Multi-Agent Coordination Techniques for Naval Tactical Combat Resources Management
2008-07-01
resource coordination and cooperation problems. The combat resource allocation planning problem is treated in the companion report [2]. 2.3 Resource...report focuses on the resource coordination problem, while allocation algorithms are discussed in the companion report [2]. First, coordination in...classification of each should be indicated as with the title.) Canada’s Leader in Defence and National Security Science and Technology Chef de file au Canada en
Awareness-Enabled Coordination
2006-04-01
contextualization, policy, team coordination. 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY ...CLASSIFICATION OF THIS PAGE 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF ABSTRACT UNCLASSIFIED UNCLASSIFIED UL NSN 7540-01-280... netowrk . Federal Austin FBI DHS CBP BobMary Carol John Alice 1 5 Texas NJ 3 4 1 2 3 4 Xavier Yanni 5 6 2 1 2 4 3 Policy & resource flow n Policies
International Outreach and Coordination Strategy for the National Strategy for Maritime Security
2005-11-01
economic stability of the international community, all nations have a vital interest in ensuring that the maritime domain remains secure and open for the free and legitimate use of all. Public and private entities must work in concert to succeed. Accordingly, in order to enhance global maritime security, the Department of State will leverage its diplomatic resources and influence, while coordinating closely with other components of the US Government, to promote and enhance close cooperation among sovereign nations, international and regional organizations and the maritime
Wang, Zhanqi; Zhang, Hongwei
2017-01-01
As land resources and ecosystems provide necessary materials and conditions for human development, land use change and ecological security play increasingly important roles in sustainable development. This study aims to reveal the mutual-influence and interaction between land use change and ecological security in Wuhan, based on the coupling coordination degree model. As such, it provides strategies for the achievement of the synchronous and coordinated development of urbanization and ecological security. The results showed that, during the period from 2006 to 2012, the size of built-up area in Wuhan increased to 26.16%, and that all the other types of land use reduced due to the urbanization process, which appeared to be the main driving force of land use change. The ecological security in Wuhan has been improving as a whole although it was somewhat held back from 2006 to 2008 due to the rapid growth of built-up area. The coupling coordination analysis revealed that the relationship between built-up area and ecological security was more coordinated after 2008. The results can provide feasible recommendations for land use management and environmental protection from the viewpoint of coordinated development. To achieve sustainable development from economic and ecological perspective, policy makers should control the rate of urban expansion and exert more effort on intensive land use, clean energy development and emission reduction. PMID:29165365
Chai, Ji; Wang, Zhanqi; Zhang, Hongwei
2017-11-22
As land resources and ecosystems provide necessary materials and conditions for human development, land use change and ecological security play increasingly important roles in sustainable development. This study aims to reveal the mutual-influence and interaction between land use change and ecological security in Wuhan, based on the coupling coordination degree model. As such, it provides strategies for the achievement of the synchronous and coordinated development of urbanization and ecological security. The results showed that, during the period from 2006 to 2012, the size of built-up area in Wuhan increased to 26.16%, and that all the other types of land use reduced due to the urbanization process, which appeared to be the main driving force of land use change. The ecological security in Wuhan has been improving as a whole although it was somewhat held back from 2006 to 2008 due to the rapid growth of built-up area. The coupling coordination analysis revealed that the relationship between built-up area and ecological security was more coordinated after 2008. The results can provide feasible recommendations for land use management and environmental protection from the viewpoint of coordinated development. To achieve sustainable development from economic and ecological perspective, policy makers should control the rate of urban expansion and exert more effort on intensive land use, clean energy development and emission reduction.
The Water-Energy-Food Nexus in Kazakhstan: Trends and Analyses
NASA Astrophysics Data System (ADS)
Karatayev, Marat; Rivotti, Pedro; Sobral Mourão, Zenaida; Konadu, D. Dennis; Clarke, Michèle
2017-04-01
The concept of the water, energy and food nexus is extremely relevant to Kazakhstan as the country faces population growth, economic progress and environmental challenges such as water scarcity, desertification, and climate change. Furthermore, poor sectoral coordination and institutional fragmentation have caused an unsustainable resource use and threaten the long-term sustainability of water, energy and food security in Kazakhstan. Specifically, low tariffs in the water and electricity sectors have led to under-investment in water and energy efficiency measures, leading to extensive water losses, soil salinity, as well as degradation of agricultural land. Using the nexus approach, this study aims to investigate and map the linkages between water resources, energy production and food security in Kazakhstan, with an emphasis on the current coordination framework. This will enable the identification of critical interdependency issues in the management of these resources. The results will provide a better understanding of the current interconnectedness of the sectors, and support the coordination of decision-making at various levels of governance and research of land, water and energy to meet sustainable development goals.
ADAPTmap: International coordinated data resource for improving goat production effiency
USDA-ARS?s Scientific Manuscript database
Goats provide vital food and economic security, particularly in developing countries. We created a database that is a nexus for all performance, type, geographic information system (GIS), production environment, and genome information on goats. This resource provides a platform for meta-analysis tha...
78 FR 71629 - Technical Resource for Incident Prevention (TRIPwire) User Registration
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-29
...), Office of Infrastructure Protection (IP), Protective Security Coordination Division (PSCD), Office for... INFORMATION CONTACT: William Cooper, DHS/NPPD/IP/PSCD/OBP, [email protected] . SUPPLEMENTARY...
34 CFR 303.522 - Identification and coordination of resources.
Code of Federal Regulations, 2011 CFR
2011-07-01
... information on the funding sources in paragraph (a)(1) of this section, if a legislative or policy change is... include— (1) Title V of the Social Security Act (relating to Maternal and Child Health); (2) Title XIX of the Social Security Act (relating to the general Medicaid Program, and EPSDT); (3) The Head Start Act...
34 CFR 303.522 - Identification and coordination of resources.
Code of Federal Regulations, 2010 CFR
2010-07-01
... information on the funding sources in paragraph (a)(1) of this section, if a legislative or policy change is... include— (1) Title V of the Social Security Act (relating to Maternal and Child Health); (2) Title XIX of the Social Security Act (relating to the general Medicaid Program, and EPSDT); (3) The Head Start Act...
On the Water-Food Nexus: an Optimization Approach for Water and Food Security
NASA Astrophysics Data System (ADS)
Mortada, Sarah; Abou Najm, Majdi; Yassine, Ali; Alameddine, Ibrahim; El-Fadel, Mutasem
2016-04-01
Water and food security is facing increased challenges with population increase, climate and land use change, as well as resource depletion coupled with pollution and unsustainable practices. Coordinated and effective management of limited natural resources have become an imperative to meet these challenges by optimizing the usage of resources under various constraints. In this study, an optimization model is developed for optimal resource allocation towards sustainable water and food security under nutritional, socio-economic, agricultural, environmental, and natural resources constraints. The core objective of this model is to maximize the composite water-food security status by recommending an optimal water and agricultural strategy. The model balances between the healthy nutritional demand side and the constrained supply side while considering the supply chain in between. It equally ensures that the population achieves recommended nutritional guidelines and population food-preferences by quantifying an optimum agricultural and water policy through transforming optimum food demands into optimum cropping policy given the water and land footprints of each crop or agricultural product. Through this process, water and food security are optimized considering factors that include crop-food transformation (food processing), water footprints, crop yields, climate, blue and green water resources, irrigation efficiency, arable land resources, soil texture, and economic policies. The model performance regarding agricultural practices and sustainable food and water security was successfully tested and verified both at a hypothetical and pilot scale levels.
2005-06-01
need for user-defined dashboard • automated monitoring of web data sources • task driven data aggregation and display Working toward automated processing of task, resource, and intelligence updates
Guidelines for Preventing Workplace Violence for Health Care and Social Service Workers
1998-01-01
commitment, including the endorse- ment and visible involvement of top management , provides the motivation and resources to deal effec- tively with workplace...program to ensure that all managers , supervisors, and employ- ees understand their obligations. • Appropriate allocation of authority and resources to...operations, employee assistance, security, occupational safety and health, legal, and human resources staff. The team or coordinator can review injury
VOLTTRON™: An Agent Platform for Integrating Electric Vehicles and Smart Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Haack, Jereme N.; Akyol, Bora A.; Tenney, Nathan D.
2013-12-06
The VOLTTRON™ platform provides a secure environment for the deployment of intelligent applications in the smart grid. VOLTTRON design is based on the needs of control applications running on small form factor devices, namely security and resource guarantees. Services such as resource discovery, secure agent mobility, and interacting with smart and legacy devices are provided by the platform to ease the development of control applications and accelerate their deployment. VOLTTRON platform has been demonstrated in several different domains that influenced and enhanced its capabilities. This paper will discuss the features of VOLTTRON and highlight its usage to coordinate electric vehiclemore » charging with home energy usage« less
Adversarial Risk Analysis for Urban Security Resource Allocation.
Gil, César; Rios Insua, David; Rios, Jesus
2016-04-01
Adversarial risk analysis (ARA) provides a framework to deal with risks originating from intentional actions of adversaries. We show how ARA may be used to allocate security resources in the protection of urban spaces. We take into account the spatial structure and consider both proactive and reactive measures, in that we aim at both trying to reduce criminality as well as recovering as best as possible from it, should it happen. We deal with the problem by deploying an ARA model over each spatial unit, coordinating the models through resource constraints, value aggregation, and proximity. We illustrate our approach with an example that uncovers several relevant policy issues. © 2016 Society for Risk Analysis.
Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector
2005-06-01
as a computer fraud case investigated by the Secret Service. Each case was analyzed from a behavioral and a technical perspective to identify...insider threat and address the issue from an approach that draws on human resources, corporate security, and information security perspectives. The ... Secret Service National Threat Assessment Center and the CERT Coordination Center of Carnegie Mellon University’s Software Engineering Institute joined
How much spare capacity is necessary for the security of resource networks?
NASA Astrophysics Data System (ADS)
Zhao, Qian-Chuan; Jia, Qing-Shan; Cao, Yang
2007-01-01
The balance between the supply and demand of some kind of resource is critical for the functionality and security of many complex networks. Local contingencies that break this balance can cause a global collapse. These contingencies are usually dealt with by spare capacity, which is costly especially when the network capacity (the total amount of the resource generated/consumed in the network) grows. This paper studies the relationship between the spare capacity and the collapse probability under separation contingencies when the network capacity grows. Our results are obtained based on the analysis of the existence probability of balanced partitions, which is a measure of network security when network splitting is unavoidable. We find that a network with growing capacity will inevitably collapse after a separation contingency if the spare capacity in each island increases slower than a linear function of the network capacity and there is no suitable global coordinator.
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects ofmore » biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation around the following five axes/dimensions: Adapt to the change to global, market-driven dynamics; Address the land, water and resource implications of biofuel policies; Foster the transition from biofuels to comprehensive food-energy policies; Promote research and development; and, Develop methods and guidelines for coordinated food, Biofuels, and bio-energy policies at national and international levels.« less
76 FR 23275 - Allegheny Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-26
... Clarendon, Pennsylvania. The committee is authorized under the Secure Rural Schools and Community Self... inspect comments received at 4 Farm Colony Drive, Warren, Pennsylvania, 16365. Please call ahead to Kathy... CONTACT: Kathy Mohney, RAC Coordinator, Allegheny National Forest Supervisor's Office, 4 Farm Colony Drive...
76 FR 30904 - Allegheny Resource Advisory Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-27
... Clarendon, Pennsylvania. The committee is authorized under the Secure Rural Schools and Community Self... Farm Colony Drive, Warren, Pennsylvania 16365. Please call ahead to Kathy Mohney at (814) 728-6298 to... Coordinator, Allegheny National Forest Supervisor's Office, 4 Farm Colony Drive, Warren, Pennsylvania 16365...
33 CFR 103.200 - Designation of the Federal Maritime Security Coordinator (FMSC).
Code of Federal Regulations, 2010 CFR
2010-07-01
... Maritime Security Coordinator (FMSC). 103.200 Section 103.200 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Federal Maritime Security Coordinator (FMSC) Designation and Authorities § 103.200 Designation of the Federal Maritime...
2010-06-25
Deputy, 711 HPW/XP), Roscoe "Yogi" VanCamp,UCa!. USAF, and Mark Marley, M.A., (project manager ) who were critical to the logistical operations of...national security, and international relations. Understanding basic principles of aviation, crew resource management , communicat ion protocols, geo...ain::raft flight controls, instruments, weight, balance), as well as topics in aircrew coordination (e.g., crew resource management and situational
33 CFR 103.205 - Authority of the COTP as the Federal Maritime Security Coordinator (FMSC).
Code of Federal Regulations, 2010 CFR
2010-07-01
... Federal Maritime Security Coordinator (FMSC). 103.205 Section 103.205 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Federal Maritime Security Coordinator (FMSC) Designation and Authorities § 103.205 Authority of the COTP...
Water security - Nation state and international security implications
Tindall, James A.; Andrew A. Campbell,
2009-01-01
A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.
49 CFR 1549.107 - Security coordinators.
Code of Federal Regulations, 2014 CFR
2014-10-01
... and designated alternate Security Coordinator appointed at the corporate level. In addition, each... corporate level, as well as the facility Security Coordinator and alternate, must be available on a 24-hour... 49 Transportation 9 2014-10-01 2014-10-01 false Security coordinators. 1549.107 Section 1549.107...
49 CFR 1549.107 - Security coordinators.
Code of Federal Regulations, 2010 CFR
2010-10-01
... and designated alternate Security Coordinator appointed at the corporate level. In addition, each... corporate level, as well as the facility Security Coordinator and alternate, must be available on a 24-hour... 49 Transportation 9 2010-10-01 2010-10-01 false Security coordinators. 1549.107 Section 1549.107...
49 CFR 1549.107 - Security coordinators.
Code of Federal Regulations, 2011 CFR
2011-10-01
... and designated alternate Security Coordinator appointed at the corporate level. In addition, each... corporate level, as well as the facility Security Coordinator and alternate, must be available on a 24-hour... 49 Transportation 9 2011-10-01 2011-10-01 false Security coordinators. 1549.107 Section 1549.107...
49 CFR 1549.107 - Security coordinators.
Code of Federal Regulations, 2012 CFR
2012-10-01
... and designated alternate Security Coordinator appointed at the corporate level. In addition, each... corporate level, as well as the facility Security Coordinator and alternate, must be available on a 24-hour... 49 Transportation 9 2012-10-01 2012-10-01 false Security coordinators. 1549.107 Section 1549.107...
49 CFR 1549.107 - Security coordinators.
Code of Federal Regulations, 2013 CFR
2013-10-01
... and designated alternate Security Coordinator appointed at the corporate level. In addition, each... corporate level, as well as the facility Security Coordinator and alternate, must be available on a 24-hour... 49 Transportation 9 2013-10-01 2013-10-01 false Security coordinators. 1549.107 Section 1549.107...
2009 National Intelligence: A Consumer’s Guide
2009-04-01
Program (NIP), formerly known as the National Foreign Intelligence Program ( NFIP ), provides the resources needed to develop and maintain...Clandestine Service NCTC: National Counterterrorism Center NDIC: National Defense Intelligence College (DIA – formerly JMIC) NFIP : National Foreign...Coordination Center (ODNI) NIE: National Intelligence Estimate NIP: National Intelligence Program (formerly NFIP ) NIPRNet: Non-Secure Internet Protocol Router
Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.
Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less
49 CFR 1548.13 - Security coordinators.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 9 2012-10-01 2012-10-01 false Security coordinators. 1548.13 Section 1548.13 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.13 Security...
49 CFR 1548.13 - Security coordinators.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 9 2011-10-01 2011-10-01 false Security coordinators. 1548.13 Section 1548.13 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.13 Security...
49 CFR 1548.13 - Security coordinators.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Security coordinators. 1548.13 Section 1548.13 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.13 Security...
49 CFR 1548.13 - Security coordinators.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Security coordinators. 1548.13 Section 1548.13 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.13 Security...
49 CFR 1548.13 - Security coordinators.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 9 2013-10-01 2013-10-01 false Security coordinators. 1548.13 Section 1548.13 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY INDIRECT AIR CARRIER SECURITY § 1548.13 Security...
49 CFR 1544.215 - Security coordinators.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 49 Transportation 9 2012-10-01 2012-10-01 false Security coordinators. 1544.215 Section 1544.215 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND...
49 CFR 1544.215 - Security coordinators.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 9 2011-10-01 2011-10-01 false Security coordinators. 1544.215 Section 1544.215 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND...
49 CFR 1544.215 - Security coordinators.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 9 2013-10-01 2013-10-01 false Security coordinators. 1544.215 Section 1544.215 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND...
49 CFR 1544.215 - Security coordinators.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Security coordinators. 1544.215 Section 1544.215 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND...
49 CFR 1544.215 - Security coordinators.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 49 Transportation 9 2014-10-01 2014-10-01 false Security coordinators. 1544.215 Section 1544.215 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR SECURITY: AIR CARRIERS AND...
Magnuson, J A; Klockner, Rocke; Ladd-Wilson, Stephen; Zechnich, Andrew; Bangs, Christopher; Kohn, Melvin A
2004-01-01
Electronic emergency department reporting provides the potential for enhancing local and state surveillance capabilities for a wide variety of syndromes and reportable conditions. The task of protecting data confidentiality and integrity while developing electronic data interchange between a hospital emergency department and a state public health department proved more complex than expected. This case study reports on the significant challenges that had to be resolved to accomplish this goal; these included application restrictions and incompatibilities, technical malfunctions, changing standards, and insufficient dedicated resources. One of the key administrative challenges was that of coordinating project security with enterprise security. The original project has evolved into an ongoing pilot, with the health department currently receiving secure data from the emergency department at four-hour intervals. Currently, planning is underway to add more emergency departments to the project.
49 CFR 1580.201 - Rail security coordinator.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 49 Transportation 9 2013-10-01 2013-10-01 false Rail security coordinator. 1580.201 Section 1580.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY RAIL TRANSPORTATION...
49 CFR 1580.201 - Rail security coordinator.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 49 Transportation 9 2011-10-01 2011-10-01 false Rail security coordinator. 1580.201 Section 1580.201 Transportation Other Regulations Relating to Transportation (Continued) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY MARITIME AND LAND TRANSPORTATION SECURITY RAIL TRANSPORTATION...
Quantum coordinated multi-point communication based on entanglement swapping
NASA Astrophysics Data System (ADS)
Du, Gang; Shang, Tao; Liu, Jian-wei
2017-05-01
In a quantum network, adjacent nodes can communicate with each other point to point by using pre-shared Einsten-Podolsky-Rosen (EPR) pairs, and furthermore remote nodes can establish entanglement channels by using quantum routing among intermediate nodes. However, with the rapid development of quantum networks, the demand of various message transmission among nodes inevitably emerges. In order to realize this goal and extend quantum networks, we propose a quantum coordinated multi-point communication scheme based on entanglement swapping. The scheme takes full advantage of EPR pairs between adjacent nodes and performs multi-party entanglement swapping to transmit messages. Considering various demands of communication, all nodes work cooperatively to realize different message transmission modes, including one to many, many to one and one to some. Scheme analysis shows that the proposed scheme can flexibly organize a coordinated group and efficiently use EPR resources, while it meets basic security requirement under the condition of coordinated communication.
[Organization and functioning of health services of the IMSS-Solidaridad program].
Velázquez-Díaz, G
1992-01-01
In this report the organization and performance of the IMSS-Solidaridad Program of Mexico is described. This program is managed by the Mexican Institute for Social Security, which services 10.5 million inhabitants of the rural underserved areas, with federal government resources in 18 states. This study compares the structure and functioning of the IMSS-Solidaridad Program with Local Health Systems, as they have been proposed by the Panamerican Health Organization for country members and by the Ministry of Health of Mexico, particularly in relation to the decision-making process at local level. Some assets and limitations of the IMSS-Solidaridad Program are analyzed and, finally, concrete procedures to improve coordination between the IMSS-Solidaridad Program and other health services for similar populations (populations without social security protection) in Mexico are suggested, with the purpose of using resources more adequately and succeed in the national goal to achieve equity in health.
A Game-Theoretic Response Strategy for Coordinator Attack in Wireless Sensor Networks
Liu, Jianhua; Yue, Guangxue; Shang, Huiliang; Li, Hongjie
2014-01-01
The coordinator is a specific node that controls the whole network and has a significant impact on the performance in cooperative multihop ZigBee wireless sensor networks (ZWSNs). However, the malicious node attacks coordinator nodes in an effort to waste the resources and disrupt the operation of the network. Attacking leads to a failure of one round of communication between the source nodes and destination nodes. Coordinator selection is a technique that can considerably defend against attack and reduce the data delivery delay, and increase network performance of cooperative communications. In this paper, we propose an adaptive coordinator selection algorithm using game and fuzzy logic aiming at both minimizing the average number of hops and maximizing network lifetime. The proposed game model consists of two interrelated formulations: a stochastic game for dynamic defense and a best response policy using evolutionary game formulation for coordinator selection. The stable equilibrium best policy to response defense is obtained from this game model. It is shown that the proposed scheme can improve reliability and save energy during the network lifetime with respect to security. PMID:25105171
A game-theoretic response strategy for coordinator attack in wireless sensor networks.
Liu, Jianhua; Yue, Guangxue; Shen, Shigen; Shang, Huiliang; Li, Hongjie
2014-01-01
The coordinator is a specific node that controls the whole network and has a significant impact on the performance in cooperative multihop ZigBee wireless sensor networks (ZWSNs). However, the malicious node attacks coordinator nodes in an effort to waste the resources and disrupt the operation of the network. Attacking leads to a failure of one round of communication between the source nodes and destination nodes. Coordinator selection is a technique that can considerably defend against attack and reduce the data delivery delay, and increase network performance of cooperative communications. In this paper, we propose an adaptive coordinator selection algorithm using game and fuzzy logic aiming at both minimizing the average number of hops and maximizing network lifetime. The proposed game model consists of two interrelated formulations: a stochastic game for dynamic defense and a best response policy using evolutionary game formulation for coordinator selection. The stable equilibrium best policy to response defense is obtained from this game model. It is shown that the proposed scheme can improve reliability and save energy during the network lifetime with respect to security.
Mathematical model and coordination algorithms for ensuring complex security of an organization
NASA Astrophysics Data System (ADS)
Novoseltsev, V. I.; Orlova, D. E.; Dubrovin, A. S.; Irkhin, V. P.
2018-03-01
The mathematical model of coordination when ensuring complex security of the organization is considered. On the basis of use of a method of casual search three types of algorithms of effective coordination adequate to mismatch level concerning security are developed: a coordination algorithm at domination of instructions of the coordinator; a coordination algorithm at domination of decisions of performers; a coordination algorithm at parity of interests of the coordinator and performers. Assessment of convergence of the algorithms considered above it was made by carrying out a computing experiment. The described algorithms of coordination have property of convergence in the sense stated above. And, the following regularity is revealed: than more simply in the structural relation the algorithm, for the smaller number of iterations is provided to those its convergence.
Reforestation strategies amid social instability: lessons from Afghanistan.
Groninger, John W
2012-04-01
Foreign and domestic government agencies and other international organizations pursue reforestation programs in rural upper watershed areas of Afghanistan over the past decade to alleviate poverty, combat the insurgency and rehabilitate a depleted forest resource base. Popular programs incorporate cash-for-work to conduct hillside terracing, check dam construction and tree-planting for nut production, fuel wood, timber, dune stabilization, and erosion abatement. Programmatic approaches have varied as a function of accessibility, security and local objectives. Uncertain land tenure and use rights, weak local environmental management capacity, and a focus on agricultural production to meet immediate needs limit interest, nationally and locally. Unreliable security, a lack of high quality tree planting stock, limited technical knowledge and coordination among government agencies, and poor security hamper program expansion. Reforestation success would be most likely where these issues are least acute. The Afghan government should focus on supporting community based natural resource management, developing and disseminating improved conservation tree nursery strategies, and promoting watershed management schemes that incorporate forestry, range management and agronomic production. Reforestation practitioners could benefit from the human and material resources now present as part of the international war effort. Successes and failures encountered in Afghanistan should be considered in order to address similar problems in insecure regions elsewhere when reforestation may help reverse environmental degradation and contribute to broader social stabilization efforts.
Reforestation Strategies Amid Social Instability: Lessons from Afghanistan
NASA Astrophysics Data System (ADS)
Groninger, John W.
2012-04-01
Foreign and domestic government agencies and other international organizations pursue reforestation programs in rural upper watershed areas of Afghanistan over the past decade to alleviate poverty, combat the insurgency and rehabilitate a depleted forest resource base. Popular programs incorporate cash-for-work to conduct hillside terracing, check dam construction and tree-planting for nut production, fuel wood, timber, dune stabilization, and erosion abatement. Programmatic approaches have varied as a function of accessibility, security and local objectives. Uncertain land tenure and use rights, weak local environmental management capacity, and a focus on agricultural production to meet immediate needs limit interest, nationally and locally. Unreliable security, a lack of high quality tree planting stock, limited technical knowledge and coordination among government agencies, and poor security hamper program expansion. Reforestation success would be most likely where these issues are least acute. The Afghan government should focus on supporting community based natural resource management, developing and disseminating improved conservation tree nursery strategies, and promoting watershed management schemes that incorporate forestry, range management and agronomic production. Reforestation practitioners could benefit from the human and material resources now present as part of the international war effort. Successes and failures encountered in Afghanistan should be considered in order to address similar problems in insecure regions elsewhere when reforestation may help reverse environmental degradation and contribute to broader social stabilization efforts.
