Sample records for secure collaborative object

  1. A study on an information security system of a regional collaborative medical platform.

    PubMed

    Zhao, Junping; Peng, Kun; Leng, Jinchang; Sun, Xiaowei; Zhang, Zhenjiang; Xue, Wanguo; Ren, Lianzhong

    2010-01-01

    The objective of this study was to share the experience of building an information security system for a regional collaborative medical platform (RCMP) and discuss the lessons learned from practical projects. Safety measures are analyzed from the perspective of system engineering. We present the essential requirements, critical architectures, and policies for system security of regional collaborative medical platforms.

  2. Collaboration using roles. [in computer network security

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1990-01-01

    Segregation of roles into alternative accounts is a model which provides not only the ability to collaborate but also enables accurate accounting of resources consumed by collaborative projects, protects the resources and objects of such a project, and does not introduce new security vulnerabilities. The implementation presented here does not require users to remember additional passwords and provides a very simple consistent interface.

  3. Software To Secure Distributed Propulsion Simulations

    NASA Technical Reports Server (NTRS)

    Blaser, Tammy M.

    2003-01-01

    Distributed-object computing systems are presented with many security threats, including network eavesdropping, message tampering, and communications middleware masquerading. NASA Glenn Research Center, and its industry partners, has taken an active role in mitigating the security threats associated with developing and operating their proprietary aerospace propulsion simulations. In particular, they are developing a collaborative Common Object Request Broker Architecture (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines

  4. Collaborating toward improving food security in Nunavut

    PubMed Central

    Wakegijig, Jennifer; Osborne, Geraldine; Statham, Sara; Issaluk, Michelle Doucette

    2013-01-01

    Background Community members, Aboriginal organizations, public servants and academics have long been describing a desperate situation of food insecurity in the Eastern Canadian Arctic. Objective The Nunavut Food Security Coalition, a partnership of Inuit Organizations and the Government of Nunavut, is collaborating to develop a territorial food security strategy to address pervasive food insecurity in the context of poverty reduction. Design The Nunavut Food Security Coalition has carried out this work using a community consultation model. The research was collected through community visits, stakeholder consultation and member checking at the Nunavut Food Security Symposium. Results In this paper, we describe a continuous course of action, based on community engagement and collective action, that has led to sustained political interest in and public mobilization around the issue of food insecurity in Nunavut. Conclusions The process described in this article is a unique collaboration between multiple organizations that has led to the development of a sustainable partnership that will inform policy development while representing the voice of Nunavummiut. PMID:23984307

  5. Increasing security through public health: a practical model.

    PubMed

    Parker, R David

    2011-01-01

    As political and social changes sweep the globe, there are opportunities to increase national security through innovative approaches. While traditional security methods such as defense forces and homeland security provide both pre-emptive and defensive protection, new methods could meet emerging challenges by responding to the political, financial, and social trends. One method is the integration of defense, medicine and public health. By assisting a nation by providing basic services, such as healthcare, collaborative efforts can increase stabilization in areas of unrest. Improved health outcomes leads to increased domestic security, which can create a ripple effect across a region. Assessment, uptake and sustainability by the host nation are critical for program success. The proposed methodology focuses on the use of primarily extant resources, such as programs used by Special Operations Forces and other health and defense programs. Additional components include evaluation, set objectives and mission collaborations. As the nexus between foreign affairs, security, and public health is increasingly validated through research and practice, standardized interventions should be developed to minimize overlapping expenditures, promote security and strengthen international relations. 2011.

  6. Supporting multi-state collaboration on privacy and security to foster health IT and health information exchange.

    PubMed

    Banger, Alison K; Alakoye, Amoke O; Rizk, Stephanie C

    2008-11-06

    As part of the HHS funded contract, Health Information Security and Privacy Collaboration, 41 states and territories have proposed collaborative projects to address cross-state privacy and security challenges related to health IT and health information exchange. Multi-state collaboration on privacy and security issues remains complicated, and resources to support collaboration around these topics are essential to the success of such collaboration. The resources outlined here offer an example of how to support multi-stakeholder, multi-state projects.

  7. A CLOSED-LOOP BIODIESEL PRODUCTION AND RESEARCH FACILITY IN KEENE, NH

    EPA Science Inventory

    The main objectives during Phase I were to continue a Biodiesel Working Group, formalize the organizational structure of the Monadnock Biodiesel Collaborative, identify a possible facility location, secure funding, provide novel curriculum for Keene State College students, and...

  8. Java: A New Brew for Educators, Administrators and Students.

    ERIC Educational Resources Information Center

    Gordon, Barbara

    1996-01-01

    Java is an object-oriented programming language developed by Sun Microsystems; its benefits include platform independence, security, and interactivity. Within the college community, Java is being used in programming courses, collaborative technology research projects, computer graphics instruction, and distance education. (AEF)

  9. PeerShield: determining control and resilience criticality of collaborative cyber assets in networks

    NASA Astrophysics Data System (ADS)

    Cam, Hasan

    2012-06-01

    As attackers get more coordinated and advanced in cyber attacks, cyber assets are required to have much more resilience, control effectiveness, and collaboration in networks. Such a requirement makes it essential to take a comprehensive and objective approach for measuring the individual and relative performances of cyber security assets in network nodes. To this end, this paper presents four techniques as to how the relative importance of cyber assets can be measured more comprehensively and objectively by considering together the main variables of risk assessment (e.g., threats, vulnerabilities), multiple attributes (e.g., resilience, control, and influence), network connectivity and controllability among collaborative cyber assets in networks. In the first technique, a Bayesian network is used to include the random variables for control, recovery, and resilience attributes of nodes, in addition to the random variables of threats, vulnerabilities, and risk. The second technique shows how graph matching and coloring can be utilized to form collaborative pairs of nodes to shield together against threats and vulnerabilities. The third technique ranks the security assets of nodes by incorporating multiple weights and thresholds of attributes into a decision-making algorithm. In the fourth technique, the hierarchically well-separated tree is enhanced to first identify critical nodes of a network with respect to their attributes and network connectivity, and then selecting some nodes as driver nodes for network controllability.

  10. Structuring Cooperative Nuclear RIsk Reduction Initiatives with China.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Brandt, Larry; Reinhardt, Jason Christian; Hecker, Siegfried

    The Stanford Center for International Security and Cooperation engaged several Chinese nuclear organizations in cooperative research that focused on responses to radiological and nuclear terrorism. The objective was to identify joint research initiatives to reduce the global dangers of such threats and to pursue initial technical collaborations in several high priority areas. Initiatives were identified in three primary research areas: 1) detection and interdiction of smuggled nuclear materials; 2) nuclear forensics; and 3) radiological (“dirty bomb”) threats and countermeasures. Initial work emphasized the application of systems and risk analysis tools, which proved effective in structuring the collaborations. The extensive engagementsmore » between national security nuclear experts in China and the U.S. during the research strengthened professional relationships between these important communities.« less

  11. TeleMed: Wide-area, secure, collaborative object computing with Java and CORBA for healthcare

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Forslund, D.W.; George, J.E.; Gavrilov, E.M.

    1998-12-31

    Distributed computing is becoming commonplace in a variety of industries with healthcare being a particularly important one for society. The authors describe the development and deployment of TeleMed in a few healthcare domains. TeleMed is a 100% Java distributed application build on CORBA and OMG standards enabling the collaboration on the treatment of chronically ill patients in a secure manner over the Internet. These standards enable other systems to work interoperably with TeleMed and provide transparent access to high performance distributed computing to the healthcare domain. The goal of wide scale integration of electronic medical records is a grand-challenge scalemore » problem of global proportions with far-reaching social benefits.« less

  12. Secured Advanced Federated Environment (SAFE): A NASA Solution for Secure Cross-Organization Collaboration

    NASA Technical Reports Server (NTRS)

    Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre

    2003-01-01

    This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.

  13. Information-Pooling Bias in Collaborative Security Incident Correlation Analysis.

    PubMed

    Rajivan, Prashanth; Cooke, Nancy J

    2018-03-01

    Incident correlation is a vital step in the cybersecurity threat detection process. This article presents research on the effect of group-level information-pooling bias on collaborative incident correlation analysis in a synthetic task environment. Past research has shown that uneven information distribution biases people to share information that is known to most team members and prevents them from sharing any unique information available with them. The effect of such biases on security team collaborations are largely unknown. Thirty 3-person teams performed two threat detection missions involving information sharing and correlating security incidents. Incidents were predistributed to each person in the team based on the hidden profile paradigm. Participant teams, randomly assigned to three experimental groups, used different collaboration aids during Mission 2. Communication analysis revealed that participant teams were 3 times more likely to discuss security incidents commonly known to the majority. Unaided team collaboration was inefficient in finding associations between security incidents uniquely available to each member of the team. Visualizations that augment perceptual processing and recognition memory were found to mitigate the bias. The data suggest that (a) security analyst teams, when conducting collaborative correlation analysis, could be inefficient in pooling unique information from their peers; (b) employing off-the-shelf collaboration tools in cybersecurity defense environments is inadequate; and (c) collaborative security visualization tools developed considering the human cognitive limitations of security analysts is necessary. Potential applications of this research include development of team training procedures and collaboration tool development for security analysts.

  14. PERMANENCE OF BIOLOGICAL AND CHEMICAL WARFARE AGENTS IN MUNICIPAL SOLID WASTE LANDFILL LEACHATES

    EPA Science Inventory

    The objective of this work is to permit EPA/ORD's National Homeland Security Research Center (NHSRC) and Edgewood Chemical Biological Center to collaborate together to test the permanence of biological and chemical warfare agents in municipal solid waste landfills. Research into ...

  15. Addressing security, collaboration, and usability with tactical edge mobile devices and strategic cloud-based systems

    NASA Astrophysics Data System (ADS)

    Graham, Christopher J.

    2012-05-01

    Success in the future battle space is increasingly dependent on rapid access to the right information. Faced with a shrinking budget, the Government has a mandate to improve intelligence productivity, quality, and reliability. To achieve increased ISR effectiveness, leverage of tactical edge mobile devices via integration with strategic cloud-based infrastructure is the single, most likely candidate area for dramatic near-term impact. This paper discusses security, collaboration, and usability components of this evolving space. These three paramount tenets outlined below, embody how mission information is exchanged securely, efficiently, with social media cooperativeness. Tenet 1: Complete security, privacy, and data integrity, must be ensured within the net-centric battle space. This paper discusses data security on a mobile device, data at rest on a cloud-based system, authorization and access control, and securing data transport between entities. Tenet 2: Lack of collaborative information sharing and content reliability jeopardizes mission objectives and limits the end user capability. This paper discusses cooperative pairing of mobile devices and cloud systems, enabling social media style interaction via tagging, meta-data refinement, and sharing of pertinent data. Tenet 3: Fielded mobile solutions must address usability and complexity. Simplicity is a powerful paradigm on mobile platforms, where complex applications are not utilized, and simple, yet powerful, applications flourish. This paper discusses strategies for ensuring mobile applications are streamlined and usable at the tactical edge through focused features sets, leveraging the power of the back-end cloud, minimization of differing HMI concepts, and directed end-user feedback.teInput=

  16. CORBASec Used to Secure Distributed Aerospace Propulsion Simulations

    NASA Technical Reports Server (NTRS)

    Blaser, Tammy M.

    2003-01-01

    The NASA Glenn Research Center and its industry partners are developing a Common Object Request Broker (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines. It was developed by Glenn and is being managed by the NASA Ames Research Center as the lead center reporting directly to NASA Headquarters' Aerospace Technology Enterprise. Glenn is an active domain member of the Object Management Group: an open membership, not-for-profit consortium that produces and manages computer industry specifications (i.e., CORBA) for interoperable enterprise applications. When NPSS is deployed, it will assemble a distributed aerospace propulsion simulation scenario from proprietary analytical CORBA servers and execute them with security afforded by the CORBASec implementation. The NPSS CORBASec test bed was initially developed with the TPBroker Security Service product (Hitachi Computer Products (America), Inc., Waltham, MA) using the Object Request Broker (ORB), which is based on the TPBroker Basic Object Adaptor, and using NPSS software across different firewall products. The test bed has been migrated to the Portable Object Adaptor architecture using the Hitachi Security Service product based on the VisiBroker 4.x ORB (Borland, Scotts Valley, CA) and on the Orbix 2000 ORB (Dublin, Ireland, with U.S. headquarters in Waltham, MA). Glenn, GE Aircraft Engines, and Pratt & Whitney Aircraft are the initial industry partners contributing to the NPSS CORBASec test bed. The test bed uses Security SecurID (RSA Security Inc., Bedford, MA) two-factor token-based authentication together with Hitachi Security Service digital-certificate-based authentication to validate the various NPSS users. The test bed is expected to demonstrate NPSS CORBASec-specific policy functionality, confirm adequate performance, and validate the required Internet configuration in a distributed collaborative aerospace propulsion environment.

  17. Secure environment for real-time tele-collaboration on virtual simulation of radiation treatment planning.

    PubMed

    Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S

    2003-01-01

    A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.

  18. A Requirement Engineering Framework for Electronic Data Sharing of Health Care Data Between Organizations

    NASA Astrophysics Data System (ADS)

    Liu, Xia; Peyton, Liam; Kuziemsky, Craig

    Health care is increasingly provided to citizens by a network of collaboration that includes multiple providers and locations. Typically, that collaboration is on an ad-hoc basis via phone calls, faxes, and paper based documentation. Internet and wireless technologies provide an opportunity to improve this situation via electronic data sharing. These new technologies make possible new ways of working and collaboration but it can be difficult for health care organizations to understand how to use the new technologies while still ensuring that their policies and objectives are being met. It is also important to have a systematic approach to validate that e-health processes deliver the performance improvements that are expected. Using a case study of a palliative care patient receiving home care from a team of collaborating health organizations, we introduce a framework based on requirements engineering. Key concerns and objectives are identified and modeled (privacy, security, quality of care, and timeliness of service). And, then, proposed business processes which use new technologies are modeled in terms of these concerns and objectives to assess their impact and ensure that electronic data sharing is well regulated.

  19. How to Receive More Funding for Your Research? Get Connected to the Right People!

    PubMed

    Ebadi, Ashkan; Schiffauerova, Andrea

    2015-01-01

    Funding has been viewed in the literature as one of the main determinants of scientific activities. Also, at an individual level, securing funding is one of the most important factors for a researcher, enabling him/her to carry out research projects. However, not everyone is successful in obtaining the necessary funds. The main objective of this work is to measure the effect of several important factors such as past productivity, scientific collaboration or career age of researchers, on the amount of funding that is allocated to them. For this purpose, the paper estimates a temporal non-linear multiple regression model. According to the results, although past productivity of researchers positively affects the funding level, our findings highlight the significant role of networking and collaboration. It was observed that being a member of large scientific teams and getting connected to productive researchers who have also a good control over the collaboration network and the flow of information can increase the chances for securing more money. In fact, our results show that in the quest for the research money it is more important how researchers build their collaboration network than what publications they produce and whether they are cited.

  20. How to Receive More Funding for Your Research? Get Connected to the Right People!

    PubMed Central

    Ebadi, Ashkan; Schiffauerova, Andrea

    2015-01-01

    Funding has been viewed in the literature as one of the main determinants of scientific activities. Also, at an individual level, securing funding is one of the most important factors for a researcher, enabling him/her to carry out research projects. However, not everyone is successful in obtaining the necessary funds. The main objective of this work is to measure the effect of several important factors such as past productivity, scientific collaboration or career age of researchers, on the amount of funding that is allocated to them. For this purpose, the paper estimates a temporal non-linear multiple regression model. According to the results, although past productivity of researchers positively affects the funding level, our findings highlight the significant role of networking and collaboration. It was observed that being a member of large scientific teams and getting connected to productive researchers who have also a good control over the collaboration network and the flow of information can increase the chances for securing more money. In fact, our results show that in the quest for the research money it is more important how researchers build their collaboration network than what publications they produce and whether they are cited. PMID:26222598

  1. Securing Resources in Collaborative Environments: A Peer-to-peerApproach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.

    2005-09-19

    We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.

  2. Test security in medicolegal cases: proposed guidelines for attorneys utilizing neuropsychology practice.

    PubMed

    Morel, Kenneth R

    2009-11-01

    In the context of forensic neuropsychological assessments, the professional interaction of law and psychology is viewed primarily as one where the retaining attorney or court dictates its needs to psychologists when resolving legal disputes. While this perspective is conceptually accurate, the positive and practical collaboration of law and psychology also relies on attorneys adhering to basic protections of sensitive psychological assessment procedures and tests. Objective testing is undermined when a practitioner of law engages in actions prior to, during, or following a neuropsychological examination in a manner that threatens the test security. An appreciation among practitioners of law and psychology regarding the necessity of test security is essential. This article reviews attorney actions that can affect test security, proposes a distinction by psychology between appropriate and problematic client preparation for a neuropsychological examination, integrates the available legal precedent regarding test security, and suggests productive measures to protect test security in medicolegal settings.

  3. Global Maritime Partnerships Game

    DTIC Science & Technology

    2010-10-08

    develop concepts of operations, doctrine and TTPs to perform various maritime security mission sets. Close collaboration with the USCG is vital to...issues of common concern in order to develop compatible doctrine . c. Objectives UNCLASSIFIED 37 UNCLASSIFIED i. Examine the interaction between...Senkaku Islands (PRC vs. Japan), Indonesia archipelagic sea lanes passage, Northern Territories Dispute (Japan vs. Russia) UNCLASSIFIED 143

  4. 5 CFR 9701.105 - Continuing collaboration.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Section 9701.105 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.105 Continuing collaboration. (a) In...

  5. 5 CFR 9701.105 - Continuing collaboration.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Section 9701.105 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.105 Continuing collaboration. (a) In...

  6. Education and Strategic Research Collaborations

    Science.gov Websites

    Los Alamos National Laboratory National Security Education Center Image Search Site submit LaboratoryNational Security Education Center Menu Program Offices Energy Security Council New Mexico Consortium Geophysics, Planetary Physics, Signatures Events Collaborations for education and strategic research, student

  7. Play Well With Others: Improvisational Theater and Collaboration in the Homeland Security Environment

    DTIC Science & Technology

    2013-09-01

    AND COLLABORATION IN THE HOMELAND SECURITY ENVIRONMENT 5. FUNDING NUMBERS 6. AUTHOR(S) Andrew J. Phelps 7. PERFORMING ORGANIZATION NAME(S) AND...ADDRESS(ES) Naval Postgraduate School Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S...collaboration is important, but we are not told how to collaborate. Improvisational theater, on the other hand, is built on collaboration among performers to

  8. A new data collaboration service based on cloud computing security

    NASA Astrophysics Data System (ADS)

    Ying, Ren; Li, Hua-Wei; Wang, Li na

    2017-09-01

    With the rapid development of cloud computing, the storage and usage of data have undergone revolutionary changes. Data owners can store data in the cloud. While bringing convenience, it also brings many new challenges to cloud data security. A key issue is how to support a secure data collaboration service that supports access and updates to cloud data. This paper proposes a secure, efficient and extensible data collaboration service, which prevents data leaks in cloud storage, supports one to many encryption mechanisms, and also enables cloud data writing and fine-grained access control.

  9. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems

    PubMed Central

    Wu, Jun; Su, Zhou; Li, Jianhua

    2017-01-01

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on “friend” relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems. PMID:28758943

  10. Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems.

    PubMed

    Wu, Jun; Su, Zhou; Wang, Shen; Li, Jianhua

    2017-07-30

    Fog computing, shifting intelligence and resources from the remote cloud to edge networks, has the potential of providing low-latency for the communication from sensing data sources to users. For the objects from the Internet of Things (IoT) to the cloud, it is a new trend that the objects establish social-like relationships with each other, which efficiently brings the benefits of developed sociality to a complex environment. As fog service become more sophisticated, it will become more convenient for fog users to share their own services, resources, and data via social networks. Meanwhile, the efficient social organization can enable more flexible, secure, and collaborative networking. Aforementioned advantages make the social network a potential architecture for fog computing systems. In this paper, we design an architecture for social fog computing, in which the services of fog are provisioned based on "friend" relationships. To the best of our knowledge, this is the first attempt at an organized fog computing system-based social model. Meanwhile, social networking enhances the complexity and security risks of fog computing services, creating difficulties of security service recommendations in social fog computing. To address this, we propose a novel crowd sensing-enabling security service provisioning method to recommend security services accurately in social fog computing systems. Simulation results show the feasibilities and efficiency of the crowd sensing-enabling security service recommendation method for social fog computing systems.

  11. The Impact of Visibility on Teamwork, Collaborative Communication, and Security in Emergency Departments: An Exploratory Study.

    PubMed

    Gharaveis, Arsalan; Hamilton, D Kirk; Pati, Debajyoti; Shepley, Mardelle

    2017-01-01

    The aim of this study was to examine the influence of visibility on teamwork, collaborative communication, and security issues in emergency departments (EDs). This research explored whether with high visibility in EDs, teamwork and collaborative communication can be improved while the security issues will be reduced. Visibility has been regarded as a critical design consideration and can be directly and considerably impacted by ED's physical design. Teamwork is one of the major related operational outcomes of visibility and involves nurses, support staff, and physicians. The collaborative communication in an ED is another important factor in the process of care delivery and affects efficiency and safety. Furthermore, security is a behavioral factor in ED designs, which includes all types of safety including staff safety, patient safety, and the safety of visitors and family members. This qualitative study investigated the impact of visibility on teamwork, collaborative communication, and security issues in the ED. One-on-one interviews and on-site observation sessions were conducted in a community hospital. Corresponding data analysis was implemented by using computer plan analysis, observation and interview content, and theme analyses. The findings of this exploratory study provided a framework to identify visibility as an influential factor in ED design. High levels of visibility impact productivity and efficiency of teamwork and communication and improve the chance of lowering security issues. The findings of this study also contribute to the general body of knowledge about the effect of physical design on teamwork, collaborative communication, and security.

  12. High-performance integrated virtual environment (HIVE): a robust infrastructure for next-generation sequence data analysis

    PubMed Central

    Simonyan, Vahan; Chumakov, Konstantin; Dingerdissen, Hayley; Faison, William; Goldweber, Scott; Golikov, Anton; Gulzar, Naila; Karagiannis, Konstantinos; Vinh Nguyen Lam, Phuc; Maudru, Thomas; Muravitskaja, Olesja; Osipova, Ekaterina; Pan, Yang; Pschenichnov, Alexey; Rostovtsev, Alexandre; Santana-Quintero, Luis; Smith, Krista; Thompson, Elaine E.; Tkachenko, Valery; Torcivia-Rodriguez, John; Wan, Quan; Wang, Jing; Wu, Tsung-Jung; Wilson, Carolyn; Mazumder, Raja

    2016-01-01

    The High-performance Integrated Virtual Environment (HIVE) is a distributed storage and compute environment designed primarily to handle next-generation sequencing (NGS) data. This multicomponent cloud infrastructure provides secure web access for authorized users to deposit, retrieve, annotate and compute on NGS data, and to analyse the outcomes using web interface visual environments appropriately built in collaboration with research and regulatory scientists and other end users. Unlike many massively parallel computing environments, HIVE uses a cloud control server which virtualizes services, not processes. It is both very robust and flexible due to the abstraction layer introduced between computational requests and operating system processes. The novel paradigm of moving computations to the data, instead of moving data to computational nodes, has proven to be significantly less taxing for both hardware and network infrastructure. The honeycomb data model developed for HIVE integrates metadata into an object-oriented model. Its distinction from other object-oriented databases is in the additional implementation of a unified application program interface to search, view and manipulate data of all types. This model simplifies the introduction of new data types, thereby minimizing the need for database restructuring and streamlining the development of new integrated information systems. The honeycomb model employs a highly secure hierarchical access control and permission system, allowing determination of data access privileges in a finely granular manner without flooding the security subsystem with a multiplicity of rules. HIVE infrastructure will allow engineers and scientists to perform NGS analysis in a manner that is both efficient and secure. HIVE is actively supported in public and private domains, and project collaborations are welcomed. Database URL: https://hive.biochemistry.gwu.edu PMID:26989153

  13. High-performance integrated virtual environment (HIVE): a robust infrastructure for next-generation sequence data analysis.

    PubMed

    Simonyan, Vahan; Chumakov, Konstantin; Dingerdissen, Hayley; Faison, William; Goldweber, Scott; Golikov, Anton; Gulzar, Naila; Karagiannis, Konstantinos; Vinh Nguyen Lam, Phuc; Maudru, Thomas; Muravitskaja, Olesja; Osipova, Ekaterina; Pan, Yang; Pschenichnov, Alexey; Rostovtsev, Alexandre; Santana-Quintero, Luis; Smith, Krista; Thompson, Elaine E; Tkachenko, Valery; Torcivia-Rodriguez, John; Voskanian, Alin; Wan, Quan; Wang, Jing; Wu, Tsung-Jung; Wilson, Carolyn; Mazumder, Raja

    2016-01-01

    The High-performance Integrated Virtual Environment (HIVE) is a distributed storage and compute environment designed primarily to handle next-generation sequencing (NGS) data. This multicomponent cloud infrastructure provides secure web access for authorized users to deposit, retrieve, annotate and compute on NGS data, and to analyse the outcomes using web interface visual environments appropriately built in collaboration with research and regulatory scientists and other end users. Unlike many massively parallel computing environments, HIVE uses a cloud control server which virtualizes services, not processes. It is both very robust and flexible due to the abstraction layer introduced between computational requests and operating system processes. The novel paradigm of moving computations to the data, instead of moving data to computational nodes, has proven to be significantly less taxing for both hardware and network infrastructure.The honeycomb data model developed for HIVE integrates metadata into an object-oriented model. Its distinction from other object-oriented databases is in the additional implementation of a unified application program interface to search, view and manipulate data of all types. This model simplifies the introduction of new data types, thereby minimizing the need for database restructuring and streamlining the development of new integrated information systems. The honeycomb model employs a highly secure hierarchical access control and permission system, allowing determination of data access privileges in a finely granular manner without flooding the security subsystem with a multiplicity of rules. HIVE infrastructure will allow engineers and scientists to perform NGS analysis in a manner that is both efficient and secure. HIVE is actively supported in public and private domains, and project collaborations are welcomed. Database URL: https://hive.biochemistry.gwu.edu. © The Author(s) 2016. Published by Oxford University Press.

  14. Project UNITY: Cross Domain Visualization Collaboration

    NASA Astrophysics Data System (ADS)

    Moore, J.; Havig, P.

    UNITY is an International Cooperative Research and Development (ICR&D) project between the United States and Great Britain under the Research and Development Projects (RDP) Memorandum of Agreement (MOA). UNITYs objectives are to develop and evaluate the operational concepts and requirements for undertaking combined operations: a) pursuant to the interests of mission partners, b) develop, experiment, and demonstrate, transitionable emergent technologies, capabilities, or concepts, which facilitate the sharing of information and products between mission partners, and c) identify and define additional emerging technologies that may need to be developed to support current and future military information sharing. Collaboration between coalition partners is essentially for accurate and timely decision making in the ever increasing nature and tempo of global security. The purpose for this project is to develop engineering solutions in order to further investigate the human factors issues that arise while sharing information in a collaborative environment where security is an issue. The biggest difference between existing available solutions are in the presentation and interaction with the interface on both ends of the collaboration in order to preserve the expressed intent of shared situation awareness while also enabling markups and content on one screen that the other collaborator does not see and vice versa. The UNITY project stresses collaboration differently than all known realtime collaboration software in production, aka groupware, on the market today. The tradition of What You See Is What I See (WYSIWIS) as in typical implementations of shared whiteboards simply do not address the need for local and private information to be displayed in context with shareable data. This paper addresses the concerns, problems, and some solutions for shared 3D visualization and 2D tabular visualizations which are explored and presented within the space situation awareness problem set.

  15. Infusing Aging and Public Policy Content into Gerontology Courses: Collaborative Learning Methods To Teach about Social Security and Medicare.

    ERIC Educational Resources Information Center

    Cianciolo, Patricia K.; Henderson, Tammy L.

    2003-01-01

    Describes modules on Social Security and Medicare for gerontology policy courses. Discusses collaborative exercises in which students explore Internet resources on Social Security and health care finance, identity major concerns about reforms, and enact scenarios about retirees with varying degrees of income and health care security. (Contains 33…

  16. Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Sheldon, Frederick T; Mili, Ali

    2008-01-01

    Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with the goal of improved enterprise and business risk management. Economic uncertainty, intensively collaborative work styles, virtualization, increased outsourcing and ongoing compliance pressures require careful consideration and adaptation of a balanced approach. The Cyberspace Security Econometrics System (CSES) provides a measure of reliability, security and safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. For a given stakeholder,more » CSES reflects the variance that may exist among the stakes one attaches to meeting each requirement. This paper summarizes the basis, objectives and capabilities for the CSES including inputs/outputs as well as the structural underpinnings.« less

  17. Homeland Security Collaboration: Catch Phrase or Preeminent Organizational Construct?

    DTIC Science & Technology

    2009-09-01

    collaborative effort? C. RESEARCH METHODOLOGY This research project utilized a modified case study methodology. The traditional case study method ...discussing the research method , offering smart practices and culminate with findings and recommendations. Chapter II Homeland Security Collaboration...41 Centers for Regional Excellence, “Building Models.” 16 Chapter III Research Methodology:  Modified Case Study Method is

  18. A cloud computing based platform for sleep behavior and chronic diseases collaborative research.

    PubMed

    Kuo, Mu-Hsing; Borycki, Elizabeth; Kushniruk, Andre; Huang, Yueh-Min; Hung, Shu-Hui

    2014-01-01

    The objective of this study is to propose a Cloud Computing based platform for sleep behavior and chronic disease collaborative research. The platform consists of two main components: (1) a sensing bed sheet with textile sensors to automatically record patient's sleep behaviors and vital signs, and (2) a service-oriented cloud computing architecture (SOCCA) that provides a data repository and allows for sharing and analysis of collected data. Also, we describe our systematic approach to implementing the SOCCA. We believe that the new cloud-based platform can provide nurse and other health professional researchers located in differing geographic locations with a cost effective, flexible, secure and privacy-preserved research environment.

  19. Building international genomics collaboration for global health security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cui, Helen H.; Erkkila, Tracy; Chain, Patrick S. G.

    Genome science and technologies are transforming life sciences globally in many ways and becoming a highly desirable area for international collaboration to strengthen global health. The Genome Science Program at the Los Alamos National Laboratory is leveraging a long history of expertise in genomics research to assist multiple partner nations in advancing their genomics and bioinformatics capabilities. The capability development objectives focus on providing a molecular genomics-based scientific approach for pathogen detection, characterization, and biosurveillance applications. The general approaches include introduction of basic principles in genomics technologies, training on laboratory methodologies and bioinformatic analysis of resulting data, procurement, and installationmore » of next-generation sequencing instruments, establishing bioinformatics software capabilities, and exploring collaborative applications of the genomics capabilities in public health. Genome centers have been established with public health and research institutions in the Republic of Georgia, Kingdom of Jordan, Uganda, and Gabon; broader collaborations in genomics applications have also been developed with research institutions in many other countries.« less

  20. Building international genomics collaboration for global health security

    DOE PAGES

    Cui, Helen H.; Erkkila, Tracy; Chain, Patrick S. G.; ...

    2015-12-07

    Genome science and technologies are transforming life sciences globally in many ways and becoming a highly desirable area for international collaboration to strengthen global health. The Genome Science Program at the Los Alamos National Laboratory is leveraging a long history of expertise in genomics research to assist multiple partner nations in advancing their genomics and bioinformatics capabilities. The capability development objectives focus on providing a molecular genomics-based scientific approach for pathogen detection, characterization, and biosurveillance applications. The general approaches include introduction of basic principles in genomics technologies, training on laboratory methodologies and bioinformatic analysis of resulting data, procurement, and installationmore » of next-generation sequencing instruments, establishing bioinformatics software capabilities, and exploring collaborative applications of the genomics capabilities in public health. Genome centers have been established with public health and research institutions in the Republic of Georgia, Kingdom of Jordan, Uganda, and Gabon; broader collaborations in genomics applications have also been developed with research institutions in many other countries.« less

  1. Manufacturing Steps for Commercial Production of Nano-Structure Capacitors Final Report CRADA No. TC02159.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barbee, T. W.; Schena, D.

    This was a collaborative effort between Lawrence Livermore National Security, LLC as manager and operator of Lawrence Livermore National Laboratory (LLNL) and TroyCap LLC, to develop manufacturing steps for commercial production of nano-structure capacitors. The technical objective of this project was to demonstrate high deposition rates of selected dielectric materials which are 2 to 5 times larger than typical using current technology.

  2. Virtualization of open-source secure web services to support data exchange in a pediatric critical care research network

    PubMed Central

    Sward, Katherine A; Newth, Christopher JL; Khemani, Robinder G; Cryer, Martin E; Thelen, Julie L; Enriquez, Rene; Shaoyu, Su; Pollack, Murray M; Harrison, Rick E; Meert, Kathleen L; Berg, Robert A; Wessel, David L; Shanley, Thomas P; Dalton, Heidi; Carcillo, Joseph; Jenkins, Tammara L; Dean, J Michael

    2015-01-01

    Objectives To examine the feasibility of deploying a virtual web service for sharing data within a research network, and to evaluate the impact on data consistency and quality. Material and Methods Virtual machines (VMs) encapsulated an open-source, semantically and syntactically interoperable secure web service infrastructure along with a shadow database. The VMs were deployed to 8 Collaborative Pediatric Critical Care Research Network Clinical Centers. Results Virtual web services could be deployed in hours. The interoperability of the web services reduced format misalignment from 56% to 1% and demonstrated that 99% of the data consistently transferred using the data dictionary and 1% needed human curation. Conclusions Use of virtualized open-source secure web service technology could enable direct electronic abstraction of data from hospital databases for research purposes. PMID:25796596

  3. Image-based electronic patient records for secured collaborative medical applications.

    PubMed

    Zhang, Jianguo; Sun, Jianyong; Yang, Yuanyuan; Liang, Chenwen; Yao, Yihong; Cai, Weihua; Jin, Jin; Zhang, Guozhen; Sun, Kun

    2005-01-01

    We developed a Web-based system to interactively display image-based electronic patient records (EPR) for secured intranet and Internet collaborative medical applications. The system consists of four major components: EPR DICOM gateway (EPR-GW), Image-based EPR repository server (EPR-Server), Web Server and EPR DICOM viewer (EPR-Viewer). In the EPR-GW and EPR-Viewer, the security modules of Digital Signature and Authentication are integrated to perform the security processing on the EPR data with integrity and authenticity. The privacy of EPR in data communication and exchanging is provided by SSL/TLS-based secure communication. This presentation gave a new approach to create and manage image-based EPR from actual patient records, and also presented a way to use Web technology and DICOM standard to build an open architecture for collaborative medical applications.

  4. Tensions of network security and collaborative work practice: understanding a single sign-on deployment in a regional hospital.

    PubMed

    Heckle, Rosa R; Lutters, Wayne G

    2011-08-01

    Healthcare providers and their IT staff, working in an effort to balance appropriate accessibility with stricter security mandates, are considering the use of a single network sign-on approach for authentication and password management. Single sign-on (SSO) promises to improve usability of authentication for multiple-system users, increase compliance, and help curb system maintenance costs. However, complexities are introduced when SSO is placed within a collaborative environment. These complexities include unanticipated workflow implications that introduce greater security vulnerability for the individual user. OBJECTIVES AND METHODOLOGY: In this work, we examine the challenges of implementing a single sign-on authentication technology in a hospital environment. The aim of the study was to document the factors that affected SSO adoption within the context of use. The ultimate goal is to better inform the design of usable authentication systems within collaborative healthcare work sites. The primary data collection techniques used are ethnographically informed - observation, contextual interviews, and document review. The study included a cross-section of individuals from various departments and varying rolls. These participants were a mix of both clinical and administrative staff, as well as the Information Technology group. The field work revealed fundamental mis-matches between the technology and routine work practices that will significantly impact its effective adoption. While single sign-on was effective in the administrative offices, SSO was not a good fit for collaborative areas. The collaborative needs of the clinical staff unearthed tensions in its implementation. An analysis of the findings revealed that the workflow, activities, and physical environment of the clinical areas create increased security vulnerabilities for the individual user. The clinical users were cognizant of these vulnerabilities and this created resistance to the implementation due to a concern for privacy. From a preliminary analysis of our on-going field study at a community hospital, there appears to be a number of mismatches between the SSO vision and the realities of routine work. While we cannot conclusively say if a SSO adoption will be effective in meeting its goals in a hospital environment, we do know that it will affect the work practice and that will make the management of the SSO system problematic. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  5. Shopping For Danger: E-commerce techniques applied to collaboration in cyber security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bruce, Joseph R.; Fink, Glenn A.

    Collaboration among cyber security analysts is essential to a successful protection strategy on the Internet today, but it is uncommonly practiced or encouraged in operating environments. Barriers to productive collaboration often include data sensitivity, time and effort to communicate, institutional policy, and protection of domain knowledge. We propose an ambient collaboration framework, Vulcan, designed to remove the barriers of time and effort and mitigate the others. Vulcan automated data collection, collaborative filtering, and asynchronous dissemination, eliminating the effort implied by explicit collaboration among peers. We instrumented two analytic applications and performed a mock analysis session to build a dataset andmore » test the output of the system.« less

  6. Collaborating To Serve Arizona Students & Families More Effectively: Phase 1 Report. Evaluation of Murphy School District-Department of Economic Security Collaborative Project.

    ERIC Educational Resources Information Center

    Izu, Jo Ann; Carreon, Tori

    This report presents the results of Phase I of an evaluation of the Murphy School District (MSD)-Department of Economic Security (DES) collaborative effort, one of the first interagency partnerships in the state of Arizona that attempts to address the needs of students and their families more effectively. The primary purposes of the evaluation are…

  7. Fiber Based Optical Amplifier for High Energy Laser Pulses Final Report CRADA No. TC02100.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Messerly, M.; Cunningham, P.

    This was a collaborative effort between Lawrence Livermore National Security, LLC (formerly The Regents of the University of California)/Lawrence Livermore National Laboratory (LLNL), and The Boeing Company to develop an optical fiber-based laser amplifier capable of producing and sustaining very high-energy, nanosecond-scale optical pulses. The overall technical objective of this CRADA was to research, design, and develop an optical fiber-based amplifier that would meet specific metrics.

  8. How Strong are Passwords Used to Protect Personal Health Information in Clinical Trials?

    PubMed Central

    Moreau, Katherine; Jonker, Elizabeth

    2011-01-01

    Background Findings and statements about how securely personal health information is managed in clinical research are mixed. Objective The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Methods Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. Results We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. Conclusion If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices. PMID:21317106

  9. Collaboration between civilian and military healthcare professionals: a better way for planning, preparing, and responding to all hazard domestic events.

    PubMed

    Marklund, LeRoy A; Graham, Adrienne M; Morton, Patricia G; Hurst, Charles G; Motola, Ivette; Robinson, Donald W; Kelley, Vivian A; Elenberg, Kimberly J; Russler, Michael F; Boehm, Daniel E; Higgins, Dawn M; McAndrew, Patrick E; Williamson, Hope M; Atwood, Rodney D; Huebner, Kermit D; Brotons, Angel A; Miller, Geoffrey T; Rimpel, Laukton Y; Harris, Larry L; Santiago, Manuel; Cantrell, LeRoy

    2010-01-01

    Collaboration is used by the US National Security Council as a means to integrate inter-federal government agencies during planning and execution of common goals towards unified, national security. The concept of collaboration has benefits in the healthcare system by building trust, sharing resources, and reducing costs. The current terrorist threats have made collaborative medical training between military and civilian agencies crucial. This review summarizes the long and rich history of collaboration between civilians and the military in various countries and provides support for the continuation and improvement of collaborative efforts. Through collaboration, advances in the treatment of injuries have been realized, deaths have been reduced, and significant strides in the betterment of the Emergency Medical System have been achieved. This review promotes collaborative medical training between military and civilian medical professionals and provides recommendations for the future based on medical collaboration.

  10. Methodology for Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheldon, Frederick T; Abercrombie, Robert K; Mili, Ali

    2009-01-01

    Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing compliance pressures require careful consideration and adaptation. This paper proposes a Cyberspace Security Econometrics System (CSES) that provides a measure (i.e., a quantitative indication) of reliability, performance and/or safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. Formore » a given stakeholder, CSES reflects the variance that may exist among the stakes she/he attaches to meeting each requirement. This paper introduces the basis, objectives and capabilities for the CSES including inputs/outputs as well as the structural and mathematical underpinnings.« less

  11. Cyberspace Security Econometrics System (CSES) - U.S. Copyright TXu 1-901-039

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Schlicher, Bob G; Sheldon, Frederick T

    2014-01-01

    Information security continues to evolve in response to disruptive changes with a persistent focus on information-centric controls and a healthy debate about balancing endpoint and network protection, with a goal of improved enterprise/business risk management. Economic uncertainty, intensively collaborative styles of work, virtualization, increased outsourcing and ongoing compliance pressures require careful consideration and adaptation. The Cyberspace Security Econometrics System (CSES) provides a measure (i.e., a quantitative indication) of reliability, performance, and/or safety of a system that accounts for the criticality of each requirement as a function of one or more stakeholders interests in that requirement. For a given stakeholder, CSESmore » accounts for the variance that may exist among the stakes one attaches to meeting each requirement. The basis, objectives and capabilities for the CSES including inputs/outputs as well as the structural and mathematical underpinnings contained in this copyright.« less

  12. Spaceflight Operations Services Grid (SOSG) Project

    NASA Technical Reports Server (NTRS)

    Bradford, Robert; Lisotta, Anthony

    2004-01-01

    The motivation, goals, and objectives of the Space Operations Services Grid Project (SOSG) are covered in this viewgraph presentation. The goals and objectives of SOSG include: 1) Developing a grid-enabled prototype providing Space-based ground operations end user services through a collaborative effort between NASA, academia, and industry to assess the technical and cost feasibility of implementation of Grid technologies in the Space Operations arena; 2) Provide to space operations organizations and processes, through a single secure portal(s), access to all the information technology (Grid and Web based) services necessary for program/project development, operations and the ultimate creation of new processes, information and knowledge.

  13. Collaboration with the Local Community.

    ERIC Educational Resources Information Center

    Jackson, Michael L.; Cherrey, Cynthia

    2002-01-01

    Colleges and universities continually search for ways to enhance the safety and security of their educational programs and physical plant. This article examines how the University of Southern California and other institutions are using collaborative efforts with the local community to enhance their mutual safety and security through dynamic…

  14. Framework for Deploying a Virtualized Computing Environment for Collaborative and Secure Data Analytics

    PubMed Central

    Meyer, Adrian; Green, Laura; Faulk, Ciearro; Galla, Stephen; Meyer, Anne-Marie

    2016-01-01

    Introduction: Large amounts of health data generated by a wide range of health care applications across a variety of systems have the potential to offer valuable insight into populations and health care systems, but robust and secure computing and analytic systems are required to leverage this information. Framework: We discuss our experiences deploying a Secure Data Analysis Platform (SeDAP), and provide a framework to plan, build and deploy a virtual desktop infrastructure (VDI) to enable innovation, collaboration and operate within academic funding structures. It outlines 6 core components: Security, Ease of Access, Performance, Cost, Tools, and Training. Conclusion: A platform like SeDAP is not simply successful through technical excellence and performance. It’s adoption is dependent on a collaborative environment where researchers and users plan and evaluate the requirements of all aspects. PMID:27683665

  15. Security and Policy for Group Collaboration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ian Foster; Carl Kesselman

    2006-07-31

    “Security and Policy for Group Collaboration” was a Collaboratory Middleware research project aimed at providing the fundamental security and policy infrastructure required to support the creation and operation of distributed, computationally enabled collaborations. The project developed infrastructure that exploits innovative new techniques to address challenging issues of scale, dynamics, distribution, and role. To reduce greatly the cost of adding new members to a collaboration, we developed and evaluated new techniques for creating and managing credentials based on public key certificates, including support for online certificate generation, online certificate repositories, and support for multiple certificate authorities. To facilitate the integration ofmore » new resources into a collaboration, we improved significantly the integration of local security environments. To make it easy to create and change the role and associated privileges of both resources and participants of collaboration, we developed community wide authorization services that provide distributed, scalable means for specifying policy. These services make it possible for the delegation of capability from the community to a specific user, class of user or resource. Finally, we instantiated our research results into a framework that makes it useable to a wide range of collaborative tools. The resulting mechanisms and software have been widely adopted within DOE projects and in many other scientific projects. The widespread adoption of our Globus Toolkit technology has provided, and continues to provide, a natural dissemination and technology transfer vehicle for our results.« less

  16. Collaborating toward improving food security in Nunavut.

    PubMed

    Wakegijig, Jennifer; Osborne, Geraldine; Statham, Sara; Issaluk, Michelle Doucette

    2013-01-01

    Community members, Aboriginal organizations, public servants and academics have long been describing a desperate situation of food insecurity in the Eastern Canadian Arctic. The Nunavut Food Security Coalition, a partnership of Inuit Organizations and the Government of Nunavut, is collaborating to develop a territorial food security strategy to address pervasive food insecurity in the context of poverty reduction. The Nunavut Food Security Coalition has carried out this work using a community consultation model. The research was collected through community visits, stakeholder consultation and member checking at the Nunavut Food Security Symposium. In this paper, we describe a continuous course of action, based on community engagement and collective action, that has led to sustained political interest in and public mobilization around the issue of food insecurity in Nunavut. The process described in this article is a unique collaboration between multiple organizations that has led to the development of a sustainable partnership that will inform policy development while representing the voice of Nunavummiut.

  17. Opportunities for adaptive online collaboration to enhance rural land management.

    PubMed

    Baumber, Alex; Metternicht, Graciela; Ampt, Peter; Cross, Rebecca; Berry, Emily

    2018-08-01

    Cross-property cooperation has the potential to enhance the effectiveness of environmental management actions that cut across property boundaries. Online tools can facilitate this and overcome barriers to landholder engagement in collaborative management. However, collaborative online tools need to be designed and tailored to users' needs and values, and landholder participation in the development process is critical to ensuring uptake and long-term use. This article presents a case study from the Central Tablelands region of New South Wales, Australia, where landholders have been involved in participatory development of a new online collaboration tool. The case study results highlight the significance of issues such as internet access, privacy, technical proficiency and differing stakeholder objectives. A landholder survey identified mapping and the uploading of monitoring data as important functions for the online tool, but these were not rated as highly as functions relating to data security, sharing settings and key term searches. Consequently, we recommend that a future online collaboration tool for the region is not framed specifically as a mapping or citizen science tool, but rather as an adaptive collaboration and communication tool that can incorporate a variety of data types and formats and be modified over time in line with changing landholder needs. Copyright © 2018 Elsevier Ltd. All rights reserved.

  18. Role of farmer group institutions in increasing farm production and household food security

    NASA Astrophysics Data System (ADS)

    Rahmadanih; Bulkis, S.; Arsyad, M.; Amrullah, A.; Viantika, N. M.

    2018-05-01

    Food productions and food security are still becomes serious issue in agriculture development. The research objectives are (1) Examining the role of Farmer Group in increasing farm production and (2) Analyzing the role of Farmer Group in relationship with the household food security. The research was conducted in Soppeng District, South Sulawesi, Indonesia by taking unit of analysis at household level of Farmer Group members. Sample were 6 farmer groups, consisting of 365 households. The Results showed that the Farmer Group has a good role as a production, collaboration and market unit to increase farming production (score 2.3-2.6), but haven’t much impact to increase household food security. Rice production are 4.2 – 6.2 tons per hectare and household food security level are “low and marginal food secure” (mean score 4 and 6). Nevertheless, the role of Farmer Group showed a positive relationship with the level of household food security. So, it is necessarry to increase the role of Farmer Group in order to increase income and household food security based on Farmer Group’s needs and potencies through facilitation of (a) seed and water/irrigation availability, (b) preparing organization rules (AD/ART) and (c) appropriate training and education of food and nutrition.

  19. Coordinating UAV information for executing national security-oriented collaboration

    NASA Astrophysics Data System (ADS)

    Isenor, Anthony W.; Allard, Yannick; Lapinski, Anna-Liesa S.; Demers, Hugues; Radulescu, Dan

    2014-10-01

    Unmanned Aerial Vehicles (UAVs) are being used by numerous nations for defence-related missions. In some cases, the UAV is considered a cost-effective means to acquire data such as imagery over a location or object. Considering Canada's geographic expanse, UAVs are also being suggested as a potential platform for use in surveillance of remote areas, such as northern Canada. However, such activities are typically associated with security as opposed to defence. The use of a defence platform for security activities introduces the issue of information exchange between the defence and security communities and their software applications. This paper explores the flow of information from the system used by the UAVs employed by the Royal Canadian Navy. Multiple computers are setup, each with the information system used by the UAVs, including appropriate communication between the systems. Simulated data that may be expected from a typical maritime UAV mission is then fed into the information system. The information structures common to the Canadian security community are then used to store and transfer the simulated data. The resulting data flow from the defence-oriented UAV system to the security-oriented information structure is then displayed using an open source geospatial application. Use of the information structures and applications relevant to the security community avoids the distribution restrictions often associated with defence-specific applications.

  20. Business and public health collaboration for emergency preparedness in Georgia: a case study.

    PubMed

    Buehler, James W; Whitney, Ellen A; Berkelman, Ruth L

    2006-11-20

    Governments may be overwhelmed by a large-scale public health emergency, such as a massive bioterrorist attack or natural disaster, requiring collaboration with businesses and other community partners to respond effectively. In Georgia, public health officials and members of the Business Executives for National Security have successfully collaborated to develop and test procedures for dispensing medications from the Strategic National Stockpile. Lessons learned from this collaboration should be useful to other public health and business leaders interested in developing similar partnerships. The authors conducted a case study based on interviews with 26 government, business, and academic participants in this collaboration. The partnership is based on shared objectives to protect public health and assure community cohesion in the wake of a large-scale disaster, on the recognition that acting alone neither public health agencies nor businesses are likely to manage such a response successfully, and on the realization that business and community continuity are intertwined. The partnership has required participants to acknowledge and address multiple challenges, including differences in business and government cultures and operational constraints, such as concerns about the confidentiality of shared information, liability, and the limits of volunteerism. The partnership has been facilitated by a business model based on defining shared objectives, identifying mutual needs and vulnerabilities, developing carefully-defined projects, and evaluating proposed project methods through exercise testing. Through collaborative engagement in progressively more complex projects, increasing trust and understanding have enabled the partners to make significant progress in addressing these challenges. As a result of this partnership, essential relationships have been established, substantial private resources and capabilities have been engaged in government preparedness programs, and a model for collaborative, emergency mass dispensing of pharmaceuticals has been developed, tested, and slated for expansion. The lessons learned from this collaboration in Georgia should be considered by other government and business leaders seeking to develop similar partnerships.

