
NASA Astrophysics Data System (ADS)
Johnson, C. W.; Atencia Yepez, A.
2012-01-01
Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.
SecureMA: protecting participant privacy in genetic association meta-analysis.
Xie, Wei; Kantarcioglu, Murat; Bush, William S; Crawford, Dana; Denny, Joshua C; Heatherly, Raymond; Malin, Bradley A
2014-12-01
Sharing genomic data is crucial to support scientific investigation such as genome-wide association studies. However, recent investigations suggest the privacy of the individual participants in these studies can be compromised, leading to serious concerns and consequences, such as overly restricted access to data. We introduce a novel cryptographic strategy to securely perform meta-analysis for genetic association studies in large consortia. Our methodology is useful for supporting joint studies among disparate data sites, where privacy or confidentiality is of concern. We validate our method using three multisite association studies. Our research shows that genetic associations can be analyzed efficiently and accurately across substudy sites, without leaking information on individual participants and site-level association summaries. Our software for secure meta-analysis of genetic association studies, SecureMA, is publicly available at http://github.com/XieConnect/SecureMA. Our customized secure computation framework is also publicly available at http://github.com/XieConnect/CircuitService. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2012 CFR
2012-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2014 CFR
2014-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2013 CFR
2013-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2011 CFR
2011-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
Update on security plans to prevent bioterrorism attacks during agricultural bacilli programs
Robert A. Fusco
2003-01-01
In the aftermath of September 11, security in aerial application suppression programs utilizing Bacillus thuringiensis has become a critical concern for State pest control managers and aerial applicators.
Hybrid architecture for building secure sensor networks
NASA Astrophysics Data System (ADS)
Owens, Ken R., Jr.; Watkins, Steve E.
2012-04-01
Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.
Diagnosing water security in the rural North with an environmental security framework.
Penn, Henry J F; Loring, Philip A; Schnabel, William E
2017-09-01
This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.
Arms Control and Nonproliferation: A Catalog of Treaties and Agreements
2007-08-09
security and control over nuclear weapons and fissile materials. These projects provided Russia with bullet-proof Kevlar blankets, secure canisters ...U.S. security concerns. The United States and Soviet Union began to sign agreements limiting their strategic offensive nuclear weapons in the early...U.S.-Russian relationship. At the same time, however, the two sides began to cooperate on securing and eliminating Soviet-era nuclear , chemical, and
ERIC Educational Resources Information Center
Zahadat, Nima
2016-01-01
With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…
Resident Use of Text Messaging for Patient Care: Ease of Use or Breach of Privacy?
Prochaska, Micah T; Bird, Amber-Nicole; Chadaga, Amar; Arora, Vineet M
2015-11-26
Short message service (SMS) text messaging is an efficient form of communication and pervasive in health care, but may not securely protect patient information. It is unclear if resident providers are aware of the security concerns of SMS text messaging when communicating about patient care. We sought to compare residents' preferences for SMS text messaging compared with other forms of in-hospital communication when considering security versus ease of use. This study was a cross-sectional multi-institutional survey of internal medicine residents. Residents ranked different communication modalities based on efficiency, ease of use, and security using a Likert scale. Communication options included telephone, email, hospital paging, and SMS text messaging. Respondents also reported whether they had received confidential patient identifiers through any of these modalities. SMS text messaging was preferred by 71.7% (94/131) of respondents because of its efficiency and by 79.8% (103/129) of respondents because of its ease of use. For security, 82.5% (104/126) of respondents preferred the hospital paging system, whereas only 20.6% (26/126) of respondents preferred SMS text messaging for secure communication. In all, 70.9% (93/131) of respondents reported having received patient identifiers (first and/or last name), 81.7% (107/131) reported receiving patient initials, and 50.4% (66/131) reported receiving a patient's medical record number through SMS text messages. Residents prefer in-hospital communication through SMS text messaging because of its ease of use and efficiency. Despite security concerns, the majority of residents reported receiving confidential patient information through SMS text messaging. For providers, it is possible that the benefits of improved in-hospital communication with SMS text messaging and the presumed improvement in the coordination and delivery of patient care outweigh security concerns they may have. The tension between the security and convenience of SMS text messaging may represent an educational opportunity to ensure the compliance of mobile technology in the health care setting.
Code of Federal Regulations, 2010 CFR
2010-01-01
.... Classified official record material will be processed to the Information Systems and Technology, Records.../CSS Directorate for Information Systems Security, Ft. Meade, Maryland 20755. Specifications concerning..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified...
SPAR: a security- and power-aware routing protocol for wireless ad hoc and sensor networks
NASA Astrophysics Data System (ADS)
Oberoi, Vikram; Chigan, Chunxiao
2005-05-01
Wireless Ad Hoc and Sensor Networks (WAHSNs) are vulnerable to extensive attacks as well as severe resource constraints. To fulfill the security needs, many security enhancements have been proposed. Like wise, from resource constraint perspective, many power aware schemes have been proposed to save the battery power. However, we observe that for the severely resource limited and extremely vulnerable WAHSNs, taking security or power (or any other resource) alone into consideration for protocol design is rather inadequate toward the truly "secure-and-useful" WAHSNs. For example, from resource constraint perspective, we identify one of the potential problems, the Security-Capable-Congestion (SCC) behavior, for the WAHSNs routing protocols where only the security are concerned. On the other hand, the design approach where only scarce resource is concerned, such as many power-aware WAHSNs protocols, leaves security unconsidered and is undesirable to many WAHSNs application scenarios. Motivated by these observations, we propose a co-design approach, where both the high security and effective resource consumption are targeted for WAHSNs protocol design. Specifically, we propose a novel routing protocol, Security- and Power- Aware Routing (SPAR) protocol based on this co-design approach. In SPAR, the routing decisions are made based on both security and power as routing criteria. The idea of the SPAR mechanism is routing protocol independent and therefore can be broadly integrated into any of the existing WAHSNs routing protocols. The simulation results show that SPAR outperforms the WAHSNs routing protocols where security or power alone is considered, significantly. This research finding demonstrates the proposed security- and resource- aware co-design approach is promising towards the truly "secure-and-useful" WAHSNs.
Clinton administration forging population-foreign policy links.
De Sherbinin, A
1994-12-01
In the US, the Clinton administration has renewed the link between global population and national security issues. These so-called "soft security issues" receive attention from the Under-Secretary of State for Global Affairs, Tim Wirth, and the senior director of the Global Environmental Affairs branch of the National Security Council, Eileen Claussen. Wirth and Claussen draft the US response to soft security issues such as environmental security, refugee and migration movements, political instability, and religious and ethnic conflict as well as the other nonmilitary threats of illegal drug trafficking, terrorism, and international organized crime. Population was first considered a foreign policy concern in the 1960s. By 1965, President Johnson decided that the US would provide family planning supplies and technical assistance to any country which asked for help. The initial justification for assuming a leading role in developing innovative population strategies for less developed countries was a humanitarian desire to forward economic development, the self-interest of maintaining access to resources, and concern that rapid growth produced more communists. Today the US remains concerned about resource access and economic development and is also wary of spill-over environmental effects, economic migration, diminished US trade opportunities, political asylum seekers and refugees, and increasing demand for US peacekeepers. It is also believed that rapid population growth leads to political destabilization. Critics of these views blame the development difficulties of less developed countries on poor governing decisions (inadequate institutions, trade barriers, or indifference). Women's reproductive rights advocates fear that using security as a rationale for population assistance could lead to restrictions on women's rights to choose the number and spacing of births. Despite such objections, the belief that population growth is an underlying problem in imploding states like Haiti, Rwanda, and Somalia has turned the attention of US policy-makers to these soft security issues.
78 FR 50135 - Soil Biogenics Ltd., File No. 500-1; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... SECURITIES AND EXCHANGE COMMISSION Soil Biogenics Ltd., File No. 500-1; Order of Suspension of Trading August 14, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Soil Biogenics Ltd. because it has not filed...
78 FR 59738 - Left Behind Games, Inc., File No. 500-1; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-27
... SECURITIES AND EXCHANGE COMMISSION Left Behind Games, Inc., File No. 500-1; Order of Suspension of Trading September 25, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Left Behind Games, Inc. (``Left Behind...
77 FR 16113 - ASP Ventures Corp., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-19
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] ASP Ventures Corp., Order of Suspension of Trading March 15, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of ASP Ventures Corp. because it has not filed any periodic reports since the period ended...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-26
... the Securities Exchange Act of 1934 (``Exchange Act'') concerning large trader reporting to assist the... persons are referred to as ``large traders'').\\1\\ \\1\\ See Securities Exchange Act Release No. 64976 (July... person is a large trader: (1) Any transaction that is part of an offering of securities by or on behalf...
77 FR 55248 - eHydrogen Solutions, Inc., and ChromoCure, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-07
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] eHydrogen Solutions, Inc., and ChromoCure, Inc.; Order of Suspension of Trading September 5, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of eHydrogen...
The Challenges of Balancing Safety and Security in Implantable Medical Devices.
Katzis, Konstantinos; Jones, Richard W; Despotou, George
2016-01-01
Modern Implantable Medical Devices (IMDs), implement capabilities that have contributed significantly to patient outcomes, as well as quality of life. The ever increasing connectivity of IMD's does raise security concerns though there are instances where implemented security measures might impact on patient safety. The paper discusses challenges of addressing both of these attributes in parallel.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-26
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69196] Order Granting a Limited Exemption From... to Regulation M Rule 102(e) March 20, 2013. The Securities and Exchange Commission (``Commission...\\ In connection with the Program, an MQP Company \\2\\ may list an eligible MQP Security \\3\\ on NASDAQ...
78 FR 4907 - In the Matter of AlphaTrade.com; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-23
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of AlphaTrade.com ; Order of Suspension of Trading January 18, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of AlphaTrade.com because it has not...
77 FR 5865 - In the Matter of Beicang Iron & Steel, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Beicang Iron & Steel, Inc.; Order of Suspension of Trading February 2, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Beicang Iron...
77 FR 26588 - In the Matter of Recycle Tech, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-04
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Recycle Tech, Inc.; Order of Suspension of Trading May 2, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Recycle Tech, Inc. (``Recycle Tech...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Benda Pharmaceutical, Inc. and China Shuangjii Cement Ltd., Order of Suspension of Trading May 15, 2013. It appears to the Securities and Exchange... concerning the securities of China Shuangji Cement Ltd. because it has not filed any periodic reports since...
77 FR 5865 - In the Matter of Blue Earth Refineries, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Blue Earth Refineries, Inc.; Order of Suspension of Trading February 2, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Blue Earth...
78 FR 32696 - China Properties Developments, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-31
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Properties Developments, Inc.; Order of Suspension of Trading May 29, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Properties Developments, Inc. because it has not filed any periodic...
78 FR 32696 - China Environmental Protection, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-31
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Environmental Protection, Inc., Order of Suspension of Trading May 29, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Environmental Protection, Inc. because it has not filed any periodi...
Water security evaluation in Yellow River basin
NASA Astrophysics Data System (ADS)
Jiang, Guiqin; He, Liyuan; Jing, Juan
2018-03-01
Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.
Material security, life history, and moralistic religions: A cross-cultural examination
Ross, Cody T.; Apicella, Coren; Atkinson, Quentin D.; Cohen, Emma; McNamara, Rita Anne; Willard, Aiyana K.; Xygalatas, Dimitris; Norenzayan, Ara; Henrich, Joseph
2018-01-01
Researchers have recently proposed that “moralistic” religions—those with moral doctrines, moralistic supernatural punishment, and lower emphasis on ritual—emerged as an effect of greater wealth and material security. One interpretation appeals to life history theory, predicting that individuals with “slow life history” strategies will be more attracted to moralistic traditions as a means to judge those with “fast life history” strategies. As we had reservations about the validity of this application of life history theory, we tested these predictions with a data set consisting of 592 individuals from eight diverse societies. Our sample includes individuals from a wide range of traditions, including world religions such as Buddhism, Hinduism and Christianity, but also local traditions rooted in beliefs in animism, ancestor worship, and worship of spirits associated with nature. We first test for the presence of associations between material security, years of formal education, and reproductive success. Consistent with popular life history predictions, we find evidence that material security and education are associated with reduced reproduction. Building on this, we then test whether or not these demographic factors predict the moral concern, punitiveness, attributed knowledge-breadth, and frequency of ritual devotions towards two deities in each society. Here, we find no reliable evidence of a relationship between number of children, material security, or formal education and the individual-level religious beliefs and behaviors. We conclude with a discussion of why life-history theory is an inadequate interpretation for the emergence of factors typifying the moralistic traditions. PMID:29513766
Material security, life history, and moralistic religions: A cross-cultural examination.
Purzycki, Benjamin Grant; Ross, Cody T; Apicella, Coren; Atkinson, Quentin D; Cohen, Emma; McNamara, Rita Anne; Willard, Aiyana K; Xygalatas, Dimitris; Norenzayan, Ara; Henrich, Joseph
2018-01-01
Researchers have recently proposed that "moralistic" religions-those with moral doctrines, moralistic supernatural punishment, and lower emphasis on ritual-emerged as an effect of greater wealth and material security. One interpretation appeals to life history theory, predicting that individuals with "slow life history" strategies will be more attracted to moralistic traditions as a means to judge those with "fast life history" strategies. As we had reservations about the validity of this application of life history theory, we tested these predictions with a data set consisting of 592 individuals from eight diverse societies. Our sample includes individuals from a wide range of traditions, including world religions such as Buddhism, Hinduism and Christianity, but also local traditions rooted in beliefs in animism, ancestor worship, and worship of spirits associated with nature. We first test for the presence of associations between material security, years of formal education, and reproductive success. Consistent with popular life history predictions, we find evidence that material security and education are associated with reduced reproduction. Building on this, we then test whether or not these demographic factors predict the moral concern, punitiveness, attributed knowledge-breadth, and frequency of ritual devotions towards two deities in each society. Here, we find no reliable evidence of a relationship between number of children, material security, or formal education and the individual-level religious beliefs and behaviors. We conclude with a discussion of why life-history theory is an inadequate interpretation for the emergence of factors typifying the moralistic traditions.
TCIA Secure Cyber Critical Infrastructure Modernization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keliiaa, Curtis M.
The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.
ERIC Educational Resources Information Center
Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.
2003-01-01
Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…
Ensuring the security and availability of a hospital wireless LAN system.
Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku
2013-01-01
Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. Herein we discuss security countermeasures that must be taken and issues concerning availability that must be considered to ensure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at a university hospital. Security countermeasures differ according to their purpose, such as preventing illegal use or ensuring availability, both of which are discussed. The main focus of the availability discussion is on signal reach, electromagnetic noise elimination, and maintaining power supply to the network apparatus. It is our hope that this information will assist others in their efforts to ensure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.
NASA Astrophysics Data System (ADS)
Blount, P. J.
2017-06-01
Since the very beginning of the space age, security has been the critical, overriding concern at the heart of both international and domestic space law regimes. While these regimes certainly encompass broader interests, such as commercial uses of outer space, they are built on a legal foundation that is largely intended to regularize interactions among space actors to ensure security, safety, and sustainability in the space environment. Space security law, as a result, has central goals of both maintaining peace and providing security as a public good for the benefit of humankind. The idea of security is a technical and political construct. The law is a tool that is used to articulate that construct as concept and operationalize it as a value. As such, space security law is a network of law and regulation that governs a wide variety of space activities. There are four broad categories that typify the various manifestations of space security law: international peace and security; national security; human security; and space safety and sustainability. International peace and security, the first category, is directly concerned with the international law and norms that have been adopted to decrease the risk of conflict between states. National security, category two, consists of domestic law that implements, at the national level, the obligations found in the first category as well as law that promotes other national security goals. Human security, the third category, is the loose set of law and policy directed at the use of space for the protection of human populations, such as disaster response and planetary protection. Finally, the fourth category, space safety and security, represents the emerging body of law and policy that seeks to protect the space environment through measures that address space debris and harmful contamination. Obviously, these categories overlap and laws can serve duplicative purposes, but this compartmentalization reveals much about the legal structures that surround core security projects being pursued in and through space.