2016-12-01
theory, passenger rail bombing , attacker-defender methodology 15. NUMBER OF PAGES 103 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT...bombers carried out a successful coordinated attack against the London mass transit system in July 2005. Three suicide bombings occurred on trains and...iron rods to make shrapnel. The precise timing indicates the terrorists themselves detonated their own devices. In March 2016, a suicide bomb
U.S.-Canadian Border Security: Lessons Learned from Denmarks Experience with the Schengen Convention
2014-03-01
January 1, 1994, binding the North American continent with similar economic interests and pursuits.10 NAFTA does not deal with security and laws in the...SC). The Department of Homeland Security coordinates U.S. security with representatives from law enforcement, military and civilian entities. Public...European Schengen Convention (SC). The Department of Homeland Security coordinates U.S. security with representatives from law enforcement, military
14 CFR 1203.603 - Systematic review for declassification.
Code of Federal Regulations, 2011 CFR
2011-01-01
... National Security Agency. (3) Systematic review for declassification of classified information pertaining... coordinated through the Central Intelligence Agency. (4) The Chairperson, NASA Information Security Program... guidelines. The Chairperson, NASA Information Security Program Committee, shall develop, in coordination with...
The Impact of Contextual Factors on the Security of Code
2014-12-30
in which a system is resourced, overseen, managed and assured will have a lot to do with how successfully it performs in actual practice. Software is...ensure proper and adequate system assurance . Because of the high degree of skill and specialization required, details about software and systems are...whole has to be carefully coordinated in order to assure against the types of faults that are the basis for most of the exploits listed in the Common
Integrated secure solution for electronic healthcare records sharing
NASA Astrophysics Data System (ADS)
Yao, Yehong; Zhang, Chenghao; Sun, Jianyong; Jin, Jin; Zhang, Jianguo
2007-03-01
The EHR is a secure, real-time, point-of-care, patient-centric information resource for healthcare providers. Many countries and regional districts have set long-term goals to build EHRs, and most of EHRs are usually built based on the integration of different information systems with different information models and platforms. A number of hospitals in Shanghai are also piloting the development of an EHR solution based on IHE XDS/XDS-I profiles with a service-oriented architecture (SOA). The first phase of the project targets the Diagnostic Imaging domain and allows seamless sharing of images and reports across the multiple hospitals. To develop EHRs for regional coordinated healthcare, some factors should be considered in designing architecture, one of which is security issue. In this paper, we present some approaches and policies to improve and strengthen the security among the different hospitals' nodes, which are compliant with the security requirements defined by IHE IT Infrastructure (ITI) Technical Framework. Our security solution includes four components: Time Sync System (TSS), Digital Signature Manage System (DSMS), Data Exchange Control Component (DECC) and Single Sign-On (SSO) System. We give a design method and implementation strategy of these security components, and then evaluate the performance and overheads of the security services or features by integrating the security components into an image-based EHR system.
A Security Architecture for Grid-enabling OGC Web Services
NASA Astrophysics Data System (ADS)
Angelini, Valerio; Petronzio, Luca
2010-05-01
In the proposed presentation we describe an architectural solution for enabling a secure access to Grids and possibly other large scale on-demand processing infrastructures through OGC (Open Geospatial Consortium) Web Services (OWS). This work has been carried out in the context of the security thread of the G-OWS Working Group. G-OWS (gLite enablement of OGC Web Services) is an international open initiative started in 2008 by the European CYCLOPS , GENESI-DR, and DORII Project Consortia in order to collect/coordinate experiences in the enablement of OWS's on top of the gLite Grid middleware. G-OWS investigates the problem of the development of Spatial Data and Information Infrastructures (SDI and SII) based on the Grid/Cloud capacity in order to enable Earth Science applications and tools. Concerning security issues, the integration of OWS compliant infrastructures and gLite Grids needs to address relevant challenges, due to their respective design principles. In fact OWS's are part of a Web based architecture that demands security aspects to other specifications, whereas the gLite middleware implements the Grid paradigm with a strong security model (the gLite Grid Security Infrastructure: GSI). In our work we propose a Security Architectural Framework allowing the seamless use of Grid-enabled OGC Web Services through the federation of existing security systems (mostly web based) with the gLite GSI. This is made possible mediating between different security realms, whose mutual trust is established in advance during the deployment of the system itself. Our architecture is composed of three different security tiers: the user's security system, a specific G-OWS security system, and the gLite Grid Security Infrastructure. Applying the separation-of-concerns principle, each of these tiers is responsible for controlling the access to a well-defined resource set, respectively: the user's organization resources, the geospatial resources and services, and the Grid resources. While the gLite middleware is tied to a consolidated security approach based on X.509 certificates, our system is able to support different kinds of user's security infrastructures. Our central component, the G-OWS Security Framework, is based on the OASIS WS-Trust specifications and on the OGC GeoRM architectural framework. This allows to satisfy advanced requirements such as the enforcement of specific geospatial policies and complex secure web service chained requests. The typical use case is represented by a scientist belonging to a given organization who issues a request to a G-OWS Grid-enabled Web Service. The system initially asks the user to authenticate to his/her organization's security system and, after verification of the user's security credentials, it translates the user's digital identity into a G-OWS identity. This identity is linked to a set of attributes describing the user's access rights to the G-OWS services and resources. Inside the G-OWS Security system, access restrictions are applied making use of the enhanced Geospatial capabilities specified by the OGC GeoXACML. If the required action needs to make use of the Grid environment the system checks if the user is entitled to access a Grid infrastructure. In that case his/her identity is translated to a temporary Grid security token using the Short Lived Credential Services (IGTF Standard). In our case, for the specific gLite Grid infrastructure, some information (VOMS Attributes) is plugged into the Grid Security Token to grant the access to the user's Virtual Organization Grid resources. The resulting token is used to submit the request to the Grid and also by the various gLite middleware elements to verify the user's grants. Basing on the presented framework, the G-OWS Security Working Group developed a prototype, enabling the execution of OGC Web Services on the EGEE Production Grid through the federation with a Shibboleth based security infrastructure. Future plans aim to integrate other Web authentication services such as OpenID, Kerberos and WS-Federation.
Building Partner Capacity/Security Force Assistance: A New Structural Paradigm
2008-03-25
strategies to build partnership for NGO & Intl resources 10) Identify lessons learned & integrate into ops 6) Coordinate R& S with Coalition, IO, NGO, PVO...valid OMB control number. 1. REPORT DATE 15 MAR 2008 2. REPORT TYPE Strategy Research Project 3. DATES COVERED 00-00-2007 to 00-00-2008 4...ELEMENT NUMBER 6. AUTHOR( S ) Scott Wuestner 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME( S ) AND ADDRESS
The Great Game redux: Energy security and the emergence of tripolarity in Eurasia
NASA Astrophysics Data System (ADS)
Ozdamar, Ibrahim Ozgur
Securing energy resources has become a key aspect of foreign policy-making since the 1970s. States have used military and economic foreign policy tools to secure the supply of energy to their domestic markets. With the fall of the USSR in 1991, political and economic competition for penetration into energy-rich regions spread through Eurasia. Inspired from the nineteenth century term to describe Russian-British rivalry in the region, the current rivalry among great powers and their allies is called the "New Great Game". This project analyzes three political conflicts that are shaped by such rivalry that can threaten global energy security. Empirical results from the expected utility model (Bueno de Mesquita 1985) suggest the rivalry among the Western (i.e. EU, US) and Eastern (i.e. Russia, China) powers about the Iranian nuclear program, Nagorno-Karabakh and South Ossetia conflicts is likely to continue and shows some Cold War characteristics. I have also found out the expected outcomes of these conflicts and foreign policy tools and obvious and unseen strategic moves available to actors. The major conclusion of the study is that the EU and US should pursue a coordinated foreign policy and balance the Russian and Chinese influence in the region to secure access to energy resources. Most effective foreign policy tools to achieve such aim appear to be the use of economic relations as leverage against Russia and China and support economic and democratic developments of the newly established republics in Eurasia.
NASA Astrophysics Data System (ADS)
Mignone, B. K.
2008-12-01
Threats to US and global energy security take several forms. First, the overwhelming dependence on oil in the transport sector leaves the US economy (and others) vulnerable to supply shocks and price volatility. Secondly, the global dependence on oil inflates prices and enhances the transfer of wealth to authoritarian regimes. Finally, the global reliance on fossil fuels more generally jeopardizes the stability of the climate system. These three threats - economic, strategic and environmental - can only be mitigated through a gradual substitution away from fossil fuels (both coal and oil) on a global scale. Such large-scale substitution could occur in response to potential resource constraints or in response to coordinated government policies in which these externalities are explicitly internalized. Here, I make use of a well-known integrated assessment model (MERGE) to examine both possibilities. When resource limits are considered alone, global fuel use tends to shift toward even more carbon-intensive resources, like oil shale or liquids derived from coal. On the other hand, when explicit carbon constraints are imposed, the fuel sector response is more complex. Generally, less stringent climate targets can be satisfied entirely through reductions in global coal consumption, while more stringent targets require simultaneous reductions in both coal and oil consumption. Taken together, these model results suggest that resource constraints alone will only exacerbate the climate problem, while a subset of policy-driven carbon constraints may yield tangible security benefits (in the form of reduced global oil consumption) in addition to the intended environmental outcome.
14. Implementation, execution, and completion of projects.
2014-05-01
Once an intervention has been selected for implementation, it becomes a project. Implementation of a project is a complex process and requires completion of a host of tasks. The implementation process has been deconstructed into its components so that it can be analysed and evaluated. A prerequisite for implementation is an operational plan. The tasks that require completion include: (1) reassessing current status and verifying the needs; (2) activating the operational plan; (3) setting-up and operating an administrative structure; (4) identifying, acquiring, and organising resources (including human resources); (5) assigning roles and responsibilities; (6) educating and training personnel (including mission-specific); (7) briefing staff; (8) preparing/readying resources for transport; (9) assuring project self-sufficiency; (10) arranging for personal necessities; (11) ensuring the safety of personnel and the security of equipment and supplies; (12) insuring personnel; (13) coordinating with other projects/actors; (14) coordinating with other BSF systems (role of the coordination and control centre); (15) communicating with community leaders; (16) initiating the use of standardised progress reports; (17) deploying personnel, equipment, and supplies; (18) initiating the intervention(s); (19) executing the intervention(s); (20) reporting start of interventions; (21) completing the project; and (22) completing and submitting a formal report. This deconstruction is essential in order to study the process and identify critical points of success and failure. It also is recognised that many interventions consist of many components (subfunctions), each of which may be considered a production process.
6 CFR 27.120 - Designation of a coordinating official; Consultations and technical assistance.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Designation of a coordinating official; Consultations and technical assistance. 27.120 Section 27.120 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS General § 27.120 Designation of a...
6 CFR 27.120 - Designation of a coordinating official; Consultations and technical assistance.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Designation of a coordinating official; Consultations and technical assistance. 27.120 Section 27.120 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS General § 27.120 Designation of a...
6 CFR 27.120 - Designation of a coordinating official; Consultations and technical assistance.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Designation of a coordinating official; Consultations and technical assistance. 27.120 Section 27.120 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS General § 27.120 Designation of a...
6 CFR 27.120 - Designation of a coordinating official; Consultations and technical assistance.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Designation of a coordinating official; Consultations and technical assistance. 27.120 Section 27.120 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS General § 27.120 Designation of a...
NASA Astrophysics Data System (ADS)
Rose, K.; Rowan, C.; Rager, D.; Dehlin, M.; Baker, D. V.; McIntyre, D.
2015-12-01
Multi-organizational research teams working jointly on projects often encounter problems with discovery, access to relevant existing resources, and data sharing due to large file sizes, inappropriate file formats, or other inefficient options that make collaboration difficult. The Energy Data eXchange (EDX) from Department of Energy's (DOE) National Energy Technology Laboratory (NETL) is an evolving online research environment designed to overcome these challenges in support of DOE's fossil energy goals while offering improved access to data driven products of fossil energy R&D such as datasets, tools, and web applications. In 2011, development of NETL's Energy Data eXchange (EDX) was initiated and offers i) a means for better preserving of NETL's research and development products for future access and re-use, ii) efficient, discoverable access to authoritative, relevant, external resources, and iii) an improved approach and tools to support secure, private collaboration and coordination between multi-organizational teams to meet DOE mission and goals. EDX presently supports fossil energy and SubTER Crosscut research activities, with an ever-growing user base. EDX is built on a heavily customized instance of the open source platform, Comprehensive Knowledge Archive Network (CKAN). EDX connects users to externally relevant data and tools through connecting to external data repositories built on different platforms and other CKAN platforms (e.g. Data.gov). EDX does not download and repost data or tools that already have an online presence. This leads to redundancy and even error. If a relevant resource already has an online instance, is hosted by another online entity, EDX will point users to that external host either using web services, inventorying URLs and other methods. EDX offers users the ability to leverage private-secure capabilities custom built into the system. The team is presently working on version 3 of EDX which will incorporate big data analytical capabilities amongst other advanced features.
Patterns of cooperation: fairness and coordination in networks of interacting agents
NASA Astrophysics Data System (ADS)
Do, Anne-Ly; Rudolf, Lars; Gross, Thilo
2010-06-01
We study the self-assembly of a complex network of collaborations among self-interested agents. The agents can maintain different levels of cooperation with different partners. Further, they continuously, selectively and independently adapt the amount of resources allocated to each of their collaborations in order to maximize the obtained payoff. We show analytically that the system approaches a state in which the agents make identical investments, and links produce identical benefits. Despite this high degree of social coordination, some agents manage to secure privileged topological positions in the network, enabling them to extract high payoffs. Our analytical investigations provide a rationale for the emergence of unidirectional non-reciprocal collaborations and different responses to the withdrawal of a partner from an interaction that have been reported in the psychological literature.
77 FR 260 - Forest Resource Coordinating Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-04
... Resource Coordinating Committee AGENCY: Forest Service, USDA. ACTION: Notice of call for nominations. SUMMARY: The Forest Resource Coordinating Committee (FRCC) is filling eight vacant positions. Candidates who wish to be considered for membership on the Forest Resource Coordinating Committee should submit...
78 FR 73819 - Forest Resource Coordinating Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-09
... DEPARTMENT OF AGRICULTURE Forest Service Forest Resource Coordinating Committee AGENCY: Forest... was required to cancel the October 17-18, 2013 meeting of the Forest Resource Coordinating Committee..., September 17, 2013, Page 57128. FOR FURTHER INFORMATION CONTACT: Maya Solomon, Forest Resource Coordinating...
Organisational Pattern Driven Recovery Mechanisms
NASA Astrophysics Data System (ADS)
Giacomo, Valentina Di; Presenza, Domenico; Riccucci, Carlo
The process of reaction to system failures and security attacks is strongly influenced by its infrastructural, procedural and organisational settings. Analysis of reaction procedures and practices from different domains (Air Traffic Management, Response to Computer Security Incident, Response to emergencies, recovery in Chemical Process Industry) highlight three key requirements for this activity: smooth collaboration and coordination among responders, accurate monitoring and management of resources and ability to adapt pre-established reaction plans to the actual context. The SERENITY Reaction Mechanisms (SRM) is the subsystem of the SERENITY Run-time Framework aimed to provide SERENITY aware AmI settings (i.e. socio-technical systems with highly distributed dynamic services) with functionalities to implement applications specific reaction strategies. The SRM uses SERENITY Organisational S&D Patterns as run-time models to drive these three key functionalities.
NASA Astrophysics Data System (ADS)
Lovett, Kian
Since the dawn of time, humans have engaged in war. In the last 5,600 years of recorded history 14,600 wars have been waged1. The United Nations has sought to save succeeding generations from the scourge of war and to foster peace. Wars have recently taken place in Afghanistan and Iraq. Both countries are now faced with a range of complex problems. In-depth country assessments reveal significant shortcomings in the areas of water, sanitation, health, security and natural resource management. These are key factors when examining environmental security, sustainable development and trans-boundary problems, all of which are issues relevant to the Middle East and Central Asian states. Space technology can be applied to support the reconstruction and development plans for Afghanistan and Iraq; however, there needs to be an investigation and open discussion of how these resources can best be used. Already, agencies within the United Nations possess considerable expertise in the use of space technologies in the area of disaster management. If this capability is to be used, there will need to be inter-agency coordination, not to mention a further expansion and development of the United Nations role in both Afghanistan and Iraq.
49 CFR 33.40 - General provisions.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Priorities Assistance § 33.40 General provisions. (a) TPAS is designed to be largely self-executing. However... immediately contact DOT's Defense Production Act Activities Coordinator, Office of Intelligence, Security, and... rule) to the Defense Production Act Activities Coordinator, Office of Intelligence, Security, and...
49 CFR 33.40 - General provisions.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Priorities Assistance § 33.40 General provisions. (a) TPAS is designed to be largely self-executing. However... immediately contact DOT's Defense Production Act Activities Coordinator, Office of Intelligence, Security, and... rule) to the Defense Production Act Activities Coordinator, Office of Intelligence, Security, and...
20 CFR 416.1030 - Coordination with other agencies.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Coordination with other agencies. 416.1030 Section 416.1030 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Determinations of Disability Administrative Responsibilities and Requirements...
Can experience-based household food security scales help improve food security governance?
Pérez-Escamilla, Rafael
2012-12-01
Experience-based food security scales (EBFSSs) have been shown to be valid across world regions. EBFSSs are increasingly been included in national food and nutrition assessments and food hardship items have been added to regional and global public opinion polls. EBFSSs meet the SMART criteria for identifying useful indicators. And have the potential to help improve accountability, transparency, intersectoral coordination and a more effective and equitable distribution of resources. EBFSSs have increased awareness about food and nutrition insecurity in the court of public opinion. Thus, it's important to understand the potential that EBFSSs have for improving food and nutrition security governance within and across countries. The case of Brazil illustrates the strong likelihood that EBFSSs do have a strong potential to influence food and governance from the national to the municipal level. A recent Gallup World Poll data analysis on the influence of the '2008 food crisis' on food hardship illustrates how even a single item from EBFSSs can help examine if food security governance in different world regions modifies the impact of crises on household food insecurity. Systematic research that bridges across economics, political science, ethics, public health and program evaluation is needed to better understand if and how measurement in general and EBFSSs in particular affect food security governance.
CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 6
2012-12-01
Cyber Security Threat Definition Communicable Noncommunicable Based on Risky Behavior Coordinated Trojan horse programs Threats hidden in a...for Cyber Security Threats Cyber Security Threat Communicable Noncommunicable Risky Behaviors Coordinated Type of Intervention (at the System...types of data are breached. Further, educational materials on risky behaviors (e.g., for home Internet users) as well as recommended guide- lines for
78 FR 57839 - Request for Information on Computer Security Incident Coordination (CSIC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... Institute of Standards and Technology (NIST), United States Department of Commerce. ACTION: Notice, extension of comment period. SUMMARY: NIST is extending the deadline for submitting comments relating to Computer Security Incident Coordination. NIST experienced technical difficulties with receiving email...
78 FR 57128 - Forest Resource Coordinating Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-17
... Solomon, Forest Resource Coordinating Committee Program Coordinator, Cooperative Forestry Staff, 202-205.... Written comments and requests for time for oral comments must be sent to Maya Solomon, Forest Resource...
78 FR 73819 - Forest Resource Coordinating Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-09
... into the Whitten Building. FOR FURTHER INFORMATION CONTACT: Maya Solomon, Forest Resource Coordinating... and requests for time for oral comments must be sent to Maya Solomon, Forest Resource Coordinating...
NASA Astrophysics Data System (ADS)
Boese, Andrea
The German Aerospace Center and German Space Agency DLR has defined internationalisation one of the four pillars of its corporate strategy. Driven by global challenges, national space agencies like DLR are seeking partnerships to contribute to essential societal needs, such as human welfare, sustainability of life, economic development, security, culture and knowledge. All partnerships with both traditional and non-traditional partners must reflect a balanced approach between national requirements and needs of the international community. In view of the challenges emerging from this complexity, endeavours like space exploration must be built on mutual cooperation especially in a challenging political environment. Effective and efficient exploitation of existing expertise, human resources, facilities and infrastructures require consolidated actions of stakeholders, interest groups and authorities. This basic principle applies to any space exploration activity. DLR is among the agencies participating in the International Space Exploration Coordination Group (ISECG) from its beginning in 2007. The strategic goals of DLR regarding space exploration correspond to the purpose of ISECG as a forum to share objectives and plans to take concrete steps towards partnerships for a globally coordinated effort in space exploration. DLR contributes to ISECG publications especially the “Global Exploration Roadmap” and the “Benefits stemming from Space Exploration” to see those messages reflected that support cooperation with internal and external exploration stakeholders in science and technology and communication with those in politics and society. DLR provides input also to other groups engaging in space exploration. However, taking into account limited resources and expected results, the effectiveness of multiple coordination and planning mechanisms needs to be discussed.
18 CFR 740.11 - Federal/State coordination.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 18 Conservation of Power and Water Resources 2 2012-04-01 2012-04-01 false Federal/State coordination. 740.11 Section 740.11 Conservation of Power and Water Resources WATER RESOURCES COUNCIL STATE WATER MANAGEMENT PLANNING PROGRAM § 740.11 Federal/State coordination. The Council will coordinate the...
18 CFR 740.11 - Federal/State coordination.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Federal/State coordination. 740.11 Section 740.11 Conservation of Power and Water Resources WATER RESOURCES COUNCIL STATE WATER MANAGEMENT PLANNING PROGRAM § 740.11 Federal/State coordination. The Council will coordinate the...
18 CFR 740.11 - Federal/State coordination.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 18 Conservation of Power and Water Resources 2 2013-04-01 2012-04-01 true Federal/State coordination. 740.11 Section 740.11 Conservation of Power and Water Resources WATER RESOURCES COUNCIL STATE WATER MANAGEMENT PLANNING PROGRAM § 740.11 Federal/State coordination. The Council will coordinate the...
18 CFR 740.11 - Federal/State coordination.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 18 Conservation of Power and Water Resources 2 2014-04-01 2014-04-01 false Federal/State coordination. 740.11 Section 740.11 Conservation of Power and Water Resources WATER RESOURCES COUNCIL STATE WATER MANAGEMENT PLANNING PROGRAM § 740.11 Federal/State coordination. The Council will coordinate the...
18 CFR 740.11 - Federal/State coordination.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 18 Conservation of Power and Water Resources 2 2011-04-01 2011-04-01 false Federal/State coordination. 740.11 Section 740.11 Conservation of Power and Water Resources WATER RESOURCES COUNCIL STATE WATER MANAGEMENT PLANNING PROGRAM § 740.11 Federal/State coordination. The Council will coordinate the...
NPSS on NASA's IPG: Using CORBA and Globus to Coordinate Multidisciplinary Aeroscience Applications
NASA Technical Reports Server (NTRS)
Lopez, Isaac; Follen, Gregory J.; Gutierrez, Richard; Naiman, Cynthia G.; Foster, Ian; Ginsburg, Brian; Larsson, Olle; Martin, Stuart; Tuecke, Steven; Woodford, David
2000-01-01
Within NASA's High Performance Computing and Communication (HPCC) program, the NASA Glenn Research Center is developing an environment for the analysis/design of aircraft engines called the Numerical Propulsion System Simulation (NPSS). The vision for NPSS is to create a "numerical test cell" enabling full engine simulations overnight on cost-effective computing platforms. To this end, NPSS integrates multiple disciplines such as aerodynamics, structures, and heat transfer and supports "numerical zooming" between O-dimensional to 1-, 2-, and 3-dimensional component engine codes. In order to facilitate the timely and cost-effective capture of complex physical processes, NPSS uses object-oriented technologies such as C++ objects to encapsulate individual engine components and CORBA ORBs for object communication and deployment across heterogeneous computing platforms. Recently, the HPCC program has initiated a concept called the Information Power Grid (IPG), a virtual computing environment that integrates computers and other resources at different sites. IPG implements a range of Grid services such as resource discovery, scheduling, security, instrumentation, and data access, many of which are provided by the Globus toolkit. IPG facilities have the potential to benefit NPSS considerably. For example, NPSS should in principle be able to use Grid services to discover dynamically and then co-schedule the resources required for a particular engine simulation, rather than relying on manual placement of ORBs as at present. Grid services can also be used to initiate simulation components on parallel computers (MPPs) and to address inter-site security issues that currently hinder the coupling of components across multiple sites. These considerations led NASA Glenn and Globus project personnel to formulate a collaborative project designed to evaluate whether and how benefits such as those just listed can be achieved in practice. This project involves firstly development of the basic techniques required to achieve co-existence of commodity object technologies and Grid technologies; and secondly the evaluation of these techniques in the context of NPSS-oriented challenge problems. The work on basic techniques seeks to understand how "commodity" technologies (CORBA, DCOM, Excel, etc.) can be used in concert with specialized "Grid" technologies (for security, MPP scheduling, etc.). In principle, this coordinated use should be straightforward because of the Globus and IPG philosophy of providing low-level Grid mechanisms that can be used to implement a wide variety of application-level programming models. (Globus technologies have previously been used to implement Grid-enabled message-passing libraries, collaborative environments, and parameter study tools, among others.) Results obtained to date are encouraging: we have successfully demonstrated a CORBA to Globus resource manager gateway that allows the use of CORBA RPCs to control submission and execution of programs on workstations and MPPs; a gateway from the CORBA Trader service to the Grid information service; and a preliminary integration of CORBA and Grid security mechanisms. The two challenge problems that we consider are the following: 1) Desktop-controlled parameter study. Here, an Excel spreadsheet is used to define and control a CFD parameter study, via a CORBA interface to a high throughput broker that runs individual cases on different IPG resources. 2) Aviation safety. Here, about 100 near real time jobs running NPSS need to be submitted, run and data returned in near real time. Evaluation will address such issues as time to port, execution time, potential scalability of simulation, and reliability of resources. The full paper will present the following information: 1. A detailed analysis of the requirements that NPSS applications place on IPG. 2. A description of the techniques used to meet these requirements via the coordinated use of CORBA and Globus. 3. A description of results obtained to date in the first two challenge problems.
6 CFR 27.120 - Designation of a coordinating official; Consultations and technical assistance.
Code of Federal Regulations, 2010 CFR
2010-01-01
... covered facility shall submit a written request for consultation or technical assistance to the...; Consultations and technical assistance. 27.120 Section 27.120 Domestic Security DEPARTMENT OF HOMELAND SECURITY... coordinating official; Consultations and technical assistance. (a) The Assistant Secretary will designate a...