  1. Business and public health collaboration for emergency preparedness in Georgia: a case study

    PubMed Central

    Buehler, James W; Whitney, Ellen A; Berkelman, Ruth L

    2006-01-01

    Background Governments may be overwhelmed by a large-scale public health emergency, such as a massive bioterrorist attack or natural disaster, requiring collaboration with businesses and other community partners to respond effectively. In Georgia, public health officials and members of the Business Executives for National Security have successfully collaborated to develop and test procedures for dispensing medications from the Strategic National Stockpile. Lessons learned from this collaboration should be useful to other public health and business leaders interested in developing similar partnerships. Methods The authors conducted a case study based on interviews with 26 government, business, and academic participants in this collaboration. Results The partnership is based on shared objectives to protect public health and assure community cohesion in the wake of a large-scale disaster, on the recognition that acting alone neither public health agencies nor businesses are likely to manage such a response successfully, and on the realization that business and community continuity are intertwined. The partnership has required participants to acknowledge and address multiple challenges, including differences in business and government cultures and operational constraints, such as concerns about the confidentiality of shared information, liability, and the limits of volunteerism. The partnership has been facilitated by a business model based on defining shared objectives, identifying mutual needs and vulnerabilities, developing carefully-defined projects, and evaluating proposed project methods through exercise testing. Through collaborative engagement in progressively more complex projects, increasing trust and understanding have enabled the partners to make significant progress in addressing these challenges. Conclusion As a result of this partnership, essential relationships have been established, substantial private resources and capabilities have been engaged in government preparedness programs, and a model for collaborative, emergency mass dispensing of pharmaceuticals has been developed, tested, and slated for expansion. The lessons learned from this collaboration in Georgia should be considered by other government and business leaders seeking to develop similar partnerships. PMID:17116256

  2. Addressing Urban Health in Detroit, New York City, and Seattle Through Community-Based Participatory Research Partnerships

    PubMed Central

    Metzler, Marilyn M.; Higgins, Donna L.; Beeker, Carolyn G.; Freudenberg, Nicholas; Lantz, Paula M.; Senturia, Kirsten D.; Eisinger, Alison A.; Viruell-Fuentes, Edna A.; Gheisar, Bookda; Palermo, Ann-Gel; Softley, Donald

    2003-01-01

    Objective. This study describes key activities integral to the development of 3 community-based participatory research (CBPR) partnerships. Methods. We compared findings from individual case studies conducted at 3 urban research centers (URCs) to identify crosscutting adaptations of a CBPR approach in the first 4 years of the partnerships’ development. Results. Activities critical in partnership development include sharing decisionmaking, defining principles of collaboration, establishing research priorities, and securing funding. Intermediate outcomes were sustained CBPR partnerships, trust within the partnerships, public health research programs, and increased capacity to conduct CBPR. Challenges included the time needed for meaningful collaboration, concerns regarding sustainable funding, and issues related to institutional racism. Conclusions. The URC experiences suggest that CBPR can be successfully implemented in diverse settings. PMID:12721148

  3. Sensor Authentication in Collaborating Sensor Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bielefeldt, Jake Uriah

    2014-11-01

    In this thesis, we address a new security problem in the realm of collaborating sensor networks. By collaborating sensor networks, we refer to the networks of sensor networks collaborating on a mission, with each sensor network is independently owned and operated by separate entities. Such networks are practical where a number of independent entities can deploy their own sensor networks in multi-national, commercial, and environmental scenarios, and some of these networks will integrate complementary functionalities for a mission. In the scenario, we address an authentication problem wherein the goal is for the Operator O i of Sensor Network S imore » to correctly determine the number of active sensors in Network Si. Such a problem is challenging in collaborating sensor networks where other sensor networks, despite showing an intent to collaborate, may not be completely trustworthy and could compromise the authentication process. We propose two authentication protocols to address this problem. Our protocols rely on Physically Unclonable Functions, which are a hardware based authentication primitive exploiting inherent randomness in circuit fabrication. Our protocols are light-weight, energy efficient, and highly secure against a number of attacks. To the best of our knowledge, ours is the first to addresses a practical security problem in collaborating sensor networks.« less

  4. CCSDS - Advancing Spaceflight Technology for International Collaboration

    NASA Technical Reports Server (NTRS)

    Kearney, Mike; Kiely, Aaron; Yeh, Penshu; Gerner, Jean-Luc; Calzolari, Gian-Paolo; Gifford, Kevin; Merri, Mario; Weiss, Howard

    2010-01-01

    The Consultative Committee for Space Data Systems (CCSDS) has been developing data and communications standards since 1982, with the objective of providing interoperability for enabling international collaboration for spaceflight missions. As data and communications technology has advanced, CCSDS has progressed to capitalize on existing products when available and suitable for spaceflight, and to develop innovative new approaches when available products fail. The current scope of the CCSDS architecture spans the end-to-end data architecture of a spaceflight mission, with ongoing efforts to develop and standardize cutting-edge technology. This manuscript describes the overall architecture, the position of CCSDS in the standards and international mission community, and some CCSDS processes. It then highlights in detail several of the most interesting and critical technical areas in work right now, and how they support collaborative missions. Special topics include: Delay/Disruption Tolerant Networking (DTN), Asynchronous Message Service (AMS), Multispectral/Hyperspectral Data Compression (MHDC), Coding and Synchronization, Onboard Wireless, Spacecraft Monitor and Control, Navigation, Security, and Time Synchronization/Correlation. Broad international participation in development of CCSDS standards is encouraged.

  5. Elements of ESA's policy on space and security

    NASA Astrophysics Data System (ADS)

    Giannopapa, Christina; Adriaensen, Maarten; Antoni, Ntorina; Schrogl, Kai-Uwe

    2018-06-01

    In the past decade Europe has been facing rising security threats, ranging from climate change, migrations, nearby conflicts and crises, to terrorism. The demand to tackle these critical challenges is increasing in Member States. Space is already contributing, and could further contribute with already existing systems and future ones. The increasing need for security in Europe and for safety and security of Europe's space activities has led to a growing number of activities in ESA in various domains. It has also driven new and strengthened partnerships with security stakeholders in Europe. At the European level, ESA is collaborating closely with the main European institutions dealing with space security. In addition, as an organisation ESA has evolved to conduct security-related projects and programmes and to address the threats to its own activities, thereby securing the investments of the Member States. Over the past years the Agency has set up a comprehensive regulatory framework in order to be able to cope with security related requirements. Over the past years, ESA has increased its exchanges with its Member States. The paper presents main elements of the ESA's policy on space and security. It introduces the current European context for space and security, the European goals in this domain and the specific objectives to which the Agency intends to contribute. Space and security in the ESA context is set out under two components: a) security from space and b) security in space, including the security of ESA's own activities (corporate security and the security of ESA's space missions). Subsequently, ESA's activities are elaborated around these two pillars, composed of different activities conducted in the most appropriate frameworks and in coordination with the relevant stakeholders and shareholders.

  6. Efficient Authorization of Rich Presence Using Secure and Composed Web Services

    NASA Astrophysics Data System (ADS)

    Li, Li; Chou, Wu

    This paper presents an extended Role-Based Access Control (RBAC) model for efficient authorization of rich presence using secure web services composed with an abstract presence data model. Following the information symmetry principle, the standard RBAC model is extended to support context sensitive social relations and cascaded authority. In conjunction with the extended RBAC model, we introduce an extensible presence architecture prototype using WS-Security and WS-Eventing to secure rich presence information exchanges based on PKI certificates. Applications and performance measurements of our presence system are presented to show that the proposed RBAC framework for presence and collaboration is well suited for real-time communication and collaboration.

  7. A security mediator for health care information.

    PubMed Central

    Wiederhold, G.; Bilello, M.; Sarathy, V.; Qian, X.

    1996-01-01

    The TIHI (Trusted Interoperation of Healthcare Information) project addresses a security issue that arises when some information is being shared among collaborating enterprises, although not all enterprise information is sharable. It assumes that protection exists to prevent intrusion by adversaries through secure transmission and firewalls. The TIHI system design provides a gateway, owned by the enterprise security officer, to mediate queries and responses. The latter are typically transmitted via the Internet. The enterprise policy is determined by rules provided to the mediator. We show examples of typical rules. The problem and our solution, although developed in a healthcare context, is equally valid among collaborating enterprises. PMID:8947640

  8. Security and Resilience | Grid Modernization | NREL

    Science.gov Websites

    Security and Resilience Security and Resilience NREL develops tools and solutions to enable a more Consortium, NREL collaborates with industry, academia, and other research organizations to find solutions to

  9. Enhancing international collaboration among early-career researchers

    PubMed Central

    Carroll, Jennifer K; Albada, Akke; Farahani, Mansoureh; Lithner, Maria; Neumann, Melanie; Sandhu, Harbinder; Shepherd, Heather L

    2010-01-01

    Objective The European Association of Communication in Healthcare (EACH) Early Career Researchers Network (ECRN) aims are to (1) promote international collaboration among young investigators and (2) provide a support network for future innovative communication research projects. In October 2009, Miami, USA at a workshop facilitated by the ECRN at the International Conference on Communication in Healthcare (ICCH) hosted by the American Academy of Communication in Healthcare we explored common facilitators and challenges faced by early career researchers in health communication research. Methods Attendees introduced themselves, their research area(s) of interest, and listed one facilitator and one barrier for their career development. EACH ECRN members then led a discussion of facilitators and challenges encountered in communication research projects and career development. We discussed potential collaboration opportunities, future goals, and activities. Results Having supportive collegial relationships, institutional support, job security, and funding are critical facilitators for early career investigators. Key challenges include difficulty with time management and prioritizing, limited resources, and contacts. Conclusion International collaboration among early career researchers is a feasible and effective means to address important challenges, by increasing opportunities for professional support and networking, problem-solving, discussion of data, and ultimately publishing. Practice Implications Future AACH-EACH Early Career Researcher Networks should continue to build collaborations by developing shared research projects, papers, and other scholarly products. PMID:20663630

  10. Social Software and National Security: An Initial Net Assessment

    DTIC Science & Technology

    2009-04-01

    networks. Government ignores this fact at its peril. Use of social software as ICT is creative and collaborative. Large corporations conduct...from the collaborative, distributed approaches promoted by responsible use of social software. Our recommendations are not exhaustive, but this... responsibilities are there for cyber security when using social software on government computers in a Web 2.0 environment?   67 This section might be

  11. A sharable cloud-based pancreaticoduodenectomy collaborative database for physicians: emphasis on security and clinical rule supporting.

    PubMed

    Yu, Hwan-Jeu; Lai, Hong-Shiee; Chen, Kuo-Hsin; Chou, Hsien-Cheng; Wu, Jin-Ming; Dorjgochoo, Sarangerel; Mendjargal, Adilsaikhan; Altangerel, Erdenebaatar; Tien, Yu-Wen; Hsueh, Chih-Wen; Lai, Feipei

    2013-08-01

    Pancreaticoduodenectomy (PD) is a major operation with high complication rate. Thereafter, patients may develop morbidity because of the complex reconstruction and loss of pancreatic parenchyma. A well-designed database is very important to address both the short-term and long-term outcomes after PD. The objective of this research was to build an international PD database implemented with security and clinical rule supporting functions, which made the data-sharing easier and improve the accuracy of data. The proposed system is a cloud-based application. To fulfill its requirements, the system comprises four subsystems: a data management subsystem, a clinical rule supporting subsystem, a short message notification subsystem, and an information security subsystem. After completing the surgery, the physicians input the data retrospectively, which are analyzed to study factors associated with post-PD common complications (delayed gastric emptying and pancreatic fistula) to validate the clinical value of this system. Currently, this database contains data from nearly 500 subjects. Five medical centers in Taiwan and two cancer centers in Mongolia are participating in this study. A data mining model of the decision tree analysis showed that elderly patients (>76 years) with pylorus-preserving PD (PPPD) have higher proportion of delayed gastric emptying. About the pancreatic fistula, the data mining model of the decision tree analysis revealed that cases with non-pancreaticogastrostomy (PG) reconstruction - body mass index (BMI)>29.65 or PG reconstruction - BMI>23.7 - non-classic PD have higher proportion of pancreatic fistula after PD. The proposed system allows medical staff to collect and store clinical data in a cloud, sharing the data with other physicians in a secure manner to achieve collaboration in research. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  12. Healthcare teams over the Internet: programming a certificate-based approach.

    PubMed

    Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I

    2003-07-01

    Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modern healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has, therefore, become a major concern. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security model is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control (HAC) security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.

  13. Healthcare teams over the Internet: towards a certificate-based approach.

    PubMed

    Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I

    2002-01-01

    Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modem healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has therefore become a major concern for healthcare applications over the Internet. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security policy is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.

  14. Information Sharing for IT Security Professionals

    ERIC Educational Resources Information Center

    Petersen, Rodney J.

    2008-01-01

    Information sharing is a core value for information technology (IT) security professionals. It is also a familiar concept for those who work at institutions of higher education because of their long history of collaboration and openness. Information sharing has become part of the national fabric as IT security professionals attempt to secure cyber…

  15. Radioactive source security: the cultural challenges.

    PubMed

    Englefield, Chris

    2015-04-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  16. The EGS Data Collaboration Platform: Enabling Scientific Discovery

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Weers, Jonathan D; Johnston, Henry; Huggins, Jay V

    Collaboration in the digital age has been stifled in recent years. Reasonable responses to legitimate security concerns have created a virtual landscape of silos and fortified castles incapable of sharing information efficiently. This trend is unfortunately opposed to the geothermal scientific community's migration toward larger, more collaborative projects. To facilitate efficient sharing of information between team members from multiple national labs, universities, and private organizations, the 'EGS Collab' team has developed a universally accessible, secure data collaboration platform and has fully integrated it with the U.S. Department of Energy's (DOE) Geothermal Data Repository (GDR) and the National Geothermal Data Systemmore » (NGDS). This paper will explore some of the challenges of collaboration in the modern digital age, highlight strategies for active data management, and discuss the integration of the EGS Collab data management platform with the GDR to enable scientific discovery through the timely dissemination of information.« less

  17. Establishing public health security in a postwar Iraq: constitutional obstacles and lessons for other federalizing states.

    PubMed

    Wilson, Kumanan; Fidler, David P; McDougall, Christopher W; Lazar, Harvey

    2009-06-01

    The public health consequences of the conflict in Iraq will likely continue after the violence has subsided. Reestablishing public health security will require large investments in infrastructure and the creation of effective systems of governance. On the question of governance, the allocation of powers in the new constitution of Iraq is critical. Given the ease with which public health threats cross borders, the constitution needs to grant to the federal government the legal authority to manage such threats and simultaneously meet international requirements. Unfortunately, the draft constitution does not accomplish this objective. If politically possible, the constitution should be amended to provide the federal government with this authority. If not possible, the Iraqi federal government would have two options. It could attempt to use alternative constitutional powers, such as national security powers. This option would be contentious and the results uncertain. Alternatively, the federal government could attempt to establish collaborative relationships with regional governments. Residual sectarian tensions create potential problems for this option, however. Reflecting on the Iraqi situation, we conclude that other federalizing countries emerging from conflict should ensure that their constitutions provide the federal government with the necessary authority to manage threats to public health security effectively.

  18. A cloud-based semantic wiki for user training in healthcare process management.

    PubMed

    Papakonstantinou, D; Poulymenopoulou, M; Malamateniou, F; Vassilacopoulos, G

    2011-01-01

    Successful healthcare process design requires active participation of users who are familiar with the cooperative and collaborative nature of healthcare delivery, expressed in terms of healthcare processes. Hence, a reusable, flexible, agile and adaptable training material is needed with the objective to enable users instill their knowledge and expertise in healthcare process management and (re)configuration activities. To this end, social software, such as a wiki, could be used as it supports cooperation and collaboration anytime, anywhere and combined with semantic web technology that enables structuring pieces of information for easy retrieval, reuse and exchange between different systems and tools. In this paper a semantic wiki is presented as a means for developing training material for healthcare providers regarding healthcare process management. The semantic wiki should act as a collective online memory containing training material that is accessible to authorized users, thus enhancing the training process with collaboration and cooperation capabilities. It is proposed that the wiki is stored in a secure virtual private cloud that is accessible from anywhere, be it an excessively open environment, while meeting the requirements of redundancy, high performance and autoscaling.

  19. Protecting Privacy of Shared Epidemiologic Data without Compromising Analysis Potential

    DOE PAGES

    Cologne, John; Grant, Eric J.; Nakashima, Eiji; ...

    2012-01-01

    Objective . Ensuring privacy of research subjects when epidemiologic data are shared with outside collaborators involves masking (modifying) the data, but overmasking can compromise utility (analysis potential). Methods of statistical disclosure control for protecting privacy may be impractical for individual researchers involved in small-scale collaborations. Methods . We investigated a simple approach based on measures of disclosure risk and analytical utility that are straightforward for epidemiologic researchers to derive. The method is illustrated using data from the Japanese Atomic-bomb Survivor population. Results . Masking by modest rounding did not adequately enhance security but rounding to remove several digits of relativemore » accuracy effectively reduced the risk of identification without substantially reducing utility. Grouping or adding random noise led to noticeable bias. Conclusions . When sharing epidemiologic data, it is recommended that masking be performed using rounding. Specific treatment should be determined separately in individual situations after consideration of the disclosure risks and analysis needs.« less

  20. Protecting Privacy of Shared Epidemiologic Data without Compromising Analysis Potential

    PubMed Central

    Cologne, John; Grant, Eric J.; Nakashima, Eiji; Chen, Yun; Funamoto, Sachiyo; Katayama, Hiroaki

    2012-01-01

    Objective. Ensuring privacy of research subjects when epidemiologic data are shared with outside collaborators involves masking (modifying) the data, but overmasking can compromise utility (analysis potential). Methods of statistical disclosure control for protecting privacy may be impractical for individual researchers involved in small-scale collaborations. Methods. We investigated a simple approach based on measures of disclosure risk and analytical utility that are straightforward for epidemiologic researchers to derive. The method is illustrated using data from the Japanese Atomic-bomb Survivor population. Results. Masking by modest rounding did not adequately enhance security but rounding to remove several digits of relative accuracy effectively reduced the risk of identification without substantially reducing utility. Grouping or adding random noise led to noticeable bias. Conclusions. When sharing epidemiologic data, it is recommended that masking be performed using rounding. Specific treatment should be determined separately in individual situations after consideration of the disclosure risks and analysis needs. PMID:22505949

  1. Public-Private Collaboration in the Department of Defense

    DTIC Science & Technology

    2012-07-01

    In his 2010 National Security Strategy, President Obama described partnerships between the public and private sector as critical to United States security at home and abroad. These Public-Private Collaborations (PPCs) offer potential opportunities to increase the Department s mission effectiveness by leveraging the capabilities, knowledge, processes, and infrastructure brought to bear by private sector entities. Additionally, given today s constrained budget environment, PPCs also provide opportunities for efficiency and cost reductions.

  2. Collaborative Access Control For Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  3. A Collaborative Secure Localization Algorithm Based on Trust Model in Underwater Wireless Sensor Networks

    PubMed Central

    Han, Guangjie; Liu, Li; Jiang, Jinfang; Shu, Lei; Rodrigues, Joel J.P.C.

    2016-01-01

    Localization is one of the hottest research topics in Underwater Wireless Sensor Networks (UWSNs), since many important applications of UWSNs, e.g., event sensing, target tracking and monitoring, require location information of sensor nodes. Nowadays, a large number of localization algorithms have been proposed for UWSNs. How to improve location accuracy are well studied. However, few of them take location reliability or security into consideration. In this paper, we propose a Collaborative Secure Localization algorithm based on Trust model (CSLT) for UWSNs to ensure location security. Based on the trust model, the secure localization process can be divided into the following five sub-processes: trust evaluation of anchor nodes, initial localization of unknown nodes, trust evaluation of reference nodes, selection of reference node, and secondary localization of unknown node. Simulation results demonstrate that the proposed CSLT algorithm performs better than the compared related works in terms of location security, average localization accuracy and localization ratio. PMID:26891300

  4. Organizational Legitimacy of International Research Collaborations: Crossing Boundaries in the Middle East

    ERIC Educational Resources Information Center

    Oleksiyenko, Anatoly

    2013-01-01

    Cross-border academic collaborations in conflict zones are vulnerable to escalated turbulence, liability concerns and flagging support. Multi-level stakeholder engagement at home and abroad is essential for securing the political and financial sustainability of such collaborations. This study examines the multilayered stakeholder arrangements…

  5. Collaboration between Supported Employment and Human Resource Services: Strategies for Success

    ERIC Educational Resources Information Center

    Post, Michal; Campbell, Camille; Heinz, Tom; Kotsonas, Lori; Montgomery, Joyce; Storey, Keith

    2010-01-01

    The article presents the benefits of successful collaboration between supported employment agencies and human resource managers when working together to secure employment for individuals with disabilities. Two case studies are presented: one involving a successful collaboration with county human resource managers in negotiating a change in the…

  6. Managing security risks for inter-organisational information systems: a multiagent collaborative model

    NASA Astrophysics Data System (ADS)

    Feng, Nan; Wu, Harris; Li, Minqiang; Wu, Desheng; Chen, Fuzan; Tian, Jin

    2016-09-01

    Information sharing across organisations is critical to effectively managing the security risks of inter-organisational information systems. Nevertheless, few previous studies on information systems security have focused on inter-organisational information sharing, and none have studied the sharing of inferred beliefs versus factual observations. In this article, a multiagent collaborative model (MACM) is proposed as a practical solution to assess the risk level of each allied organisation's information system and support proactive security treatment by sharing beliefs on event probabilities as well as factual observations. In MACM, for each allied organisation's information system, we design four types of agents: inspection agent, analysis agent, control agent, and communication agent. By sharing soft findings (beliefs) in addition to hard findings (factual observations) among the organisations, each organisation's analysis agent is capable of dynamically predicting its security risk level using a Bayesian network. A real-world implementation illustrates how our model can be used to manage security risks in distributed information systems and that sharing soft findings leads to lower expected loss from security risks.

  7. Secure FAST: Security Enhancement in the NATO Time Sensitive Targeting Tool

    DTIC Science & Technology

    2010-11-01

    designed to aid in the tracking and prosecuting of Time Sensitive Targets. The FAST tool provides user level authentication and authorisation in terms...level authentication and authorisation in terms of security. It uses operating system level security but does not provide application level security for...and collaboration tool, designed to aid in the tracking and prosecuting of Time Sensitive Targets. The FAST tool provides user level authentication and

  8. Why information security belongs on the CFO's agenda.

    PubMed

    Quinnild, James; Fusile, Jeff; Smith, Cindy

    2006-02-01

    Healthcare financial executives need to understand the complex and growing role of information security in supporting the business of health care. The biggest security gaps in healthcare organizations occur in strategy and centralization, business executive preparation, and protected health information. CFOs should collaborate with the CIO in engaging a comprehensive framework to develop, implement, communicate, and maintain an enterprisewide information security strategy.

  9. Bridging the Gap in Port Security; Network Centric Theory Applied to Public/Private Collaboration

    DTIC Science & Technology

    2007-03-01

    commercial_enforcement/ ctpat /security_guideline/guideline_port.xml [Accessed January 2, 2007] 16 The four core elements of CSI include:36 • Identify high...www.cbp.gov/xp/cgov/import/commercial_enforcement/ ctpat /security_guideline/guideline_port.xml [Accessed January 2, 2007]. 17 Connecting them

  10. A new security model for collaborative environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Agarwal, Deborah; Lorch, Markus; Thompson, Mary

    Prevalent authentication and authorization models for distributed systems provide for the protection of computer systems and resources from unauthorized use. The rules and policies that drive the access decisions in such systems are typically configured up front and require trust establishment before the systems can be used. This approach does not work well for computer software that moderates human-to-human interaction. This work proposes a new model for trust establishment and management in computer systems supporting collaborative work. The model supports the dynamic addition of new users to a collaboration with very little initial trust placed into their identity and supportsmore » the incremental building of trust relationships through endorsements from established collaborators. It also recognizes the strength of a users authentication when making trust decisions. By mimicking the way humans build trust naturally the model can support a wide variety of usage scenarios. Its particular strength lies in the support for ad-hoc and dynamic collaborations and the ubiquitous access to a Computer Supported Collaboration Workspace (CSCW) system from locations with varying levels of trust and security.« less

  11. Optimal response to attacks on the open science grids.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in themore » grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.« less

  12. Development of a consortium for water security and safety: Planning for an early warning system

    USGS Publications Warehouse

    Clark, R.M.; Adam, N.R.; Atluri, V.; Halem, M.; Vowinkel, E.F.; ,

    2004-01-01

    The events of September 11, 2001 have raised concerns over the safety and security of the Nation's critical infrastructure including water and waste water systems. In June 2002, the U.S. EPA's Region II Office (New York City), in response to concerns over water security, in collaboration with Rutgers University agreed to establish a Regional Drinking Water Security and Safety Consortium (RDWSSC). Members of the consortium include: Rutgers University's Center for Information Management, Integration and Connectivity (CIMIC), American Water (AW), the Passaic Valley Water Commission (PVWC), the North Jersey District Water Supply Commission (NJDWSC), the N.J. Department of Environmental Protection, the U.S. Geological Survey (USGS), and the U.S. Environmental Protection Agencies, Region II Office. In December of 2002 the consortium members signed a memorandum of understanding (MOU) to pursue activities to enhance regional water security. Development of an early warning system for source and distributed water was identified as being of primary importance by the consortium. In this context, an early warning system (EWS) is an integrated system of monitoring stations located at strategic points in a water utilities source waters or in its distribution system, designed to warn against contaminants that might threaten the health and welfare of drinking water consumers. This paper will discuss the consortium's progress in achieving these important objectives.

  13. Cryptographic framework for document-objects resulting from multiparty collaborative transactions.

    PubMed

    Goh, A

    2000-01-01

    Multiparty transactional frameworks--i.e. Electronic Data Interchange (EDI) or Health Level (HL) 7--often result in composite documents which can be accurately modelled using hyperlinked document-objects. The structural complexity arising from multiauthor involvement and transaction-specific sequencing would be poorly handled by conventional digital signature schemes based on a single evaluation of a one-way hash function and asymmetric cryptography. In this paper we outline the generation of structure-specific authentication hash-trees for the the authentication of transactional document-objects, followed by asymmetric signature generation on the hash-tree value. Server-side multi-client signature verification would probably constitute the single most compute-intensive task, hence the motivation for our usage of the Rabin signature protocol which results in significantly reduced verification workloads compared to the more commonly applied Rivest-Shamir-Adleman (RSA) protocol. Data privacy is handled via symmetric encryption of message traffic using session-specific keys obtained through key-negotiation mechanisms based on discrete-logarithm cryptography. Individual client-to-server channels can be secured using a double key-pair variation of Diffie-Hellman (DH) key negotiation, usage of which also enables bidirectional node authentication. The reciprocal server-to-client multicast channel is secured through Burmester-Desmedt (BD) key-negotiation which enjoys significant advantages over the usual multiparty extensions to the DH protocol. The implementation of hash-tree signatures and bi/multidirectional key negotiation results in a comprehensive cryptographic framework for multiparty document-objects satisfying both authentication and data privacy requirements.

  14. Lessons from collaborative governance and sociobiology theories for reinforcing sustained cooperation: a government food security case study.

    PubMed

    Montoya, L A; Montoya, I; Sánchez González, O D

    2015-07-01

    This research aimed to understand how cooperation and collaboration work in interagency arrangements using a case study of the public management of food security and nutrition in Bogotá, Colombia. This study explored the available scientific literature on Collaborative Governance within the Public Management body of knowledge and the literature on Cooperation from the Sociobiology field. Then, proposals were developed for testing on the ground through an action-research effort that was documented as a case study. Finally, observations were used to test the proposals and some analytical generalizations were developed. To document the case study, several personal interviews, file reviews and normative reviews were conducted to generate a case study database. Collaboration and cooperation concepts within the framework of interagency public management can be understood as a shared desirable outcome that unites different agencies in committing efforts and resources to the accomplishment of a common goal for society, as seen in obtaining food and nutrition security for a specific territory. Collaboration emerges when the following conditions exist and decreases when they are absent: (1) a strong sponsorship that may come from a central government policy or from a distributed interagency consensus; (2) a clear definition of the participating agencies; (3) stability of the staff assigned to the coordination system; and (4) a fitness function for the staff, some mechanism to reward or punish the collaboration level of each individual in the interagency effort. As this research investigated only one case study, the findings must be taken with care and any generalization made from this study needs to be analytical in nature. Additionally, research must be done to accept these results universally. Food security and nutrition efforts are interagency in nature. For collaboration between agencies to emerge, a minimum set of characteristics that were established during the merging of the public management and sociobiology fields of knowledge and validated by means of a case study must be accomplished. Copyright © 2015 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  15. 14 CFR 1203.201 - Information security objectives.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...

  16. 14 CFR 1203.201 - Information security objectives.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...

  17. Studies of Short Time Response Options for Potentially Hazardous Objects: Current and Forthcoming Results

    NASA Technical Reports Server (NTRS)

    Barbee, Brent W.; Greenaugh, Kevin C.; Seery, Bernard D.; Bambacus, Myra; Leung, Ronald Y.; Finewood, Lee; Dearborn, David S. P.; Miller, Paul L.; Weaver, Robert P.; Plesko, Catherine; hide

    2017-01-01

    NASA's Goddard Space Flight Center (GSFC) and the National Nuclear Security Administration (NNSA), Department of Energy (DOE) National Laboratories, Lawrence Livermore National Laboratory (LLNL), Los Alamos National Laboratory(LANL), and Sandia National Laboratory (SNL) are collaborating on Planetary Defense Research. The research program is organized around three case studies: 1. Deflection of the Potentially Hazardous Asteroid (PHA) 101955 Bennu (1999 RQ36)[OSIRIS-REx mission target], 2. Deflection of the secondary member of the PHA 65803 Didymos (1996 GT) [DART mission target], 3. Deflection of a scaled-down version of the comet 67PChuryumov-Gerasimenko [Rosetta mission target]. NASAGSFC is providing astrodynamics and spacecraft mission design expertise, while NNSA, DOE, LLNL, LANL and SNL are providing expertise in modeling the effects of kinetic impactor spacecraft and nuclear explosive devices on the target objects.

  18. How strong are passwords used to protect personal health information in clinical trials?

    PubMed

    El Emam, Khaled; Moreau, Katherine; Jonker, Elizabeth

    2011-02-11

    Findings and statements about how securely personal health information is managed in clinical research are mixed. The objective of our study was to evaluate the security of practices used to transfer and share sensitive files in clinical trials. Two studies were performed. First, 15 password-protected files that were transmitted by email during regulated Canadian clinical trials were obtained. Commercial password recovery tools were used on these files to try to crack their passwords. Second, interviews with 20 study coordinators were conducted to understand file-sharing practices in clinical trials for files containing personal health information. We were able to crack the passwords for 93% of the files (14/15). Among these, 13 files contained thousands of records with sensitive health information on trial participants. The passwords tended to be relatively weak, using common names of locations, animals, car brands, and obvious numeric sequences. Patient information is commonly shared by email in the context of query resolution. Files containing personal health information are shared by email and, by posting them on shared drives with common passwords, to facilitate collaboration. If files containing sensitive patient information must be transferred by email, mechanisms to encrypt them and to ensure that password strength is high are necessary. More sophisticated collaboration tools are required to allow file sharing without password sharing. We provide recommendations to implement these practices.

  19. A governor's guide to emergency management. Volume two : homeland security

    DOT National Transportation Integrated Search

    2002-09-19

    Homeland security is a complex challenge that demands significant investment; collaboration among local, state, and federal governments; and integration with the private sector. The purpose of A Governor's Guide to Emergency Management Volume Two: Ho...

  20. NREL Workshop Convenes Industry Experts on Cybersecurity and an Evolving

    Science.gov Websites

    silos in a field that demands greater collaboration, and the benefits of systemic security architecture groups to identify possible solutions to the challenges in securing DERs-from a technology, business, and

  1. Atypical dimensions of caregiver–adolescent interaction in an economically disadvantaged sample

    PubMed Central

    Kobak, Roger; Zajac, Kristyn; Abbott, Caroline; Zisk, Abby; Bounoua, Nadia

    2018-01-01

    The Goal-corrected Partnership Adolescent Coding System (GPACS) has shown promise in assessing a secure as well as three atypical patterns of parent-adolescent interaction during a conflict discussion. The current study of 186 economically disadvantaged families examines the degree to which four GPACS patterns: Secure/Collaborative, Punitive, Role Confused and Disoriented—account for residual change in adolescents’ social competence and maladaptive behavior (internalizing, externalizing, and risk behaviors) between ages 13 to 15. Adolescents from Secure/Collaborative dyads at age 13 were more likely to have a secure state of mind in the AAI at age 15 and showed increases in teachers’ ratings of empathy and decreases in teachers’ ratings of externalizing behaviors between ages 13 and 15. Adolescents in Disoriented dyads showed a dramatic increase in teacher-rated internalizing problems, while male adolescents in Role Confused dyads reported increased involvement in risk behaviors including unprotected sexual activity and substance use problems. PMID:28401833

  2. Risk of Zika virus transmission in the Euro-Mediterranean area and the added value of building preparedness to arboviral threats from a One Health perspective.

    PubMed

    Escadafal, Camille; Gaayeb, Lobna; Riccardo, Flavia; Pérez-Ramírez, Elisa; Picard, Marie; Dente, Maria Grazia; Fernández-Pinero, Jovita; Manuguerra, Jean-Claude; Jiménez-Clavero, Miguel-Ángel; Declich, Silvia; Victoir, Kathleen; Robert, Vincent

    2016-12-03

    In the alarming context of risk of Zika virus (ZIKV) transmission in the Euro-Mediterranean area, there is a need to examine whether capacities to detect, diagnose and notify ZIKV infections in the region are in place and whether ongoing capacity-building initiatives are filling existing gaps.The MediLabSecure network, created in 2014, comprises 55 laboratories of virology and medical entomology and 19 public health institutions in 19 countries in the Balkans, North-Africa, the Middle-East and the Black Sea regions. It aims to set up awareness, risk assessment, monitoring and control of emerging and re-emerging vector-borne viruses. We here examine the actions and strategies that MediLabSecure has been implementing and how they will contribute to the prevention and control of the ZIKV threat in the Euro-Mediterranean area.Capacity-building for arbovirus diagnostics is a major objective of the project and follows a methodological rather than disease-driven approach. This enables the implementation of laboratory trainings on techniques that are common to several arboviruses, including ZIKV, and putting into action appropriate diagnostic tools in the target region.Moreover, by its One Health approach and the interaction of its four sub-networks in human virology, animal virology, medical entomology and public health, MediLabSecure is fostering intersectoral collaboration, expertise and sharing of information. The resulting exchanges (methodological, communication and operational) across disciplines and across countries, dedicated research on intersectoral collaboration and increasing diagnostic capacities are providing new paths and tools to public health professionals to face emerging viral threats such as a ZIKV epidemic in the Euro-Mediterranean region.

  3. Regional collaboration among Urban Area Security Initiative regions: results of the Johns Hopkins urban area survey.

    PubMed

    Errett, Nicole A; Bowman, Calvin; Barnett, Daniel J; Resnick, Beth A; Frattaroli, Shannon; Rutkow, Lainie

    2014-01-01

    Regional collaboration has been identified as a potential facilitator of public health preparedness efforts. The Urban Area Security Initiative (UASI) grant program, administered by the Federal Emergency Management Agency (FEMA) since 2003, has provided 64 high-risk metropolitan areas funding to enhance their regional preparedness capabilities. This study describes informal and formal regional collaboration infrastructure, as well as regional collaboration-related activities and assessment methods, in FFY2010 UASI regions. A cross-sectional online survey was administered via Survey Monkey from September through December 2013. Points of contact from FFY2010 funded UASI metropolitan areas completed the survey, with a response rate of 77.8% (n=49). Summary statistics were calculated to describe the current informal and formal regional collaboration infrastructure. Additionally, the cross-sectional survey collected rates of agreement with 8 collaborative preparedness statements at 3 time points. The survey found that UASI regions are engaging in collaborative activities and investments to build capabilities, with most collaboration occurring in the prevention, protection, and response mission areas. Collaborative relationships in preparedness among emergency managers and municipal chief executive officers improved during the FFY2010 UASI performance period compared to the pre-UASI award period, with lasting effects. The majority of UASI regions reported conducting independent assessments of capabilities and their measurement at the UASI region level. Urban areas that received a FFY2010 UASI grant award are engaging in collaborative activities and have established interjurisdictional relationships in preparedness. The use of grant funds to encourage collaboration in preparedness has the potential to leverage limited resources and promote informed investments.

  4. Goals, Strategies

    Science.gov Websites

    stability Science & Innovation Collaboration Careers Community Environment Science & Innovation . Provide a safe, secure, and effective stockpile Protect against the nuclear threat Counter emerging excellence STRATEGY We will create a modern workplace that is environmentally responsible, safe, and secure

  5. Enabling Efficient, Responsive, and Resilient Buildings: Collaboration Between the United States and India

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Basu, Chandrayee; Ghatikar, Girish

    The United States and India have among the largest economies in the world, and they continue to work together to address current and future challenges in reliable electricity supply. The acceleration to efficient, grid-responsive, resilient buildings represents a key energy security objective for federal and state agencies in both countries. The weaknesses in the Indian grid system were manifest in 2012, in the country’s worst blackout, which jeopardized the lives of half of India’s 1.2 billion people. While both countries are investing significantly in power sector reform, India, by virtue of its colossal growth rate in commercial energy intensity andmore » commercial floor space, is better placed than the United States to integrate and test state-of-art Smart Grid technologies in its future grid-responsive commercial buildings. This paper presents a roadmap of technical collaboration between the research organizations, and public-private stakeholders in both countries to accelerate the building-to-grid integration through pilot studies in India.« less

  6. The Sunrise project: An R&D project for a national information infrastructure prototype

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lee, Juhnyoung

    1995-02-01

    Sunrise is a Los Alamos National Laboratory (LANL) project started in October 1993. It is intended to a prototype National Information Infrastructure (NII) development project. A main focus of Sunrise is to tie together enabling technologies (networking, object-oriented distributed computing, graphical interfaces, security, multimedia technologies, and data mining technologies) with several specific applications. A diverse set of application areas was chosen to ensure that the solutions developed in the project are as generic as possible. Some of the application areas are materials modeling, medical records and image analysis, transportation simulations, and education. This paper provides a description of Sunrise andmore » a view of the architecture and objectives of this evolving project. The primary objectives of Sunrise are three-fold: (1) To develop common information-enabling tools for advanced scientific research and its applications to industry; (2) To enhance the capabilities of important research programs at the Laboratory; and (3) To define a new way of collaboration between computer science and industrially relevant research.« less

  7. A network-based distributed, media-rich computing and information environment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phillips, R.L.

    1995-12-31

    Sunrise is a Los Alamos National Laboratory (LANL) project started in October 1993. It is intended to be a prototype National Information Infrastructure development project. A main focus of Sunrise is to tie together enabling technologies (networking, object-oriented distributed computing, graphical interfaces, security, multi-media technologies, and data-mining technologies) with several specific applications. A diverse set of application areas was chosen to ensure that the solutions developed in the project are as generic as possible. Some of the application areas are materials modeling, medical records and image analysis, transportation simulations, and K-12 education. This paper provides a description of Sunrise andmore » a view of the architecture and objectives of this evolving project. The primary objectives of Sunrise are three-fold: (1) To develop common information-enabling tools for advanced scientific research and its applications to industry; (2) To enhance the capabilities of important research programs at the Laboratory; (3) To define a new way of collaboration between computer science and industrially-relevant research.« less

  8. Department of Defense International Space Cooperation Strategy

    DTIC Science & Technology

    2017-01-01

    Secretary of Defense on .January 18. 2017. the unclassified version provides DoD’s approach for invigorating cooperation and collaboration with trusted ...Cooperation Strategy (ISCS) establishes DoD’ s approach for invigorating cooperation and collaboration with trusted allies and partners across the...collaborating with trusted allies and partners to address shared security challenges by leveraging allies’ and partners ’ capabilities to enhance space mission

  9. Regional Collaboration Among Urban Area Security Initiative Regions: Results of the Johns Hopkins Urban Area Survey

    PubMed Central

    Bowman, Calvin; Barnett, Daniel J.; Resnick, Beth A.; Frattaroli, Shannon; Rutkow, Lainie

    2014-01-01

    Regional collaboration has been identified as a potential facilitator of public health preparedness efforts. The Urban Area Security Initiative (UASI) grant program, administered by the Federal Emergency Management Agency (FEMA) since 2003, has provided 64 high-risk metropolitan areas funding to enhance their regional preparedness capabilities. This study describes informal and formal regional collaboration infrastructure, as well as regional collaboration–related activities and assessment methods, in FFY2010 UASI regions. A cross-sectional online survey was administered via Survey Monkey from September through December 2013. Points of contact from FFY2010 funded UASI metropolitan areas completed the survey, with a response rate of 77.8% (n=49). Summary statistics were calculated to describe the current informal and formal regional collaboration infrastructure. Additionally, the cross-sectional survey collected rates of agreement with 8 collaborative preparedness statements at 3 time points. The survey found that UASI regions are engaging in collaborative activities and investments to build capabilities, with most collaboration occurring in the prevention, protection, and response mission areas. Collaborative relationships in preparedness among emergency managers and municipal chief executive officers improved during the FFY2010 UASI performance period compared to the pre-UASI award period, with lasting effects. The majority of UASI regions reported conducting independent assessments of capabilities and their measurement at the UASI region level. Urban areas that received a FFY2010 UASI grant award are engaging in collaborative activities and have established interjurisdictional relationships in preparedness. The use of grant funds to encourage collaboration in preparedness has the potential to leverage limited resources and promote informed investments. PMID:25398073

  10. Scalable Architecture for Federated Translational Inquiries Network (SAFTINet) Technology Infrastructure for a Distributed Data Network

    PubMed Central

    Schilling, Lisa M.; Kwan, Bethany M.; Drolshagen, Charles T.; Hosokawa, Patrick W.; Brandt, Elias; Pace, Wilson D.; Uhrich, Christopher; Kamerick, Michael; Bunting, Aidan; Payne, Philip R.O.; Stephens, William E.; George, Joseph M.; Vance, Mark; Giacomini, Kelli; Braddy, Jason; Green, Mika K.; Kahn, Michael G.

    2013-01-01

    Introduction: Distributed Data Networks (DDNs) offer infrastructure solutions for sharing electronic health data from across disparate data sources to support comparative effectiveness research. Data sharing mechanisms must address technical and governance concerns stemming from network security and data disclosure laws and best practices, such as HIPAA. Methods: The Scalable Architecture for Federated Translational Inquiries Network (SAFTINet) deploys TRIAD grid technology, a common data model, detailed technical documentation, and custom software for data harmonization to facilitate data sharing in collaboration with stakeholders in the care of safety net populations. Data sharing partners host TRIAD grid nodes containing harmonized clinical data within their internal or hosted network environments. Authorized users can use a central web-based query system to request analytic data sets. Discussion: SAFTINet DDN infrastructure achieved a number of data sharing objectives, including scalable and sustainable systems for ensuring harmonized data structures and terminologies and secure distributed queries. Initial implementation challenges were resolved through iterative discussions, development and implementation of technical documentation, governance, and technology solutions. PMID:25848567

  11. Scalable Architecture for Federated Translational Inquiries Network (SAFTINet) Technology Infrastructure for a Distributed Data Network.

    PubMed

    Schilling, Lisa M; Kwan, Bethany M; Drolshagen, Charles T; Hosokawa, Patrick W; Brandt, Elias; Pace, Wilson D; Uhrich, Christopher; Kamerick, Michael; Bunting, Aidan; Payne, Philip R O; Stephens, William E; George, Joseph M; Vance, Mark; Giacomini, Kelli; Braddy, Jason; Green, Mika K; Kahn, Michael G

    2013-01-01

    Distributed Data Networks (DDNs) offer infrastructure solutions for sharing electronic health data from across disparate data sources to support comparative effectiveness research. Data sharing mechanisms must address technical and governance concerns stemming from network security and data disclosure laws and best practices, such as HIPAA. The Scalable Architecture for Federated Translational Inquiries Network (SAFTINet) deploys TRIAD grid technology, a common data model, detailed technical documentation, and custom software for data harmonization to facilitate data sharing in collaboration with stakeholders in the care of safety net populations. Data sharing partners host TRIAD grid nodes containing harmonized clinical data within their internal or hosted network environments. Authorized users can use a central web-based query system to request analytic data sets. SAFTINet DDN infrastructure achieved a number of data sharing objectives, including scalable and sustainable systems for ensuring harmonized data structures and terminologies and secure distributed queries. Initial implementation challenges were resolved through iterative discussions, development and implementation of technical documentation, governance, and technology solutions.

  12. Applications Using High Flux LCS gamma-ray Beams: Nuclear Security and Contributions to Fukushima

    NASA Astrophysics Data System (ADS)

    Fujiwara, Mamoru

    2014-09-01

    Nuclear nonproliferation and security are an important issue for the peaceful use of nuclear energy. Many countries now collaborate together for preventing serious accidents from nuclear terrorism. Detection of hidden long-lived radioisotopes and fissionable nuclides in a non-destructive manner is useful for nuclear safeguards and management of nuclear wastes as well as nuclear security. After introducing the present situation concerning the nuclear nonproliferation and security in Japan, we plan to show the present activities of JAEA to detect the hidden nuclear materials by means of the nuclear resonance fluorescence with energy-tunable, monochromatic gamma-rays generated by Laser Compton Scattering (LCS) with an electron beam. The energy recovery linac (ERL) machine is now under development with the KEK-JAEA collaboration for realizing the new generation of gamma-ray sources. The detection technologies of nuclear materials are currently developed using the existing electron beam facilities at Duke University and at NewSubaru. These developments in Japan will contribute to the nuclear security program in Japan and to the assay of melted nuclear fuels in the Fukushima Daiichi nuclear power plants.

  13. Security Aspects of Computer Supported Collaborative Work

    DTIC Science & Technology

    1993-09-01

    unstructured tasks at one end 11 and prescriptive tasks at the other. Unstructured tasks are those requiring creative input from a number of users and...collaborative technology begun to mature, it has begun to outstrip prevailing management attitudes. One barrier to telecommuting is the perception that

  14. Policy reconciliation for access control in dynamic cross-enterprise collaborations

    NASA Astrophysics Data System (ADS)

    Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.

    2018-03-01

    In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.

  15. Can trainees design and deliver a national audit of epistaxis management? A pilot of a secure web-based audit tool and research trainee collaboratives.

    PubMed

    Mehta, N; Williams, R J; Smith, M E; Hall, A; Hardman, J C; Cheung, L; Ellis, M P; Fussey, J M; Lakhani, R; McLaren, O; Nankivell, P C; Sharma, N; Yeung, W; Carrie, S; Hopkins, C

    2017-06-01

    To investigate the feasibility of a national audit of epistaxis management led and delivered by a multi-region trainee collaborative using a web-based interface to capture patient data. Six trainee collaboratives across England nominated one site each and worked together to carry out this pilot. An encrypted data capture tool was adapted and installed within the infrastructure of a university secure server. Site-lead feedback was assessed through questionnaires. Sixty-three patients with epistaxis were admitted over a two-week period. Site leads reported an average of 5 minutes to complete questionnaires and described the tool as easy to use. Data quality was high, with little missing data. Site-lead feedback showed high satisfaction ratings for the project (mean, 4.83 out of 5). This pilot showed that trainee collaboratives can work together to deliver an audit using an encrypted data capture tool cost-effectively, whilst maintaining the highest levels of data quality.

  16. Use of a secure Internet Web site for collaborative medical research.

    PubMed

    Marshall, W W; Haley, R W

    2000-10-11

    Researchers who collaborate on clinical research studies from diffuse locations need a convenient, inexpensive, secure way to record and manage data. The Internet, with its World Wide Web, provides a vast network that enables researchers with diverse types of computers and operating systems anywhere in the world to log data through a common interface. Development of a Web site for scientific data collection can be organized into 10 steps, including planning the scientific database, choosing a database management software system, setting up database tables for each collaborator's variables, developing the Web site's screen layout, choosing a middleware software system to tie the database software to the Web site interface, embedding data editing and calculation routines, setting up the database on the central server computer, obtaining a unique Internet address and name for the Web site, applying security measures to the site, and training staff who enter data. Ensuring the security of an Internet database requires limiting the number of people who have access to the server, setting up the server on a stand-alone computer, requiring user-name and password authentication for server and Web site access, installing a firewall computer to prevent break-ins and block bogus information from reaching the server, verifying the identity of the server and client computers with certification from a certificate authority, encrypting information sent between server and client computers to avoid eavesdropping, establishing audit trails to record all accesses into the Web site, and educating Web site users about security techniques. When these measures are carefully undertaken, in our experience, information for scientific studies can be collected and maintained on Internet databases more efficiently and securely than through conventional systems of paper records protected by filing cabinets and locked doors. JAMA. 2000;284:1843-1849.

  17. Remote Library Access for Pharmacy Preceptors

    PubMed Central

    Soltis, Denise; Schott, Kathy

    2010-01-01

    Objective To institute and evaluate the response to a program providing access to electronic library resources for pharmacy preceptors. Design The pharmacy experiential office and the library collaborated using existing programs and technology to provide and market secure remote access for preceptors. Assessment Preceptor participation was tracked in the experiential office, and response to the program was assessed using an online survey instrument that included questions about use of and preference for specific library resources. Three hundred thirty-four adjunct faculty members registered, representing 34% of all preceptors with active e-mail accounts. Conclusion Preceptor participation in the program exceeded expectations. Some minor flaws in the logistics of delivering the service were identified and remedied. PMID:21179247

  18. Accelerating Cancer Systems Biology Research through Semantic Web Technology

    PubMed Central

    Wang, Zhihui; Sagotsky, Jonathan; Taylor, Thomas; Shironoshita, Patrick; Deisboeck, Thomas S.