46 CFR 170.055 - Definitions concerning a vessel.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Definitions concerning a vessel. 170.055 Section 170.055 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Definitions § 170.055 Definitions concerning a vessel. (a) Auxiliary...
Concerns about usage of smartphones in operating room and critical care scenario
Attri, JP; Khetarpal, R; Chatrath, V; Kaur, J
2016-01-01
Smartphones and tablets have taken a central place in the lives of health care professionals. Their use has dramatically improved the communication and has become an important learning tool as the medical information can be assessed online at anytime. In critical care settings, use of smartphone facilitates quick passage of information through E-mail messaging and getting feedback from the concerned physician quickly, thereby reducing medical errors. However, in addition to the benefits offered, these devices have become a significant source of nosocomial infections, distraction for medical professionals and interfere with medical equipments. They may also put privacy and security of patients at stake. The benefits could be severely undermined if abuse and over use are not kept in check. This review article focuses on various applications of smartphones in healthcare practices, drawback of the use of these devices and the recommendations regarding the safe use of these devices. PMID:26952181
Concerns about usage of smartphones in operating room and critical care scenario.
Attri, J P; Khetarpal, R; Chatrath, V; Kaur, J
2016-01-01
Smartphones and tablets have taken a central place in the lives of health care professionals. Their use has dramatically improved the communication and has become an important learning tool as the medical information can be assessed online at anytime. In critical care settings, use of smartphone facilitates quick passage of information through E-mail messaging and getting feedback from the concerned physician quickly, thereby reducing medical errors. However, in addition to the benefits offered, these devices have become a significant source of nosocomial infections, distraction for medical professionals and interfere with medical equipments. They may also put privacy and security of patients at stake. The benefits could be severely undermined if abuse and over use are not kept in check. This review article focuses on various applications of smartphones in healthcare practices, drawback of the use of these devices and the recommendations regarding the safe use of these devices.
Talking about health: correction employees' assessments of obstacles to healthy living.
Morse, Tim; Dussetschleger, Jeffrey; Warren, Nicholas; Cherniack, Martin
2011-09-01
Describe health risks/obstacles to health among correctional employees. Mixed-methods approach combined results from four focus groups, 10 interviews, 335 surveys, and 197 physical assessments. Obesity levels were higher than national averages (40.7% overweight and 43.3% obese), with higher levels associated with job tenure, male gender, and working off-shift. Despite widespread concern about the lack of fitness, leisure exercise was higher than national norms. Respondents had higher levels of hypertension than national norms, with 31% of men and 25.8% of women hypertensive compared with 17.1% and 15.1% for national norms. Stress levels were elevated. Officers related their stress to concerns about security, administrative requirements, and work/family imbalance. High stress levels are reflected in elevated levels of hypertension. Correctional employees are at high risk for chronic disease, and environmental changes are needed to reduce risk factors. (C)2011The American College of Occupational and Environmental Medicine
Evolutionary Aspects for Technology Policy: the Case of Galileo Public-Private Partnership
NASA Astrophysics Data System (ADS)
Zervos, Vasilis
2002-01-01
This paper examines the impact of strategic interactions on Private-Public Partnerships (PPPs) in space. Though there is substantial business and economics literature on PPPs, it is traditionally focused on the relationships within the partnerships (low level) and the respective factors affecting its success. The contribution of this paper is that it examines the political economy of PPPs, analysing how `high-level' strategic interactions across public-private sectors in Europe and the US determine their behaviour and success. Within this context, the European case of Galileo and other national space projects, such as the US plans for a space-based anti- missile defence, are each based on different types of PPPs, confined within the geographical borders of the two areas. The security and commercial benefits of such programmes for the respective space industries and economies have a direct impact on the other area's industry and sense of security. The paper shows that trans- Atlantic cooperation at public policy level is essential to allow the respective industries to explore the benefits of cross-border strategic research partnerships (SRPs). This will reduce the costs of the respective programmes, addressing security concerns.
Improved child behavioural and emotional functioning after Circle of Security 20-week intervention.
Huber, Anna; McMahon, Catherine; Sweller, Naomi
2015-01-01
This study examined the efficacy of the attachment-based Circle of Security 20-week intervention in improving child behavioural and emotional functioning. Participants were 83 parents of children (1-7 years) referred to a clinical service with concerns about their young children's behaviour. Parents (and teachers, when available) completed questionnaires assessing child protective factors, behavioural concerns, internalizing and externalizing problems, prior to and immediately after the intervention. The following were considered as potential moderators: child gender and age, parent representations, reflective functioning, child attachment indices and severity of presenting problems, prior to treatment. Results showed significant improvement for parent ratings of child protective factors, behavioural concerns, internalizing and externalizing symptoms, all ps < .05, and children with more severe problems showed most improvement. Teachers also reported improvements, but change was significant only for externalizing problems (p = .030). Findings suggest Circle of Security is effective in improving child behavioural and emotional functioning in clinically referred children aged 1-7 years.
Secure Server Login by Using Third Party and Chaotic System
NASA Astrophysics Data System (ADS)
Abdulatif, Firas A.; zuhiar, Maan
2018-05-01
Server is popular among all companies and it used by most of them but due to the security threat on the server make this companies are concerned when using it so that in this paper we will design a secure system based on one time password and third parity authentication (smart phone). The proposed system make security to the login process of server by using one time password to authenticate person how have permission to login and third parity device (smart phone) as other level of security.
76 FR 30326 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... United States of America and the Government of Japan Concerning Peaceful Uses of Nuclear Energy. DATES... Energy. Anne M. Harrington, Deputy Administrator, Defense Nuclear Nonproliferation. [FR Doc. 2011-12919...
2015-12-01
concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1986-05-30
and airport security measures in effect. Section V of this report provides a smry of firearms which were detected at screening points under suspicious...with the Secretary of State concerning threats, and (3) the inclusion of a sumnmary on foreign airport security in the Semiannual Report to Congress on...International Civil Aviation Organization (ICAO) to embark inediately upon an intensified program aimed at responding to the need for enhanced airport security . As
Case study: adapting the IAHSS curriculum in Thailand.
Goss, Richard J
2009-01-01
In late 2007 Corporate Protective Solutions (CPS), headquartered in Langley, B.C. Canada, an independent security consulting company that specialises in healthcare security, approached the IAHSS concerning the adaptation of the Basic Training Manual and Study Guide for Healthcare Security Officers for one of their clients. In this article, its managing director for Asia Pacific outlines the challenges of this project from which other international healthcare security managers can learn to replicate the process for their own facilities.
Survey of cyber security issues in smart grids
NASA Astrophysics Data System (ADS)
Chen, Thomas M.
2010-04-01
The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.
The East Mediterranean Triangle at Crossroads
2016-03-01
concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic
78 FR 54934 - In the Matter of K's Media, File No. 500-1; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-06
... SECURITIES AND EXCHANGE COMMISSION In the Matter of K's Media, File No. 500-1; Order of Suspension... lack of current and accurate information concerning the securities of K's Media because it has not... of the above-listed company. Therefore, it is ordered, pursuant to Section 12(k) of the Securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-12
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69707] Order Granting a Limited Exemption from... Pilot Pursuant to Regulation M Rule 102(e) June 6, 2013. The Securities and Exchange Commission...'s securities would constitute an indirect attempt by the issuer to induce a bid for or a purchase of...
78 FR 70617 - In the Matter of Pure H20 Bio-Technologies, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-26
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Pure H20 Bio-Technologies, Inc.; Order of Suspension of Trading November 22, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Pure H20 Bio...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-02
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of China Ruitai International Holdings Co., Ltd.; Order of Suspension of Trading September 30, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Ruitai International Holdings Co.,...
78 FR 62931 - China Ritar Power Corp., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Ritar Power Corp., Order of Suspension of Trading October 4, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Ritar Power Corp. because China Ritar Power Corp. has not filed any periodic...
78 FR 23622 - In the Matter of NewTech Brake Corp., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-19
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of NewTech Brake Corp., Order of Suspension of Trading April 17, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of NewTech Brake Corp. because it...
75 FR 80042 - Information Privacy and Innovation in the Internet Economy
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-21
... statistics that provide evidence of concern--or comments explaining why concerns are unwarranted--about cloud computing data privacy and security in the commercial context. We also seek data that links any such concerns to decisions to adopt, or refrain from adopting, cloud computing services. (41) The Task Force...
12 CFR 202.3 - Limited exceptions for certain classes of transactions.
Code of Federal Regulations, 2011 CFR
2011-01-01
... securities credit: (i) Section 202.5(b) concerning information about the sex of an applicant; (ii) Section...(b) concerning information about the sex of an applicant, but only to the extent necessary for...) concerning information about income derived from alimony, child support, or separate maintenance payments; (v...
12 CFR 202.3 - Limited exceptions for certain classes of transactions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... securities credit: (i) Section 202.5(b) concerning information about the sex of an applicant; (ii) Section...(b) concerning information about the sex of an applicant, but only to the extent necessary for...) concerning information about income derived from alimony, child support, or separate maintenance payments; (v...
12 CFR 202.3 - Limited exceptions for certain classes of transactions.
Code of Federal Regulations, 2014 CFR
2014-01-01
... securities credit: (i) Section 202.5(b) concerning information about the sex of an applicant; (ii) Section...(b) concerning information about the sex of an applicant, but only to the extent necessary for...) concerning information about income derived from alimony, child support, or separate maintenance payments; (v...
33 CFR 148.300 - What does this subpart concern?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false What does this subpart concern? 148.300 Section 148.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: GENERAL Licenses § 148.300 What does this subpart concern? This...
33 CFR 148.300 - What does this subpart concern?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false What does this subpart concern? 148.300 Section 148.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: GENERAL Licenses § 148.300 What does this subpart concern? This...
8 CFR 280.4 - Data concerning cost of transportation.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Data concerning cost of transportation. 280.4 Section 280.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS IMPOSITION AND COLLECTION OF FINES § 280.4 Data concerning cost of transportation. Within five days after...
Evaluation of a proximity card authentication system for health care settings.
Fontaine, Jacqueline; Zheng, Kai; Van De Ven, Cosmas; Li, Huiyang; Hiner, James; Mitchell, Kathy; Gendler, Stephen; Hanauer, David A
2016-08-01
Multiple users access computer workstations in busy clinical settings, requiring many logins throughout the day as users switch from one computer to another. This can lead to workflow inefficiencies as well as security concerns resulting from users sharing login sessions to save time. Proximity cards and readers have the potential to improve efficiency and security by allowing users to access clinical workstations simply by bringing the card near the reader, without the need for manual entry of a username and password. To assess the perceived impact of proximity cards and readers for rapid user authentication to clinical workstations in the setting of an existing electronic health record with single sign-on software already installed. Questionnaires were administered to clinical faculty and staff five months before and three months after the installation of proximity card readers in an inpatient birthing center and an outpatient obstetrics clinic. Open-ended feedback was also collected and qualitatively analyzed. There were 71 and 33 responses to the pre- and post-implementation surveys, respectively. There was a significant increase in the perceived speed of login with the proximity cards, and a significant decrease in the self-reported occurrence of shared login sessions between users. Feedback regarding the system was mostly positive, although several caveats were noted, including minimal benefit when used with an obstetric application that did not support single sign-on. Proximity cards and readers, along with single sign-on software, have the potential to enhance workflow efficiency by allowing for faster login times and diminish security concerns by reducing shared logins on clinical workstations. The positive feedback was used by our health system leadership to support the expanded implementation of the proximity card readers throughout the clinical setting. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
5 CFR 1312.5 - Authority to classify.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.5 Authority to classify. (a) The authority to originally classify information or material under this part shall be limited to those officials concerned with matters...
47 CFR 0.131 - Functions of the Bureau.
Code of Federal Regulations, 2010 CFR
2010-10-01
... growth by promoting efficiency and innovation in the allocation, licensing and use of the electromagnetic.... Coordinates with and assists other Bureaus and Offices, as appropriate, concerning spectrum management..., homeland security, national security, emergency management, disaster management, and related issues. [60 FR...
Identification of port communication equipment needs for safety, security, and interoperability
DOT National Transportation Integrated Search
2007-12-01
Identification of Port Communication Equipment Needs for Safety, Security, and Interoperability is a big concern for current and : future need. The data demonstrates that two-way radios should be the most effective method of communication in both rou...
Code of Federal Regulations, 2010 CFR
2010-07-01
... further foreign policy and national security interests while at the same time taking into consideration important environmental concerns. (b) The Department of Defense acts with care in the global commons because... be through the Assistant Secretary of Defense (International Security Affairs). (e) Executive Order...
77 FR 35366 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-13
... Uses of Nuclear Energy and the Agreement for Cooperation Between the United States of America and the Republic of Kazakhstan Concerning Peaceful Uses of Nuclear Energy. DATES: This subsequent arrangement will... Nonproliferation and International Security, National Nuclear Security Administration, Department of Energy...
76 FR 37343 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-27
... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... arrangement under the Agreement for Cooperation Concerning Civil Uses of Nuclear Energy Between the Government... Peaceful Uses of Nuclear Energy Between the United States of America and the European Atomic Energy...
Attachment to Mother and Father at Transition to Middle Childhood.
Di Folco, Simona; Messina, Serena; Zavattini, Giulio Cesare; Psouni, Elia
2017-01-01
The present study investigated concordance between representations of attachment to mother and attachment to father, and convergence between two narrative-based methods addressing these representations in middle childhood: the Manchester Child Attachment Story Task (MCAST) and the Secure Base Script Test (SBST). One hundred and twenty 6-year-old children were assessed by separate administrations of the MCAST for mother and father, respectively, and results showed concordance of representations of attachment to mother and attachment to father at age 6.5 years. 75 children were additionally tested about 12 months later, with the SBST, which assesses scripted knowledge of secure base (and safe haven), not differentiating between mother and father attachment relationships. Concerning attachment to father, dichotomous classifications (MCAST) and a continuous dimension capturing scripted secure base knowledge (MCAST) converged with secure base scriptedness (SBST), yet we could not show the same pattern of convergence concerning attachment to mother. Results suggest some convergence between the two narrative methods of assessment of secure base script but also highlight complications when using the MCAST for measuring attachment to father in middle childhood.
Addressing social resistance in emerging security technologies
Mitchener-Nissen, Timothy
2013-01-01
In their efforts to enhance the safety and security of citizens, governments and law enforcement agencies look to scientists and engineers to produce modern methods for preventing, detecting, and prosecuting criminal activities. Whole body scanners, lie detection technologies, biometrics, etc., are all being developed for incorporation into the criminal justice apparatus.1 Yet despite their purported security benefits these technologies often evoke social resistance. Concerns over privacy, ethics, and function-creep appear repeatedly in analyses of these technologies. It is argued here that scientists and engineers continue to pay insufficient attention to this resistance; acknowledging the presence of these social concerns yet failing to meaningfully address them. In so doing they place at risk the very technologies and techniques they are seeking to develop, for socially controversial security technologies face restrictions and in some cases outright banning. By identifying sources of potential social resistance early in the research and design process, scientists can both engage with the public in meaningful debate and modify their security technologies before deployment so as to minimize social resistance and enhance uptake. PMID:23970863
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
A video on computer security is described. Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education and Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1--3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices.
NASA Technical Reports Server (NTRS)
1985-01-01
The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.
Cyber Security Assessment Report: Adventium Labs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2007-12-31
Major control system components often have life spans of 15-20 years. Many systems in our Nation's critical infrastructure were installed before the Internet became a reality and security was a concern. Consequently, control systems are generally insecure. Security is now being included in the development of new control system devices; however, legacy control systems remain vulnerable. Most efforts to secure control systems are aimed at protecting network borers, but if an intruder gets inside the network these systems are vulnerable to a cyber attack.
Security Implications of Physical Design Attributes in the Emergency Department.