Resources planning for radiological incidents management
NASA Astrophysics Data System (ADS)
Hamid, Amy Hamijah binti Ab.; Rozan, Mohd Zaidi Abd; Ibrahim, Roliana; Deris, Safaai; Yunus, Muhd. Noor Muhd.
2017-01-01
Disastrous radiation and nuclear meltdown require an intricate scale of emergency health and social care capacity planning framework. In Malaysia, multiple agencies are responsible for implementing radiological and nuclear safety and security. This research project focused on the Radiological Trauma Triage (RTT) System. This system applies patient's classification based on their injury and level of radiation sickness. This classification prioritizes on the diagnostic and treatment of the casualties which include resources estimation of the medical delivery system supply and demand. Also, this system consists of the leading rescue agency organization and disaster coordinator, as well as the technical support and radiological medical response teams. This research implemented and developed the resources planning simulator for radiological incidents management. The objective of the simulator is to assist the authorities in planning their resources while managing the radiological incidents within the Internal Treatment Area (ITA), Reception Area Treatment (RAT) and Hospital Care Treatment (HCT) phases. The majority (75%) of the stakeholders and experts, who had been interviewed, witnessed and accepted that the simulator would be effective to resolve various types of disaster and resources management issues.
NASA Technical Reports Server (NTRS)
Ruane, Alex; Rosenzweig, Cynthia; Elliott, Joshua; Antle, John
2015-01-01
The Agricultural Model Intercomparison and Improvement Project (AgMIP) has been working since 2010 to construct a protocol-based framework enabling regional assessments (led by regional experts and modelers) that can provide consistent inputs to global economic and integrated assessment models. These global models can then relay important global-level information that drive regional decision-making and outcomes throughout an interconnected agricultural system. AgMIPs community of nearly 800 climate, crop, livestock, economics, and IT experts has improved the state-of-the-art through model intercomparisons, validation exercises, regional integrated assessments, and the launch of AgMIP programs on all six arable continents. AgMIP is now launching Coordinated Global and Regional Assessments (CGRA) of climate change impacts on agriculture and food security to link global and regional crop and economic models using a protocol-based framework. The CGRA protocols are being developed to utilize historical observations, climate projections, and RCPsSSPs from CMIP5 (and potentially CMIP6), and will examine stakeholder-driven agricultural development and adaptation scenarios to provide cutting-edge assessments of climate changes impact on agriculture and food security. These protocols will build on the foundation of established protocols from AgMIPs 30+ activities, and will emphasize the use of multiple models, scenarios, and scales to enable an accurate assessment of related uncertainties. The CGRA is also designed to provide the outputs necessary to feed into integrated assessment models (IAMs), nutrition and food security assessments, nitrogen and carbon cycle models, and additional impact-sector assessments (e.g., water resources, land-use, biomes, urban areas). This presentation will describe the current status of CGRA planning and initial prototype experiments to demonstrate key aspects of the protocols before wider implementation ahead of the IPCC Sixth Assessment Report.
NASA Astrophysics Data System (ADS)
Ruane, A. C.; Rosenzweig, C.; Antle, J. M.; Elliott, J. W.
2015-12-01
The Agricultural Model Intercomparison and Improvement Project (AgMIP) has been working since 2010 to construct a protocol-based framework enabling regional assessments (led by regional experts and modelers) that can provide consistent inputs to global economic and integrated assessment models. These global models can then relay important global-level information that drive regional decision-making and outcomes throughout an interconnected agricultural system. AgMIP's community of nearly 800 climate, crop, livestock, economics, and IT experts has improved the state-of-the-art through model intercomparisons, validation exercises, regional integrated assessments, and the launch of AgMIP programs on all six arable continents. AgMIP is now launching Coordinated Global and Regional Assessments (CGRA) of climate change impacts on agriculture and food security to link global and regional crop and economic models using a protocol-based framework. The CGRA protocols are being developed to utilize historical observations, climate projections, and RCPs/SSPs from CMIP5 (and potentially CMIP6), and will examine stakeholder-driven agricultural development and adaptation scenarios to provide cutting-edge assessments of climate change's impact on agriculture and food security. These protocols will build on the foundation of established protocols from AgMIP's 30+ activities, and will emphasize the use of multiple models, scenarios, and scales to enable an accurate assessment of related uncertainties. The CGRA is also designed to provide the outputs necessary to feed into integrated assessment models (IAMs), nutrition and food security assessments, nitrogen and carbon cycle models, and additional impact-sector assessments (e.g., water resources, land-use, biomes, urban areas). This presentation will describe the current status of CGRA planning and initial prototype experiments to demonstrate key aspects of the protocols before wider implementation ahead of the IPCC Sixth Assessment Report.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... operations center for the Department of Homeland Security.'' Through the NOC, OPS provides real-time...-003 Operations Collection, Planning, Coordination, Reporting, Analysis, and Fusion System of Records... System of Records.'' The DHS/OPS-003 Operations Collection, Planning, Coordination, Reporting, Analysis...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-19
... Indirect Stock Transfers and Coordination Rule Exceptions; Transfers of Stock or Securities in Outbound... issue of the Federal Register, the IRS and the Treasury Department are issuing temporary regulations... stock transfers for certain outbound asset reorganizations. The temporary regulations also modify the...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-15
... DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of the National Coordinator for Health Information Technology; HIT Policy Committee's Privacy & Security Tiger Team Meeting; Notice of Meeting AGENCY: Office of... of Committee: HIT Policy Committee's Privacy & Security Tiger Team. General Function of the Committee...
78 FR 37781 - Forest Resource Coordinating Committee; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-24
... DEPARTMENT OF AGRICULTURE Forest Service Forest Resource Coordinating Committee; Meeting AGENCY: Forest Service, USDA. ACTION: Notice of meeting; Correction. SUMMARY: The Forest Service published a... teleconference line. FOR FURTHER INFORMATION CONTACT: Maya Solomon, Forest Resource Coordinating Committee...
NASA Astrophysics Data System (ADS)
Wang, Qiang
2017-09-01
As an important part of software engineering, the software process decides the success or failure of software product. The design and development feature of security software process is discussed, so is the necessity and the present significance of using such process. Coordinating the function software, the process for security software and its testing are deeply discussed. The process includes requirement analysis, design, coding, debug and testing, submission and maintenance. In each process, the paper proposed the subprocesses to support software security. As an example, the paper introduces the above process into the power information platform.
48 CFR 225.870-8 - Industrial security.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 3 2012-10-01 2012-10-01 false Industrial security. 225... Coordination 225.870-8 Industrial security. Industrial security for Canada shall be in accordance with the U.S.-Canada Industrial Security Agreement of March 31, 1952, as amended. ...
48 CFR 225.870-8 - Industrial security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 3 2011-10-01 2011-10-01 false Industrial security. 225... Coordination 225.870-8 Industrial security. Industrial security for Canada shall be in accordance with the U.S.-Canada Industrial Security Agreement of March 31, 1952, as amended. ...
48 CFR 225.870-8 - Industrial security.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 3 2014-10-01 2014-10-01 false Industrial security. 225... Coordination 225.870-8 Industrial security. Industrial security for Canada shall be in accordance with the U.S.-Canada Industrial Security Agreement of March 31, 1952, as amended. ...
48 CFR 225.870-8 - Industrial security.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Industrial security. 225... Coordination 225.870-8 Industrial security. Industrial security for Canada shall be in accordance with the U.S.-Canada Industrial Security Agreement of March 31, 1952, as amended. ...
48 CFR 225.870-8 - Industrial security.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 3 2013-10-01 2013-10-01 false Industrial security. 225... Coordination 225.870-8 Industrial security. Industrial security for Canada shall be in accordance with the U.S.-Canada Industrial Security Agreement of March 31, 1952, as amended. ...
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2014 CFR
2014-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2013 CFR
2013-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2012 CFR
2012-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2010 CFR
2010-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
49 CFR 1542.3 - Airport security coordinator.
Code of Federal Regulations, 2011 CFR
2011-10-01
... the airport operator's primary and immediate contact for security-related activities and... frequency all security-related functions to ensure that all are effective and in compliance with this part... for any instance of non-compliance with this part, its security program, and applicable Security...
Climate-smart agriculture for food security
NASA Astrophysics Data System (ADS)
Lipper, Leslie; Thornton, Philip; Campbell, Bruce M.; Baedeker, Tobias; Braimoh, Ademola; Bwalya, Martin; Caron, Patrick; Cattaneo, Andrea; Garrity, Dennis; Henry, Kevin; Hottle, Ryan; Jackson, Louise; Jarvis, Andrew; Kossam, Fred; Mann, Wendy; McCarthy, Nancy; Meybeck, Alexandre; Neufeldt, Henry; Remington, Tom; Sen, Pham Thi; Sessa, Reuben; Shula, Reynolds; Tibu, Austin; Torquebiau, Emmanuel F.
2014-12-01
Climate-smart agriculture (CSA) is an approach for transforming and reorienting agricultural systems to support food security under the new realities of climate change. Widespread changes in rainfall and temperature patterns threaten agricultural production and increase the vulnerability of people dependent on agriculture for their livelihoods, which includes most of the world's poor. Climate change disrupts food markets, posing population-wide risks to food supply. Threats can be reduced by increasing the adaptive capacity of farmers as well as increasing resilience and resource use efficiency in agricultural production systems. CSA promotes coordinated actions by farmers, researchers, private sector, civil society and policymakers towards climate-resilient pathways through four main action areas: (1) building evidence; (2) increasing local institutional effectiveness; (3) fostering coherence between climate and agricultural policies; and (4) linking climate and agricultural financing. CSA differs from 'business-as-usual' approaches by emphasizing the capacity to implement flexible, context-specific solutions, supported by innovative policy and financing actions.
15 CFR 930.34 - Federal and State agency coordination.
Code of Federal Regulations, 2010 CFR
2010-01-01
... RESOURCE MANAGEMENT FEDERAL CONSISTENCY WITH APPROVED COASTAL MANAGEMENT PROGRAMS Consistency for Federal... use or resource. To facilitate State agency review, Federal agencies should coordinate with the State... coordination of Federal agency activities which affect any coastal use or resource. State agency notification...
49 CFR 1549.103 - Qualifications and training of individuals with security-related duties.
Code of Federal Regulations, 2010 CFR
2010-10-01
... with security-related duties. (a) Security threat assessments. Each certified cargo screening facility... certified cargo screening facility complete a security threat assessment or comparable security threat... acuity, physical coordination, and motor skills to the extent required to effectively operate cargo...
NASA Technical Reports Server (NTRS)
Skeberdis, Daniel
2016-01-01
This is a presentation at the MOWG fall meeting that will discuss CCS purpose, future status, security enhancements, arbitrary ephemeris mission features, overview of CCS 7.3, approach for the use of NORAD TLEs, account and data security, CCS System virtualization, control box visualization modification and other enhancements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... establishment of a new human resources management system within the Department of Homeland Security (DHS), as...
78 FR 6806 - Forest Resource Coordinating Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-31
...: Maya Solomon, 1400 Independence Ave. SW., mailstop 1123, Washington, DC 20250 or by email to... CONTACT: Maya Solomon, Forest Resource Coordinating Committee Program Coordinator, Cooperative Forestry...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wu, Di; Lian, Jianming; Sun, Yannan
Demand response is representing a significant but largely untapped resource that can greatly enhance the flexibility and reliability of power systems. In this paper, a hierarchical control framework is proposed to facilitate the integrated coordination between distributed energy resources and demand response. The proposed framework consists of coordination and device layers. In the coordination layer, various resource aggregations are optimally coordinated in a distributed manner to achieve the system-level objectives. In the device layer, individual resources are controlled in real time to follow the optimal power generation or consumption dispatched from the coordination layer. For the purpose of practical applications,more » a method is presented to determine the utility functions of controllable loads by taking into account the real-time load dynamics and the preferences of individual customers. The effectiveness of the proposed framework is validated by detailed simulation studies.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
NSTec Environmental Restoration
Homeland Security Presidential Directive HSPD-5 requires all federal departments and agencies to adopt a National Incident Management System (NIMS)/Incident Command System (ICS) and use it in their individual domestic incident management and emergency prevention, preparedness, response, recovery, and mitigation programs and activities, as well as in support of those actions taken to assist state and local entities. This system provides a consistent nationwide template to enable federal, state, local, and tribal governments, private-sector, and nongovernmental organizations to work together effectively and efficiently to prepare for, prevent, respond to, and recover from domestic incidents, regardless of cause, size, or complexity, includingmore » acts of catastrophic terrorism. This document identifies the operational concepts of the Federal Radiological Monitoring and Assessment Center's (FRMAC) implementation of the NIMS/ICS response structure under the National Response Plan (NRP). The construct identified here defines the basic response template to be tailored to the incident-specific response requirements. FRMAC's mission to facilitate interagency environmental data management, monitoring, sampling, analysis, and assessment and link this information to the planning and decision staff clearly places the FRMAC in the Planning Section. FRMAC is not a mitigating resource for radiological contamination but is present to conduct radiological impact assessment for public dose avoidance. Field monitoring is a fact-finding mission to support this effort directly. Decisions based on the assessed data will drive public protection and operational requirements. This organizational structure under NIMS is focused by the mission responsibilities and interface requirements following the premise to provide emergency responders with a flexible yet standardized structure for incident response activities. The coordination responsibilities outlined in the NRP are based on the NIMS/ICS construct and Unified Command (UC) for management of a domestic incident. The NRP Nuclear/Radiological Incident Annex (NUC) further provides requirements and protocols for coordinating federal government capabilities to respond to nuclear/radiological Incidents of National Significance (INS) and other radiological incidents. When a FRMAC is established, it operates under the parameters of NIMS as defined in the NRP. FRMAC and its operations have been modified to reflect NIMS/ICS concepts and principles and to facilitate working in a Unified Command structure. FRMAC is established at or near the scene of the incident to coordinate radiological monitoring and assessment and is established in coordination with the U.S. Department of Homeland Security (DHS); the coordinating agency; other federal agencies; and state, local, and tribal authorities. However, regardless of the coordinating agency designation, U.S. Department of Energy (DOE) coordinates radiological monitoring and assessment activities for the initial phases of the offsite federal incident response through the Radiological Assistance Program (RAP) and FRMAC assets. Monitoring and assessment data are managed by FRMAC in an accountable, secure, and retrievable format. Monitoring data interpretations, including exposure rate contours, dose projections, and any requested radiological assessments are to be provided to the DHS; to the coordinating agency; and to state, local, and tribal government agencies.« less
... Coordinating Committees CounterACT Rigor & Transparency Scientific Resources Animal Models Cell/Tissue/DNA Clinical and Translational Resources Gene ... Coordinating Committees CounterACT Rigor & Transparency Scientific Resources Animal Models Cell/Tissue/DNA Clinical and Translational Resources Gene ...
The Water-Energy-Food Nexus in a Rapidly Developing Resource Sector
NASA Astrophysics Data System (ADS)
Allen, D. M.; Kirste, D. M.
2014-12-01
Technological advances and access to global markets have changed the rate at which resource exploitation takes place. The environmental impact of the rapid development and distribution of resources such as minerals and hydrocarbons has led to a greater potential for significant stress on water resources both in terms of quality and quantity. How and where those impacts manifest is crucial to determining appropriate risk management strategies. North East British Columbia has an abundance of shale gas reserves that are anticipated to be exploited at a large scale in coming years, primarily for export as liquefied natural gas (LNG). However, there is growing concern that fracking and other activities related to shale gas development pose risks to water quality and quantity in the region. Water lies at the center of the water-energy-food nexus, with an accelerating water demand for fracking and industrial operations as well as for domestic, environmental and agricultural uses. Climate change is also anticipated to alter the hydrologic regime, posing added stress to the water resource. This case study examines the water-energy-food nexus in the context of a region that is impacted by a rapidly developing resource sector, encompassing water demand/supply, climate change, interaction between deep aquifers and shallow aquifers/surface waters, water quality concerns related to fracking, land use disturbance, and community impacts. Due to the rapid rate of development, there are significant knowledge gaps in our understanding of the water resource. Currently agencies are undertaking water resource assessments and establishing monitoring sites. This research aims to assess water security in North East British Columbia in a coordinated fashion through various partnerships. In addition to collecting baseline knowledge and data, the study will evaluate risk and resilience indicators in relation to water security. A risk assessment framework specific to the shale gas development context will be developed to evaluate the various components of risk spatially and temporally. Resilience is currently being assessed through a comprehensive examination of the current regulatory and policy regime.
Blyth, Karen; Carter, Phil; Morrissey, Bethny; Chelala, Claude; Jones, Louise; Holen, Ingunn; Speirs, Valerie
2016-04-01
Animal models have contributed to our understanding of breast cancer, with publication of results in high-impact journals almost invariably requiring extensive in vivo experimentation. As such, many laboratories hold large collections of surplus animal material, with only a fraction being used in publications relating to the original projects. Despite being developed at considerable cost, this material is an invisible and hence an underutilised resource, which often ends up being discarded. Within the breast cancer research community there is both a need and desire to make this valuable material available for researchers. Lack of a coordinated system for visualisation and localisation of this has prevented progress. To fulfil this unmet need, we have developed a novel initiative called Sharing Experimental Animal Resources: Coordinating Holdings-Breast (SEARCHBreast) which facilitates sharing of archival tissue between researchers on a collaborative basis and, de facto will reduce overall usage of animal models in breast cancer research. A secure searchable database has been developed where researchers can find, share, or upload materials related to animal models of breast cancer, including genetic and transplant models. SEARCHBreast is a virtual compendium where the physical material remains with the original laboratory. A bioanalysis pipeline is being developed for the analysis of transcriptomics data associated with mouse models, allowing comparative study with human and cell line data. Additionally, SEARCHBreast is committed to promoting the use of humanised breast tissue models as replacement alternatives to animals. Access to this unique resource is freely available to all academic researchers following registration at https://searchbreast.org.
... Coordinating Committees CounterACT Rigor & Transparency Scientific Resources Animal Models Cell/Tissue/DNA Clinical and Translational Resources Gene ... Coordinating Committees CounterACT Rigor & Transparency Scientific Resources Animal Models Cell/Tissue/DNA Clinical and Translational Resources Gene ...
Code of Federal Regulations, 2010 CFR
2010-10-01
... information requested by TSA concerning Security Threat Assessments. (viii) A statement acknowledging and ensuring that each individual will successfully complete a Security Threat Assessment under § 1549.111... Security Coordinator for an applicant successfully completes a security threat assessment, TSA will provide...
Vehicle coordinated transportation dispatching model base on multiple crisis locations
NASA Astrophysics Data System (ADS)
Tian, Ran; Li, Shanwei; Yang, Guoying
2018-05-01
Many disastrous events are often caused after unconventional emergencies occur, and the requirements of disasters are often different. It is difficult for a single emergency resource center to satisfy such requirements at the same time. Therefore, how to coordinate the emergency resources stored by multiple emergency resource centers to various disaster sites requires the coordinated transportation of emergency vehicles. In this paper, according to the problem of emergency logistics coordination scheduling, based on the related constraints of emergency logistics transportation, an emergency resource scheduling model based on multiple disasters is established.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greenberg, Raymond; Watson, Erica E.; Morris, Frederic A.
2009-10-07
The Global Threat Reduction Initiative (GTRI) reduces and protects vulnerable nuclear and radiological material located at civilian sites worldwide. The GTRI program has worked successfully to remove and protect nuclear and radioactive materials, including orphaned and disused high-activity sources, and is now working to ensure sustainability. Internationally, over 40 countries are cooperating with GTRI to enhance the security of radiological materials. GTRI is now seeking to develop and enhance sustainability by coordinating its resources with those of the partner country, other donor countries, and international organizations such as the International Atomic Energy Agency (IAEA).
SPAR: a security- and power-aware routing protocol for wireless ad hoc and sensor networks
NASA Astrophysics Data System (ADS)
Oberoi, Vikram; Chigan, Chunxiao
2005-05-01
Wireless Ad Hoc and Sensor Networks (WAHSNs) are vulnerable to extensive attacks as well as severe resource constraints. To fulfill the security needs, many security enhancements have been proposed. Like wise, from resource constraint perspective, many power aware schemes have been proposed to save the battery power. However, we observe that for the severely resource limited and extremely vulnerable WAHSNs, taking security or power (or any other resource) alone into consideration for protocol design is rather inadequate toward the truly "secure-and-useful" WAHSNs. For example, from resource constraint perspective, we identify one of the potential problems, the Security-Capable-Congestion (SCC) behavior, for the WAHSNs routing protocols where only the security are concerned. On the other hand, the design approach where only scarce resource is concerned, such as many power-aware WAHSNs protocols, leaves security unconsidered and is undesirable to many WAHSNs application scenarios. Motivated by these observations, we propose a co-design approach, where both the high security and effective resource consumption are targeted for WAHSNs protocol design. Specifically, we propose a novel routing protocol, Security- and Power- Aware Routing (SPAR) protocol based on this co-design approach. In SPAR, the routing decisions are made based on both security and power as routing criteria. The idea of the SPAR mechanism is routing protocol independent and therefore can be broadly integrated into any of the existing WAHSNs routing protocols. The simulation results show that SPAR outperforms the WAHSNs routing protocols where security or power alone is considered, significantly. This research finding demonstrates the proposed security- and resource- aware co-design approach is promising towards the truly "secure-and-useful" WAHSNs.
47 CFR 0.181 - The Defense Commissioner.
Code of Federal Regulations, 2010 CFR
2010-10-01
... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...
47 CFR 0.181 - The Defense Commissioner.
Code of Federal Regulations, 2011 CFR
2011-10-01
... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...
47 CFR 0.181 - The Defense Commissioner.
Code of Federal Regulations, 2014 CFR
2014-10-01
... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...
47 CFR 0.181 - The Defense Commissioner.
Code of Federal Regulations, 2013 CFR
2013-10-01
... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...
47 CFR 0.181 - The Defense Commissioner.
Code of Federal Regulations, 2012 CFR
2012-10-01
... designated by the Commission. The Defense Commissioner directs the homeland security, national security and..., departments, or agencies. (c) To act as the Homeland Security and Defense Coordinator in representations with... emergency, the Defense Commissioner, in consultation with the Chief, Public Safety and Homeland Security...
48 CFR 1339.107-70 - Information security.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 5 2014-10-01 2014-10-01 false Information security. 1339... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... coordinate with the designated Contracting Officer Representative (COR) to complete the Information Security...
48 CFR 1339.107-70 - Information security.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 5 2011-10-01 2011-10-01 false Information security. 1339... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... coordinate with the designated Contracting Officer Representative (COR) to complete the Information Security...
48 CFR 1339.107-70 - Information security.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 5 2013-10-01 2013-10-01 false Information security. 1339... CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 1339.107-70 Information security. (a... coordinate with the designated Contracting Officer Representative (COR) to complete the Information Security...
49 CFR 1522.107 - Application.
Code of Federal Regulations, 2010 CFR
2010-10-01
... security threat assessments. (8) A statement acknowledging that all personnel of the applicant who must successfully complete a security threat assessment under the requirements of this part must do so before the... the Security Coordinator successfully completes a security threat assessment, TSA will provide to the...
49 CFR 1.27 - Delegations to the General Counsel.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) (Security and research and development activities), as implemented by 49 CFR part 15 (Protection of Sensitive Security Information), relating to the determination that information is Sensitive Security Information, in consultation and coordination with the Office of Intelligence, Security and Emergency Response...
49 CFR 1.27 - Delegations to the General Counsel.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) (Security and research and development activities), as implemented by 49 CFR part 15 (Protection of Sensitive Security Information), relating to the determination that information is Sensitive Security Information, in consultation and coordination with the Office of Intelligence, Security and Emergency Response...
49 CFR 1.27 - Delegations to the General Counsel.
Code of Federal Regulations, 2014 CFR
2014-10-01
...) (Security and research and development activities), as implemented by 49 CFR part 15 (Protection of Sensitive Security Information), relating to the determination that information is Sensitive Security Information, in consultation and coordination with the Office of Intelligence, Security and Emergency Response...
Dattalo, M; Wise, M; Ford Ii, J H; Abramson, B; Mahoney, J
2017-04-01
As of October 2016, use of federal Older Americans Act funds for health promotion and disease prevention will be restricted to the Administration on Aging's criteria for high-level evidence-based health promotion programs. Dissemination of these programs to rural communities remains limited. Therefore a strong need exists to identify strategies that facilitate program implementation and sustainability. The objective of this study was to compare organizational readiness and implementation strategies used by rural communities that achieved varying levels of success in sustaining evidence-based health promotion programs for older adults. We utilized a qualitative multi-site case study design to analyze the longitudinal experiences of eight rural sites working to implement evidence-based health promotion program over 3 years (8/2012-7/2015). Multiple sources of data (interviews, documents, reports, surveys) from each site informed the analysis. We used conventional content analysis to conduct a cross-case comparison to identify common features of rural counties that successfully implemented and sustained their target evidence-based health promotion program. Readiness to implement evidence-based programs as low at baseline as all site leaders described needing to secure additional resources for program implementation. Sites that successfully utilized six essential resources implemented and sustained greater numbers of workshops: (1) External Partnerships, (2) Agency Leadership Commitment, (3) Ongoing Source of Workshop Leaders, (4) Health Promotion Coordination Tasks Assigned to Specific Staff, (5) Organizational Stability, and (6) Change Team Engagement. The six essential resources described in this study can help rural communities assess their readiness to implement health promotion programs and work secure the resources necessary for successful implementation.