    2012-01-01

    Cancer systems biology is an interdisciplinary, rapidly expanding research field in which collaborations are a critical means to advance the field. Yet the prevalent database technologies often isolate data rather than making it easily accessible. The Semantic Web has the potential to help facilitate web-based collaborative cancer research by presenting data in a manner that is self-descriptive, human and machine readable, and easily sharable. We have created a semantically linked online Digital Model Repository (DMR) for storing, managing, executing, annotating, and sharing computational cancer models. Within the DMR, distributed, multidisciplinary, and inter-organizational teams can collaborate on projects, without forfeiting intellectual property. This is achieved by the introduction of a new stakeholder to the collaboration workflow, the institutional licensing officer, part of the Technology Transfer Office. Furthermore, the DMR has achieved silver level compatibility with the National Cancer Institute’s caBIG®, so users can not only interact with the DMR through a web browser but also through a semantically annotated and secure web service. We also discuss the technology behind the DMR leveraging the Semantic Web, ontologies, and grid computing to provide secure inter-institutional collaboration on cancer modeling projects, online grid-based execution of shared models, and the collaboration workflow protecting researchers’ intellectual property. PMID:23188758

  19. Accelerating cancer systems biology research through Semantic Web technology.

    PubMed

    Wang, Zhihui; Sagotsky, Jonathan; Taylor, Thomas; Shironoshita, Patrick; Deisboeck, Thomas S

    2013-01-01

    Cancer systems biology is an interdisciplinary, rapidly expanding research field in which collaborations are a critical means to advance the field. Yet the prevalent database technologies often isolate data rather than making it easily accessible. The Semantic Web has the potential to help facilitate web-based collaborative cancer research by presenting data in a manner that is self-descriptive, human and machine readable, and easily sharable. We have created a semantically linked online Digital Model Repository (DMR) for storing, managing, executing, annotating, and sharing computational cancer models. Within the DMR, distributed, multidisciplinary, and inter-organizational teams can collaborate on projects, without forfeiting intellectual property. This is achieved by the introduction of a new stakeholder to the collaboration workflow, the institutional licensing officer, part of the Technology Transfer Office. Furthermore, the DMR has achieved silver level compatibility with the National Cancer Institute's caBIG, so users can interact with the DMR not only through a web browser but also through a semantically annotated and secure web service. We also discuss the technology behind the DMR leveraging the Semantic Web, ontologies, and grid computing to provide secure inter-institutional collaboration on cancer modeling projects, online grid-based execution of shared models, and the collaboration workflow protecting researchers' intellectual property. Copyright © 2012 Wiley Periodicals, Inc.

  20. 76 FR 34231 - Agency Information Collection Activities: Submission for Review; Information Collection Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-13

    ... Information Collection. (2) Title of the Form/Collection: Science and Technology, External S&T Collaboration... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0041] Agency Information Collection Activities: Submission for Review; Information Collection Request for the Department of Homeland Security...

  1. 76 FR 68486 - Agency Information Collection Activities: Submission for Review; Information Collection Request...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0077] Agency Information Collection Activities: Submission for Review; Information Collection Request for the Department of Homeland Security (DHS), Science and Technology, External S&T Collaboration Site (E-STCS) AGENCY: Science and Technology...

  2. Real-time stress monitoring of highway bridges with a secured wireless sensor network.

    DOT National Transportation Integrated Search

    2011-12-01

    "This collaborative research aims to develop a real-time stress monitoring system for highway bridges with a secured wireless sensor network. The near term goal is to collect wireless sensor data under different traffic patterns from local highway br...

  3. Using Instant Messaging Systems as a Platform for Electronic Voting

    NASA Astrophysics Data System (ADS)

    Meletiadou, Anastasia; Grimm, Rüdiger

    Many Instant Messaging (IM) systems like Skype or Spark offer ex tended services such as file sharing, VoIP, or a shared whiteboard. As the name suggests, IM applications are predominantly used for spontaneous text-based communication for private or business purposes. In this paper we explore their potential to serve as platforms for secure collaborative applications like electronic contract negotiation, e-payment or electronic voting. Such applications have to deal with challenges like time constraints (“instant” com munication is desired), integration of media channels and the absence of one uni fying “sphere of control” covering all participants. In this paper, we address these challenges by discussing one particular secure collaborative application: secure decision processes for small groups. We provide the following contribu tions: (1) we define three varying scenarios and corresponding security require ments (2) we present an IM-based architecture implementing these scenarios, in cluding a Video-based authentication mechanism, and (3) we discuss poten tial attack patterns.

  4. The International Collaboration for Autism Registry Epidemiology (iCARE): multinational registry-based investigations of autism risk factors and trends.

    PubMed

    Schendel, Diana E; Bresnahan, Michaeline; Carter, Kim W; Francis, Richard W; Gissler, Mika; Grønborg, Therese K; Gross, Raz; Gunnes, Nina; Hornig, Mady; Hultman, Christina M; Langridge, Amanda; Lauritsen, Marlene B; Leonard, Helen; Parner, Erik T; Reichenberg, Abraham; Sandin, Sven; Sourander, Andre; Stoltenberg, Camilla; Suominen, Auli; Surén, Pål; Susser, Ezra

    2013-11-01

    The International Collaboration for Autism Registry Epidemiology (iCARE) is the first multinational research consortium (Australia, Denmark, Finland, Israel, Norway, Sweden, USA) to promote research in autism geographical and temporal heterogeneity, phenotype, family and life course patterns, and etiology. iCARE devised solutions to challenges in multinational collaboration concerning data access security, confidentiality and management. Data are obtained by integrating existing national or state-wide, population-based, individual-level data systems and undergo rigorous harmonization and quality control processes. Analyses are performed using database federation via a computational infrastructure with a secure, web-based, interface. iCARE provides a unique, unprecedented resource in autism research that will significantly enhance the ability to detect environmental and genetic contributions to the causes and life course of autism.

  5. Grid Computing and Collaboration Technology in Support of Fusion Energy Sciences

    NASA Astrophysics Data System (ADS)

    Schissel, D. P.

    2004-11-01

    The SciDAC Initiative is creating a computational grid designed to advance scientific understanding in fusion research by facilitating collaborations, enabling more effective integration of experiments, theory and modeling, and allowing more efficient use of experimental facilities. The philosophy is that data, codes, analysis routines, visualization tools, and communication tools should be thought of as easy to use network available services. Access to services is stressed rather than portability. Services share the same basic security infrastructure so that stakeholders can control their own resources and helps ensure fair use of resources. The collaborative control room is being developed using the open-source Access Grid software that enables secure group-to-group collaboration with capabilities beyond teleconferencing including application sharing and control. The ability to effectively integrate off-site scientists into a dynamic control room will be critical to the success of future international projects like ITER. Grid computing, the secure integration of computer systems over high-speed networks to provide on-demand access to data analysis capabilities and related functions, is being deployed as an alternative to traditional resource sharing among institutions. The first grid computational service deployed was the transport code TRANSP and included tools for run preparation, submission, monitoring and management. This approach saves user sites from the laborious effort of maintaining a complex code while at the same time reducing the burden on developers by avoiding the support of a large number of heterogeneous installations. This tutorial will present the philosophy behind an advanced collaborative environment, give specific examples, and discuss its usage beyond FES.

  6. Objects of Desire: Power and Passion in Collaborative Activity

    ERIC Educational Resources Information Center

    Nardi, Bonnie A.

    2005-01-01

    This article uses activity theory to analyze the conduct of collaborative scientific research, showing how the conceptualization of object is critical to understanding key aspects of scientific collaboration. I argue that the passions and desires behind objects of scientific research are missing in most accounts. I suggest refinements to the…

  7. Detection and Tracking of Dynamic Objects by Using a Multirobot System: Application to Critical Infrastructures Surveillance

    PubMed Central

    Rodríguez-Canosa, Gonzalo; Giner, Jaime del Cerro; Barrientos, Antonio

    2014-01-01

    The detection and tracking of mobile objects (DATMO) is progressively gaining importance for security and surveillance applications. This article proposes a set of new algorithms and procedures for detecting and tracking mobile objects by robots that work collaboratively as part of a multirobot system. These surveillance algorithms are conceived of to work with data provided by long distance range sensors and are intended for highly reliable object detection in wide outdoor environments. Contrary to most common approaches, in which detection and tracking are done by an integrated procedure, the approach proposed here relies on a modular structure, in which detection and tracking are carried out independently, and the latter might accept input data from different detection algorithms. Two movement detection algorithms have been developed for the detection of dynamic objects by using both static and/or mobile robots. The solution to the overall problem is based on the use of a Kalman filter to predict the next state of each tracked object. Additionally, new tracking algorithms capable of combining dynamic objects lists coming from either one or various sources complete the solution. The complementary performance of the separated modular structure for detection and identification is evaluated and, finally, a selection of test examples discussed. PMID:24526305

  8. Development of national competency-based learning objectives "Medical Informatics" for undergraduate medical education.

    PubMed

    Röhrig, R; Stausberg, J; Dugas, M

    2013-01-01

    The aim of this project is to develop a catalogue of competency-based learning objectives "Medical Informatics" for undergraduate medical education (abbreviated NKLM-MI in German). The development followed a multi-level annotation and consensus process. For each learning objective a reason why a physician needs this competence was required. In addition, each objective was categorized according to the competence context (A = covered by medical informatics, B = core subject of medical informatics, C = optional subject of medical informatics), the competence level (1 = referenced knowledge, 2 = applied knowledge, 3 = routine knowledge) and a CanMEDS competence role (medical expert, communicator, collaborator, manager, health advocate, professional, scholar). Overall 42 objectives in seven areas (medical documentation and information processing, medical classifications and terminologies, information systems in healthcare, health telematics and telemedicine, data protection and security, access to medical knowledge and medical signal-/image processing) were identified, defined and consented. With the NKLM-MI the competences in the field of medical informatics vital to a first year resident physician are identified, defined and operationalized. These competencies are consistent with the recommendations of the International Medical Informatics Association (IMIA). The NKLM-MI will be submitted to the National Competence-Based Learning Objectives for Undergraduate Medical Education. The next step is implementation of these objectives by the faculties.

  9. Behavioral Emergency Response Team: Implementation Improves Patient Safety, Staff Safety, and Staff Collaboration.

    PubMed

    Zicko, Cdr Jennifer M; Schroeder, Lcdr Rebecca A; Byers, Cdr William S; Taylor, Lt Adam M; Spence, Cdr Dennis L

    2017-10-01

    Staff members working on our nonmental health (non-MH) units (i.e., medical-surgical [MS] units) were not educated in recognizing or deescalating behavioral emergencies. Published evidence suggests a behavioral emergency response team (BERT) composed of MH experts who assist with deescalating behavioral emergencies may be beneficial in these situations. Therefore, we sought to implement a BERT on the inpatient non-MH units at our military treatment facility. The objectives of this evidence-based practice process improvement project were to determine how implementation of a BERT affects staff and patient safety and to examine nursing staffs' level of knowledge, confidence, and support in caring for psychiatric patients and patients exhibiting behavioral emergencies. A BERT was piloted on one MS unit for 5 months and expanded to two additional units for 3 months. Pre- and postimplementation staff surveys were conducted, and the number of staff assaults and injuries, restraint usage, and security intervention were compared. The BERT responded to 17 behavioral emergencies. The number of assaults decreased from 10 (pre) to 1 (post); security intervention decreased from 14 to 1; and restraint use decreased from 8 to 1. MS staffs' level of BERT knowledge and rating of support between MH staff and their staff significantly increased. Both MS and MH nurses rated the BERT as supportive and effective. A BERT can assist with deescalating behavioral emergencies, and improve staff collaboration and patient and staff safety. © 2017 Sigma Theta Tau International.

  10. Organizational Culture for Safety, Security, and Safeguards in New Nuclear Power Countries

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kovacic, Donald N

    2015-01-01

    This chapter will contain the following sections: Existing international norms and standards for developing the infrastructure to support new nuclear power programs The role of organizational culture and how it supports the safe, secure, and peaceful application of nuclear power Identifying effective and efficient strategies for implementing safety, security and safeguards in nuclear operations Challenges identified in the implementation of safety, security and safeguards Potential areas for future collaboration between countries in order to support nonproliferation culture

  11. Collaboration between social workers and dentists for care of people with special health needs (a commentary).

    PubMed

    Waldman, H Barry; Perlman, Steven P

    2003-01-01

    The difficulties faced by individuals with mental retardation, developmental and other disabilities in securing dental services are reviewed. The need for social workers to stimulate family members and other health care providers to collaborate with and challenge dental practitioners is emphasized.

  12. Linking Schools with Human Service Agencies. ERIC/CUE Digest No. 62.

    ERIC Educational Resources Information Center

    Ascher, Carol

    A number of factors put pressure on schools to work more closely with health, social service, and other youth-serving institutions but poor communications, program redundancies, fear for job security, and concerns about parent and community support for controversial services inhibit close collaboration. Recent successful collaborative school,…

  13. Informatics for neglected diseases collaborations.

    PubMed

    Bost, Frederic; Jacobs, Robert T; Kowalczyk, Paul

    2010-05-01

    Many different public and private organizations from across the globe are collaborating on neglected diseases drug-discovery and development projects with the aim of identifying a cure for tropical infectious diseases. These neglected diseases collaborations require a global, secure, multi-organization data-management solution, combined with a platform that facilitates communication and supports collaborative work. This review discusses the solutions offered by 'Software as a Service' (SaaS) web-based platforms, despite notable challenges, and the evolution of these platforms required to foster efficient virtual research efforts by geographically dispersed scientists.

  14. A collaborative framework for contributing DICOM RT PHI (Protected Health Information) to augment data mining in clinical decision support

    NASA Astrophysics Data System (ADS)

    Deshpande, Ruchi; Thuptimdang, Wanwara; DeMarco, John; Liu, Brent J.

    2014-03-01

    We have built a decision support system that provides recommendations for customizing radiation therapy treatment plans, based on patient models generated from a database of retrospective planning data. This database consists of relevant metadata and information derived from the following DICOM objects - CT images, RT Structure Set, RT Dose and RT Plan. The usefulness and accuracy of such patient models partly depends on the sample size of the learning data set. Our current goal is to increase this sample size by expanding our decision support system into a collaborative framework to include contributions from multiple collaborators. Potential collaborators are often reluctant to upload even anonymized patient files to repositories outside their local organizational network in order to avoid any conflicts with HIPAA Privacy and Security Rules. We have circumvented this problem by developing a tool that can parse DICOM files on the client's side and extract de-identified numeric and text data from DICOM RT headers for uploading to a centralized system. As a result, the DICOM files containing PHI remain local to the client side. This is a novel workflow that results in adding only relevant yet valuable data from DICOM files to the centralized decision support knowledge base in such a way that the DICOM files never leave the contributor's local workstation in a cloud-based environment. Such a workflow serves to encourage clinicians to contribute data for research endeavors by ensuring protection of electronic patient data.

  15. Exploiting the Use of Social Networking to Facilitate Collaboration in the Scientific Community

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Coppock, Edrick G.

    The goal of this project was to exploit social networking to facilitate scientific collaboration. The project objective was to research and identify scientific collaboration styles that are best served by social networking applications and to model the most effective social networking applications to substantiate how social networking can support scientific collaboration. To achieve this goal and objective, the project was to develop an understanding of the types of collaborations conducted by scientific researchers, through classification, data analysis and identification of unique collaboration requirements. Another technical objective in support of this goal was to understand the current state of technology inmore » collaboration tools. In order to test hypotheses about which social networking applications effectively support scientific collaboration the project was to create a prototype scientific collaboration system. The ultimate goal for testing the hypotheses and research of the project was to refine the prototype into a functional application that could effectively facilitate and grow collaboration within the U.S. Department of Energy (DOE) research community.« less

  16. Partners of Choice and Necessity: Special Operations Forces and the National Security Imperatives of Building Partner Capacity

    DTIC Science & Technology

    2015-05-21

    lie outside their span of control. This monograph therefore assumes no significant changes to whole-of- government collaboration, legislated ...with several other military and whole-of-government BPC efforts. Security cooperation and security assistance (SA) are legislated portfolios of...Plan Colombia, the campaign proposed in 1999 by the Colombian President to reduce internal conflict, led to increased US confidence and support for

  17. Developing Ministerial Collaborative Planning Capacity

    DTIC Science & Technology

    2012-03-14

    1204, Arlington, VA 22202- 4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be subject to any...to build capacity and legitimacy within a host nation’s security sector. Providing a safe and secure environment founded on the rule of law is the...6 Vision: A highly efficient ministry capable of providing security and stability for all components of society, applying the rule of law and

  18. ERCMExpress. Volume 2, Issue 4

    ERIC Educational Resources Information Center

    US Department of Education, 2006

    2006-01-01

    This issue of ERCMExpress alerts readers of the All-Hazard NOAA weather radio (NWR) network upgrade. In 2004, The National Oceanic and Atmospheric Administration NOAA and the U.S. Department of Homeland Security (DHS) collaborated to enable DHS to disseminate homeland security-related information over the NWR network. DHS's goal was to produce an…

  19. Security in Distributed Collaborative Environments: Limitations and Solutions

    NASA Astrophysics Data System (ADS)

    Saadi, Rachid; Pierson, Jean-Marc; Brunie, Lionel

    The main goal of establishing collaboration between heterogeneous environment is to create such as Pervasive context which provide nomadic users with ubiquitous access to digital information and surrounding resources. However, the constraints of mobility and heterogeneity arise a number of crucial issues related to security, especially authentication access control and privacy. First of all, in this chapter we explore the trust paradigm, specially the transitive capability to enable a trust peer to peer collaboration. In this manner, when each organization sets its own security policy to recognize (authenticate) users members of a trusted community and provide them a local access (access control), the trust transitivity between peers will allows users to gain a broad, larger and controlled access inside the pervasive environment. Next, we study the problem of user's privacy. In fact in pervasive and ubiquitous environments, nomadic users gather and exchange certificates or credential which providing them rights to access by transitivity unknown and trusted environments. These signed documents embeds increasing number of attribute that require to be filtered according to such contextual situation. In this chapter, we propose a new morph signature enabling each certificate owner to preserve his privacy by discloses or blinds some sensitive attributes according to faced situation.

  20. PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS

    PubMed Central

    Chen, Feng; Wang, Shuang; Jiang, Xiaoqian; Ding, Sijie; Lu, Yao; Kim, Jihoon; Sahinalp, S. Cenk; Shimizu, Chisato; Burns, Jane C.; Wright, Victoria J.; Png, Eileen; Hibberd, Martin L.; Lloyd, David D.; Yang, Hai; Telenti, Amalio; Bloss, Cinnamon S.; Fox, Dov; Lauter, Kristin; Ohno-Machado, Lucila

    2017-01-01

    Abstract Motivation: We introduce PRINCESS, a privacy-preserving international collaboration framework for analyzing rare disease genetic data that are distributed across different continents. PRINCESS leverages Software Guard Extensions (SGX) and hardware for trustworthy computation. Unlike a traditional international collaboration model, where individual-level patient DNA are physically centralized at a single site, PRINCESS performs a secure and distributed computation over encrypted data, fulfilling institutional policies and regulations for protected health information. Results: To demonstrate PRINCESS’ performance and feasibility, we conducted a family-based allelic association study for Kawasaki Disease, with data hosted in three different continents. The experimental results show that PRINCESS provides secure and accurate analyses much faster than alternative solutions, such as homomorphic encryption and garbled circuits (over 40 000× faster). Availability and Implementation: https://github.com/achenfengb/PRINCESS_opensource Contact: shw070@ucsd.edu Supplementary information: Supplementary data are available at Bioinformatics online. PMID:28065902

  1. A Strategy toward Collaborative Filter Recommended Location Service for Privacy Protection

    PubMed Central

    Wang, Peng; Yang, Jing; Zhang, Jianpei

    2018-01-01

    A new collaborative filtered recommendation strategy was proposed for existing privacy and security issues in location services. In this strategy, every user establishes his/her own position profiles according to their daily position data, which is preprocessed using a density clustering method. Then, density prioritization was used to choose similar user groups as service request responders and the neighboring users in the chosen groups recommended appropriate location services using a collaborative filter recommendation algorithm. The two filter algorithms based on position profile similarity and position point similarity measures were designed in the recommendation, respectively. At the same time, the homomorphic encryption method was used to transfer location data for effective protection of privacy and security. A real location dataset was applied to test the proposed strategy and the results showed that the strategy provides better location service and protects users’ privacy. PMID:29751670

  2. A Strategy toward Collaborative Filter Recommended Location Service for Privacy Protection.

    PubMed

    Wang, Peng; Yang, Jing; Zhang, Jianpei

    2018-05-11

    A new collaborative filtered recommendation strategy was proposed for existing privacy and security issues in location services. In this strategy, every user establishes his/her own position profiles according to their daily position data, which is preprocessed using a density clustering method. Then, density prioritization was used to choose similar user groups as service request responders and the neighboring users in the chosen groups recommended appropriate location services using a collaborative filter recommendation algorithm. The two filter algorithms based on position profile similarity and position point similarity measures were designed in the recommendation, respectively. At the same time, the homomorphic encryption method was used to transfer location data for effective protection of privacy and security. A real location dataset was applied to test the proposed strategy and the results showed that the strategy provides better location service and protects users' privacy.

  3. GEOGLAM Crop Assessment Tool: Adapting from global agricultural monitoring to food security monitoring

    NASA Astrophysics Data System (ADS)

    Humber, M. L.; Becker-Reshef, I.; Nordling, J.; Barker, B.; McGaughey, K.

    2014-12-01

    The GEOGLAM Crop Monitor's Crop Assessment Tool was released in August 2013 in support of the GEOGLAM Crop Monitor's objective to develop transparent, timely crop condition assessments in primary agricultural production areas, highlighting potential hotspots of stress/bumper crops. The Crop Assessment Tool allows users to view satellite derived products, best available crop masks, and crop calendars (created in collaboration with GEOGLAM Crop Monitor partners), then in turn submit crop assessment entries detailing the crop's condition, drivers, impacts, trends, and other information. Although the Crop Assessment Tool was originally intended to collect data on major crop production at the global scale, the types of data collected are also relevant to the food security and rangelands monitoring communities. In line with the GEOGLAM Countries at Risk philosophy of "foster[ing] the coordination of product delivery and capacity building efforts for national and regional organizations, and the development of harmonized methods and tools", a modified version of the Crop Assessment Tool is being developed for the USAID Famine Early Warning Systems Network (FEWS NET). As a member of the Countries at Risk component of GEOGLAM, FEWS NET provides agricultural monitoring, timely food security assessments, and early warnings of potential significant food shortages focusing specifically on countries at risk of food security emergencies. While the FEWS NET adaptation of the Crop Assessment Tool focuses on crop production in the context of food security rather than large scale production, the data collected is nearly identical to the data collected by the Crop Monitor. If combined, the countries monitored by FEWS NET and GEOGLAM Crop Monitor would encompass over 90 countries representing the most important regions for crop production and food security.

  4. Leveraging Successful Collaborative Processes to Improve Performance Outcomes in Large-Scale Event Planning: Super Bowl, A Planned Homeland Security Event

    DTIC Science & Technology

    2010-03-01

    are turning out to be counterproductive because they are culturally anathema (Wollman, 2009). A consideration of psychological tenets by Sigmund ... Freud suggests a principle aspect of dysfunction in collaboration. He reasoned that An Ego governed by social convention and a Superego governed by

  5. Impact of Collaborative Work on Technology Acceptance: A Case Study from Virtual Computing

    ERIC Educational Resources Information Center

    Konak, Abdullah; Kulturel-Konak, Sadan; Nasereddin, Mahdi; Bartolacci, Michael R.

    2017-01-01

    Aim/Purpose: This paper utilizes the Technology Acceptance Model (TAM) to examine the extent to which acceptance of Remote Virtual Computer Laboratories (RVCLs) is affected by students' technological backgrounds and the role of collaborative work. Background: RVCLs are widely used in information technology and cyber security education to provide…

  6. U.S.-RUSSIA TIES: Spy Conviction Strains Science Collaborations.

    PubMed

    Stone, R

    2000-12-15

    The conviction last week in Russia of U.S. businessman Edward Pope on charges of espionage may add to already growing tensions in scientific collaborations between the two countries, according to officials on both sides. The recent strains appear to be a reaction to a broad range of national security concerns in each nation.

  7. Collaboration and Commitment to Sealed Source Safety, Security, and Disposition - 13627

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jennison, Meaghan; Martin, David W.

    2013-07-01

    EnergySolutions, the Division of Radiation Control at the Utah Department of Environmental Quality (UDEQ), the Conference of Radiation Control Program Directors (CRCPD), and the Department of Energy's Global Threat Reduction Initiative (GTRI) are collaborating on a truly innovative effort to expand opportunities for cost-effective sealed source disposal. These entities have developed a first-of-its-kind initiative to dispose of certain sealed sources at the EnergySolutions disposal facility near Clive, Utah, which normally cannot accept sealed sources of any type. This creative and collaborative effort to improve radiation health, safety, and security exemplifies the spirit and commitment represented by the Richard S. Hodes,more » M.D. Honor Lecture Award, which is presented annually at the Waste Management Symposia by the Southeast Compact Commission to encourage environmental professionals and political leaders to develop innovative approaches to waste management in the United States. The participants in the collaborative initiative are honored to receive special recognition for their efforts thus far. They also recognize that the hard work remains to be done. (authors)« less

  8. Health governance by collaboration: a case study on an area-based programme to tackle health inequalities in the Dutch city of the Hague.

    PubMed

    Plochg, Thomas; Schmidt, Melanie; Klazinga, Niek S; Stronks, Karien

    2013-12-01

    Area-based programmes are seen as a promising strategy for tackling health inequalities. In these programmes, local authorities and other local actors collaborate to employ health promoting interventions and policies. Little is known about the underlying processes of collaborative governance. To unravel this black box, we explored how the authority of The Hague, The Netherlands, developed a programme tackling health inequalities drawing on a collaborative mode of governance. Case study drawing on qualitative semi-structured interviews and document review. Data were inductively analysed against the concept of collaborative governance. The authority's ambition was to co-produce a programme on tackling health inequalities with local actors. Three stages could be distinguished in the governing process: (i) formulating policy objectives, (ii) translating policy objectives into interventions and (iii) executing health interventions. In the stage of formulating policy objectives, the collaboration led to a reframing of the initial objectives. Furthermore, the translation of the policy objectives into health interventions was rather pragmatic and loosely based on health needs and/or evidence. As a result, the concrete actions that ensued from the programme did not necessarily reflect the initial objectives. In a local system of health governance by collaboration, factors other than the stated policy objectives played a role, eventually undermining the effectiveness of the programme in reducing health inequalities. To be effective, the processes of collaborative governance underlying area-based programmes require the attention of the local authority, including the building and governing of networks, a competent public health workforce and supportive infrastructures.

  9. Sharing Data and Analytical Resources Securely in a Biomedical Research Grid Environment

    PubMed Central

    Langella, Stephen; Hastings, Shannon; Oster, Scott; Pan, Tony; Sharma, Ashish; Permar, Justin; Ervin, David; Cambazoglu, B. Barla; Kurc, Tahsin; Saltz, Joel

    2008-01-01

    Objectives To develop a security infrastructure to support controlled and secure access to data and analytical resources in a biomedical research Grid environment, while facilitating resource sharing among collaborators. Design A Grid security infrastructure, called Grid Authentication and Authorization with Reliably Distributed Services (GAARDS), is developed as a key architecture component of the NCI-funded cancer Biomedical Informatics Grid (caBIG™). The GAARDS is designed to support in a distributed environment 1) efficient provisioning and federation of user identities and credentials; 2) group-based access control support with which resource providers can enforce policies based on community accepted groups and local groups; and 3) management of a trust fabric so that policies can be enforced based on required levels of assurance. Measurements GAARDS is implemented as a suite of Grid services and administrative tools. It provides three core services: Dorian for management and federation of user identities, Grid Trust Service for maintaining and provisioning a federated trust fabric within the Grid environment, and Grid Grouper for enforcing authorization policies based on both local and Grid-level groups. Results The GAARDS infrastructure is available as a stand-alone system and as a component of the caGrid infrastructure. More information about GAARDS can be accessed at http://www.cagrid.org. Conclusions GAARDS provides a comprehensive system to address the security challenges associated with environments in which resources may be located at different sites, requests to access the resources may cross institutional boundaries, and user credentials are created, managed, revoked dynamically in a de-centralized manner. PMID:18308979

  10. Transforming the U.S. Immigration System After 9/11: The Impact of Organizational Change and Collaboration in the Context of Homeland Security

    DTIC Science & Technology

    2008-12-01

    disqualifying criminal conviction from an application to become a Lawful Permanent Resident of the U.S.10 10...developing Collaborative Capacity Builders (CCBs) is another method to sustain and continue to build an effective USCIS and ICE network into the 21st...Weber and Anne M. Khademian, “Wicked Problems, Knowledge Challenges, and Collaborative Capacity Builders in Network Settings,” Public Administration

  11. Analysis of Alternatives (AoA) of Open Colllaboration and Research Capabilities Collaboratipon in Research and Engineering in Advanced Technology and Education and High-Performance Computing Innovation Center (HPCIC) on the LVOC.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vrieling, P. Douglas

    2016-01-01

    The Livermore Valley Open Campus (LVOC), a joint initiative of the National Nuclear Security Administration (NNSA), Lawrence Livermore National Laboratory (LLNL), and Sandia National Laboratories (SNL), enhances the national security missions of NNSA by promoting greater collaboration between world-class scientists at the national security laboratories, and their partners in industry and academia. Strengthening the science, technology, and engineering (ST&E) base of our nation is one of the NNSA’s top goals. By conducting coordinated and collaborative programs, LVOC enhances both the NNSA and the broader national science and technology base, and helps to ensure the health of core capabilities at LLNLmore » and SNL. These capabilities must remain strong to enable the laboratories to execute their primary mission for NNSA.« less

  12. Collaborative drug discovery for More Medicines for Tuberculosis (MM4TB)

    PubMed Central

    Ekins, Sean; Spektor, Anna Coulon; Clark, Alex M.; Dole, Krishna; Bunin, Barry A.

    2016-01-01

    Neglected disease drug discovery is generally poorly funded compared with major diseases and hence there is an increasing focus on collaboration and precompetitive efforts such as public–private partnerships (PPPs). The More Medicines for Tuberculosis (MM4TB) project is one such collaboration funded by the EU with the goal of discovering new drugs for tuberculosis. Collaborative Drug Discovery has provided a commercial web-based platform called CDD Vault which is a hosted collaborative solution for securely sharing diverse chemistry and biology data. Using CDD Vault alongside other commercial and free cheminformatics tools has enabled support of this and other large collaborative projects, aiding drug discovery efforts and fostering collaboration. We will describe CDD's efforts in assisting with the MM4TB project. PMID:27884746

  13. South Asia transboundary water quality monitoring workshop summary report.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Betsill, Jeffrey David; Littlefield, Adriane C.; Luetters, Frederick O.

    2003-04-01

    The Cooperative Monitoring Center (CMC) promotes collaborations among scientists and researchers in several regions as a means of achieving common regional security objectives. To promote cooperation in South Asia on environmental research, an international working group made up of participants from Bangladesh, India, Nepal, Pakistan, and the United States convened in Kathmandu, Nepal, from February 17-23,2002. The workshop was held to further develop the South Asia Transboundary Water Quality Monitoring (SATWQM) project. The project is sponsored in part by the CMC located at Sandia National Laboratories in Albuquerque, New Mexico through funding provided by the US. Department of State, Regionalmore » Environmental Affairs Office, American Embassy, Kathmandu, Nepal, and the National Nuclear Security Administration's (NNSA) Office of Nonproliferation and National Security. This report summarizes the SATWQM project, the workshop objectives, process and results. The long-term interests of the participants are to develop systems for sharing regional environmental information as a means of building confidence and improving relations among South Asian countries. The more immediate interests of the group are focused on activities that foster regional sharing of water quality data in the Ganges and Indus River basins. Issues of concern to the SATWQM network participants include studying the impacts from untreated sewage and industrial effluents, agricultural run-off, salinity increases in fresh waters, the siltation and shifting of river channels, and the environmental degradation of critical habitats such as wetlands, protected forests, and endangered aquatic species conservation areas. The workshop focused on five objectives: (1) a deepened understanding of the partner organizations involved; (2) garnering the support of additional regional and national government and non-government organizations in South Asia involved in river water quality monitoring; (3) identification of sites within the region at which water quality data are to be collected; (4) instituting a data and information collection and sharing process; and, (5) training of partners in the use of water quality monitoring equipment.« less

  14. Electronic health information system at an opioid treatment programme: roadblocks to implementation

    PubMed Central

    Louie, Ben; Kritz, Steven; Brown, Lawrence S.; Chu, Melissa; Madray, Charles; Zavala, Roberto

    2012-01-01

    Rationale Electronic health systems are commonly included in health care reform discussions. However, their embrace by the health care community has been slow. Methods At Addiction Research and Treatment Corporation, a methadone maintenance programme that also provides primary medical care, HIV medical care and case management, substance abuse counselling and vocational services, we describe our experience in implementing an electronic health information system that encompasses all of these areas. Results We describe the challenges and opportunities of this process in terms of change management, hierarchy of corporate objectives, process mastering, training issues, information technology governance, electronic security, and communication and collaboration. Conclusion This description may provide practical insights to other institutions seeking to pursue this technology. PMID:21414111

  15. Electronic health information system at an opioid treatment programme: roadblocks to implementation.

    PubMed

    Louie, Ben; Kritz, Steven; Brown, Lawrence S; Chu, Melissa; Madray, Charles; Zavala, Roberto

    2012-08-01

    Electronic health systems are commonly included in health care reform discussions. However, their embrace by the health care community has been slow. At Addiction Research and Treatment Corporation, a methadone maintenance programme that also provides primary medical care, HIV medical care and case management, substance abuse counselling and vocational services, we describe our experience in implementing an electronic health information system that encompasses all of these areas. We describe the challenges and opportunities of this process in terms of change management, hierarchy of corporate objectives, process mastering, training issues, information technology governance, electronic security, and communication and collaboration. This description may provide practical insights to other institutions seeking to pursue this technology. © 2011 Blackwell Publishing Ltd.

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Verce, M. F.; Schwartz, L. I.

    This was a collaborative effort between LLNL and STE to investigate the use of vaporized hydrogen peroxide (VHP®) to decontaminate spore-contaminated heating, ventilation, and cooling (HV AC) systems in a trailer sized room. LLNL's effort under this CRADA was funded by DOE's Chemical and Biological National Security Program (CBNP), which later became part of Department of Homeland Security in 2004.

  17. Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Scott A. Wade; Kathryn S. Knapp; Cathy A. Wills

    2013-02-24

    Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950s to the early 1990s. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistantmore » Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second collaborative study is furthering desert tortoise conservation measures onsite. It is the goal of NNSA/NSO to continue to develop such collaborations in the sharing of resources, such as personnel, equipment, expertise, and NNSS land access, with outside entities to meet mutually beneficial goals cost effectively.« less

  18. Giving Back: Collaborations with Others in Ecological Studies on the Nevada National Security Site - 13058

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wade, Scott A.; Knapp, Kathryn S.; Wills, Cathy A.

    2013-07-01

    Formerly named the Nevada Test Site, the Nevada National Security Site (NNSS) was the historical site for nuclear weapons testing from the 1950's to the early 1990's. The site was renamed in 2010 to reflect the diversity of nuclear, energy, and homeland security activities now conducted at the site. Biological and ecological programs and research have been conducted on the site for decades to address the impacts of radiation and to take advantage of the relatively undisturbed and isolated lands for gathering basic information on the occurrence and distribution of native plants and animals. Currently, the Office of the Assistantmore » Manager for Environmental Management of the U.S. Department of Energy (DOE), National Nuclear Security Administration Nevada Site Office (NNSA/NSO) oversees the radiological biota monitoring and ecological compliance programs on the NNSS. The top priority of these programs are compliance with federal and state regulations. They focus on performing radiological dose assessments for the public who reside near the NNSS and for populations of plants and animals on the NNSS and in protecting important species and habitat from direct impacts of mission activities. The NNSS serves as an invaluable outdoor laboratory. The geographic and ecological diversity of the site offers researchers many opportunities to study human influences on ecosystems. NNSA/NSO has pursued collaborations with outside agencies and organizations to be able to conduct programs and studies that enhance radiological biota monitoring and ecosystem preservation when budgets are restrictive, as well as to provide valuable scientific information to the human health and natural resource communities at large. NNSA/NSO is using one current collaborative study to better assess the potential dose to the off-site public from the ingestion of game animals, the most realistic pathway for off-site public exposure at this time from radionuclide contamination on the NNSS. A second collaborative study is furthering desert tortoise conservation measures onsite. It is the goal of NNSA/NSO to continue to develop such collaborations in the sharing of resources, such as personnel, equipment, expertise, and NNSS land access, with outside entities to meet mutually beneficial goals cost effectively. (authors)« less

  19. In the Loop: The Organization of Team-Based Communication in a Patient-Centered Clinical Collaboration System.

    PubMed

    Kurahashi, Allison M; Weinstein, Peter B; Jamieson, Trevor; Stinson, Jennifer N; Cafazzo, Joseph A; Lokuge, Bhadra; Morita, Plinio P; Cohen, Eyal; Rapoport, Adam; Bezjak, Andrea; Husain, Amna

    2016-03-24

    We describe the development and evaluation of a secure Web-based system for the purpose of collaborative care called Loop. Loop assembles the team of care with the patient as an integral member of the team in a secure space. The objectives of this paper are to present the iterative design of the separate views for health care providers (HCPs) within each patient's secure space and examine patients', caregivers', and HCPs' perspectives on this separate view for HCP-only communication. The overall research program includes cycles of ethnography, prototyping, usability testing, and pilot testing. This paper describes the usability testing phase that directly informed development. A descriptive qualitative approach was used to analyze participant perspectives that emerged during usability testing. During usability testing, we sampled 89 participants from three user groups: 23 patients, 19 caregivers, and 47 HCPs. Almost all perspectives from the three user groups supported the need for an HCP-only communication view. In an earlier prototype, the visual presentation caused confusion among HCPs when reading and composing messages about whether a message was visible to the patient. Usability testing guided us to design a more deliberate distinction between posting in the Patient and Team view and the Health Care Provider Only view at the time of composing a message, which once posted is distinguished by an icon. The team made a decision to incorporate an HCP-only communication view based on findings during earlier phases of work. During usability testing we tested the separate communication views, and all groups supported this partition. We spent considerable effort designing the partition; however, preliminary findings from the next phase of evaluation, pilot testing, show that the Patient and Team communication is predominantly being used. This demonstrates the importance of a subsequent phase of the clinical trial of Loop to validate the concept and design.

  20. Balancing entrepreneurship and business practices for e-collaboration: responsible information sharing in academic research.

    PubMed

    Porter, Mark W; Porter, Mark William; Milley, David; Oliveti, Kristyn; Ladd, Allen; O'Hara, Ryan J; Desai, Bimal R; White, Peter S

    2008-11-06

    Flexible, highly accessible collaboration tools can inherently conflict with controls placed on information sharing by offices charged with privacy protection, compliance, and maintenance of the general business environment. Our implementation of a commercial enterprise wiki within the academic research environment addresses concerns of all involved through the development of a robust user training program, a suite of software customizations that enhance security elements, a robust auditing program, allowance for inter-institutional wiki collaboration, and wiki-specific governance.

  1. Forging a New Partnership: The Story of Teacher Union and School District Collaboration in Pittsburgh

    ERIC Educational Resources Information Center

    Hamill, Sean D.

    2011-01-01

    This paper documents Pittsburgh's transformation from a typical, adversarial district-union dynamic to one of deep, substantive collaboration over the course of several years. This work has catapulted Pittsburgh to the vanguard of efforts to improve teacher effectiveness, and helped secure more than $80 million in philanthropic and federal grants.…

  2. A Collaborative Neurodynamic Approach to Multiple-Objective Distributed Optimization.

    PubMed

    Yang, Shaofu; Liu, Qingshan; Wang, Jun

    2018-04-01

    This paper is concerned with multiple-objective distributed optimization. Based on objective weighting and decision space decomposition, a collaborative neurodynamic approach to multiobjective distributed optimization is presented. In the approach, a system of collaborative neural networks is developed to search for Pareto optimal solutions, where each neural network is associated with one objective function and given constraints. Sufficient conditions are derived for ascertaining the convergence to a Pareto optimal solution of the collaborative neurodynamic system. In addition, it is proved that each connected subsystem can generate a Pareto optimal solution when the communication topology is disconnected. Then, a switching-topology-based method is proposed to compute multiple Pareto optimal solutions for discretized approximation of Pareto front. Finally, simulation results are discussed to substantiate the performance of the collaborative neurodynamic approach. A portfolio selection application is also given.

  3. An Overview of SBIR Phase 2 Communications Technology and Development

    NASA Technical Reports Server (NTRS)

    Nguyen, Hung D.; Steele, Gynelle C.

    2015-01-01

    Technological innovation is the overall focus of NASA's Small Business Innovation Research (SBIR) program. The program invests in the development of innovative concepts and technologies to help NASA's mission directorates address critical research and development needs for agency projects. This report highlights innovative SBIR Phase II projects from 2007-2012 specifically addressing areas in Communications Technology and Development which is one of six core competencies at NASA Glenn Research Center. There are eighteen technologies featured with emphasis on a wide spectrum of applications such as with a security-enhanced autonomous network management, secure communications using on-demand single photons, cognitive software-defined radio, spacesuit audio systems, multiband photonic phased-array antenna, and much more. Each article in this booklet describes an innovation, technical objective, and highlights NASA commercial and industrial applications. This report serves as an opportunity for NASA personnel including engineers, researchers, and program managers to learn of NASA SBIR's capabilities that might be crosscutting into this technology area. As the result, it would cause collaborations and partnerships between the small companies and NASA Programs and Projects resulting in benefit to both SBIR companies and NASA.

  4. DOE Office of Scientific and Technical Information (OSTI.GOV)

    No, author

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors inmore » Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.« less

  5. Projects without a purpose: Why a top down strategy to resilience matters

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kingery, Kristine M.; Fowler, Kimberly M.; Harrove

    Energy resilience is a key focus of the current administration and Department of Defense (DoD) leaders, and is in the title of every energy conference session. Most case studies and success stories focus on resilience projects hardening systems or microgriding critical infrastructure. Some case studies focus on unique financing approaches to bring private sector innovation and increased investment to military installations. Many times, what initially look like innovative resilience projects, end as isolated systems or stranded infrastructure. This article will explore how the DoD can make greater strides advancing resilience objectives and ultimately developing projects that support installation mission readinessmore » by first focusing on top down strategies. The Army established energy and water security/resilience requirements, developed a comprehensive measurement framework, is evolving integrated planning approaches in collaboration with local communities, and is supporting project development activities across third-party and appropriated programs. The Army’s multi-year strategic energy and water security planning activities can provide helpful guidance to both the lifecycle of programs or individual projects, and ensure resilience projects both have and achieve a purpose.« less

  6. Security and Efficiency Concerns With Distributed Collaborative Networking Environments

    DTIC Science & Technology

    2003-09-01

    have the ability to access Web communications services of the WebEx MediaTone Network from a single login. [24] WebEx provides a range of secure...Web. WebEx services enable secure data, voice and video communications through the browser and are supported by the WebEx MediaTone Network, a global...designed to host large-scale, structured events and conferences, featuring a Q&A Manager that allows multiple moderators to handle questions while

  7. 78 FR 56263 - HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGen Corp., QueryObject Systems Corp., Security Intelligence Technologies, Inc., Skins, Inc., SLM Holdings, Inc., Spring Creek Healthcare Systems... securities of Security Intelligence Technologies, Inc. because it has not filed any periodic reports since...

  8. Comment on "Proactive quantum secret sharing"

    NASA Astrophysics Data System (ADS)

    Gao, Gan; Wang, Yue

    2017-03-01

    In the paper, Qin and Dai (Quantum Inf Process 14:4237-4244, 2015) proposed a proactive quantum secret sharing scheme. We study the security of the proposed scheme and find that it is not secure. In the distribution phase of the proposed scheme, two dishonest participants may collaborate to eavesdrop the secret of the dealer without introducing any error.

  9. Developing a Community-Academic Partnership to Improve Recognition and Treatment of Depression in Underserved African American and White Elders

    PubMed Central

    Dobransky-Fasiska, Deborah; Brown, Charlotte; Pincus, Harold A.; Nowalk, Mary P.; Wieland, Melissa; Parker, Lisa S.; Cruz, Mario; McMurray, Michelle L.; Mulsant, Benoit; Reynolds, Charles F.

    2011-01-01

    Objective Reducing mental health disparities among underserved populations, particularly African American elders, is an important public health priority. The authors describe the process and challenges of developing a community/academic research partnership to address these disparities. Methods The authors are using a Community-Based Participatory Research approach to gain access to underserved populations in need of depression treatment. The authors identify six stages: 1) Collaborating to Secure Funding; 2) Building a Communications Platform and Research Infrastructure; 3) Fostering Enduring Relationships; 4) Assessing Needs/Educating about Research Process; 5) Initiating Specific Collaborative Projects (meeting mutual needs/interests); and 6) Maintaining a Sustainable and Productive Partnership. Data from a needs assessment developed collaboratively by researchers and community agencies facilitated agreement on mutual research goals, while strengthening the partnership. Results A community/academic-based partnership with a solid research infrastructure has been established and maintained for 3 years. Using the results of a needs assessment, the working partnership prioritized and launched several projects. Through interviews and questionnaires, community partners identified best practices for researchers working in the community. Future research and interventional projects have been developed, including plans for sustainability that will eventually shift more responsibility from the academic institution to the community agencies. Conclusions To reach underserved populations by developing and implementing models of more effective mental health treatment, it is vital to engage community agencies offering services to this population. A successful partnership requires “cultural humility,” collaborative efforts, and the development of flexible protocols to accommodate diverse communities. PMID:20104053

  10. Preventing infant abductions: an infant security program transitioned into an interdisciplinary model.

    PubMed

    Hiner, Jacqueline; Pyka, Jeanine; Burks, Colleen; Pisegna, Lily; Gador, Rachel Ann

    2012-01-01

    Ensuring the safety of infants born in a hospital is a top priority and, therefore, requires a solid infant security plan. Using an interdisciplinary approach and a systematic change process, nursing leadership in collaboration with clinical nurses and security personnel analyzed the infant security program at this community hospital to identify vulnerabilities. By establishing an interdisciplinary approach to infant security, participants were able to unravel a complicated concept, systematically analyze the gaps, and agree to a plan of action. This resulted in improved communication and clarification of roles between the nursing and security divisions. Supply costs decreased by 17.4% after the first year of implementation. Most importantly, this project enhanced and strengthened the existing infant abduction prevention measures, hard wired the importance of infant security, and minimized vulnerabilities.

  11. Cooperative Autonomous Robots for Reconnaissance

    DTIC Science & Technology

    2009-03-06

    REPORT Cooperative Autonomous Robots for Reconnaissance 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Collaborating mobile robots equipped with WiFi ...Cooperative Autonomous Robots for Reconnaissance Report Title ABSTRACT Collaborating mobile robots equipped with WiFi transceivers are configured as a mobile...equipped with WiFi transceivers are configured as a mobile ad-hoc network. Algorithms are developed to take advantage of the distributed processing

  12. 75 FR 28319 - Thirteenth Meeting: EUROCAE WG-72: RTCA Special Committee 216: Aeronautical Systems Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-20

    ... for collaboration or joint work. ED204-SG4: Review the SOW of both groups, determine if full or partly... the expectations of the audience well understood? How will the work progress, fully joint, partly... Publication (separate in ED210 or integrated). 11:00 to 11:15: Break. 11:15 to 11:30: Discuss collaboration...

  13. 75 FR 16901 - Thirteenth Meeting: EUROCAE WG-72: RTCA Special Committee 216: Aeronautical Systems Security...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-02

    ... basis for collaboration or joint work. ED204-SG4: Review the SOW of both groups, determine if full or... the expectations of the audience well understood? How will the work progress, fully joint, partly... Publication (separate in ED210 or integrated). 11:00 to 11:15: Break. 11:15 to 11:30: Discuss collaboration...

  14. The Role of Police Officers in Elementary and Secondary Schools: Implications for Police-School Social Work Collaboration

    ERIC Educational Resources Information Center

    Patterson, George T.

    2007-01-01

    Collaborations between law enforcement agencies and elementary and secondary schools focus on the provision of education to students, the safety and security of school property, and public relations efforts aimed at changing youths' attitudes toward the police both inside and outside of schools. The use of police officers in school settings…

  15. Care control and collaborative working in a prison hospital.

    PubMed

    Foster, John; Bell, Linda; Jayasinghe, Neil

    2013-03-01

    This paper reports findings from a qualitative research project, using interviews, focus groups and participant observations, which sought to investigate "good practice" in a nurse-led prison hospital wing for male prisoners. The study raised issues about tensions between "caring" and "control" of prisoners from the perspectives of professionals working or visiting the wing. This paper discusses collaborative working between professionals from different backgrounds, including nurses and healthcare (prison) officers who were based on the wing and others who visited such as probation, medical, Inreach team or Counselling Advice, Referral, Assessment and Through Care team staff (CARAT). The key finding was that there is a balance between therapy and security/risk. In order to maintain this, the two main groups based on the hospital wing--nurses and prison officers--moved between at times cooperating, coordinating and collaborating with each other to maintain this balance. Other themes were care and control, team working, individual and professional responsibilities and communication issues. Enhancing the role of nurses should be encouraged so that therapy remains paramount, and we conclude with some recommendations to encourage collaborative working in prison healthcare settings to ensure that therapy continues to be paramount while security and safety are maintained.

  16. People-First Homeland Security: Recalibrating for Community Collaboration and Engagement within a Homeland Security Ecosystem

    DTIC Science & Technology

    2014-12-01

    Press, 2010), Kindle edition. 35 Peter H. Diamandis and Steven Kotler , Abundance: The Future Is Better than You Think (New York: Free Press, 2012...Diamandis and Kotler , Abundance: The Future Is Better Than You Think, 6. 116 Maeve Duggan and Aaron Smith, “Social Media Update 2013,” Pew Research Center...Committee on Homeland Security and Governmental Affairs of the U.S. Senate). 298 Philip J. Palin, “Perspectives on Preparedness: Nudging Us Forward a

  17. The insurance industry and public-private collaborations as a vector to develop and spread EO technologies and techniques in the domain of Food Security: The Swiss Re case.

    NASA Astrophysics Data System (ADS)

    Coutu, S.; Ragaz, M.; Mäder, D.; Hammer, P.; Andriesse, M.; Güttinger, U.; Feyen, H.

    2017-12-01

    The insurance industry has been contributing to the resilient development of agriculture in multiple regions of the globe since the beginning of the 19th Century. It also has from the very beginning of the development of EO Sciences, kept a very close eye on the development of technologies and techniques in this domain. Recent advances in this area such as increased satellite imagery resolution, faster computation time and Big Data management combined with the ground-based knowledge from the insurance industry have offered farmers not only tools permitting better crop management, but also reliable and live yield coverage. This study presents several of these applications at different scales (industrial farming and micro-farming) and in different climate regions, with an emphasis on the limit of current products. Some of these limits such as lack of access of to ground data, R&D efforts or understanding of ground needs could be quickly overcome through closer public-private or private-private collaborations. However, despite a clear benefit for the Food Security nexus and potential win-win situations, those collaborations are not always simple to develop. We present here successful but also disappointing collaboration cases based on the Swiss Re experience, as a global insurance leader. As a conclusion, we highlight how academia, NGOs, governmental organization, start-ups and the insurance industry can get together to foster the development of EO in the domain of Food Security, and bring cutting-edge science to game changing industrial applications.