Pati, Debajyoti; Pati, Sipra; Harvey, Thomas E
2016-07-01
Security, a subset of safety, is equally important in the efficient delivery of patient care. The emergency department (ED) is susceptible to violence creating concerns for the safety and security of patients, staff, and visitors and for the safe and efficient delivery of care. Although there is an implicit and growing recognition of the role of the physical environment, interventions typically have been at the microlevel. The objective of this study was to identify physical design attributes that potentially influence safety and efficiency of ED operations. An exploratory, qualitative research design was adopted to examine the efficiency and safety correlates of ED physical design attributes. The study comprised a multimeasure approach involving multidisciplinary gaming, semistructured interviews, and touring interviews of frontline staff in four EDs at three hospital systems across three states. Five macro physical design attributes (issues that need to be addressed at the design stage and expensive to rectify once built) emerged from the data as factors substantially associated with security issues. They are design issues pertaining to (a) the entry zone, (b) traffic management, (c) patient room clustering, (d) centralization versus decentralization, and (e) provisions for special populations. Data from this study suggest that ED security concerns are generally associated with three sources: (a) gang-related violence, (b) dissatisfied patients, and (c) behavioral health patients. Study data show that physical design has an important role in addressing the above-mentioned concerns. Implications for ED design are outlined in the article. © The Author(s) 2016.
Mastering the Gray Zone: Understanding a Changing Era of Conflict
2015-12-01
debate concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...an international audience, and honor soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the...U.S. Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-07
..., Inc. (n/k/a CA Goldfields, Inc.), Order of Suspension of Trading February 3, 2011. It appears to the... current and accurate information concerning the securities of B-Teller, Inc. (n/k/a CA Goldfields, Inc...(k) of the Securities Exchange Act of 1934, that trading in the securities of the above-listed...
Closing the Security Gap: Building Irregular Security Forces
2012-06-08
had mutinied against the British during the Second Sikh War. Lawrence had the Punjabi regiments disarmed and then demobilized. The British initially...contributed to the security problem.118 The British were primarily concerned with control of the Punjabi plains because its economic and agricultural...classes were allowed to carry arms. The British recruited the following tribes from within India: Rajput, Hindustani and Punjabi Brahman, Punjabi
Soviet Interests in Afghanistan and Implications upon Withdrawal
1990-06-01
Causes of the Invasion ................ 87 Protection of Long -Standing Soviet Investments in Afghanistan .......... 88 Security Concerns...its denial to the West, if necessary, have always remained a priority long -range economic interest.L0 SECURITY OF FRONTIERS From Czarist times, the...territory, perhaps with a long -range goal of securing a warm water port. With the passage of time, Russian interests additionally included balancing
ERIC Educational Resources Information Center
Moran, Matthew; Hobbs, Christopher
2018-01-01
In recent years, nuclear security has gained prominence on the international security agenda. Driven by post 9/11 anxieties and the politicization of fears regarding nuclear terrorism, concerns in this area have spawned a wealth of initiatives, which seek to counter this threat. Principal among these have been efforts to promote nuclear security…
Preparing for War Moscow Facing an Arc of Crisis
2016-12-01
concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic
Maintaining the Status Quo in the Taiwan Strait
2013-03-01
of National Security and Strategy 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) U.S. Army...Count: 5,308 14. ABSTRACT In order to ensure vital U.S. interests concerning security and economic freedom in the region, the status quo in the...international/regional support of Taiwan, Taiwanese military deterrence backed by strategically ambiguous U.S. assurances of security , intertwined
Cyber security evaluation of II&C technologies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, Ken
The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) tomore » address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-21
...., and PC Universe, Inc. November 19, 2013. It appears to the Securities and Exchange Commission that... information concerning the securities of PC Universe, Inc. because it has not filed any periodic reports since...
DOT National Transportation Integrated Search
2004-11-11
The catastrophic events of September 11, 2001 and the ongoing war on terrorism have heightened the level of concern from Federal government officials and the transportation industry regarding the secure transport of hazardous materials (HAZMAT). Secu...
76 FR 18264 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-01
..., Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy... resumption of quotations in a quotation medium by a broker-dealer for over-the- counter (``OTC'') securities... quotation for publication, in a quotation medium unless they have reviewed specified information concerning...
The Campus Executive's Role in Security and Liability Issues.
ERIC Educational Resources Information Center
Bromley, Max; Territo, Leonard
1986-01-01
Executives at institutions of higher education have become increasingly concerned about serious crimes being committed on their campuses. The liability issue, criminal activity information, physical security and design issues, student patrol escorts, crime prevention training, and task force development are discussed. (MLW)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-23
... DEPARTMENT OF THE TREASURY Office of the Comptroller of the Currency Agency Information Collection Activities: Information Collection Renewal; Comment Request; Securities Offering Disclosure Rules AGENCY... comment concerning the renewal of an information collection titled, ``Securities Offering Disclosure Rules...
ERIC Educational Resources Information Center
Jones, Robert J.; Zehner, Mark R.
1996-01-01
In late 1994, the United States Securities and Exchange Commission (SEC) issued new rules applicable to issuers of municipal securities (including school districts) concerning disclosure to the investment community. Describes how SEC's existing Rule 15c2-12 has been implemented. Discusses its purpose, jurisdiction, obligated persons, written…
NASA Astrophysics Data System (ADS)
Ito, Keishiro
The primacy of a nuclear fusion reactor in a competitive energy market remarkably depends on to what extent the reactor contributes to reduce the externalities of energy. The reduction effects are classified into two effects, which have quite dissimilar characteristics. One is an effect of environmental dimensions. The other is related to energy security. In this study I took up the results of EC's Extern Eproject studies as are presentative example of the former effect. Concerning the latter effect, I clarified the fundamental characteristics of externalities related to energy security and the conceptual framework for the purpose of evaluation. In the socio-economical evaluation of research into and development investments in nuclear fusions reactors, the public will require the development of integrated evaluation systems to support the cost-effect analysis of how well the reduction effects of externalities have been integrated with the effects of technological innovation, learning, spillover, etc.
Mathematical models, rational choice, and the search for Cold War culture.
Erickson, Paul
2010-06-01
A key feature of the social, behavioral, and biological sciences after World War II has been the widespread adoption of new mathematical techniques drawn from cybernetics, information theory, and theories of rational choice. Historians of science have typically sought to explain this adoption either by reference to military patronage, or to a characteristic Cold War culture or discursive framework strongly shaped by the concerns of national security. This essay explores several episodes in the history of game theory--a mathematical theory of rational choice--that demonstrate the limits of such explanations. Military funding was indeed critical to game theory's early development in the 1940s. However, the theory's subsequent spread across disciplines ranging from political science to evolutionary biology was the result of a diverse collection of debates about the nature of "rationality" and "choice" that marked the Cold War era. These debates are not easily reduced to the national security imperatives that have been the focus of much historiography to date.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-05
... provisions concerning payments for home health services comply with the requirements of the Social Security... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Medicare & Medicaid Services Notice of Opportunity for a Hearing on Compliance of Missouri State Plan Provisions Concerning Payments for Home Health...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 3 The President 1 2014-01-01 2014-01-01 false Rulemaking Concerning the Standards for Designating Positions in the Competitive Service as National Security Sensitive and Related Matters Presidential Documents Other Presidential Documents Memorandum of January 25, 2013 Rulemaking Concerning the Standards for Designating Positions in the...
Security and privacy of EHR systems--ethical, social and legal requirements.
Kluge, Eike-Henner W
2003-01-01
This paper addresses social, ethical and legal concerns about security and privacy that arise in the development of international interoperable health information systems. The paper deals with these concerns under four rubrics: the ethical status of electronic health records, the social and legal embedding of interoperable health information systems, the overall information-requirements healthcare as such, and the role of health information professionals as facilitators. It argues that the concerns that arise can be met if the development of interoperability protocols is guided by the seven basic principles of information ethics that have been enunciated in the IMIA Code of Ethics for Health Information Professionals and that are central to the ethical treatment of electronic health records.
NASA Astrophysics Data System (ADS)
Okumura, Norihiro
There is some general concern that economic development in developing countries will hasten global warning. In terms of reducing CO2 emissions, fusion will have great potential as a primary energy in the late 21st century according to the results of WING model simulations based on scenario analysis, if the cost of fusion with hydrogen generation would become competitive compared with those of other substitutive energies. However, securing social acceptance is very important to maintain the fossil research funded by the government suffering from cumulative debt.
Computers in the surgery. The patient's view.
Pringle, M; Robins, S; Brown, G
1984-01-01
A postal survey sent to 350 patients from two rural practices confirmed that an appreciable minority of patients (17%) were opposed to doctors using computers. The questionnaire distributed had been carefully designed to identify their opposition more specifically. Most of the general concern was accounted for by the 91 patients (31%) who feared that confidentiality of information would be reduced. The sensitive nature of medical information alerts patients to the possibility of diminished security of records and obliges practices considering acquiring a computer to ensure that these fears are not realised. Smaller proportions of patients were found to oppose computers on other grounds--namely, impersonality, economy, and general anxiety. PMID:6419902
Kumar, Deepak; Kalita, Prasanta
2017-01-15
While fulfilling the food demand of an increasing population remains a major global concern, more than one-third of food is lost or wasted in postharvest operations. Reducing the postharvest losses, especially in developing countries, could be a sustainable solution to increase food availability, reduce pressure on natural resources, eliminate hunger and improve farmers' livelihoods. Cereal grains are the basis of staple food in most of the developing nations, and account for the maximum postharvest losses on a calorific basis among all agricultural commodities. As much as 50%-60% cereal grains can be lost during the storage stage due only to the lack of technical inefficiency. Use of scientific storage methods can reduce these losses to as low as 1%-2%. This paper provides a comprehensive literature review of the grain postharvest losses in developing countries, the status and causes of storage losses and discusses the technological interventions to reduce these losses. The basics of hermetic storage, various technology options, and their effectiveness on several crops in different localities are discussed in detail.
Kumar, Deepak; Kalita, Prasanta
2017-01-01
While fulfilling the food demand of an increasing population remains a major global concern, more than one-third of food is lost or wasted in postharvest operations. Reducing the postharvest losses, especially in developing countries, could be a sustainable solution to increase food availability, reduce pressure on natural resources, eliminate hunger and improve farmers’ livelihoods. Cereal grains are the basis of staple food in most of the developing nations, and account for the maximum postharvest losses on a calorific basis among all agricultural commodities. As much as 50%–60% cereal grains can be lost during the storage stage due only to the lack of technical inefficiency. Use of scientific storage methods can reduce these losses to as low as 1%–2%. This paper provides a comprehensive literature review of the grain postharvest losses in developing countries, the status and causes of storage losses and discusses the technological interventions to reduce these losses. The basics of hermetic storage, various technology options, and their effectiveness on several crops in different localities are discussed in detail. PMID:28231087
King, Tatiana; Brankovic, Ljiljana; Gillard, Patricia
2012-04-01
The aim of this study was to discover the public's attitude and views towards privacy in health care. This is a part of a larger project which aims to gain an insight into what kind of privacy is needed and develop technical measures to provide such privacy. The study was a two-stage process which combined qualitative and quantitative research. Stage One of the study comprised arranging and facilitating focus groups while in Stage Two we conducted a social survey. We measured attitudes towards privacy, medical research and consent; privacy concern about sharing one's health information for research; privacy concern about the possibility that some specific information from medical records could be linked to the patient's name in a situation that was not related to medical treatment. The results of the study revealed both great support for medical research (98%), and concern about privacy of health information (66%). Participants prefer to be asked for their permission before their health information is used for any purpose other than medical treatment (92%), and they would like to know the organisation and details of the research before allowing the use of their health records (83%). Age, level of education, place of birth and employment status are most strongly associated with privacy concerns. The study showed that there are some particularly sensitive issues and there is a concern (42-60%) about any possibility of linking these kinds of data to the patient's name in a situation that is not related to medical treatment. Such issues include sexually transmitted diseases, abortions and infertility, family medical history/genetic disorders, mental illness, drug/alcohol related incidents, lists of previous operations/procedures/dates and current medications. Participants believe they should be asked for permission before their health information is used for any purpose other than medical treatment. However, consent and privacy concerns are not necessary related. Assuring individuals that their personal health information is de-identified reduces their concern about the necessity of consent for releasing health information for research purposes, but many people are not aware that removing their names and other direct identifiers from medical records does not guarantee full privacy protection for their health information. Privacy concerns decrease as extra security measures are introduced to protect privacy. Therefore, instead of "tailoring concern" as proposed by Willison we suggest improving privacy protection of personal information by introducing additional security measures in data publishing. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
Feature-based alert correlation in security systems using self organizing maps
NASA Astrophysics Data System (ADS)
Kumar, Munesh; Siddique, Shoaib; Noor, Humera
2009-04-01
The security of the networks has been an important concern for any organization. This is especially important for the defense sector as to get unauthorized access to the sensitive information of an organization has been the prime desire for cyber criminals. Many network security techniques like Firewall, VPN Concentrator etc. are deployed at the perimeter of network to deal with attack(s) that occur(s) from exterior of network. But any vulnerability that causes to penetrate the network's perimeter of defense, can exploit the entire network. To deal with such vulnerabilities a system has been evolved with the purpose of generating an alert for any malicious activity triggered against the network and its resources, termed as Intrusion Detection System (IDS). The traditional IDS have still some deficiencies like generating large number of alerts, containing both true and false one etc. By automatically classifying (correlating) various alerts, the high-level analysis of the security status of network can be identified and the job of network security administrator becomes much easier. In this paper we propose to utilize Self Organizing Maps (SOM); an Artificial Neural Network for correlating large amount of logged intrusion alerts based on generic features such as Source/Destination IP Addresses, Port No, Signature ID etc. The different ways in which alerts can be correlated by Artificial Intelligence techniques are also discussed. . We've shown that the strategy described in the paper improves the efficiency of IDS by better correlating the alerts, leading to reduced false positives and increased competence of network administrator.
Audit of the management and cost of the Department of Energy`s protective forces
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
1994-07-01
The Department of Energy`s safeguards and security program is designed to provide appropriate, efficient, and effective protection of the Department`s nuclear weapons, nuclear materials, facilities, and classified information. These items must be protected against theft, sabotage, espionage, and terrorist activity, with continuing emphasis on protection against the insider threat. The purpose of the audit was to determine if protective forces were efficiently managed and appropriately sized in light of the changing missions and current budget constraints. The authors found that the cost of physical security at some sites had grown beyond those costs incurred when the site was in fullmore » production. This increase was due to a combination of factors, including concerns about the adequacy of physical security, reactions to the increase in terrorism in the early 1980s with the possibility of hostile attacks, and the selection of security system upgrades without adequate consideration of cost effectiveness. Ongoing projects to upgrade security systems were not promptly reassessed when missions changed and levels of protection were not determined in a way which considered the attractiveness of the material being protected. The authors also noted several opportunities for the Department to improve the operational efficiency of its protective force operations, including, eluminating overtime paid to officers prior to completion of the basic 40-hour workweek, paying hourly wages of unarmed guards which are commensurate with their duties, consolidating protective force units, transferring law enforcement duties to local law agencies, eliminating or reducing paid time to exercise, and standardizing supplies and equipment used by protective force members.« less
77 FR 50204 - Star Entertainment Group, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Star Entertainment Group, Inc., Order of... lack of current and accurate information concerning the securities of Star Entertainment Group, Inc. (``Star Entertainment'') because of questions regarding the accuracy of the company's financial statements...
77 FR 59690 - Titan Resources International, Corp.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-28
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Titan Resources International, Corp.; Order of... a lack of current and accurate information concerning the securities of Titan Resources International, Corp. (``Titan''). Titan is a Wyoming corporation purportedly based in Ontario, Canada. Questions...
77 FR 65602 - Chimera Energy Corporation; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-29
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Chimera Energy Corporation; Order of... lack of current and accurate information concerning the securities of Chimera Energy Corporation (``Chimera'') because of questions regarding the accuracy of statements by Chimera in press releases to...