Ondoa, Pascale; Datema, Tjeerd; Keita-Sow, Mah-Sere; Ndihokubwayo, Jean-Bosco; Isadore, Jocelyn; Oskam, Linda; Nkengasong, John; Lewis, Kim
2016-01-01
Functional national laboratory networks and systems are indispensable to the achievement of global health security targets according to the International Health Regulations. The lack of indicators to measure the functionality of national laboratory network has limited the efficiency of past and current interventions to enhance laboratory capacity in resource-limited-settings. We have developed a matrix for the assessment of national laboratory network functionality and progress thereof, with support from the African Society of Laboratory Medicine and the Association of Public Health Laboratories. The laboratory network (LABNET) scorecard was designed to: (1) Measure the status of nine overarching core capabilities of laboratory network required to achieve global health security targets, as recommended by the main normative standards; (2) Complement the World Health Organization joint external evaluation tool for the assessment of health system preparedness to International Health Regulations (2005) by providing detailed information on laboratory systems; and (3) Serve as a clear roadmap to guide the stepwise implementation of laboratory capability to prevent, detect and act upon infectious threats. The application of the LABNET scorecard under the coordination of the African Society of Laboratory Medicine and the Association of Public Health Laboratories could contribute to the design, monitoring and evaluation of upcoming Global Health Security Agenda-supported laboratory capacity building programmes in sub Saharan-Africa and other resource-limited settings, and inform the development of national laboratory policies and strategic plans. Endorsement by the World Health Organization Regional Office for Africa is foreseen.
2013-07-18
VA) • DFAS • Human Resources - HR Shared Services (Indianapolis, IN) • Personnel Security - HR Shared Services (Indianapolis, IN) DHRA...Security (Camp Lejeune) No Yes Yes AAFES Human Resources No No No Force Protection Yes Yes Yes DFAS Human Resources - HR Shared Services No...No No Personnel Security - HR Shared Services Yes Yes Yes DLA Human Resources No No Yes Personnel Security Yes Yes Yes DoDEA Human
DOT National Transportation Integrated Search
2000-05-01
The member countries of the Organization of American States (OAS) have recognized that a coordinated multilateral approach to improving port security in the Western Hemisphere is needed and has established a Technical Advisory Group on Port Security ...
14 CFR 1274.937 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2012 CFR
2012-01-01
... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...
14 CFR 1274.937 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2013 CFR
2013-01-01
... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...
14 CFR 1274.937 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2011 CFR
2011-01-01
... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...
14 CFR 1274.937 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2010 CFR
2010-01-01
... information technology resources. 1274.937 Section 1274.937 Aeronautics and Space NATIONAL AERONAUTICS AND... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...
76 FR 17106 - Secure Rural Schools Resource Advisory Committee (RAC) Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-28
... DEPARTMENT OF AGRICULTURE Forest Service Secure Rural Schools Resource Advisory Committee (RAC... meeting to be held authorized under the Secure Rural Schools Act and Community Self-Determination Act... federally designated Secure Rural Schools Resource Advisory Committee (RAC). The public is invited to attend...
Ten years research activities in Earth observation at the Cyprus University of Technology
NASA Astrophysics Data System (ADS)
Hadjimitsis, Diofantos G.; Themistocleous, Kyriacos; Agapiou, Athos; Mamouri, Rodanthi; Nisantzi, Argyro; Papoutsa, Christiana; Tzouvaras, Marios; Neoclous, Kyriacos; Mettas, Christodoulos; Michaelides, Silas
2017-09-01
This paper presents the achievements for the last 10 years of the Remote Sensing and Geo-Environment Laboratory of the Cyprus University of Technology in the Earth observation through the ERATOSTHENES Research Centre. Over the past 10 years, the Centre has secured competitive research funding from various sources, such as the European Commission, the Cyprus Research Promotion Foundation, as well as industrial partners, having participated either as a coordinator or as a partner in more than 60 research projects. The research activities of the Centre encompass remote sensing and GIS applications in the fields of Cultural Heritage, Agriculture, Water Resource Management, Environment, Infrastructure, Marine Spatial Planning, Atmospheric, Air Pollution and Coastal Applications, Natural Resource Management and Hazard Assessment. The aim of this paper is to map the existing activities and identify the future trends and goals of the Eratosthenes Research Centre for the next 15 years.
Water reform in the Murray-Darling Basin
NASA Astrophysics Data System (ADS)
Connell, Daniel; Grafton, R. Quentin
2011-12-01
In Australia's Murray-Darling Basin the Australian and state governments are attempting to introduce a system of water management that will halt ongoing decline in environmental conditions and resource security and provide a robust foundation for managing climate change. This parallels similar efforts being undertaken in regions such as southern Africa, the southern United States, and Spain. Central to the project is the Australian government's Water Act 2007, which requires the preparation of a comprehensive basin plan expected to be finalized in 2011. This paper places recent and expected developments occurring as part of this process in their historical context and examines factors that could affect implementation. Significant challenges to the success of the basin plan include human resource constraints, legislative tensions within the Australian federal system, difficulties in coordinating the network of water-related agencies in the six jurisdictions with responsibilities in the Murray-Darling Basin, and social, economic, and environmental limitations that restrict policy implementation.
48 CFR 1352.239-72 - Security requirements for information technology resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...
48 CFR 1352.239-72 - Security requirements for information technology resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...
48 CFR 1352.239-72 - Security requirements for information technology resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...
48 CFR 1352.239-72 - Security requirements for information technology resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...
48 CFR 1352.239-72 - Security requirements for information technology resources.
Code of Federal Regulations, 2010 CFR
2010-10-01
... information technology resources. 1352.239-72 Section 1352.239-72 Federal Acquisition Regulations System... Clauses 1352.239-72 Security requirements for information technology resources. As prescribed in 48 CFR 1339.270(b), insert the following clause: Security Requirements for Information Technology Resources...
DOE Office of Scientific and Technical Information (OSTI.GOV)
McKinnon, Archibald D.; Thompson, Seth R.; Doroshchuk, Ruslan A.
mart grid technologies are transforming the electric power grid into a grid with bi-directional flows of both power and information. Operating millions of new smart meters and smart appliances will significantly impact electric distribution systems resulting in greater efficiency. However, the scale of the grid and the new types of information transmitted will potentially introduce several security risks that cannot be addressed by traditional, centralized security techniques. We propose a new bio-inspired cyber security approach. Social insects, such as ants and bees, have developed complex-adaptive systems that emerge from the collective application of simple, light-weight behaviors. The Digital Ants frameworkmore » is a bio-inspired framework that uses mobile light-weight agents. Sensors within the framework use digital pheromones to communicate with each other and to alert each other of possible cyber security issues. All communication and coordination is both localized and decentralized thereby allowing the framework to scale across the large numbers of devices that will exist in the smart grid. Furthermore, the sensors are light-weight and therefore suitable for implementation on devices with limited computational resources. This paper will provide a brief overview of the Digital Ants framework and then present results from test bed-based demonstrations that show that Digital Ants can identify a cyber attack scenario against smart meter deployments.« less
Reducing the Consequences of a Nuclear Detonation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Buddemeier, B R
2007-11-09
The 2002 National Strategy to Combat Weapons of Mass Destruction states that 'the United States must be prepared to respond to the use of WMD against our citizens, our military forces, and those of friends and allies'. Scenario No.1 of the 15 Department of Homeland Security national planning scenarios is an improvised nuclear detonation in the national capitol region. An effective response involves managing large-scale incident response, mass casualty, mass evacuation, and mass decontamination issues. Preparedness planning activities based on this scenario provided difficult challenges in time critical decision making and managing a large number of casualties within the hazardmore » area. Perhaps even more challenging is the need to coordinate a large scale response across multiple jurisdictions and effectively responding with limited infrastructure and resources. Federal response planning continues to make improvements in coordination and recommending protective actions, but much work remains. The most critical life-saving activity depends on actions taken in the first few minutes and hours of an event. The most effective way to reduce the enormous national and international social and economic disruptions from a domestic nuclear explosion is through planning and rapid action, from the individual to the federal response. Anticipating response resources for survivors based on predicted types and distributions of injuries needs to be addressed.« less
United Nations opens gender coordinating unit for Afghanistan.
Morris, K
1999-02-06
The UN has created a gender coordinating unit for Afghanistan in an effort to combat some problems encountered by women and girls in the country. Reports continue to come in of women in Afghanistan being denied the right to work, to be educated, and to have access to medical care. The gap in education between men and women continues to widen as a result of edicts issued by Taliban authorities banning girls from attending formal schools and female teachers from working. The situation has grown worse since the UN and nongovernmental organizations (NGOs) withdrew international workers last year due to security concerns. Although a UN mission will travel to the country this week to discuss the return of international staff, the gender coordinating unit will for now have to work out of Islamabad, Pakistan. The unit will create guidelines for gender mainstreaming, a strategy in which mainstream policies and resource allocations are changed to reflect the principle of gender equality. Other goals include setting realistic objectives for gender activities, working with partners on pilot projects, and establishing minimum standards for best practices. MERLIN, a NGO with a primary health care program run by local staff in the Taliban-controlled province of Farah, welcomes the move.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES..., to provide Governmentwide oversight in human resources management programs and practices. Department...
Automatic ball bar for a coordinate measuring machine
Jostlein, H.
1997-07-15
An automatic ball bar for a coordinate measuring machine determines the accuracy of a coordinate measuring machine having at least one servo drive. The apparatus comprises a first and second gauge ball connected by a telescoping rigid member. The rigid member includes a switch such that inward radial movement of the second gauge ball relative to the first gauge ball causes activation of the switch. The first gauge ball is secured in a first magnetic socket assembly in order to maintain the first gauge ball at a fixed location with respect to the coordinate measuring machine. A second magnetic socket assembly secures the second gauge ball to the arm or probe holder of the coordinate measuring machine. The second gauge ball is then directed by the coordinate measuring machine to move radially inward from a point just beyond the length of the ball bar until the switch is activated. Upon switch activation, the position of the coordinate measuring machine is determined and compared to known ball bar length such that the accuracy of the coordinate measuring machine can be determined. 5 figs.
Automatic ball bar for a coordinate measuring machine
Jostlein, Hans
1997-01-01
An automatic ball bar for a coordinate measuring machine determines the accuracy of a coordinate measuring machine having at least one servo drive. The apparatus comprises a first and second gauge ball connected by a telescoping rigid member. The rigid member includes a switch such that inward radial movement of the second gauge ball relative to the first gauge ball causes activation of the switch. The first gauge ball is secured in a first magnetic socket assembly in order to maintain the first gauge ball at a fixed location with respect to the coordinate measuring machine. A second magnetic socket assembly secures the second gauge ball to the arm or probe holder of the coordinate measuring machine. The second gauge ball is then directed by the coordinate measuring machine to move radially inward from a point just beyond the length of the ball bar until the switch is activated. Upon switch activation, the position of the coordinate measuring machine is determined and compared to known ball bar length such that the accuracy of the coordinate measuring machine can be determined.
76 FR 79151 - Forest Resource Coordinating Committee
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-21
... DEPARTMENT OF AGRICULTURE Forest Service Forest Resource Coordinating Committee AGENCY: Forest Service, USDA. ACTION: Notice of meeting. SUMMARY: The Forest Resource Committee Meeting will meet in.... The meeting is partially closed to the public. The Forest Resource Committee is authorized under the...
Secure alignment of coordinate systems using quantum correlation
NASA Astrophysics Data System (ADS)
Rezazadeh, F.; Mani, A.; Karimipour, V.
2017-08-01
We show that two parties far apart can use shared entangled states and classical communication to align their coordinate systems with a very high fidelity. Moreover, compared with previous methods proposed for such a task, i.e., sending parallel or antiparallel pairs or groups of spin states, our method has the extra advantages of using single-qubit measurements and also being secure, so that third parties do not extract any information about the aligned coordinate system established between the two parties. The latter property is important in many other quantum information protocols in which measurements inevitably play a significant role.
A Copay Foundation Assistance Support Program for Patients Receiving Intravenous Cancer Therapy
Rajurkar, Swapnil P.; Presant, Cary A.; Bosserman, Linda D.; McNatt, Wendy J.
2011-01-01
Purpose: With the advent of newer cancer therapies (eg, biologic and cytotoxic), treatment is becoming increasingly expensive for patients with cancer. Patients enrolled in Medicare and commercial insurance plans often have large copay requirements with each treatment cycle. Often, these patients undergo significant financial hardship, and some patients decline treatment. We have developed a support program that works closely with all copay assistance foundations to secure financial assistance to facilitate appropriate treatment. Methods: In September, 2008 we initiated a coordinated program with various copay assistance foundations, including Healthwell, Cancer Care, Patient Access, Chronic Disease Fund, Beckstrand Cancer, Lilly Cares and the Leukemia and Lymphoma Society. Patients requesting assistance with chemotherapy copay were enrolled in this program. Information about income level, chemotherapy regimens, and associated copay was given to these foundations, who then determined the amount of monetary assistance. Results: Since the initiation of this program, of 201 patients who began receiving chemotherapy, 25 (12.4%) requested assistance with this program for either intravenous or oral treatments. The current results of time delays for foundation decision, success rates and administrative costs to secure funding will be presented at the time of the poster presentation. Conclusion: Copay for chemotherapy drugs is a financial hardship for a significant number of patients. Coordinated resources must be provided and reimbursed to facilitate appropriate and sustainable cancer care. This program is a successful model for other centers to adopt. PMID:21731517
Code of Federal Regulations, 2010 CFR
2010-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... adequate resources are allocated for the design, implementation, and administration of the performance...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... resources are allocated for the design, implementation, and administration of the performance management...
48 CFR 225.872-7 - Industrial security for qualifying countries.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Industrial security for... Agreements and Coordination 225.872-7 Industrial security for qualifying countries. The required procedures... qualifying country sources are in the DoD Industrial Security Regulation DoD 5220.22-R (implemented for the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-31
... Cyber Security Trade Mission to Saudi Arabia and Kuwait, September 28-October 1, 2013 AGENCY... coordinating and sponsoring an executive-led Critical Infrastructure Protection and Cyber Security mission to... on the cyber security, critical infrastructure protection, and emergency management, ports of entry...
14 CFR § 1274.937 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2014 CFR
2014-01-01
... information technology resources. § 1274.937 Section § 1274.937 Aeronautics and Space NATIONAL AERONAUTICS... Conditions § 1274.937 Security requirements for unclassified information technology resources. Security Requirements for Unclassified Information Technology Resources July 2002 (a) The Recipient shall be responsible...
Secure key storage and distribution
Agrawal, Punit
2015-06-02
This disclosure describes a distributed, fault-tolerant security system that enables the secure storage and distribution of private keys. In one implementation, the security system includes a plurality of computing resources that independently store private keys provided by publishers and encrypted using a single security system public key. To protect against malicious activity, the security system private key necessary to decrypt the publication private keys is not stored at any of the computing resources. Rather portions, or shares of the security system private key are stored at each of the computing resources within the security system and multiple security systems must communicate and share partial decryptions in order to decrypt the stored private key.
44 CFR 5.22 - Coordination of publication.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 44 Emergency Management and Assistance 1 2011-10-01 2011-10-01 false Coordination of publication..., DEPARTMENT OF HOMELAND SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION Publication of or... of publication. The Chief Counsel, FEMA, is responsible for coordination of FEMA materials required...
44 CFR 5.22 - Coordination of publication.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 44 Emergency Management and Assistance 1 2014-10-01 2014-10-01 false Coordination of publication..., DEPARTMENT OF HOMELAND SECURITY GENERAL PRODUCTION OR DISCLOSURE OF INFORMATION Publication of or... of publication. The Chief Counsel, FEMA, is responsible for coordination of FEMA materials required...
33 CFR 167.3 - Geographic coordinates.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Geographic coordinates. 167.3 Section 167.3 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) PORTS AND WATERWAYS SAFETY OFFSHORE TRAFFIC SEPARATION SCHEMES General § 167.3 Geographic coordinates...
NASA Astrophysics Data System (ADS)
Azhdari, G. H.; Deilami, K.; Firooznia, E.
2015-12-01
Natural Resources are essential for security and sustainable development of each country. Therefore, in order to reach sustainable development, conservation as well as optimum utilization of natural resources, executing of natural resources cadastral plan is necessary and essential. Governments conduct lands management in Iran, so there is a need for comprehensive plan with arranged program for best evaluation. In this research as a pilot, Pasargadae city is opted. Pasargadae region is located in north-east of Shiraz in Fars province with Latitude and longitude of 30° 15 ´ 53 ° N and 53° 13 ´ 29 ° E respectively. In order to generate the cadastral maps, Firstly, images from QuickBird satellite with 50-60 centimeters resolution were georeferenced by utilizing ground control points with accurate GPS coordinates. In addition to satellite images, old paper maps with 1:10000 scale in local coordinate system from agriculture ministry in 1963 were digitized according to 1:25000 scale map from army geographical organization with AutoCad software. Beside, paper maps with 1:50000 scale and Google Earth were used to find the changes during time. All the above maps were added to QuickBird images as new layers by using ArcMap software. These maps also were utilized to determine the different land-uses. Thus, by employing ArcMap software lands divide into 2 groups: firstly, lands with official document, which is owned by either natural or legal persons, and secondly national lands under different uses such as forestry, range management and desertification plans. Consequently, the generation of cadastral maps leads to better difference between private and national lands. In addition, producing cadastral maps prevent the destruction and illegal possession of natural lands by individuals.
32 CFR 989.4 - Initial considerations.
Code of Federal Regulations, 2010 CFR
2010-07-01
... national security interests while at the same time considering important environmental factors. (g... Under Secretary of Defense (Environmental Security). This coordination requirement does not apply to...
20 CFR 404.1902 - Definitions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... administration of a social security system including responsibility for implementing an agreement; the Social... coordination between the social security systems of the countries party to the agreement. The term agreement... system including applicable laws and international social security agreements; the Commissioner of Social...
36 CFR 219.13 - Coordination among Federal agencies.
Code of Federal Regulations, 2011 CFR
2011-07-01
... AGRICULTURE PLANNING National Forest System Land and Resource Management Planning Collaborative Planning for Sustainability § 219.13 Coordination among Federal agencies. The responsible official must provide early and... proposed actions; (b) For the streamlined coordination of Federal agency policies, resource management...
Preparing for the Next Kamikaze Attack on the American Homeland
2007-11-27
This paper presents a case for not diverting additional Transportation Security Administration (TSA) resources from Civil Aviation security to...divert additional resources from Civil Aviation security to General Aviation security .
National Strategy for Aviation Security
2007-03-26
for Aviation Security (hereafter referred to as the Strategy) to protect the Nation and its interests from threats in the Air Domain. The Secretary of... Aviation security is best achieved by integrating public and private aviation security global activities into a coordinated effort to detect, deter...might occur. The Strategy aligns Federal government aviation security programs and initiatives into a comprehensive and cohesive national effort
Borton, J
1996-12-01
This paper examines the co-ordination strategies developed to respond to the Great Lakes crisis following the events of April 1994. It analyses the different functions and mechanisms which sought to achieve a co-ordinated response--ranging from facilitation at one extreme to management and direction at the other. The different regimes developed to facilitate co-ordination within Rwanda and neighbouring countries, focusing on both inter-agency and inter-country co-ordination issues, are then analysed. Finally, the paper highlights the absence of mechanisms to achieve coherence between the humanitarian, political and security domains. It concludes that effective co-ordination is critical not only to achieve programme efficiency, but to ensure that the appropriate instruments and strategies to respond to complex political emergencies are in place. It proposes a radical re-shaping of international humanitarian, political and security institutions, particularly the United Nations, to improve the effectiveness of humanitarian and political responses to crises such as that in the Great Lakes.
A contribution to the development of an economic atlas of the Houston Area Test Site
NASA Technical Reports Server (NTRS)
1972-01-01
An outine description of the Houston Area Test Site was prepared, in the form of an atlas-catalog of Universal Transverse Mercator grid coordinate locations, building on the manufacturing sector and expanding along agreed lines as far as possible. It was concluded that (1) the effort expended in securing and verifying the locations of larger manufacturing plants yielded 5,000-plus usable entries, in addition to certain valuable conclusions about the general feasibility of obtaining ground information by economic sector; (2) on the basis of the number and the quality of the usable entries obtained, the resources expended on nonmanufacturing sectors and on historical data cannot be wholly justified; and (3) even without the 5,000-odd locations of completely satisfactory quality, the relatively modest cost of this pilot study secured enough data to provide a sound basis for obtaining feasibly and systematically some appropriate ground information on almost any economic or social activity, together with some indication of their relative areal and economic significance.
33 CFR 165.805 - Security Zones; Calcasieu River and Ship Channel, Louisiana.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Security Zones; Calcasieu River... § 165.805 Security Zones; Calcasieu River and Ship Channel, Louisiana. (a) Location. (1) The following areas are designated as fixed security zones (all coordinates are based upon North American Datum of...
33 CFR 165.805 - Security Zones; Calcasieu River and Ship Channel, Louisiana.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false Security Zones; Calcasieu River... § 165.805 Security Zones; Calcasieu River and Ship Channel, Louisiana. (a) Location. (1) The following areas are designated as fixed security zones (all coordinates are based upon North American Datum of...
33 CFR 165.805 - Security Zones; Calcasieu River and Ship Channel, Louisiana.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Security Zones; Calcasieu River... § 165.805 Security Zones; Calcasieu River and Ship Channel, Louisiana. (a) Location. (1) The following areas are designated as fixed security zones (all coordinates are based upon North American Datum of...
33 CFR 165.805 - Security Zones; Calcasieu River and Ship Channel, Louisiana.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false Security Zones; Calcasieu River... § 165.805 Security Zones; Calcasieu River and Ship Channel, Louisiana. (a) Location. (1) The following areas are designated as fixed security zones (all coordinates are based upon North American Datum of...
Understand the Big Picture So You Can Plan for Network Security
ERIC Educational Resources Information Center
Cervone, Frank
2005-01-01
This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…
Beyond a series of security nets: Applying STAMP & STPA to port security
Williams, Adam D.
2015-11-17
Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less
Beyond a series of security nets: Applying STAMP & STPA to port security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Williams, Adam D.
Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less
Bayer, Jennifer M.; Scully, Rebecca A.; Weltzin, Jake F.
2018-05-21
Natural resource managers who oversee the Nation’s resources require data to support informed decision-making at a variety of spatial and temporal scales that often cross typical jurisdictional boundaries such as states, agency regions, and watersheds. These data come from multiple agencies, programs, and sources, often with their own methods and standards for data collection and organization. Coordinating standards and methods is often prohibitively time-intensive and expensive. MonitoringResources.org offers a suite of tools and resources that support coordination of monitoring efforts, cost-effective planning, and sharing of knowledge among organizations. The website was developed by the Pacific Northwest Aquatic Monitoring Partnership—a collaboration of Federal, state, tribal, local, and private monitoring programs—and the U.S. Geological Survey (USGS), with funding from the Bonneville Power Administration and USGS. It is a key component of a coordinated monitoring and information network.
1992-04-03
10. SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification) ASEAN...region is a consequence of the stability, coordination and team work of ASEAN. With a reduction of U.S. forces presence in the area, the key to securing...fastest-growing regions in the world today. The stability in the region is a consequence of the stability, coordination and team work of ASEAN. With a
78 FR 26406 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-06
..., Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy... trade security futures products to establish listing standards that, among other things, require that... which the security futures product trades has in place procedures to coordinate trading halts with the...
78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-29
... Network Advisory Committee (HSINAC) AGENCY: Operation Coordination and Planning/Office of Chief.... SUMMARY: The Homeland Security Information Network Advisory Council (HSINAC) will meet December 17, 2013... , Phone: 202-343-4212. SUPPLEMENTARY INFORMATION: The Homeland Security Information Network Advisory...
49 CFR 1562.1 - Scope and definitions.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Maryland Three Airports: Enhanced Security Procedures for Operations at Certain Airports in the Washington... security coordinator means the official at a Maryland Three Airport who is responsible for ensuring that the airport's security procedures are implemented and followed. Maryland Three Airport means any of...
49 CFR 1562.1 - Scope and definitions.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Maryland Three Airports: Enhanced Security Procedures for Operations at Certain Airports in the Washington... security coordinator means the official at a Maryland Three Airport who is responsible for ensuring that the airport's security procedures are implemented and followed. Maryland Three Airport means any of...
49 CFR 1562.21 - Scope, general requirements, and definitions.
Code of Federal Regulations, 2014 CFR
2014-10-01
... WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... operators located at DCA or gateway airports; individuals designated as a security coordinator by aircraft... not include an armed security officer. DCA means Ronald Reagan Washington National Airport. DASSP...
49 CFR 1562.21 - Scope, general requirements, and definitions.
Code of Federal Regulations, 2012 CFR
2012-10-01
... WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... operators located at DCA or gateway airports; individuals designated as a security coordinator by aircraft... not include an armed security officer. DCA means Ronald Reagan Washington National Airport. DASSP...
49 CFR 1562.1 - Scope and definitions.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Maryland Three Airports: Enhanced Security Procedures for Operations at Certain Airports in the Washington... security coordinator means the official at a Maryland Three Airport who is responsible for ensuring that the airport's security procedures are implemented and followed. Maryland Three Airport means any of...
49 CFR 1562.1 - Scope and definitions.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Maryland Three Airports: Enhanced Security Procedures for Operations at Certain Airports in the Washington... security coordinator means the official at a Maryland Three Airport who is responsible for ensuring that the airport's security procedures are implemented and followed. Maryland Three Airport means any of...
49 CFR 1562.21 - Scope, general requirements, and definitions.
Code of Federal Regulations, 2013 CFR
2013-10-01
... WASHINGTON, DC, METROPOLITAN AREA Ronald Reagan Washington National Airport: Enhanced Security Procedures for... operators located at DCA or gateway airports; individuals designated as a security coordinator by aircraft... not include an armed security officer. DCA means Ronald Reagan Washington National Airport. DASSP...
49 CFR 1562.1 - Scope and definitions.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Maryland Three Airports: Enhanced Security Procedures for Operations at Certain Airports in the Washington... security coordinator means the official at a Maryland Three Airport who is responsible for ensuring that the airport's security procedures are implemented and followed. Maryland Three Airport means any of...
EOC serves as the response operational focal point. A communication and coordination hub designed to increase data management and coordination abilities, provides communication support for Watch Officer, Homeland Security, regional and field assets.
State Resource Guide for School Volunteer Coordinators.
ERIC Educational Resources Information Center
South Carolina State Dept. of Education, Columbia.
This resource guide for school volunteer coordinators aids them in developing and maintaining a school volunteer program. Topics addressed include (1) making maximum use of community volunteer resources; (2) building a network of resource people and interfacing school support groups; (3) setting up the school volunteer program; (4)…
State Resource Guide for School Volunteer Coordinators.