  18. Using a student-faculty collaborative learning model to teach grant development in graduate nursing education.

    PubMed

    Falk, Nancy L; Phillips, Kathleen M; Hymer, Regina; Acquaviva, Kimberly D; Schumann, Mary Jean

    2014-05-01

    Graduate nurses are employed in clinical, research, educational, and policy roles. As leaders, they are expected to develop and sustain projects that support translating research to practice and policy. Funding to support initiatives is tight and requires innovative solutions to cover salaries, benefits, equipment purchases, and other program expenses. In an effort to teach grant writing while developing skilled leaders who are effective and competitive in securing funds, the George Washington University School of Nursing offers a graduate-level grant writing course. In the summer of 2011, a collaborative learning model was developed within the course. The joint approach was foundational to securing an Agency for Healthcare Research and Quality grant to support development and implementation of a patient engagement project by the Nursing Alliance for Quality Care. This article describes the project and offers hints for those seeking to develop a collaborative educational experience that affords new leadership skills for RNs from all backgrounds. Copyright 2014, SLACK Incorporated.

  19. PRINCESS: Privacy-protecting Rare disease International Network Collaboration via Encryption through Software guard extensionS.

    PubMed

    Chen, Feng; Wang, Shuang; Jiang, Xiaoqian; Ding, Sijie; Lu, Yao; Kim, Jihoon; Sahinalp, S Cenk; Shimizu, Chisato; Burns, Jane C; Wright, Victoria J; Png, Eileen; Hibberd, Martin L; Lloyd, David D; Yang, Hai; Telenti, Amalio; Bloss, Cinnamon S; Fox, Dov; Lauter, Kristin; Ohno-Machado, Lucila

    2017-03-15

    We introduce PRINCESS, a privacy-preserving international collaboration framework for analyzing rare disease genetic data that are distributed across different continents. PRINCESS leverages Software Guard Extensions (SGX) and hardware for trustworthy computation. Unlike a traditional international collaboration model, where individual-level patient DNA are physically centralized at a single site, PRINCESS performs a secure and distributed computation over encrypted data, fulfilling institutional policies and regulations for protected health information. To demonstrate PRINCESS' performance and feasibility, we conducted a family-based allelic association study for Kawasaki Disease, with data hosted in three different continents. The experimental results show that PRINCESS provides secure and accurate analyses much faster than alternative solutions, such as homomorphic encryption and garbled circuits (over 40 000× faster). https://github.com/achenfengb/PRINCESS_opensource. shw070@ucsd.edu. Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com

  20. Peace Operations in Mali: Theory into Practice Then Measuring Effectiveness

    DTIC Science & Technology

    2017-06-09

    community’s response along two broad lines of effort (LOE): Creating a Safe and Secure Environment and promoting Stable Governance. When seeking to achieve a... Safe and Secure Environment , two objectives were measured. Objective #1 sought the Cessation of Large Scale Violence. Success was attained, as...Creating a Safe and Secure Environment and promoting Stable Governance. When seeking to achieve a Safe and Secure Environment , two objectives were

  1. The motivations, institutions and organization of university-industry collaborations in the Netherlands.

    PubMed

    Bodas Freitas, Isabel Maria; Verspagen, Bart

    2017-01-01

    This study builds on the economics and organization literatures to explore whether and how institutions and organizational structure complement or substitute each other to create specific spaces of alignment where specific individual actors' motivations co-exist. Focusing on university-industry collaborations, the study examines whether and how different axes of alignment of university and industry motivations are integrated in projects with specific technological objectives and organizational structures, benefitting from the presence of specific institutions designed to facilitate collaboration. Empirically, the study relies on in-depth data on 30 university-industry collaborations in the Netherlands, and provides preliminary evidence that the technological objective and organizational structure of collaboration are malleable variables allowing the integration of both partners' objectives and expectations. Different institutional incentives for university-industry collaboration favor specific axes of alignment of motivations and certain types of collaborative projects' design. Hence, our exploratory results suggest that specific organizational and technological structures tend to prevail in the presence of specific institutions.

  2. The Enterprise 2.0 Concept: Challenges on Data and Information Security

    NASA Astrophysics Data System (ADS)

    Silva, Ana; Moreira, Fernando; Varajão, João

    The Web 2.0 wave has "hit" businesses all over the world, with companies taking advantage of the 2.0 concept and new applications stimulating collaboration between employees, and also with external partners (suppliers, contractors, universities, R&D organizations and others). However, the use of Web 2.0 applications inside organizations has created additional security challenges, especially regarding data and information security. Companies need to be aware of these risks when deploying the 2.0 concept and take a proactive approach on security. In this paper are identified and discussed some of the challenges and risks of the use of Web 2.0 tools, namely when it comes to securing companies' intellectual property.

  3. Protecting Sensitive Information in Directory Services Using Virtual Directories

    NASA Astrophysics Data System (ADS)

    Claycomb, William; Shin, Dongwan

    Directory services are commonly used to store information related to individuals, and often act as a source for security services, such as authentication and access control, in collaborative applications within/across organizations. Hence, there is an urgent need to protect the sensitive information they contain. Existing solutions offer minimal protection against insider attacks, a growing threat to both government and industry data services. In this paper we present a solution for data protection that leverages virtual directories and data encryption to provide a user-centric approach to data protection, delegation, and collaboration. A security architecture is presented, along with the discussion of the benefits and vulnerabilities of our approach. We also discuss a proof-of-concept implementation and performance testing results.

  4. Collaborating to optimize nursing students' agency information technology use.

    PubMed

    Fetter, Marilyn S

    2009-01-01

    As the learning laboratory for gaining actual patient care experience, clinical agencies play an essential role in nursing education. With an information technology revolution transforming healthcare, nursing programs are eager for their students to learn the latest informatics systems and technologies. However, many healthcare institutions are struggling to meet their own information technology needs and report limited resources and other as barriers to nursing student training. In addition, nursing students' information technology access and use raise security and privacy concerns. With the goal of a fully electronic health record by 2014, it is imperative that agencies and educational programs collaborate. They need to establish educationally sound, cost-effective, and secure policies and procedures for managing students' use of information technology systems. Strategies for evaluating options, selecting training methods, and ensuring data security are shared, along with strategies that may reap clinical, economic, and educational benefits. Students' information technology use raises numerous issues that the nursing profession must address to participate in healthcare's transformation into the digital age.

  5. Web Service Execution and Monitoring in Integrated Applications in Support of Business Communities

    NASA Astrophysics Data System (ADS)

    Chiriacescu, Rares M.; SzóKe, Alexandru; Portase, Sorin; Florea, Monica

    Emerging technology is one of the key factors that drive the business world to faster adaptation, reaction and shorter communication path. Building upon such technologies, business communities emerge, geared toward high flexibility in their offerings and collaboration: business-to-customer and business-to-business collaborations. Adapting to the market requirements, companies must address several technical challenges that arise from the main requirements of the system they have to introduce: a high degree of flexibility, heterogeneous system collaboration and security of the transferred data.

  6. The Preparedness Web: Utilizing Regional Collaborative Networks for Homeland Security Preparedness

    DTIC Science & Technology

    2007-09-01

    Hughes’ conflict strategies could then be used to develop methodologies for improved conflict management . 45 D. ORGANIZATIONAL CHANGE Emergency...has training in place to develop collaborative skills (e.g., conflict management , team process skills). * 2.3 (0.7) * 4 point scale; 1...included (a) knowledge of other agencies’ capabilities, (b) communication, (c) inter-agency trust and respect, and (d) conflict management . Further

  7. Enabling Security, Stability, Transition, and Reconstruction Operations through Knowledge Management

    DTIC Science & Technology

    2009-03-18

    strategy. Overall, the cultural barriers to knowledge sharing center on knowledge creation and capture. The primary barrier to knowledge sharing is lack ... Lacking a shared identity decreases the likelihood of knowledge sharing, which is essential to effective collaboration.84 Related to collaboration...to adapt, develop, and change based on experience-derived knowledge.90 A second cultural barrier to knowledge acquisition is the lack receptiveness

  8. Preclinical Mouse Models of Neurofibromatosis

    DTIC Science & Technology

    2004-10-01

    collaborated closely and have shared expertise and reagents extensively. This NF Consortium is a member of the Moue Models of Human Cancer Consortium...of the National Cancer Institute and is participating fully in the activities of the group. The current award will support these collaborative...studies through 2005. 14. SUBJECT TERMS 15. NUMBER OF PAGES Neurofibromatosis, cancer , mouse models 48 16. PRICE CODE 17. SECURITY CLASSIFICATION 78

  9. Using the Internet in Middle Schools: A Model for Success. A Collaborative Effort between Los Alamos National Laboratory (LANL) and Los Alamos Middle School (LAMS).

    ERIC Educational Resources Information Center

    Addessio, Barbara K.; And Others

    Los Alamos National Laboratory (LANL) developed a model for school networking using Los Alamos Middle School as a testbed. The project was a collaborative effort between the school and the laboratory. The school secured administrative funding for hardware and software; and LANL provided the network architecture, installation, consulting, and…

  10. Bonding with the Nuclear Industry: A Technical Communication Professor and His Students Partner With Y-12 National Security Complex

    ERIC Educational Resources Information Center

    Hirst, Russel

    2016-01-01

    This article describes how a special kind of academe-industry collaboration--based on a joint appointment agreement between a university and an industry site--was set up, promoted, and experienced by a professor of technical communication and his student interns. To illustrate the nature and value of this kind of collaboration, the article…

  11. Safeguards and Security by Design (SSBD) for Small Modular Reactors (SMRs) through a Common Global Approach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Badwan, Faris M.; Demuth, Scott Francis; Miller, Michael Conrad

    Small Modular Reactors (SMR) with power levels significantly less than the currently standard 1000 to 1600-MWe reactors have been proposed as a potential game changer for future nuclear power. SMRs may offer a simpler, more standardized, and safer modular design by using factory built and easily transportable components. Additionally, SMRs may be more easily built and operated in isolated locations, and may require smaller initial capital investment and shorter construction times. Because many SMRs designs are still conceptual and consequently not yet fixed, designers have a unique opportunity to incorporate updated design basis threats, emergency preparedness requirements, and then fullymore » integrate safety, physical security, and safeguards/material control and accounting (MC&A) designs. Integrating safety, physical security, and safeguards is often referred to as integrating the 3Ss, and early consideration of safeguards and security in the design is often referred to as safeguards and security by design (SSBD). This paper describes U.S./Russian collaborative efforts toward developing an internationally accepted common approach for implementing SSBD/3Ss for SMRs based upon domestic requirements, and international guidance and requirements. These collaborative efforts originated with the Nuclear Energy and Nuclear Security working group established under the U.S.-Russia Bilateral Presidential Commission during the 2009 Presidential Summit. Initial efforts have focused on review of U.S. and Russian domestic requirements for Security and MC&A, IAEA guidance for security and MC&A, and IAEA requirements for international safeguards. Additionally, example SMR design features that can enhance proliferation resistance and physical security have been collected from past work and reported here. The development of a U.S./Russian common approach for SSBD/3Ss should aid the designer of SMRs located anywhere in the world. More specifically, the application of this approach may lead to more proliferation resistant and physically secure design features for SMRs.« less

  12. Multimedia Security System for Security and Medical Applications

    ERIC Educational Resources Information Center

    Zhou, Yicong

    2010-01-01

    This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…

  13. Multi-objective Optimization of Solar-driven Hollow-fiber Membrane Distillation Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nenoff, Tina M.; Moore, Sarah E.; Mirchandani, Sera

    Securing additional water sources remains a primary concern for arid regions in both the developed and developing world. Climate change is causing fluctuations in the frequency and duration of precipitation, which can be can be seen as prolonged droughts in some arid areas. Droughts decrease the reliability of surface water supplies, which forces communities to find alternate primary water sources. In many cases, ground water can supplement the use of surface supplies during periods of drought, reducing the need for above-ground storage without sacrificing reliability objectives. Unfortunately, accessible ground waters are often brackish, requiring desalination prior to use, and underdevelopedmore » infrastructure and inconsistent electrical grid access can create obstacles to groundwater desalination in developing regions. The objectives of the proposed project are to (i) mathematically simulate the operation of hollow fiber membrane distillation systems and (ii) optimize system design for off-grid treatment of brackish water. It is anticipated that methods developed here can be used to supply potable water at many off-grid locations in semi-arid regions including parts of the Navajo Reservation. This research is a collaborative project between Sandia and the University of Arizona.« less

  14. Across the Atlantic cooperation to address international challenges in eHealth and health IT: managing toward a common goal.

    PubMed

    Friedman, Charles P; Iakovidis, Ilias; Debenedetti, Laurent; Lorenzi, Nancy M

    2009-11-01

    Countries on both sides of the Atlantic Ocean have invested in health information and communication technologies. Since eHealth challenges cross borders a European Union-United States of America conference on public policies relating to health IT and eHealth was held October 20-21, 2008 in Paris, France. The conference was organized around the four themes: (1) privacy and security, (2) health IT interoperability, (3) deployment and adoption of health IT, and (4) Public Private Collaborative Governance. The four key themes framed the discussion over the two days of plenary sessions and workshops. Key findings of the conference were organized along the four themes. (1) Privacy and security: Patients' access to their own data and key elements of a patient identification management framework were discussed. (2) Health IT interoperability: Three significant and common interoperability challenges emerged: (a) the need to establish common or compatible standards and clear guidelines for their implementation, (b) the desirability for shared certification criteria and (c) the need for greater awareness of the importance of interoperability. (3) Deployment and adoption of health IT: Three major areas of need emerged: (a) a shared knowledge base and assessment framework, (b) public-private collaboration and (c) and effective organizational change strategies. (4) Public Private Collaborative Governance: Sharing and communication are central to success in this area. Nations can learn from one another about ways to develop harmonious, effective partnerships. Three areas that were identified as highest priority for collaboration included: (1) health data security, (2) developing effective strategies to ensure healthcare professionals' acceptance of health IT tools, and (3) interoperability.

  15. The Value of Doctrine for a Developing Organization

    DTIC Science & Technology

    2009-12-01

    increasingly public topic since the events of September 11, 2001. Customs and Border Protection (CBP) is one of the Department of Homeland Security’s...CBP was created, the majority of the existing organization came from two legacy agencies, U.S. Customs and the Immigration and Naturalization Service...Collaboration, Merger, Trust, Customs And Border Protection, CBP 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY

  16. Shared Awareness in Times of Crisis: A Framework for Collaboration

    DTIC Science & Technology

    2011-06-01

    also affords a “ dashboard ” perspective allowing for centralization of resources. The U.S. Army’s Knowledge Online portal is one example of a single...labor, energy, materials, information, cash and technology into outputs of higher value • Organization’s values (criteria that managers and...follows: Challenges - Disabilities Inter-Organizational Cross-Organizational Privacy and Security high security (portal) blocks information flow Trust

  17. Common Capabilities for Trust and Security in Service Oriented Infrastructures

    NASA Astrophysics Data System (ADS)

    Brossard, David; Colombo, Maurizio

    In order to achieve agility of the enterprise and shorter concept-to-market timescales for new services, IT and communication providers and their customers increasingly use technologies and concepts which come together under the banner of the Service Oriented Infrastructure (SOI) approach. In this paper we focus on the challenges relating to SOI security. The solutions presented cover the following areas: i) identity federation, ii) distributed usage & access management, and iii) context-aware secure messaging, routing & transformation. We use a scenario from the collaborative engineering space to illustrate the challenges and the solutions.

  18. South Asia Water Resources Workshop: An effort to promote water quality data sharing in South Asia

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    RAJEN,GAURAV; BIRINGER,KENT L.; BETSILL,J. DAVID

    2000-04-01

    To promote cooperation in South Asia on environmental research, an international working group comprised of participants from Bangladesh, India, Nepal, Pakistan, Sri Lanka, and the US convened at the Soaltee Hotel in Kathmandu, Nepal, September 12 to 14, 1999. The workshop was sponsored in part by the Cooperative Monitoring Center (CMC) at Sandia National Laboratories in Albuquerque, New Mexico, through funding provided by the Department of Energy (DOE) Office of Nonproliferation and National Security. The CMC promotes collaborations among scientists and researchers in regions throughout the world as a means of achieving common regional security objectives. In the long term,more » the workshop organizers and participants are interested in the significance of regional information sharing as a means to build confidence and reduce conflict. The intermediate interests of the group focus on activities that might eventually foster regional management of some aspects of water resources utilization. The immediate purpose of the workshop was to begin the implementation phase of a project to collect and share water quality information at a number of river and coastal estuary locations throughout the region. The workshop participants achieved four objectives: (1) gaining a better understanding of the partner organizations involved; (2) garnering the support of existing regional organizations promoting environmental cooperation in South Asia; (3) identifying sites within the region at which data is to be collected; and (4) instituting a data and information collection and sharing process.« less

  19. The ESGF Software Stack: a Configurable and Extensible Framework for Enabling Access to Geospatial Data

    NASA Astrophysics Data System (ADS)

    Cinquini, L.; Bell, G. M.; Williams, D.; Harney, J.

    2012-12-01

    The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing state-of-the-art services for the management and access of Earth system data. ESGF is currently used to serve the totality of the model output used for the forthcoming IPCC 5th assessment report on climate change, as well as supporting observational and reanalysis datasets. Also, it is been adopted by several other projects that focus on global, regional and local climate modeling. The ESGF software stack is composed of several modular applications that cover related but disjoint areas of functionality: data publishing, data search and discovery, data access, user management, security, and federation. Overall, the ESGF infrastructure offers a configurable end-to-end solution to the problem of enabling web-based access to large amounts of geospatial data. This talk will present the architectural and configuration options that are available to a data provider leveraging ESGF to serve their data: which services to expose, how to scale to larger data collections, how to establish access control, how to customize the user interface, and others. Additionally, the framework provides extension points that allow each site to plug in custom functionality such as crawling of specific metadata repositories, exposing domain-specific analysis and visualization services, developing custom access clients that interact with the system APIs. These configuration and extension capabilities are based on simple but effective domain-specific object models, that underpin the software applications: the data model, the security model, and the federation model. The ESGF software stack is developed collaboratively by software engineers at many institutions around the world, and is made freely available to the community under an open source license to promote adoption, reuse, inspection and continuous improvement.

  20. Multiple Object Based RFID System Using Security Level

    NASA Astrophysics Data System (ADS)

    Kim, Jiyeon; Jung, Jongjin; Ryu, Ukjae; Ko, Hoon; Joe, Susan; Lee, Yongjun; Kim, Boyeon; Chang, Yunseok; Lee, Kyoonha

    2007-12-01

    RFID systems are increasingly applied for operational convenience in wide range of industries and individual life. However, it is uneasy for a person to control many tags because common RFID systems have the restriction that a tag used to identify just a single object. In addition, RFID systems can make some serious problems in violation of privacy and security because of their radio frequency communication. In this paper, we propose a multiple object RFID tag which can keep multiple object identifiers for different applications in a same tag. The proposed tag allows simultaneous access for their pair applications. We also propose an authentication protocol for multiple object tag to prevent serious problems of security and privacy in RFID applications. Especially, we focus on efficiency of the authentication protocol by considering security levels of applications. In the proposed protocol, the applications go through different authentication procedures according to security level of the object identifier stored in the tag. We implemented the proposed RFID scheme and made experimental results about efficiency and stability for the scheme.

  1. Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering

    NASA Astrophysics Data System (ADS)

    Li, Fengjun; Luo, Bo; Liu, Peng; Squicciarini, Anna C.; Lee, Dongwon; Chu, Chao-Hsien

    Nowadays, increasing needs for information sharing arise due to extensive collaborations among organizations. Organizations desire to provide data access to their collaborators while preserving full control over the data and comprehensive privacy of their users. A number of information systems have been developed to provide efficient and secure information sharing. However, most of the solutions proposed so far are built atop of conventional data warehousing or distributed database technologies.

  2. Federal-Tribal Government Collaboration in Homeland Security

    DTIC Science & Technology

    2007-09-01

    the direct cooperation and collaboration that had long characterized their unique status. Many tribes, such as the Navajo Nation , cover areas in...values. The Navajo Rangers interoperable communications system was also cited as a model. The Navajo Rangers are part of the Navajo Nation Parks...through the tribal lands of the Tohono O’odham Nation , and more than twenty-five other tribes have land on or near the international borders or

  3. Avionics Collaborative Engineering Technology Delivery Order 0035: Secure Knowledge Management (SKM) Technology Research Roadmap - Technology Trends for Collaborative Information and Knowledge Management Research

    DTIC Science & Technology

    2004-06-01

    such as that represented in the know-how of the master craftsman), and cognitive (know why, perceptions, values, beliefs, and mental models).4... cognitive engineering, educational technology, industrial/organizational psychology, sociology, cultural anthropology, and computational...such as human-human interaction, interface design and evaluation methodology, cognitive models and user models, health and ergonomic studies, empirical

  4. Nuclear Security Education Program at the Pennsylvania State University

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Uenlue, Kenan; The Pennsylvania State University, Department of Mechanical and Nuclear Engineering, University Park, PA 16802-2304; Jovanovic, Igor

    The availability of trained and qualified nuclear and radiation security experts worldwide has decreased as those with hands-on experience have retired while the demand for these experts and skills have increased. The U.S. Department of Energy's National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) has responded to the continued loss of technical and policy expertise amongst personnel and students in the security field by initiating the establishment of a Nuclear Security Education Initiative, in partnership with Pennsylvania State University (PSU), Texas A and M (TAMU), and Massachusetts Institute of Technology (MIT). This collaborative, multi-year initiative forms the basismore » of specific education programs designed to educate the next generation of personnel who plan on careers in the nonproliferation and security fields with both domestic and international focus. The three universities worked collaboratively to develop five core courses consistent with the GTRI mission, policies, and practices. These courses are the following: Global Nuclear Security Policies, Detectors and Source Technologies, Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Nuclear Security Laboratory, Threat Analysis and Assessment, and Design and Analysis of Security Systems for Nuclear and Radiological Facilities. The Pennsylvania State University (PSU) Nuclear Engineering Program is a leader in undergraduate and graduate-level nuclear engineering education in the USA. The PSU offers undergraduate and graduate programs in nuclear engineering. The PSU undergraduate program in nuclear engineering is the largest nuclear engineering programs in the USA. The PSU Radiation Science and Engineering Center (RSEC) facilities are being used for most of the nuclear security education program activities. Laboratory space and equipment was made available for this purpose. The RSEC facilities include the Penn State Breazeale Reactor (PSBR), gamma irradiation facilities (in-pool irradiator, dry irradiator, and hot cells), neutron beam laboratory, radiochemistry laboratories, and various radiation detection and measurement laboratories. A new nuclear security education laboratory was created with DOE NNSA- GTRI funds at RSEC. The nuclear security graduate level curriculum enables the PSU to educate and train future nuclear security experts, both within the United States as well as worldwide. The nuclear security education program at Penn State will grant a Master's degree in nuclear security starting fall 2015. The PSU developed two courses: Nuclear Security- Detector And Source Technologies and Nuclear Security- Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements (Laboratory). Course descriptions and course topics of these courses are described briefly: - Nuclear Security - Detector and Source Technologies; - Nuclear Security - Applications of Detectors/Sensors/Sources for Radiation Detection and Measurements Laboratory.« less

  5. Faces of Science

    Science.gov Websites

    Innovation in New Mexico Los Alamos Collaboration for Explosives Detection (LACED) SensorNexus Exascale effects of tuberculosis infection on AIDS, and issues related to national security. Play video Read more

  6. Global agenda, local health: including concepts of health security in preparedness programs at the jurisdictional level.

    PubMed

    Eby, Chas

    2014-01-01

    The Global Health Security Agenda's objectives contain components that could help health departments address emerging public health challenges that threaten the population. As part of the agenda, partner countries with advanced public health systems will support the development of infrastructure in stakeholder health departments. To facilitate this process and augment local programs, state and local health departments may want to include concepts of health security in their public health preparedness offices in order to simultaneously build capacity. Health security programs developed by public health departments should complete projects that are closely aligned with the objectives outlined in the global agenda and that facilitate the completion of current preparedness grant requirements. This article identifies objectives and proposes tactical local projects that run parallel to the 9 primary objectives of the Global Health Security Agenda. Executing concurrent projects at the international and local levels in preparedness offices will accelerate the completion of these objectives and help prevent disease epidemics, detect health threats, and respond to public health emergencies. Additionally, future funding tied or related to health security may become more accessible to state and local health departments that have achieved these objectives.

  7. Triadic and collaborative play by gorillas in social games with objects.

    PubMed

    Tanner, Joanne E; Byrne, Richard W

    2010-07-01

    Interaction with others over objects has until recently been thought lacking in the social play of non-human great apes, in contrast to that of children; even now, only bonobos have been observed to engage in social play involving objects. Human children's triadic interactions with objects involve joint attention, showing and giving, communication that maintains interaction, and sharing of emotions and experiences. We question assertions that chimpanzees, and non-human great apes in general, lack the key characteristics of children's collaborative play. Here, we show that zoo gorillas play games that are both triadic and collaborative. These games were videotaped at the San Francisco Zoo in five different years and involved five different pairings of gorillas. The context was in most cases playfully competitive, involving objects such as balls, bags and leather pieces as foci of joint attention; the ostensible goal in most games was to gain or keep possession of a particular object. In some episodes, roles as possessor or pursuer of an object were exchanged many times; in others, one gorilla retained possession of an object but encouraged pursuit from a partner. Through gaze and gesture, gorillas invited others to: share interest in and attention to objects; share patterns of play; and re-engage after breaks in play. Sometimes, gorillas would assist others in their efforts to engage in collaborative play: older gorillas encouraged younger partners by 'self-handicapping' their own actions. Collaborative games may occur later in the ontogeny of gorillas than in humans, and depend on the challenges and artifacts available in a particular group's habitat.

  8. Collaborative Production of Learning Objects on French Literary Works Using the LOC Software

    ERIC Educational Resources Information Center

    Penman, Christine

    2015-01-01

    This case study situates the collaborative design of learning objects (interactive online learning material) using the LOC (Learning Object Creator) software in the context of language activities external to the core learning activities of language students at a UK university. It describes the creative and pedagogical processes leading to the…

  9. Nurse faculty as international research collaborators.

    PubMed

    O'Keefe, Louise C; Frith, Karen H; Barnby, Elizabeth

    2017-03-01

    Nursing faculty who desire to expand their research portfolios will benefit from collaboration with researchers with complimentary interests from different universities across the world. International collaboration can enhance the productivity of researchers who seek to conduct studies with similar populations in different environments, and who desire a larger impact based on the findings of their studies. International collaborative teams have the potential to make important discoveries that affect the health of populations across the world. Communication is a critical step in defining the roles and professional relationships of researchers involved in international collaboration. Researchers need to be cognizant of rules affecting data security, intellectual property, data ownership, and funding sources in each country. International collaborative research can be exciting and rewarding, especially when participants are culturally aware, respect universities' policies, and are mindful of the ethical and legal principles for the countries in which the research is conducted. This article describes ways to enhance the success of nursing faculty who desire a rich experience with international research collaborators. © 2016 John Wiley & Sons Australia, Ltd.

  10. The Diesel Combustion Collaboratory: Combustion Researchers Collaborating over the Internet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    C. M. Pancerella; L. A. Rahn; C. Yang

    2000-02-01

    The Diesel Combustion Collaborator (DCC) is a pilot project to develop and deploy collaborative technologies to combustion researchers distributed throughout the DOE national laboratories, academia, and industry. The result is a problem-solving environment for combustion research. Researchers collaborate over the Internet using DCC tools, which include: a distributed execution management system for running combustion models on widely distributed computers, including supercomputers; web-accessible data archiving capabilities for sharing graphical experimental or modeling data; electronic notebooks and shared workspaces for facilitating collaboration; visualization of combustion data; and video-conferencing and data-conferencing among researchers at remote sites. Security is a key aspect of themore » collaborative tools. In many cases, the authors have integrated these tools to allow data, including large combustion data sets, to flow seamlessly, for example, from modeling tools to data archives. In this paper the authors describe the work of a larger collaborative effort to design, implement and deploy the DCC.« less

  11. Information security requirements in patient-centred healthcare support systems.

    PubMed

    Alsalamah, Shada; Gray, W Alex; Hilton, Jeremy; Alsalamah, Hessah

    2013-01-01

    Enabling Patient-Centred (PC) care in modern healthcare requires the flow of medical information with the patient between different healthcare providers as they follow the patient's treatment plan. However, PC care threatens the stability of the balance of information security in the support systems since legacy systems fall short of attaining a security balance when sharing their information due to compromises made between its availability, integrity, and confidentiality. Results show that the main reason for this is that information security implementation in discrete legacy systems focused mainly on information confidentiality and integrity leaving availability a challenge in collaboration. Through an empirical study using domain analysis, observations, and interviews, this paper identifies a need for six information security requirements in legacy systems to cope with this situation in order to attain the security balance in systems supporting PC care implementation in modern healthcare.

  12. 2008 U.S. Coast Guard Innovation Expo

    DTIC Science & Technology

    2008-11-20

    for Capability (CG-7) Public Release Authorized DCO Outcomes • Mission Performance Plans, policies, strategic analysis and planning, assessments and...Untitled Document 2008 U.S.htm[5/26/ 2016 2:24:38 PM] 2008 U.S. Coast Guard Innovation Expo “Collaboration Fuels Innovation” Virginia Beach, Virginia...Untitled Document 2008 U.S.htm[5/26/ 2016 2:24:38 PM] Panelists: Mr. Tom Tomaiko, Maritime Security Program Manager, Borders and Maritime Security

  13. Analysis of Leading Edge and Trailing Edge Cover Glass Samples Before and After Treatment with Advanced Satellite Contamination Removal Techniques

    DTIC Science & Technology

    1993-04-01

    surface analysis, 40 contamination control, ANCC ( Aerogel Mesh Contamination Collector) iPRICECODE 17. SECURITY CLASSIFICATION 1 & SECURITY CLASSIFICATION...operational parameter space (temperature, vibration, radiation, vacuum and micrometorite environments). One embodiment of this device, the Aerogel Mesh...Lippey and Dan Demeo of Hughes Aircraft Corporation for their kind hospitality and research collaboration on the contamination removal phase of this work

  14. Hospital Security and Force Protection: A Guide to Ensuring Patient and Employee Safety

    DTIC Science & Technology

    2006-04-28

    leader and set up training camps for his recruits. Through these experiences, Osama Bin Laden was able to obtain money , weapons, and develop connections...options to deter counterfeits . Hospital Security 50 Membership within community collaboratives or community-based organizations provides excellent...iris or fingerprints scans are resistant to theft and counterfeit , assuring access to only authorized personnel. Many theme parks are utilizing this

  15. High Fidelity Simulations of Large-Scale Wireless Networks (Plus-Up)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Onunkwo, Uzoma

    Sandia has built a strong reputation in scalable network simulation and emulation for cyber security studies to protect our nation’s critical information infrastructures. Georgia Tech has preeminent reputation in academia for excellence in scalable discrete event simulations, with strong emphasis on simulating cyber networks. Many of the experts in this field, such as Dr. Richard Fujimoto, Dr. George Riley, and Dr. Chris Carothers, have strong affiliations with Georgia Tech. The collaborative relationship that we intend to immediately pursue is in high fidelity simulations of practical large-scale wireless networks using ns-3 simulator via Dr. George Riley. This project will have mutualmore » benefits in bolstering both institutions’ expertise and reputation in the field of scalable simulation for cyber-security studies. This project promises to address high fidelity simulations of large-scale wireless networks. This proposed collaboration is directly in line with Georgia Tech’s goals for developing and expanding the Communications Systems Center, the Georgia Tech Broadband Institute, and Georgia Tech Information Security Center along with its yearly Emerging Cyber Threats Report. At Sandia, this work benefits the defense systems and assessment area with promise for large-scale assessment of cyber security needs and vulnerabilities of our nation’s critical cyber infrastructures exposed to wireless communications.« less

  16. D3: A Collaborative Infrastructure for Aerospace Design

    NASA Technical Reports Server (NTRS)

    Walton, Joan; Filman, Robert E.; Knight, Chris; Korsmeyer, David J.; Lee, Diana D.; Clancy, Daniel (Technical Monitor)

    2001-01-01

    DARWIN is a NASA developed, Internet-based system for enabling aerospace researchers to securely and remotely access and collaborate on the analysis of aerospace vehicle design data, primarily the results of wind-tunnel testing and numeric (e.g., computational fluid dynamics) model executions. DARWIN captures, stores and indexes data, manages derived knowledge (such as visualizations across multiple data sets) and provides an environment for designers to collaborate in the analysis of the results of testing. DARWIN is an interesting application because it supports high volumes of data, integrates multiple modalities of data display (e.g. images and data visualizations), and provides non-trivial access control mechanisms. DARWIN enables collaboration by allowing not only sharing visualizations of data, but also commentary about and view of data.

  17. Peer-to-Peer Science Data Environment

    NASA Astrophysics Data System (ADS)

    Byrnes, J. B.; Holland, M. P.

    2004-12-01

    The goal of P2PSDE is to provide a convenient and extensible Peer-to-Peer (P2P) network architecture that allows: distributed science-data services-seamlessly incorporating collaborative value-added services with search-oriented access to remote science data. P2PSDE features the real-time discovery of data-serving peers (plus peer-groups and peer-group services), in addition to the searching for and transferring of science data. These features are implemented using "Project JXTA", the first and only standardized set of open, generalized P2P protocols that allow arbitrary network devices to communicate and collaborate as peers. The JXTA protocols standardize the manner in which peers discover each other, self-organize into peer groups, advertise and discover network services, and securely communicate with and monitor each other-even across network firewalls. The key benefits include: Potential for dramatic improvements in science-data dissemination; Real-time-discoverable, potentially redundant (reliable), science-data services; Openness/Extensibility; Decentralized use of small, inexpensive, readily-available desktop machines; and Inherently secure-with ability to create variable levels of security by group.

  18. 22 CFR 9.2 - Objective.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 22 Foreign Relations 1 2011-04-01 2011-04-01 false Objective. 9.2 Section 9.2 Foreign Relations DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS § 9.2 Objective. The objective of the Department's classification program is to ensure that national security information is protected from...

  19. 22 CFR 9.2 - Objective.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Objective. 9.2 Section 9.2 Foreign Relations DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS § 9.2 Objective. The objective of the Department's classification program is to ensure that national security information is protected from...

  20. Collaboration in Research and Engineering for Advanced Technology.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Vrieling, P. Douglas

    SNL/CA proposes the Collaboration in Research and Engineering for Advanced Technology and Education (CREATE) facility to support customer-driven national security mission requirements while demonstrating a fiscally responsible approach to cost-control. SNL/CA realizes that due to the current backlog of capital projects in NNSA that following the normal Line Item process to procure capital funding is unlikely and therefore SNL/CA will be looking at all options including Alternative Financing.

  1. Latin American Security Challenges: A Collaborative Inquiry from North and South

    DTIC Science & Technology

    2004-01-01

    Jorge Eduardo Malena, and Gabriela E. Porn Conclusion 103 Bibliography 109 Abbreviations 115 Contributors 117 Collaborating Organizations 119 Titles...Malena of the Catholic University, Bue- nos Aires; and Gabriela E. Porn of the Centro de Estudios Hemisféricos on their chapter. With good fortune and...Malena of the Catholic University, Buenos Aires; and Gabriela E. Porn of the Centro de Estudios Hemisféricos assess “Chinese Interests in Latin

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilson, David G.; Cook, Marvin A.

    This report summarizes collaborative efforts between Secure Scalable Microgrid and Korean Institute of Energy Research team members . The efforts aim to advance microgrid research and development towards the efficient utilization of networked microgrids . The collaboration resulted in the identification of experimental and real time simulation capabilities that may be leveraged for networked microgrids research, development, and demonstration . Additional research was performed to support the demonstration of control techniques within real time simulation and with hardware in the loop for DC microgrids .

  3. The Secure Medical Research Workspace: An IT Infrastructure to Enable Secure Research on Clinical Data

    PubMed Central

    Owen, Phillips; Mostafa, Javed; Lamm, Brent; Wang, Xiaoshu; Schmitt, Charles P.; Ahalt, Stanley C.

    2013-01-01

    Abstract Clinical data have tremendous value for translational research, but only if security and privacy concerns can be addressed satisfactorily. A collaboration of clinical and informatics teams, including RENCI, NC TraCS, UNC's School of Information and Library Science, Information Technology Service's Research Computing and other partners at the University of North Carolina at Chapel Hill have developed a system called the Secure Medical Research Workspace (SMRW) that enables researchers to use clinical data securely for research. SMRW significantly minimizes the risk presented when using identified clinical data, thereby protecting patients, researchers, and institutions associated with the data. The SMRW is built on a novel combination of virtualization and data leakage protection and can be combined with other protection methodologies and scaled to production levels. PMID:23751029

  4. PREMIX: PRivacy-preserving EstiMation of Individual admiXture.

    PubMed

    Chen, Feng; Dow, Michelle; Ding, Sijie; Lu, Yao; Jiang, Xiaoqian; Tang, Hua; Wang, Shuang

    2016-01-01

    In this paper we proposed a framework: PRivacy-preserving EstiMation of Individual admiXture (PREMIX) using Intel software guard extensions (SGX). SGX is a suite of software and hardware architectures to enable efficient and secure computation over confidential data. PREMIX enables multiple sites to securely collaborate on estimating individual admixture within a secure enclave inside Intel SGX. We implemented a feature selection module to identify most discriminative Single Nucleotide Polymorphism (SNP) based on informativeness and an Expectation Maximization (EM)-based Maximum Likelihood estimator to identify the individual admixture. Experimental results based on both simulation and 1000 genome data demonstrated the efficiency and accuracy of the proposed framework. PREMIX ensures a high level of security as all operations on sensitive genomic data are conducted within a secure enclave using SGX.

  5. Crooked River Collaborative Water Security Act of 2013

    THOMAS, 113th Congress

    Sen. Merkley, Jeff [D-OR

    2013-11-21

    Senate - 07/31/2014 Placed on Senate Legislative Calendar under General Orders. Calendar No. 512. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  6. Justice and Mental Health Collaboration Act of 2013

    THOMAS, 113th Congress

    Rep. Nugent, Richard B. [R-FL-11

    2013-01-23

    House - 02/28/2013 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, And Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. Collaborating With Businesses to Support and Sustain Research.

    PubMed

    Moch, Susan Diemert; Jansen, Debra A; Jadack, Rosemary A; Page, Phil; Topp, Robert

    2015-10-01

    Financial assistance is necessary for sustaining research at universities. Business collaborations are a potential means for obtaining these funds. To secure funding, understanding the process for obtaining these business funds is important for nursing faculty members. Although faculty rarely request funding from businesses, they are often in a position to solicit financial support due to existing relationships with clinical agency administrators, staff, and community leaders. The economic support received from businesses provides outcomes in nursing research, research education, academic-service partnerships, and client health care. This article describes the steps and processes involved in successfully obtaining research funding from businesses. In addition, case examples for securing and maintaining funding from health care agencies (evidence-based practice services) and from a health manufacturing company (product evaluation) are used to demonstrate the process. © The Author(s) 2015.

  8. A Data Mining Approach to Reveal Representative Collaboration Indicators in Open Collaboration Frameworks

    ERIC Educational Resources Information Center

    Anaya, Antonio R.; Boticario, Jesus G.

    2009-01-01

    Data mining methods are successful in educational environments to discover new knowledge or learner skills or features. Unfortunately, they have not been used in depth with collaboration. We have developed a scalable data mining method, whose objective is to infer information on the collaboration during the collaboration process in a…

  9. Comparative study on collaborative interaction in non-immersive and immersive systems

    NASA Astrophysics Data System (ADS)

    Shahab, Qonita M.; Kwon, Yong-Moo; Ko, Heedong; Mayangsari, Maria N.; Yamasaki, Shoko; Nishino, Hiroaki

    2007-09-01

    This research studies the Virtual Reality simulation for collaborative interaction so that different people from different places can interact with one object concurrently. Our focus is the real-time handling of inputs from multiple users, where object's behavior is determined by the combination of the multiple inputs. Issues addressed in this research are: 1) The effects of using haptics on a collaborative interaction, 2) The possibilities of collaboration between users from different environments. We conducted user tests on our system in several cases: 1) Comparison between non-haptics and haptics collaborative interaction over LAN, 2) Comparison between non-haptics and haptics collaborative interaction over Internet, and 3) Analysis of collaborative interaction between non-immersive and immersive display environments. The case studies are the interaction of users in two cases: collaborative authoring of a 3D model by two users, and collaborative haptic interaction by multiple users. In Virtual Dollhouse, users can observe physics law while constructing a dollhouse using existing building blocks, under gravity effects. In Virtual Stretcher, multiple users can collaborate on moving a stretcher together while feeling each other's haptic motions.

  10. Food and water security issues in Russia I: food security in the general population of the Russian Arctic, Siberia and the Far East, 2000–2011

    PubMed Central

    Dudarev, Alexey A.; Alloyarov, Pavel R.; Chupakhin, Valery S.; Dushkina, Eugenia V.; Sladkova, Yuliya N.; Dorofeyev, Vitaliy M.; Kolesnikova, Tatijana A.; Fridman, Kirill B.; Nilsson, Lena Maria; Evengård, Birgitta

    2013-01-01

    Background Problems related to food security in Russian Arctic (dietary imbalance, predominance of carbohydrates, shortage of milk products, vegetables and fruits, deficit of vitamins and microelements, chemical, infectious and parasitic food contamination) have been defined in the literature. But no standard protocol of food security assessment has been used in the majority of studies. Objectives Our aim was to obtain food security indicators, identified within an Arctic collaboration, for selected regions of the Russian Arctic, Siberia and the Far East, and to compare food safety in these territories. Study design and methods In 18 regions of the Russian Arctic, Siberia and the Far East, the following indicators of food security were analyzed: food costs, food consumption, and chemical and biological food contamination for the period 2000–2011. Results Food costs in the regions are high, comprising 23–43% of household income. Only 4 out of 10 food groups (fish products, cereals, sugar, plant oil) are consumed in sufficient amounts. The consumption of milk products, eggs, vegetables, potatoes, fruits (and berries) is severely low in a majority of the selected regions. There are high levels of biological contamination of food in many regions. The biological and chemical contamination situation is alarming, especially in Chukotka. Only 7 food pollutants are under regular control; among pesticides, only DDT. Evenki AO and Magadan Oblast have reached peak values in food contaminants compared with other regions. Mercury in local fish has not been analyzed in the majority of the regions. In 3 regions, no monitoring of DDT occurs. Aflatoxins have not been analyzed in 5 regions. Nitrates had the highest percentage in excess of the hygienic threshold in all regions. Excesses of other pollutants in different regions were episodic and as a rule not high. Conclusion Improvement of the food supply and food accessibility in the regions of the Russian Arctic, Siberia and the Far East is of utmost importance. Both quantitative and qualitative control of chemical and biological contaminants in food is insufficient and demands radical enhancement aimed at improving food security. PMID:24471055

  11. SO-QT: Collaborative Tool to Project the Future Space Object Population

    NASA Technical Reports Server (NTRS)

    Stupl, Jan

    2017-01-01

    Earth orbit gets increasingly congested, a challenge to space operators, both in governments and industry. We present a web tool that provides: 1) data on todays and the historic space object environments, by aggregating object-specific tracking data; and 2) future trends through a collaboration platform to collect information on planed launches. The collaborative platform enables experts to pool and compare their data in order to generate future launch scenarios. The tool is intended to support decision makers and mission designers while they investigate future missions and scholars as they develop strategies for space traffic management.

  12. A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs

    NASA Astrophysics Data System (ADS)

    Elahi, Golnaz; Yu, Eric

    In designing software systems, security is typically only one design objective among many. It may compete with other objectives such as functionality, usability, and performance. Too often, security mechanisms such as firewalls, access control, or encryption are adopted without explicit recognition of competing design objectives and their origins in stakeholder interests. Recently, there is increasing acknowledgement that security is ultimately about trade-offs. One can only aim for "good enough" security, given the competing demands from many parties. In this paper, we examine how conceptual modeling can provide explicit and systematic support for analyzing security trade-offs. After considering the desirable criteria for conceptual modeling methods, we examine several existing approaches for dealing with security trade-offs. From analyzing the limitations of existing methods, we propose an extension to the i* framework for security trade-off analysis, taking advantage of its multi-agent and goal orientation. The method was applied to several case studies used to exemplify existing approaches.

  13. “Highly processed, highly packaged, very unhealthy. But they are low risk”: exploring intersections between community food security and food safety

    PubMed Central

    Kelsey A., Speed; Samantha B., Meyer; Rhona M., Hanning; Shannon E., Majowicz

    2017-01-01

    Abstract Introduction: Food insecurity and foodborne disease are important issues in Canada, and the public health actions taken to address them can be conceptualized as factors shaping the food environment. Given emerging evidence that these two areas may interrelate, the objective of this study was to explore ways in which community food security efforts and food safety practices (and the population health issues they aim to address) may intersect in British Columbia, Canada, and interpret what this might mean for conceptualizing and attaining healthier food environments. Methods: We conducted 14 key informant interviews with practitioners working in community food security and food safety in British Columbia, and used qualitative descriptive analysis to identify examples of intersections between the sectors. Results: Participants identified four key ways that the two sectors intersect. They identified (1) how their daily practices to promote safe or healthy food could be helped or hindered by the activities of the other sector; (2) that historically disjointed policies that do not consider multiple health outcomes related to food may complicate the interrelationship; (3) that the relationship of these sectors is also affected by the fact that specific types of food products, such as fresh produce, can be considered both risky and beneficial; and (4) that both sectors are working towards the same goal of improved population health, albeit viewing it through slightly different lenses. Conclusion: Food security and food safety connect in several ways, with implications for characterizing and improving Canadian food environments. Collaboration across separated public health areas related to food is needed when designing new programs or policies aimed at changing the way Canadians eat. PMID:29043759

  14. "Highly processed, highly packaged, very unhealthy. But they are low risk": exploring intersections between community food security and food safety.

    PubMed

    Speed, Kelsey A; Meyer, Samantha B; Hanning, Rhona M; Majowicz, Shannon E

    2017-10-01

    Food insecurity and foodborne disease are important issues in Canada, and the public health actions taken to address them can be conceptualized as factors shaping the food environment. Given emerging evidence that these two areas may interrelate, the objective of this study was to explore ways in which community food security efforts and food safety practices (and the population health issues they aim to address) may intersect in British Columbia, Canada, and interpret what this might mean for conceptualizing and attaining healthier food environments. We conducted 14 key informant interviews with practitioners working in community food security and food safety in British Columbia, and used qualitative descriptive analysis to identify examples of intersections between the sectors. Participants identified four key ways that the two sectors intersect. They identified (1) how their daily practices to promote safe or healthy food could be helped or hindered by the activities of the other sector; (2) that historically disjointed policies that do not consider multiple health outcomes related to food may complicate the interrelationship; (3) that the relationship of these sectors is also affected by the fact that specific types of food products, such as fresh produce, can be considered both risky and beneficial; and (4) that both sectors are working towards the same goal of improved population health, albeit viewing it through slightly different lenses. Food security and food safety connect in several ways, with implications for characterizing and improving Canadian food environments. Collaboration across separated public health areas related to food is needed when designing new programs or policies aimed at changing the way Canadians eat.

  15. Unintended Consequences of Wearable Sensor Use in Healthcare

    PubMed Central

    McCaldin, D.; Wang, K.; Schreier, G.; Lovell, N. H.; Marschollek, M.; Redmond, S. J.

    2016-01-01

    Summary Objectives As wearable sensors take the consumer market by storm, and medical device manufacturers move to make their devices wireless and appropriate for ambulatory use, this revolution brings with it some unintended consequences, which we aim to discuss in this paper. Methods We discuss some important unintended consequences, both beneficial and unwanted, which relate to: modifications of behavior; creation and use of big data sets; new security vulnerabilities; and unforeseen challenges faced by regulatory authorities, struggling to keep pace with recent innovations. Where possible, we proposed potential solutions to unwanted consequences. Results Intelligent and inclusive design processes may mitigate unintended modifications in behavior. For big data, legislating access to and use of these data will be a legal and political challenge in the years ahead, as we trade the health benefits of wearable sensors against the risk to our privacy. The wireless and personal nature of wearable sensors also exposes them to a number of unique security vulnerabilities. Regulation plays an important role in managing these security risks, but also has the dual responsibility of ensuring that wearable devices are fit for purpose. However, the burden of validating the function and security of medical devices is becoming infeasible for regulators, given the many software apps and wearable sensors entering the market each year, which are only a subset of an even larger ‘internet of things’. Conclusion Wearable sensors may serve to improve wellbeing, but we must be vigilant against the occurrence of unintended consequences. With collaboration between device manufacturers, regulators, and end-users, we balance the risk of unintended consequences occurring against the incredible benefit that wearable sensors promise to bring to the world. PMID:27830234

  16. Balancing the Needs between Training for Future Scientists and Broader Societal Needs--SECURE Project Research on Mathematics, Science and Technology Curricula and Their Implementation

    ERIC Educational Resources Information Center

    Sokolowska, D.; de Meyere, J.; Folmer, E.; Rovsek, B.; Peeters, W.