Application Security Automation
ERIC Educational Resources Information Center
Malaika, Majid A.
2011-01-01
With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…
Spatially Explicit Life Cycle Assessment of Biofuel Feedstock Production
Biofuels derived from renewable resources have gained increased research and development priority due to increasing energy demand and national security concerns. In the US, the Energy Independence and Security Act (EISA) of 2007 mandated the annual production of 56.8 billion L of...
32 CFR 154.10 - Limitations and restrictions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... necessary for a proper personnel security determination. Questions concerning personal and domestic affairs... question is relevant to the criteria of § 154.7. Similarly, the probing of a person's thoughts or beliefs and questions about conduct that have no personnel security implications are unwarranted. When...
32 CFR 154.10 - Limitations and restrictions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... necessary for a proper personnel security determination. Questions concerning personal and domestic affairs... question is relevant to the criteria of § 154.7. Similarly, the probing of a person's thoughts or beliefs and questions about conduct that have no personnel security implications are unwarranted. When...
Douglas, Vasiliki; Chan, Hing Man; Wesche, Sonia; Dickson, Cindy; Kassi, Norma; Netro, Lorraine; Williams, Megan
2014-01-01
Because of a lack of transportation infrastructure, Old Crow has the highest food costs and greatest reliance on traditional food species for sustenance of any community in Canada's Yukon Territory. Environmental, cultural, and economic change are driving increased perception of food insecurity in Old Crow. To address community concerns regarding food security and supply in Old Crow and develop adaptation strategies to ameliorate their impact on the community. A community adaptation workshop was held on October 13, 2009, in which representatives of different stakeholders in the community discussed a variety of food security issues facing Old Crow and how they could be dealt with. Workshop data were analyzed using keyword, subject, and narrative analysis techniques to determine community priorities in food security and adaptation. Community concern is high and favored adaptation options include agriculture, improved food storage, and conservation through increased traditional education. These results were presented to the community for review and revision, after which the Vuntut Gwitchin Government will integrate them into its ongoing adaptation planning measures.
Army Global Basing Posture: An Analytic Framework for Maximizing Responsiveness and Effectiveness
2015-01-01
potential changes in the national security environment and to evaluate U.S. Army stationing, prepositioning, security cooperation activities, and...report should be of interest to those concerned with U.S. global posture and national security strategy, especially as it pertains to U.S. land power...40 A.1. United Nations Support Index for Plenary Votes, by State ................................................ 64 A.2. United Nations
77 FR 29399 - Order of Suspension of Trading; In the Matter of 1-800-ATTORNEY, Inc., et al.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-17
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading; In the Matter of 1-800-ATTORNEY, Inc., et al. May 14, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of 1-800-ATTORNEY, Inc. because questions have arisen as to its...
Arab Threat Perceptions and the Future of the U.S. Military Presence in the Middle East
2015-10-01
knowledge, and provides solutions to strategic Army issues affecting the national security community . The Peacekeeping and Stability Operations...analysts concern topics having strategic implications for the Army, the Department of Defense, and the larger national security community . In addition...update the national security community on the research of our analysts, recent and forthcoming publications, and upcoming confer- ences sponsored by
ERIC Educational Resources Information Center
Miller, Steven E.; Seiberling, Chris
2004-01-01
This article represents the second part of a series in this journal called "How to Perform a Security Audit." It continues the conversation on setting up a process for identifying security-related concerns and implementation safeguards. It continues the conversation from the perspective of system monitoring. This article discusses how to use a…
Challenge and Response: Anticipating US Military Security Concerns
1994-08-01
in the U.S. And the Russian Orthodox Church may emerge as another such political force as was evidenced by its mediative role in the turbulent days...objectives (ends) and public opinion. Recall the turmoil in the United States during the Vietnam War and how 471 internal politics affected the...ABSTRACT 15. SUBJECT TERMS Military planning - United States; National Security - United States; World politics - 1989 - 16. SECURITY CLASSIFICATION OF
2016-12-01
as a Fulbright Scholar at Durham University’s Institute of Advanced Study . Dr. Manjikian’s publications in- clude Apocalypse and Post -Politics: The...concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S
Healthcare teams over the Internet: programming a certificate-based approach.
Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I
2003-07-01
Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modern healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has, therefore, become a major concern. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security model is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control (HAC) security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.
Healthcare teams over the Internet: towards a certificate-based approach.
Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I
2002-01-01
Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modem healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has therefore become a major concern for healthcare applications over the Internet. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security policy is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.
NASA Technical Reports Server (NTRS)
Barnett, Traci M.
2004-01-01
Safety and security is very important at NASA. The Security Management and Safeguards Office goal is ensure safety and security for all NASA Lewis and Plum Brook Station visitors and workers. The office protects against theft, sabotage, malicious damage, espionage, and other threats or acts of violence. There are three types of security at NASA: physical, IT, and personnel. IT is concerned with sensitive and classified information and computers. Physical security includes the officers who check visitors and workers in and patrol the facility. Personnel security is concerned with background checks during hiring. During my internship, I met people from and gained knowledge about all three types of security. I primarily worked with Dr. Richard Soppet in physical security. During my experience with physical security, I observed and worked with many aspects of it. I attended various security meetings at both NASA Lewis and Plum Brook. The meetings were about homeland security and other improvements that will be made to both facilities. I also spent time with a locksmith. The locksmith makes copies of keys and unlocks doors for people who need them. I rode around in a security vehicle with an officer as he patrolled. I also observed the officer make a search of a visitor s vehicle. All visitors vehicles are searched upon entering NASA. I spent time and observed in the dispatch office. The officer answers calls and sends out officers when needed. The officer also monitors the security cameras. My primary task was completing an emergency response manual. This manual would assist local law enforcement and fire agencies in case of an emergency. The manual has pictures and descriptions of the buildings. It also contains the information about hazards inside of the buildings. This information will be very helpul to law enforcement so that when called upon during an emergency, they will not create an even bigger problem with collateral damage.
44 CFR 331.3 - Scope and applicability.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF HOMELAND SECURITY PREPAREDNESS PRESERVATION OF THE MOBILIZATION BASE THROUGH THE PLACEMENT OF... of Small Business Administration, assist concerns which have agreed to perform contracts in labor surplus areas in obtaining Government procurement business by providing such concerns with timely...
Defining Information Security.
Lundgren, Björn; Möller, Niklas
2017-11-15
This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.
12 CFR 202.3 - Limited exceptions for certain classes of transactions.
Code of Federal Regulations, 2012 CFR
2012-01-01
... securities credit: (i) Section 202.5(b) concerning information about the sex of an applicant; (ii) Section... concerning open-end accounts, to the extent the action taken is on the basis of a change of name or marital...(b) concerning information about the sex of an applicant, but only to the extent necessary for...
12 CFR 202.3 - Limited exceptions for certain classes of transactions.
Code of Federal Regulations, 2013 CFR
2013-01-01
... securities credit: (i) Section 202.5(b) concerning information about the sex of an applicant; (ii) Section... concerning open-end accounts, to the extent the action taken is on the basis of a change of name or marital...(b) concerning information about the sex of an applicant, but only to the extent necessary for...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-27
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Announcement of Test Concerning... announces U.S. Customs and Border Protection's (CBP's) plan to conduct a test concerning the manifesting and... test announced in this document begins. In HQ Ruling H026715, CBP held that in order to ensure the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 3 2011-01-01 2011-01-01 false Statement of policy concerning bank holding companies engaging in futures, forward and options contracts on U.S. Government and agency securities and... concerning bank holding companies engaging in futures, forward and options contracts on U.S. Government and...
75 FR 21261 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-23
... replace with ``Full name, Social Security Number (SSN); individual case reports concerning the exercise of..., requests for local authorities to refrain from exercising their jurisdiction, communications with lawyers... provide full name, Social Security Number (SSN) or other information verifiable from the record itself. In...
8 CFR 212.1 - Documentary requirements for nonimmigrants.
Code of Federal Regulations, 2010 CFR
2010-01-01
... special humanitarian concern; and (iv) Poses no threat to the welfare, safety or security of the United States, its territories, or commonwealths. Any potential threats to the welfare, safety, or security of...) of this section: Australia, Brunei, Indonesia, Japan, Malaysia, Nauru, New Zealand, Papua New Guinea...
32 CFR 321.14 - DSS implementation policies.
Code of Federal Regulations, 2014 CFR
2014-07-01
...) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.14 DSS implementation policies. (a) General... matters of particular concern to the Defense Security Service. (b) Privacy Act rules application. Any... 32 National Defense 2 2014-07-01 2014-07-01 false DSS implementation policies. 321.14 Section 321...
32 CFR 321.14 - DSS implementation policies.
Code of Federal Regulations, 2013 CFR
2013-07-01
...) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.14 DSS implementation policies. (a) General... matters of particular concern to the Defense Security Service. (b) Privacy Act rules application. Any... 32 National Defense 2 2013-07-01 2013-07-01 false DSS implementation policies. 321.14 Section 321...
32 CFR 321.14 - DSS implementation policies.
Code of Federal Regulations, 2012 CFR
2012-07-01
...) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.14 DSS implementation policies. (a) General... matters of particular concern to the Defense Security Service. (b) Privacy Act rules application. Any... 32 National Defense 2 2012-07-01 2012-07-01 false DSS implementation policies. 321.14 Section 321...
78 FR 14807 - Notice of Proposed Information Collection
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-07
... DEPARTMENT OF HOMELAND SECURITY United States Secret Service Notice of Proposed Information... request as required by the Paperwork Reduction Act of 1995. Currently, the U.S. Secret Service, within the U.S. Department of Homeland Security, is soliciting comments concerning the SSF 3237, U.S. Secret...
20 CFR 401.5 - Purpose of the regulations.
Code of Federal Regulations, 2010 CFR
2010-04-01
... the Privacy Act of 1974, 5 U.S.C. 552a and section 1106 of the Social Security Act concerning....5 Employees' Benefits SOCIAL SECURITY ADMINISTRATION PRIVACY AND DISCLOSURE OF OFFICIAL RECORDS AND... with other applicable statutes. (b) Privacy. This part implements the Privacy Act by establishing...
77 FR 73509 - Emerging World Pharma, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-10
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Emerging World Pharma, Inc.; Order of... lack of current and accurate information concerning the securities of Emerging World Pharma, Inc. (``Emerging World''). Emerging World is a Florida corporation purportedly based in Manassas, Virginia and...
75 FR 34183 - Micro Laboratories, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Micro Laboratories, Inc.; Order of Suspension... of current and accurate information concerning the securities of Micro Laboratories, Inc. (``Micro Laboratories'') because it has not filed any periodic reports since the period ended June 30, 2005. Micro...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-30
... Interpretive Notice Concerning the Application of Rule G-17 to Municipal Advisors September 26, 2011. On August... notice concerning the application of MSRB Rule G-17 to municipal advisors. Notice of the proposed rule...
Protecting genomic data analytics in the cloud: state of the art and opportunities.
Tang, Haixu; Jiang, Xiaoqian; Wang, Xiaofeng; Wang, Shuang; Sofia, Heidi; Fox, Dov; Lauter, Kristin; Malin, Bradley; Telenti, Amalio; Xiong, Li; Ohno-Machado, Lucila
2016-10-13
The outsourcing of genomic data into public cloud computing settings raises concerns over privacy and security. Significant advancements in secure computation methods have emerged over the past several years, but such techniques need to be rigorously evaluated for their ability to support the analysis of human genomic data in an efficient and cost-effective manner. With respect to public cloud environments, there are concerns about the inadvertent exposure of human genomic data to unauthorized users. In analyses involving multiple institutions, there is additional concern about data being used beyond agreed research scope and being prcoessed in untrused computational environments, which may not satisfy institutional policies. To systematically investigate these issues, the NIH-funded National Center for Biomedical Computing iDASH (integrating Data for Analysis, 'anonymization' and SHaring) hosted the second Critical Assessment of Data Privacy and Protection competition to assess the capacity of cryptographic technologies for protecting computation over human genomes in the cloud and promoting cross-institutional collaboration. Data scientists were challenged to design and engineer practical algorithms for secure outsourcing of genome computation tasks in working software, whereby analyses are performed only on encrypted data. They were also challenged to develop approaches to enable secure collaboration on data from genomic studies generated by multiple organizations (e.g., medical centers) to jointly compute aggregate statistics without sharing individual-level records. The results of the competition indicated that secure computation techniques can enable comparative analysis of human genomes, but greater efficiency (in terms of compute time and memory utilization) are needed before they are sufficiently practical for real world environments.
A 3S Risk ?3SR? Assessment Approach for Nuclear Power: Safety Security and Safeguards.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Forrest, Robert; Reinhardt, Jason Christian; Wheeler, Timothy A.
Safety-focused risk analysis and assessment approaches struggle to adequately include malicious, deliberate acts against the nuclear power industry's fissile and waste material, infrastructure, and facilities. Further, existing methods do not adequately address non- proliferation issues. Treating safety, security, and safeguards concerns independently is inefficient because, at best, it may not take explicit advantage of measures that provide benefits against multiple risk domains, and, at worst, it may lead to implementations that increase overall risk due to incompatibilities. What is needed is an integrated safety, security and safeguards risk (or "3SR") framework for describing and assessing nuclear power risks that canmore » enable direct trade-offs and interactions in order to inform risk management processes -- a potential paradigm shift in risk analysis and management. These proceedings of the Sandia ePRA Workshop (held August 22-23, 2017) are an attempt to begin the discussions and deliberations to extend and augment safety focused risk assessment approaches to include security concerns and begin moving towards a 3S Risk approach. Safeguards concerns were not included in this initial workshop and are left to future efforts. This workshop focused on four themes in order to begin building out a the safety and security portions of the 3S Risk toolkit: 1. Historical Approaches and Tools 2. Current Challenges 3. Modern Approaches 4. Paths Forward and Next Steps This report is organized along the four areas described above, and concludes with a summary of key points. 2 Contact: rforres@sandia.gov; +1 (925) 294-2728« less
Schnierle, Jeanette; Florian, Hannah; Agarwal, Aradhna; Rundell, Kristen; McAlearney, Ann Scheck
2017-01-01
Background Patient portals have shown promise in engaging individuals in self-management of chronic conditions by allowing patients to input and track health information and exchange secure electronic messages with their providers. Past studies have identified patient barriers to portal use including usability issues, low health literacy, and concerns about loss of personal contact as well as provider concerns such as increased time spent responding to messages. However, to date, studies of both patient and provider perspectives on portal use have focused on the pre-implementation or initial implementation phases and do not consider how these issues may change as patients and providers gain greater experience with portals. Objective Our study examined the following research question: Within primary care offices with high rates of patient-portal use, what do experienced physician and patient users of the ambulatory portal perceive as the benefits and challenges of portal use in general and secure messaging in particular? Methods This qualitative study involved 42 interviews with experienced physician and patient users of an ambulatory patient portal, Epic’s MyChart. Participants were recruited from the Department of Family Medicine at a large Academic Medical Center (AMC) and included providers and their patients, who had been diagnosed with at least one chronic condition. A total of 29 patients and 13 primary care physicians participated in the interviews. All interviews were conducted by telephone and followed a semistructured interview guide. Interviews were transcribed verbatim to permit rigorous qualitative analysis. Both inductive and deductive methods were used to code and analyze the data iteratively, paying particular attention to themes involving secure messaging. Results Experienced portal users discussed several emergent themes related to a need for greater clarity on when and how to use the secure messaging feature. Patient concerns included worry about imposing on their physician’s time, the lack of provider compensation for responding to secure messages, and uncertainty about when to use secure messaging to communicate with their providers. Similarly, providers articulated a lack of clarity as to the appropriate way to communicate via MyChart and suggested that additional training for both patients and providers might be important. Patient training could include orienting patients to the “rules of engagement” at portal sign-up, either in the office or through an online tutorial. Conclusions As secure messaging through patient portals is increasingly being used as a method of physician-patient communication, both patients and providers are looking for guidance on how to appropriately engage with each other using this tool. Patients worry about whether their use is appropriate, and providers are concerned about the content of messages, which allow them to effectively manage patient questions. Our findings suggest that additional training may help address the concerns of both patients and providers, by providing “rules of engagement” for communication via patient portals. PMID:28676467
Development and characterization of reduced graphene oxide films for transient electronics
NASA Astrophysics Data System (ADS)
Sheikh, Rasel; Bhatkar, Omkar; Smith, David; Rizvi, Reza
2018-03-01
Emerging interests in hardware security as well as environmental concerns have given rise to the field of transient or temporary electronics, which can be decommissioned by an external stimulus with minimal impact to the surrounding environment. In this study, an all graphene based film is produced by a one-step deposition process. The conversion of graphene oxide (GO) to reduced graphene oxide (rGO) depends on an interfacial reduction reaction. Control of processing conditions such as the underlying substrate, pH of GO and the film drying environment results in an ability to tailor the internal architecture of the films and their electronic properties. Furthermore, the ability to create masks for selective reduction of GO during deposition was also demonstrated, which was used to create intricate yet well-defined patterns and connections required in electronic circuits and devices. All graphene based freestanding films with selectively reduced GO were used in transient electronics application as circuitry and RFID tag patterns.