ERIC Educational Resources Information Center
South Carolina State Dept. of Education, Columbia.
This resource guide was designed to help school volunteer coordinators develop and maintain a school volunteer program. Topics addressed include: (1) making maximum use of volunteer resources; (2) building a network of resource people from school support groups; (3) setting up a school volunteer program; (4) responsibilities of volunteers and…
An Online Resource Site for Extension Master Gardener Coordinators
ERIC Educational Resources Information Center
Langellotto, Gail Ann; Dorn, Sheri
2016-01-01
Developing an online resource site for Extension master gardener (EMG) coordinators is an ongoing project for Extension collaborators. Begun in 2014, the website includes peer-reviewed resources focused on best practices in volunteer management and program administration. The website is organized according to nine resource categories (e.g.,…
Grid and Cloud for Developing Countries
NASA Astrophysics Data System (ADS)
Petitdidier, Monique
2014-05-01
The European Grid e-infrastructure has shown the capacity to connect geographically distributed heterogeneous compute resources in a secure way taking advantages of a robust and fast REN (Research and Education Network). In many countries like in Africa the first step has been to implement a REN and regional organizations like Ubuntunet, WACREN or ASREN to coordinate the development, improvement of the network and its interconnection. The Internet connections are still exploding in those countries. The second step has been to fill up compute needs of the scientists. Even if many of them have their own multi-core or not laptops for more and more applications it is not enough because they have to face intensive computing due to the large amount of data to be processed and/or complex codes. So far one solution has been to go abroad in Europe or in America to run large applications or not to participate to international communities. The Grid is very attractive to connect geographically-distributed heterogeneous resources, aggregate new ones and create new sites on the REN with a secure access. All the users have the same servicers even if they have no resources in their institute. With faster and more robust internet they will be able to take advantage of the European Grid. There are different initiatives to provide resources and training like UNESCO/HP Brain Gain initiative, EUMEDGrid, ..Nowadays Cloud becomes very attractive and they start to be developed in some countries. In this talk challenges for those countries to implement such e-infrastructures, to develop in parallel scientific and technical research and education in the new technologies will be presented illustrated by examples.
Datema, Tjeerd; Keita-Sow, Mah-Sere; Ndihokubwayo, Jean-Bosco; Isadore, Jocelyn; Oskam, Linda; Nkengasong, John; Lewis, Kim
2016-01-01
Background Functional national laboratory networks and systems are indispensable to the achievement of global health security targets according to the International Health Regulations. The lack of indicators to measure the functionality of national laboratory network has limited the efficiency of past and current interventions to enhance laboratory capacity in resource-limited-settings. Scorecard for laboratory networks We have developed a matrix for the assessment of national laboratory network functionality and progress thereof, with support from the African Society of Laboratory Medicine and the Association of Public Health Laboratories. The laboratory network (LABNET) scorecard was designed to: (1) Measure the status of nine overarching core capabilities of laboratory network required to achieve global health security targets, as recommended by the main normative standards; (2) Complement the World Health Organization joint external evaluation tool for the assessment of health system preparedness to International Health Regulations (2005) by providing detailed information on laboratory systems; and (3) Serve as a clear roadmap to guide the stepwise implementation of laboratory capability to prevent, detect and act upon infectious threats. Conclusions The application of the LABNET scorecard under the coordination of the African Society of Laboratory Medicine and the Association of Public Health Laboratories could contribute to the design, monitoring and evaluation of upcoming Global Health Security Agenda-supported laboratory capacity building programmes in sub Saharan-Africa and other resource-limited settings, and inform the development of national laboratory policies and strategic plans. Endorsement by the World Health Organization Regional Office for Africa is foreseen. PMID:28879141
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-31
... DEPARTMENT OF AGRICULTURE Forest Service Public Meeting, Cherokee National Forest Secure Rural.... Department of Agriculture, Forest Service, Cherokee National Forest Secure Rural Schools Resource Advisory... Schools Resource Advisory Committee (RAC) proposes projects and funding to the Secretary of Agriculture...
Strategy to Enhance International Supply Chain Security
2007-07-01
as part of the effort to secure air passenger travel . The security assessment crew traveling by air, land or sea cannot be considered only a travel ...threats through its traveler screening and worker credentialing programs. The strategy to secure the supply chain reflects the larger security strategy of...living or traveling abroad. • Assisting U.S. businesses in the international marketplace. • Coordinating and providing support for international
2000-01-24
Security Administration ( DTSA ). d. Reporting requirements (1) General. Army organizations with security assistance responsibility for ad- ministering...by the Department of State (DOS) and the Director, Defense Technology Security Administration ( DTSA ). The term “munitions case” includes in its scope...also formulate the Army position for ARSTAF coordination before responding to Defense Technology Security Agency ( DTSA ). AR 12-1 • 24 January 2000
Governing for Enterprise Security
2005-06-01
1 2 W hat Is Governing for Enterprise Security? ................................................ 5 3 W hat Are the Risks ...oversight and coordination 2. Areas of responsibility 3. Risk measurement 4. Monitoring and testing 5 . Reporting 6. Acceptable residual risk These...and O pportunities? ............................................... 10 3.1 Enterprise Risk and Enterprise Security Risk
The Requirements and Design of the Rapid Prototyping Capabilities System
NASA Astrophysics Data System (ADS)
Haupt, T. A.; Moorhead, R.; O'Hara, C.; Anantharaj, V.
2006-12-01
The Rapid Prototyping Capabilities (RPC) system will provide the capability to rapidly evaluate innovative methods of linking science observations. To this end, the RPC will provide the capability to integrate the software components and tools needed to evaluate the use of a wide variety of current and future NASA sensors, numerical models, and research results, model outputs, and knowledge, collectively referred to as "resources". It is assumed that the resources are geographically distributed, and thus RPC will provide the support for the location transparency of the resources. The RPC system requires providing support for: (1) discovery, semantic understanding, secure access and transport mechanisms for data products available from the known data provides; (2) data assimilation and geo- processing tools for all data transformations needed to match given data products to the model input requirements; (3) model management including catalogs of models and model metadata, and mechanisms for creation environments for model execution; and (4) tools for model output analysis and model benchmarking. The challenge involves developing a cyberinfrastructure for a coordinated aggregate of software, hardware and other technologies, necessary to facilitate RPC experiments, as well as human expertise to provide an integrated, "end-to-end" platform to support the RPC objectives. Such aggregation is to be achieved through a horizontal integration of loosely coupled services. The cyberinfrastructure comprises several software layers. At the bottom, the Grid fabric encompasses network protocols, optical networks, computational resources, storage devices, and sensors. At the top, applications use workload managers to coordinate their access to physical resources. Applications are not tightly bounded to a single physical resource. Instead, they bind dynamically to resources (i.e., they are provisioned) via a common grid infrastructure layer. For the RPC system, the cyberinfrastructure must support organizing computations (or "data transformations" in general) into complex workflows with resource discovery, automatic resource allocation, monitoring, preserving provenance as well as to aggregate heterogeneous, distributed data into knowledge databases. Such service orchestration is the responsibility of the "collective services" layer. For RPC, this layer will be based on Java Business Integration (JBI, [JSR-208]) specification which is a standards-based integration platform that combines messaging, web services, data transformation, and intelligent routing to reliably connect and coordinate the interaction of significant numbers of diverse applications (plug-in components) across organizational boundaries. JBI concept is a new approach to integration that can provide the underpinnings for loosely coupled, highly distributed integration network that can scale beyond the limits of currently used hub-and-spoke brokers. This presentation discusses the requirements, design and early prototype of the NASA-sponsored RPC system under development at Mississippi State University, demonstrating the integration of data provisioning mechanisms, data transformation tools and computational models into a single interoperable system enabling rapid execution of RPC experiments.
NASA Technical Reports Server (NTRS)
Foushee, H. Clayton
1982-01-01
There is increasing evidence that many air transport incidents and accidents are the result of the improper or inadequate utilization of the resources accessible to flight dock crew members. These resources obviously include the hardware and technical information necessary for the safe and efficient conduct of the flight, but they also Include the human resources which must be coordinated effectively. The focus of this paper is upon the human resources, and how communication styles, socio-psychological factors, and personality characteristics can affect crew coordination.
Multiresource allocation and scheduling for periodic soft real-time applications
NASA Astrophysics Data System (ADS)
Gopalan, Kartik; Chiueh, Tzi-cker
2001-12-01
Real-time applications that utilize multiple system resources, such as CPU, disks, and network links, require coordinated scheduling of these resources in order to meet their end-to-end performance requirements. Most state-of-the-art operating systems support independent resource allocation and deadline-driven scheduling but lack coordination among multiple heterogeneous resources. This paper describes the design and implementation of an Integrated Real-time Resource Scheduler (IRS) that performs coordinated allocation and scheduling of multiple heterogeneous resources on the same machine for periodic soft real-time application. The principal feature of IRS is a heuristic multi-resource allocation algorithm that reserves multiple resources for real-time applications in a manner that can maximize the number of applications admitted into the system in the long run. At run-time, a global scheduler dispatches the tasks of the soft real-time application to individual resource schedulers according to the precedence constraints between tasks. The individual resource schedulers, which could be any deadline based schedulers, can make scheduling decisions locally and yet collectively satisfy a real-time application's performance requirements. The tightness of overall timing guarantees is ultimately determined by the properties of individual resource schedulers. However, IRS maximizes overall system resource utilization efficiency by coordinating deadline assignment across multiple tasks in a soft real-time application.
2009-01-01
command system.2 The United States Southern Command, responsible for Department of Defense planning, coordination, and operations in Central America ...South America and i waters, formed its Joint Interagency Task Force South to enable it to conduct coordinated illicit trafficking operations. ts y...Collin Powell and Secretary of Defense Donald Rumsfeld, the National Security Council has at times been a place for policy to come to die under the
32 CFR 1909.18 - Termination of access.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Requests for Historical Access § 1909.18 Termination of access. The Coordinator shall cancel any authorization whenever the Director of Personnel Security cancels the security clearance of a requester (or...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-27
... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services Agency Information... Naturalization/Citizenship Document; OMB Control No. 1615-0091. The Department of Homeland Security, U.S... Security (DHS), USCIS, Chief, Regulatory Coordination Division, 20 Massachusetts Avenue NW., Washington, DC...
Moten, Asad; Schafer, Daniel; Burkett, Edwin K
2018-01-01
The Unites States Department of Defense (DoD) is viewed by many in the general public as a monolithic government entity whose primary purpose is to coordinate this country's ability to make war and maintain a military presence around the world. However, the DoD is in fact a multidimensional organization whose global impact is as expansive as it is varying and is responsible for far-reaching global health interventions. The United States has worked toward providing long-term care among host nation populations by providing training in several areas related to medicine, with positive results. These efforts can be built upon with substantial positive effects. Building health infrastructure and capacity around the world is essential. The DoD is the most generously funded agency in the world, and the resources at its disposal provide the opportunity to make great gains in the long term in terms of both health and security worldwide. With efficient and careful use of DoD resources, and partnerships with key non-governmental organizations with specialized knowledge and great passion, partnerships can be forged with communities around the world to ensure that public health is achieved in even the most underserved communities. A move toward creating sustainable health systems with long-term goals and measurable outcomes is an essential complement to the already successful disaster and emergency relief that the United States military already provides. By ensuring that communities around the world are both provided with access to the sustainable health care they need and that emergency situations can be responded to in an efficient way, the United States can serve its duty as a leader in sharing expertise and resources for the betterment and security of all humankind. Published by Oxford University Press on behalf of the Association of Military Surgeons of the United States 2017. This work is written by (a) US Government employee(s) and is in the public domain in the US.
1998-03-01
traveling public, air carriers, and persons employed by or conducting business at public airports. 14. SUBJECT TERMS Airport Security , Federal...26 4. Sterile Area 28 5. Exclusive Area 28 E. SECURITY ALERT LEVELS 29 F. AIRPORT SECURITY TOOLS 30 1. Electronic Detection System 31 a... Security Coordinator ASP Airport Security Program BIS Biometrie Identification System CCTV Closed Circuit Television CJIS Criminal Justice Information
Coordinated Collaboration between Heterogeneous Distributed Energy Resources
Abdollahy, Shahin; Lavrova, Olga; Mammoli, Andrea
2014-01-01
A power distribution feeder, where a heterogeneous set of distributed energy resources is deployed, is examined by simulation. The energy resources include PV, battery storage, natural gas GenSet, fuel cells, and active thermal storage for commercial buildings. The resource scenario considered is one that may exist in a not too distant future. Two cases of interaction between different resources are examined. One interaction involves a GenSet used to partially offset the duty cycle of a smoothing battery connected to a large PV system. The other example involves the coordination of twenty thermal storage devices, each associated with a commercial building.more » Storage devices are intended to provide maximum benefit to the building, but it is shown that this can have a deleterious effect on the overall system, unless the action of the individual storage devices is coordinated. A network based approach is also introduced to calculate some type of effectiveness metric to all available resources which take part in coordinated operation. The main finding is that it is possible to achieve synergy between DERs on a system; however this required a unified strategy to coordinate the action of all devices in a decentralized way.« less
5 CFR 9701.526 - Continuation of existing laws, recognitions, agreements, and procedures.
Code of Federal Regulations, 2010 CFR
2010-01-01
... HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations...
5 CFR 9701.231 - Conversion of positions and employees to the DHS classification system.
Code of Federal Regulations, 2010 CFR
2010-01-01
... HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Transitional...
77 FR 31682 - In the Matter of Indocan Resources, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-29
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Indocan Resources, Inc.; Order of Suspension of Trading May 24, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Indocan Resources, Inc...
Concurrent negotiation and coordination for grid resource coallocation.
Sim, Kwang Mong; Shi, Benyun
2010-06-01
Bolstering resource coallocation is essential for realizing the Grid vision, because computationally intensive applications often require multiple computing resources from different administrative domains. Given that resource providers and consumers may have different requirements, successfully obtaining commitments through concurrent negotiations with multiple resource providers to simultaneously access several resources is a very challenging task for consumers. The impetus of this paper is that it is one of the earliest works that consider a concurrent negotiation mechanism for Grid resource coallocation. The concurrent negotiation mechanism is designed for 1) managing (de)commitment of contracts through one-to-many negotiations and 2) coordination of multiple concurrent one-to-many negotiations between a consumer and multiple resource providers. The novel contributions of this paper are devising 1) a utility-oriented coordination (UOC) strategy, 2) three classes of commitment management strategies (CMSs) for concurrent negotiation, and 3) the negotiation protocols of consumers and providers. Implementing these ideas in a testbed, three series of experiments were carried out in a variety of settings to compare the following: 1) the CMSs in this paper with the work of others in a single one-to-many negotiation environment for one resource where decommitment is allowed for both provider and consumer agents; 2) the performance of the three classes of CMSs in different resource market types; and 3) the UOC strategy with the work of others [e.g., the patient coordination strategy (PCS )] for coordinating multiple concurrent negotiations. Empirical results show the following: 1) the UOC strategy achieved higher utility, faster negotiation speed, and higher success rates than PCS for different resource market types; and 2) the CMS in this paper achieved higher final utility than the CMS in other works. Additionally, the properties of the three classes of CMSs in different kinds of resource markets are also verified.
5 CFR 9701.334 - Setting and adjusting locality and special rate supplements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Locality and...
Coordination and collaboration to document the global cotton germplasm resources
USDA-ARS?s Scientific Manuscript database
Coordinated efforts to collect and maintain cotton genetic resources have increased over the last 100 years to insure the worldwide economic value of cotton fiber and cotton byproducts. The classified genetic resources of cotton are extensive and include five tetraploid species in the primary gene ...
Design and Analysis of Discrete Lateral Autopilots for Coordinated Bank- to-Turn Missiles
1985-12-01
ANALYSIS OF DISCRETE LATERAL AUTOPILOTS FOR COORDINATED BANK-TO-TURN MISSILES * by Christos 1. Karadimas C)__ December 1935 LAJ *Thesis Advisor: Daniel .J...Include Security Clastfication) DESIGN AND ANALYSIS OF DISCRETE LATERAL AUTOPILOTS FOR .- COORDINATED BANK-TO-TURN MISSILES A - H . R o KARADIMAS ...Coordinated Bank-to-Turn Missiles - by Christos I. Karadimas Lieutenant, Hellenic Navy B.S., Hellenic Naval Academy, 1976 Submitted in partial
5 CFR 9701.512 - Conferring on procedures for the exercise of management rights.
Code of Federal Regulations, 2010 CFR
2010-01-01
... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.512...
5 CFR 9701.323 - Eligibility for pay increase associated with a rate range adjustment.
Code of Federal Regulations, 2010 CFR
2010-01-01
... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Setting and...
5 CFR 9701.335 - Eligibility for pay increase associated with a supplement adjustment.
Code of Federal Regulations, 2010 CFR
2010-01-01
... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Locality and...
Cloud Computing for Mission Design and Operations
NASA Technical Reports Server (NTRS)
Arrieta, Juan; Attiyah, Amy; Beswick, Robert; Gerasimantos, Dimitrios
2012-01-01
The space mission design and operations community already recognizes the value of cloud computing and virtualization. However, natural and valid concerns, like security, privacy, up-time, and vendor lock-in, have prevented a more widespread and expedited adoption into official workflows. In the interest of alleviating these concerns, we propose a series of guidelines for internally deploying a resource-oriented hub of data and algorithms. These guidelines provide a roadmap for implementing an architecture inspired in the cloud computing model: associative, elastic, semantical, interconnected, and adaptive. The architecture can be summarized as exposing data and algorithms as resource-oriented Web services, coordinated via messaging, and running on virtual machines; it is simple, and based on widely adopted standards, protocols, and tools. The architecture may help reduce common sources of complexity intrinsic to data-driven, collaborative interactions and, most importantly, it may provide the means for teams and agencies to evaluate the cloud computing model in their specific context, with minimal infrastructure changes, and before committing to a specific cloud services provider.
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
18 CFR 3a.51 - Designation of security officers.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Designation of security officers. 3a.51 Section 3a.51 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Security Officers § 3a.51...
Fernandes, Horst Monken; Recio, Manuel Santamaria; Forsstrom, Hans; Carson, Philip Michael
2013-05-01
The challenges faced by states seeking to implement Environmental Remediation works are many. To this end, the International Atomic Energy Agency attempts to provide assistance and guidance to Member States wherever possible. This review article provides a brief overview of these challenges and highlights the international sources of financial and implementation support discussed at an international conference on the topic in Astana, Kazakhstan in 2009. The conference concluded the importance of institutional structures as a pre-requisite for remediation work, recognized privatization as a useful but limited financing tool for remediation and illustrated the need for better coordination between international funding organizations to reduce overlap and optimization of resources to secure the best outcomes. Copyright © 2011 Elsevier Ltd. All rights reserved.
Availability of health data: requirements and solutions.
Espinosa, A L
1998-03-01
There is an increasing recognition of the importance of the health data available for the corporate healthcare system model with the electronic patient record as the central unit of the healthcare information systems. There is also increasing recognition of the importance of developing simple international standards for record components, including clinical and administrative requirements. Aspects of security and confidentiality have to be reviewed in detail. The advantages of having health data available when and where it is required will modify healthcare delivery and support cost control with economies of scale and sharing of resources. The infrastructure necessary to make this model a reality is being developed through different international initiatives, which have to be integrated and co-ordinated to have common disaster planning strategies and better funding alternatives.
The 2015 National Security Strategy: Authorities, Changes, Issues for Congress
2016-02-26
climate change ; ensure access to shared spaces (expanding cyberspace and including outer space and air and maritime security); and increase global...hand, one could conclude that these, along with confronting climate change , convey both a wider range of national security challenges in terms of...The 2015 National Security Strategy: Authorities, Changes , Issues for Congress Nathan J. Lucas, Coordinator Section Research Manager Kathleen
Report on July 2015 Additional Protocol Coordinators Best Practices Workshop
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gitau, Ernest T.N.; Burbank, Roberta L.; Finch, Valerie A.
After 10 years of implementation experience, the Office of Nonproliferation and Arms Control (NPAC) within the Department of Energy/National Nuclear Security Administration (DOE/NNSA) conducted the Additional Protocol (AP) Coordinators Best Practices Workshop at Oak Ridge National Laboratory from July 29-30, 2015. The goal of this workshop was to identify implementation best practices, lessons learned, and compliance challenges from the various Additional Protocol Coordinators (APCs) at each laboratory in the DOE/NNSA complex and associated sites. The workshop provided the opportunity for participants to share their insights and establish networks that APCs can utilize to continue to discuss challenges (new and old),more » identify best practices, and enhance communication and coordination for reporting multi-lab research projects during review activities. Workshop participants included DOE/NNSA HQ, laboratory and site APCs, seasoned experts, members of the original implementation outreach team, and Field Element and site security representatives.« less
47 CFR 0.191 - Functions of the Bureau.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMISSION ORGANIZATION Organization Public Safety and... management and preparedness, disaster management, and ancillary operations. The Bureau has responsibility for coordinating public safety, homeland security, national security, emergency management and preparedness...
47 CFR 0.191 - Functions of the Bureau.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL COMMISSION ORGANIZATION Organization Public Safety and... management and preparedness, disaster management, and ancillary operations. The Bureau has responsibility for coordinating public safety, homeland security, national security, emergency management and preparedness...
Code of Federal Regulations, 2013 CFR
2013-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Structure § 9701.212 Bands. (a) For purposes of identifying...
5 CFR 9701.221 - Classification requirements.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Section 9701.221 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.221 Classification...
5 CFR 9701.221 - Classification requirements.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Section 9701.221 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.221 Classification...
5 CFR 9701.221 - Classification requirements.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Section 9701.221 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.221 Classification...
5 CFR 9701.221 - Classification requirements.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Section 9701.221 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.221 Classification...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Adverse Actions General § 9701.601 Purpose. This subpart contains regulations prescribing...
5 CFR 9701.211 - Occupational clusters.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9701.211 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Structure § 9701.211 Occupational clusters. For...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-31
... globalization of securities markets, cross-border coordination of trading and quotation halts is important to... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68526; File No. SR-FINRA-2012-010] Self... Change To Amend FINRA Rule 6440 (Trading and Quotation Halt in OTC Equity Securities) December 21, 2012...
Training and the Training Officer/Coordinator
ERIC Educational Resources Information Center
Holman, Larry L., Jr.
2008-01-01
The role of the campus law enforcement/security officer is to provide safety and security to students, staff/faculty, visitors and campus property as well as enforce all laws, and campus/departmental policies and procedures. This is the reason that training for the campus law enforcement/security officer is so vital to his/her safety and…
5 CFR 9701.527 - Savings provision.
Code of Federal Regulations, 2011 CFR
2011-01-01
....527 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.527 Savings provision. This subpart does not...
5 CFR 9701.105 - Continuing collaboration.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Section 9701.105 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.105 Continuing collaboration. (a) In...
5 CFR 9701.105 - Continuing collaboration.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Section 9701.105 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.105 Continuing collaboration. (a) In...
5 CFR 9701.516 - Allotments to representatives.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Section 9701.516 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.516 Allotments to representatives...
5 CFR 9701.516 - Allotments to representatives.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Section 9701.516 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.516 Allotments to representatives...
5 CFR 9701.516 - Allotments to representatives.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Section 9701.516 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.516 Allotments to representatives...
5 CFR 9701.516 - Allotments to representatives.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Section 9701.516 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.516 Allotments to representatives...
5 CFR 9701.609 - Proposal notice.
Code of Federal Regulations, 2010 CFR
2010-01-01
....609 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Adverse Actions Requirements for Furlough of 30 Days Or Less, Suspension...
5 CFR 9701.612 - Departmental record.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9701.612 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Adverse Actions Requirements for Furlough of 30 Days Or Less, Suspension...
5 CFR 9701.523 - Official time.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.523 Official time. (a) Any employee representing an...
5 CFR 9701.527 - Savings provision.
Code of Federal Regulations, 2010 CFR
2010-01-01
....527 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.527 Savings provision. This subpart does not...
Code of Federal Regulations, 2011 CFR
2011-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration General § 9701.301 Purpose. (a) This subpart contains...
Code of Federal Regulations, 2011 CFR
2011-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Performance Management § 9701.401 Purpose. (a) This subpart provides for the establishment...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Adverse Actions General § 9701.603 Definitions. In this subpart: Adverse action means a...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Adverse Actions General § 9701.604 Coverage. (a) Actions covered. This subpart covers...
5 CFR 9701.107 - Program evaluation.
Code of Federal Regulations, 2010 CFR
2010-01-01
....107 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.107 Program evaluation. (a) DHS will establish...
5 CFR 9701.410 - DHS responsibilities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9701.410 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Performance Management § 9701.410 DHS responsibilities. In carrying out its...
5 CFR 9701.507 - Employee rights.
Code of Federal Regulations, 2010 CFR
2010-01-01
....507 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.507 Employee rights. Each employee has the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... Department's mission foremost in mind. The regulations also recognize the rights of DHS employees to organize...
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2009-04-01
This report documents implementation strategies to leverage public and private resources for the development of an adequate national security workforce as part of the National Security Preparedness Project (NSPP), being performed under a U.S. Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. There are numerous efforts across the United States to develop a properly skilled and trained national security workforce. Some of these efforts are the result of the leveraging of public and private dollars. As budget dollars decrease and the demand for a properly skilled and trained national security workforce increases, it will become even more important tomore » leverage every education and training dollar. This report details some of the efforts that have been implemented to leverage public and private resources, as well as implementation strategies to further leverage public and private resources.« less
Physical and Cross-Layer Security Enhancement and Resource Allocation for Wireless Networks
ERIC Educational Resources Information Center
Bashar, Muhammad Shafi Al
2011-01-01
In this dissertation, we present novel physical (PHY) and cross-layer design guidelines and resource adaptation algorithms to improve the security and user experience in the future wireless networks. Physical and cross-layer wireless security measures can provide stronger overall security with high efficiency and can also provide better…
Coordinating activities between NOAA and other agencies.