    2014-01-01

    SECURE is a collaborative project under FP7 to provide research results of current mathematics, science and technology (MST) curricula across Europe. The research focuses on the MST curricula offered to 5, 8, 11 and 13 year old learners in ten European countries. The consortium invited 60 schools from each partner country to participate in the…

  17. Managing U.S. Military Technology and Arms Release Policy to Israel

    DTIC Science & Technology

    2009-04-01

    in the world. In accordance with the laws governing defense export, the Defense Technology Security Administration ( DTSA ) is chartered to be the...Marines, Air Force) Defense Technology Security Administration ( DTSA ) Figure 1. U.S. Defense Technology Trade Key Players Most of the U.S. laws...within each military establishment that lend themselves to the necessary collaboration. For the U.S., the DoD’s DTSA would be the appropriate

  18. Survey of Collaboration Technologies in Multi-level Security Environments

    DTIC Science & Technology

    2014-04-28

    infrastructure or resources. In this research program, the security implications of the US Air Force GeoBase (the US The problem is that in many cases...design structure. ORA uses a Java interface for ease of use, and a C++ computational backend . The current version ORA1.2 software is available on the...information: culture, policy, governance, economics and resources, and technology and infrastructure . This plan, the DoD Information Sharing

  19. Intelligence-Led Risk Management for Homeland Security: A Collaborative Approach for a Common Goal

    DTIC Science & Technology

    2011-12-01

    phases of research into a summary analysis of the risk management policy within the homeland security enterprise. The result of the multi-goal policy ...management and policy decisions with emphasis on social aspects and efforts to support local and regional decision making, and to avoid cascading...independent variables. The second order social and economic effects of terrorism have been largely overlooked so far in accounting for the risk from

  20. Secure public cloud platform for medical images sharing.

    PubMed

    Pan, Wei; Coatrieux, Gouenou; Bouslimi, Dalel; Prigent, Nicolas

    2015-01-01

    Cloud computing promises medical imaging services offering large storage and computing capabilities for limited costs. In this data outsourcing framework, one of the greatest issues to deal with is data security. To do so, we propose to secure a public cloud platform devoted to medical image sharing by defining and deploying a security policy so as to control various security mechanisms. This policy stands on a risk assessment we conducted so as to identify security objectives with a special interest for digital content protection. These objectives are addressed by means of different security mechanisms like access and usage control policy, partial-encryption and watermarking.

  1. Farm cooperation to improve sustainability.

    PubMed

    Andersson, Hans; Larsén, Karin; Lagerkvist, Carl-Johan; Andersson, Chrisitian; Blad, Fredrik; Samuelsson, Johan; Skargren, Per

    2005-06-01

    In this paper, it is demonstrated that partnership arrangements between farmers might be a way to secure the economic viability of their farms as well as to increase profitability. The article discusses empirical analyses of three different forms of collaboration, with an emphasis on the environmental improvements associated with collaboration. Collaboration between a dairy farm and a crop farm is analyzed in the first case. The results show that potential gains from improved diversification and crop rotation are substantial, and even larger when the collaboration also involves machinery. The second analysis considers external integration between farrowing and finishing-pig operations. Gains from collaboration originate from biological and technical factors, such as improved growth rate of the pigs and better utilization of buildings. Finally, an evaluation of a group of collaborating crop farmers is performed. In this case, the benefits that arise are mainly due to reduced machinery costs and/or gains due to other factors, such as improved crop rotation and managerial/marketing strategies.

  2. Putting food on the public health table: Making food security relevant to regional health authorities.

    PubMed

    Rideout, Karen; Seed, Barbara; Ostry, Aleck

    2006-01-01

    Food security is emerging as an increasingly important public health issue. The purpose of this paper is to describe a conceptual model and five classes of food security indicators for regional health authorities (RHAs): direct, indirect, consequence, process, and supra-regional. The model was developed after a review of the food security literature and interviews with British Columbia community nutritionists and public health officials. We offer this conceptual model as a practical tool to help RHAs develop a comprehensive framework and use specific indicators, in conjunction with public health nutritionists and other community stakeholders. We recommend using all five classes of indicator together to ensure a complete assessment of the full breadth of food security. This model will be useful for Canadian health authorities wishing to take a holistic community-based approach to public health nutrition to develop more effective policies and programs to maximize food security. The model and indicators offer a rational process that could be useful for collaborative multi-stakeholder initiatives to improve food security.

  3. Collaboration in crisis and emergency management: Identifying the gaps in the case of storm 'Alexa'.

    PubMed

    Sawalha, Ihab Hanna Salman

    2014-01-01

    Failing to collaborate in crisis and emergency situations will increase the vulnerability of organisations and societies towards potential disasters. This paper highlights the significance of effective collaboration at different levels in times of crises. The case of snow storm 'Alexa', which hit Jordan in December 2013, was considered for the purpose of this research. The impact of Alexa raised many questions regarding the country's preparedness and the capacity of its infrastructure to maintain critical business functions across various industry sectors. First, should people individually take all the responsibility to manage crises and emergencies in order to protect themselves and their belongings? Secondly, should organisations join efforts with other organisations within the same or different sectors? Thirdly, should governments seek external collaboration for the ultimate goal of securing their economies? These issues are significant as they underline the element of collaboration. This paper contributes to the understanding of the role of collaboration in times of intense difficulty and loss of control. The proposition made by this research is that an effective collaborative process is positively associated with perceptions of improved disaster risk reduction practices.

  4. Strengthening Collaborative Leadership for Thai Primary School Administrators

    ERIC Educational Resources Information Center

    Samriangjit, Prapaporn; Tesaputa, Kowat; Somprach, Kanokorn

    2016-01-01

    The objectives of this research were: 1) to investigate the elements and indicators of collaborative leadership of primary school administrators, 2) to explore the existing situation and required situation of collaborative leadership of primary school administrators, 3) to develop a program to enhance collaborative leadership of primary school…

  5. SMART Security Cooperation Objectives: Improving DoD Planning and Guidance

    DTIC Science & Technology

    2016-01-01

    integrate them into a system for assessing, monitoring, and evaluating security cooperation programs and activities. This report evaluates DoD’s...effectiveness in developing SMART security coopera- tion objectives that facilitate assessment, monitoring, and evaluation . It also proposes a systematic...Cooperation Ends, Ways, and Means . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 RAND Evaluation and Revision of Selected

  6. The Coming Nuclear Renaissance for Next Generation Safeguards Specialists--Maximizing Potential and Minimizing the Risks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eipeldauer, Mary D

    2009-01-01

    This document is intended to provide an overview of the workshop entitled 'The Coming Nuclear Renaissance for the Next Generation Safeguards Experts-Maximizing Benefits While Minimizing Proliferation Risks', conducted at Oak Ridge National Laboratory (ORNL) in partnership with the Y-12 National Security Complex (Y-12) and the Savannah River National Laboratory (SRNL). This document presents workshop objectives; lists the numerous participant universities and individuals, the nuclear nonproliferation lecture topics covered, and the facilities tours taken as part of the workshop; and discusses the university partnership sessions and proposed areas for collaboration between the universities and ORNL for 2009. Appendix A contains themore » agenda for the workshop; Appendix B lists the workshop attendees and presenters with contact information; Appendix C contains graphics of the evaluation form results and survey areas; and Appendix D summarizes the responses to the workshop evaluation form. The workshop was an opportunity for ORNL, Y-12, and SRNL staff with more than 30 years combined experience in nuclear nonproliferation to provide a comprehensive overview of their expertise for the university professors and their students. The overall goal of the workshop was to emphasize nonproliferation aspects of the nuclear fuel cycle and to identify specific areas where the universities and experts from operations and national laboratories could collaborate.« less

  7. The Scottish Government's Rural and Environmental Science and Analytical Services Strategic Research Progamme

    NASA Astrophysics Data System (ADS)

    Dawson, Lorna; Bestwick, Charles

    2013-04-01

    The Strategic Research Programme focuses on the delivery of outputs and outcomes within the major policy agenda areas of climate change, land use and food security, and to impact on the 'Wealthier', 'Healthier' and 'Greener' strategic objectives of the Scottish Government. The research is delivered through two programmes: 'Environmental Change' and 'Food, Land and People'; the core strength of which is the collaboration between the Scottish Government's Main Research Providers-The James Hutton Institute, the Moredun Research Institute, Rowett Institute of Nutrition and Health University of Aberdeen, Scotland's Rural College, Biomathematics and Statistics Scotland and The Royal Botanic Gardens Edinburgh. The research actively seeks to inform and be informed by stakeholders from policy, farming, land use, water and energy supply, food production and manufacturing, non-governmental organisations, voluntary organisations, community groups and general public. This presentation will provide an overview of the programme's interdisciplinary research, through examples from across the programme's themes. Examples will exemplify impact within the Strategic Programme's priorities of supporting policy and practice, contributing to economic growth and innovation, enhancing collaborative and multidisciplinary research, growing scientific resilience and delivering scientific excellence. http://www.scotland.gov.uk/Topics/Research/About/EBAR/StrategicResearch/future-research-strategy/Themes/ http://www.knowledgescotland.org/news.php?article_id=295

  8. Study of the Impact of Collaboration among Teachers in a Collaborative Authoring System

    ERIC Educational Resources Information Center

    Lafifi, Yacine; Touil, Ghassen

    2010-01-01

    Several researchers have studied the impact of collaboration between the learners on their cognitive levels, but few studies have been carried out on the impact of collaboration between the teachers. The aim of our research is to study the effects on the knowledge levels of learners of collaborative construction of learning objects created by the…

  9. Regional Joint Border Commands: A Pathway to Improving Collaboration and Effectiveness for Border Control

    DTIC Science & Technology

    2009-12-01

    Police xii SBI Secure Border Initiative SES Senior Executive Service SSP Secretaria de Seguridad Publica TSA Transportation Security...also been involvement from the Mexican law enforcement agency, Secretaria de Seguridad Publica (SSP) on the southwest border (CBP, 2009; ICE, 2009, p. 5...The U.S. border is comprised of nearly 20,000 miles of a mix of coastline and rugged land borders with Mexico and Canada; this includes parts of

  10. The Benefits of Collaborative Processes for Establishing All Hazard Incident Management Teams in Urban Area Security Initiative Regions

    DTIC Science & Technology

    2013-09-01

    incidents beyond wild land fires.15 This journal article also noted that national IMTs provided command functions at the World Trade Center on September...11, 2001, Hurricane Katrina in 2005 and search and recovery efforts following the Space Shuttle Columbia disaster.16 Because of the utility and...Management Team SWA Southwest Area SWCC Southwest Coordination Center UASI Urban Area Security Initiative UAWG Urban Area Working Group

  11. Ending the U.S. War in Iraq: The Final Transition, Operational Maneuver, and Disestablishment of United States Forces-Iraq

    DTIC Science & Technology

    2013-01-01

    management survey and ensure that all databases (military and contracted civilian), key leader engagement logs, assistance project files, and other...Princeton University Press, 2000; Michael I. Handel, War Termination—A Critical Survey , Jeru- salem: Hebrew University, 1978; Jane Holl Lute, From the...DoS did not plan to install permanent and more costly security measures.133 Security surveys undertaken collaboratively by USF-I and multiple

  12. A DICOM based radiotherapy plan database for research collaboration and reporting

    NASA Astrophysics Data System (ADS)

    Westberg, J.; Krogh, S.; Brink, C.; Vogelius, I. R.

    2014-03-01

    Purpose: To create a central radiotherapy (RT) plan database for dose analysis and reporting, capable of calculating and presenting statistics on user defined patient groups. The goal is to facilitate multi-center research studies with easy and secure access to RT plans and statistics on protocol compliance. Methods: RT institutions are able to send data to the central database using DICOM communications on a secure computer network. The central system is composed of a number of DICOM servers, an SQL database and in-house developed software services to process the incoming data. A web site within the secure network allows the user to manage their submitted data. Results: The RT plan database has been developed in Microsoft .NET and users are able to send DICOM data between RT centers in Denmark. Dose-volume histogram (DVH) calculations performed by the system are comparable to those of conventional RT software. A permission system was implemented to ensure access control and easy, yet secure, data sharing across centers. The reports contain DVH statistics for structures in user defined patient groups. The system currently contains over 2200 patients in 14 collaborations. Conclusions: A central RT plan repository for use in multi-center trials and quality assurance was created. The system provides an attractive alternative to dummy runs by enabling continuous monitoring of protocol conformity and plan metrics in a trial.

  13. Enabling secure, distributed collaborations for adrenal tumor research.

    PubMed

    Stell, Anthony; Sinnott, Richard; Jiang, Jipu

    2010-01-01

    Many e-Health strategies rely on the secure integration of datasets that have previously resided in isolated locations, but can now in principle be accessed over the Internet. Of paramount importance in the health domain is the need for the security and privacy of data that is transmitted across these networks. One such collaboration, which spans several specialist centres across France, Germany, Italy and the UK, is ENSAT - the European Network for the Study of Adrenal Tumors. The rarity of the tumors under study means the value of accessing, aggregating and comparing data from many centres is great indeed. However this is especially challenging given that ENSAT require clinical and genomic data to be seamlessly linked, but in such a way that the information governance, ethics and privacy concerns of the patients and associated stakeholders involved are visibly satisfied. Key to this is the clear separation of clinical and genomic data sets and support for rigorous patient-identity protecting access control. This is especially challenging when such data sets exist across different organisational boundaries. In this paper we describe a prototype solution offering a security-oriented tailored portal supported by a layered encryption-driven linkage technology (VANGUARD) that offers precisely such patient-privacy protecting capabilities. We describe the architecture, implementation and use to date of this facility to support the ENSAT adrenal cancer research network.

  14. Image analysis of hardened concrete : performance enhancement of the Automated Concrete Evaluation System (ACES).

    DOT National Transportation Integrated Search

    2006-01-01

    Since 2001, the Missouri Department of Transportation and National Nuclear Security Administrations Kansas City Plant, : operated by Honeywell Federal Manufacturing & Technologies, have collaborated on three CRADAs (Cooperative : Research and D...

  15. Coordinating High-Resolution Traffic Cameras : Developing Intelligent, Collaborating Cameras for Transportation Security and Communications

    DOT National Transportation Integrated Search

    2015-08-01

    Cameras are used prolifically to monitor transportation incidents, infrastructure, and congestion. Traditional camera systems often require human monitoring and only offer low-resolution video. Researchers for the Exploratory Advanced Research (EAR) ...

  16. Dialogue Systems and Dialogue Management

    DTIC Science & Technology

    2016-12-01

    dialogue management capability within DST Group’s Consensus project . UNCLASSIFIED UNCLASSIFIED Author Deeno Burgan National Security...3.1 Survey Process This research into dialogue management is part of a joint collaboration between DST Group and CSIRO. The project team comprised...

  17. A Scalable, Collaborative, Interactive Light-field Display System

    DTIC Science & Technology

    2014-06-01

    displays, 3D display, holographic video, integral photography, plenoptic , computed photography 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF...light-field, holographic displays, 3D display, holographic video, integral photography, plenoptic , computed photography 1 Distribution A: Approved

  18. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ahn, Gail-Joon

    The project seeks an innovative framework to enable users to access and selectively share resources in distributed environments, enhancing the scalability of information sharing. We have investigated secure sharing & assurance approaches for ad-hoc collaboration, focused on Grids, Clouds, and ad-hoc network environments.

  19. Assessment of the U. S. Marine Transportation System : a report to congress

    DOT National Transportation Integrated Search

    1999-09-01

    Discusses the collaborative effort to assess the adequacy of the Nation's marine : transportation system (including ports, waterways, harbor approach channels, and : their intermodal connections) to operate in a safe, efficient, secure, and : environ...

  20. Middleware and Web Services for the Collaborative Information Portal of NASA's Mars Exploration Rovers Mission

    NASA Technical Reports Server (NTRS)

    Sinderson, Elias; Magapu, Vish; Mak, Ronald

    2004-01-01

    We describe the design and deployment of the middleware for the Collaborative Information Portal (CIP), a mission critical J2EE application developed for NASA's 2003 Mars Exploration Rover mission. CIP enabled mission personnel to access data and images sent back from Mars, staff and event schedules, broadcast messages and clocks displaying various Earth and Mars time zones. We developed the CIP middleware in less than two years time usins cutting-edge technologies, including EJBs, servlets, JDBC, JNDI and JMS. The middleware was designed as a collection of independent, hot-deployable web services, providing secure access to back end file systems and databases. Throughout the middleware we enabled crosscutting capabilities such as runtime service configuration, security, logging and remote monitoring. This paper presents our approach to mitigating the challenges we faced, concluding with a review of the lessons we learned from this project and noting what we'd do differently and why.

  1. Collaborative eHealth Meets Security: Privacy-Enhancing Patient Profile Management.

    PubMed

    Sanchez-Guerrero, Rosa; Mendoza, Florina Almenarez; Diaz-Sanchez, Daniel; Cabarcos, Patricia Arias; Lopez, Andres Marin

    2017-11-01

    Collaborative healthcare environments offer potential benefits, including enhancing the healthcare quality delivered to patients and reducing costs. As a direct consequence, sharing of electronic health records (EHRs) among healthcare providers has experienced a noteworthy growth in the last years, since it enables physicians to remotely monitor patients' health and enables individuals to manage their own health data more easily. However, these scenarios face significant challenges regarding security and privacy of the extremely sensitive information contained in EHRs. Thus, a flexible, efficient, and standards-based solution is indispensable to guarantee selective identity information disclosure and preserve patient's privacy. We propose a privacy-aware profile management approach that empowers the patient role, enabling him to bring together various healthcare providers as well as user-generated claims into an unique credential. User profiles are represented through an adaptive Merkle Tree, for which we formalize the underlying mathematical model. Furthermore, performance of the proposed solution is empirically validated through simulation experiments.

  2. ASCR Cybersecurity for Scientific Computing Integrity

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Piesert, Sean

    The Department of Energy (DOE) has the responsibility to address the energy, environmental, and nuclear security challenges that face our nation. Much of DOE’s enterprise involves distributed, collaborative teams; a signi¬cant fraction involves “open science,” which depends on multi-institutional, often international collaborations that must access or share signi¬cant amounts of information between institutions and over networks around the world. The mission of the Office of Science is the delivery of scienti¬c discoveries and major scienti¬c tools to transform our understanding of nature and to advance the energy, economic, and national security of the United States. The ability of DOE tomore » execute its responsibilities depends critically on its ability to assure the integrity and availability of scienti¬c facilities and computer systems, and of the scienti¬c, engineering, and operational software and data that support its mission.« less

  3. Strategies for 96-hour critical infrastructure compliance.

    PubMed

    Storbakken, Steven H; Kendall, Shannon; Lackey, Connie

    2009-01-01

    Organizations that stand the best chance at survival following a disaster do so because they can depend on the sharing of resources and mutual ideologies, the authors claim, pointing out that when it comes to strategizing for 96-hour critical infrastructure compliance, it is important to keep at the forefront not only the idea of collaborative planning from within the organization--involving security and safety, clinical, facilities and administrative staffs--but also includes collaborative planning with the local and regional businesses surrounding the organization.

  4. Data Rescue in Collaboration with Federal Open Access Efforts

    NASA Astrophysics Data System (ADS)

    Avila, R.

    2017-12-01

    The recent calls to rescue scientific data is a real opportunity to collaborate with federal agencies which have been spending years managing research data and making it secure. The 2013 memos from the White House Office of Science and Technology Policy and Office of Management and Budget have spurred innovation across federal agencies to make publicly funded data accessible. Now is the time for stakeholders to take advantage of the groundwork laid by federal government, support the work to expand data sharing, thereby encouraging open science.

  5. Support system, excavation arrangement, and process of supporting an object

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Arnold, Bill W.

    2017-08-01

    A support system, an excavation arrangement, and a process of supporting an object are disclosed. The support system includes a weight-bearing device and a camming mechanism positioned below the weight-bearing device. A downward force on the weight-bearing device at least partially secures the camming mechanism to opposing surfaces. The excavation arrangement includes a borehole, a support system positioned within and secured to the borehole, and an object positioned on and supported by the support system. The process includes positioning and securing the support system and positioning the object on the weight-bearing device.

  6. Incorporating collaboratory concepts into informatics in support of translational interdisciplinary biomedical research

    PubMed Central

    Lee, E. Sally; McDonald, David W.; Anderson, Nicholas; Tarczy-Hornoch, Peter

    2008-01-01

    Due to its complex nature, modern biomedical research has become increasingly interdisciplinary and collaborative in nature. Although a necessity, interdisciplinary biomedical collaboration is difficult. There is, however, a growing body of literature on the study and fostering of collaboration in fields such as computer supported cooperative work (CSCW) and information science (IS). These studies of collaboration provide insight into how to potentially alleviate the difficulties of interdisciplinary collaborative research. We, therefore, undertook a cross cutting study of science and engineering collaboratories to identify emergent themes. We review many relevant collaboratory concepts: (a) general collaboratory concepts across many domains: communication, common workspace and coordination, and data sharing and management, (b) specific collaboratory concepts of particular biomedical relevance: data integration and analysis, security structure, metadata and data provenance, and interoperability and data standards, (c) environmental factors that support collaboratories: administrative and management structure, technical support, and available funding as critical environmental factors, and (d) future considerations for biomedical collaboration: appropriate training and long-term planning. In our opinion, the collaboratory concepts we discuss can guide planning and design of future collaborative infrastructure by biomedical informatics researchers to alleviate some of the difficulties of interdisciplinary biomedical collaboration. PMID:18706852

  7. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Intrator, Miranda Huang

    Los Alamos National Security, LLC (LANS) is the manager and operator of Los Alamos National Laboratory (Los Alamos) for the U.S. Department of Energy National Nuclear Security Administration under contract DE-AC52- 06NA25396. Los Alamos is a mission-centric Federally Funded Research and Development Center focused on solving critical national security challenges through science and engineering for both government and private customers. LANS is opening this formal Request for Information (RFI) to gauge interest in engaging as an industry partner to LANS for collaboration in advancing the bio-assessment platform described below. Please see last section for details on submitting a Letter ofmore » Interest.« less

  8. Application of Multiprotocol Medical Imaging Communications and an Extended DICOM WADO Service in a Teleradiology Architecture

    PubMed Central

    Koutelakis, George V.; Anastassopoulos, George K.; Lymberopoulos, Dimitrios K.

    2012-01-01

    Multiprotocol medical imaging communication through the Internet is more flexible than the tight DICOM transfers. This paper introduces a modular multiprotocol teleradiology architecture that integrates DICOM and common Internet services (based on web, FTP, and E-mail) into a unique operational domain. The extended WADO service (a web extension of DICOM) and the other proposed services allow access to all levels of the DICOM information hierarchy as opposed to solely Object level. A lightweight client site is considered adequate, because the server site of the architecture provides clients with service interfaces through the web as well as invulnerable space for temporary storage, called as User Domains, so that users fulfill their applications' tasks. The proposed teleradiology architecture is pilot implemented using mainly Java-based technologies and is evaluated by engineers in collaboration with doctors. The new architecture ensures flexibility in access, user mobility, and enhanced data security. PMID:22489237

  9. BTFS: The Border Trade Facilitation System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Phillips, L.R.

    The author demonstrates the Border Trade Facilitation System (BTFS), an agent-based bilingual e-commerce system built to expedite the regulation, control, and execution of commercial trans-border shipments during the delivery phase. The system was built to serve maquila industries at the US/Mexican border. The BTFS uses foundation technology developed here at Sandia Laboratories' Advanced Information Systems Lab (AISL), including a distributed object substrate, a general-purpose agent development framework, dynamically generated agent-human interaction via the World-Wide Web, and a collaborative agent architecture. This technology is also the substrate for the Multi-Agent Simulation Management System (MASMAS) proposed for demonstration at this conference. Themore » BTFS executes authenticated transactions among agents performing open trading over the Internet. With the BTFS in place, one could conduct secure international transactions from any site with an Internet connection and a web browser. The BTFS is currently being evaluated for commercialization.« less

  10. A Survey of 100 Community Colleges on Student Substance Use, Programming, and Collaborations

    ERIC Educational Resources Information Center

    Chiauzzi, Emil; Donovan, Elizabeth; Black, Ryan; Cooney, Elizabeth; Buechner, Allison; Wood, Mollie

    2011-01-01

    Objective: The objective was to survey community college personnel about student substance use, and infrastructure (staff and funding), programs, and collaborations dedicated to substance use prevention. Participants: The sample included 100 administrators, faculty, and health services staff at 100 community colleges. Methods: Participants…

  11. Protecting genomic data analytics in the cloud: state of the art and opportunities.

    PubMed

    Tang, Haixu; Jiang, Xiaoqian; Wang, Xiaofeng; Wang, Shuang; Sofia, Heidi; Fox, Dov; Lauter, Kristin; Malin, Bradley; Telenti, Amalio; Xiong, Li; Ohno-Machado, Lucila

    2016-10-13

    The outsourcing of genomic data into public cloud computing settings raises concerns over privacy and security. Significant advancements in secure computation methods have emerged over the past several years, but such techniques need to be rigorously evaluated for their ability to support the analysis of human genomic data in an efficient and cost-effective manner. With respect to public cloud environments, there are concerns about the inadvertent exposure of human genomic data to unauthorized users. In analyses involving multiple institutions, there is additional concern about data being used beyond agreed research scope and being prcoessed in untrused computational environments, which may not satisfy institutional policies. To systematically investigate these issues, the NIH-funded National Center for Biomedical Computing iDASH (integrating Data for Analysis, 'anonymization' and SHaring) hosted the second Critical Assessment of Data Privacy and Protection competition to assess the capacity of cryptographic technologies for protecting computation over human genomes in the cloud and promoting cross-institutional collaboration. Data scientists were challenged to design and engineer practical algorithms for secure outsourcing of genome computation tasks in working software, whereby analyses are performed only on encrypted data. They were also challenged to develop approaches to enable secure collaboration on data from genomic studies generated by multiple organizations (e.g., medical centers) to jointly compute aggregate statistics without sharing individual-level records. The results of the competition indicated that secure computation techniques can enable comparative analysis of human genomes, but greater efficiency (in terms of compute time and memory utilization) are needed before they are sufficiently practical for real world environments.

  12. National ITS architecture security

    DOT National Transportation Integrated Search

    2003-10-01

    This Security Document presents an overview of security as it is represented in the National ITS Architecture and provides guidance for using the security-related parts of the National ITS Architecture. The objective of security, in the context of th...

  13. An Assessment of the U.S. Army Tank Automotive Research, Development and Engineering Center’s Utilization of the Processes, and Availability of Tools and Physical Environments that Promote Innovation

    DTIC Science & Technology

    2014-04-02

    workspaces Proximity H13 : TARDEC associates do not sit near other associates with different functional expertise Objective The objective of...Physical Environment Collaborative Workspace H12: TARDEC does not have available innovation best practice collaborative workspaces Proximity H13 ...does not have available innovation best practice collaborative workspaces Proximity H13 : TARDEC associates do not sit near other associates with

  14. NPSS on NASA's IPG: Using CORBA and Globus to Coordinate Multidisciplinary Aeroscience Applications

    NASA Technical Reports Server (NTRS)

    Lopez, Isaac; Follen, Gregory J.; Gutierrez, Richard; Naiman, Cynthia G.; Foster, Ian; Ginsburg, Brian; Larsson, Olle; Martin, Stuart; Tuecke, Steven; Woodford, David

    2000-01-01

    Within NASA's High Performance Computing and Communication (HPCC) program, the NASA Glenn Research Center is developing an environment for the analysis/design of aircraft engines called the Numerical Propulsion System Simulation (NPSS). The vision for NPSS is to create a "numerical test cell" enabling full engine simulations overnight on cost-effective computing platforms. To this end, NPSS integrates multiple disciplines such as aerodynamics, structures, and heat transfer and supports "numerical zooming" between O-dimensional to 1-, 2-, and 3-dimensional component engine codes. In order to facilitate the timely and cost-effective capture of complex physical processes, NPSS uses object-oriented technologies such as C++ objects to encapsulate individual engine components and CORBA ORBs for object communication and deployment across heterogeneous computing platforms. Recently, the HPCC program has initiated a concept called the Information Power Grid (IPG), a virtual computing environment that integrates computers and other resources at different sites. IPG implements a range of Grid services such as resource discovery, scheduling, security, instrumentation, and data access, many of which are provided by the Globus toolkit. IPG facilities have the potential to benefit NPSS considerably. For example, NPSS should in principle be able to use Grid services to discover dynamically and then co-schedule the resources required for a particular engine simulation, rather than relying on manual placement of ORBs as at present. Grid services can also be used to initiate simulation components on parallel computers (MPPs) and to address inter-site security issues that currently hinder the coupling of components across multiple sites. These considerations led NASA Glenn and Globus project personnel to formulate a collaborative project designed to evaluate whether and how benefits such as those just listed can be achieved in practice. This project involves firstly development of the basic techniques required to achieve co-existence of commodity object technologies and Grid technologies; and secondly the evaluation of these techniques in the context of NPSS-oriented challenge problems. The work on basic techniques seeks to understand how "commodity" technologies (CORBA, DCOM, Excel, etc.) can be used in concert with specialized "Grid" technologies (for security, MPP scheduling, etc.). In principle, this coordinated use should be straightforward because of the Globus and IPG philosophy of providing low-level Grid mechanisms that can be used to implement a wide variety of application-level programming models. (Globus technologies have previously been used to implement Grid-enabled message-passing libraries, collaborative environments, and parameter study tools, among others.) Results obtained to date are encouraging: we have successfully demonstrated a CORBA to Globus resource manager gateway that allows the use of CORBA RPCs to control submission and execution of programs on workstations and MPPs; a gateway from the CORBA Trader service to the Grid information service; and a preliminary integration of CORBA and Grid security mechanisms. The two challenge problems that we consider are the following: 1) Desktop-controlled parameter study. Here, an Excel spreadsheet is used to define and control a CFD parameter study, via a CORBA interface to a high throughput broker that runs individual cases on different IPG resources. 2) Aviation safety. Here, about 100 near real time jobs running NPSS need to be submitted, run and data returned in near real time. Evaluation will address such issues as time to port, execution time, potential scalability of simulation, and reliability of resources. The full paper will present the following information: 1. A detailed analysis of the requirements that NPSS applications place on IPG. 2. A description of the techniques used to meet these requirements via the coordinated use of CORBA and Globus. 3. A description of results obtained to date in the first two challenge problems.

  15. The Safe and Effective Use of Shared Data Underpinned by Stakeholder Engagement and Evaluation Practice.

    PubMed

    Georgiou, Andrew; Magrabi, Farah; Hypponen, Hannele; Wong, Zoie Shui-Yee; Nykänen, Pirkko; Scott, Philip J; Ammenwerth, Elske; Rigby, Michael

    2018-04-22

     The paper draws attention to: i) key considerations involving the confidentiality, privacy, and security of shared data; and ii) the requirements needed to build collaborative arrangements encompassing all stakeholders with the goal of ensuring safe, secure, and quality use of shared data.  A narrative review of existing research and policy approaches along with expert perspectives drawn from the International Medical Informatics Association (IMIA) Working Group on Technology Assessment and Quality Development in Health Care and the European Federation for Medical Informatics (EFMI) Working Group for Assessment of Health Information Systems.  The technological ability to merge, link, re-use, and exchange data has outpaced the establishment of policies, procedures, and processes to monitor the ethics and legality of shared use of data. Questions remain about how to guarantee the security of shared data, and how to establish and maintain public trust across large-scale shared data enterprises. This paper identifies the importance of data governance frameworks (incorporating engagement with all stakeholders) to underpin the management of the ethics and legality of shared data use. The paper also provides some key considerations for the establishment of national approaches and measures to monitor compliance with best practice. Data sharing endeavours can help to underpin new collaborative models of health care which provide shared information, engagement, and accountability amongst all stakeholders. We believe that commitment to rigorous evaluation and stakeholder engagement will be critical to delivering health data benefits and the establishment of collaborative models of health care into the future. Georg Thieme Verlag KG Stuttgart.

  16. Environmental security as related to scale mismatches of disturbance patterns in a panarchy of social-ecological landscapes

    Treesearch

    Giovanni Zurlini; Irene Petrosillo; Nicola Zaccarelli; Kurt Riitters

    2008-01-01

    Environmental security, as the opposite of environmental fragility (vulnerability), is multilayered, multi-scale and complex, existing in both the objective realm of biophysics and society, and the subjective realm of individual human perception. For ecological risk assessments (ERAs), the relevant objects of environmental security are social-ecological landscapes (...

  17. Using a Wiki to Collaborate on a Study Guide

    ERIC Educational Resources Information Center

    Lending, Diane

    2010-01-01

    This paper introduces an end-of-semester assignment to create a study guide for the final exam. This assignment helps with two objectives of an introductory Management Information Systems course: collaboration and using Web 2.0 technologies. We argue that to truly understand collaboration, students must learn more than what collaboration is, they…

  18. Identification of handheld objects for electro-optic/FLIR applications

    NASA Astrophysics Data System (ADS)

    Moyer, Steve K.; Flug, Eric; Edwards, Timothy C.; Krapels, Keith A.; Scarbrough, John

    2004-08-01

    This paper describes research on the determination of the fifty-percent probability of identification cycle criterion (N50) for two sets of handheld objects. The first set consists of 12 objects which are commonly held in a single hand. The second set consists of 10 objects commonly held in both hands. These sets consist of not only typical civilian handheld objects but also objects that are potentially lethal. A pistol, a cell phone, a rocket propelled grenade (RPG) launcher, and a broom are examples of the objects in these sets. The discrimination of these objects is an inherent part of homeland security, force protection, and also general population security. Objects were imaged from each set in the visible and mid-wave infrared (MWIR) spectrum. Various levels of blur are then applied to these images. These blurred images were then used in a forced choice perception experiment. Results were analyzed as a function of blur level and target size to give identification probability as a function of resolvable cycles on target. These results are applicable to handheld object target acquisition estimates for visible imaging systems and MWIR systems. This research provides guidance in the design and analysis of electro-optical systems and forward-looking infrared (FLIR) systems for use in homeland security, force protection, and also general population security.

  19. Exploring Public Health's roles and limitations in advancing food security in British Columbia.

    PubMed

    Seed, Barbara A; Lang, Tim M; Caraher, Martin J; Ostry, Aleck S

    2014-07-22

    This research analyzes the roles and limitations of Public Health in British Columbia in advancing food security through the integration of food security initiatives into its policies and programs. It asks the question, can Public Health advance food security? If so, how, and what are its limitations? This policy analysis merges findings from 38 key informant interviews conducted with government and civil society stakeholders involved in the development of food security initiatives, along with an examination of relevant documents. The Population Health Template is used to delineate and analyze Public Health roles in food security. Public Health was able to advance food security in some ways, such as the adoption of food security as a core public health program. Public Health's leadership role in food security is constrained by a restricted mandate, limited ability to collaborate across a wide range of sectors and levels, as well as internal conflict within Public Health between Food Security and Food Protection programs. Public Health has a role in advancing food security, but it also faces limitations. As the limitations are primarily systemic and institutional, recommendations to overcome them are not simple but, rather, require movement toward embracing the determinants of health and regulatory pluralism. The results also suggest that the historic role of Public Health in food security remains salient today.

  20. Crooked River Collaborative Water Security Act

    THOMAS, 112th Congress

    Sen. Merkley, Jeff [D-OR

    2012-08-02

    Senate - 09/19/2012 Committee on Energy and Natural Resources Subcommittee on Water and Power. Hearings held. With printed Hearing: S.Hrg. 112-624. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. 76 FR 6761 - Federal Advisory Committee Meeting To Be Held Authorized Under the Secure Rural Schools Act and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-08

    ... varied interests and areas of expertise. They will work collaboratively to improve working relationships... National Forests lands and can maintain infrastructure, improve the health of watersheds and ecosystems...

  2. Adaptation in Arctic circumpolar communities: food and water security in a changing climate.

    PubMed

    Berner, James; Brubaker, Michael; Revitch, Boris; Kreummel, Eva; Tcheripanoff, Moses; Bell, Jake

    2016-01-01

    The AMAP Human Health Assessment Group has developed different adaptation strategies through a long-term collaboration with all Arctic countries. Different adaptation strategies are discussed, with examples mainly from native population groups in Alaska.

  3. Sequestration Coating Performance Requirements for ...

    EPA Pesticide Factsheets

    symposium paper The EPA’s National Homeland Security Research Center (NHSRC), in collaboration with ASTM International, developed performance standards for materials which could be applied to exterior surfaces contaminated by an RDD to mitigate the spread and migration of radioactive contamination.

  4. Building Collaborative Capacity for Homeland Security

    DTIC Science & Technology

    2004-11-01

    Kesner, I. F. (1993). Top Managerial Prestige, Power and Tender Offer Response - a Study of Elite Social Networks and Target Firm Cooperation During...Organization Science, 12(3), 372-388. Galaskiewicz, J., & Burt, R. S. (1991). Interorganization Contagion in Corporate Philanthropy . Administrative

  5. 77 FR 38306 - GFIRST Conference Stakeholder Evaluation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-27

    ...), National Cyber Security Division (NCSD), United States Computer Emergency Readiness Team (US-CERT) will...- CERT, [email protected] . SUPPLEMENTARY INFORMATION: GFIRST is DHS's premier cyber conference and continually seeks to enhance collaborative efforts among cyber constituencies, partners, and stakeholders. The...

  6. Upgrade to the control system of the reflectometry diagnostic of ASDEX upgrade

    NASA Astrophysics Data System (ADS)

    Graça, S.; Santos, J.; Manso, M. E.

    2004-10-01

    The broadband frequency modulation-continuous wave microwave/millimeter wave reflectometer of ASDEX upgrade tokamak (Institut für Plasma Physik (IPP), Garching, Germany) developed by Centro de Fusão Nuclear (Lisboa, Portugal) with the collaboration of IPP, is a complex system with 13 channels (O and X modes) and two types of operation modes (swept and fixed frequency). The control system that ensures remote operation of the diagnostic incorporates VME and CAMAC bus based acquisition/timing systems. Microprocessor input/output boards are used to control and monitor the microwave circuitry and associated electronic devices. The implementation of the control system is based on an object-oriented client/server model: a centralized server manages the hardware and receives input from remote clients. Communication is handled through transmission control protocol/internet protocol sockets. Here we describe recent upgrades of the control system aiming to: (i) accommodate new channels; (ii) adapt to the heterogeneity of computing platforms and operating systems; and (iii) overcome remote access restrictions. Platform and operating system independence was achieved by redesigning the graphical user interface in JAVA. As secure shell is the standard remote access protocol adopted in major fusion laboratories, secure shell tunneling was implemented to allow remote operation of the diagnostic through the existing firewalls.

  7. Context-aware access control for pervasive access to process-based healthcare systems.

    PubMed

    Koufi, Vassiliki; Vassilacopoulos, George

    2008-01-01

    Healthcare is an increasingly collaborative enterprise involving a broad range of healthcare services provided by many individuals and organizations. Grid technology has been widely recognized as a means for integrating disparate computing resources in the healthcare field. Moreover, Grid portal applications can be developed on a wireless and mobile infrastructure to execute healthcare processes which, in turn, can provide remote access to Grid database services. Such an environment provides ubiquitous and pervasive access to integrated healthcare services at the point of care, thus improving healthcare quality. In such environments, the ability to provide an effective access control mechanism that meets the requirement of the least privilege principle is essential. Adherence to the least privilege principle requires continuous adjustments of user permissions in order to adapt to the current situation. This paper presents a context-aware access control mechanism for HDGPortal, a Grid portal application which provides access to workflow-based healthcare processes using wireless Personal Digital Assistants. The proposed mechanism builds upon and enhances security mechanisms provided by the Grid Security Infrastructure. It provides tight, just-in-time permissions so that authorized users get access to specific objects according to the current context. These permissions are subject to continuous adjustments triggered by the changing context. Thus, the risk of compromising information integrity during task executions is reduced.

  8. Understanding safety culture in long-term care: a case study.

    PubMed

    Halligan, Michelle H; Zecevic, Aleksandra; Kothari, Anita R; Salmoni, Alan W; Orchard, Treena

    2014-12-01

    This case study aimed to understand safety culture in a high-risk secured unit for cognitively impaired residents in a long-term care (LTC) facility. Specific objectives included the following: diagnosing the present level of safety culture maturity using the Patient Safety Culture Improvement Tool (PSCIT), examining the barriers to a positive safety culture, and identifying actions for improvement. A mixed methods design was used within a secured unit for cognitively impaired residents in a Canadian nonprofit LTC facility. Semistructured interviews, a focus group, and the Modified Stanford Patient Safety Culture Survey Instrument were used to explore this topic. Data were synthesized to situate safety maturity of the unit within the PSCIT adapted for LTC. Results indicated a reactive culture, where safety systems were piecemeal and developed only in response to adverse events and/or regulatory requirements. A punitive regulatory environment, inadequate resources, heavy workloads, poor interdisciplinary collaboration, and resident safety training capacity were major barriers to improving safety. This study highlights the importance of understanding a unit's safety culture and identifies the PSCIT as a useful framework for planning future improvements to safety culture maturity. Incorporating mixed methods in the study of health care safety culture provided a good model that can be recommended for future use in research and LTC practice.

  9. Collaboratives for Wildlife-Wind Turbine Interaction Research: Fostering Multistakeholder Involvement (Poster)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sinclair, K.

    This poster highlights the various wildlife-wind collaboratives (specific to wildlife-wind turbine interaction research) that currently exist. Examples of collaboratives are included along with contact information, objectives, benefits, and ways to advance the knowledge base.

  10. Advanced Value Chain Collaboration in Ghana's Cocoa Sector: An Entry Point for Integrated Landscape Approaches?

    PubMed

    Deans, Howard; Ros-Tonen, Mirjam A F; Derkyi, Mercy

    2017-04-15

    Value chain analyses have focused mainly on collaboration between chain actors, often neglecting collaboration "beyond the chain" with non-chain actors to tackle food security, poverty and sustainability issues in the landscapes in which these value chains are embedded. Comparing conventional and advanced value chain collaborations involving small-scale cocoa farmers in Ghana, this paper analyzes the merits of a more integrated approach toward value chain collaboration. It particularly asks whether advanced value chain collaboration targeting cocoa-producing areas potentially offers an entry point for implementing a landscape approach. The findings detail current chain actors and institutions and show how advanced value chain collaboration has a greater positive impact than conventional value chain collaboration on farmers' social, human and natural capital. The paper concludes that the integrated approach, focus on learning, and stable relationships with small-scale farmers inherent in advanced value chain collaboration makes it both more sustainable and effective at the local level than conventional approaches. However, its scope and the actors' jurisdictional powers and self-organization are too limited to be the sole tool in negotiating land use and trade-offs at the landscape level. To evolve as such would require certification beyond the farm level, partnering with other landscape stakeholders, and brokering by bridging organizations.

  11. Climate change and nutrition: creating a climate for nutrition security.

    PubMed

    Tirado, M C; Crahay, P; Mahy, L; Zanev, C; Neira, M; Msangi, S; Brown, R; Scaramella, C; Costa Coitinho, D; Müller, A

    2013-12-01

    Climate change further exacerbates the enormous existing burden of undernutrition. It affects food and nutrition security and undermines current efforts to reduce hunger and promote nutrition. Undernutrition in turn undermines climate resilience and the coping strategies of vulnerable populations. The objectives of this paper are to identify and undertake a cross-sectoral analysis of the impacts of climate change on nutrition security and the existing mechanisms, strategies, and policies to address them. A cross-sectoral analysis of the impacts of climate change on nutrition security and the mechanisms and policies to address them was guided by an analytical framework focused on the three 'underlying causes' of undernutrition: 1) household food access, 2) maternal and child care and feeding practices, 3) environmental health and health access. The analytical framework includes the interactions of the three underlying causes of undernutrition with climate change,vulnerability, adaptation and mitigation. Within broad efforts on climate change mitigation and adaptation and climate-resilient development, a combination of nutrition-sensitive adaptation and mitigation measures, climate-resilient and nutrition-sensitive agricultural development, social protection, improved maternal and child care and health, nutrition-sensitive risk reduction and management, community development measures, nutrition-smart investments, increased policy coherence, and institutional and cross-sectoral collaboration are proposed as a means to address the impacts of climate change to food and nutrition security. This paper proposes policy directions to address nutrition in the climate change agenda and recommendations for consideration by the UN Framework Convention on Climate Change (UNFCCC). Nutrition and health stakeholders need to be engaged in key climate change adaptation and mitigation initiatives, including science-based assessment by the Intergovernmental Panel on Climate Change (IPCC), and policies and actions formulated by the UN Framework Convention on Climate Change (UNFCCC). Improved multi-sectoral coordination and political will is required to integrate nutrition-sensitive actions into climate-resilient sustainable development efforts in the UNFCCC work and in the post 2015 development agenda. Placing human rights at the center of strategies to mitigate and adapt to the impacts of climate change and international solidarity is essential to advance sustainable development and to create a climate for nutrition security.

  12. Food systems transition and disruptive low carbon innovation: implications for a food security research agenda.

    PubMed

    Tyfield, David

    2011-07-01

    There is a growing consensus that we are facing epochal challenges in global food security. Moreover, these challenges are multiple and complex. Meeting these challenges will involve nothing less than a wholesale socio-technical transition of the agri-food system. Optimizing the efficacy of the contribution of research to such a food security agenda will probably also need new institutional mechanisms and career structures to facilitate new kinds of collaborations and ongoing, longer-term projects. In short, the multiple challenges of food security demand a different political economy of research for effective intervention by science. In making this argument, the paper summarizes the major findings of a recent report regarding the potential impact of so-called 'disruptive' low-carbon innovations in China.

  13. Study on Collaborative Object Manipulation in Virtual Environment

    NASA Astrophysics Data System (ADS)

    Mayangsari, Maria Niken; Yong-Moo, Kwon

    This paper presents comparative study on network collaboration performance in different immersion. Especially, the relationship between user collaboration performance and degree of immersion provided by the system is addressed and compared based on several experiments. The user tests on our system include several cases: 1) Comparison between non-haptics and haptics collaborative interaction over LAN, 2) Comparison between non-haptics and haptics collaborative interaction over Internet, and 3) Analysis of collaborative interaction between non-immersive and immersive display environments.

  14. Why nurses can be key partners in securing philanthropic investments.

    PubMed

    Rivet, Nicole

    2014-01-01

    Fund-raisers can truly benefit from collaborating with nurses when they are seeking philanthropic support for their health care systems. Fund-raising is about developing new relationships with potential prospects and strengthening those with current donors. Nurses frequently have some of the best relationships with patients, and they often lead efforts to improve the quality of care in their hospitals. Their professional experience and their ability to connect with people are invaluable skills that can help secure philanthropic investments.

  15. SPIDERS Bi-Directional Charging Station Interconnection Testing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Simpson, M.

    2013-09-01

    The Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS) program is a multi-year Department of Defense-Department of Energy (DOE) collaborative effort that will demonstrate integration of renewables into island-able microgrids using on-site generation control, demand response, and energy storage with robust security features at multiple installations. Fort Carson, Colorado, will be the initial development and demonstration site for use of plug-in electric vehicles as energy storage (also known as vehicle-to-grid or V2G).

  16. Joint the Center for Applied Scientific Computing

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gamblin, Todd; Bremer, Timo; Van Essen, Brian

    The Center for Applied Scientific Computing serves as Livermore Lab’s window to the broader computer science, computational physics, applied mathematics, and data science research communities. In collaboration with academic, industrial, and other government laboratory partners, we conduct world-class scientific research and development on problems critical to national security. CASC applies the power of high-performance computing and the efficiency of modern computational methods to the realms of stockpile stewardship, cyber and energy security, and knowledge discovery for intelligence applications.

  17. An implementation of a security infrastructure compliant with the Italian Personal Data Protection Code in a web-based cooperative work system.

    PubMed

    Eccher, Claudio; Eccher, Lorenzo; Izzo, Umberto

    2005-01-01

    In this poster we describe the security solutions implemented in a web-based cooperative work frame-work for managing heart failure patients among different health care professionals involved in the care process. The solution, developed in close collaboration with the Law Department of the University of Trento, is compliant with the new Italian Personal Data Protection Code, issued in 2003, that regulates also the storing and processing of health data.

  18. Multi-Organizational Collaborative Public Safety and Security Planning for the 2010 Vancouver Winter Games

    DTIC Science & Technology

    2012-10-01

    services de police locaux, de la Gestion des urgences de la Colombie-Britannique et de plusieurs autres organisations locales de sûreté et de sécurité...publique. Dans le cadre de la planification, ces partenaires se sont préparés en vue de tous risques et menaces accidentelles, malveillantes ou...evident that the security environment had changed drastically since Canada had last hosted the Games in Calgary in 1988. North America was still feeling

  19. Problems of collaborative work of the automated process control system (APCS) and the its information security and solutions.

    NASA Astrophysics Data System (ADS)

    Arakelyan, E. K.; Andryushin, A. V.; Mezin, S. V.; Kosoy, A. A.; Kalinina, Ya V.; Khokhlov, I. S.

    2017-11-01

    The principle of interaction of the specified systems of technological protections by the Automated process control system (APCS) and information safety in case of incorrect execution of the algorithm of technological protection is offered. - checking the correctness of the operation of technological protection in each specific situation using the functional relationship between the monitored parameters. The methodology for assessing the economic feasibility of developing and implementing an information security system.

  20. Secure content objects

    DOEpatents

    Evans, William D [Cupertino, CA

    2009-02-24

    A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.

  1. Collaborative Emission Reduction Model Based on Multi-Objective Optimization for Greenhouse Gases and Air Pollutants.

    PubMed

    Meng, Qing-chun; Rong, Xiao-xia; Zhang, Yi-min; Wan, Xiao-le; Liu, Yuan-yuan; Wang, Yu-zhi

    2016-01-01

    CO2 emission influences not only global climate change but also international economic and political situations. Thus, reducing the emission of CO2, a major greenhouse gas, has become a major issue in China and around the world as regards preserving the environmental ecology. Energy consumption from coal, oil, and natural gas is primarily responsible for the production of greenhouse gases and air pollutants such as SO2 and NOX, which are the main air pollutants in China. In this study, a mathematical multi-objective optimization method was adopted to analyze the collaborative emission reduction of three kinds of gases on the basis of their common restraints in different ways of energy consumption to develop an economic, clean, and efficient scheme for energy distribution. The first part introduces the background research, the collaborative emission reduction for three kinds of gases, the multi-objective optimization, the main mathematical modeling, and the optimization method. The second part discusses the four mathematical tools utilized in this study, which include the Granger causality test to analyze the causality between air quality and pollutant emission, a function analysis to determine the quantitative relation between energy consumption and pollutant emission, a multi-objective optimization to set up the collaborative optimization model that considers energy consumption, and an optimality condition analysis for the multi-objective optimization model to design the optimal-pole algorithm and obtain an efficient collaborative reduction scheme. In the empirical analysis, the data of pollutant emission and final consumption of energies of Tianjin in 1996-2012 was employed to verify the effectiveness of the model and analyze the efficient solution and the corresponding dominant set. In the last part, several suggestions for collaborative reduction are recommended and the drawn conclusions are stated.