Epstein, Gerald L
2009-12-01
Over his entire career, Gerald Epstein has toiled at the nexus of science, technology, and security. From 2003 to 2009, he was Senior Fellow for Science and Security at the Center for Strategic and International Studies Homeland Security Program, where he worked on reducing biological weapons threats, improving national preparedness, and easing potential tensions between the scientific research and national security communities. Epstein came to CSIS from the Institute for Defense Analyses. From 1996 to 2001, he served in the White House Office of Science and Technology Policy. And from 1983 to 1989, and again from 1991 until its demise in 1995, Epstein worked at the Congressional Office of Technology Assessment, where he directed a study on the proliferation of weapons of mass destruction, alongside research on other global security topics. A recognized expert in biological risk reduction, Epstein was actually trained as a physicist, having received SB degrees in physics and electrical engineering from MIT, and a PhD in physics from the University of California at Berkeley. How, then, did he come to study the evolving threat from bioterrorism? "What compelled me about bioterrorism was that it was a stellar example of a topic that would lead to a train wreck between the scientific community and the security community unless they figured out how to work together," he said. "The distance between a laboratory and a very large consequence event is a lot shorter in biology than in any other field. I got into bioterrorism to help make sure that the security community doesn't get so scared of the science that it shuts it down, and that the science community isn't so oblivious of security concerns that it pays no attention to them." Epstein spoke on November 6, 2009, with contributing writer Madeline Drexler, author of Emerging Epidemics: The Menace of New Infections (Penguin, 2009), an updated version of an earlier volume. Drexler holds a visiting appointment at the Harvard School of Public Health and is a senior fellow at Brandeis University's Schuster Institute for Investigative Journalism.
76 FR 12144 - Advanced Optics Electronics, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-04
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Advanced Optics Electronics, Inc.; Order of... lack of current and accurate information concerning the securities of Advanced Optics Electronics, Inc... in Advanced Optics Electronics, Inc. Therefore, it is ordered, pursuant to Section 12(k) of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-23
... Electronics, Inc.; Order of Suspension of Trading June 21, 2011. It appears to the Securities and Exchange... information concerning the securities of SJ Electronics, Inc. because it has not filed any periodic reports...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-04
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Acies Corporation, Immtech Pharmaceuticals, Inc., MRU Holdings, Inc., MSTI Holdings, Inc., Nestor, Inc., New Generation Holdings, Inc., and Nuevo... that there is a lack of current and accurate information concerning the securities of New Generation...
77 FR 22221 - Security Zones; North Atlantic Treaty Organization (NATO) Summit, Chicago, IL
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-13
... affect your small business, organization, or governmental jurisdiction and you have questions concerning...-AA87 Security Zones; North Atlantic Treaty Organization (NATO) Summit, Chicago, IL AGENCY: Coast Guard... with a large scale, international political event. DATES: This rule is effective between 8 a.m. on May...
29 CFR 2580.412-2 - Plans exempt from the coverage of section 13.
Code of Federal Regulations, 2010 CFR
2010-07-01
... whole or in part, of dealing with employers concerning an employee welfare or pension benefit plan, or... Section 2580.412-2 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR TEMPORARY BONDING RULES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF...
17 CFR 17.02 - Form, manner and time of filing reports.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Form, manner and time of filing reports. 17.02 Section 17.02 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... markets located in that time zone, and central time for information concerning all other markets. (b...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-30
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of Proposed Rule Change Regarding Professional Qualifications and Information Concerning Associated Persons September 26, 2011... Organization's Statement of the Terms of Substance of the Proposed Rule Change The MSRB is filing with the SEC...
Sen. Snowe, Olympia J. [R-ME
2009-05-19
Senate - 05/19/2009 Read twice and referred to the Committee on Small Business and Entrepreneurship. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Cryptographic Research and NSA: Report of the Public Cryptography Study Group.
ERIC Educational Resources Information Center
Davida, George I.
1981-01-01
The Public Cryptography Study Group accepted the claim made by the National Security Agency that some information in some publications concerning cryptology could be inimical to national security, and is allowing the establishment of a voluntary mechanism, on an experimental basis, for NSA to review cryptology manuscripts. (MLW)
Report of the Public Cryptography Study Group.
ERIC Educational Resources Information Center
American Council on Education, Washington, DC.
Concerns of the National Security Agency (NSA) that information contained in some articles about cryptography in learned and professional journals and in monographs might be inimical to the national security are addressed. The Public Cryptography Study Group, with one dissenting opinion, recommends that a voluntary system of prior review of…
Information Security and Privacy in Network Environments.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Office of Technology Assessment.
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This…
78 FR 74216 - Guar Global Ltd.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-10
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Guar Global Ltd.; Order of Suspension of... and the protection of investors require a suspension of trading in the securities of Guar Global Ltd. (``Guar Global'') because of concerns regarding the accuracy and adequacy of information in the...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-07
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] AB Liquidating Corp. (f/k/a Adaptive Broadband Corp.), Globalnet Corp., Greenland Corp., KeraVision, Inc., Lifespan, Inc., STAR Telecommunications... concerning the securities of STAR Telecommunications, Inc. because it has not filed any periodic reports...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-17
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Data Fortress Systems Group Ltd., Digital Youth Network Corp., Fantom Technologies, Inc., and KIK Technology International, Inc., Order of... of current and accurate information concerning the securities of Data Fortress Systems Group Ltd...
78 FR 72139 - Nevada Gold Corp.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-02
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1 ] Nevada Gold Corp.; Order of Suspension of... current and accurate information concerning the securities of Nevada Gold Corp. (``Nevada Gold'') because of questions regarding the accuracy of assertions by Nevada Gold, and by others, to investors in...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Patch International, Inc., QuadTech International, Inc., Strategic Resources, Ltd., and Virtual Medical Centre, Inc.; Order of Suspension of Trading... lack of current and accurate information concerning the securities of Virtual Medical Centre, Inc...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-07
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading; Airtrax, Inc., Amedia Networks, Inc., American Business Financial Services, Inc., Appalachian Bancshares, Inc., and... information concerning the securities of American Business Financial Services, Inc. because it has not filed...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-09
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Community Alliance, Inc., Defi Global, Inc., Easy Energy, Inc., Industry Concept Holdings, Inc., and Transworld Benefits International, Inc.; Order... that there is a lack of current and accurate information concerning the securities of Industry Concept...
78 FR 69516 - In The Matter of: Sovereign Lithium, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-19
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In The Matter of: Sovereign Lithium, Inc... securities of Sovereign Lithium, Inc. (``Sovereign Lithium'') because of concerns regarding the accuracy and adequacy of information in the marketplace and potentially manipulative transactions in Sovereign Lithium's...
12 CFR 742.4 - RegFlex Relief.
Code of Federal Regulations, 2010 CFR
2010-01-01
... discretionary control can be delegated; (6) “Stress testing” of investments. Section 703.12(c) of this chapter concerning “stress testing” of securities holdings to assess the impact of an extreme interest rate shift; (7... nationally-recognized statistical rating organization; (ii) The security meets the definition of mortgage...
Consumers and Food Security: Uncertain or Empowered?
ERIC Educational Resources Information Center
Kneafsey, Moya; Dowler, Elizabeth; Lambie-Mumford, Hannah; Inman, Alex; Collier, Rosemary
2013-01-01
Provoked by concerns about climate change, resource depletion and economic recession, the concept of food security has experienced a renaissance in international policy and research agendas. Despite this interest, the problem of food insecurity in wealthy countries has still not received enough attention. We argue that it is worthy of research and…
76 FR 17726 - In the Matter of Euro Solar Parks, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-30
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Euro Solar Parks, Inc.; Order... there is a lack of current and accurate information concerning the securities of Euro Solar Parks, Inc. (``Euro Solar'') because of [[Page 17727
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-15
... DEPARTMENT OF HOMELAND SECURITY 48 CFR Parts 3009 and 3052 [Docket No. DHS-2010-0017] RIN 1601... corrects internal citations within the Homeland Security Acquisition Regulation to reflect previous redesignation of sections related to contracting with corporate expatriates and the recodification of certain...
77 FR 22622 - AP Henderson Group, BPO Management Services, Inc., Capital Mineral Investors, Inc...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] AP Henderson Group, BPO Management Services, Inc., Capital Mineral Investors, Inc., CardioVascular BioTherapeutics, Inc., and 1st Centennial... that there is a lack of current and accurate information concerning the securities of 1st Centennial...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-14
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] RMD Technologies, Inc., Rockwall Holdings, Inc., Southmark Corp., Stargold Mines, Inc., Stelax Industries, Ltd., Stem Cell Innovations, Inc., and Surfect... there is a lack of current and accurate information concerning the securities of Stem Cell Innovations...
USDA-ARS?s Scientific Manuscript database
In recent years, concerns about global, sustainable, and nutritional security have gained substantial momentum propelled by rapid increases in global population and food insecurity. Historically, plant breeding has played a key role in improving crop yield to keep pace with the rising global populat...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-25
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Fearless International, Inc., Glassmaster Company, Global Entertainment Holdings/Equities, Inc., Global Realty Development Corp., Global... concerning the securities of Global Entertainment Holdings/Equities, Inc. because it has not filed any...
Campus Security Authorities, a New Look
ERIC Educational Resources Information Center
McCauley, Terry
2012-01-01
Recent high-profile events created the need for institutions in the United States to heighten concerns about how those responsible for compliance with the Clery Act handle Campus Security Authority (CSA) issues. Not expressly but realistically those responsible for integrating this complicated set of laws within institutions have likely just been…
78 FR 8682 - Americas Energy Company-AECo; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Americas Energy Company--AECo; Order of... lack of current and accurate information concerning the securities of Americas Energy Company-AECo (``Americas'') because Americas has not filed any periodic reports since the period ended September 30, 2011...
ERIC Educational Resources Information Center
Giesen, J. Martin; Cavenaugh, Brenda S.
2013-01-01
Introduction: Given mutual concerns of vocational rehabilitation and the Social Security Administration, our purpose was to evaluate the effect of current individual and economic factors on competitive employment for Social Security Disability Insurance (SSDI) beneficiaries with visual impairments in vocational rehabilitation. Methods: Using…
India’s Evolving Nuclear Force and Its Implications for U.S. Strategy in the Asia-Pacific
2016-06-01
concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic
Cybersecurity and medical devices: A practical guide for cardiac electrophysiologists
Kramer, Daniel B.; Foo Kune, Denis; Auto de Medeiros, Julio; Yan, Chen; Xu, Wenyuan; Crawford, Thomas; Fu, Kevin
2017-01-01
Abstract Medical devices increasingly depend on software. While this expands the ability of devices to perform key therapeutic and diagnostic functions, reliance on software inevitably causes exposure to hazards of security vulnerabilities. This article uses a recent high‐profile case example to outline a proactive approach to security awareness that incorporates a scientific, risk‐based analysis of security concerns that supports ongoing discussions with patients about their medical devices. PMID:28512774
Food Security-A Commentary: What Is It and Why Is It So Complicated?
Gibson, Mark
2012-12-03
Every year over 10 million people die of hunger and hunger related diseases. Nearly six million of these are children under the age of five; that is one child's death approximately every six seconds. Understanding how this still occurs amid the ever increasing social enlightenment of the 21st century-and under the auspices of a vigilant global developmental community-is one of the key challenges of our time. The science of food security aims to address such concerns. By understanding the multiplicity of the phenomenon, practitioners of global multilateral hegemony seek to shape appropriate policy to address these issues. The difficulty however is that the phenomenon is increasingly wrapped up inside an ever growing bundle of societal aspirations including inter-alia under-nutrition, poverty, sustainability, free trade, national self sufficiency, reducing female subjugation and so on. Any solutions therefore, involve fully understanding just what is indeed included, implied, understood or excluded within the food security catchall. Indeed, until such time as consensus can be found that adequately binds the phenomenon within a fixed delineated concept, current efforts to address the multitude of often divergent threads only serves to dilute efforts and confound attempts to once-and-for-all bring these unacceptable figures under control.
Extended outlook: description, utilization, and daily applications of cloud technology in radiology.
Gerard, Perry; Kapadia, Neil; Chang, Patricia T; Acharya, Jay; Seiler, Michael; Lefkovitz, Zvi
2013-12-01
The purpose of this article is to discuss the concept of cloud technology, its role in medical applications and radiology, the role of the radiologist in using and accessing these vast resources of information, and privacy concerns and HIPAA compliance strategies. Cloud computing is the delivery of shared resources, software, and information to computers and other devices as a metered service. This technology has a promising role in the sharing of patient medical information and appears to be particularly suited for application in radiology, given the field's inherent need for storage and access to large amounts of data. The radiology cloud has significant strengths, such as providing centralized storage and access, reducing unnecessary repeat radiologic studies, and potentially allowing radiologic second opinions more easily. There are significant cost advantages to cloud computing because of a decreased need for infrastructure and equipment by the institution. Private clouds may be used to ensure secure storage of data and compliance with HIPAA. In choosing a cloud service, there are important aspects, such as disaster recovery plans, uptime, and security audits, that must be considered. Given that the field of radiology has become almost exclusively digital in recent years, the future of secure storage and easy access to imaging studies lies within cloud computing technology.
The Privacy and Security Implications of Open Data in Healthcare.
Kobayashi, Shinji; Kane, Thomas B; Paton, Chris
2018-04-22
The International Medical Informatics Association (IMIA) Open Source Working Group (OSWG) initiated a group discussion to discuss current privacy and security issues in the open data movement in the healthcare domain from the perspective of the OSWG membership. Working group members independently reviewed the recent academic and grey literature and sampled a number of current large-scale open data projects to inform the working group discussion. This paper presents an overview of open data repositories and a series of short case reports to highlight relevant issues present in the recent literature concerning the adoption of open approaches to sharing healthcare datasets. Important themes that emerged included data standardisation, the inter-connected nature of the open source and open data movements, and how publishing open data can impact on the ethics, security, and privacy of informatics projects. The open data and open source movements in healthcare share many common philosophies and approaches including developing international collaborations across multiple organisations and domains of expertise. Both movements aim to reduce the costs of advancing scientific research and improving healthcare provision for people around the world by adopting open intellectual property licence agreements and codes of practice. Implications of the increased adoption of open data in healthcare include the need to balance the security and privacy challenges of opening data sources with the potential benefits of open data for improving research and healthcare delivery. Georg Thieme Verlag KG Stuttgart.