Fritz, A T; Buchman, M F
1997-11-01
The Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) and the National Oil and Hazardous Substances Pollution Contingency Plan (NCP) mandate protection of public health, welfare, and the environment at Superfund hazardous waste sites. The NCP requires lead response agenciesto integrate baseline risk assessments into the remedial process that "assess threats to the environment." EPA policy statements direct regional offices to perform thorough, consistent ecological risk assessments, and stress the importance of coordination and technical consultation with the natural resource trustees. As a Federal natural trustee, the National Oceanic and Atmospheric Administration's (NOAA) role and responsibilities within the CERCLA process also are defined and mandated by Federal law. NOAA is responsible for identifying sites in the coastal zone that may affect natural resources, evaluating injury to trust resources, and providing technical advice on assessments and remedial and restoration alternatives. Statutes require lead cleanup agencies and trustee agencies to notify and coordinate with each other during CERCLA response. Over the past ten years, NOAA has gained valuable experience and technical expertise in environmental assessments and in evaluating contaminated aquatic environments. NOAA fulfills its responsibilities through an effective network of Coastal Resource Coordinators (CRCs) who can rapidly respond to local technical requirements and priorities, and coordinate effectively with technical and trustee representatives. In addition to CRCs, an interdisciplinary support group provides technical expertise in the scientific disciplines required to respond to the needs of regional activities. NOAA provides CRCs to coastal EPA regional offices for technical support, and to act as liaisons with Federal and state natural resource trustee agencies. The CRCs help EPA and other lead response agencies identify and assess risks to coastal resources from hazardous waste sites and to develop cost-effective strategies to minimize those risks. Notification of trustees of potential natural resource injuries and coordination of subsequent investigations helps Federal and state trustees to carry out their responsibilities effectively. Trustees' early involvement in the scoping of ecological risk assessments ensures that assessments and the entire remedial process adequately evaluate the risk to trust resources. Coordination throughout the process makes it easier to develop cost-effective and protective remedies that enhance the recovery of natural resources. Examples of NOAA's successful coordination and cooperative ecological risk assessments will be presented in brief case studies for both EPA and Department of Defense (DOD) lead sites.
75 FR 65312 - Combined Notice of Filings #1
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-22
...: Request for Reauthorization and Extension of Existing Blanket Authorization to Acquire Securities under.... Applicants: Western Electricity Coordinating Council. Description: Notice of Proposed Cancellation of Western Electricity Coordinating Council's Reliability Management System. Filed Date: 10/12/2010. Accession Number...
48 CFR 352.239-72 - Security requirements for Federal information technology resources.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Federal information technology resources. 352.239-72 Section 352.239-72 Federal Acquisition Regulations... Provisions and Clauses 352.239-72 Security requirements for Federal information technology resources. As... Federal Information Technology Resources (January 2010) (a) Applicability. This clause applies whether the...
20 CFR 416.1240 - Disposition of resources.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Disposition of resources. 416.1240 Section 416.1240 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Resources and Exclusions § 416.1240 Disposition of resources. (a) Where the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Declassification and Downgrading § 1203.600 Policy. Information shall be declassified or downgraded as soon as national security considerations permit. NASA reviews of classified information shall be coordinated with...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Declassification and Downgrading § 1203.600 Policy. Information shall be declassified or downgraded as soon as national security considerations permit. NASA reviews of classified information shall be coordinated with...
32 CFR 2001.42 - Standards for security equipment.
Code of Federal Regulations, 2011 CFR
2011-07-01
... OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION... Administration (GSA) shall, in coordination with agency heads originating classified information, establish and publish uniform standards, specifications, qualified product lists or databases, and supply schedules for...
32 CFR 2001.42 - Standards for security equipment.
Code of Federal Regulations, 2012 CFR
2012-07-01
... OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION... Administration (GSA) shall, in coordination with agency heads originating classified information, establish and publish uniform standards, specifications, qualified product lists or databases, and supply schedules for...
32 CFR 2001.42 - Standards for security equipment.
Code of Federal Regulations, 2013 CFR
2013-07-01
... OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION... Administration (GSA) shall, in coordination with agency heads originating classified information, establish and publish uniform standards, specifications, qualified product lists or databases, and supply schedules for...
32 CFR 2001.42 - Standards for security equipment.
Code of Federal Regulations, 2014 CFR
2014-07-01
... OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION... Administration (GSA) shall, in coordination with agency heads originating classified information, establish and publish uniform standards, specifications, qualified product lists or databases, and supply schedules for...
NASA Astrophysics Data System (ADS)
Wang, Y.; Fang, D., VI; Xu, J.; Dong, Q.
2017-12-01
The Lancang-Mekong River is an important international river, cascaded hydropower stations development in which attracts the attention of downstream countries. In this paper, we proposed a coordination framework for water resources utilization on the interests of mutual compensation to relieve the conflict of upstream and downstream countries. Firstly, analyze the benefits and risks caused by the cascaded hydropower stations development and the evolution process of water resources use conflict between upstream and downstream countries. Secondly, evaluate the benefits and risks of flood control, water supply, navigation and power generation based on the energy theory of cascaded hydropower stations development in Lancang-Mekong River. Thirdly, multi-agent cooperation motivation and cooperation conditions between upstream and downstream countries in Lancang-Mekong River is given. Finally, the coordination framework for water resources utilization on the interests of mutual compensation in Lancang-Mekong River is presented. This coordination framework for water resources utilization can increase comprehensive benefits in Lancang-Mekong River.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification General § 9701.204 Definitions. In this subpart: Band means a work level or...
Code of Federal Regulations, 2014 CFR
2014-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification General § 9701.204 Definitions. In this subpart: Band means a work level or...
5 CFR 9701.345 - Developmental pay adjustments.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Section 9701.345 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Performance-Based Pay § 9701.345...
Code of Federal Regulations, 2012 CFR
2012-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification General § 9701.204 Definitions. In this subpart: Band means a work level or...
5 CFR 9701.345 - Developmental pay adjustments.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Section 9701.345 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Performance-Based Pay § 9701.345...
Code of Federal Regulations, 2013 CFR
2013-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification General § 9701.204 Definitions. In this subpart: Band means a work level or...
5 CFR 9701.345 - Developmental pay adjustments.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Section 9701.345 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Performance-Based Pay § 9701.345...
5 CFR 9701.345 - Developmental pay adjustments.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Section 9701.345 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Performance-Based Pay § 9701.345...
5 CFR 9701.102 - Eligibility and coverage.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Section 9701.102 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.102 Eligibility and coverage. (a) All...
48 CFR 339.7100 - Definitions.
Code of Federal Regulations, 2010 CFR
2010-10-01
... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7100 Definitions. As... with OMB Circular A-130, Management of Federal Information Resources, Appendix 3 (Security of Federal Automated Information Resources), security commensurate with the risk and magnitude of harm resulting from...
5 CFR 9701.522 - Exceptions to arbitration awards.
Code of Federal Regulations, 2010 CFR
2010-01-01
....522 Section 9701.522 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.522 Exceptions to arbitration...
5 CFR 9701.610 - Opportunity to reply.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9701.610 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Adverse Actions Requirements for Furlough of 30 Days Or Less, Suspension...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Definitions. 9701.504 Section 9701.504 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
Code of Federal Regulations, 2010 CFR
2010-01-01
... DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false General. 9701.371 Section 9701.371 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Coverage. 9701.505 Section 9701.505 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Waivers. 9701.503 Section 9701.503 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
5 CFR 9701.502 - Rule of construction.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9701.502 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.502 Rule of construction. In interpreting this...
5 CFR 9701.104 - Scope of authority.
Code of Federal Regulations, 2010 CFR
2010-01-01
....104 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.104 Scope of authority. Subject to the requirements...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Purpose. 9701.201 Section 9701.201 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Waivers. 9701.403 Section 9701.403 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Definitions. 9701.404 Section 9701.404 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
5 CFR 9701.314 - DHS responsibilities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9701.314 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.314 DHS...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Definitions. 9701.304 Section 9701.304 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
5 CFR 9701.405 - Performance management system requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... requirements. 9701.405 Section 9701.405 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Performance Management § 9701.405 Performance...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Purpose. 9701.501 Section 9701.501 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
Code of Federal Regulations, 2010 CFR
2010-01-01
... DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay...
5 CFR 9701.517 - Unfair labor practices.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9701.517 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.517 Unfair labor practices. (a) For the...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Waivers. 9701.303 Section 9701.303 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
5 CFR 9701.407 - Monitoring performance and providing feedback.
Code of Federal Regulations, 2010 CFR
2010-01-01
... feedback. 9701.407 Section 9701.407 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Performance Management § 9701.407 Monitoring...
5 CFR 9701.222 - Reconsideration of classification decisions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... decisions. 9701.222 Section 9701.222 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.222...
5 CFR 9701.361 - Special skills payments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9701.361 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Special Payments § 9701.361 Special skills payments...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Definitions. 9701.204 Section 9701.204 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Waivers. 9701.203 Section 9701.203 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Bands. 9701.212 Section 9701.212 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false General. 9701.331 Section 9701.331 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
5 CFR 9701.343 - Within-band reductions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9701.343 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Performance-Based Pay § 9701.343 Within-band...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false General. 9701.341 Section 9701.341 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
5 CFR 9701.321 - Structure of bands.
Code of Federal Regulations, 2010 CFR
2010-01-01
....321 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Setting and Adjusting Rate Ranges § 9701.321...
5 CFR 9701.357 - Miscellaneous.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Miscellaneous. 9701.357 Section 9701.357 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Coverage. 9701.202 Section 9701.202 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
Code of Federal Regulations, 2010 CFR
2010-01-01
... DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Coverage. 9701.402 Section 9701.402 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Coverage. 9701.302 Section 9701.302 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
48 CFR 1852.204-76 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
... unclassified information technology resources. 1852.204-76 Section 1852.204-76 Federal Acquisition Regulations... information technology resources. As prescribed in 1804.470-4(a), insert the following clause: SECURITY REQUIREMENTS FOR UNCLASSIFIED INFORMATION TECHNOLOGY RESOURCES (MONTH YEAR) (a) The contractor shall protect...
48 CFR 652.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Unclassified Information Technology Resources. 652.239-71 Section 652.239-71 Federal Acquisition Regulations... Provisions and Clauses 652.239-71 Security Requirements for Unclassified Information Technology Resources. As... Technology Resources (SEP 2007) (a) General. The Contractor shall be responsible for information technology...
48 CFR 652.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Unclassified Information Technology Resources. 652.239-71 Section 652.239-71 Federal Acquisition Regulations... Provisions and Clauses 652.239-71 Security Requirements for Unclassified Information Technology Resources. As... Technology Resources (SEP 2007) (a) General. The Contractor shall be responsible for information technology...
48 CFR 652.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Unclassified Information Technology Resources. 652.239-71 Section 652.239-71 Federal Acquisition Regulations... Provisions and Clauses 652.239-71 Security Requirements for Unclassified Information Technology Resources. As... Technology Resources (SEP 2007) (a) General. The Contractor shall be responsible for information technology...
48 CFR 652.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Unclassified Information Technology Resources. 652.239-71 Section 652.239-71 Federal Acquisition Regulations... Provisions and Clauses 652.239-71 Security Requirements for Unclassified Information Technology Resources. As... Technology Resources (SEP 2007) (a) General. The Contractor shall be responsible for information technology...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-13
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading; American Resource Technologies, Inc., Apollo Resources International, Inc., Bloodhound Search Technologies, Inc... securities of Bloodhound Search Technologies, Inc. because it has not filed any periodic reports since the...
48 CFR 1852.204-76 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
... unclassified information technology resources. 1852.204-76 Section 1852.204-76 Federal Acquisition Regulations... information technology resources. As prescribed in 1804.470-4(a), insert the following clause: Security Requirements for Unclassified Information Technology Resources (MONTH YEAR) (a) The contractor shall protect...
48 CFR 1852.204-76 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
... unclassified information technology resources. 1852.204-76 Section 1852.204-76 Federal Acquisition Regulations... information technology resources. As prescribed in 1804.470-4(a), insert the following clause: Security Requirements for Unclassified Information Technology Resources (MONTH YEAR) (a) The contractor shall protect...
48 CFR 1852.204-76 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
... unclassified information technology resources. 1852.204-76 Section 1852.204-76 Federal Acquisition Regulations... information technology resources. As prescribed in 1804.470-4(a), insert the following clause: Security Requirements for Unclassified Information Technology Resources (MONTH YEAR) (a) The contractor shall protect...
48 CFR 652.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Unclassified Information Technology Resources. 652.239-71 Section 652.239-71 Federal Acquisition Regulations... Provisions and Clauses 652.239-71 Security Requirements for Unclassified Information Technology Resources. As... Technology Resources (SEP 2007) (a) General. The Contractor shall be responsible for information technology...
20 CFR 404.1630 - Coordination with other agencies.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Coordination with other agencies. 404.1630 Section 404.1630 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Determinations of Disability Administrative Responsibilities and Requirements...
5 CFR 9701.525 - Regulations of the HSLRB.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Section 9701.525 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.525 Regulations of the HSLRB. The...
5 CFR 9701.356 - Pay retention.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Pay retention. 9701.356 Section 9701.356 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
5 CFR 9701.406 - Setting and communicating performance expectations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... expectations. 9701.406 Section 9701.406 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Performance Management § 9701.406 Setting and...
5 CFR 9701.513 - Exclusive recognition of labor organizations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... organizations. 9701.513 Section 9701.513 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.513 Exclusive...
5 CFR 9701.312 - Maximum rates.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Maximum rates. 9701.312 Section 9701.312 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
Code of Federal Regulations, 2010 CFR
2010-01-01
... Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and...
5 CFR 9701.311 - Major features.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Major features. 9701.311 Section 9701.311 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...
Automated Support for Rapid Coordination of Joint UUV Operation
2015-03-01
automata , dead-reckoning, static plan, nmtime plan, rapid deployment, GPS 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY...STATE MACHINES, MOORE AUTOMATA ..........................................9 A. MOORE AUTOMATA ...9 B. UUV PLANS AS MOORE AUTOMATA ...................................................11 C. SAMPLING RATE
33 CFR 106.235 - Maritime Security (MARSEC) Level coordination and implementation.
Code of Federal Regulations, 2010 CFR
2010-07-01
... in compliance with the security requirements in this part for the MARSEC Level in effect for the OCS..., and stress the need for increased vigilance. (d) An OCS facility owner or operator whose facility is...
DOT National Transportation Integrated Search
2003-05-01
The Department of Transportation's (DOT) Research and Special Programs Administration (RSPA) began research in to assess the vulnerabilities of the nation's transportation infrastructure and develop needed improvements in security in June 2001. The g...
... Resources Resource Request System Contact Us Legal and Security Accessibility Accessibility Tools Disclaimer Privacy Act Statement & Security No Fear Act FOIA Inspector General Audits & Investigative ...
5 CFR 9701.520 - Standards of conduct for labor organizations.
Code of Federal Regulations, 2010 CFR
2010-01-01
... organizations. 9701.520 Section 9701.520 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.520 Standards of...
5 CFR 9701.232 - Special transition rules for Federal Air Marshal Service.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Marshal Service. 9701.232 Section 9701.232 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Transitional Provisions § 9701.232...
5 CFR 9701.373 - Conversion of employees to the DHS pay system.
Code of Federal Regulations, 2010 CFR
2010-01-01
... system. 9701.373 Section 9701.373 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Transitional Provisions...
5 CFR 9701.374 - Special transition rules for Federal Air Marshal Service.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Marshal Service. 9701.374 Section 9701.374 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Transitional Provisions...
... Resources Resource Request System Contact Us Legal and Security Accessibility Accessibility Tools Disclaimer Privacy Act Statement & Security No Fear Act FOIA Inspector General Audits & Investigative ...
44 CFR 352.22 - Functions of the Federal Radiological Preparedness Coordinating Committee (FRPCC).
Code of Federal Regulations, 2010 CFR
2010-10-01
... Radiological Preparedness Coordinating Committee (FRPCC). 352.22 Section 352.22 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY PREPAREDNESS COMMERCIAL NUCLEAR POWER PLANTS: EMERGENCY PREPAREDNESS PLANNING Federal Participation § 352.22 Functions of the...
22 CFR 9.11 - Systematic declassification review.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Section 9.11 Foreign Relations DEPARTMENT OF STATE GENERAL SECURITY INFORMATION REGULATIONS § 9.11 Systematic declassification review. The Information and Privacy Coordinator shall be responsible for... Information and Privacy Coordinator shall prioritize such review on the basis of researcher interest and the...
Kang, Jungho; Kim, Mansik; Park, Jong Hyuk
2016-01-01
With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms. PMID:27399699
Kang, Jungho; Kim, Mansik; Park, Jong Hyuk
2016-07-05
With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms.
47 CFR 0.131 - Functions of the Bureau.
Code of Federal Regulations, 2010 CFR
2010-10-01
... growth by promoting efficiency and innovation in the allocation, licensing and use of the electromagnetic.... Coordinates with and assists other Bureaus and Offices, as appropriate, concerning spectrum management..., homeland security, national security, emergency management, disaster management, and related issues. [60 FR...
Cockpit resource management training
NASA Technical Reports Server (NTRS)
Yocum, M.; Foushee, C.
1984-01-01
Cockpit resource management which is a multifaceted concept is outlined. The system involves the effective coordination of many resources: aircraft systems, company, air traffic control, equipment, navigational aids, documents, and manuals. The main concept, however, is group interaction. Problems which arise from lack of coordination, decision making, and lack of communication are pointed out. Implementation by the regional airline industry of cockpit resource management, designed to deal with human interactions problems in the most cost effective manner, is discussed.
Urbanization, Extreme Climate Hazards and Food, Energy Water Security
NASA Astrophysics Data System (ADS)
Romero-Lankao, P.; Davidson, D.; McPhearson, T.
2016-12-01
Research is urgently needed that incorporates the interconnected nature of three critical resources supporting our cities: food, energy and water. Cities are increasing demands for food, water and energy resources that in turn stress resource supplies, creating risks of negative impacts to human and ecological wellbeing. Simultaneously, shifts in climatic conditions, including extremes such as floods, heat, and droughts, threaten the sustainable availability of adequate quantities and qualities of food, energy and water (FEW) resources needed for resilient cities and ecosystems. These resource flows cannot be treated in isolation simply because they are interconnected: shifts in food, energy or water dynamics in turn affect the others, affecting the security of the whole - i.e., FEW nexus security. We present a framework to examine the dynamic interactions of urbanization, FEW nexus security and extreme hazard risks, with two overarching research questions: Do existing and emerging actions intended to enhance a population's food, water and energy security have the capacity to ensure FEW nexus security in the face of changing climate and urban development conditions? Can we identify a common set of social, ecological and technological conditions across a diversity of urban-regions that support the emergence of innovations that can lead to structural transformations for FEW nexus security?
48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 6 2013-10-01 2013-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...
48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 6 2011-10-01 2011-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...
48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 6 2014-10-01 2014-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...
48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 6 2012-10-01 2012-10-01 false Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...
48 CFR 1804.470 - Security requirements for unclassified information technology (IT) resources.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Security requirements for unclassified information technology (IT) resources. 1804.470 Section 1804.470 Federal Acquisition Regulations... Classified Information Within Industry 1804.470 Security requirements for unclassified information technology...
Jacob Gibson; Gretchen Moisen; Tracey Frescino; Thomas C. Edwards
2013-01-01
Species distribution models (SDMs) were built with US Forest Inventory and Analysis (FIA) publicly available plot coordinates, which are altered for plot security purposes, and compared with SDMs built with true plot coordinates. Six species endemic to the western US, including four junipers (Juniperus deppeana var. deppeana, J. monosperma, J. occidentalis, J....
20 CFR 416.1246 - Disposal of resources at less than fair market value.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Disposal of resources at less than fair market value. 416.1246 Section 416.1246 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Resources and Exclusions § 416.1246 Disposal of resources...
NASA Astrophysics Data System (ADS)
Yamada, Hiroshi; Kawaguchi, Akira
Grid computing and web service technologies enable us to use networked resources in a coordinated manner. An integrated service is made of individual services running on coordinated resources. In order to achieve such coordinated services autonomously, the initiator of a coordinated service needs to know detailed service resource information. This information ranges from static attributes like the IP address of the application server to highly dynamic ones like the CPU load. The most famous wide-area service discovery mechanism based on names is DNS. Its hierarchical tree organization and caching methods take advantage of the static information managed. However, in order to integrate business applications in a virtual enterprise, we need a discovery mechanism to search for the optimal resources based on the given a set of criteria (search keys). In this paper, we propose a communication protocol for exchanging service resource information among wide-area systems. We introduce the concept of the service domain that consists of service providers managed under the same management policy. This concept of the service domain is similar to that for autonomous systems (ASs). In each service domain, the service information provider manages the service resource information of service providers that exist in this service domain. The service resource information provider exchanges this information with other service resource information providers that belong to the different service domains. We also verified the protocol's behavior and effectiveness using a simulation model developed for proposed protocol.
Alexander Maas; Christopher Goemans; Dale Manning; Stephan Kroll; Thomas Brown
2017-01-01
Many common pool resources (CPRs) have tipping points - stock levels below which the resource is permanently damaged or destroyed - but the specific levels at which these thresholds are crossed are rarely known with certainty. We model a CPR in which uncertainty simultaneously creates a Prisoner's Dilemma and a Coordination Game. This model highlights a novel...
Mattox, Kenneth L
2006-01-01
The medical support for the coordinated effort for Harris County Texas (Houston) to rescue evacuees from New Orleans following Hurricane Katrina was part of an integrated collaborative network. Both public health and operational health care was structured to custom meet the needs of the evacuees and to create an exit strategy for the clinic and shelter. Integrating local hospital and physician resources into the Joint Incident Command was essential. Outside assistance, including federal and national resources must be coordinated through the local incident command. PMID:16420647
OSIRIS-REx "Uncovering the Secrets of Asteroids" Briefing
2016-09-07
In a panel discussion in the Kennedy Space Center’s Operations Support Building II, social media followers were briefed by NASA scientists on asteroids, how they relate to the origins of our solar system and the search for life beyond Earth. The discussion took place before launch of the agency’s Origins, Spectral Interpretation, Resource Identification, Security-Regolith Explorer, or OSIRIS-REx spacecraft. Panelists for this conversation are, from the left, Ellen Stofan, NASA chief scientist; Michelle Thaller, deputy director of science communications for NASA’s Science Mission Directorate; Felicia Chou, NASA Communications; Alex Young, associate director for science in the Heliophysics Science Division at NASA’s Goddard Space Flight Center in Greenbelt, Maryland; and Lindley Johnson, director of the Planetary Defense Coordination Office in NASA’s Science Mission Directorate.
30 CFR 250.1634 - Site security.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 30 Mineral Resources 2 2013-07-01 2013-07-01 false Site security. 250.1634 Section 250.1634 Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE OIL... security. (a) All locations where sulphur is produced, measured, or stored shall be operated and maintained...
30 CFR 250.1634 - Site security.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 30 Mineral Resources 2 2012-07-01 2012-07-01 false Site security. 250.1634 Section 250.1634 Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE OIL... security. (a) All locations where sulphur is produced, measured, or stored shall be operated and maintained...
30 CFR 250.1634 - Site security.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 30 Mineral Resources 2 2014-07-01 2014-07-01 false Site security. 250.1634 Section 250.1634 Mineral Resources BUREAU OF SAFETY AND ENVIRONMENTAL ENFORCEMENT, DEPARTMENT OF THE INTERIOR OFFSHORE OIL... security. (a) All locations where sulphur is produced, measured, or stored shall be operated and maintained...
30 CFR 250.1634 - Site security.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 30 Mineral Resources 2 2011-07-01 2011-07-01 false Site security. 250.1634 Section 250.1634 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT, REGULATION, AND ENFORCEMENT, DEPARTMENT OF THE... § 250.1634 Site security. (a) All locations where sulphur is produced, measured, or stored shall be...
5 CFR 9701.355 - Setting pay upon movement to a different occupational cluster.
Code of Federal Regulations, 2010 CFR
2010-01-01
... occupational cluster. 9701.355 Section 9701.355 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Pay Administration § 9701...
49 CFR 1580.201 - Rail security coordinator.
Code of Federal Regulations, 2010 CFR
2010-10-01
... system that is not operating on track that is part of the general railroad system of transportation... SECURITY Passenger Rail Including Passenger Railroad Carriers, Rail Transit Systems, Tourist, Scenic.... This section applies to: (1) Each passenger railroad carrier, including each carrier operating light...
76 FR 59112 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-23
... (DoD) strategy for cyberspace, --Presentation on Doctrine of Cybersecurity relating to computer... paper, ``Enabling Distributed Security in Cyberspace'', --Discussion with Cybersecurity Coordinator and... Awareness Month, --Discussion on cybersecurity with Senior Defense and Intelligence Advisor, --Discussion...
5 CFR 9701.222 - Reconsideration of classification decisions.
Code of Federal Regulations, 2012 CFR
2012-01-01
... RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.222...
5 CFR 9701.222 - Reconsideration of classification decisions.
Code of Federal Regulations, 2013 CFR
2013-01-01
... RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.222...
5 CFR 9701.222 - Reconsideration of classification decisions.
Code of Federal Regulations, 2014 CFR
2014-01-01
... RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.222...
5 CFR 9701.222 - Reconsideration of classification decisions.
Code of Federal Regulations, 2011 CFR
2011-01-01
... RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.222...
DOT National Transportation Integrated Search
2014-10-01
This report details the deployed technology and implementation experiences of the Lower Savannah Aging, Disability & Transportation : Resource Center in Aiken, South Carolina, which served as the regional Travel Management and Coordination Center (TM...
42 CFR 482.98 - Condition of participation: Human resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
... issues. The clinical transplant coordinator's responsibilities must include, but are not limited to, the... the prospective living donor's decision whether to donate and the ability to discuss these issues with..., nursing, nutrition, social services, transplant coordination, and pharmacology. (f) Standard: Resource...