  2. Collaborative Emission Reduction Model Based on Multi-Objective Optimization for Greenhouse Gases and Air Pollutants

    PubMed Central

    Zhang, Yi-min; Wan, Xiao-le; Liu, Yuan-yuan; Wang, Yu-zhi

    2016-01-01

    CO2 emission influences not only global climate change but also international economic and political situations. Thus, reducing the emission of CO2, a major greenhouse gas, has become a major issue in China and around the world as regards preserving the environmental ecology. Energy consumption from coal, oil, and natural gas is primarily responsible for the production of greenhouse gases and air pollutants such as SO2 and NOX, which are the main air pollutants in China. In this study, a mathematical multi-objective optimization method was adopted to analyze the collaborative emission reduction of three kinds of gases on the basis of their common restraints in different ways of energy consumption to develop an economic, clean, and efficient scheme for energy distribution. The first part introduces the background research, the collaborative emission reduction for three kinds of gases, the multi-objective optimization, the main mathematical modeling, and the optimization method. The second part discusses the four mathematical tools utilized in this study, which include the Granger causality test to analyze the causality between air quality and pollutant emission, a function analysis to determine the quantitative relation between energy consumption and pollutant emission, a multi-objective optimization to set up the collaborative optimization model that considers energy consumption, and an optimality condition analysis for the multi-objective optimization model to design the optimal-pole algorithm and obtain an efficient collaborative reduction scheme. In the empirical analysis, the data of pollutant emission and final consumption of energies of Tianjin in 1996–2012 was employed to verify the effectiveness of the model and analyze the efficient solution and the corresponding dominant set. In the last part, several suggestions for collaborative reduction are recommended and the drawn conclusions are stated. PMID:27010658

  3. Regulatory Underpinnings of Global Health Security: FDA's Roles in Preventing, Detecting, and Responding to Global Health Threats

    PubMed Central

    Bond, Katherine C.; Maher, Carmen

    2014-01-01

    In February 2014, health officials from around the world announced the Global Health Security Agenda, a critical effort to strengthen national and global systems to prevent, detect, and respond to infectious disease threats and to foster stronger collaboration across borders. With its increasing global roles and broad range of regulatory responsibilities in ensuring the availability, safety, and security of medical and food products, the US Food and Drug Administration (FDA) is engaged in a range of efforts in support of global health security. This article provides an overview of FDA's global health security roles, focusing on its responsibilities related to the development and use of medical countermeasures (MCMs) for preventing, detecting, and responding to global infectious disease and other public health emergency threats. The article also discusses several areas—antimicrobial resistance, food safety, and supply chain integrity—in which FDA's global health security roles continue to evolve and extend beyond MCMs and, in some cases, beyond traditional infectious disease threats. PMID:25254912

  4. Regulatory underpinnings of Global Health security: FDA's roles in preventing, detecting, and responding to global health threats.

    PubMed

    Courtney, Brooke; Bond, Katherine C; Maher, Carmen

    2014-01-01

    In February 2014, health officials from around the world announced the Global Health Security Agenda, a critical effort to strengthen national and global systems to prevent, detect, and respond to infectious disease threats and to foster stronger collaboration across borders. With its increasing global roles and broad range of regulatory responsibilities in ensuring the availability, safety, and security of medical and food products, the US Food and Drug Administration (FDA) is engaged in a range of efforts in support of global health security. This article provides an overview of FDA's global health security roles, focusing on its responsibilities related to the development and use of medical countermeasures (MCMs) for preventing, detecting, and responding to global infectious disease and other public health emergency threats. The article also discusses several areas-antimicrobial resistance, food safety, and supply chain integrity-in which FDA's global health security roles continue to evolve and extend beyond MCMs and, in some cases, beyond traditional infectious disease threats.

  5. Collaboration and Perspectives on Identity Management and Access from two Geoscience Cyberinfrastructure Programs

    NASA Astrophysics Data System (ADS)

    Ramamurthy, M. K.

    2016-12-01

    Increasingly, the conduct of science requires close international collaborations to share data, information, knowledge, expertise, and other resources. This is particularly true in the geosciences where the highly connected nature of the Earth system and the need to understand global environmental processes have heightened the importance of scientific partnerships. As geoscience studies become a team effort involving networked scientists and data providers, it is crucial that there is open and reliable access to earth system data of all types, software, tools, models, and other assets. That environment demands close attention to security-related matters, including the creation of trustworthy cyberinfrastructure to facilitate the efficient use of available resources and support the conduct of science. Unidata and EarthCube, both of which are NSF-funded and community-driven programs, recognize the importance of collaborations and the value of networked communities. Unidata, a cornerstone cyberinfrastructure facility for the geosciences, includes users in nearly 180 countries. The EarthCube initiative is aimed at transforming the conduct of geosciences research by creating a well-connected and facile environment for sharing data and in an open, transparent, and inclusive manner and to accelerate our ability to understand and predict the Earth system. We will present the Unidata and EarthCube community perspectives on the approaches to balancing an environment that promotes open and collaborative eScience with the needs for security and communication, including what works, what is needed, the challenges, and opportunities to advance science.

  6. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    ERIC Educational Resources Information Center

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  7. Development and validation of a collaborative behaviors objective assessment tool for end-of-life communication.

    PubMed

    Blackhall, Leslie J; Erickson, Jeanne; Brashers, Valentina; Owen, John; Thomas, Shannon

    2014-01-01

    Helping families make end-of-life decisions requires close collaboration between physicians and nurses. However, medical and nursing students have little formal training in how to collaborate in this task, and few instruments are available to measure collaborative behaviors. The objective of this project was to develop and validate observational assessment tools to measure specific interprofessional competencies in medical and nursing students related to end-of-life discussions. A literature search for evidence-based guidelines and competencies and focus groups with an expert panel of nurses and physicians were used to outline best collaborative practice behaviors for nurses and physicians in an end-of-life decision making simulation. The panel used these practice-behavior checklists to rate videotaped student scenarios and then refined the checklists for validity and clarity until the tools had acceptable inter-rater reliability. The setting was a workshop teaching end-of-life communication to third-year nursing and medical students. Inter-rater reliability was measured using percent agreement and kappa; internal consistency was measured using Cronbach's alpha. Collaborative behaviors objective assessment tools (CBOATs) for nursing and medical students were developed. For the medical CBOAT we found 85% agreement between raters, with an overall kappa of 0.744 and Cronbach's alpha of 0.806. For the nursing CBOAT there was 81% agreement, with a kappa of 0.686 and Cronbach's alpha of 0.845. Development of an end-of-life CBOAT clarified the important collaborative behaviors needed by physician and nurse. The resulting instruments provide a helpful guide for teaching interprofessional sessions related to the end of life and measuring student outcomes using an objective strategy.

  8. Idaho National Laboratory Mission Accomplishments, Fiscal Year 2015

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Allen, Todd Randall; Wright, Virginia Latta

    A summary of mission accomplishments for the research organizations at the Idaho National Laboratory for FY 2015. Areas include Nuclear Energy, National and Homeland Security, Science and Technology Addressing Broad DOE Missions; Collaborations; and Stewardship and Operation of Research Facilities.

  9. Adaptation in Arctic circumpolar communities: food and water security in a changing climate

    PubMed Central

    Berner, James; Brubaker, Michael; Revitch, Boris; Kreummel, Eva; Tcheripanoff, Moses; Bell, Jake

    2016-01-01

    The AMAP Human Health Assessment Group has developed different adaptation strategies through a long-term collaboration with all Arctic countries. Different adaptation strategies are discussed, with examples mainly from native population groups in Alaska. PMID:27974139

  10. 77 FR 12320 - Information Collection Request: GFIRST Conference Stakeholder Evaluation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-29

    ... Communications (CS&C), National Cyber Security Division (NCSD), United States Computer Emergency Readiness Team... personal information provided. SUPPLEMENTARY INFORMATION: The purpose of DHS's premier cyber conference is to continually seek to enhance collaborative efforts between cyber constituencies, partners and...

  11. Collaborative Policy Making: Vertical Integration in The Homeland Security Enterprise

    DTIC Science & Technology

    2011-12-01

    NEMA ), • International Association Emergency Managers (IAEM), • National Association of Chiefs of Police, International Association of...on application of normative principles to the facts and evidence accumulated by decision makers—and will show why other alternative courses of

  12. A Flexible Component based Access Control Architecture for OPeNDAP Services

    NASA Astrophysics Data System (ADS)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC. These components filter requests to the service they protect and apply the required authentication and authorisation schemes. Filters have been developed for OpenID and SSL client based authentication. The latter enabling access with MyProxy issued credentials. By preserving a clear separation between the security and application functionality, multiple authentication technologies may be supported without the need for modification to the underlying OPeNDAP application. The software has been developed in the Python programming language securing the Python based OPeNDAP implementation, PyDAP. This utilises the Python WSGI (Web Server Gateway Interface) specification to create distinct security filter components. Work is also currently underway to develop a parallel Java based filter implementation to secure the THREDDS Data Server. Whilst the ability to apply this flexible approach to the server side security layer is important, the development of compatible client software is vital to the take up of these services across a wide user base. To date PyDAP and wget based clients have been tested and work is planned to integrate the required security interface into the netCDF API. This forms part of ongoing collaboration with the OPeNDAP user and development community to ensure interoperability.

  13. 12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Establishing Information Security Standards Table of Contents I. Introduction A. Scope B. Preservation of... Security Program B. Objectives III. Development and Implementation of Customer Information Security Program.... Introduction The Interagency Guidelines Establishing Information Security Standards (Guidelines) set forth...

  14. User requirements for geo-collaborative work with spatio-temporal data in a web-based virtual globe environment.

    PubMed

    Yovcheva, Zornitza; van Elzakker, Corné P J M; Köbben, Barend

    2013-11-01

    Web-based tools developed in the last couple of years offer unique opportunities to effectively support scientists in their effort to collaborate. Communication among environmental researchers often involves not only work with geographical (spatial), but also with temporal data and information. Literature still provides limited documentation when it comes to user requirements for effective geo-collaborative work with spatio-temporal data. To start filling this gap, our study adopted a User-Centered Design approach and first explored the user requirements of environmental researchers working on distributed research projects for collaborative dissemination, exchange and work with spatio-temporal data. Our results show that system design will be mainly influenced by the nature and type of data users work with. From the end-users' perspective, optimal conversion of huge files of spatio-temporal data for further dissemination, accuracy of conversion, organization of content and security have a key role for effective geo-collaboration. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  15. System on Mobile Devices Middleware: Thinking beyond Basic Phones and PDAs

    NASA Astrophysics Data System (ADS)

    Prasad, Sushil K.

    Several classes of emerging applications, spanning domains such as medical informatics, homeland security, mobile commerce, and scientific applications, are collaborative, and a significant portion of these will harness the capabilities of both the stable and mobile infrastructures (the “mobile grid”). Currently, it is possible to develop a collaborative application running on a collection of heterogeneous, possibly mobile, devices, each potentially hosting data stores, using existing middleware technologies such as JXTA, BREW, Compact .NET and J2ME. However, they require too many ad-hoc techniques as well as cumbersome and time-consuming programming. Our System on Mobile Devices (SyD) middleware, on the other hand, has a modular architecture that makes such application development very systematic and streamlined. The architecture supports transactions over mobile data stores, with a range of remote group invocation options and embedded interdependencies among such data store objects. The architecture further provides a persistent uniform object view, group transaction with Quality of Service (QoS) specifications, and XML vocabulary for inter-device communication. I will present the basic SyD concepts, introduce the architecture and the design of the SyD middleware and its components. We will discuss the basic performance figures of SyD components and a few SyD applications on PDAs. SyD platform has led to developments in distributed web service coordination and workflow technologies, which we will briefly discuss. There is a vital need to develop methodologies and systems to empower common users, such as computational scientists, for rapid development of such applications. Our BondFlow system enables rapid configuration and execution of workflows over web services. The small footprint of the system enables them to reside on Java-enabled handheld devices.

  16. Teaching Collaboration between Pharmacotherapist and Psychotherapist

    ERIC Educational Resources Information Center

    Ellison, James M.

    2005-01-01

    OBJECTIVE: Collaborative treatment, in which psychotherapy provided by one clinician is integrated with pharmacotherapy provided by another clinician, has been explored from various angles. This article addresses the teaching of collaborative pharmacotherapy to psychiatric residents. METHOD: The author's observations derive from a selective review…

  17. Visions of Restoration in Fire-Adapted Forest Landscapes: Lessons from the Collaborative Forest Landscape Restoration Program.

    PubMed

    Urgenson, Lauren S; Ryan, Clare M; Halpern, Charles B; Bakker, Jonathan D; Belote, R Travis; Franklin, Jerry F; Haugo, Ryan D; Nelson, Cara R; Waltz, Amy E M

    2017-02-01

    Collaborative approaches to natural resource management are becoming increasingly common on public lands. Negotiating a shared vision for desired conditions is a fundamental task of collaboration and serves as a foundation for developing management objectives and monitoring strategies. We explore the complex socio-ecological processes involved in developing a shared vision for collaborative restoration of fire-adapted forest landscapes. To understand participant perspectives and experiences, we analyzed interviews with 86 respondents from six collaboratives in the western U.S., part of the Collaborative Forest Landscape Restoration Program established to encourage collaborative, science-based restoration on U.S. Forest Service lands. Although forest landscapes and group characteristics vary considerably, collaboratives faced common challenges to developing a shared vision for desired conditions. Three broad categories of challenges emerged: meeting multiple objectives, collaborative capacity and trust, and integrating ecological science and social values in decision-making. Collaborative groups also used common strategies to address these challenges, including some that addressed multiple challenges. These included use of issue-based recommendations, field visits, and landscape-level analysis; obtaining support from local agency leadership, engaging facilitators, and working in smaller groups (sub-groups); and science engagement. Increased understanding of the challenges to, and strategies for, developing a shared vision of desired conditions is critical if other collaboratives are to learn from these efforts.

  18. Visions of Restoration in Fire-Adapted Forest Landscapes: Lessons from the Collaborative Forest Landscape Restoration Program

    NASA Astrophysics Data System (ADS)

    Urgenson, Lauren S.; Ryan, Clare M.; Halpern, Charles B.; Bakker, Jonathan D.; Belote, R. Travis; Franklin, Jerry F.; Haugo, Ryan D.; Nelson, Cara R.; Waltz, Amy E. M.

    2017-02-01

    Collaborative approaches to natural resource management are becoming increasingly common on public lands. Negotiating a shared vision for desired conditions is a fundamental task of collaboration and serves as a foundation for developing management objectives and monitoring strategies. We explore the complex socio-ecological processes involved in developing a shared vision for collaborative restoration of fire-adapted forest landscapes. To understand participant perspectives and experiences, we analyzed interviews with 86 respondents from six collaboratives in the western U.S., part of the Collaborative Forest Landscape Restoration Program established to encourage collaborative, science-based restoration on U.S. Forest Service lands. Although forest landscapes and group characteristics vary considerably, collaboratives faced common challenges to developing a shared vision for desired conditions. Three broad categories of challenges emerged: meeting multiple objectives, collaborative capacity and trust, and integrating ecological science and social values in decision-making. Collaborative groups also used common strategies to address these challenges, including some that addressed multiple challenges. These included use of issue-based recommendations, field visits, and landscape-level analysis; obtaining support from local agency leadership, engaging facilitators, and working in smaller groups (sub-groups); and science engagement. Increased understanding of the challenges to, and strategies for, developing a shared vision of desired conditions is critical if other collaboratives are to learn from these efforts.

  19. High-Dimensional Circular Quantum Secret Sharing Using Orbital Angular Momentum

    NASA Astrophysics Data System (ADS)

    Tang, Dawei; Wang, Tie-jun; Mi, Sichen; Geng, Xiao-Meng; Wang, Chuan

    2016-11-01

    Quantum secret sharing is to distribute secret message securely between multi-parties. Here exploiting orbital angular momentum (OAM) state of single photons as the information carrier, we propose a high-dimensional circular quantum secret sharing protocol which increases the channel capacity largely. In the proposed protocol, the secret message is split into two parts, and each encoded on the OAM state of single photons. The security of the protocol is guaranteed by the laws of non-cloning theorem. And the secret messages could not be recovered except that the two receivers collaborated with each other. Moreover, the proposed protocol could be extended into high-level quantum systems, and the enhanced security could be achieved.

  20. The science of human security: a response from political science.

    PubMed

    Roberts, David

    2008-01-01

    The concept of human security has developed in significance in the last decade to the point that its meaning and validity is hotly contested in the field of international relations, security, and development studies. A key consideration relates to its ambiguity at best and its amorphousness at worst. Medical scholarship proposes approaches that may render more meaningful the concept. However, collaboration and co-operation between political scientists and medical practitioners offers even greater potential to this vital programme. The latter offer the technical and methodological skills and approaches lacking in political science, whilst the former develop political frameworks to shift the causal focus towards human, institutional and structural agency in mass avoidable global civilian mortality.

  1. Privacy, security, and the public health researcher in the era of electronic health record research

    PubMed Central

    Sarwate, Anand D.

    2016-01-01

    Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools. PMID:28210428

  2. Privacy, security, and the public health researcher in the era of electronic health record research.

    PubMed

    Goldstein, Neal D; Sarwate, Anand D

    2016-01-01

    Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools.

  3. Personal health record systems and their security protection.

    PubMed

    Win, Khin Than; Susilo, Willy; Mu, Yi

    2006-08-01

    The objective of this study is to analyze the security protection of personal health record systems. To achieve this we have investigated different personal health record systems, their security functions, and security issues. We have noted that current security mechanisms are not adequate and we have proposed some security mechanisms to tackle these problems.

  4. An interdisciplinary lighting design studio: Opportunities and challenges of collaborative learning

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Guzowski, M.; Ginthner, D.

    1997-12-31

    Interdisciplinary study is based on the proposition that collaboration will enrich and expand understanding within a discipline and will also reveal connections to other fields of study, the community, the natural environment, etc. This study, the community, the natural environment, etc. This paper will present the results of a collaborative lighting design studio which was conducted by the Department of Architecture and the Interior Design Program at the University of Minnesota. The objectives of the studio were threefold: (1) To provide an opportunity for collaboration between students in design disciplines, (2) to introduce students to collaboration with design practitioners andmore » clients, and (3) to expose students to interdisciplinary work prior to graduation. Three projects by local firms were used for the design investigation. The following discussion will explore the opportunities and challenges of collaborative education and the interdisciplinary design studio. The objectives, roles of the teachers and the students, coursework, and future directions will be considered.« less

  5. Linking Research to Practice: FEWS NET and Its Use of Satellite Remote Sensing Data

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.; Brickley, Elizabeth B.

    2011-01-01

    The purpose of the Famine Early Warning Systems Network (FEWS NET) is to collaborate with international, regional and national partners to provide timely and rigorous early warning and vulnerability information on emerging and evolving food security issues

  6. Energy Security Solutions

    Science.gov Websites

    Los Alamos National Laboratory Search Site submit About Mission Business Newsroom Publications Los Innovation in New Mexico Los Alamos Collaboration for Explosives Detection (LACED) SensorNexus Exascale Computing Project (ECP) User Facilities Center for Integrated Nanotechnologies (CINT) Los Alamos Neutron

  7. Locked out

    ERIC Educational Resources Information Center

    Boulard, Garry

    2010-01-01

    As a collaborative program bringing the instructional resources of Wesleyan University to the maximum security Cheshire Correctional Institute in Connecticut enters its second semester, prison and higher education experts are seeing decreasing support for similar programs across the U.S. According to some experts, state funding on prison education…

  8. The Document Management Alliance.

    ERIC Educational Resources Information Center

    Fay, Chuck

    1998-01-01

    Describes the Document Management Alliance, a standards effort for document management systems that manages and tracks changes to electronic documents created and used by collaborative teams, provides secure access, and facilitates online information retrieval via the Internet and World Wide Web. Future directions are also discussed. (LRW)

  9. Development and Management of University Research Groups.

    ERIC Educational Resources Information Center

    Smith, Robert V.

    Guidelines for managers of university research groups cover securing resources, personnel, and services and choosing collaborators, as well as organizing, supervising, and controlling research activities. Attention is directed to: orientation of personnel; reporting mechanisms; boosting morale; the needs of different personnel; handling travel,…

  10. 78 FR 53736 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-30

    ...: Title, Associated Form and OMB Number: Defense Industrial Base Cyber Security/Information Assurance (DIB CS/IA) Cyber Incident Reporting; OMB Control Number 0704-0489. Type of Request: Reinstatement without.... The requested information supports the collaborative cyber threat information sharing and incident...

  11. Advancing STEM Career and Learning through Civic Engagement

    ERIC Educational Resources Information Center

    Xie, Yichun

    2014-01-01

    The Mayor's Youth Technology Corps (MYTC)--Creating Safe Communities through Information Technology Training in Homeland Security Applications (2008-2012)--offered a collaboration of resources, supports, and opportunities for strengthening science, technology, engineering, and mathematics (STEM) education efforts in an underserved community, the…

  12. An Integrated Toolset for Agile Systems Engineering Requirements Analysis

    DTIC Science & Technology

    2011-05-19

    Tool STDUse Cases Collaboration Tool Data Mgmt T l 1 e a a managemen oo Run the test in the test lab, redline the STD Update the collaboration...Boeing Defense, Space & Security Lean-Agile Software A I t t d T l t fn n egra e oo se or Agile Systems Engineering Requirements Analysis Phyllis...Regulations (ITAR) and the Export Administration R l ti (EAR) h i l bl b t h th i th BOEING is a trademark of Boeing Management Company. Copyright © 2010

  13. Computing Legacy Software Behavior to Understand Functionality and Security Properties: An IBM/370 Demonstration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Linger, Richard C; Pleszkoch, Mark G; Prowell, Stacy J

    Organizations maintaining mainframe legacy software can benefit from code modernization and incorporation of security capabilities to address the current threat environment. Oak Ridge National Laboratory is developing the Hyperion system to compute the behavior of software as a means to gain understanding of software functionality and security properties. Computation of functionality is critical to revealing security attributes, which are in fact specialized functional behaviors of software. Oak Ridge is collaborating with MITRE Corporation to conduct a demonstration project to compute behavior of legacy IBM Assembly Language code for a federal agency. The ultimate goal is to understand functionality and securitymore » vulnerabilities as a basis for code modernization. This paper reports on the first phase, to define functional semantics for IBM Assembly instructions and conduct behavior computation experiments.« less

  14. Technology Empowerment: Security Challenges.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Warren, Drake Edward; Backus, George A.; Jones, Wendell

    “Technology empowerment” means that innovation is increasingly accessible to ordinary people of limited means. As powerful technologies become more affordable and accessible, and as people are increasingly connected around the world, ordinary people are empowered to participate in the process of innovation and share the fruits of collaborative innovation. This annotated briefing describes technology empowerment and focuses on how empowerment may create challenges to U.S. national security. U.S. defense research as a share of global innovation has dwindled in recent years. With technology empowerment, the role of U.S. defense research is likely to shrink even further while technology empowerment willmore » continue to increase the speed of innovation. To avoid falling too far behind potential technology threats to U.S. national security, U.S. national security institutions will need to adopt many of the tools of technology empowerment.« less

  15. The future of infrastructure security :

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Garcia, Pablo; Turnley, Jessica Glicken; Parrott, Lori K.

    2013-05-01

    Sandia National Laboratories hosted a workshop on the future of infrastructure security on February 27-28, 2013, in Albuquerque, NM. The 17 participants came from backgrounds as diverse as federal policy, the insurance industry, infrastructure management, and technology development. The purpose of the workshop was to surface key issues, identify directions forward, and lay groundwork for cross-sectoral and cross-disciplinary collaborations. The workshop addressed issues such as the problem space (what is included in infrastructure problems?), the general types of threats to infrastructure (such as acute or chronic, system-inherent or exogenously imposed) and definitions of secure and resilient infrastructures. The workshop concludedmore » with a consideration of stakeholders and players in the infrastructure world, and identification of specific activities that could be undertaken by the Department of Homeland Security (DHS) and other players.« less

  16. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  17. Experiences with the implementation of Individual Placement and Support for people with severe mental illness: a qualitative study among stakeholders.

    PubMed

    Vukadin, Miljana; Schaafsma, Frederieke G; Westerman, Marjan J; Michon, Harry W C; Anema, Johannes R

    2018-05-24

    Individual Placement and Support (IPS) is an evidence-based approach to help people with severe mental illness achieve competitive employment. This article provides insight into an organizational and a financial implementation strategy for IPS in the Netherlands by exploring the perceived facilitators and barriers among participating stakeholders. The goal of this multifaceted strategy was to improve IPS implementation by improving the collaboration between all organizations involved, and realising secured IPS funding with a 'pay for performance' element. A qualitative, explorative study among practitioners (n = 8) and decision makers (n = 7) in mental health care and vocational rehabilitation was performed using semi-structured interviews to collect rich information about the possible facilitators and barriers with regard to the organizational and financial implementation strategy for IPS. Important perceived facilitators were the key principles of the IPS model, regular meetings of stakeholders in mental health care and vocational rehabilitation, stakeholders' experienced ownership of IPS and collaboration, the mandate and influence of the decision makers involved and secured IPS funding. Important perceived barriers included the experienced rigidity of the IPS model fidelity scale and lack of independent fidelity reviewers, the temporary and fragmented character of the secured funding, lack of communication between decision makers and practitioners and negative attitudes and beliefs among mental health clinicians. Changes in legislation were experienced as a facilitator as well as a barrier. The results of this study suggest that the collaboration and IPS funding were experienced as improved by applying an organizational and a financial implementation strategy. However, considerable effort is still necessary to overcome the remaining barriers identified and to make the implementation of IPS a success in practice.

  18. One-year results of a prospective randomized, evaluator-blinded, multicenter study comparing TVT and TVT Secur.

    PubMed

    Andrada Hamer, Maria; Larsson, Per-Göran; Teleman, Pia; Bergqvist, Christina Eten; Persson, Jan

    2013-02-01

    The aim of this prospective randomized multicenter study was to compare retropubic tension-free vaginal tape (TVT) with TVT Secur in terms of efficacy and safety. We set out to enrol 280 stress urinary incontinent (SUI) women with a half-time interim analysis of short-term cure and adverse events. The short-term results have previously been published. Of the 133 randomized women, 125 underwent surgery, and 121 (TVT n = 61, TVT Secur n = 60) were available for follow-up 1 year postsurgery. No significant differences were found between groups regarding demographics or incontinence grade. One year after surgery, both subjective and objective cure rates were significantly lower for TVT Secur than for TVT (subjective cure: TVT 98 %, TVT Secur 80 %, p = 0.03; objective cure: TVT 94 %, TVT Secur 71 % for cough test, p = 0.01; TVT 76 %, TVT Secur 58 % for pad test, p = 0.05 ). Three major complications occurred in the TVT Secur group: one tape erosion into the urethra, one tape inadvertently placed into the bladder, and one immediate postoperative bleeding due to injury to the corona mortis. No major complications occurred in the TVT group. No significant differences were found between groups regarding peroperative bleeding, hospital stay, urge symptoms, residual urinary volume, subjective bladder emptying problems, postoperative urinary tract infections, and minor complications. The TVT Secur group used more antimuscarine medication after surgery than the TVT group (p = 0.03). Median time for surgery was 13 and 22 min for TVT Secur and TVT, respectively (p < 0.0001). The TVT Secur procedure had significantly inferior subjective and objective cure rates compared with the retropubic TVT procedure. Three serious adverse events occurred in the TVT Secur group. We therefore discourage further use of TVT Secur.

  19. Numerical Simulations of 3D Seismic Data Final Report CRADA No. TC02095.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Friedmann, S. J.; Kostov, C.

    This was a collaborative effort between Lawrence Livermore National Security, LLC (formerly The Regents of the University of Califomia)/Lawrence-Livermore National Laboratory (LLNL) and Schlumberger Cambridge Research (SCR), to develop synthetic seismic data sets and supporting codes.

  20. A university-state-corporation partnership for providing correctional mental health services.

    PubMed

    Appelbaum, Kenneth L; Manning, Thomas D; Noonan, John D

    2002-02-01

    In September 1998 the University of Massachusetts Medical School, in partnership with a private vendor of correctional health care, began providing mental health services and other services to the Massachusetts Department of Correction. The experience with this partnership demonstrates that the involvement of a medical school with a correctional system has advantages for both. The correctional program benefits from enhanced quality of services, assistance with the recruitment and retention of skilled professionals, and expansion of training and continuing education programs. The medical school benefits by building its revenue base while providing a needed public service and through opportunities to extend its research and training activities. Successful collaboration requires that the medical school have an appreciation of security needs, a sensitivity to fiscal issues, and a readiness to work with inmates who have severe mental disorders and disruptive behavior. Correctional administrators, for their part, must support adequate treatment resources and must collaborate in the resolution of tensions between security and health care needs.

  1. GSM-Railway as part of the European Rail Traffic Management System

    NASA Astrophysics Data System (ADS)

    Bibac, Ionut

    2007-05-01

    GSM-R is a vital component inside the ERTMS which is also an essential element of European Community rail projects; investment in equipping and the rolling stock with ERTMS could reach 5 billion eurodollars in the period 2007-2016. GSM-R is the result of over ten years of collaboration between the various European railway companies, the railway communication industry and the different standardization bodies. GSM-R provides a secure platform for voice and data communication between the operational staff of the railway companies including drivers, dispatchers, shunting team members, train engineers, and station controllers. It delivers advanced features such as group calls, voice broadcast, location based connections, and call pre-emption in case of an emergency, which significantly improves communication, collaboration, and security management across operational staff members. Taking into account the above mentioned, the paper will permit to audience to discover the GSM-R network architecture, services and applications proposed by this technology together with the future development and market situation due to the market liberalization.

  2. caTIES: a grid based system for coding and retrieval of surgical pathology reports and tissue specimens in support of translational research.

    PubMed

    Crowley, Rebecca S; Castine, Melissa; Mitchell, Kevin; Chavan, Girish; McSherry, Tara; Feldman, Michael

    2010-01-01

    The authors report on the development of the Cancer Tissue Information Extraction System (caTIES)--an application that supports collaborative tissue banking and text mining by leveraging existing natural language processing methods and algorithms, grid communication and security frameworks, and query visualization methods. The system fills an important need for text-derived clinical data in translational research such as tissue-banking and clinical trials. The design of caTIES addresses three critical issues for informatics support of translational research: (1) federation of research data sources derived from clinical systems; (2) expressive graphical interfaces for concept-based text mining; and (3) regulatory and security model for supporting multi-center collaborative research. Implementation of the system at several Cancer Centers across the country is creating a potential network of caTIES repositories that could provide millions of de-identified clinical reports to users. The system provides an end-to-end application of medical natural language processing to support multi-institutional translational research programs.

  3. Postsecondary Instructor Attitudes toward Tablet Use for Collaboration and Critical Thinking Development

    ERIC Educational Resources Information Center

    Hubbard, Jerry D.

    2017-01-01

    Although research has identified critical thinking (CT) as an objective of higher education, limited quantitative research has focused on how postsecondary instructors view using handheld devices for classroom collaboration to support CT. There are studies examining how the use of tablet technologies influence collaborative learning (CL), showing…

  4. Designing Simulations for Athletic Training Students through Interprofessional Teaching Collaboration

    ERIC Educational Resources Information Center

    Tivener, Kristin Ann; Gloe, Donna Sue

    2015-01-01

    Context: While multidisciplinary team approaches to education and practice have been promoted for decades, literature on collaborative efforts in athletic training and nursing remains sparse. Objective: The goal of this article is to provide an example of an interprofessional teaching collaboration in which a simulation scenario was developed…

  5. California Colleges and Universities Collaborate to Support Student Mental Health

    ERIC Educational Resources Information Center

    Woodbridge, Michelle W.; Goldweber, Asha; Yu, Jennifer; Golan, Shari; Stein, Bradley D.

    2014-01-01

    One key objective of California's Prevention and Early Intervention (PEI) Student Mental Health (SMH) initiative funded under Proposition 63 is to establish a formal process for ongoing collaboration between higher education systems and county mental health, as well as to increase collaboration among higher education campuses to improve student…

  6. Social Support, a Mediator in Collaborative Depression Care for Cancer Patients

    ERIC Educational Resources Information Center

    Oh, Hyunsung; Ell, Kathleen

    2015-01-01

    Objective: This study assessed whether perceived social support (PSS) is a factor in improving physical and functional well-being observed among cancer patients receiving collaborative depression care. Methods: A secondary analysis was conducted of data collected in a randomized clinical trial testing the effectiveness of collaborative depression…

  7. Roles for Technology in Collaborative Teaching.

    ERIC Educational Resources Information Center

    Bonvallet, Susan; De Luce, Judith

    2001-01-01

    Describes a collaborative upper level Latin literature course taught at a secondary school and a university that used a variety of technologies, including a MOO and e-mail. The design of this course on Plautus'"Aulularia" is discussed, including objectives, learning goals, and collaborative assignments. Argues that informed use of technology can…

  8. An Integrated Approach for Physical and Cyber Security Risk Assessment: The U.S. Army Corps of Engineers Common Risk Model for Dams

    DTIC Science & Technology

    2016-07-01

    Common Risk Model for Dams ( CRM -D) Methodology,” for the Director, Cost Assessment and Program Evaluation, Office of Secretary of Defense and the...for Dams ( CRM -D), developed by the U.S. Army Corps of Engineers (USACE) in collaboration with the Institute for Defense Analyses (IDA) and the U.S...and cyber security risks across a portfolio of dams, and informing decisions on how to mitigate those risks. The CRM -D can effectively quantify the

  9. Results from the electro-optic sensors domain of the materials and components for missiles innovation and technology partnership (phase 1)

    NASA Astrophysics Data System (ADS)

    Bray, Mark E.; Shears, Robert A.

    2013-10-01

    The Materials and Components for Missiles Innovation and Technology Partnership (ITP) is a research programme supporting research for guided weapons at Technology Readiness Levels 1 to 4. The Anglo-French initiative is supported by the DGA and the MoD, with matched funding from industry. A major objective is to foster projects which partner UK and French universities, SMEs and larger companies. The first projects started in January 2008 and the first phase completed in spring 2013. Providing funding is secured, the next phase of the programme is due to start later in 2013. Selex ES leads Domain 3 of the MCM-ITP which develops Electro-Optic sensor technology. In collaboration with DGA, MoD and MBDA, the prime contractor, we identified 4 key objectives for the first ITP phase and focussed resources on achieving these. The objectives were to enable better imagery, address operationally stressing scenarios, provide low overall through life cost and improve active and semi-active sensors Nine normal projects and one ITP innovation fund project have been supported within the domain. The technology providers have included 3 SMEs and 8 research centres from both the United Kingdom and France. Highlights of the projects are included. An outline of the priorities for the domain for the new phase ise provided and we encourage organisations with suitable technology to contact us to get involved.

  10. LigoDV-web: Providing easy, secure and universal access to a large distributed scientific data store for the LIGO scientific collaboration

    NASA Astrophysics Data System (ADS)

    Areeda, J. S.; Smith, J. R.; Lundgren, A. P.; Maros, E.; Macleod, D. M.; Zweizig, J.

    2017-01-01

    Gravitational-wave observatories around the world, including the Laser Interferometer Gravitational-Wave Observatory (LIGO), record a large volume of gravitational-wave output data and auxiliary data about the instruments and their environments. These data are stored at the observatory sites and distributed to computing clusters for data analysis. LigoDV-web is a web-based data viewer that provides access to data recorded at the LIGO Hanford, LIGO Livingston and GEO600 observatories, and the 40 m prototype interferometer at Caltech. The challenge addressed by this project is to provide meaningful visualizations of small data sets to anyone in the collaboration in a fast, secure and reliable manner with minimal software, hardware and training required of the end users. LigoDV-web is implemented as a Java Enterprise Application, with Shibboleth Single Sign On for authentication and authorization, and a proprietary network protocol used for data access on the back end. Collaboration members with proper credentials can request data be displayed in any of several general formats from any Internet appliance that supports a modern browser with Javascript and minimal HTML5 support, including personal computers, smartphones, and tablets. Since its inception in 2012, 634 unique users have visited the LigoDV-web website in a total of 33 , 861 sessions and generated a total of 139 , 875 plots. This infrastructure has been helpful in many analyses within the collaboration including follow-up of the data surrounding the first gravitational-wave events observed by LIGO in 2015.

  11. KSOS Computer Program Development Specifications (Type B-5). (Kernelized Secure Operating System). I. Security Kernel (CDRL 0002AF). II. UNIX Emulator (CDRL 0002AG). III. Security-Related Software (CDRL 0002AH).

    DTIC Science & Technology

    1980-12-01

    Commun- ications Corporation, Palo Alto, CA (March 1978). g. [Walter at al. 74] Walter, K.G. et al., " Primitive Models for Computer .. Security", ESD-TR...discussion is followed by a presenta- tion of the Kernel primitive operations upon these objects. All Kernel objects shall be referenced by a common...set of sizes. All process segments, regardless of domain, shall be manipulated by the same set of Kernel segment primitives . User domain segments

  12. Shared Electronic Health Record Systems: Key Legal and Security Challenges.

    PubMed

    Christiansen, Ellen K; Skipenes, Eva; Hausken, Marie F; Skeie, Svein; Østbye, Truls; Iversen, Marjolein M

    2017-11-01

    Use of shared electronic health records opens a whole range of new possibilities for flexible and fruitful cooperation among health personnel in different health institutions, to the benefit of the patients. There are, however, unsolved legal and security challenges. The overall aim of this article is to highlight legal and security challenges that should be considered before using shared electronic cooperation platforms and health record systems to avoid legal and security "surprises" subsequent to the implementation. Practical lessons learned from the use of a web-based ulcer record system involving patients, community nurses, GPs, and hospital nurses and doctors in specialist health care are used to illustrate challenges we faced. Discussion of possible legal and security challenges is critical for successful implementation of shared electronic collaboration systems. Key challenges include (1) allocation of responsibility, (2) documentation routines, (3) and integrated or federated access control. We discuss and suggest how challenges of legal and security aspects can be handled. This discussion may be useful for both current and future users, as well as policy makers.

  13. Securely Measuring the Overlap between Private Datasets with Cryptosets

    PubMed Central

    Swamidass, S. Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data—collected by different groups or across large collaborative networks—into a combined analysis. Unfortunately, some of the most interesting and powerful datasets—like health records, genetic data, and drug discovery data—cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset’s contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach “information-theoretic” security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  14. Cryptonite: A Secure and Performant Data Repository on Public Clouds

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kumbhare, Alok; Simmhan, Yogesh; Prasanna, Viktor

    2012-06-29

    Cloud storage has become immensely popular for maintaining synchronized copies of files and for sharing documents with collaborators. However, there is heightened concern about the security and privacy of Cloud-hosted data due to the shared infrastructure model and an implicit trust in the service providers. Emerging needs of secure data storage and sharing for domains like Smart Power Grids, which deal with sensitive consumer data, require the persistence and availability of Cloud storage but with client-controlled security and encryption, low key management overhead, and minimal performance costs. Cryptonite is a secure Cloud storage repository that addresses these requirements using amore » StrongBox model for shared key management.We describe the Cryptonite service and desktop client, discuss performance optimizations, and provide an empirical analysis of the improvements. Our experiments shows that Cryptonite clients achieve a 40% improvement in file upload bandwidth over plaintext storage using the Azure Storage Client API despite the added security benefits, while our file download performance is 5 times faster than the baseline for files greater than 100MB.« less

  15. Building organisational cyber resilience: A strategic knowledge-based view of cyber security management.

    PubMed

    Ferdinand, Jason

    The concept of cyber resilience has emerged in recent years in response to the recognition that cyber security is more than just risk management. Cyber resilience is the goal of organisations, institutions and governments across the world and yet the emerging literature is somewhat fragmented due to the lack of a common approach to the subject. This limits the possibility of effective collaboration across public, private and governmental actors in their efforts to build and maintain cyber resilience. In response to this limitation, and to calls for a more strategically focused approach, this paper offers a knowledge-based view of cyber security management that explains how an organisation can build, assess, and maintain cyber resilience.

  16. Ethics in Public Health Research

    PubMed Central

    Myers, Julie; Frieden, Thomas R.; Bherwani, Kamal M.; Henning, Kelly J.

    2008-01-01

    Public health agencies increasingly use electronic means to acquire, use, maintain, and store personal health information. Electronic data formats can improve performance of core public health functions, but potentially threaten privacy because they can be easily duplicated and transmitted to unauthorized people. Although such security breaches do occur, electronic data can be better secured than paper records, because authentication, authorization, auditing, and accountability can be facilitated. Public health professionals should collaborate with law and information technology colleagues to assess possible threats, implement updated policies, train staff, and develop preventive engineering measures to protect information. Tightened physical and electronic controls can prevent misuse of data, minimize the risk of security breaches, and help maintain the reputation and integrity of public health agencies. PMID:18382010

  17. Expanding Integrated Pest Management Capacity: Rwanda Case Study

    ERIC Educational Resources Information Center

    Baributsa, Dieudonne; Flores, Luis; Rukazambuga, Daniel; Wise, John C.

    2014-01-01

    Purpose: Rwanda is developing its agricultural capacity to meet the needs of national food security while addressing food demands and requirements of regional and international markets. The Rwanda Horticultural Export Standards Initiative was developed by the Ministry of Agriculture and Natural Resources in collaboration with Michigan State…

  18. DOE/DHS/DOT Volpe Technical Meeting on Electric Vehicle and Charging Station Cybersecurity Report

    DOT National Transportation Integrated Search

    2018-03-26

    On November 29-30, 2017, the U.S. Department of Energys (DOE) Office of Policy (OP), in collaboration with DOEs Vehicle Technology Office (VTO), the U.S. Department of Homeland Securitys (DHS) Science and Technology Directorate (S&T) Cyber S...

  19. Leonard Wood, Operational Artist or Scheming Careerist?

    DTIC Science & Technology

    2012-12-06

    and administrator of Egypt , told the British Foreign Office that there was only one man in the world capable of taking his place but, unfortunately...Pacification is a pyramid built on a base of a secured environment. In unstable environments, collaboration of the population is limited because the

  20. Experiments with Sensor Motes and Java-DSP

    ERIC Educational Resources Information Center

    Kwon, Homin; Berisha, V.; Atti, V.; Spanias, A.

    2009-01-01

    Distributed wireless sensor networks (WSNs) are being proposed for various applications including defense, security, and smart stages. The introduction of hardware wireless sensors in a signal processing education setting can serve as a paradigm for data acquisition, collaborative signal processing, or simply as a platform for obtaining,…

  1. The GLOBAL Learning and Observations to Benefit the Environment (GLOBE) Collaboration System. Building a robust international collaboration environment for teachers, scientists and students.

    NASA Astrophysics Data System (ADS)

    Overoye, D.; Lewis, C.

    2016-12-01

    The Global Learning and Observations to Benefit the Environment (GLOBE) Program is a worldwide hands-on, primary and secondary school-based science and education program founded on Earth Day 1995. Implemented in 117 countries, GLOBE promotes the teaching and learning of science, supporting students, teachers and scientists worldwide to collaborate with each other on inquiry-based investigations of the Earth system. As an international platform supporting a large number and variety of stakeholders, the GLOBE Data Information System (DIS) was re-built with the goal of providing users the support needed to foster and develop collaboration between teachers, students and scientists while supporting the collection and visualization of over 50 different earth science investigations (protocols). There have been many challenges to consider as we have worked to prototype and build various tools to support collaboration across the GLOBE community - language, security, time zones, user roles and the Child Online Protection Act (COPA) to name a few. During the last 3 years the re-built DIS has been in operation we have supported user to user collaboration, school to school collaboration, project/campaign to user collaboration and scientist to scientist collaboration. We have built search tools to facilitate finding collaboration partners. The tools and direction continue to evolve based on feedback, evolving needs and changes in technology. With this paper we discuss our approach for dealing with some of the collaboration challenges, review tools built to encourage and support collaboration, and analyze which tools have been successful and which have not. We will review new ideas for collaboration in the GLOBE community that are guiding upcoming development.

  2. Secure Video Surveillance System (SVSS) for unannounced safeguards inspections.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Galdoz, Erwin G.; Pinkalla, Mark

    2010-09-01

    The Secure Video Surveillance System (SVSS) is a collaborative effort between the U.S. Department of Energy (DOE), Sandia National Laboratories (SNL), and the Brazilian-Argentine Agency for Accounting and Control of Nuclear Materials (ABACC). The joint project addresses specific requirements of redundant surveillance systems installed in two South American nuclear facilities as a tool to support unannounced inspections conducted by ABACC and the International Atomic Energy Agency (IAEA). The surveillance covers the critical time (as much as a few hours) between the notification of an inspection and the access of inspectors to the location in facility where surveillance equipment is installed.more » ABACC and the IAEA currently use the EURATOM Multiple Optical Surveillance System (EMOSS). This outdated system is no longer available or supported by the manufacturer. The current EMOSS system has met the project objective; however, the lack of available replacement parts and system support has made this system unsustainable and has increased the risk of an inoperable system. A new system that utilizes current technology and is maintainable is required to replace the aging EMOSS system. ABACC intends to replace one of the existing ABACC EMOSS systems by the Secure Video Surveillance System. SVSS utilizes commercial off-the shelf (COTS) technologies for all individual components. Sandia National Laboratories supported the system design for SVSS to meet Safeguards requirements, i.e. tamper indication, data authentication, etc. The SVSS consists of two video surveillance cameras linked securely to a data collection unit. The collection unit is capable of retaining historical surveillance data for at least three hours with picture intervals as short as 1sec. Images in .jpg format are available to inspectors using various software review tools. SNL has delivered two SVSS systems for test and evaluation at the ABACC Safeguards Laboratory. An additional 'proto-type' system remains at SNL for software and hardware testing. This paper will describe the capabilities of the new surveillance system, application and requirements, and the design approach.« less

  3. Pakistan: Frontline state again. Master`s thesis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rivard, D.S.

    1995-12-01

    The objective of this study is to determine Pakistan`s place in contemporary U.S. national security strategy. Today, U.S.-Pakistan relations are strained due to the Pressler Amendment to the Foreign Assistance Act. The Pressler Amendment prohibits arms transfers from the United States to Pakistan in response to Pakistani efforts to develop a nuclear weapon capability. This thesis provides a historical background to the current impasse by examining Pakistani foreign policy since 1947. Next, the study examines the evolution of U.S. interests and security objectives in South and Southwest Asia. Current security objectives analyzed are the U.S. strategies to contain Iran andmore » Iraq and to prevent nuclear proliferation in the region. In order to attain security objectives in the region, the author concludes that the U.S. needs a close cooperative relationship with Pakistan. Since the Pressler Amendment stands as the greatest obstacle to improved U.S.-Pakistan relations, the amendment should be repealed.« less

  4. Different Modes of Digital Learning Object Use in School Settings: Do We Design for Individual or Collaborative Learning?

    ERIC Educational Resources Information Center

    Akpinar, Yavuz

    2014-01-01

    The aim of the studies reported in this paper is to gain classroom based empirical evidence on the learning effectiveness of learning objects used in two types of study settings: Collaborative and individual. A total of 127 seventh and ninth grade students participated in the experiments. They were assigned into one of the study modes and worked…

  5. Learning Specific Content in Technology Education: Learning Study as a Collaborative Method in Swedish Preschool Class Using Hands-On Material

    ERIC Educational Resources Information Center

    Kilbrink, Nina; Bjurulf, Veronica; Blomberg, Ingela; Heidkamp, Anja; Hollsten, Ann-Christin

    2014-01-01

    This article describes the process of a learning study conducted in technology education in a Swedish preschool class. The learning study method used in this study is a collaborative method, where researchers and teachers work together as a team concerning teaching and learning about a specific learning object. The object of learning in this study…

  6. Ubiquitous computing to support co-located clinical teams: using the semiotics of physical objects in system design.

    PubMed

    Bang, Magnus; Timpka, Toomas

    2007-06-01

    Co-located teams often use material objects to communicate messages in collaboration. Modern desktop computing systems with abstract graphical user interface (GUIs) fail to support this material dimension of inter-personal communication. The aim of this study is to investigate how tangible user interfaces can be used in computer systems to better support collaborative routines among co-located clinical teams. The semiotics of physical objects used in team collaboration was analyzed from data collected during 1 month of observations at an emergency room. The resulting set of communication patterns was used as a framework when designing an experimental system. Following the principles of augmented reality, physical objects were mapped into a physical user interface with the goal of maintaining the symbolic value of those objects. NOSTOS is an experimental ubiquitous computing environment that takes advantage of interaction devices integrated into the traditional clinical environment, including digital pens, walk-up displays, and a digital desk. The design uses familiar workplace tools to function as user interfaces to the computer in order to exploit established cognitive and collaborative routines. Paper-based tangible user interfaces and digital desks are promising technologies for co-located clinical teams. A key issue that needs to be solved before employing such solutions in practice is associated with limited feedback from the passive paper interfaces.

  7. C-C1-04: Building a Health Services Information Technology Research Environment

    PubMed Central

    Gehrum, David W; Jones, JB; Romania, Gregory J; Young, David L; Lerch, Virginia R; Bruce, Christa A; Donkochik, Diane; Stewart, Walter F

    2010-01-01

    Background: The electronic health record (EHR) has opened a new era for health services research (HSR) where information technology (IT) is used to re-engineer care processes. While the EHR provides one means of advancing novel solutions, a promising strategy is to develop tools (e.g., online questionnaires, visual display tools, decision support) distinct from, but which interact with, the EHR. Development of such software tools outside the EHR offers an advantage in flexibility, sophistication, and ultimately in portability to other settings. However, institutional IT departments have an imperative to protect patient data and to standardize IT processes to ensure system-level security and support traditional business needs. Such imperatives usually present formidable process barriers to testing novel software solutions. We describe how, in collaboration with our IT department, we are creating an environment and a process that allows for routine and rapid testing of novel software solutions. Methods: We convened a working group consisting of IT and research personnel with expertise in information security, database design/management, web design, EHR programming, and health services research. The working group was tasked with developing a research IT environment to accomplish two objectives: maintain network/ data security and regulatory compliance; allow researchers working with external vendors to rapidly prototype and, in a clinical setting, test web-based tools. Results: Two parallel solutions, one focused on hardware, the second on oversight and management, were developed. First, we concluded that three separate, staged development environments were required to allow external vendor access for testing software and for transitioning software to be used in a clinic. In parallel, the extant oversight process for approving/managing access to internal/external personnel had to be altered to reflect the scope and scale of discrete research projects, as opposed to an enterpriselevel approach to IT management. Conclusions: Innovation in health services software development requires a flexible, scalable IT environment adapted to the unique objectives of a HSR software development model. In our experience, implementing the hardware solution is less challenging than the cultural change required to implement such a model and the modifications to administrative and oversight processes to sustain an environment for rapid product development and testing.

  8. A Computer Security Course in the Undergraduate Computer Science Curriculum.

    ERIC Educational Resources Information Center

    Spillman, Richard

    1992-01-01

    Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…

  9. Risk assessment of integrated electronic health records.

    PubMed

    Bjornsson, Bjarni Thor; Sigurdardottir, Gudlaug; Stefansson, Stefan Orri

    2010-01-01

    The paper describes the security concerns related to Electronic Health Records (EHR) both in registration of data and integration of systems. A description of the current state of EHR systems in Iceland is provided, along with the Ministry of Health's future vision and plans. New legislation provides the opportunity for increased integration of EHRs and further collaboration between institutions. Integration of systems, along with greater availability and access to EHR data, requires increased security awareness since additional risks are introduced. The paper describes the core principles of information security as it applies to EHR systems and data. The concepts of confidentiality, integrity, availability, accountability and traceability are introduced and described. The paper discusses the legal requirements and importance of performing risk assessment for EHR data. Risk assessment methodology according to the ISO/IEC 27001 information security standard is described with examples on how it is applied to EHR systems.