NASA Astrophysics Data System (ADS)
Chen, Chung-Hao; Yao, Yi; Chang, Hong; Koschan, Andreas; Abidi, Mongi
2013-06-01
Due to increasing security concerns, a complete security system should consist of two major components, a computer-based face-recognition system and a real-time automated video surveillance system. A computerbased face-recognition system can be used in gate access control for identity authentication. In recent studies, multispectral imaging and fusion of multispectral narrow-band images in the visible spectrum have been employed and proven to enhance the recognition performance over conventional broad-band images, especially when the illumination changes. Thus, we present an automated method that specifies the optimal spectral ranges under the given illumination. Experimental results verify the consistent performance of our algorithm via the observation that an identical set of spectral band images is selected under all tested conditions. Our discovery can be practically used for a new customized sensor design associated with given illuminations for an improved face recognition performance over conventional broad-band images. In addition, once a person is authorized to enter a restricted area, we still need to continuously monitor his/her activities for the sake of security. Because pantilt-zoom (PTZ) cameras are capable of covering a panoramic area and maintaining high resolution imagery for real-time behavior understanding, researches in automated surveillance systems with multiple PTZ cameras have become increasingly important. Most existing algorithms require the prior knowledge of intrinsic parameters of the PTZ camera to infer the relative positioning and orientation among multiple PTZ cameras. To overcome this limitation, we propose a novel mapping algorithm that derives the relative positioning and orientation between two PTZ cameras based on a unified polynomial model. This reduces the dependence on the knowledge of intrinsic parameters of PTZ camera and relative positions. Experimental results demonstrate that our proposed algorithm presents substantially reduced computational complexity and improved flexibility at the cost of slightly decreased pixel accuracy as compared to Chen and Wang's method [18].
Code of Federal Regulations, 2010 CFR
2010-07-01
... matters concerning the Air Force. The Secretary of Homeland Security, addressing matters concerning the... 32 National Defense 2 2010-07-01 2010-07-01 false Definitions. 281.3 Section 281.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS...
Code of Federal Regulations, 2014 CFR
2014-07-01
... matters concerning the Air Force. The Secretary of Homeland Security, addressing matters concerning the... 32 National Defense 2 2014-07-01 2014-07-01 false Definitions. 281.3 Section 281.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS...
Distance Learning: What's Holding Back This Boundless Delivery System?
ERIC Educational Resources Information Center
Bruder, Isabelle
1989-01-01
Discusses distance learning, identifies who distance learners may be, and examines issues involved in establishing distance learning systems. Topics discussed include teacher concerns, including job security and certification; curriculum concerns, including state and local requirements and cross-cultural issues; cooperative development,…
Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L
2018-03-01
While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.
ADVANCED CERAMIC MATERIALS FOR NEXT-GENERATION NUCLEAR APPLICATIONS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marra, J.
2010-09-29
Rising global energy demands coupled with increased environmental concerns point to one solution; they must reduce their dependence on fossil fuels that emit greenhouse gases. As the global community faces the challenge of maintaining sovereign nation security, reducing greenhouse gases, and addressing climate change nuclear power will play a significant and likely growing role. In the US, nuclear energy already provides approximately one-fifth of the electricity used to power factories, offices, homes, and schools with 104 operating nuclear power plants, located at 65 sites in 31 states. Additionally, 19 utilities have applied to the US Nuclear Regulatory Commission (NRC) formore » construction and operating licenses for 26 new reactors at 17 sites. This planned growth of nuclear power is occurring worldwide and has been termed the 'nuclear renaissance.' As major industrial nations craft their energy future, there are several important factors that must be considered about nuclear energy: (1) it has been proven over the last 40 years to be safe, reliable and affordable (good for Economic Security); (2) its technology and fuel can be domestically produced or obtained from allied nations (good for Energy Security); and (3) it is nearly free of greenhouse gas emissions (good for Environmental Security). Already an important part of worldwide energy security via electricity generation, nuclear energy can also potentially play an important role in industrial processes and supporting the nation's transportation sector. Coal-to-liquid processes, the generation of hydrogen and supporting the growing potential for a greatly increased electric transportation system (i.e. cars and trains) mean that nuclear energy could see dramatic growth in the near future as we seek to meet our growing demand for energy in cleaner, more secure ways. In order to address some of the prominent issues associated with nuclear power generation (i.e., high capital costs, waste management, and proliferation), the worldwide community is working to develop and deploy new nuclear energy systems and advanced fuel cycles. These new nuclear systems address the key challenges and include: (1) extracting the full energy value of the nuclear fuel; (2) creating waste solutions with improved long term safety; (3) minimizing the potential for the misuse of the technology and materials for weapons; (4) continually improving the safety of nuclear energy systems; and (5) keeping the cost of energy affordable.« less
Dias-Martins, Amanda M; Pessanha, Kênia Letícia F; Pacheco, Sidney; Rodrigues, José Avelino S; Carvalho, Carlos Wanderlei Piler
2018-07-01
Climate change can cause an increase in arid soils, warmer weather, and reduce water availability, which in turn can directly affect food security. This increases food prices and reduces the availability of food. Therefore, knowledge concerning the nutritional and technological potential of non-traditional crops and their resistance to heat and drought is very interesting. Pearl millet is known to produce small nutritious cereal grains, which can endure both heat and dry conditions, and is one of the basic cereals of several African and Asian countries. Although this species has been cultivated in Brazil for at least 50 years it is only used as a cover crop and animal feed, but not for human consumption. Nonetheless, pearl millet grains have a high potential as food for humans because they are gluten-free, higher in dietary fiber content than rice, similar in lipid content to maize and higher content of essential amino acids (leucine, isoleucine and lysine) than other traditional cereals, such as wheat and rye. In addition, the crop is low cost and less susceptible to contamination by aflatoxins compared to corn, for example. Most grains, including pearl millet, can be milled, decorticated, germinated, fermented, cooked and extruded to obtain products such as flours, biscuits, snacks, pasta and non-dairy probiotic beverages. Pearl millet also has functional properties; it has a low glycemic index and therefore it can be used as an alternative food for weight control and to reduce the risk of chronic diseases, such as diabetes. Thus, this review intends to show the potential of pearl millet as an alternative food security crop, particularly in countries, like Brazil, where it is not commonly consumed. Also this review presents different processes and products that have been already reported in the literature in order to introduce the great potential of this important small grain to producers and consumers. Copyright © 2018 Elsevier Ltd. All rights reserved.
Cloud Computing for Mission Design and Operations
NASA Technical Reports Server (NTRS)
Arrieta, Juan; Attiyah, Amy; Beswick, Robert; Gerasimantos, Dimitrios
2012-01-01
The space mission design and operations community already recognizes the value of cloud computing and virtualization. However, natural and valid concerns, like security, privacy, up-time, and vendor lock-in, have prevented a more widespread and expedited adoption into official workflows. In the interest of alleviating these concerns, we propose a series of guidelines for internally deploying a resource-oriented hub of data and algorithms. These guidelines provide a roadmap for implementing an architecture inspired in the cloud computing model: associative, elastic, semantical, interconnected, and adaptive. The architecture can be summarized as exposing data and algorithms as resource-oriented Web services, coordinated via messaging, and running on virtual machines; it is simple, and based on widely adopted standards, protocols, and tools. The architecture may help reduce common sources of complexity intrinsic to data-driven, collaborative interactions and, most importantly, it may provide the means for teams and agencies to evaluate the cloud computing model in their specific context, with minimal infrastructure changes, and before committing to a specific cloud services provider.
Cooperative measures to mitigate Asia-Pacific maritime conflicts.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chai, Wen-Chung
2003-05-01
The economies of East Asia are predominantly export based and, therefore, place special emphasis on the security of the sea lines of communication (SLOCs). Due to economic globalization, the United States shares these concerns. Cooperative measures by the concerned parties could reduce the potential for disruption by maritime conflicts. Primary threats against the SLOCs are disputes over the resources under the seas, disputes over some small island groups, disputes between particular parties (China-Taiwan and North-South Korea), or illegal activities like smuggling, piracy, or terrorism. This paper provides an overview on these threats, issue by issue, to identify common elements andmore » needed cooperation. Cooperation on other topics such as search and rescue, fisheries protection, and oil spill response may help support improved relations to prevent maritime conflicts. Many technologies can help support maritime cooperation, including improved communications links, tracking and emergency beacon devices, and satellite imaging. Appropriate technical and political means are suggested for each threat to the SLOCs.« less
Entering the New Millennium: Dilemmas in Arms Control
DOE Office of Scientific and Technical Information (OSTI.GOV)
BROWN,JAMES
The end of the Cold War finds the international community no longer divided into two opposing blocks. The concerns that the community now faces are becoming more fluid, less focused, and, in many ways, much less predictable. Issues of religion, ethnicity, and nationalism; the possible proliferation of Weapons of Mass Destruction; and the diffusion of technology and information processing throughout the world community have greatly changed the international security landscape in the last decade. Although our challenges appear formidable, the United Nations, State Parties, nongovernmental organizations, and the arms control community are moving to address and lessen these concerns throughmore » both formal and informal efforts. Many of the multilateral agreements (e.g., NPT, BWC, CWC, CTBT, MTCR), as well as the bilateral efforts that are taking place between Washington and Moscow employ confidence-building and transparency measures. These measures along with on-site inspection and other verification procedures lessen suspicion and distrust and reduce uncertainty, thus enhancing stability, confidence, and cooperation.« less
Security and Efficiency Concerns With Distributed Collaborative Networking Environments
2003-09-01
have the ability to access Web communications services of the WebEx MediaTone Network from a single login. [24] WebEx provides a range of secure...Web. WebEx services enable secure data, voice and video communications through the browser and are supported by the WebEx MediaTone Network, a global...designed to host large-scale, structured events and conferences, featuring a Q&A Manager that allows multiple moderators to handle questions while
Computer network security for the radiology enterprise.
Eng, J
2001-08-01
As computer networks become an integral part of the radiology practice, it is appropriate to raise concerns regarding their security. The purpose of this article is to present an overview of computer network security risks and preventive strategies as they pertain to the radiology enterprise. A number of technologies are available that provide strong deterrence against attacks on networks and networked computer systems in the radiology enterprise. While effective, these technologies must be supplemented with vigilant user and system management.
MDA-based EHR application security services.
Blobel, Bernd; Pharow, Peter
2004-01-01
Component-oriented, distributed, virtual EHR systems have to meet enhanced security and privacy requirements. In the context of advanced architectural paradigms such as component-orientation, model-driven, and knowledge-based, standardised security services needed have to be specified and implemented in an integrated way following the same paradigm. This concerns the deployment of formal models, meta-languages, reference models such as the ISO RM-ODP, and development as well as implementation tools. International projects' results presented proceed on that streamline.
A primer for health care managers: data sanitization, equipment disposal, and electronic waste.
Andersen, Cathy M
2011-01-01
In this article, security regulations under the Health Insurance Portability and Accountability Act concerning data sanitization and the disposal of media containing stored electronic protected health information are discussed, and methods for effective sanitization and media disposal are presented. When disposing of electronic media, electronic waste-or e-waste-is produced. Electronic waste can harm human health and the environment. Responsible equipment disposal methods can minimize the impact of e-waste. Examples of how health care organizations can meet the Health Insurance Portability and Accountability Act regulations while also behaving responsibly toward the environment are provided. Examples include the environmental stewardship activities of reduce, reuse, reeducate, recover, and recycle.
Irrigation of floricultural and nursery crops with saline wastewaters
USDA-ARS?s Scientific Manuscript database
Water security has become a major concern throughout the western United States and other arid and semiarid regions worldwide. Uncertainties concerning the allocation and dependability of good quality water have led to increased interest in the use alternative, non-potable waters for irrigated agric...
A New Spin On An Old Crop for Bioenergy: Sorghum
USDA-ARS?s Scientific Manuscript database
Seeking alternative and renewable sources of energy is necessary due to oil price fluctuations, environmental concerns, and national security concerns. Additionally, Southern U.S. agriculture has been negatively affected by drought conditions over the last several years. For these reasons, sorghum m...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-25
... Activities: Cargo Manifest/ Declaration, Stow Plan, Container Status Messages and Importer Security Filing... concerning the following information collection. Title: Cargo Manifest/Declaration, Stow Plan, Container... and other Federal agencies to comment on an information collection requirement concerning the Cargo...
A Predictive Validity Study of Creative and Effective Managerial Performance.
ERIC Educational Resources Information Center
Moffie, D. J.; Goodner, Susan
This study tests the following hypotheses concerning the job creativity of managers: (1) There is a significant relationship between psychological test scores secured on subjects 15 to 20 years ago and creative performance on the job today, (2) there is a significant relationship between biographical information secured from subjects at the time…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-13
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: Brendan Technologies, Inc., CenterStaging Corp., PGMI, Inc., Thermal Energy Storage, Inc., and Trinity3 Corporation; Order of... there is a lack of current and accurate information concerning the securities of Thermal Energy Storage...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] AIMS Worldwide, Inc., Apollo Capital Group, Inc., CommunitySouth Financial Corp., Last Mile Logistics Group, Inc., Made in America Entertainment... concerning the securities of Last Mile Logistics Group, Inc. because it has not filed any periodic reports...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-27
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Tornado Gold International Corp., Twin Faces East Entertainment Corp., Universal Ice Blast, Inc., US Farms, Inc., US Microbics... concerning the securities of Tornado Gold International Corp. because it has not filed any periodic reports...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Dawn Technologies, Inc., Distinctive Devices, Inc., Haber, Inc., and Independence Brewing Co.; Order of Suspension of Trading June 14... a lack of current and accurate information concerning the securities of Independence Brewing Co...
Securing clean water: A secret to success
Michael Somerville; Dino DeSimone
2000-01-01
Securing clean water is a primary goal for many agencies, organizations, and concerned citizens. To achieve that goal, agencies have traditionally taken a mostly regulatory approach. In recent years, however, a major trend in government has been to move decision-making and action-taking to the local level. Conservation Districts, watershed organizations, and other...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-02
... receivers of certain hazardous materials; and passenger railroad carriers, including each carrier operating light rail or heavy rail transit service on track that is part of the general railroad system of transportation and rail transit systems. Also, these persons are required to report significant security concerns...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-04
... SECURITIES AND EXCHANGE COMMISSION [ File No. 500-1] In the Matter of Heritage Worldwide, Inc., Impala Mineral Exploration Corp., Klondike Star Mineral Corporation, MIV Therapeutics Inc., Most Home... concerning the securities of Klondike Star Mineral Corporation because it has not filed any periodic reports...
School Security: A Growing Concern
ERIC Educational Resources Information Center
Walker, Milton G.
1976-01-01
Vandalism, trespassing, drug traffic, crowd control, automobile traffic, and emergencies such as fire or storms--these are the kinds of problems a school security system should be designed to eliminate or minimize. A preventive program can save more money than it costs and can improve the learning environment at the same time, says this writer.…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] American Unity Investments, Inc., China Display Technologies, Inc., China Wind Energy, Inc., Fuda Faucet Works, Inc., Greater China Media... concerning the securities of China Wind Energy, Inc. because it has not filed any periodic reports since the...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-28
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: American United Gold Corporation, AMS Homecare Inc., Aucxis Corp., and CYOP Systems International Inc.; Order of Suspension of... current and accurate information concerning the securities of American United Gold Corporation because it...
78 FR 63559 - Order Of Suspension of Trading; In the Matter of ARX Gold Corp.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-24
... of ARX Gold Corp. October 22, 2013. It appears to the Securities and Exchange Commission (``Commission'') that there is a lack of current and accurate information concerning the securities of ARX Gold Corp. (``ARX Gold''), quoted under the ticker symbol DUCP, because of questions regarding the...
NASA Blue Team: Determining Operational Security Posture of Critical Systems and Networks
NASA Technical Reports Server (NTRS)
Alley, Adam David
2016-01-01
Emergence of Cybersecurity has increased the focus on security risks to Information Technology (IT) assets going beyond traditional Information Assurance (IA) concerns: More sophisticated threats have emerged from increasing sources as advanced hacker tools and techniques have emerged and proliferated to broaden the attack surface available across globally interconnected networks.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] BluePoint Linux Software Corp., China Bottles Inc., Long-e International, Inc., and Nano Superlattice Technology, Inc.; Order of Suspension of... current and accurate information concerning the securities of BluePoint Linux Software Corp. because it...