42 CFR 482.98 - Condition of participation: Human resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
... issues. The clinical transplant coordinator's responsibilities must include, but are not limited to, the... the prospective living donor's decision whether to donate and the ability to discuss these issues with..., nursing, nutrition, social services, transplant coordination, and pharmacology. (f) Standard: Resource...
42 CFR 482.98 - Condition of participation: Human resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
... issues. The clinical transplant coordinator's responsibilities must include, but are not limited to, the... the prospective living donor's decision whether to donate and the ability to discuss these issues with..., nursing, nutrition, social services, transplant coordination, and pharmacology. (f) Standard: Resource...
42 CFR 482.98 - Condition of participation: Human resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
... issues. The clinical transplant coordinator's responsibilities must include, but are not limited to, the... the prospective living donor's decision whether to donate and the ability to discuss these issues with..., nursing, nutrition, social services, transplant coordination, and pharmacology. (f) Standard: Resource...
Addressing global change challenges for Central Asian socio-ecosystems
NASA Astrophysics Data System (ADS)
Qi, Jiaguo; Bobushev, Temirbek S.; Kulmatov, Rashid; Groisman, Pavel; Gutman, Garik
2012-06-01
Central Asia is one of the most vulnerable regions on the planet earth to global climate change, depending on very fragile natural resources. The Soviet legacy has left the five countries (Kazakhstan, Tajikistan, Kyrgyzstan, Turkmenistan, and Uzbekistan) with a highly integrated system but they are facing great challenges with tensions that hinder regional coordination of food and water resources. With increasing climate variability and warming trend in the region, food and water security issues become even more crucial now and, if not addressed properly, could affect the regional stability. The long-term drivers of these two most critical elements, food and water, are climate change; the immediate and probably more drastic factors affecting the food and water security are land uses driven by institutional change and economic incentives. As a feedback, changes in land use and land cover have directly implications on water uses, food production, and lifestyles of the rural community in the region. Regional and international efforts have been made to holistically understand the cause, extent, rate and societal implications of land use changes in the region. Much of these have been understood, or under investigation by various projects, but solutions or research effort to develop solutions, to these urgent regional issues are lacking. This article, serves as an introduction to the special issue, provides a brief overview of the challenges facing the Central Asian countries and various international efforts in place that resulted in the publications of this special issue.
Securing Resources in Collaborative Environments: A Peer-to-peerApproach
DOE Office of Scientific and Technical Information (OSTI.GOV)
Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.
2005-09-19
We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.
48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...
48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...
48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...
48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...
77 FR 59690 - Titan Resources International, Corp.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-28
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Titan Resources International, Corp.; Order of... a lack of current and accurate information concerning the securities of Titan Resources International, Corp. (``Titan''). Titan is a Wyoming corporation purportedly based in Ontario, Canada. Questions...
78 FR 14400 - Southern USA Resources, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-05
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Southern USA Resources, Inc., Order of... lack of current and accurate information concerning the securities of Southern USA Resources, Inc. (``Southern USA'') because of questions regarding the accuracy of publicly-disseminated information concerning...
48 CFR 1252.239-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2010 CFR
2010-10-01
... unclassified information technology resources. 1252.239-70 Section 1252.239-70 Federal Acquisition Regulations... of Provisions and Clauses 1252.239-70 Security requirements for unclassified information technology... Unclassified Information Technology Resources (APR 2005) (a) The Contractor shall be responsible for...
20 CFR 416.1261 - Application of special resource provision.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Application of special resource provision. 416.1261 Section 416.1261 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Resources and Exclusions § 416.1261 Application of special...
DOT National Transportation Integrated Search
1999-11-01
This plan describes coordinated long-term research initiatives to bring about advances in aviation that will be required in the opening decades of the next century. The White House Commission on Aviation Safety and Security and the National Civil Avi...
DOT National Transportation Integrated Search
1999-11-01
This plan describes coordinated long-term research initiatives to bring about advances in aviation that will be required in the opening decades of the next century. The White House Commission on Aviation Safety and Security and the National Civil Avi...
32 CFR 182.5 - Responsibilities.
Code of Federal Regulations, 2014 CFR
2014-07-01
... account in the planning and execution of military training and operations. (k) The Commanders of U.S... Defense and Americas' Security Affairs (ASD(HD&ASA)), under the authority, direction, and control of the... Defense and Americas' Security Affairs (ASD(HD&ASA)),” shall develop, coordinate, recommend, and supervise...
32 CFR 182.5 - Responsibilities.
Code of Federal Regulations, 2013 CFR
2013-07-01
... account in the planning and execution of military training and operations. (k) The Commanders of U.S... Defense and Americas' Security Affairs (ASD(HD&ASA)), under the authority, direction, and control of the... Defense and Americas' Security Affairs (ASD(HD&ASA)),” shall develop, coordinate, recommend, and supervise...
SCODE: A Secure Coordination-Based Data Dissemination to Mobile Sinks in Sensor Networks
NASA Astrophysics Data System (ADS)
Hung, Lexuan; Lee, Sungyoung; Lee, Young-Koo; Lee, Heejo
For many sensor network applications such as military, homeland security, it is necessary for users (sinks) to access sensor networks while they are moving. However, sink mobility brings new challenges to secure routing in large-scale sensor networks. Mobile sinks have to constantly propagate their current location to all nodes, and these nodes need to exchange messages with each other so that the sensor network can establish and maintain a secure multi-hop path between a source node and a mobile sink. This causes significant computation and communication overhead for sensor nodes. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. In this paper, we propose a secure and energy-efficient data dissemination protocol — Secure COodination-based Data dissEmination (SCODE) — for mobile sinks in sensor networks. We take advantages of coordination networks (grid structure) based on Geographical Adaptive Fidelity (GAF) protocol to construct a secure and efficient routing path between sources and sinks. Our security analysis demonstrates that the proposed protocol can defend against common attacks in sensor network routing such as replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Our performance evaluation both in mathematical analysis and simulation shows that the SCODE significantly reduces communication overhead and energy consumption while the latency is similar compared with the existing routing protocols, and it always delivers more than 90 percentage of packets successfully.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Katz, Jessica; Denholm, Paul; Cochran, Jaquelin
2015-06-01
Greening the Grid provides technical assistance to energy system planners, regulators, and grid operators to overcome challenges associated with integrating variable renewable energy into the grid. Coordinating balancing area operation can promote more cost and resource efficient integration of variable renewable energy, such as wind and solar, into power systems. This efficiency is achieved by sharing or coordinating balancing resources and operating reserves across larger geographic boundaries.
Homeland Security. Management Challenges Facing Federal Leadership
2002-12-01
Security Management Challenges Facing Federal Leadership 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...including attention to management practices and key success factors. HOMELAND SECURITY Management Challenges Facing Federal Leadership www.gao.gov/cgi...significant management and coordination challenges if it is to provide this leadership and be successful in preventing and responding to any future
A national-scale authentication infrastructure.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Butler, R.; Engert, D.; Foster, I.
2000-12-01
Today, individuals and institutions in science and industry are increasingly forming virtual organizations to pool resources and tackle a common goal. Participants in virtual organizations commonly need to share resources such as data archives, computer cycles, and networks - resources usually available only with restrictions based on the requested resource's nature and the user's identity. Thus, any sharing mechanism must have the ability to authenticate the user's identity and determine if the user is authorized to request the resource. Virtual organizations tend to be fluid, however, so authentication mechanisms must be flexible and lightweight, allowing administrators to quickly establish andmore » change resource-sharing arrangements. However, because virtual organizations complement rather than replace existing institutions, sharing mechanisms cannot change local policies and must allow individual institutions to maintain control over their own resources. Our group has created and deployed an authentication and authorization infrastructure that meets these requirements: the Grid Security Infrastructure. GSI offers secure single sign-ons and preserves site control over access policies and local security. It provides its own versions of common applications, such as FTP and remote login, and a programming interface for creating secure applications.« less
EPA News Release: EPA Participates in Energy Roundtable with States, Tribes, Businesses and Environmental Groups to Enhance Coordination and Promote Responsible Domestic Production of Oil and Gas Resources
5 CFR 9701.408 - Developing performance and addressing poor performance.
Code of Federal Regulations, 2010 CFR
2010-01-01
... HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Performance Management § 9701.408...
The effects of environmental resource and security on aggressive behavior.
Ng, Henry Kin Shing; Chow, Tak Sang
2017-05-01
Exposure to different environments has been reported to change aggressive behavior, but previous research did not consider the underlying elements that caused such an effect. Based on previous work on environmental perception, we examined the role of environmental resource and security in altering aggression level. In three experiments, participants were exposed to environments that varied in resource (High vs. Low) and security (High vs. Low) levels, after which aggression was measured. The environments were presented through visual priming (Experiments 1-2) and a first-person gameplay (Experiment 3). We observed a consistent resource-security interaction effect on aggression, operationalized as the level of noise blast (Experiment 1) and number of unpleasant pictures (Experiments 2-3) delivered to strangers by the participants. High resource levels associated with higher aggression in insecure conditions, but lower aggression in secure conditions. The findings suggest that the adaptive value of aggression varies under different environmental constraints. Implications are discussed in terms of the effects of adverse environments on aggression, and the nature's effects on social behavior. Aggr. Behav. 43:304-314, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.
Lashgarara, Farhad; Mirdamadi, Seyyed Mehdi; Hosseini, Seyyed Jamal Farajollah; Chizari, Mohammad
2008-10-01
The majority of the countries of the world, especially developing countries, face environmental problems. Limitations of basic resources (water and soil) and population growth have been the cause of these environmental problems that countries are confronted with. Developing countries have numerous problems, including destruction of forests, vegetable and animal species, and pollution of the environment. Damage to natural resources and the environment can influence the food-security situation. One of the main millennium development goals (MDGs) is protection of the environment and people's health. This cannot obtained unless there is ensured food security. Food security has been defined as a situation when all people, at all times, have physical and economic access to sufficient, safe, and nutritious food needed to maintain a healthy and active life. At the same time, with ensured food security, we can hope to protect the natural resources and environment. The methodology used is descriptive-analytical, and its main purpose is determining the importance and role of food-security solutions in the reduction of environmental hazards and improvement of natural resources and the environmental situation in developing countries. Therefore, some of the most important food-security solutions that can play an important role in this relation were discussed, including conventional research-based technology, biotechnology, information and communication technologies (ICTs), alternative energy sources, and food irradiation.
48 CFR 552.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Unclassified Information Technology Resources. 552.239-71 Section 552.239-71 Federal Acquisition Regulations... Text of Provisions and Clauses 552.239-71 Security Requirements for Unclassified Information Technology... Information Technology Resources (JAN 2012) (a) General. The Contractor shall be responsible for information...
48 CFR 552.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Unclassified Information Technology Resources. 552.239-71 Section 552.239-71 Federal Acquisition Regulations... Text of Provisions and Clauses 552.239-71 Security Requirements for Unclassified Information Technology... Information Technology Resources (JAN 2012) (a) General. The Contractor shall be responsible for information...
48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information Technology...
48 CFR 552.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Unclassified Information Technology Resources. 552.239-71 Section 552.239-71 Federal Acquisition Regulations... Text of Provisions and Clauses 552.239-71 Security Requirements for Unclassified Information Technology... Information Technology Resources (JAN 2012) (a) General. The Contractor shall be responsible for information...
48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information Technology...
48 CFR 552.239-71 - Security Requirements for Unclassified Information Technology Resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Unclassified Information Technology Resources. 552.239-71 Section 552.239-71 Federal Acquisition Regulations... Text of Provisions and Clauses 552.239-71 Security Requirements for Unclassified Information Technology... Information Technology Resources (JUN 2011) (a) General. The Contractor shall be responsible for information...
48 CFR 3052.204-70 - Security requirements for unclassified information technology resources.
Code of Federal Regulations, 2010 CFR
2010-10-01
... unclassified information technology resources. 3052.204-70 Section 3052.204-70 Federal Acquisition Regulations... for unclassified information technology resources. As prescribed in (HSAR) 48 CFR 3004.470-3, insert a clause substantially the same as follows: Security Requirements for Unclassified Information Technology...
20 CFR 416.1324 - Suspension due to excess resources.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Suspension due to excess resources. 416.1324 Section 416.1324 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Suspensions and Terminations § 416.1324 Suspension due to excess resources...
20 CFR 416.1233 - Exclusion of certain underpayments from resources.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Exclusion of certain underpayments from resources. 416.1233 Section 416.1233 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Resources and Exclusions § 416.1233 Exclusion of certain...
Context aware adaptive security service model
NASA Astrophysics Data System (ADS)
Tunia, Marcin A.
2015-09-01
Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-11
... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 416 [Docket No. SSA 2008-0034] RIN 0960-AG66 Technical Revisions to the Supplemental Security Income (SSI) Regulations on Income and Resources AGENCY: Social... revisions reflect legislative changes found in the Consolidated Appropriations Act of 2001 (CAA), the...
Lind, Jason D; Shimada, Stephanie L; Martin, Tracey L; Gosline, Robert M; Antinori, Nicole; Stewart, Max; Simon, Steven R
2014-01-01
Background The United States Department of Veterans Affairs has implemented an electronic asynchronous “Secure Messaging” tool within a Web-based patient portal (ie, My HealtheVet) to support patient-provider communication. This electronic resource promotes continuous and coordinated patient-centered care, but to date little research has evaluated patients’ experiences and preferences for using Secure Messaging. Objective The objectives of this mixed-methods study were to (1) characterize veterans’ experiences using Secure Messaging in the My HealtheVet portal over a 3-month period, including system usability, (2) identify barriers to and facilitators of use, and (3) describe strategies to support veterans’ use of Secure Messaging. Methods We recruited 33 veterans who had access to and had previously used the portal’s Secure Messaging tool. We used a combination of in-depth interviews, face-to-face user-testing, review of transmitted secure messages between veterans and staff, and telephone interviews three months following initial contact. We assessed participants’ computer and health literacy during initial and follow-up interviews. We used a content-analysis approach to identify dominant themes in the qualitative data. We compared inferences from each of the data sources (interviews, user-testing, and message review) to identify convergent and divergent data trends. Results The majority of veterans (27/33, 82%) reported being satisfied with Secure Messaging at initial interview; satisfaction ratings increased to 97% (31/32, 1 missing) during follow-up interviews. Veterans noted Secure Messaging to be useful for communicating with their primary care team to manage health care needs (eg, health-related questions, test requests and results, medication refills and questions, managing appointments). Four domains emerged from interviews: (1) perceived benefits of using Secure Messaging, (2) barriers to using Secure Messaging, (3) facilitators for using Secure Messaging, and (4) suggestions for improving Secure Messaging. Veterans identified and demonstrated impediments to successful system usage that can be addressed with education, skill building, and system modifications. Analysis of secure message content data provided insights to reasons for use that were not disclosed by participants during interviews, specifically sensitive health topics such as erectile dysfunction and sexually transmitted disease inquiries. Conclusions Veterans perceive Secure Messaging in the My HealtheVet patient portal as a useful tool for communicating with health care teams. However, to maximize sustained utilization of Secure Messaging, marketing, education, skill building, and system modifications are needed. Data from this study can inform a large-scale quantitative assessment of Secure Messaging users’ experiences in a representative sample to validate qualitative findings. PMID:24610454
Haun, Jolie N; Lind, Jason D; Shimada, Stephanie L; Martin, Tracey L; Gosline, Robert M; Antinori, Nicole; Stewart, Max; Simon, Steven R
2014-03-06
The United States Department of Veterans Affairs has implemented an electronic asynchronous "Secure Messaging" tool within a Web-based patient portal (ie, My HealtheVet) to support patient-provider communication. This electronic resource promotes continuous and coordinated patient-centered care, but to date little research has evaluated patients' experiences and preferences for using Secure Messaging. The objectives of this mixed-methods study were to (1) characterize veterans' experiences using Secure Messaging in the My HealtheVet portal over a 3-month period, including system usability, (2) identify barriers to and facilitators of use, and (3) describe strategies to support veterans' use of Secure Messaging. We recruited 33 veterans who had access to and had previously used the portal's Secure Messaging tool. We used a combination of in-depth interviews, face-to-face user-testing, review of transmitted secure messages between veterans and staff, and telephone interviews three months following initial contact. We assessed participants' computer and health literacy during initial and follow-up interviews. We used a content-analysis approach to identify dominant themes in the qualitative data. We compared inferences from each of the data sources (interviews, user-testing, and message review) to identify convergent and divergent data trends. The majority of veterans (27/33, 82%) reported being satisfied with Secure Messaging at initial interview; satisfaction ratings increased to 97% (31/32, 1 missing) during follow-up interviews. Veterans noted Secure Messaging to be useful for communicating with their primary care team to manage health care needs (eg, health-related questions, test requests and results, medication refills and questions, managing appointments). Four domains emerged from interviews: (1) perceived benefits of using Secure Messaging, (2) barriers to using Secure Messaging, (3) facilitators for using Secure Messaging, and (4) suggestions for improving Secure Messaging. Veterans identified and demonstrated impediments to successful system usage that can be addressed with education, skill building, and system modifications. Analysis of secure message content data provided insights to reasons for use that were not disclosed by participants during interviews, specifically sensitive health topics such as erectile dysfunction and sexually transmitted disease inquiries. Veterans perceive Secure Messaging in the My HealtheVet patient portal as a useful tool for communicating with health care teams. However, to maximize sustained utilization of Secure Messaging, marketing, education, skill building, and system modifications are needed. Data from this study can inform a large-scale quantitative assessment of Secure Messaging users' experiences in a representative sample to validate qualitative findings.
44 CFR 60.25 - Designation, duties, and responsibilities of State Coordinating Agencies.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Designation, duties, and responsibilities of State Coordinating Agencies. 60.25 Section 60.25 Emergency Management and Assistance FEDERAL EMERGENCY MANAGEMENT AGENCY, DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-08
..., implementation, and privacy and security. HIT Standards Committee Schedule for the Assessment of HIT Policy... recommendations received from the HIT Policy Committee regarding health information technology standards...), section 3003. Erin Poetter, Office of Policy and Planning, Office of the National Coordinator for Health...
A novel quantum scheme for secure two-party distance computation
NASA Astrophysics Data System (ADS)
Peng, Zhen-wan; Shi, Run-hua; Zhong, Hong; Cui, Jie; Zhang, Shun
2017-12-01
Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure multiparty computational geometry, which computes the distance between two points without revealing each point's location information (i.e., coordinate). Secure two-party distance computation has potential applications with high secure requirements in military, business, engineering and so on. In this paper, we present a quantum solution to secure two-party distance computation by subtly using quantum private query. Compared to the classical related protocols, our quantum protocol can ensure higher security and better privacy protection because of the physical principle of quantum mechanics.
18 CFR 801.2 - Coordination, cooperation, and intergovernmental relations.
Code of Federal Regulations, 2011 CFR
2011-04-01
... with sources of technical and scientific expertise. (5) Share with interested parties results of... 18 Conservation of Power and Water Resources 2 2011-04-01 2011-04-01 false Coordination, cooperation, and intergovernmental relations. 801.2 Section 801.2 Conservation of Power and Water Resources...
18 CFR 801.2 - Coordination, cooperation, and intergovernmental relations.
Code of Federal Regulations, 2013 CFR
2013-04-01
... with sources of technical and scientific expertise. (5) Share with interested parties results of... 18 Conservation of Power and Water Resources 2 2013-04-01 2012-04-01 true Coordination, cooperation, and intergovernmental relations. 801.2 Section 801.2 Conservation of Power and Water Resources...
18 CFR 801.2 - Coordination, cooperation, and intergovernmental relations.
Code of Federal Regulations, 2012 CFR
2012-04-01
... with sources of technical and scientific expertise. (5) Share with interested parties results of... 18 Conservation of Power and Water Resources 2 2012-04-01 2012-04-01 false Coordination, cooperation, and intergovernmental relations. 801.2 Section 801.2 Conservation of Power and Water Resources...
18 CFR 801.2 - Coordination, cooperation, and intergovernmental relations.
Code of Federal Regulations, 2014 CFR
2014-04-01
... with sources of technical and scientific expertise. (5) Share with interested parties results of... 18 Conservation of Power and Water Resources 2 2014-04-01 2014-04-01 false Coordination, cooperation, and intergovernmental relations. 801.2 Section 801.2 Conservation of Power and Water Resources...
Assessment of the DoD Establishment of the Office of Security Cooperation -- Iraq
2012-03-16
a notable shortage of experienced foreign area officers, and • difficulty coordinating travel within Iraq, primarily due to the security situation...and assists in preparing for the receipt of medical team staff to conduct their training and exercises. Additionally, military veterinarians can
48 CFR 352.239-72 - Security requirements for Federal information technology resources.
Code of Federal Regulations, 2011 CFR
2011-10-01
...' mission. The term “information technology (IT)”, as used in this clause, includes computers, ancillary... Federal information technology resources. 352.239-72 Section 352.239-72 Federal Acquisition Regulations... Provisions and Clauses 352.239-72 Security requirements for Federal information technology resources. As...
20 CFR 416.1207 - Resources determinations.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 416.1207 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED... individual has, what their values are, and whether or not they are excluded as of the first moment of the month. (b) Increase in value of resources. If, during a month, a resource increases in value or an...
48 CFR 352.239-72 - Security requirements for Federal information technology resources.
Code of Federal Regulations, 2013 CFR
2013-10-01
...' mission. The term “information technology (IT)”, as used in this clause, includes computers, ancillary... Federal information technology resources. 352.239-72 Section 352.239-72 Federal Acquisition Regulations... Provisions and Clauses 352.239-72 Security requirements for Federal information technology resources. As...
48 CFR 352.239-72 - Security requirements for Federal information technology resources.
Code of Federal Regulations, 2014 CFR
2014-10-01
...' mission. The term “information technology (IT)”, as used in this clause, includes computers, ancillary... Federal information technology resources. 352.239-72 Section 352.239-72 Federal Acquisition Regulations... Provisions and Clauses 352.239-72 Security requirements for Federal information technology resources. As...
48 CFR 352.239-72 - Security requirements for Federal information technology resources.
Code of Federal Regulations, 2012 CFR
2012-10-01
...' mission. The term “information technology (IT)”, as used in this clause, includes computers, ancillary... Federal information technology resources. 352.239-72 Section 352.239-72 Federal Acquisition Regulations... Provisions and Clauses 352.239-72 Security requirements for Federal information technology resources. As...
20 CFR 416.1244 - Treatment of proceeds from disposition of resources.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Treatment of proceeds from disposition of resources. 416.1244 Section 416.1244 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Resources and Exclusions § 416.1244 Treatment of proceeds...
20 CFR 416.1262 - Special resource provision applicable in cases involving essential persons.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Special resource provision applicable in cases involving essential persons. 416.1262 Section 416.1262 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Resources and Exclusions § 416.1262...
20 CFR 416.1266 - Individual under special resource provision dies after December 1973.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Individual under special resource provision dies after December 1973. 416.1266 Section 416.1266 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Resources and Exclusions § 416.1266 Individual...
20 CFR 416.1242 - Time limits for disposing of resources.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Time limits for disposing of resources. 416.1242 Section 416.1242 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Resources and Exclusions § 416.1242 Time limits for disposing of...
20 CFR 416.1260 - Special resource provision for recipients under a State plan.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Special resource provision for recipients under a State plan. 416.1260 Section 416.1260 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Resources and Exclusions § 416.1260 Special...
NASA Astrophysics Data System (ADS)
Giltz, S.; Trtanj, J.; Jones, H.
2017-12-01
The One Health concept recognizes that the health of humans is inextricably linked with the health of animals and the environment. With a growing world population, changing climate, and increased global travel One Health approaches are increasingly useful. The National Oceanic and Atmospheric Administration (NOAA) provides key stakeholders in the public health sector with the environmental intelligence they need to mitigate emerging health threats. The NOAA One Health Working Group's mission is to integrate and coordinate the network of observing systems and in situ sensors, detection and diagnostic capacity, research and modeling efforts, and sustained engagement with health partners to deliver useful information to public health and resource management communities. The NOAA One Health group divides its broad focus into themes: thermal extremes, water-borne disease, seafood security, Arctic, wildlife and zoonotic disease, vector-borne disease, and air quality (including wildfire). The group connects the work being done throughout NOAA to coordinate One Health related efforts, increase information sharing, promote interdisciplinary approaches, and work towards better disease prevention. We are working to enhance NOAA Science and services to deliver useful information on current and emerging health risks and benefits to health decision makers.
NASA Astrophysics Data System (ADS)
Wiggins, H. V.; Warnick, W. K.; Hempel, L. C.; Henk, J.; Sorensen, M.; Tweedie, C. E.; Gaylord, A. G.
2007-12-01
As the creation and use of geospatial data in research, management, logistics, and education applications has proliferated, there is now a tremendous potential for advancing science through a variety of cyber-infrastructure applications, including Spatial Data Infrastructure (SDI) and related technologies. SDIs provide a necessary and common framework of standards, securities, policies, procedures, and technology to support the effective acquisition, coordination, dissemination and use of geospatial data by multiple and distributed stakeholder and user groups. Despite the numerous research activities in the Arctic, there is no established SDI and, because of this lack of a coordinated infrastructure, there is inefficiency, duplication of effort, and reduced data quality and search ability of arctic geospatial data. The urgency for establishing this framework is significant considering the myriad of data that is being collected in celebration of the International Polar Year (IPY) in 2007-2008 and the current international momentum for an improved and integrated circum-arctic terrestrial-marine-atmospheric environmental observatories network. The key objective of this project is to lay the foundation for full implementation of an Arctic Spatial Data Infrastructure (ASDI) through an assessment of community needs, readiness, and resources and through the development of a prototype web-mapping portal.
ERIC Educational Resources Information Center
Nilsen, Sigurd R.