  10. Patterns of cooperation: fairness and coordination in networks of interacting agents

    NASA Astrophysics Data System (ADS)

    Do, Anne-Ly; Rudolf, Lars; Gross, Thilo

    2010-06-01

    We study the self-assembly of a complex network of collaborations among self-interested agents. The agents can maintain different levels of cooperation with different partners. Further, they continuously, selectively and independently adapt the amount of resources allocated to each of their collaborations in order to maximize the obtained payoff. We show analytically that the system approaches a state in which the agents make identical investments, and links produce identical benefits. Despite this high degree of social coordination, some agents manage to secure privileged topological positions in the network, enabling them to extract high payoffs. Our analytical investigations provide a rationale for the emergence of unidirectional non-reciprocal collaborations and different responses to the withdrawal of a partner from an interaction that have been reported in the psychological literature.

  11. New secure communication-layer standard for medical image management (ISCL)

    NASA Astrophysics Data System (ADS)

    Kita, Kouichi; Nohara, Takashi; Hosoba, Minoru; Yachida, Masuyoshi; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1999-07-01

    This paper introduces a summary of the standard draft of ISCL 1.00 which will be published by MEDIS-DC officially. ISCL is abbreviation of Integrated Secure Communication Layer Protocols for Secure Medical Image Management Systems. ISCL is a security layer which manages security function between presentation layer and TCP/IP layer. ISCL mechanism depends on basic function of a smart IC card and symmetric secret key mechanism. A symmetry key for each session is made by internal authentication function of a smart IC card with a random number. ISCL has three functions which assure authentication, confidently and integrity. Entity authentication process is done through 3 path 4 way method using functions of internal authentication and external authentication of a smart iC card. Confidentially algorithm and MAC algorithm for integrity are able to be selected. ISCL protocols are communicating through Message Block which consists of Message Header and Message Data. ISCL protocols are evaluating by applying to regional collaboration system for image diagnosis, and On-line Secure Electronic Storage system for medical images. These projects are supported by Medical Information System Development Center. These project shows ISCL is useful to keep security.

  12. A compressive sensing based secure watermark detection and privacy preserving storage framework.

    PubMed

    Qia Wang; Wenjun Zeng; Jun Tian

    2014-03-01

    Privacy is a critical issue when the data owners outsource data storage or processing to a third party computing service, such as the cloud. In this paper, we identify a cloud computing application scenario that requires simultaneously performing secure watermark detection and privacy preserving multimedia data storage. We then propose a compressive sensing (CS)-based framework using secure multiparty computation (MPC) protocols to address such a requirement. In our framework, the multimedia data and secret watermark pattern are presented to the cloud for secure watermark detection in a CS domain to protect the privacy. During CS transformation, the privacy of the CS matrix and the watermark pattern is protected by the MPC protocols under the semi-honest security model. We derive the expected watermark detection performance in the CS domain, given the target image, watermark pattern, and the size of the CS matrix (but without the CS matrix itself). The correctness of the derived performance has been validated by our experiments. Our theoretical analysis and experimental results show that secure watermark detection in the CS domain is feasible. Our framework can also be extended to other collaborative secure signal processing and data-mining applications in the cloud.

  13. Online Collaboration in Design Education: An Experiment in Real-Time Manipulation of Prototypes and Communication

    ERIC Educational Resources Information Center

    Dreamson, Neal

    2017-01-01

    The features of collaboration in design education include effective and efficient communication and reflection, and feasible manipulation of design objects. For collaborative design, information and communication technology offers educators the possibility to change design pedagogy. However, there is a paucity of literature on relative advantages…

  14. Using Dual Eye-Tracking Measures to Differentiate between Collaboration on Procedural and Conceptual Learning Activities

    ERIC Educational Resources Information Center

    Belenky, Daniel; Ringenberg, Michael; Olsen, Jennifer; Aleven, Vincent; Rummel, Nikol

    2013-01-01

    Dual eye-tracking measures enable novel ways to test predictions about collaborative learning. For example, the research project we are engaging in uses measures of gaze recurrence to help understand how collaboration may differ when students are completing various learning activities focused on different learning objectives. Specifically, we…

  15. California College and University Collaborations: Facilitators, Challenges, and Impact on Student Mental Health

    ERIC Educational Resources Information Center

    Woodbridge, Michelle W.; Yu, Jennifer; Goldweber, Asha; Golan, Shari; Stein, BradleyD.

    2015-01-01

    One key objective of California's Statewide Prevention and Early Intervention (PEI) Student Mental Health (SMH) initiative funded under Proposition 63 was to establish a formal process for ongoing collaboration between higher education systems and county mental health, and to increase collaboration among higher education campuses to improve…

  16. The Proposed Model of Collaborative Virtual Learning Environment for Introductory Programming Course

    ERIC Educational Resources Information Center

    Othman, Mahfudzah; Othman, Muhaini

    2012-01-01

    This paper discusses the proposed model of the collaborative virtual learning system for the introductory computer programming course which uses one of the collaborative learning techniques known as the "Think-Pair-Share". The main objective of this study is to design a model for an online learning system that facilitates the…

  17. Measuring Knowledge Elaboration Based on a Computer-Assisted Knowledge Map Analytical Approach to Collaborative Learning

    ERIC Educational Resources Information Center

    Zheng, Lanqin; Huang, Ronghuai; Hwang, Gwo-Jen; Yang, Kaicheng

    2015-01-01

    The purpose of this study is to quantitatively measure the level of knowledge elaboration and explore the relationships between prior knowledge of a group, group performance, and knowledge elaboration in collaborative learning. Two experiments were conducted to investigate the level of knowledge elaboration. The collaborative learning objective in…

  18. Supporting open collaboration in science through explicit and linked semantic description of processes

    USGS Publications Warehouse

    Gil, Yolanda; Michel, Felix; Ratnakar, Varun; Read, Jordan S.; Hauder, Matheus; Duffy, Christopher; Hanson, Paul C.; Dugan, Hilary

    2015-01-01

    The Web was originally developed to support collaboration in science. Although scientists benefit from many forms of collaboration on the Web (e.g., blogs, wikis, forums, code sharing, etc.), most collaborative projects are coordinated over email, phone calls, and in-person meetings. Our goal is to develop a collaborative infrastructure for scientists to work on complex science questions that require multi-disciplinary contributions to gather and analyze data, that cannot occur without significant coordination to synthesize findings, and that grow organically to accommodate new contributors as needed as the work evolves over time. Our approach is to develop an organic data science framework based on a task-centered organization of the collaboration, includes principles from social sciences for successful on-line communities, and exposes an open science process. Our approach is implemented as an extension of a semantic wiki platform, and captures formal representations of task decomposition structures, relations between tasks and users, and other properties of tasks, data, and other relevant science objects. All these entities are captured through the semantic wiki user interface, represented as semantic web objects, and exported as linked data.

  19. Examination of suspicious objects by virus analysts

    NASA Astrophysics Data System (ADS)

    Ananin, E. V.; Ananina, I. S.; Nikishova, A. V.

    2018-05-01

    The paper presents data on virus threats urgency. But in order for antiviruses to work properly, all data on new implementations of viruses should be added to its database. For that to be done, all suspicious objects should be investigated. It is a dangerous process and should be done in the virtual system. However, it is not secure for the main system as well. So the diagram of a secure workplace for a virus analyst is proposed. It contains software for its protection. Also all kinds of setting to ensure security of the process of investigating suspicious objects are proposed. The proposed approach allows minimizing risks caused by the virus.

  20. 49 CFR 172.704 - Training requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... PROVISIONS, HAZARDOUS MATERIALS COMMUNICATIONS, EMERGENCY RESPONSE INFORMATION, TRAINING REQUIREMENTS, AND... communication standards of this subchapter. (2) Function-specific training. (i) Each hazmat employee must be... must include company security objectives, organizational security structure, specific security...

  1. 14 CFR § 1203.201 - Information security objectives.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Information security objectives. § 1203.201 Section § 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION... technologies. (e) Provide a timely and effective means for downgrading or declassifying information when the...

  2. 12 CFR Appendix B to Part 364 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Part 364—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of Customer Information Security Program A. Involve the Board of Directors B. Assess Risk C. Manage and...

  3. Secure Objectives for School Security

    ERIC Educational Resources Information Center

    Dalton-Noblitt, April

    2012-01-01

    In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…

  4. Enhanced Collaboration for Space Situational Awareness via Proxy Agents

    NASA Astrophysics Data System (ADS)

    Picciano, P.; Schurr, N.

    2012-09-01

    The call for dynamic partnerships demanded in the US. Space Policy confronts two formidable challenges. The first is evident in the lack of the adoption of technical innovations that could substantially enhance collaboration. The second category, and perhaps a greater impediment, involves organizational and social constraints that minimize information sharing. Compounding the technical challenges, the organizational barriers to collaboration present a different problem set. There is a culture in the space domain that predisposes most stakeholders to guard their information. Most owner/operators are reluctant to share asset data, whether experiencing an anomaly or just providing status updates. This is unfortunate, because the owner/operators generally have the most accurate and timely data pertaining to their satellite. Comprehensive Space Situational Awareness (SSA) requires the marshaling of disparate mission critical elements. The mission threads reliant on SSA are complex and often require analysis from a diverse team of experts with sophisticated systems and tools that may be dispersed across multiple entities including military, commercial, and public interests. Two significant trends are likely to further perpetuate this state of affairs: 1) the space environment continues to be more congested, contested, and competitive, and 2) further pressures to increase SSA Sharing with a greater number of stakeholders throughout the world. The challenge of delivering the right information to the right people, while protecting national security and privacy interests, is in need of an innovative solution. Our approach, entitled Space Collaboration via an Agent Network (SCAN), enables proxy software agents to represent stakeholders (as individuals and organizations) to enhance collaboration among various agency producers and consumers of space information The SCAN agent network will facilitate collaboration by identifying opportunities to collaborate, as well as optimize the processes given the mission context. The agent-based approach is uniquely capable of addressing the collaboration challenges from both the technical and organizational perspectives. To achieve these objectives, we are employing a modeling approach based on a Markov decision process (MDP). MDPs are very general models for optimizing decisions under uncertainty. The model was chosen because it is able to represent the uncertainty in outcomes (such as loss of satellite communication or inability for a colleague to finish a task on time) as well as the associated values of decisions made and their resulting outcomes. The key aspect of MDPs is that it is a sequential model, not only does it represent uncertainty for single decisions and outcomes, but estimates the state of the world in the future and optimizes decisions based on these future expectations. The SCAN prototype will be used to assess modeling parameters and assumptions as well as collect user feedback.

  5. Data and Models as Social Objects in the HydroShare System for Collaboration in the Hydrology Community and Beyond

    NASA Astrophysics Data System (ADS)

    Tarboton, D. G.; Idaszak, R.; Horsburgh, J. S.; Ames, D. P.; Goodall, J. L.; Band, L. E.; Merwade, V.; Couch, A.; Hooper, R. P.; Maidment, D. R.; Dash, P. K.; Stealey, M.; Yi, H.; Gan, T.; Castronova, A. M.; Miles, B.; Li, Z.; Morsy, M. M.; Crawley, S.; Ramirez, M.; Sadler, J.; Xue, Z.; Bandaragoda, C.

    2016-12-01

    How do you share and publish hydrologic data and models for a large collaborative project? HydroShare is a new, web-based system for sharing hydrologic data and models with specific functionality aimed at making collaboration easier. HydroShare has been developed with U.S. National Science Foundation support under the auspices of the Consortium of Universities for the Advancement of Hydrologic Science, Inc. (CUAHSI) to support the collaboration and community cyberinfrastructure needs of the hydrology research community. Within HydroShare, we have developed new functionality for creating datasets, describing them with metadata, and sharing them with collaborators. We cast hydrologic datasets and models as "social objects" that can be shared, collaborated around, annotated, published and discovered. In addition to data and model sharing, HydroShare supports web application programs (apps) that can act on data stored in HydroShare, just as software programs on your PC act on your data locally. This can free you from some of the limitations of local computing capacity and challenges in installing and maintaining software on your own PC. HydroShare's web-based cyberinfrastructure can take work off your desk or laptop computer and onto infrastructure or "cloud" based data and processing servers. This presentation will describe HydroShare's collaboration functionality that enables both public and private sharing with individual users and collaborative user groups, and makes it easier for collaborators to iterate on shared datasets and models, creating multiple versions along the way, and publishing them with a permanent landing page, metadata description, and citable Digital Object Identifier (DOI) when the work is complete. This presentation will also describe the web app architecture that supports interoperability with third party servers functioning as application engines for analysis and processing of big hydrologic datasets. While developed to support the cyberinfrastructure needs of the hydrology community, the informatics infrastructure for programmatic interoperability of web resources has a generality beyond the solution of hydrology problems that will be discussed.

  6. DESTRUCTION OF FRANCISELLA TULARENSIS AND YERSINIA PESTIS PERSISTENCE OF BACILLUS ANTHRACIS SPORES AND CLOSTRIDIUM BOTULINUM IN MUNICIPAL SOLID LANDFILL LEACHATES

    EPA Science Inventory

    The United States Environmental Protection Agency Office of Research and Development National Homeland Security Research Center (NHSRC) in collaboration with the Department of Defense Edgewood Chemical Biological Center (ECBC) are evaluating the permanence of biological and chemi...

  7. Regional transportation operations collaboration and coordination : a primer for working together to improve transportation safety, reliability, and security

    DOT National Transportation Integrated Search

    2002-01-01

    This primer was written for transportation professionals and public safety officials from cities, counties, and States who are responsible for day-to-day management and operations within a metropolitan region. It is intended to help agencies and orga...

  8. Sharing Ideas: Tough Times Encourage Colleges to Collaborate

    ERIC Educational Resources Information Center

    Fain, Paul; Blumenstyk, Goldie; Sander, Libby

    2009-01-01

    Tough times are encouraging colleges to share resources in a variety of areas, including campus security, research, and degree programs. Despite its veneer of cooperation, higher education is a competitive industry, where resource sharing is eyed warily. But the recession is chipping away at that reluctance, and institutions are pursuing…

  9. Collaboration and the Collective-Bargaining Process in Public Education

    ERIC Educational Resources Information Center

    Noggle, Matthew

    2010-01-01

    In the vast majority of school districts, the collective-bargaining process has evolved little during the past few decades. Teachers unions have successfully represented teachers' economic and job security interests by linking them to collective bargaining and procedural due process rights, but district administrators continue to make the…

  10. Industry/University Research Cooperation: Convenience or Necessity--The Industrial View.

    ERIC Educational Resources Information Center

    Tolbert, T. L.

    1985-01-01

    Success in university-industry cooperative ventures depends on (1) a mutual understanding of the parties' needs and expectations from the outset, (2) understanding of individual responsibilities in collaborative efforts, (3) policy to accommodate both security and publication of results, (4) mechanisms to avoid divisiveness, and (5) scientific…

  11. Laboratory for Computer Science Progress Report 18, July 1980-June 1981,

    DTIC Science & Technology

    1983-04-01

    group in collaboration with Rolf Landauer of IBM Research. Some of the most conspicuous participants: Dyson, Feynman, Wheeler Landauer, Keyes, Bennett...Sheldon A. Data Model Equivalence, December 1978, AD A062-753 TM-119 Shamir, Adi and Richard E. Zippel On the Security of the Merkle -Hellman

  12. Atlas of NATO.

    ERIC Educational Resources Information Center

    Young, Harry F.

    This atlas provides basic information about the North Atlantic Treaty Organization (NATO). Formed in response to growing concern for the security of Western Europe after World War II, NATO is a vehicle for Western efforts to reduce East-West tensions and the level of armaments. NATO promotes political and economic collaboration as well as military…

  13. Role-Based Viewing for Secure Collaborative Modeling

    DTIC Science & Technology

    2003-02-01

    Buchanan, editors, Proceedings of Graphics Interface 2001, pages 9–18, 2001. [18] Sylvia L. Osborn, Ravi S. Sandhu, and Qamar Munawer. Configuring Role...techniques, pages 49–56. ACM Press/Addison-Wesley Publishing Co., 1999. [20] Ravi Sandhu, Bhamidipati, and Qamar Munawer. The ARBAC97 Model for Role

  14. The Technology Security Program. A Report to the 99th Congress, Second Session

    DTIC Science & Technology

    1986-01-01

    and implement effective and practical controls on advanced technologies. DoD has proposed and has collaborated with the Dept. of Commerce to establish...technology. The United States, the other NATO nations and Japan continue to revise the COCOM (coordinating Committee on Export Controls ) control list and

  15. Maritime Domain Awareness: The Key to Maritime Security Operational Challenges and Technical Solutions

    DTIC Science & Technology

    2006-06-01

    series with the Philippines, Indonesia, Singapore, Malaysia , Brunei, and the United States. Another example of regional collaboration is the South East...computers to choose from producers such as Sony , Fujitsu, Compaq, Toshiba, Macintosh or a custom-built PC. The selection depends on factors such as

  16. Wiki Mass Authoring for Experiential Learning: A Case Study

    ERIC Educational Resources Information Center

    Pardue, Harold; Landry, Jeffrey; Sweeney, Bob

    2013-01-01

    Web 2.0 services include sharing and collaborative technologies such as blogs, social networking sites, online office productivity tools, and wikis. Wikis are increasingly used for the design and implementation of pedagogy, for example to facilitate experiential learning. A U.S. government-funded project for system security risk assessment was…

  17. 75 FR 77934 - Small Business Information Security Task Force

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-14

    ... on them. The Task Force has until the end of 2013 to complete the report but it is hoped that the... computing technology industry itself. Mr. Aaron Berstein then volunteered to contact Microsoft to inquire into the possibility of Microsoft providing an online collaborative space software tool for use...

  18. Discovering and Mitigating Software Vulnerabilities through Large-Scale Collaboration

    ERIC Educational Resources Information Center

    Zhao, Mingyi

    2016-01-01

    In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because software code that supports this digital world has security vulnerabilities. These…

  19. Redesign and Evaluation of a Patient Assessment Course

    PubMed Central

    Sobieraj, Diana M.; McCaffrey, Desmond; Lee, Jennifer J.

    2009-01-01

    Objectives To redesign a patient assessment course using a structured instructional design process and evaluate student learning. Design Course coordinators collaborated with an instructional design and development expert to incorporate new pedagogical approaches (eg, Web-based self-tests), create new learning activities (eg, peer collaboration on worksheets, SOAP note writing), and develop grading rubrics. Assessment Formative and summative surveys were administered for student self-assessment and course evaluation. Seventy-six students (78%) completed the summative survey. The mean course grade was 91.8% ± 3.6%, with more than 75% of students reporting achievement of primary course learning objectives. All of the additional learning activities helped students meet the learning objectives with the exception of the written drug information response. Conclusion The use of a structured instructional design process to redesign a patient assessment course was successful in creating a curriculum that succeeded in teaching students the specified learning objectives. Other colleges and schools are encouraged to collaborate with an instructional design and development expert to improve the pharmacy curriculum. PMID:19960090

  20. Participatory research, people with intellectual disabilities and ethical approval: making reasonable adjustments to enable participation.

    PubMed

    Northway, Ruth; Howarth, Joyce; Evans, Lynne

    2015-02-01

    The aim of this paper is to explore how making reasonable adjustments to the process of securing ethical approval for research can facilitate the meaningful involvement of people with intellectual disabilities as members of a research team. This is achieved through critical reflection upon the approach taken within one participatory research study whose objective was to explore how people with intellectual disabilities understand abuse. Internationally participatory research studies (in which active involvement of community members in all stages of the research process is sought) are becoming increasingly common in the context of health care and, more specifically, within research involving people with intellectual disabilities. However, whilst it is acknowledged that participatory research gives rise to specific ethical challenges, how (or if) involvement in securing ethical approval is facilitated, is not discussed in most research reports. The significance of this paper is that it seeks to address this gap by exploring how meaningful participation can be promoted by making reasonable adjustments. Within the study, the research team worked in collaboration with the ethics committee to identify potential barriers that could prevent the participation of members of the research team who had intellectual disabilities. Reasonable adjustments (such as redesigning forms) were made to the processes involved in securing ethical approval. This study demonstrated that it is possible to ensure that ethical standards are upheld and the requirements of ethics committees met whilst also facilitating the meaningful involvement of people with intellectual disabilities. The reasonable adjustments approach explored within this paper can be translated into the context of clinical practice: making changes to the way that services are delivered can promote greater involvement of people with intellectual disabilities in their own health care. © 2014 John Wiley & Sons Ltd.

  1. Consolidation and development roadmap of the EMI middleware

    NASA Astrophysics Data System (ADS)

    Kónya, B.; Aiftimiei, C.; Cecchi, M.; Field, L.; Fuhrmann, P.; Nilsen, J. K.; White, J.

    2012-12-01

    Scientific research communities have benefited recently from the increasing availability of computing and data infrastructures with unprecedented capabilities for large scale distributed initiatives. These infrastructures are largely defined and enabled by the middleware they deploy. One of the major issues in the current usage of research infrastructures is the need to use similar but often incompatible middleware solutions. The European Middleware Initiative (EMI) is a collaboration of the major European middleware providers ARC, dCache, gLite and UNICORE. EMI aims to: deliver a consolidated set of middleware components for deployment in EGI, PRACE and other Distributed Computing Infrastructures; extend the interoperability between grids and other computing infrastructures; strengthen the reliability of the services; establish a sustainable model to maintain and evolve the middleware; fulfil the requirements of the user communities. This paper presents the consolidation and development objectives of the EMI software stack covering the last two years. The EMI development roadmap is introduced along the four technical areas of compute, data, security and infrastructure. The compute area plan focuses on consolidation of standards and agreements through a unified interface for job submission and management, a common format for accounting, the wide adoption of GLUE schema version 2.0 and the provision of a common framework for the execution of parallel jobs. The security area is working towards a unified security model and lowering the barriers to Grid usage by allowing users to gain access with their own credentials. The data area is focusing on implementing standards to ensure interoperability with other grids and industry components and to reuse already existing clients in operating systems and open source distributions. One of the highlights of the infrastructure area is the consolidation of the information system services via the creation of a common information backbone.

  2. Virtualized Multi-Mission Operations Center (vMMOC) and its Cloud Services

    NASA Technical Reports Server (NTRS)

    Ido, Haisam Kassim

    2017-01-01

    His presentation will cover, the current and future, technical and organizational opportunities and challenges with virtualizing a multi-mission operations center. The full deployment of Goddard Space Flight Centers (GSFC) Virtualized Multi-Mission Operations Center (vMMOC) is nearly complete. The Space Science Mission Operations (SSMO) organizations spacecraft ACE, Fermi, LRO, MMS(4), OSIRIS-REx, SDO, SOHO, Swift, and Wind are in the process of being fully migrated to the vMMOC. The benefits of the vMMOC will be the normalization and the standardization of IT services, mission operations, maintenance, and development as well as ancillary services and policies such as collaboration tools, change management systems, and IT Security. The vMMOC will also provide operational efficiencies regarding hardware, IT domain expertise, training, maintenance and support.The presentation will also cover SSMO's secure Situational Awareness Dashboard in an integrated, fleet centric, cloud based web services fashion. Additionally the SSMO Telemetry as a Service (TaaS) will be covered, which allows authorized users and processes to access telemetry for the entire SSMO fleet, and for the entirety of each spacecrafts history. Both services leverage cloud services in a secure FISMA High and FedRamp environment, and also leverage distributed object stores in order to house and provide the telemetry. The services are also in the process of leveraging the cloud computing services elasticity and horizontal scalability. In the design phase is the Navigation as a Service (NaaS) which will provide a standardized, efficient, and normalized service for the fleet's space flight dynamics operations. Additional future services that may be considered are Ground Segment as a Service (GSaaS), Telemetry and Command as a Service (TCaaS), Flight Software Simulation as a Service, etc.

  3. NASA-OAI Collaborative Aerospace Research and Fellowship Program

    NASA Technical Reports Server (NTRS)

    Heyward, Ann O.; Kankam, Mark D.

    2003-01-01

    During the summer of 2003, a IO-week activity for university faculty entitled the NASA-OAI Collaborative Aerospace Research and Fellowship Program (CFP) was conducted at the NASA Glenn Research Center in collaboration with the Ohio Aerospace Institute (OAI). The objectives of CFP are: (1) to further the professional knowledge of qualified engineering and science faculty, (2) to stimulate an exchange of ideas between teaching participants and employees of NASA, (3) to enrich and refresh the research and teaching activities of participants' institutions, and (4) to contribute to the research objectives of Glenn. This report is intended primarily to summarize the research activities comprising the 2003 CFP Program at Glenn.

  4. 12 CFR Appendix B to Part 170 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Security Standards B Appendix B to Part 170 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF... Part 170—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of...

  5. 12 CFR Appendix B to Part 170 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Security Standards B Appendix B to Part 170 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF... Part 170—Interagency Guidelines Establishing Information Security Standards Table of Contents I... Customer Information A. Information Security Program B. Objectives III. Development and Implementation of...

  6. The D3 Middleware Architecture

    NASA Technical Reports Server (NTRS)

    Walton, Joan; Filman, Robert E.; Korsmeyer, David J.; Lee, Diana D.; Mak, Ron; Patel, Tarang

    2002-01-01

    DARWIN is a NASA developed, Internet-based system for enabling aerospace researchers to securely and remotely access and collaborate on the analysis of aerospace vehicle design data, primarily the results of wind-tunnel testing and numeric (e.g., computational fluid-dynamics) model executions. DARWIN captures, stores and indexes data; manages derived knowledge (such as visualizations across multiple datasets); and provides an environment for designers to collaborate in the analysis of test results. DARWIN is an interesting application because it supports high-volumes of data. integrates multiple modalities of data display (e.g., images and data visualizations), and provides non-trivial access control mechanisms. DARWIN enables collaboration by allowing not only sharing visualizations of data, but also commentary about and views of data. Here we provide an overview of the architecture of D3, the third generation of DARWIN. Earlier versions of DARWIN were characterized by browser-based interfaces and a hodge-podge of server technologies: CGI scripts, applets, PERL, and so forth. But browsers proved difficult to control, and a proliferation of computational mechanisms proved inefficient and difficult to maintain. D3 substitutes a pure-Java approach for that medley: A Java client communicates (though RMI over HTTPS) with a Java-based application server. Code on the server accesses information from JDBC databases, distributed LDAP security services, and a collaborative information system. D3 is a three tier-architecture, but unlike 'E-commerce' applications, the data usage pattern suggests different strategies than traditional Enterprise Java Beans - we need to move volumes of related data together, considerable processing happens on the client, and the 'business logic' on the server-side is primarily data integration and collaboration. With D3, we are extending DARWIN to handle other data domains and to be a distributed system, where a single login allows a user transparent access to test results from multiple servers and authority domains.

  7. Development and implementation of a GEOGLAM Crop Monitor web interface

    NASA Astrophysics Data System (ADS)

    Oliva, P.; Sanchez, A.; Humber, M. L.; Becker-Reshef, I.; Justice, C. J.; McGaughey, K.; Barker, B.

    2016-12-01

    Beginning in September 2013, the GEOGLAM Crop Monitor activity has provided earth observation (EO) data to a network of partners and collected crop assessments on a subnational basis through a web interface known as the Crop Assessment Tool. Based on the collection of monthly crop assessments, a monthly crop condition bulletin is published in the Agricultural Market Information System (AMIS) Market Monitor report. This workflow has been successfully applied to food security applications through the Early Warning Crop Monitor activity. However, a lack of timely and accurate information on crop conditions and prospects at the national scale is a critical issue in the majority of southern and eastern African countries and some South American countries. Such information is necessary for informed and prompt decision making in the face of emergencies, food insecurity and planning requirements for agricultural markets. This project addresses these needs through the development of relevant, user-friendly remote sensing monitor systems, collaborative internet technology, and collaboration with national and regional agricultural monitoring networks. By building on current projects and relationships established through the various GEOGLAM Crop Monitor activities, this project aims to ultimately provide EO-informed crop condition maps and charts designed for economics and policy oriented audiences, thereby providing quick and easy to understand products on crop conditions as the season progresses. Integrating these data and assessments vertically throughout the system provides a basis for regional sharing and collaboration in food security applications.

  8. Collaborative Data Mining

    NASA Astrophysics Data System (ADS)

    Moyle, Steve

    Collaborative Data Mining is a setting where the Data Mining effort is distributed to multiple collaborating agents - human or software. The objective of the collaborative Data Mining effort is to produce solutions to the tackled Data Mining problem which are considered better by some metric, with respect to those solutions that would have been achieved by individual, non-collaborating agents. The solutions require evaluation, comparison, and approaches for combination. Collaboration requires communication, and implies some form of community. The human form of collaboration is a social task. Organizing communities in an effective manner is non-trivial and often requires well defined roles and processes. Data Mining, too, benefits from a standard process. This chapter explores the standard Data Mining process CRISP-DM utilized in a collaborative setting.

  9. Paddy farmer households’ participation and food security level in special effort program in Seputih Raman sub-district of Central Lampung Regency

    NASA Astrophysics Data System (ADS)

    Rangga, K. K.; Syarief, Y. A.

    2018-03-01

    The objectives of this study are to study the participation of paddy farmers in the Special Effort program to increase paddy production, to study the level of household food security of paddy farmers, and to analyze the correlation between farmer participation and food security level of paddy farmers. The location was chosen purposively in Seputih Raman sub-district. The data were collected from December 2016 to February 2017. The population of this study was paddy farmers who participating in Special Effort program. The hypothesis was tested by using Spearman’s Rank correlation test. Farmer household’s food security was measured objectively based on the share of household’s food expenditure and subjectively based on the opinion, views, and attitudes or farmers’ opinions on food availability, food distribution, and household food consumption. This research showed that farmers’ participation in Special Effort program in Seputih Raman Sub Ditrict, Central Lampung Regency belonged to medium classification, household food security either objectively or subjectively was in food resistant condition of medium classification, and there was significant correlation between farmers’ participation and food security level of paddy farmer household.

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Twogood, Richard E

    This is the Final Report for the DOE Phase II SBIR project “Ultra-secure RF Tags for Safeguards and Security.” The topics covered herein include technical progress made, progress against the planned milestones and deliverables, project outcomes (results, collaborations, intellectual property, etc.), and a discussion on future expectations of deployment and impacts of the results of this work. In brief, all planned work for the project was successfully completed, on or ahead of schedule and on budget. The major accomplishment was the successful development of a very advanced passive ultra-secure RFID tag system with combined security features unmatched by any commerciallymore » available ones. These tags have high-level dynamic encrypted authentication, a novel tamper-proofing mechanism, system software including graphical user interfaces and networking, and integration with a fiber-optic seal mechanism. This is all accomplished passively (with no battery) by incorporating sophisticated hardware in the tag which harvests the energy from the RFID readers that are interrogating the tag. Based on initial feedback (and deployments) at DOE’s Lawrence Livermore National Laboratory (LLNL), it is anticipated these tags and their offspring will meet DOE and international community needs for highly secure RFID systems. Beyond the accomplishment of those original objectives for the ultra-secure RF tags, major new spin-off thrusts from the original work were identified and successfully pursued with the cognizance of the DOE sponsor office. In particular, new classes of less sophisticated RFID tags were developed whose lineage derives from the core R&D thrusts of this SBIR. These RF “tag variants” have some, but not necessarily all, of the advanced characteristics described above and can therefore be less expensive and meet far wider markets. With customer pull from the DOE and its national laboratories, new RFID tags and systems (including custom readers and software) for government needs in asset management and tracking were developed. These were tested at a national laboratory and other government facilities, and resulted in immediate procurement actions by the government and deployment of these new systems. Thus, commercialization of the results of this Phase II DOE SBIR was already underway before the end of the SBIR itself. More importantly, operations involving asset management at selected DoE and government sites are already being impacted favorably and could have much broader impacts in the near future.« less

  11. Security Assistance Dependence - Wielding American Power

    DTIC Science & Technology

    2002-12-09

    national security objectives. One vehicle of this power brokering is the well-developed international security assistance program – oftentimes...incorrectly referred to exclusively as foreign military sales. There is nothing simple about the security assistance program as it has developed today...For the USG, there are many agencies influencing today’s security assistance program to execute complex, integrated tasks directly impacting U.S

  12. Collaborative Learning Processes in an Asynchronous Environment: An Analysis through Discourse and Social Networks

    ERIC Educational Resources Information Center

    Tirado, Ramon; Aguaded, Ignacio; Hernando, Angel

    2011-01-01

    This article analyses an experience in collaborative learning in an asynchronous writing environment through discussion forums on a WebCt platform of the University of Huelva's virtual campus, and was part of an innovative teaching project in 2007-08. The main objectives are to describe the processes of collaborative knowledge construction and the…

  13. Re-creating Graduate Teacher Education Classrooms: Multiple Technology Formats and Collaborating Instructors

    ERIC Educational Resources Information Center

    Stallings, L. Lynn; Koellner-Clark, Karen

    2003-01-01

    This paper describes a teaching experiment investigating the impact of using multiple teaching strategies and innovating while teaching collaboratively. The objective of this study was to examine the use of collaboration in trying a combination of face-to-face meetings, web courseware, and interactive two-way video in a graduate course. The major…

  14. Improving Virtual Team Collaboration Outcomes through Collaboration Process Structuring

    ERIC Educational Resources Information Center

    Dittman, Dawn R.; Hawkes, Mark; Deokar, Amit V.; Sarnikar, Surendra

    2010-01-01

    The ability to collaborate in a virtual team is a necessary skill set for today's knowledge workers and students to be effective in their work. Past research indicates that knowledge workers and students need to establish a formal process to perform work, develop clear goals and objectives, and facilitate better communication among team members.…

  15. Pros & Cons of Using Blackboard Collaborate for Blended Learning on Students' Learning Outcomes

    ERIC Educational Resources Information Center

    Hamad, Mona M.

    2017-01-01

    Blackboard Collaborate was introduced to King Khalid University recently in the last decade; instructors and students were trained to use it in an effective way. The objective of this study is to find pros and cons of using Blackboard Collaborate for Blended Learning and its effect on students' learning outcomes. The researcher used the…

  16. Collaborative Encoding and Memory Accuracy: Examining the Effects of Interactive Components of Co-Construction Processes

    ERIC Educational Resources Information Center

    Foley, Mary Ann; Fried, Adina Rachel; Cowan, Emily; Bays, Rebecca Brooke

    2014-01-01

    In 2 experiments, the effect of collaborative encoding on memory was examined by testing 2 interactive components of co-construction processes. One component focused on the nature of the interactive exchange between collaborators: As the partners worked together to create descriptions about ways to interact with familiar objects, constraints were…

  17. Collaborative Information Technologies

    NASA Astrophysics Data System (ADS)

    Meyer, William; Casper, Thomas

    1999-11-01

    Significant effort has been expended to provide infrastructure and to facilitate the remote collaborations within the fusion community and out. Through the Office of Fusion Energy Science Information Technology Initiative, communication technologies utilized by the fusion community are being improved. The initial thrust of the initiative has been collaborative seminars and meetings. Under the initiative 23 sites, both laboratory and university, were provided with hardware required to remotely view, or project, documents being presented. The hardware is capable of delivering documents to a web browser, or to compatible hardware, over ESNET in an access controlled manner. The ability also exists for documents to originate from virtually any of the collaborating sites. In addition, RealNetwork servers are being tested to provide audio and/or video, in a non-interactive environment with MBONE providing two-way interaction where needed. Additional effort is directed at remote distributed computing, file systems, security, and standard data storage and retrieval methods. This work supported by DoE contract No. W-7405-ENG-48

  18. Collaborative Defense of Transmission and Distribution Protection and Control Devices Against Cyber Attacks (CODEF) DE-OE0000674. ABB Inc. Final Scientific/Technical Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Nuqui, Reynaldo

    This report summarizes the activities conducted under the DOE-OE funded project DEOE0000674, where ABB Inc. (ABB), in collaboration with University of Illinois at Urbana-Champaign (UIUC), Bonneville Power Administration (BPA), and Ameren-Illinois (Ameren-IL) pursued the development of a system of collaborative defense of electrical substation’s intelligent electronic devices against cyber-attacks (CODEF). An electrical substation with CODEF features will be more capable of mitigating cyber-attacks especially those that seek to control switching devices. It leverages the security extensions of IEC 61850 to empower existing devices to collaborate in identifying and blocking malicious intents to trip circuit breakers, mis-coordinate devices settings, even thoughmore » the commands and the measurements comply with correct syntax. The CODEF functions utilize the physics of electromagnetic systems, electric power engineering principles, and computer science to bring more in depth cyber defense closer to the protected substation devices.« less

  19. The Department of Defense and Homeland Security relationship: Hurricane Katrina through Hurricane Irene.

    PubMed

    Weaver, John Michael

    2015-01-01

    This research explored federal intervention with the particular emphasis on examining how a collaborative relationship between Department of Defense (DOD) and Homeland Security (DHS) led to greater effectiveness between these two federal departments and their subordinates (United States Northern Command and Federal Emergency Management Agency, respectively) during the preparation and response phases of the disaster cycle regarding US continental-based hurricanes. Through the application of a two-phased, sequential mixed methods approach, this study determined how their relationship has led to longitudinal improvements in the years following Hurricane Katrina, focusing on hurricanes as the primary unit of analysis.

  20. Reaching out to take on TB in Somalia.

    PubMed

    Moore, David A J; Granat, Simo M

    2014-01-01

    Among the many challenges facing populations disrupted by complex emergencies, personal security and food security rank much higher than access to healthcare. However, over time health needs assume increasing importance. Many complex crises occur in settings where the background incidence of TB is already high; social and economic conditions in crises are then highly conducive to amplification of the existing TB problem. Innovative approaches to delivery of diagnostic and treatment services, transition planning and integration with other healthcare providers and services are vital. In the extremely challenging environment of Somalia, multiple partners are making headway though collaboration and innovation.

  1. Physical security and cyber security issues and human error prevention for 3D printed objects: detecting the use of an incorrect printing material

    NASA Astrophysics Data System (ADS)

    Straub, Jeremy

    2017-06-01

    A wide variety of characteristics of 3D printed objects have been linked to impaired structural integrity and use-efficacy. The printing material can also have a significant impact on the quality, utility and safety characteristics of a 3D printed object. Material issues can be created by vendor issues, physical security issues and human error. This paper presents and evaluates a system that can be used to detect incorrect material use in a 3D printer, using visible light imaging. Specifically, it assesses the ability to ascertain the difference between materials of different color and different types of material with similar coloration.

  2. Efficacy and Safety of Tension-Free Vaginal Tape-Secur Mini-Sling Versus Standard Midurethral Slings for Female Stress Urinary Incontinence: A Systematic Review and Meta-Analysis

    PubMed Central

    Wang, Tao; Zhang, Yong

    2015-01-01

    Purpose: To assess the efficacy and safety of tension-free vaginal tape (TVT)-Secur for stress urinary incontinence (SUI). Methods: A literature review was performed to identify all published trials of TVT-Secur. The search included the following databases: MEDLINE, Embase, and the Cochrane Controlled Trial Register. Results: Seventeen publications involving a total of 1,879 patients were used to compare TVT-Secur with tension-free obturator tape (TVT-O) and TVT. We found that TVT-Secur had significant reductions in operative time, visual analog score for pain, and postoperative complications compared with TVT-O. Even though TVT-Secur had a significantly lower subjective cure rate (P<0.00001), lower objective cure rate (P<0.00001), and higher intraoperative complication rate, compared with TVT-O at 1 to 3 years, there was no significant difference between TVT-Secur and TVT-O in the subjective cure rate (odds ratio [OR], 0.49; 95% confidence interval [CI], 0.22–1.08; P=0.08), objective cure rate (OR, 0.49; 95% CI, 0.22–1.09; P=0.08), or complications at 3 to 5 years. Moreover, TVT-Secur had significantly lower subjective and objective cure rates compared with TVT. Conclusions: This meta-analysis indicates that TVT-Secur did not show an inferior efficacy and safety compared with TVT-O for SUI in 3 to 5 years, even though displaying a clear tread toward a lower efficacy in 1 to 3 years. Considering that the safety is similar, there are no advantages in using TVT-Secur. PMID:26739179

  3. Evaluation of Participant Needs in a Regional Center for Security Studies

    ERIC Educational Resources Information Center

    Schmoker, Oliver E., III.

    2009-01-01

    This research study was implemented within the subject headquarters of a regional center, an organization responsible for security cooperation in Europe and Eurasia. The focus of the study was the center's program of security education. This program was designed to support evolving security objectives of foreign countries in order to increase the…

  4. Education Secured? The School Performance of Adolescents in Secure Residential Youth Care

    ERIC Educational Resources Information Center

    Harder, Annemiek T.; Huyghen, Anne-Marie N.; Knot-Dickscheit, Jana; Kalverboer, Margrite E.; Köngeter, Stefan; Zeller, Maren; Knorth, Erik J.

    2014-01-01

    Background: Despite poor school performance by adolescents in secure residential care and the potential importance of education during care, little is known about how to achieve academic success with these adolescents. Objective: Therefore, the aim of the present study is to assess adolescents' academic achievement during secure residential…

  5. Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things

    PubMed Central

    Cha, Shi-Cho; Chen, Jyun-Fu

    2017-01-01

    Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim’s devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts. PMID:29036900

  6. Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things.

    PubMed

    Cha, Shi-Cho; Yeh, Kuo-Hui; Chen, Jyun-Fu

    2017-10-14

    Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim's devices with stationary Bluetooth MAC addresses and accordingly the device privacy can be preserved. However, there exists a tradeoff between privacy and security in the random address technique. That is, when device pairing is launched and one device cannot actually identify another one with addresses, it provides an opportunity for malicious users to break the system security via impersonation attacks. Hence, using random addresses may lead to higher security risks. In this study, we point out the potential risk of using random address technique and then present critical security requirements for BLE-based IoT applications. To fulfill the claimed requirements, we present a privacy-aware mechanism, which is based on elliptic curve cryptography, for secure communication and access-control among BLE-based IoT objects. Moreover, to ensure the security of smartphone application associated with BLE-based IoT objects, we construct a Smart Contract-based Investigation Report Management framework (SCIRM) which enables smartphone application users to obtain security inspection reports of BLE-based applications of interest with smart contracts.

  7. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

    PubMed Central

    2018-01-01

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes. PMID:29518023

  8. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

    PubMed

    Ali, Bako; Awad, Ali Ismail

    2018-03-08

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  9. ["Group" and organization: a dimension of collaboration of anthropology and epidemiology].

    PubMed

    Song, Lei-ming; Wang, Ning

    2012-04-01

    "Group" is a key concept in epidemiological research and "organization" is a core concept in anthropology. Group takes focus on the specific characteristics of the subjects, while organization takes focus on the relationship between the objects. For the characteristics and relationship of the objects that interacting with each other, the two concepts could be complementary in specific studies, and this will be the basic dimension of Interdisciplinary collaboration of anthropology and epidemiology.

  10. Using the base-of-the-pyramid perspective to catalyze interdependence-based collaborations

    PubMed Central

    London, Ted; Anupindi, Ravi

    2012-01-01

    Improving food security and nutrition in the developing world remains among society's most intractable challenges and continues despite a wide variety of investments. Both donor- and enterprise-led initiatives, for example, have explored including smallholder farmers in their value chains. However, these efforts have had only modest success, partly because the private and development sectors prefer to maintain their independence. Research from the base-of-the-pyramid domain offers new insights into how collaborative interdependence between sectors can enhance the connection between profits and the alleviation of poverty. In this article, we identify the strengths and weaknesses of donor-led and enterprise-led value chain initiatives. We then explore how insights from the base-of-the-pyramid domain yield a set of interdependence-based collaboration strategies that can achieve more sustainable and scalable outcomes. PMID:21482752

  11. Using the base-of-the-pyramid perspective to catalyze interdependence-based collaborations.

    PubMed

    London, Ted; Anupindi, Ravi

    2012-07-31

    Improving food security and nutrition in the developing world remains among society's most intractable challenges and continues despite a wide variety of investments. Both donor- and enterprise-led initiatives, for example, have explored including smallholder farmers in their value chains. However, these efforts have had only modest success, partly because the private and development sectors prefer to maintain their independence. Research from the base-of-the-pyramid domain offers new insights into how collaborative interdependence between sectors can enhance the connection between profits and the alleviation of poverty. In this article, we identify the strengths and weaknesses of donor-led and enterprise-led value chain initiatives. We then explore how insights from the base-of-the-pyramid domain yield a set of interdependence-based collaboration strategies that can achieve more sustainable and scalable outcomes.

  12. A malicious pattern detection engine for embedded security systems in the Internet of Things.

    PubMed

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-12-16

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  13. Scala Roles: Reusable Object Collaborations in a Library

    NASA Astrophysics Data System (ADS)

    Pradel, Michael; Odersky, Martin

    Purely class-based implementations of object-oriented software are often inappropriate for reuse. In contrast, the notion of objects playing roles in a collaboration has been proven to be a valuable reuse abstraction. However, existing solutions to enable role-based programming tend to require vast extensions of the underlying programming language, and thus, are difficult to use in every day work. We present a programming technique, based on dynamic proxies, that allows to augment an object’s type at runtime while preserving strong static type safety. It enables role-based implementations that lead to more reuse and better separation of concerns.

  14. The stuff that dreams are made of: HIV-positive adolescents' aspirations for development.

    PubMed

    Hodes, Rebecca; Doubt, Jenny; Toska, Elona; Vale, Beth; Zungu, Nompumelelo; Cluver, Lucie

    2018-02-01

    The Sustainable Development Goals (SDGs) commit to strengthening collaborations between governments and civil society. Adolescents are among the key target populations for global development initiatives, but research studies and programmes rarely include their direct perspectives on how to promote health and wellbeing. This article explores how both the methods and the findings of participatory research provide insights into adolescents' aspirations across the domains of health and social development. It investigates how adolescents conceive of health and social services as interconnected, and how this reflects the multisectoral objectives of the SDGs. This research was conducted within a longitudinal, mixed-methods study of HIV-positive adolescents (n = 80 qualitative participants, n = 1060 quantitative interviews). Between November 2013 and February 2014, a participatory exercise - the "dream clinic" - was piloted with 25 adolescents in South Africa's Eastern Cape. Key themes were identified based on the insights shared by participants, and through visual and thematic analysis. These findings were explored through a second participatory exercise, "Yummy or crummy? You are the Mzantsi Wakho masterchef !," conducted in January 2016. Findings are described in relation to emerging quantitative results. Mixed methods explored associations between access to food, medicines, clean water and sanitation in HIV-positive adolescents' aspirations for development. The exercises produced practicable recommendations for innovations in development, based on associations between healthcare, food security, clean water and sanitation, while illustrating the value of partnership and collaboration (the objective of SDG17). Findings capture strong interlinkages between SDGs 2, 3 and 6 - confirming the importance of specific SDGs for HIV-positive adolescents. Study results informed the objectives of South Africa's National and Adolescent and Youth Health Policy (2017). Participatory research may be used to leverage the perspectives and experiences of adolescents. The methods described here provide potential for co-design and implementation of developmental initiatives to fulfil the ambitious mandate of the SDGs. They may also create new opportunities to strengthen the engagement of adolescents in policy and programming. © 2018 The Authors. Journal of the International AIDS Society published by John Wiley & sons Ltd on behalf of the International AIDS Society.

  15. Goal, Objectives, and Responsibilities. Competency-Based Education (CBE): Pathways to College, Career, and Life Ready Graduates

    ERIC Educational Resources Information Center

    Iowa Department of Education, 2018

    2018-01-01

    In 2012 Senate File 2284 approved competency-based education (CBE). In 2013 House File 215 provided $100,000 to be used as grants to districts/schools participating in a collaborative effort toward CBE pathways for their students and a framework toward statewide implementation. The Iowa CBE Collaborative will engage in collaborative inquiry to…

  16. Influences on Low-SES First-Generation Students' Decision to Pursue Engineering

    ERIC Educational Resources Information Center

    Strutz, Michele Louise

    2012-01-01

    "The ability of this nation to provide a growing economy, strong health and human services, and a secure and safe nation depends upon a vibrant, creative, and diverse engineering and science workforce" (Blue, et al., 2005, p.4). To contribute to technological advancements, engage in global collaboration, solve complex problems, encourage…

  17. Satellite Anomalies: Benefits of a Centralized Anomaly Database and Methods for Securely Sharing Information Among Satellite Operators

    DTIC Science & Technology

    2014-01-01

    unprecedented efficiencies in global busi- ness collaboration through communication, information distribution, and fast electronic monetary transactions...tudes (which peaks in free electron density at 300–400 km but extends to just above 1,000 km). At GEO, surface charging occurs intermit - tently

  18. 2004 Kansas City Regional Household Travel Survey | Transportation Secure

    Science.gov Websites

    Data Center | NREL 04 Kansas City Regional Household Travel Survey 2004 Kansas City Regional Household Travel Survey The 2004 Regional Household Travel Survey documented the travel behavior data survey, which was conducted in collaboration with NuStats. Methodology The survey entailed the collection

  19. 2012-2013 Delaware Valley Household Travel Survey | Transportation Secure

    Science.gov Websites

    Data Center | NREL 12-2013 Delaware Valley Household Travel Survey 2012-2013 Delaware Valley Household Travel Survey The 2012-2013 Delaware Valley Household Travel Survey collected data for multiple ) sponsored the survey in collaboration with AbtSRBI. Methodology A sampling strategy was designed to recruit

  20. HCCI Combustion Engines Final Report CRADA No. TC02032.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aceves, S.; Lyford-Pike, E.

    This was a collaborative effort between Lawrence Livermore National Security, LLC (formerly The Regents of the University of California)/Lawrence Livermore National Laboratory (LLNL) and Cummins Engine Company (Cwnmins), to advance the state of the art on HomogeneousCharge Compression-Ignition (HCCI) engines, resulting in a clean, high-efficiency alternative to diesel engines.

  1. The Early Childhood Mental Health Project: Child Care Center Consultation in Action.

    ERIC Educational Resources Information Center

    Johns, Brian

    Based on the view that promoting the emotional wellness of young children and fostering secure, warm relationships between chidren and their teachers are critical to healthy early development, the Jewish Family and Children's Services (JFCS)/Parents Place collaborated with the City and County of San Francisco's Community Mental Health Division and…

  2. Impact of Homeland Security Communities of Learning: Developing a Strategy for Training and Collaboration

    DTIC Science & Technology

    2006-09-01

    education. LCMS allow subject matter experts, with little technology skills to develop curriculum, deliver courses, and monitor e- learning. Distance...occurring in year seven and therefore it has zero probability of occurring in the first five years. The probability of Ev-2 occurring between years 7 and

  3. Missing the Boat on Invasive Alien Species: A Review of Post-Secondary Curricula in Canada

    ERIC Educational Resources Information Center

    Smith, Andrea L.; Bazely, Dawn R.; Yan, Norman D.