Strategy for Peace. Annual U.S. Foreign Policy Conference (22nd, October 16-18, 1981).
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
Five discussion topics concerning peace were dealt with by conference participants, who included university faculty and officials from national and international agencies and organizations. The first topic, North-South relations and international security, considers U.S. security and the Third World, U.S. economic interests in the developing…
18 CFR 3b.202 - Collection of information from individuals concerned.
Code of Federal Regulations, 2010 CFR
2010-04-01
... the Commission for inclusion in a system of records which may result in adverse determinations about... providing all or any part of the requested information. (c) Social security numbers will not be required... requested to disclose his social security number to the Commission, he will be informed under what statutory...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-25
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Camelot Entertainment Group, Inc., Cavico Corp., Global 8 Environmental Technologies, Inc., GTC Telecom Corp., ICF Corporation, and... concerning the securities of GTC Telecom Corp. because it has not filed any periodic reports since the period...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: BP International, Inc., CyGene Laboratories, Inc., Delek Resources, Inc., Flooring America, Inc., International Diversified... there is a lack of current and accurate information concerning the securities of CyGene Laboratories...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-22
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Abviva, Inc., ACTIS Global Ventures, Inc., aeroTelesis, Inc., Amwest Insurance Group, Inc., and Auto Underwriters of America, Inc.; Order of... concerning the securities of Auto Underwriters of America, Inc. because it has not filed any periodic reports...
ERIC Educational Resources Information Center
Stalker, Joshua Dylan
2012-01-01
The protection of proprietary information that users print from their information systems is a significant and relevant concern in the field of information security to both researchers and practitioners. Information security researchers have repeatedly indicated that human behaviors and perception are important factors influencing the information…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] DIAS Holding, Inc., EarthBlock Technologies, Inc., Ensurapet, Inc., FIIC Holdings, Inc., GeM Solutions, Inc., Gold Star Tutoring Services Inc., and... accurate information concerning the securities of EarthBlock Technologies, Inc. because it has not filed...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-02
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Advanced BioPhotonics, Inc., Advanced Viral Research Corp., Brantley Capital Corp., Brilliant Technologies Corporation, 4C Controls, Inc., and 2-Track... Commission that there is a lack of current and accurate information concerning the securities of Advanced Bio...
76 FR 1559 - Guidelines for the Use of Electronic Voting Systems in Union Officer Elections
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-11
... voting. Id. However, there are still concerns regarding on-line computer security, viruses and attacks... casting votes at polling sites; electronic voting from remote site personal computers via the Internet..., Washington, DC 20210. Because of security precautions, the Department continues to experience delays in U.S...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-09
..., DHS. ACTION: Notice. SUMMARY: The United States and Canada are staunch allies, vital economic partners... in which the United States and Canada share responsibility for the security and resilience of our..., while working together to facilitate the flows of legitimate travel and trade. Beyond the Border...
The National Bureau of Asian Research
security concerns, starting with overhauling CFIUS [Committee on Foreign Investment in the United States for Innovation, Trade, and StrategyJohn M. Shalikashvili Chair in National Security StudiesKenneth B ForumInnovative AsiaIndia's IP and Innovation PolicyThe Globalization of China's Life Science SectorAll IP
77 FR 25774 - Order of Suspension of Trading; In the Matter of Berman Center, Inc., Cyberkinetics...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-01
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading; In the Matter of Berman Center, Inc., Cyberkinetics Neurotechnology Systems, Inc., and Java Detour, Inc. April 27... information concerning the securities of Java Detour, Inc. because it has not filed any periodic reports since...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-02
... Collection Surrounding the Sale and Issue of Marketable Book-Entry Securities ACTION: Notice and request for... Department of the Treasury is soliciting comments concerning the Sale and Issue of Marketable Book-Entry... Marketable Book-Entry Securities. OMB Number: 1535-0112. Abstract: The information is requested to ensure...
The Emotional Climate of the Interpersonal Classroom in a Maximum Security Prison for Males.
ERIC Educational Resources Information Center
Meussling, Vonne
1984-01-01
Examines the nature, the task, and the impact of teaching in a maximum security prison for males. Data are presented concerning the curriculum design used in order to create a nonevaluative atmosphere. Inmates' reactions to self-disclosure and open communication in a prison setting are evaluated. (CT)
77 FR 10004 - C$ cMoney, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-21
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] C$ cMoney, Inc.; Order of Suspension of... current and accurate information concerning the securities of C$ cMoney, Inc. (``cMoney'') because of questions regarding the accuracy of assertions by cMoney, and by others, in press releases to investors and...
12 CFR 344.9 - Personal securities trading reporting by bank officers and employees.
Code of Federal Regulations, 2010 CFR
2010-01-01
... decisions for the accounts of customers; (2) Participate in the determination of such recommendations or decisions; or (3) In connection with their duties, obtain information concerning which securities are being purchased or sold or recommend such action, must report to the bank, within 30-calendar days after the end...
Reliability, Compliance, and Security in Web-Based Course Assessments
ERIC Educational Resources Information Center
Bonham, Scott
2008-01-01
Pre- and postcourse assessment has become a very important tool for education research in physics and other areas. The web offers an attractive alternative to in-class paper administration, but concerns about web-based administration include reliability due to changes in medium, student compliance rates, and test security, both question leakage…
INTERNATIONAL COOPERATION ON RADIOLOGICAL THREAT REDUCTION PROGRAMS IN RUSSIA
DOE Office of Scientific and Technical Information (OSTI.GOV)
Landers, Christopher C.; Tatyrek, Aaron P.
Since its inception in 2004, the United States Department of Energy’s Global Threat Reduction Initiative (GTRI) has provided the Russian Federation with significant financial and technical assistance to secure its highly vulnerable and dangerous radiological material. The three program areas of this assistance are the removal of radioisotope thermoelectric generators (RTG), the physical protection of vulnerable in-use radiological material of concern, and the recovery of disused or abandoned radiological material of concern. Despite the many successes of the GTRI program in Russia, however, there is still a need for increased international cooperation in these efforts. Furthermore, concerns exist over howmore » the Russian government will ensure that the security of its radiological materials provided through GTRI will be sustained. This paper addresses these issues and highlights the successes of GTRI efforts and ongoing activities.« less
The Psychology of Working Theory.
Duffy, Ryan D; Blustein, David L; Diemer, Matthew A; Autin, Kelsey L
2016-03-01
In the current article, we build on research from vocational psychology, multicultural psychology, intersectionality, and the sociology of work to construct an empirically testable Psychology of Working Theory (PWT). Our central aim is to explain the work experiences of all individuals, but particularly people near or in poverty, people who face discrimination and marginalization in their lives, and people facing challenging work-based transitions for which contextual factors are often the primary drivers of the ability to secure decent work. The concept of decent work is defined and positioned as the central variable within the theory. A series of propositions is offered concerning (a) contextual predictors of securing decent work, (b) psychological and economic mediators and moderators of these relations, and (c) outcomes of securing decent work. Recommendations are suggested for researchers seeking to use the theory and practical implications are offered concerning counseling, advocacy, and public policy. (c) 2016 APA, all rights reserved).
Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets
2014-01-01
Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete—the traditional approach for calculating reliability—is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods. PMID:25405226
Security threat assessment of an Internet security system using attack tree and vague sets.
Chang, Kuei-Hu
2014-01-01
Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.
Legal issues concerning electronic health information: privacy, quality, and liability.
Hodge, J G; Gostin, L O; Jacobson, P D
1999-10-20
Personally identifiable health information about individuals and general medical information is increasingly available in electronic form in health databases and through online networks. The proliferation of electronic data within the modern health information infrastructure presents significant benefits for medical providers and patients, including enhanced patient autonomy, improved clinical treatment, advances in health research and public health surveillance, and modern security techniques. However, it also presents new legal challenges in 3 interconnected areas: privacy of identifiable health information, reliability and quality of health data, and tortbased liability. Protecting health information privacy (by giving individuals control over health data without severely restricting warranted communal uses) directly improves the quality and reliability of health data (by encouraging individual uses of health services and communal uses of data), which diminishes tort-based liabilities (by reducing instances of medical malpractice or privacy invasions through improvements in the delivery of health care services resulting in part from better quality and reliability of clinical and research data). Following an analysis of the interconnectivity of these 3 areas and discussing existing and proposed health information privacy laws, recommendations for legal reform concerning health information privacy are presented. These include (1) recognizing identifiable health information as highly sensitive, (2) providing privacy safeguards based on fair information practices, (3) empowering patients with information and rights to consent to disclosure (4) limiting disclosures of health data absent consent, (5) incorporating industry-wide security protections, (6) establishing a national data protection authority, and (7) providing a national minimal level of privacy protections.
Analyzing the security of an existing computer system
NASA Technical Reports Server (NTRS)
Bishop, M.
1986-01-01
Most work concerning secure computer systems has dealt with the design, verification, and implementation of provably secure computer systems, or has explored ways of making existing computer systems more secure. The problem of locating security holes in existing systems has received considerably less attention; methods generally rely on thought experiments as a critical step in the procedure. The difficulty is that such experiments require that a large amount of information be available in a format that makes correlating the details of various programs straightforward. This paper describes a method of providing such a basis for the thought experiment by writing a special manual for parts of the operating system, system programs, and library subroutines.
Security clustering algorithm based on reputation in hierarchical peer-to-peer network
NASA Astrophysics Data System (ADS)
Chen, Mei; Luo, Xin; Wu, Guowen; Tan, Yang; Kita, Kenji
2013-03-01
For the security problems of the hierarchical P2P network (HPN), the paper presents a security clustering algorithm based on reputation (CABR). In the algorithm, we take the reputation mechanism for ensuring the security of transaction and use cluster for managing the reputation mechanism. In order to improve security, reduce cost of network brought by management of reputation and enhance stability of cluster, we select reputation, the historical average online time, and the network bandwidth as the basic factors of the comprehensive performance of node. Simulation results showed that the proposed algorithm improved the security, reduced the network overhead, and enhanced stability of cluster.
Communicating Uncertainty about Climate Change for Application to Security Risk Management
NASA Astrophysics Data System (ADS)
Gulledge, J. M.
2011-12-01
The science of climate change has convincingly demonstrated that human activities, including the release of greenhouse gases, land-surface changes, particle emissions, and redistribution of water, are changing global and regional climates. Consequently, key institutions are now concerned about the potential social impacts of climate change. For example, the 2010 Quadrennial Defense Review Report from the U.S. Department of Defense states that "climate change, energy security, and economic stability are inextricably linked." Meanwhile, insured losses from climate and weather-related natural disasters have risen dramatically over the past thirty years. Although these losses stem largely from socioeconomic trends, insurers are concerned that climate change could exacerbate this trend and render certain types of climate risk non-diversifiable. Meanwhile, the climate science community-broadly defined as physical, biological, and social scientists focused on some aspect of climate change-remains largely focused scholarly activities that are valued in the academy but not especially useful to decision makers. On the other hand, climate scientists who engage in policy discussions have generally permitted vested interests who support or oppose climate policies to frame the discussion of climate science within the policy arena. Such discussions focus on whether scientific uncertainties are sufficiently resolved to justify policy and the vested interests overstate or understate key uncertainties to support their own agendas. Consequently, the scientific community has become absorbed defending scientific findings to the near exclusion of developing novel tools to aid in risk-based decision-making. For example, the Intergovernmental Panel on Climate Change (IPCC), established expressly for the purpose of informing governments, has largely been engaged in attempts to reduce unavoidable uncertainties rather than helping the world's governments define a science-based risk-management framework for climate security. The IPCC's Fourth Assessment Report concluded that "Responding to climate change involves an iterative risk management process that includes both adaptation and mitigation and takes into account climate change damages, co-benefits, sustainability, equity and attitudes to risk." In risk management, key uncertainties guide action aimed at reducing risk and cannot be ignored or used to justify inaction. Security policies such as arms control and counter-terrorism demonstrate that high-impact outcomes matter to decision makers even if they are likely to be rare events. In spite of this fact, the long tail on the probability distribution of climate sensitivity was largely ignored by the climate science community until recently and its implications for decision making are still not receiving adequate attention. Informing risk management requires scientists to shift from a singular aversion to type I statistical error (i.e. false positive) to a balanced presentation of both type I error and type II error (i.e. false negative) when the latter may have serious consequences. Examples from national security, extreme weather, and economics illustrate these concepts.
Securing and sustaining employment: concerns of HIV patients in Singapore.
Tan, Si Ying; Ow Yong, Lai Meng; Foong, Jasmin Yuet Ee; Wong, Nicole Huay Sze; Chew, Li Ling; Koh, Yin Ling
2013-01-01
Employment sustainability is one of the most pressing issues inflicting people living with HIV (PLHIV). A qualitative approach was used to elucidate the perceived challenges in sustaining their employment and the perceived barriers in re-entering the workforce for HIV patients. In-depth interviews were conducted with 16 patients from an acute hospital in Singapore. The main challenges raised in sustaining employment were: (1) ability to ensure secrecy of diagnosis from employers, (2) ability to secure financial resources for treatment and sustenance, (3) ability to ensure stable health to meet job requirements, (4) ability to cognitively sit with the concerns of uncertainty and limitations in career, and (5) ability to work through discriminatory workplace practices. The perceived barriers in gaining workforce re-entry were: (1) fear of pre-employment medical screening and potential discriminatory practices at workplace, (2) concerns over health (frequent hospital admissions, physical weakness, and existing medical co-morbidities), and (3) psychosocial challenges (unstable accommodation, older age, financial issues, and trade skills limitation). The overarching factor that influences the success of sustaining and securing an employment among HIV patients is secrecy of the diagnosis. The individuals' health status, financial status and access to healthcare, and other psychosocial challenges further compound the issue.
Questionnaire about psychology/disease correlation–I
Ojog, DG; Pănescu, OM; Rusu, EC; Tănăsescu, MD
2011-01-01
Rationale: The existing personality inventories are exploring too general psychological features so that the possible psychology/disease associations might be leveled out. Objective: We attempt to build a tool to explore the possible correlation between certain psychological features and the most common internal disorders. Method: We have used two questionnaires containing many pairs of synonymous items (necessary for assessing the consistency of the answers). The items are divided into four main domains: preoccupation for the basal conditions of existence (health/ disease/ death, fear, money, lodging); interaction with other people; action, will/ volition, self-assertion; and preoccupation with the exterior. In this first article we are presenting the correlations between items of the first domain, based on the answers from our first 3138 respondents. Results and discussion: The concern about health is best reflected by general formulations. The desire for security is best expressed by items combining the worry about money and dwelling, and worst by items reflecting the eagerness to gain, keep or judiciously spend money. Among the various fears, those of future, darkness, and loneliness are better indicators of security concern. In assessing the anxiety about safety/ security, specific worries are more revelatory than the general ones. Precaution and inclination for order are the best indicators for the aspiration to stability. Poorer ones are the desire for cleanliness and the tendency to attachment. Health and security concerns seem to be consistently linked. The consistency evaluating system will be based upon pairs of synonymous items correlated with a10–200 or less error probability Abbreviations: PP = psychological profile; PF = personality feature; Q1/ Q2/ Q3 = first/ second/ third questionnaire; HeSD = health subdomain; SeSD = security subdomain; StSD = stability subdomain; ChiSq = chi square; ErrProb = error probability (probability of error). PMID:21505574
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-14
.... Moreover, because the fee charged to access liquidity funds the payment of a rebate to liquidity providers... reduced fees for accessing liquidity in securities listed on the New York Stock Exchange (``Tape A Securities''), along with correspondingly reduced rebates for liquidity provision in Tape A Securities.\\3...
The International Student Safety Debate: Moving beyond Denial
ERIC Educational Resources Information Center
Nyland, C.; Forbes-Mewett, H.; Marginson, S.
2010-01-01
In 2009 international student safety became an issue of immediate concern to Australian international education exporters following a series of demonstrations by Indian students and interventions by concerned foreign governments. With these developments the "industry" became fixated on how best to secure Australia's share of the…
12 CFR 222.1 - Purpose, scope, and effective dates.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) Section 115, concerning truncation of the social security number in a consumer report; (iv) Section 151(a... consumer reports; (viii) Section 155, concerning notice by debt collectors with respect to fraudulent... part generally applies to persons that obtain and use information about consumers to determine the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-29
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Modification of Two National Customs Automation Program (NCAP) Tests Concerning Automated Commercial Environment (ACE) Document Image System (DIS) and Simplified Entry (SE); Correction AGENCY: U.S. Customs and Border Protection, Department...
SSeCloud: Using secret sharing scheme to secure keys
NASA Astrophysics Data System (ADS)
Hu, Liang; Huang, Yang; Yang, Disheng; Zhang, Yuzhen; Liu, Hengchang
2017-08-01
With the use of cloud storage services, one of the concerns is how to protect sensitive data securely and privately. While users enjoy the convenience of data storage provided by semi-trusted cloud storage providers, they are confronted with all kinds of risks at the same time. In this paper, we present SSeCloud, a secure cloud storage system that improves security and usability by applying secret sharing scheme to secure keys. The system encrypts uploading files on the client side and splits encrypted keys into three shares. Each of them is respectively stored by users, cloud storage providers and the alternative third trusted party. Any two of the parties can reconstruct keys. Evaluation results of prototype system show that SSeCloud provides high security without too much performance penalty.
Akrawi, Daniel; Bartrop, Roger; Potter, Ursula; Touyz, Stephen
2015-01-01
This systematic review aims to critically examine the existing literature that has reported on the links between aspects of religiosity, spirituality and disordered eating, psychopathology and body image concerns. A systematic search of online databases (PsycINFO, Medline, Embase and Web of Science) was conducted in December 2014. A search protocol was designed to identify relevant articles that quantitatively explored the relationship between various aspects of religiosity and/or spirituality and disordered eating, psychopathology and/or body image concerns in non-clinical samples of women and men. Twenty-two studies were identified to have matched the inclusion criteria. Overall, the main findings to emerge were that strong and internalised religious beliefs coupled with having a secure and satisfying relationship with God were associated with lower levels of disordered eating, psychopathology and body image concern. Conversely, a superficial faith coupled with a doubtful and anxious relationship with God were associated with greater levels of disordered eating, psychopathology and body image concern. While the studies reviewed have a number of evident limitations in design and methodology, there is sufficient evidence to make this avenue of enquiry worth pursuing. It is hoped that the direction provided by this review will lead to further investigation into the protective benefits of religiosity and spirituality in the development of a clinical eating disorder. Thus a stronger evidence base can then be utilised in developing community awareness and programs which reduce the risk.
IT solutions for privacy protection in biobanking.
Eder, J; Gottweis, H; Zatloukal, K
2012-01-01
Biobanks containing human biological samples and associated data are key resources for the advancement of medical research. Efficient access to samples and data increases competitiveness in medical research, reduces effort and time for achieving scientific results and promotes scientific progress. In order to address upcoming health challenges, there is increasing need for transnational collaboration. This requires innovative solutions improving interoperability of biobanks in fields such as sample and data management as well as governance including ethical and legal frameworks. In this context, rights and expectations of donors to determine the usage of their biological material and data and to ensure their privacy have to be observed. We discuss the benefits of biobanks, the needs to support medical research and the societal demands and regulations, in particular, securing the rights of donors and present IT solutions that allow both to maintain the security of personal data and to increase the efficiency of access to data in biobanks. Disclosure filters are discussed as a strategy to combine European public expectations concerning informed consent with the requirements of biobank research. Copyright © 2012 S. Karger AG, Basel.
Manufacturing and Security Challenges in 3D Printing
NASA Astrophysics Data System (ADS)
Zeltmann, Steven Eric; Gupta, Nikhil; Tsoutsos, Nektarios Georgios; Maniatakos, Michail; Rajendran, Jeyavijayan; Karri, Ramesh
2016-07-01
As the manufacturing time, quality, and cost associated with additive manufacturing (AM) continue to improve, more and more businesses and consumers are adopting this technology. Some of the key benefits of AM include customizing products, localizing production and reducing logistics. Due to these and numerous other benefits, AM is enabling a globally distributed manufacturing process and supply chain spanning multiple parties, and hence raises concerns about the reliability of the manufactured product. In this work, we first present a brief overview of the potential risks that exist in the cyber-physical environment of additive manufacturing. We then evaluate the risks posed by two different classes of modifications to the AM process which are representative of the challenges that are unique to AM. The risks posed are examined through mechanical testing of objects with altered printing orientation and fine internal defects. Finite element analysis and ultrasonic inspection are also used to demonstrate the potential for decreased performance and for evading detection. The results highlight several scenarios, intentional or unintentional, that can affect the product quality and pose security challenges for the additive manufacturing supply chain.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ninh, Giang Nguyen; Phongphaeth, Pengvanich, E-mail: phongphaeth.p@chula.ac.th; Nares, Chankow
Gamma-ray signal can be used as a fingerprint for radioisotope identification. In the context of radioactive and nuclear materials security at the border control point, the detection task can present a significant challenge due to various constraints such as the limited measurement time, the shielding conditions, and the noise interference. This study proposes a novel method to identify the signal of one or several radioisotopes from a poorly resolved gamma-ray spectrum. In this method, the noise component in the raw spectrum is reduced by the wavelet decomposition approach, and the removal of the continuum background is performed using the baselinemore » determination algorithm. Finally, the identification of radioisotope is completed using the matrix linear regression method. The proposed method has been verified by experiments using the poorly resolved gamma-ray signals from various scenarios including single source, mixing of natural uranium with five of the most common industrial radioactive sources (57Co, 60Co, 133Ba, 137Cs, and 241Am). The preliminary results show that the proposed algorithm is comparable with the commercial method.« less
Inequality of pension arrangements among different segments of the labor force in China.
Wu, Ling
2013-01-01
Social security for older people in China today has been established institutionally. However, there are substantial problems such as coverage, affordability, fund management, and corruption. This paper aims to provide a general picture of China's social security system for older people and to argue that the inequality of pension arrangements among different segments of the labor force is one of the most conspicuous problems challenging the Chinese government. Four unequal aspects of the pension system concerning the financing resources and pension levels are examined in this paper: (1) unequal institutional arrangements among different sectors, (2) unbalanced governmental expenditure in pension provision, (3) an increasing gap in pension levels between urban and rural areas, and (4) uncovered groups such as the unemployed and self-employed. Historical, economic, and political reasons all contribute to this unequal institution under transition from socialism to a market-oriented economy. At present, it is urgent for the central government to take measures to integrate the various pension arrangements into the unified Old Age Insurance and to reduce the gaps among different regions.
Safeguarding patient privacy in electronic healthcare in the USA: the legal view.
Walsh, Diana; Passerini, Katia; Varshney, Upkar; Fjermestad, Jerry
2008-01-01
The conflict between the sweeping power of technology to access and assemble personal information and the ongoing concern about our privacy and security is ever increasing. While we gradually need higher electronic access to medical information, issues relating to patient privacy and reducing vulnerability to security breaches surmount. In this paper, we take a legal perspective and examine the existing patchwork of laws and obligations governing health information in the USA. The study finds that as Electronic Medical Records (EMRs) increase in scope and dissemination, privacy protections gradually decrease due to the shortcomings in the legal system. The contributions of this paper are (1) an overview of the legal EMR issues in the USA, and (2) the identification of the unresolved legal issues and how these will escalate when health information is transmitted over wireless networks. More specifically, the paper discusses federal and state government regulations such as the Electronic Communications Privacy Act, the Health Insurance Portability and Accountability Act (HIPAA) and judicial intervention. Based on the legal overview, the unresolved challenges are identified and suggestions for future research are included.
38 CFR 74.22 - What are the procedures for cancellation?
Code of Federal Regulations, 2011 CFR
2011-07-01
... Veterans Enterprise, concerning the Notice of Verified Status Cancellation within 30 days of receipt of CVE... example, to security concerns or equipment failures. The filing party bears the risk that the delivery... Small and Disadvantaged Business Utilization and Center for Veterans Enterprise (00VE), U.S. Department...
Swimming Pools. Managing School Facilities, Guide 2.
ERIC Educational Resources Information Center
Department for Education and Employment, London (England). Architects and Building Branch.
This guide for schools with swimming pools offers advice concerning appropriate training for pool managers, the importance of water quality and testing, safety in the handling of chemicals, maintenance and cleaning requirements, pool security, and health concerns. The guide covers both indoor and outdoor pools, explains some technical terms,…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-20
... finding or (ii) as to which the self-regulatory organization consents, the Commission will: (A) By order... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71083; File No. SR-OCC-2013-807] Self-Regulatory Organizations; The Options Clearing Corporation; Advance Notice Concerning the Governance...
75 FR 53019 - Proposed Collection; Comment Request for Regulation Project
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-30
... soliciting comments concerning an existing regulation, REG-147144-06, (TD 9446) Section 1.367(a)-8, Gain...: Gain Recognition Agreements With Respect to Certain Transfers of Stock or Securities by United States... Internal Revenue Code (Code) concerning gain recognition agreements filed by United States persons with...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-03
...] Multi-Agency Informational Meeting Concerning Compliance With the Federal Select Agent Program; Public... Select Agent Program established under the Public Health Security and Bioterrorism Preparedness and... Roberson, Veterinary Permit Examiner, APHIS Select Agent Program, VS, ASAP, APHIS, 4700 River Road Unit 2...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-14
... Informational Meeting Concerning Compliance With the Federal Select Agent Program; Public Webcast AGENCY... with the Federal Select Agent Program. The purpose of this notice is to notify all interested parties... changes to the select agent regulations; occupational health, information and physical security; personnel...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-12
... Informational Meeting Concerning Compliance with the Select Agent Regulations; Public Webcast AGENCY: Centers... purpose of the webcast is to provide guidance related to the select agent regulations established under... Justice Information Services. Changes to Section 11(Security) of the select agent regulations including...
After the Spring: Reforming Arab Armies
2014-09-01
Arab region, and intercultural communication . She was previously assigned to the North Atlantic Treaty Organization (NATO) Defence College and the...and provides solutions to strategic Army issues affecting the national security community . The Peacekeeping and Stability Operations Institute...concern topics having strategic implications for the Army, the Department of Defense, and the larger national security community . In addition to its
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-24
... Development Corp., and Arcland Energy Corp.; Order of Suspension of Trading October 20, 2011. It appears to... current and accurate information concerning the securities of American Enterprise Development Corp... securities of Arcland Energy Corp. because it has not filed any periodic reports since the period ended April...
75 FR 51122 - In the Matter of Four Crystal Funding, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-18
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Four Crystal Funding, Inc... that there is a lack of current and accurate information concerning the securities of Four Crystal Funding, Inc. (``Four Crystal'') because it has not filed any periodic reports since the period ended June...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Along Mobile Technologies, Inc., and China Yingxia International, Inc., Order of Suspension of Trading February 2, 2012. It... concerning the securities of Along Mobile Technologies, Inc. because it has not filed any periodic reports...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-18
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Orbit E-Commerce, Inc., Orion Ethanol, Inc., Pacificnet, Inc., PainCare Holdings, Inc., Pay88, Inc., Rahaxi, Inc., and Raven Biofuels International Corp... there is a lack of current and accurate information concerning the securities of Orbit E-Commerce, Inc...
Code of Federal Regulations, 2010 CFR
2010-04-01
... management investment company. 270.17d-3 Section 270.17d-3 Commodity and Securities Exchanges SECURITIES AND... registered open-end management investment company. An affiliated person of, or principal underwriter for, a registered open-end management investment company and an affiliated person of such a person or principal...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-08
... of Anthracite Capital, Inc., Auto Data Network Inc., Avenue Group, Inc., Ckrush, Inc., Clickable... securities of Auto Data Network Inc. because it has not filed any periodic reports since the period ended... accurate information concerning the securities of Avenue Group, Inc. because it has not filed any periodic...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-12
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Exmocare, Inc. (n/k/a Second Solar, Inc.), First Transation Management, Inc., jetPADS, Inc., PepperBall Technologies, Inc., Pure Play... current and accurate information concerning the securities of PepperBall Technologies, Inc. because it has...
School Security Measures and Extracurricular Participation: An Exploratory Multi-Level Analysis
ERIC Educational Resources Information Center
Mowen, Thomas J.; Manierre, Matthew J.
2017-01-01
Although delinquency in US schools is near historic lows, concern over delinquency in US schools remains a pressing issue among school officials, parents, and policy-makers. Many scholars argue that the current approach to discipline in the United States is highly punitive. While some projects have assessed the effect of punitive security on…
Why Phishing Works: Project for an Information Security Capstone Course
ERIC Educational Resources Information Center
Pollacia, Lissa; Ding, Yan Zong; Yang, Seung
2015-01-01
This paper presents a project which was conducted in a capstone course in Information Security. The project focused on conducting research concerning the various aspects of phishing, such as why phishing works and who is more likely to be deceived by phishing. Students were guided through the process of conducting research: finding background and…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... sales by customers in a narrow set of instances, such as when an issuer has made a tender offer for the... municipal securities transaction, to disclose to its customer, at or prior to the time of trade, all... Prepay Principal (March 19, 1991), Notice Concerning Disclosure of Call Information to Customers of...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: SHC Corp. (f/k/a Victormaxx Technologies, Inc.), Shells Seafood Restaurants, Inc., SI Restructuring, Inc. (f/k/a Schlotzsky's, Inc.), SLS... a lack of current and accurate information concerning the securities of Shells Seafood Restaurants...
Regionalizing Food Security? Imperatives, Intersections and Contestations in a Post-9/11 World
ERIC Educational Resources Information Center
Hinrichs, C. Clare
2013-01-01
In the early 21st century, food security has become an urgent public concern, arguably more entangled with social, political and environmental problems at multiple scales now than in the past. This paper examines approaches to food system change emphasizing regionalization, rather than either localization or globalization, to consider framings of…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-15
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] ROK Entertainment Group, Inc., RussOil Corp., Tricell, Inc., Tunex International, Inc. (n/k/a Aone Dental International Group, Inc.), and Wireless Age... there is a lack of current and accurate information concerning the securities of Wireless Age...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-22
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Colorado Wyoming Reserve Co., Grant Life Sciences, Inc., NOXSO Corp., Omni Medical Holdings, Inc., and TSI, Inc., Order of Suspension of Trading... Commission that there is a lack of current and accurate information concerning the securities of Grant Life...
Using Regular, Lowstakes Tests to Secure Pupils' Contextual Knowledge in Year 10
ERIC Educational Resources Information Center
Donaghy, Lee
2014-01-01
Lee Donaghy was concerned that his GCSE students' weak contextual knowledge was letting them down. Inspired by a mixture of cognitive science and the arguments of other teachers expressed in various blogs, he decided to tackle the problem by teaching and testing knowledge more intensively. The result was a rapid improvement in secure factual…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Greatmat Technology Corp., Kentucky USA Energy, Inc., Solar Energy Ltd., and Visiphor Corp., Order of Suspension of Trading May 23, 2013. It appears... concerning the securities of Solar Energy Ltd. because it has not filed any periodic reports since the period...
ERIC Educational Resources Information Center
Tanque, Marcus M.
2012-01-01
The research conducted in this study inquires about Information Technology (IT) managers' and executives' attitudes, beliefs, and knowledge on Cloud Computing (CC) security. The study evaluated how these factors affect IT managers' and executives' willingness to adopt CC solutions in their organizations. Confidentiality,…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-02
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Thermo Tech Technologies Inc., T.V.G. Technologies Ltd., and Visual Frontier, Inc.; Order of Suspension of Trading January 31, 2012. It appears to... is a lack of current and accurate information concerning the securities of T.V.G. Technologies Ltd...