    2011-01-01

    Invasive alien species (IAS) cause major environmental and economic damage worldwide, and also threaten human food security and health. The impacts of IAS are expected to rise with continued globalization, land use modification, and climate change. Developing effective strategies to deal with IAS requires a collaborative, interdisciplinary…

  4. Can Local Police and Sheriff’s Departments Provide a Higher Degree of Homeland Security Coordination and Collaboration Through Consolidation of Police Services

    DTIC Science & Technology

    2010-09-01

    SUPPORTING A SHARED SERVICES MODEL, CONSOLIDATION AND SHARED INTELLIGENCE SUPPORT ........41 1. Geographical Similarities...42 D. SHARED SERVICES CONCEPT ...............................................................43 1. The Joint Powers Agreement...87 VII. INTELLIGENCE IMPLICATIONS OF A SHARED SERVICES MODEL ......89 A. INTRODUCTION

  5. Rapid Assessment of Individual Soldier Operational Readiness Final Report CRADA No. TC02104.0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Turteltaub, K.; Mapes, J.

    This was a collaborative effort between Lawrence Livermore National Security (LLNS) (formerly The Regents of the University of California), Lawrence Livermore National Laboratory (LLNL) and Rules Based Medicine, Inc. {RBM), to identify markers in blood that would be candidates for determining the combat readiness of troops.

  6. Promoting Inter-Professional Teamwork and Learning--The Case of a Surgical Operating Theatre

    ERIC Educational Resources Information Center

    Collin, Kaija; Paloniemi, Susanna; Mecklin, Jukka-Pekka

    2010-01-01

    Hospitals, and surgical operating theatres (OTs) in particular, are environments in which inter-professional teamwork and learning are essential to secure patient safety and effective practice. However, it has been revealed in many studies that inter-professional collaborative work in hospital organisations faces many challenges and constraints.…

  7. The North Carolina Department of Commerce: a healthy workforce promotes economic security.

    PubMed

    Smith, Libby; Morck, John

    2012-01-01

    To thrive economically, North Carolina needs a healthy, productive workforce. The public and private sectors should collaborate on the prevention and management of chronic diseases, which significantly impact the state's economy. Evidence-based prevention strategies should be prioritized, and communities should be designed with public health considerations in mind.

  8. Securing Our Dance Heritage: Issues in the Documentation and Preservation of Dance.

    ERIC Educational Resources Information Center

    Johnson, Catherine J.; Snyder, Allegra Fuller

    The great research collections of the United States have resulted, in part, from a long and productive collaboration among scholars, librarians, and archivists. This booklet focuses on the documentation of, access to, and preservation of dance heritage. It discusses the cultural and intellectual value of dance and articulates what elements of…

  9. The Importance of International Technical Nuclear Forensics to Deter Illicit Trafficking

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Smith, D K

    2007-01-30

    Illicit trafficking of nuclear materials is a transboundary problem that requires a cooperative approach involving international nuclear forensics to ensure all states understand the threat posed by nuclear smuggling as well as a means to best deter the movement of nuclear contraband. To achieve the objectives, all cases involving illicit trafficking of nuclear and radiological materials must be vigorously pursued and prosecuted when appropriate. The importance of outreach and formal government-to-government relationships with partner nations affected by nuclear trafficking cannot be under-estimated. States that are situated on smuggling routes may be well motivated to counter nuclear crimes to bolster theirmore » own border and transportation security as well as strengthen their economic and political viability. National law enforcement and atomic energy agencies in these states are aggressively pursuing a comprehensive strategy to counter nuclear smuggling through increasing reliance on technical nuclear forensics. As part of these activities, it is essential that these organizations be given adequate orientation to the best practices in this emerging discipline including the categorization of interdicted nuclear material, collection of traditional and nuclear forensic evidence, data analysis using optimized analytical protocols, and how to best fuse forensics information with reliable case input to best develop a law enforcement or national security response. The purpose of formalized USG relationship is to establish an institutional framework for collaboration in international forensics, improve standards of forensics practice, conduct joint exercises, and pursue case-work that benefits international security objectives. Just as outreach and formalized relationships are important to cultivate international nuclear forensics, linking nuclear forensics to ongoing national assistance in border and transpiration security, including port of entry of entry monitoring, nuclear safeguards, and emerging civilian nuclear power initiatives including the Global Nuclear Energy Partnership are crucial components of a successful nuclear detection and security architecture. Once illicit shipments of nuclear material are discovered at a border, the immediate next question will be the nature and the source of the material, as well as the identity of the individual(s) involved in the transfer as well as their motivations. The Nuclear Smuggling International Technical Working Group (ITWG) is a forum for the first responder, law enforcement, policy, and diplomatic community to partner with nuclear forensics experts worldwide to identify requirements and develop technical solutions in common. The ITWG was charted in 1996 and since that time approximately 30 member states and organizations have participated in 11 annual international meetings. The ITWG also works closely with the IAEA to provide countries with support for forensic analyses. Priorities include the development of common protocols for the collection of nuclear forensic evidence and laboratory investigations, organization of forensic round-robin analytical exercises and technical forensic assistance to requesting nations. To promote the science of nuclear forensics within the ITWG the Nuclear Forensics Laboratory Group was organized in 2004. A Model Action Plan for nuclear forensics was developed by the ITWG and published as an IAEA Nuclear security Series document to guide member states in their own forensics investigations. Through outreach, formalized partnerships, common approaches and security architectures, and international working groups, nuclear forensics provides an important contribution to promoting nuclear security and accountability.« less

  10. [Perinatal audit in the North of the Netherlands: the first 2 years].

    PubMed

    van Diem, Mariet Th; Bergman, Klasien A; Bouman, Katelijne; van Egmond, Nico; Stant, Dennis A; Timmer, Albertus; Ulkeman, Lida H M; Veen, Wenda B; Erwich, Jan Jaap H M

    2011-01-01

    Description of the implementation of local audit meetings and the identified substandard factors, points of special interest, actions for improvement and the opinion of the participating health care providers. Descriptive study. A new organisation and methodology for perinatal mortality audit meetings was introduced in 15 collaborative structures in the northern part of the Netherlands in the period September 2007 to March 2010. During these multidisciplinary audit meetings, cases of perinatal mortality selected by the obstetric collaborative group were discussed in a structured way under the direction of an independent chairman. In total 64 audit meetings were held, in which 677 perinatal health care providers took part at least once, and 112 cases of perinatal death were evaluated. 163 substandard factors were identified. These included : not following the protocol, guideline, standard (31%) or usual care (23%) and insufficient documentation (28%) and communication between health care providers (13%). 442 actions to improve care were reported divided over: 'external collaboration' (15%), 'internal collaboration' (17%), 'practice management' (26%) and 'training and education' (10%). The most valued aspects of the audit meetings were: their multidisciplinary character, the collaborative search for substandard factors, their security, the learning effect and the positive effect on collaboration. Cases of perinatal mortality were discussed in all 15 perinatal collaborative structures in the northern part of the Netherlands. Substandard factors were identified, but further analysis of these factors merits attention. The participants concluded that the multidisciplinary approach and the collaboration during the audit meetings improved the cooperation between perinatal health care providers.

  11. Developing effective interuniversity partnerships and community-based research to address health disparities.

    PubMed

    Carey, Timothy S; Howard, Daniel L; Goldmon, Moses; Roberson, James T; Godley, Paul A; Ammerman, Alice

    2005-11-01

    Health disparities are an enormous challenge to American society. Addressing these disparities is a priority for U.S. society and especially for institutions of higher learning, with their threefold mission of education, service, and research. Collaboration across multiple intellectual disciplines will be critical as universities address health disparities. In addition, universities must collaborate with communities, with state partners, and with each other. Development of these collaborations must be sensitive to the history and unique characteristics of each academic institution and population. The authors describe the challenges of all three types of collaboration, but primarily focus on collaboration between research-intensive universities and historically black colleges and universities. The authors describe a four-year collaboration between Shaw University and the University of North Carolina at Chapel Hill (UNC-CH). These universities strategically developed multiple research initiatives to address health disparities, building on modest early success and personal relationships. These activities included participation by Shaw faculty in faculty development activities, multiple collaborative pilot studies, and joint participation in securing grants from the Agency for Health care Research and Quality of the federal Department of Health and Human Services and the National Institutes of Health, including a P-60 Project EXPORT center grant. These multiple activities were sometimes led by UNC-CH, sometimes by Shaw University. Open discussion of problems as they arose, realistic expectations, and mutual recognition of the strengths of each institution and its faculty have been critical in achieving successful collaboration to date.

  12. Developing Effective Interuniversity Partnerships and Community-Based Research to Address Health Disparities

    PubMed Central

    Carey, Timothy S.; Howard, Daniel L.; Goldmon, Moses; Roberson, James T.; Godley, Paul A.; Ammerman, Alice

    2009-01-01

    Health disparities are an enormous challenge to American society. Addressing these disparities is a priority for U.S. society and especially for institutions of higher learning, with their threefold mission of education, service, and research. Collaboration across multiple intellectual disciplines will be critical as universities address health disparities. In addition, universities must collaborate with communities, with state partners, and with each other. Development of these collaborations must be sensitive to the history and unique characteristics of each academic institution and population. The authors describe the challenges of all three types of collaboration, but primarily focus on collaboration between research-intensive universities and historically black colleges and universities. The authors describe a four-year collaboration between Shaw University and the University of North Carolina at Chapel Hill (UNC-CH). These universities strategically developed multiple research initiatives to address health disparities, building on modest early success and personal relationships. These activities included participation by Shaw faculty in faculty development activities, multiple collaborative pilot studies, and joint participation in securing grants from the Agency for Health care Research and Quality of the federal Department of Health and Human Services and the National Institutes of Health, including a P-60 Project EXPORT center grant. These multiple activities were sometimes led by UNC-CH, sometimes by Shaw University. Open discussion of problems as they arose, realistic expectations, and mutual recognition of the strengths of each institution and its faculty have been critical in achieving successful collaboration to date. PMID:16249303

  13. Optics industry in Spain: a cluster approach to increasing competitiveness through collaboration in R&D and innovation

    NASA Astrophysics Data System (ADS)

    Cifuentes, Andrés F.

    2011-10-01

    The optics industry in Spain pooled together to create the Southern European Cluster in Photonics and Optics - SECPhO, founded in April 2009, with the mission to help the sector increase competitiveness, specially through collaboration. From 10 founding members, SECPhO no incorporates over 40 members, which is nearly 40% of the optics industry in the region. From the beginning of operations the cluster has focused on three strategic challenges: R&D+i and Productivity, Visibility and Internationalization, and Betterment and Retention of Talent. A brief summary of the clusters activities is given. In this article, the focus will be on R&D and innovation, through industry driven collaborative initiatives and the tools and actions that lead to successful partnerships. Topics discussed in this work are will be a cluster's role in promoting strategic change, the value chain approach to partnerships, international collaboration in projects and specific cluster activities. Some practical examples of initiatives relating to effective collaboration are described, focusing on one of the mayor challenges of our time: the greening of the planet. Examples will be addressed in smart cities, efficient LASER applications and lightweight optical sensors for civil security. In all cases the collaboration between the public and private sectors is shown.

  14. Conceptual framework to ensure water security in Ukraine

    NASA Astrophysics Data System (ADS)

    Gadzalo, Yaroslav; Romashchenko, Mykhailo; Yatsiuk, Mykhailo

    2018-02-01

    As a result of global climate change against the background of natural water supply deterioration and river water content reductions, nowadays Ukraine is facing the problem of environmental degradation of river basins. In light of this, we suggest that achieving an acceptable level of water security in Ukraine should be defined as the strategic objective of national water policy. The state of national water security should be evaluated by its progress in certain sectors. The basic principles of the new water policy of Ukraine are supposed to be represented in Water Strategy of Ukraine. Integrated water management by the basin principle should serve as the main tool for achieving the objectives of water security.

  15. Development of a telediagnosis endoscopy system over secure internet.

    PubMed

    Ohashi, K; Sakamoto, N; Watanabe, M; Mizushima, H; Tanaka, H

    2008-01-01

    We developed a new telediagnosis system to securely transmit high-quality endoscopic moving images over the Internet in real time. This system would enable collaboration between physicians seeking advice from endoscopists separated by long distances, to facilitate diagnosis. We adapted a new type of digital video streaming system (DVTS) to our teleendoscopic diagnosis system. To investigate its feasibility, we conducted a two-step experiment. A basic experiment was first conducted to transmit endoscopic video images between hospitals using a plain DVTS. After investigating the practical usability, we incorporated a secure and reliable communication function into the system, by equipping DVTS with "TCP2", a new security technology that establishes secure communication in the transport layer. The second experiment involved international transmission of teleendoscopic image between Hawaii and Japan using the improved system. In both the experiments, no serious transmission delay was observed to disturb physicians' communications and, after subjective evaluation by endoscopists, the diagnostic qualities of the images were found to be adequate. Moreover, the second experiment showed that "TCP2-equipped DVTS" successfully executed high-quality secure image transmission over a long distance network. We conclude that DVTS technology would be promising for teleendoscopic diagnosis. It was also shown that a high quality, secure teleendoscopic diagnosis system can be developed by equipping DVTS with TCP2.

  16. Execution of a participatory supportive return to work program within the Dutch social security sector: a qualitative evaluation of stakeholders' perceptions.

    PubMed

    Lammerts, Lieke; Schaafsma, Frederieke G; van Mechelen, Willem; Anema, Johannes R

    2016-04-14

    A process evaluation of a participatory supportive return to work program, aimed at workers without a (permanent) employment contract who are sick-listed due to a common mental disorder, revealed that this program was executed less successfully than similar programs evaluated in earlier studies. The program consisted of a participatory approach, integrated care and direct placement in competitive employment. Aim of this study was to get a better understanding of the execution of the program by evaluating stakeholders' perceptions. In the absence of an employer, the program was applied by the Dutch Social Security Agency, in collaboration with vocational rehabilitation agencies. Together with the sick-listed workers, these were the main stakeholders. Our research questions involved stakeholders' perceptions of the function(s) of the program, and their perceptions of barriers and facilitators for a successful execution of the program within the Dutch social security sector. Semi-structured interviews were held with five sick-listed workers, eight professionals of the Social Security Agency, and two case managers of vocational rehabilitation agencies. Interview topics were related to experiences with different components of the program. Selection of respondents was based on purposive sampling and continued until data saturation was reached. Content analysis was applied to identify patterns in the data. Two researchers developed a coding system, based on predefined topics and themes emerging from the data. Although perceived functions of some components of the program were as intended, all stakeholders stressed that the program often had not resulted in return to work. Perceived barriers for a successful execution were related to a poor collaboration between the Dutch Social Security Agency, vocational rehabilitation agencies and healthcare providers, the type of experienced (health) problems, time constraints, and limited job opportunities. For future implementation of the program, it will be important to consider how a better integration of services by the Dutch Social Security Agency, vocational rehabilitation agencies and the mental healthcare sector can be improved in order to address treatment and vocational needs simultaneously, and to better match the sick-listed worker with the limited opportunities in the Dutch labor market. NTR3563.

  17. The appropriate and effective use of security technologies in U.S. schools : a guide for schools and law enforcement agencies.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Green, Mary Wilson

    The purpose of this report is to provide school administrators with the ability to determine their security system requirements, so they can make informed decisions when working with vendors and others to improve their security posture. This is accomplished by (1) explaining a systems-based approach to defining the objectives and needs of the system, and (2), providing information on the ability of common components (sensors, cameras, metal detectors, etc) to achieve those objectives, in an effectively integrated system.

  18. [Collaborative projects with academia for regulatory science studies on biomarkers].

    PubMed

    Saito, Yoshiro; Nakamura, Ryosuke; Maekawa, Keiko

    2014-01-01

    Biomarkers are useful tools to be utilized as indicators/predictors of disease severity and drug responsiveness/safety, and thus are expected to promote efficient drug development and to accelerate proper use of approved drugs. Many academic achievements have been reported, but only a small number of biomarkers are used in clinical trials and drug treatments. Regulatory sciences on biomarkers for their secure development and proper qualification are necessary to facilitate their practical application. We started to collaborate with Tohoku University and Nagoya City University for sample quality, biomarker identification, evaluation of their usage, and making guidances. In this short review, scheme and progress of these projects are introduced.

  19. The p-medicine portal—a collaboration platform for research in personalised medicine

    PubMed Central

    Schera, Fatima; Weiler, Gabriele; Neri, Elias; Kiefer, Stephan; Graf, Norbert

    2014-01-01

    The European project p-medicine creates an information technology infrastructure that facilitates the development from current medical practice to personalised medicine. The main access point to this infrastructure is the p-medicine portal that provides clinicians, patients, and researchers a platform to collaborate, share data and expertise, and use tools and services to improve personalised treatments of patients. In this document, we describe the community-based structure of the p-medicine portal and provide information about the p-medicine security framework implemented in the portal. Finally, we show the user interface and describe the p-medicine tools and services integrated in the portal. PMID:24567755

  20. 12 CFR 563.81 - Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 6 2014-01-01 2012-01-01 true Inclusion of subordinated debt securities and... Borrowings § 563.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as..., subpart A seeking OTS approval of, or non-objection to, the inclusion of covered securities in...

  1. 12 CFR 563.81 - Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as...

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 6 2012-01-01 2012-01-01 false Inclusion of subordinated debt securities and... Borrowings § 563.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as..., subpart A seeking OTS approval of, or non-objection to, the inclusion of covered securities in...

  2. 12 CFR 563.81 - Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 6 2013-01-01 2012-01-01 true Inclusion of subordinated debt securities and... Borrowings § 563.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as..., subpart A seeking OTS approval of, or non-objection to, the inclusion of covered securities in...

  3. 12 CFR 563.81 - Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as...

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 5 2011-01-01 2011-01-01 false Inclusion of subordinated debt securities and... Borrowings § 563.81 Inclusion of subordinated debt securities and mandatorily redeemable preferred stock as..., subpart A seeking OTS approval of, or non-objection to, the inclusion of covered securities in...

  4. Applying object-oriented software engineering at the BaBar collaboration

    NASA Astrophysics Data System (ADS)

    Jacobsen, Bob; BaBar Collaboration Reconstruction Software Group

    1997-02-01

    The BaBar experiment at SLAC will start taking data in 1999. We are attempting to build its reconstruction software using good software engineering practices, including the use of object-oriented technology. We summarize our experience to date with analysis and design activities, training, CASE and documentation tools, C++ programming practice and similar topics. The emphasis is on the practical issues of simultaneously introducing new techniques to a large collaboration while under a deadline for system delivery.

  5. Development of Standardized Clinical Training Cases for Diagnosis of Sexual Abuse using a Secure Telehealth Application

    ERIC Educational Resources Information Center

    Frasier, Lori D.; Thraen, Ioana; Kaplan, Rich; Goede, Patricia

    2012-01-01

    Objectives: The training of physicians, nurse examiners, social workers and other health professional on the evidentiary findings of sexual abuse in children is challenging. Our objective was to develop peer reviewed training cases for medical examiners of child sexual abuse, using a secure web based telehealth application (TeleCAM). Methods:…

  6. Bulletin of the Division of Electrical Engineering, 1987-1988, volume 3, number 2

    NASA Astrophysics Data System (ADS)

    1988-05-01

    A report is provided on the activities of the Division of Electrical Engineering of the National Research Council of Canada. The Division engages in the development of standards and test procedures, and undertakes applied research in support of Canadian industry, government departments, and universities. Technology transfer and collaborative research continue to grow in importance as focuses of Division activities. The Division is comprised of three sections: the Laboratory for Biomedical Engineering, the Laboratory for Electromagnetic and Power Engineering, and the Laboratory for Intelligent Systems. An agreement has been reached to commercially exploit the realtime multiprocessor operating system Harmony. The dielectrics group has made contract research agreements with industry from both Canada and the United States. The possibility of employing a new advanced laser vision camera, which can be mounted on a robot arm in a variety of industrial applications is being explored. Potential short-term spinoffs related to intelligent wheelchairs are being sought as part of the new interlaboratory program which has as its long-term objective the development of a mobile robot for health care applications. A program in applied artificial intelligence has been established. Initiatives in collaboration with outside groups include proposals for major institutes in areas ranging from police and security research to rehabilitation research, programs to enhance Canadian industrial competence working with the Canadian Manufacturers' Association and other government departments, and approaches to the utilization of existing facilities which will make them more valuable without significant financial expenditures.

  7. The DBCLS BioHackathon: standardization and interoperability for bioinformatics web services and workflows. The DBCLS BioHackathon Consortium*.

    PubMed

    Katayama, Toshiaki; Arakawa, Kazuharu; Nakao, Mitsuteru; Ono, Keiichiro; Aoki-Kinoshita, Kiyoko F; Yamamoto, Yasunori; Yamaguchi, Atsuko; Kawashima, Shuichi; Chun, Hong-Woo; Aerts, Jan; Aranda, Bruno; Barboza, Lord Hendrix; Bonnal, Raoul Jp; Bruskiewich, Richard; Bryne, Jan C; Fernández, José M; Funahashi, Akira; Gordon, Paul Mk; Goto, Naohisa; Groscurth, Andreas; Gutteridge, Alex; Holland, Richard; Kano, Yoshinobu; Kawas, Edward A; Kerhornou, Arnaud; Kibukawa, Eri; Kinjo, Akira R; Kuhn, Michael; Lapp, Hilmar; Lehvaslaiho, Heikki; Nakamura, Hiroyuki; Nakamura, Yasukazu; Nishizawa, Tatsuya; Nobata, Chikashi; Noguchi, Tamotsu; Oinn, Thomas M; Okamoto, Shinobu; Owen, Stuart; Pafilis, Evangelos; Pocock, Matthew; Prins, Pjotr; Ranzinger, René; Reisinger, Florian; Salwinski, Lukasz; Schreiber, Mark; Senger, Martin; Shigemoto, Yasumasa; Standley, Daron M; Sugawara, Hideaki; Tashiro, Toshiyuki; Trelles, Oswaldo; Vos, Rutger A; Wilkinson, Mark D; York, William; Zmasek, Christian M; Asai, Kiyoshi; Takagi, Toshihisa

    2010-08-21

    Web services have become a key technology for bioinformatics, since life science databases are globally decentralized and the exponential increase in the amount of available data demands for efficient systems without the need to transfer entire databases for every step of an analysis. However, various incompatibilities among database resources and analysis services make it difficult to connect and integrate these into interoperable workflows. To resolve this situation, we invited domain specialists from web service providers, client software developers, Open Bio* projects, the BioMoby project and researchers of emerging areas where a standard exchange data format is not well established, for an intensive collaboration entitled the BioHackathon 2008. The meeting was hosted by the Database Center for Life Science (DBCLS) and Computational Biology Research Center (CBRC) and was held in Tokyo from February 11th to 15th, 2008. In this report we highlight the work accomplished and the common issues arisen from this event, including the standardization of data exchange formats and services in the emerging fields of glycoinformatics, biological interaction networks, text mining, and phyloinformatics. In addition, common shared object development based on BioSQL, as well as technical challenges in large data management, asynchronous services, and security are discussed. Consequently, we improved interoperability of web services in several fields, however, further cooperation among major database centers and continued collaborative efforts between service providers and software developers are still necessary for an effective advance in bioinformatics web service technologies.

  8. The DBCLS BioHackathon: standardization and interoperability for bioinformatics web services and workflows. The DBCLS BioHackathon Consortium*

    PubMed Central

    2010-01-01

    Web services have become a key technology for bioinformatics, since life science databases are globally decentralized and the exponential increase in the amount of available data demands for efficient systems without the need to transfer entire databases for every step of an analysis. However, various incompatibilities among database resources and analysis services make it difficult to connect and integrate these into interoperable workflows. To resolve this situation, we invited domain specialists from web service providers, client software developers, Open Bio* projects, the BioMoby project and researchers of emerging areas where a standard exchange data format is not well established, for an intensive collaboration entitled the BioHackathon 2008. The meeting was hosted by the Database Center for Life Science (DBCLS) and Computational Biology Research Center (CBRC) and was held in Tokyo from February 11th to 15th, 2008. In this report we highlight the work accomplished and the common issues arisen from this event, including the standardization of data exchange formats and services in the emerging fields of glycoinformatics, biological interaction networks, text mining, and phyloinformatics. In addition, common shared object development based on BioSQL, as well as technical challenges in large data management, asynchronous services, and security are discussed. Consequently, we improved interoperability of web services in several fields, however, further cooperation among major database centers and continued collaborative efforts between service providers and software developers are still necessary for an effective advance in bioinformatics web service technologies. PMID:20727200

  9. Individual patient data meta-analysis of antiplatelet regimens after noncardioembolic stroke or TIA: rationale and design.

    PubMed

    Greving, Jacoba P; Diener, Hans-Christoph; Csiba, László; Hacke, Werner; Kappelle, L Jaap; Koudstaal, Peter J; Leys, Didier; Mas, Jean-Louis; Sacco, Ralph L; Sivenius, Juhani; Algra, Ale

    2015-10-01

    The Cerebrovascular Antiplatelet Trialists' Collaborative Group was formed to obtain and analyze individual patient data from the major randomized trials of common antiplatelet regimens after cerebral ischemia. Although the risk of stroke can be reduced by antiplatelet drugs, there continues to be uncertainty about the balance of risk and benefits of different antiplatelet regimens for an individual patient. Our aim is to provide clinicians with a thorough evidence-based answer on these therapeutic alternatives. We have identified six large randomized trials and plan to meta-analyze the data on an individual patient level. In total, these trials have enrolled 46 948 patients with cerebral ischemia. Uniquely, the Cerebrovascular Antiplatelet Trialists' Collaborative Group has secured access to the individual data of all of these trials, with the participation of key investigators and pharmaceutical companies. Our principal objective includes deriving a reliable estimate of the efficacy of different antiplatelet regimens on key outcomes including serious vascular events, major ischemic events, major bleeding, and intracranial hemorrhage. We propose to redefine composite outcome events, if necessary, to achieve comparability. Further, we aim to build and validate prognostic models for the risk of major bleeding and intracranial hemorrhage and to build a decision model that may support evidence-based decision making about which antiplatelet regimen would be most effective in different risk groups of patients. This paper outlines inclusion criteria, outcome measures, baseline characteristics, and planned statistical analysis. © 2015 World Stroke Organization.

  10. Collaborative adaptive rangeland management fosters management-science partnerships

    USDA-ARS?s Scientific Manuscript database

    Rangelands of the western Great Plains of North America are complex social-ecological systems where management objectives for livestock production, grassland bird conservation and vegetation structure and composition converge. The Collaborative Adaptive Rangeland Management (CARM) experiment is a 10...

  11. Hazardous material transportation safety and security field operational test final detailed test plans : executive summary

    DOT National Transportation Integrated Search

    2003-09-16

    The objective of this Hazardous Material (HazMat) Transportation Safety and Security Field Operational Test (FOT) Final Detailed Test Plans evaluation is to measure the impact of technology solutions on the safety, security, and operational efficienc...

  12. WebViz:A Web-based Collaborative Interactive Visualization System for large-Scale Data Sets

    NASA Astrophysics Data System (ADS)

    Yuen, D. A.; McArthur, E.; Weiss, R. M.; Zhou, J.; Yao, B.

    2010-12-01

    WebViz is a web-based application designed to conduct collaborative, interactive visualizations of large data sets for multiple users, allowing researchers situated all over the world to utilize the visualization services offered by the University of Minnesota’s Laboratory for Computational Sciences and Engineering (LCSE). This ongoing project has been built upon over the last 3 1/2 years .The motivation behind WebViz lies primarily with the need to parse through an increasing amount of data produced by the scientific community as a result of larger and faster multicore and massively parallel computers coming to the market, including the use of general purpose GPU computing. WebViz allows these large data sets to be visualized online by anyone with an account. The application allows users to save time and resources by visualizing data ‘on the fly’, wherever he or she may be located. By leveraging AJAX via the Google Web Toolkit (http://code.google.com/webtoolkit/), we are able to provide users with a remote, web portal to LCSE's (http://www.lcse.umn.edu) large-scale interactive visualization system already in place at the University of Minnesota. LCSE’s custom hierarchical volume rendering software provides high resolution visualizations on the order of 15 million pixels and has been employed for visualizing data primarily from simulations in astrophysics to geophysical fluid dynamics . In the current version of WebViz, we have implemented a highly extensible back-end framework built around HTTP "server push" technology. The web application is accessible via a variety of devices including netbooks, iPhones, and other web and javascript-enabled cell phones. Features in the current version include the ability for users to (1) securely login (2) launch multiple visualizations (3) conduct collaborative visualization sessions (4) delegate control aspects of a visualization to others and (5) engage in collaborative chats with other users within the user interface of the web application. These features are all in addition to a full range of essential visualization functions including 3-D camera and object orientation, position manipulation, time-stepping control, and custom color/alpha mapping.

  13. A review of security of electronic health records.

    PubMed

    Win, Khin Than

    The objective of this study is to answer the research question, "Are current information security technologies adequate for electronic health records (EHRs)?" In order to achieve this, the following matters have been addressed in this article: (i) What is information security in the context of EHRs? (ii) Why is information security important for EHRs? and (iii) What are the current technologies for information security available to EHRs? It is concluded that current EHR security technologies are inadequate and urgently require improvement. Further study regarding information security of EHRs is indicated.

  14. Markov Task Network: A Framework for Service Composition under Uncertainty in Cyber-Physical Systems.

    PubMed

    Mohammed, Abdul-Wahid; Xu, Yang; Hu, Haixiao; Agyemang, Brighter

    2016-09-21

    In novel collaborative systems, cooperative entities collaborate services to achieve local and global objectives. With the growing pervasiveness of cyber-physical systems, however, such collaboration is hampered by differences in the operations of the cyber and physical objects, and the need for the dynamic formation of collaborative functionality given high-level system goals has become practical. In this paper, we propose a cross-layer automation and management model for cyber-physical systems. This models the dynamic formation of collaborative services pursuing laid-down system goals as an ontology-oriented hierarchical task network. Ontological intelligence provides the semantic technology of this model, and through semantic reasoning, primitive tasks can be dynamically composed from high-level system goals. In dealing with uncertainty, we further propose a novel bridge between hierarchical task networks and Markov logic networks, called the Markov task network. This leverages the efficient inference algorithms of Markov logic networks to reduce both computational and inferential loads in task decomposition. From the results of our experiments, high-precision service composition under uncertainty can be achieved using this approach.

  15. Perception of Interprofessional Collaboration and Co-Location of Specialists and Primary Care Teams in Youth Mental Health

    PubMed Central

    Rousseau, Cécile; Pontbriand, Annie; Nadeau, Lucie; Johnson-Lafleur, Janique

    2017-01-01

    Objectives Interprofessional collaboration is a cornerstone of youth mental health collaborative care models. This article presents quantitative results from a mixed-methods study. It analyses the organizational predictors of the perception of interprofessional collaboration of professionals comparing two models of services within recently constituted youth mental health collaborative care teams. Methods Professionals (n=104) belonging to six health and social services institutions completed an online survey measuring their perceptions of interprofessional collaboration through a validated questionnaire, the PINCOM-Q. Results Results suggest that the integrated model of collaborative care in which specialized resources are co-located with the primary care teams is the main significant predictor of positive perception of interprofessional collaborations in the youth mental health team. Conclusion More research on the relation between service delivery models and interprofessional relations could help support the successful implementation of collaborative care in youth mental health. PMID:29056982

  16. The Goals and Conditions of Qualitative Collaboration between Elementary Schools and Community--A Challenge for the Professional Development

    ERIC Educational Resources Information Center

    Kalin, Jana; Šteh, Barbara

    2016-01-01

    One of the most important tasks that schools have is the establishment of collaboration between the school and the wider community it belongs to. We have conducted an empirical study on the collaboration of Slovenian elementary schools with different partners. We were interested in, among other things, what are the objectives set by schools in the…

  17. Secure and Efficient Regression Analysis Using a Hybrid Cryptographic Framework: Development and Evaluation

    PubMed Central

    Jiang, Xiaoqian; Aziz, Md Momin Al; Wang, Shuang; Mohammed, Noman

    2018-01-01

    Background Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data. Objective Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way. Methods Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time. Results Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results. Conclusions To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time. PMID:29506966

  18. Implementation of a Web-Based Collaborative Process Planning System

    NASA Astrophysics Data System (ADS)

    Wang, Huifen; Liu, Tingting; Qiao, Li; Huang, Shuangxi

    Under the networked manufacturing environment, all phases of product manufacturing involving design, process planning, machining and assembling may be accomplished collaboratively by different enterprises, even different manufacturing stages of the same part may be finished collaboratively by different enterprises. Based on the self-developed networked manufacturing platform eCWS(e-Cooperative Work System), a multi-agent-based system framework for collaborative process planning is proposed. In accordance with requirements of collaborative process planning, share resources provided by cooperative enterprises in the course of collaboration are classified into seven classes. Then a reconfigurable and extendable resource object model is built. Decision-making strategy is also studied in this paper. Finally a collaborative process planning system e-CAPP is developed and applied. It provides strong support for distributed designers to collaboratively plan and optimize product process though network.

  19. Designing an Algorithm to Preserve Privacy for Medical Record Linkage With Error-Prone Data

    PubMed Central

    Pal, Doyel; Chen, Tingting; Khethavath, Praveen

    2014-01-01

    Background Linking medical records across different medical service providers is important to the enhancement of health care quality and public health surveillance. In records linkage, protecting the patients’ privacy is a primary requirement. In real-world health care databases, records may well contain errors due to various reasons such as typos. Linking the error-prone data and preserving data privacy at the same time are very difficult. Existing privacy preserving solutions for this problem are only restricted to textual data. Objective To enable different medical service providers to link their error-prone data in a private way, our aim was to provide a holistic solution by designing and developing a medical record linkage system for medical service providers. Methods To initiate a record linkage, one provider selects one of its collaborators in the Connection Management Module, chooses some attributes of the database to be matched, and establishes the connection with the collaborator after the negotiation. In the Data Matching Module, for error-free data, our solution offered two different choices for cryptographic schemes. For error-prone numerical data, we proposed a newly designed privacy preserving linking algorithm named the Error-Tolerant Linking Algorithm, that allows the error-prone data to be correctly matched if the distance between the two records is below a threshold. Results We designed and developed a comprehensive and user-friendly software system that provides privacy preserving record linkage functions for medical service providers, which meets the regulation of Health Insurance Portability and Accountability Act. It does not require a third party and it is secure in that neither entity can learn the records in the other’s database. Moreover, our novel Error-Tolerant Linking Algorithm implemented in this software can work well with error-prone numerical data. We theoretically proved the correctness and security of our Error-Tolerant Linking Algorithm. We have also fully implemented the software. The experimental results showed that it is reliable and efficient. The design of our software is open so that the existing textual matching methods can be easily integrated into the system. Conclusions Designing algorithms to enable medical records linkage for error-prone numerical data and protect data privacy at the same time is difficult. Our proposed solution does not need a trusted third party and is secure in that in the linking process, neither entity can learn the records in the other’s database. PMID:25600786

  20. Multi-party quantum key agreement protocol secure against collusion attacks

    NASA Astrophysics Data System (ADS)

    Wang, Ping; Sun, Zhiwei; Sun, Xiaoqiang

    2017-07-01

    The fairness of a secure multi-party quantum key agreement (MQKA) protocol requires that all involved parties are entirely peer entities and can equally influence the outcome of the protocol to establish a shared key wherein no one can decide the shared key alone. However, it is found that parts of the existing MQKA protocols are sensitive to collusion attacks, i.e., some of the dishonest participants can collaborate to predetermine the final key without being detected. In this paper, a multi-party QKA protocol resisting collusion attacks is proposed. Different from previous QKA protocol resisting N-1 coconspirators or resisting 1 coconspirators, we investigate the general circle-type MQKA protocol which can be secure against t dishonest participants' cooperation. Here, t < N. We hope the results of the presented paper will be helpful for further research on fair MQKA protocols.

  1. A single-pixel X-ray imager concept and its application to secure radiographic inspections

    DOE PAGES

    Gilbert, Andrew J.; Miller, Brian W.; Robinson, Sean M.; ...

    2017-07-01

    Imaging technology is generally considered too invasive for arms control inspections due to the concern that it cannot properly secure sensitive features of the inspected item. But, this same sensitive information, which could include direct information on the form and function of the items under inspection, could be used for robust arms control inspections. The single-pixel X-ray imager (SPXI) is introduced as a method to make such inspections, capturing the salient spatial information of an object in a secure manner while never forming an actual image. We built this method on the theory of compressive sensing and the single pixelmore » optical camera. The performance of the system is quantified using simulated inspections of simple objects. Measures of the robustness and security of the method are introduced and used to determine how robust and secure such an inspection would be. Particularly, it is found that an inspection with low noise (<1%) and high undersampling (>256×) exhibits high robustness and security.« less

  2. A single-pixel X-ray imager concept and its application to secure radiographic inspections

    NASA Astrophysics Data System (ADS)

    Gilbert, Andrew J.; Miller, Brian W.; Robinson, Sean M.; White, Timothy A.; Pitts, William Karl; Jarman, Kenneth D.; Seifert, Allen

    2017-07-01

    Imaging technology is generally considered too invasive for arms control inspections due to the concern that it cannot properly secure sensitive features of the inspected item. However, this same sensitive information, which could include direct information on the form and function of the items under inspection, could be used for robust arms control inspections. The single-pixel X-ray imager (SPXI) is introduced as a method to make such inspections, capturing the salient spatial information of an object in a secure manner while never forming an actual image. The method is built on the theory of compressive sensing and the single pixel optical camera. The performance of the system is quantified using simulated inspections of simple objects. Measures of the robustness and security of the method are introduced and used to determine how robust and secure such an inspection would be. In particular, it is found that an inspection with low noise ( < 1 %) and high undersampling ( > 256 ×) exhibits high robustness and security.

  3. Coordinating Representations

    DTIC Science & Technology

    2006-04-07

    4 COGNITIVE THEORY OF INTERSUBJECTIVITY...adaptive component that is created and that the use of that component improves their performance. 2 Project Summary Objectives Develop cognitive theory of...distributed collaboration among a heterogeneous team of actors. Theory explains how collaborators share a common understanding of their cooperative

  4. Five Colleges Collaborate to Improve Assessment.

    ERIC Educational Resources Information Center

    Ambler, Marjane

    1999-01-01

    Describes the benefits found by five tribal colleges, in Minnesota, Wisconsin, and Michigan, that collaborated to achieve a more culturally aware accreditation assessment. Contends that colleges must have measurable objectives and outcomes and that they should use data to encourage student success. (VWC)

  5. Design of the national health security preparedness index.

    PubMed

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  6. Autonomous Satellite Operations Via Secure Virtual Mission Operations Center

    NASA Technical Reports Server (NTRS)

    Miller, Eric; Paulsen, Phillip E.; Pasciuto, Michael

    2011-01-01

    The science community is interested in improving their ability to respond to rapidly evolving, transient phenomena via autonomous rapid reconfiguration, which derives from the ability to assemble separate but collaborating sensors and data forecasting systems to meet a broad range of research and application needs. Current satellite systems typically require human intervention to respond to triggers from dissimilar sensor systems. Additionally, satellite ground services often need to be coordinated days or weeks in advance. Finally, the boundaries between the various sensor systems that make up such a Sensor Web are defined by such things as link delay and connectivity, data and error rate asymmetry, data reliability, quality of service provisions, and trust, complicating autonomous operations. Over the past ten years, researchers from the NASA Glenn Research Center (GRC), General Dynamics, Surrey Satellite Technology Limited (SSTL), Cisco, Universal Space Networks (USN), the U.S. Geological Survey (USGS), the Naval Research Laboratory, the DoD Operationally Responsive Space (ORS) Office, and others have worked collaboratively to develop a virtual mission operations capability. Called VMOC (Virtual Mission Operations Center), this new capability allows cross-system queuing of dissimilar mission unique systems through the use of a common security scheme and published application programming interfaces (APIs). Collaborative VMOC demonstrations over the last several years have supported the standardization of spacecraft to ground interfaces needed to reduce costs, maximize space effects to the user, and allow the generation of new tactics, techniques and procedures that lead to responsive space employment.

  7. Information Security: A Scientometric Study of the Profile, Structure, and Dynamics of an Emerging Scholarly Specialty

    ERIC Educational Resources Information Center

    Olijnyk, Nicholas Victor

    2014-01-01

    The central aim of the current research is to explore and describe the profile, dynamics, and structure of the information security specialty. This study's objectives are guided by four research questions: 1. What are the salient features of information security as a specialty? 2. How has the information security specialty emerged and evolved from…

  8. Human detection in sensitive security areas through recognition of omega shapes using MACH filters

    NASA Astrophysics Data System (ADS)

    Rehman, Saad; Riaz, Farhan; Hassan, Ali; Liaquat, Muwahida; Young, Rupert

    2015-03-01

    Human detection has gained considerable importance in aggravated security scenarios over recent times. An effective security application relies strongly on detailed information regarding the scene under consideration. A larger accumulation of humans than the number of personal authorized to visit a security controlled area must be effectively detected, amicably alarmed and immediately monitored. A framework involving a novel combination of some existing techniques allows an immediate detection of an undesirable crowd in a region under observation. Frame differencing provides a clear visibility of moving objects while highlighting those objects in each frame acquired by a real time camera. Training of a correlation pattern recognition based filter on desired shapes such as elliptical representations of human faces (variants of an Omega Shape) yields correct detections. The inherent ability of correlation pattern recognition filters caters for angular rotations in the target object and renders decision regarding the existence of the number of persons exceeding an allowed figure in the monitored area.

  9. Improved Collaborative Filtering Algorithm via Information Transformation

    NASA Astrophysics Data System (ADS)

    Liu, Jian-Guo; Wang, Bing-Hong; Guo, Qiang

    In this paper, we propose a spreading activation approach for collaborative filtering (SA-CF). By using the opinion spreading process, the similarity between any users can be obtained. The algorithm has remarkably higher accuracy than the standard collaborative filtering using the Pearson correlation. Furthermore, we introduce a free parameter β to regulate the contributions of objects to user-user correlations. The numerical results indicate that decreasing the influence of popular objects can further improve the algorithmic accuracy and personality. We argue that a better algorithm should simultaneously require less computation and generate higher accuracy. Accordingly, we further propose an algorithm involving only the top-N similar neighbors for each target user, which has both less computational complexity and higher algorithmic accuracy.

  10. Pension reforms in Hong Kong: using residual and collaborative strategies to deal with the government's financial responsibility in providing retirement protection.

    PubMed

    Yu, Sam Wai-Kam

    2008-01-01

    In 2000, the Hong Kong government introduced the first compulsory retirement saving scheme intended to protect the entire workforce, the Mandatory Provident Fund (MPF). Prior to the introduction of this scheme, the government's main measure for giving financial protection to retirees was the Comprehensive Social Security Assistance (CSSA) scheme, which is a noncontributory, means-tested financial assistance scheme. This paper studies the government's attempt to introduce the MPF on top of the CSSA scheme as a means to illustrate how governments might address their financial responsibilities in providing pension schemes by adopting both the residual strategy-centered reform approach and the collaborative strategy-centered reform approach. The former approach is concerned with developing noncontributory schemes using residual strategies, and the latter is concerned with developing contributory schemes using collaborative strategies. The paper shows the difficulties involved in carrying out these two reform approaches simultaneously.

  11. Cloud-based image sharing network for collaborative imaging diagnosis and consultation

    NASA Astrophysics Data System (ADS)

    Yang, Yuanyuan; Gu, Yiping; Wang, Mingqing; Sun, Jianyong; Li, Ming; Zhang, Weiqiang; Zhang, Jianguo

    2018-03-01

    In this presentation, we presented a new approach to design cloud-based image sharing network for collaborative imaging diagnosis and consultation through Internet, which can enable radiologists, specialists and physicians locating in different sites collaboratively and interactively to do imaging diagnosis or consultation for difficult or emergency cases. The designed network combined a regional RIS, grid-based image distribution management, an integrated video conferencing system and multi-platform interactive image display devices together with secured messaging and data communication. There are three kinds of components in the network: edge server, grid-based imaging documents registry and repository, and multi-platform display devices. This network has been deployed in a public cloud platform of Alibaba through Internet since March 2017 and used for small lung nodule or early staging lung cancer diagnosis services between Radiology departments of Huadong hospital in Shanghai and the First Hospital of Jiaxing in Zhejiang Province.

  12. Objectivity applied to embodied subjects in health care and social security medicine: definition of a comprehensive concept of cognitive objectivity and criteria for its application.

    PubMed

    Solli, Hans Magnus; Barbosa da Silva, António

    2018-03-02

    The article defines a comprehensive concept of cognitive objectivity (CCCO) applied to embodied subjects in health care. The aims of this study were: (1) to specify some necessary conditions for the definition of a CCCO that will allow objective descriptions and assessments in health care, (2) to formulate criteria for application of such a CCCO, and (3) to investigate the usefulness of the criteria in work disability assessments in medical certificates from health care provided for social security purposes. The study design was based on a philosophical conceptual analysis of objectivity and subjectivity, the phenomenological notions 'embodied subject', 'life-world', 'phenomenological object' and 'empathy', and an interpretation of certificates as texts. The study material consisted of 18 disability assessments from a total collection of 86 medical certificates provided for social security purposes, written in a Norwegian hospital-based mental health clinic. Four necessary conditions identified for defining a CCCO were: (A) acknowledging the patient's social context and life-world, (B) perceiving patients as cognitive objects providing a variety of meaningful data (clinical, psychometric, and behavioural data - i.e. activities and actions, meaningful expressions and self-reflection), (C) interpreting data in context, and (D) using general epistemological principles. The criteria corresponding to these conditions were: (a) describing the patient's social context and recognizing the patient's perspective, (b) taking into consideration a variety of quantitative and qualitative data drawn from the clinician's perceptions of the patient as embodied subject, (c) being aware of the need to interpret the data in context, and (d) applying epistemological principles (professional expertise, dialogical intersubjectivity, impartiality, accuracy and correctness). Genuine communication is presupposed. These criteria were tested in the work disability assessments of medical certificates. The criteria were useful for understanding both how objectivity fails during work disability assessments and how it can be improved in the writing of certificates. The article specifies four necessary conditions for the definition of a CCCO in health care and social security medicine and the corresponding criteria for its application. Analysis of the objectivity of work disability assessments in medical certificates for social security confirmed the usefulness of the criteria.

  13. 77 FR 46022 - Lincoln County Resource Advisory Committee Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-02

    ...The Lincoln County Resource Advisory Committee will meet in Libby, MT. The committee is authorized under the Secure Rural Schools and Community Self-Determination Act (Pub. L. 110-343) (the Act) and operates in compliance with the Federal Advisory Committee Act. The purpose of the committee is to improve collaborative relationships and to provide advice and recommendations to the Forest Service concerning projects and funding consistent with the title II of the Act. The meeting is open to the public. The purpose of the meeting is to review status of project implementation and review of status of funds for 2008-2011 Secure Rural Schools and Community Self-Determination Act.

  14. 77 FR 56607 - Lincoln County Resource Advisory Committee Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-13

    ...The Lincoln County Resource Advisory Committee will meet in Libby, MT. The committee is authorized under the Secure Rural Schools and Community Self-Determination Act (Pub. L 110-343) (the Act) and operates in compliance with the Federal Advisory Committee Act. The purpose of the committee is to improve collaborative relationships and to provide advice and recommendations to the Forest Service concerning projects and funding consistent with the title II of the Act. The meeting is open to the public. The purpose of the meeting is to review and recommend project proposals for implementation for Secure Rural Schools and Community Self-Determination Act 2012.

  15. Underwater magnetic gradiometer for magnetic anomaly detection, localization, and tracking

    NASA Astrophysics Data System (ADS)

    Kumar, S.; Sulzberger, G.; Bono, J.; Skvoretz, D.; Allen, G. I.; Clem, T. R.; Ebbert, M.; Bennett, S. L.; Ostrom, R. K.; Tzouris, A.

    2007-04-01

    GE Security and the Naval Surface Warfare Center, Panama City (NSWC-PC) have collaborated to develop a magnetic gradiometer, called the Real-time Tracking Gradiometer or RTG that is mounted inside an unmanned underwater vehicle (UUV). The RTG is part of a buried mine hunting platform being developed by the United States Navy. The RTG has been successfully used to make test runs on mine-like targets buried off the coast of Florida. We will present a general description of the system and latest results describing system performance. This system can be also potentially used for other applications including those in the area of Homeland Security.

  16. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    PubMed Central

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-01-01

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns. PMID:25521382

  17. 75 FR 24971 - Notice Pursuant to the National Cooperative Research and Production Act of 1993-Intellegere...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-06

    ... Production Act of 1993--Intellegere Foundation Notice is hereby given that, on April 7, 2010, pursuant to Section 6(a) of the National Cooperative Research and Production Act of 1993, 15 U.S.C. 4301 et seq...) to facilitate scientific collaboration by addressing challenges of national security; (b) to promote...

  18. Telemedicine Platform Enhanced visiophony solution to operate a Robot-Companion

    NASA Astrophysics Data System (ADS)

    Simonnet, Th.; Couet, A.; Ezvan, P.; Givernaud, O.; Hillereau, P.

    Nowadays, one of the ways to reduce medical care costs is to reduce the length of patients hospitalization and reinforce home sanitary support by formal (professionals) and non formal (family) caregivers. The aim is to design and operate a scalable and secured collaborative platform to handle specific tools for patients, their families and doctors.

  19. The Appropriate and Effective Use of Security Technologies in U.S. Schools. A Guide for Schools and Law Enforcement Agencies.

    ERIC Educational Resources Information Center

    Green, Mary W.

    This guide provides basic guidelines to help schools, in collaboration with law enforcement agencies, analyze their vulnerability to violence, theft, and vandalism, and suggest possible technologies to effectively address these problems. It describes existing commercially available technologies and urges thoughtful consideration of not only the…

  20. Investigating the Limitations of Advanced Design Methods through Real World Application

    DTIC Science & Technology

    2016-03-31

    36 War Room Laptop Display ( MySQL , JMP 9 Pro, 64-bit Windows) Georgia Tech Secure Collaborative Visualization Environment ( MySQL , JMP 9 Pro...investigate expanding the EA for VC3ATS • Would like to consider both an expansion of the use of current Java -based BPM approach and other potential EA

Top