Coordination between Temporary Assistance for Needy Families (TANF)-related programs and Workforce Investment Act of 1998 (WIA)'s one-stop centers increased since spring 2000, when WIA was first implemented. Nearly all states reported some coordination between the programs at either the state or the local level. Most often, coordination took one…
Coordinating the Design and Management of Heterogeneous Datacenter Resources
ERIC Educational Resources Information Center
Guevara, Marisabel
2014-01-01
Heterogeneous design presents an opportunity to improve energy efficiency but raises a challenge in management. Whereas prior work separates the two, we coordinate heterogeneous design and management. We present a market-based resource allocation mechanism that navigates the performance and power trade-offs of heterogeneous architectures. Given…
Analyzing Group Coordination when Solving Geometry Problems with Dynamic Geometry Software
ERIC Educational Resources Information Center
Oner, Diler
2013-01-01
In CSCL research, collaborative activity is conceptualized along various yet intertwined dimensions. When functioning within these multiple dimensions, participants make use of several resources, which can be social or content-related (and sometimes temporal) in nature. It is the effective coordination of these resources that appears to…
Coordinated Radar Resource Management for Networked Phased Array Radars
2014-12-01
Coordinated radar resource management for networked phased array radars Peter W. Moo and Zhen Ding Radar Sensing & Exploitation Section Defence...15] P.W. Moo . Scheduling for multifunction radar via two-slope benefit functions. Radar, Sonar Navigation, IET, 5(8):884 –894, Oct. 2011. [16] M.I
Evaluation of the Florida coordinated school health program pilot schools project.
Weiler, Robert M; Pigg, R Morgan; McDermott, Robert J
2003-01-01
The Florida Department of Education, with CDC funding, designed the Florida Coordinated School Health Program Pilot Schools Project (PSP) to encourage innovative approaches to promote coordinated school health programs (CSHP) in Florida schools. Each of eight pilot schools received $15,000 in project funding, three years of technical assistance including on-site and off-site assistance, a project office resource center, mailings of resource materials, needs assessment and evaluation assistance, and three PSP Summer Institutes. Project evaluators created a context evaluation, approaching each school independently as a "case study" to measure the school's progress in meeting goals established at baseline. Data were collected using the How Healthy is Your School? needs assessment instrument, a School Health Portfolio constructed by each school team, a Pilot Schools Project Team Member Survey instrument, midcourse team interviews, final team interviews, and performance indicator data obtained from pilot and control schools. The PSP posed two fundamental questions: "Can financial resources, professional training, and technical assistance enable individual schools to create and sustain a coordinated school health program?" and "What outcomes reasonably can one expect from a coordinated school health program, assuming programs receive adequate support over time?" First, activities at the eight schools confirmed that a coordinated school health programs can be established and sustained. Program strength and sustainability depend on long-term resources, qualified personnel, and administrative support. Second, though coordinated school health programs may improve school performance indicators, the PSP yielded insufficient evidence to support that belief. Future projects should include robust measurement and evaluation designs, thereby producing conclusive evidence about the influence of a coordinated school health program on such outcomes.
5 CFR 9701.510 - Powers and duties of the Federal Labor Relations Authority.
Code of Federal Regulations, 2010 CFR
2010-01-01
... HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.510...
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
A video on computer security is described. Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education and Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1--3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices.
33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2011 CFR
2011-07-01
... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...
33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2014 CFR
2014-07-01
... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...
33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2010 CFR
2010-07-01
... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...
33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2012 CFR
2012-07-01
... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...
33 CFR 103.405 - Elements of the Area Maritime Security (AMS) Assessment.
Code of Federal Regulations, 2013 CFR
2013-07-01
... networks; (6) Relevant transportation infrastructure; (7) Utilities; (8) Security resources and... Security (AMS) Assessment. 103.405 Section 103.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: AREA MARITIME SECURITY Area Maritime...
[Resources of person psychological security depending on the employment status of a pensioner.
Krasnyanskaya, T M; Tylets, V G
2018-01-01
200 pensioners aged of 55 to 65 years differing in employment status (working or resting) after retirement age and character of his choice (voluntary or forced) were surveyed. The content and the structure of the resources of the pensioners' personality, of external determinants of the choice of their employment status, the connection of the external determinants of the choice of employment status and the resources of psychological security of the pensioners' personality were analyzed. The psychological resources consist of development and protection resources, proving the priority of resources security of the pensioners' person. The significance of resource development for working pensioners and the protection resources for real pensioners is established. The level of psychological safety of the personality of pensioners is determined by a combination of nature and voluntary choice of employment status. The choice of employment status depends on a complex assessment of macro-, meso- and microaspects of life. The self-estimation of the development resources is prioritized to save a pensioner work activities.
77 FR 12353 - Shipping Coordinating Committee; Notice of Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-29
...); Provision of financial security in cases of abandonment, personal injury to, or death of seafarers related to entry into force of the International Labour Organization Maritime Labour Convention, 2006; Fair... to the seating capacity of the room. To facilitate the building security process, and to request...
Pathways to Economic Security: Gender and Nonstandard Employment in Contemporary Japan
ERIC Educational Resources Information Center
Gottfried, Heidi
2008-01-01
Compiling data from several government surveys, this article identifies key social indicators of economic security associated with nonstandard employment in Japan. Empirical trends of nonstandard employment are contextualized in the development of Japanese coordinated capitalism from the economic boom during the 1960s through the recession of the…
76 FR 6637 - Assumption Buster Workshop: Defense-in-Depth Is a Smart Investment for Cyber Security
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-07
... Technology Research and Development (NITRD) Program. ACTION: Call for participation. FOR FURTHER INFORMATION... regulations and restrictions. SUMMARY: The NCO, on behalf of the Special Cyber Operations Research and Engineering (SCORE) Committee, an interagency working group that coordinates cyber security research...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-28
... information as part of the research needed to write a NIST Special Publication (SP) to help Computer Security.... The NIST SP will identify technical standards, methodologies, procedures, and processes that facilitate prompt and effective response. This RFI requests information regarding technical best practices...
48 CFR 1652.224-70 - Confidentiality of records.
Code of Federal Regulations, 2010 CFR
2010-10-01
... personal data on employees and annuitants that is provided by agencies and OPM, including social security... to audit the contract; (5) As necessary to carry out the coordination of benefits provisions of this... nature that does not identify any individual by name, social security number, or any other identifier...
48 CFR 1652.224-70 - Confidentiality of records.
Code of Federal Regulations, 2011 CFR
2011-10-01
... personal data on employees and annuitants that is provided by agencies and OPM, including social security... to audit the contract; (5) As necessary to carry out the coordination of benefits provisions of this... nature that does not identify any individual by name, social security number, or any other identifier...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-18
... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services [OMB Control Number 1615.... SUMMARY: The Department of Homeland Security (DHS), U.S. Citizenship and Immigration Services (USCIS) will... Coordination Division, Office of Policy and Strategy, U.S. Citizenship and Immigration Services, Department of...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-10
... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services [OMB Control Number 1615... Security (DHS), U.S. Citizenship and Immigration Services (USCIS) will be submitting the following... Coordination Division, Office of Policy and Strategy, U.S. Citizenship and Immigration Services, Department of...
DOT National Transportation Integrated Search
2010-04-21
Terrorist attacks on surface transportation facilities in Moscow, Mumbai, London, and Madrid caused casualties and highlighted the vulnerability of such systems. The Transportation Security Administration (TSA), within the Department of Homeland Secu...
Motivating Contributions for Home Computer Security
ERIC Educational Resources Information Center
Wash, Richard L.
2009-01-01
Recently, malicious computer users have been compromising computers en masse and combining them to form coordinated botnets. The rise of botnets has brought the problem of home computers to the forefront of security. Home computer users commonly have insecure systems; these users do not have the knowledge, experience, and skills necessary to…
Drachal, Marcin
2017-01-01
Using case studies of the Ebola outbreak in Western Africa in 2014, and the terrorist attacks in Paris and Brussels in 2015 and 2016 respectively, this paper demonstrates how various resilience-related corporate functions contributed to effective crisis response. This paper describes the logical order of actions taken in each of the cases, and how the organisation prioritised its assets and coordinated activities to ensure the response was adequate, efficient and timely. The article demonstrates how business continuity, physical security, threat management, security intelligence and incident management worked together to support the organisation's crisis management structures in complex crisis situations.
Bio-inspired secure data mules for medical sensor network
NASA Astrophysics Data System (ADS)
Muraleedharan, Rajani; Gao, Weihua; Osadciw, Lisa A.
2010-04-01
Medical sensor network consist of heterogeneous nodes, wireless, mobile and wired with varied functionality. The resources at each sensor require to be exploited minimally while sensitive information is sensed and communicated to its access points using secure data mules. In this paper, we analyze the flat architecture, where different functionality and priority information require varied resources forms a non-deterministic polynomial-time hard problem. Hence, a bio-inspired data mule that helps to obtain dynamic multi-objective solution with minimal resource and secure path is applied. The performance of the proposed approach is based on reduced latency, data delivery rate and resource cost.
Hu, Peter F; Xiao, Yan; Ho, Danny; Mackenzie, Colin F; Hu, Hao; Voigt, Roger; Martz, Douglas
2006-06-01
One of the major challenges for day-of-surgery operating room coordination is accurate and timely situation awareness. Distributed and secure real-time status information is key to addressing these challenges. This article reports on the design and implementation of a passive status monitoring system in a 19-room surgical suite of a major academic medical center. Key design requirements considered included integrated real-time operating room status display, access control, security, and network impact. The system used live operating room video images and patient vital signs obtained through monitors to automatically update events and operating room status. Images were presented on a "need-to-know" basis, and access was controlled by identification badge authorization. The system delivered reliable real-time operating room images and status with acceptable network impact. Operating room status was visualized at 4 separate locations and was used continuously by clinicians and operating room service providers to coordinate operating room activities.
20 CFR 416.1262 - Special resource provision applicable in cases involving essential persons.
Code of Federal Regulations, 2010 CFR
2010-04-01
... cases involving essential persons. 416.1262 Section 416.1262 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Resources and Exclusions § 416.1262... individual has in his home an essential person (as defined in § 416.222), either the State plan resource...
Security of two-state and four-state practical quantum bit-commitment protocols
NASA Astrophysics Data System (ADS)
Loura, Ricardo; Arsenović, Dušan; Paunković, Nikola; Popović, Duška B.; Prvanović, Slobodan
2016-12-01
We study cheating strategies against a practical four-state quantum bit-commitment protocol [A. Danan and L. Vaidman, Quant. Info. Proc. 11, 769 (2012)], 10.1007/s11128-011-0284-4 and its two-state variant [R. Loura et al., Phys. Rev. A 89, 052336 (2014)], 10.1103/PhysRevA.89.052336 when the underlying quantum channels are noisy and the cheating party is constrained to using single-qubit measurements only. We show that simply inferring the transmitted photons' states by using the Breidbart basis, optimal for ambiguous (minimum-error) state discrimination, does not directly produce an optimal cheating strategy for this bit-commitment protocol. We introduce a strategy, based on certain postmeasurement processes and show it to have better chances at cheating than the direct approach. We also study to what extent sending forged geographical coordinates helps a dishonest party in breaking the binding security requirement. Finally, we investigate the impact of imperfect single-photon sources in the protocols. Our study shows that, in terms of the resources used, the four-state protocol is advantageous over the two-state version. The analysis performed can be straightforwardly generalized to any finite-qubit measurement, with the same qualitative results.
Butterfly Encryption Scheme for Resource-Constrained Wireless Networks †
Sampangi, Raghav V.; Sampalli, Srinivas
2015-01-01
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis. PMID:26389899
Food Insecurity and Food Resource Utilization in an Urban Immigrant Community.
Greenwald, Howard P; Zajfen, Vanessa
2017-02-01
Risk and prevalence of food insecurity and use of food security resources are important but incompletely understood factors in immigrant health. Key informant interviews and a survey (N = 809) of housing units were conducted in a San Diego, California neighborhood with a high proportion of immigrant and low income families. The difference in food insecurity between immigrant and non-immigrant households was non-significant (20.1 vs. 15.7 %, p = n.s.), though immigrant families were more likely to use food security resources such as SNAP (32.7 vs. 22.9 %, p < .01) and food pantries (28.2 vs. 19.7 %, p < .001). Among immigrants, neither national origin nor years in the United States predicted food insecurity or use of most food security resources. In immigrant families, food insecurity often remains a challenge long after immigration, suggesting a potentially increasing need for food security resources as immigration into the United States continues.
Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.
Sampangi, Raghav V; Sampalli, Srinivas
2015-09-15
Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.
OSIRIS-REx "Uncovering the Secrets of Asteroids" Briefing
2016-09-07
In a panel discussion in the Kennedy Space Center’s Operations Support Building II, social media followers were briefed by NASA scientists on asteroids, how they relate to the origins of our solar system and the search for life beyond Earth. The discussion took place before launch of the agency’s Origins, Spectral Interpretation, Resource Identification, Security-Regolith Explorer, or OSIRIS-REx spacecraft. Panelists in view are, from the left, Felicia Chou, NASA Communications; Alex Young, associate director for science in the Heliophysics Science Division at NASA’s Goddard Space Flight Center in Greenbelt, Maryland; and Lindley Johnson, director of the Planetary Defense Coordination Office in NASA’s Science Mission Directorate. Also participating in the panel discussion are Ellen Stofan, NASA chief scientist and Michelle Thaller, deputy director of science communications for NASA’s Science Mission Directorate.
Securing recipiency in workplace meetings: Multimodal practices
Ford, Cecilia E.; Stickle, Trini
2013-01-01
As multiparty interactions with single courses of coordinated action, workplace meetings place particular interactional demands on participants who are not primary speakers (e.g. not chairs) as they work to initiate turns and to interactively coordinate with displays of recipiency from co-participants. Drawing from a corpus of 26 hours of videotaped workplace meetings in a midsized US city, this article reports on multimodal practices – phonetic, prosodic, and bodily-visual – used for coordinating turn transition and for consolidating recipiency in these specialized speech exchange systems. Practices used by self-selecting non-primary speakers as they secure turns in meetings include displays of close monitoring of current speakers’ emerging turn structure, displays of heightened interest as current turns approach possible completion, and turn initiation practices designed to pursue and, in a fine-tuned manner, coordinate with displays of recipiency on the parts of other participants as well as from reflexively constructed ‘target’ recipients. By attending to bodily-visual action, as well as phonetics and prosody, this study contributes to expanding accounts for turn taking beyond traditional word-based grammar (i.e. lexicon and syntax). PMID:24976789
NASA Astrophysics Data System (ADS)
Huang, Wei; Zhang, Xingnan; Li, Chenming; Wang, Jianying
Management of group decision-making is an important issue in water source management development. In order to overcome the defects in lacking of effective communication and cooperation in the existing decision-making models, this paper proposes a multi-layer dynamic model for coordination in water resource allocation and scheduling based group decision making. By introducing the scheme-recognized cooperative satisfaction index and scheme-adjusted rationality index, the proposed model can solve the problem of poor convergence of multi-round decision-making process in water resource allocation and scheduling. Furthermore, the problem about coordination of limited resources-based group decision-making process can be solved based on the effectiveness of distance-based group of conflict resolution. The simulation results show that the proposed model has better convergence than the existing models.
Brewer, Jeffrey L; Taber-Doughty, Teresa; Kubik, Sara
2010-01-01
We investigated the perceptions of people about the safety, security and privacy of a telecare monitoring system for adults with developmental disabilities living in residential settings. The telecare system was used by remote caregivers overnight, when staff were not present in the homes. We surveyed 127 people from different stakeholder groups in the state of Indiana. The people surveyed included those with knowledge or experience of telecare, and those without. The stakeholders were clients, their advocates, service provider administrators and independent case coordinators. The responses in each category for every group were positive except one: only 4 of the 11 telecare case coordinators agreed that the telecare system provided a secure environment. Overall, the telecare system was perceived to be as safe, secure and private as the conventional alternative of having staff in the home.
A national survey on health department capacity for community engagement in emergency preparedness.
Schoch-Spana, Monica; Selck, Frederic W; Goldberg, Lisa A
2015-01-01
Limited systematic knowledge exists about how public health practitioners and policy makers can best strengthen community engagement in public health emergency preparedness ("CE-PHEP"), a top priority for US national health security. To investigate local health department (LHD) adoption of federally recommended participatory approaches to PHEP and to identify LHD organizational characteristics associated with more intense CE-PHEP. National survey in 2012 of LHDs using a self-administered Web-based questionnaire regarding LHD practices and resources for CE-PHEP ("The Community Engagement for Public Health Emergency Preparedness Survey"). Differences in survey responses were examined, and a multivariate analysis was used to test whether LHD organizational characteristics were associated with differences in CE-PHEP intensity. A randomized sample of 754 LHDs drawn from the 2565 LHDs that had been invited to participate in the 2010 National Profile of LHDs. Sample selection was stratified by the size of population served and geographic location. Emergency preparedness coordinators reporting on their respective LHDs. CE-PHEP intensity as measured with a scoring system that rated specific CE-PHEP practices by LHD according to the relative degrees of public participation and community capacity they represented. Survey response rate was 61%. The most common reported CE-PHEP activity was disseminating personal preparedness materials (90%); the least common was convening public forums on PHEP planning (22%). LHD characteristics most strongly associated with more intense CE-PHEP were having a formal CE-PHEP policy, allocating funds for CE-PHEP, having strong support from community-based organizations, and employing a coordinator with prior CE experience. Promising ways to engage community partners more fully in the PHEP enterprise are institutionalizing CE-PHEP objectives, employing sufficient and skilled staff, leveraging current community-based organization support, and aligning budgets with the value of CE-PHEP to US national health security.
Food security issues--a potential comprehensive plan.
Norton, R A
2003-06-01
The need for a comprehensive plan to protect the food production system has emerged as a critical issue over the last several years. To address this need, a comprehensive food security plan has been developed at Auburn University. The proposed program, entitled the Consolidated American Network for Agriculture Resource Intelligence (CANARI) system is one of several systems being proposed to deal with potential agricultural bioterrorism or agroterrorism events. Unlike other systems, which hastily emerged in many agencies after the tragedy of September 11, 2001, the system has been planned over the last 5 yr with the input of the agricultural industries, is comprehensive in its conception, and is designed to coordinate all components (existing and planned) necessary to prevent, detect, and respond to potential agroterrorism events. The plan uses the principle that the first line of defense must be within the states and agricultural companies for the detection of agroterrorism incidents to be rapid and the response effective, organized, and timely. CANARI is designed to integrate the previously disparate elements by fostering a cooperative network of local, state, and federal agencies as well as commodity entities and interested non-governmental organizations. Using a market-driven approach, the system encourages commodity membership and cooperation through positive incentives rather than regulatory duress. A centralized command structure is envisioned, which would be provided through the creation of a National Agroterrorism Defense Center. The responsibility of this Center would be to coordinate all of the activities presently available in components at the local, state, and federal levels and develop and manage new and emerging activities provided by the stakeholders. CANARI offers a new paradigm by which all of its constituent members act collectively and cooperatively to lessen the risk of an attack and better ensure the continued availability of a safe, abundant, and economical food supply.
Language Coordinators Resource Kit. Section Ten: Picture Bank.
ERIC Educational Resources Information Center
Peace Corps, Washington, DC. Information Collection and Exchange Div.
The guide is one section of a resource kit designed to assist Peace Corps language instruction coordinators in countries around the world in understanding the principles underlying second language learning and teaching and in organizing instructional programs. This section contains a collection of pictures that can be used as visual aids in…
18 CFR 2.25 - Ratemaking treatment of the cost of emissions allowances in coordination transactions.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Ratemaking treatment of the cost of emissions allowances in coordination transactions. 2.25 Section 2.25 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES GENERAL...
18 CFR 2.25 - Ratemaking treatment of the cost of emissions allowances in coordination transactions.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Ratemaking treatment of the cost of emissions allowances in coordination transactions. 2.25 Section 2.25 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES GENERAL...
18 CFR 2.25 - Ratemaking treatment of the cost of emissions allowances in coordination transactions.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Ratemaking treatment of the cost of emissions allowances in coordination transactions. 2.25 Section 2.25 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES GENERAL...
18 CFR 2.25 - Ratemaking treatment of the cost of emissions allowances in coordination transactions.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Ratemaking treatment of the cost of emissions allowances in coordination transactions. 2.25 Section 2.25 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES GENERAL...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-22
... DEPARTMENT OF HEALTH AND HUMAN SERVICES Health Resources and Services Administration Part D Grant for Coordinated HIV Services and Access to Research for Women, Infants, Children, and Youth Part D Funds Under the Ryan White HIV/AIDS Program AGENCY: Health Resources and Services Administration (HRSA...
Security patterns and a weighting scheme for mobile agents
NASA Astrophysics Data System (ADS)
Walker, Jessie J.
The notion of mobility has always been a prime factor in human endeavor and achievement. This need to migrate by humans has been distilled into software entities, which are their representatives on distant environments. Software agents are developed to act on behalf of a user. Mobile agents were born from the understanding that many times it was much more useful to move the code (program) to where the resources are located, instead of connecting remotely. Within the mobile agent research community, security has traditionally been the most defining issue facing the community and preventing the paradigm from gaining wide acceptance. There are still numerous difficult problems being addressed with very few practical solutions, such as the malicious host and agent problems. These problems are some of the most active areas of research within the mobile agent community. The major principles, facets, fundamental concepts, techniques and architectures of the field are well understood within the community. This is evident by the many mobile agent systems developed in the last decade that share common core components such as agent management, communication facilities, and mobility services. In other words new mobile agent systems and frameworks do not provide any new insights into agent system architecture or mobility services, agent coordination, communication that could be useful to the agent research community, although these new mobile agent systems do in many instances validate, refine, demonstrate the reuse of many previously proposed and discussed mobile agent research elements. Since mobile agent research for the last decade has been defined by security and related issues, our research into security patterns are within this narrow arena of mobile agent research. The research presented in this thesis examines the issue of mobile agent security from the standpoint of security pattern documented from the universe of mobile agent systems. In addition, we explore how these documented security patterns can be quantitatively compared based on a unique weighting scheme. The scheme is formalized into a theory that can be used improve the development of secure mobile agents and agent-based systems.
2015-06-12
Security Strategy to integrate government security agency participation for increased national security.33 Morris , Morris , and Jones posit ICA occurs...New National Strategy Takes Whole-of-Government Approach,” American Forces Press Services (Washington, DC: DoD News, 2010), 1. 34 John C. Morris ...Elizabeth D. Morris , and Dale M. Jones, “Reaching for the Philosopher’s Stone: Contingent Coordination and the Military’s Response to Hurricane Katrina
2009-12-01
a weapon in food and water. The case involved the radiological poisoning of former Russian spy Alexander Litvinenko with Polonium 210 . An article...SECURITY Gary Wayne Elliott Emergency Management Coordinator for Environmental Health and Division of Food Protection Supervisor, South Carolina...31 c. Bioterrorism, Biodefense, and Health Security .....................31 9. Other Barriers to Comprehensible Food Safety/Defense
Banger, Alison K; Alakoye, Amoke O; Rizk, Stephanie C
2008-11-06
As part of the HHS funded contract, Health Information Security and Privacy Collaboration, 41 states and territories have proposed collaborative projects to address cross-state privacy and security challenges related to health IT and health information exchange. Multi-state collaboration on privacy and security issues remains complicated, and resources to support collaboration around these topics are essential to the success of such collaboration. The resources outlined here offer an example of how to support multi-stakeholder, multi-state projects.
The Impact of the Structure, Function, and Resources of the Campus Security Office on Campus Safety
ERIC Educational Resources Information Center
Bennett, Patricia Anne
2012-01-01
The topic of this dissertation is college and university safety. This national quantitative study utilized resource dependency theory to examine relationships between the incidence of reported campus crimes and the structure, function, and resources of campus security offices. This study uncovered a difference in reported total crime rates,…
Badr, Elsheikh; Mohamed, Nazar A; Afzal, Muhammad Mahmood; Bile, Khalif Mohamud
2013-11-01
Human resources for health (HRH) in the Sudan were limited by shortages and the maldistribution of health workers, poor management, service fragmentation, poor retention of health workers in rural areas, and a weak health information system. A "country coordination and facilitation" process was implemented to strengthen the national HRH observatory, provide a coordination platform for key stakeholders, catalyse policy support and HRH planning, harmonize the mobilization of resources, strengthen HRH managerial structures, establish new training institutions and scale up the training of community health workers. The national government of the Sudan sanctioned state-level governance of the health system but many states lacked coherent HRH plans and policies. A paucity of training institutions constrained HRH production and the adequate and equitable deployment of health workers in rural areas. The country coordination and facilitation process prompted the establishment of a robust HRH information system and the development of the technical capacities and tools necessary for data analysis and evidence-based participatory decision-making and action. The success of the country coordination and facilitation process was substantiated by the stakeholders' coordinated support, which was built on solid evidence of the challenges in HRH and shared accountability in the planning and implementation of responses to those challenges. The support led to political commitment and the mobilization of resources for HRH. The leadership that was promoted and the educational institutions that were opened should facilitate the training, deployment and retention of the health workers needed to achieve universal health coverage.
33 CFR 165.708 - Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Harbor and Cooper River, Charleston, SC. 165.708 Section 165.708 Navigation and Navigable Waters COAST... Guard District § 165.708 Safety/Security Zone; Charleston Harbor and Cooper River, Charleston, SC. (a... Cooper River. All coordinates referenced use datum: NAD 1983. (2) All waters within 100 yards of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-21
... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services [OMB Control Number 1615... Homeland Security (DHS), U.S. Citizenship and Immigration Services (USCIS) will be submitting the following... Coordination Division, Office of Policy and Strategy, U.S. Citizenship and Immigration Services, Department of...
An evaluation index system of water security in China based on macroeconomic data from 2000 to 2012
NASA Astrophysics Data System (ADS)
Li, X. S.; Peng, Z. Y.; Li, T. T.
2016-08-01
This paper establishes an evaluation index system of water security. The index system employs 5 subsystems (water circulation security, water environment security, water ecology security, water society security and water economy security) and has 39 indicators. Using the AHP method, each indicator is given a relative weight to integrate within the whole system. With macroeconomic data from 2000 to 2012, a model of water security evaluation is applied to assess the state of water security in China. The results show an improving trend in the overall state of China's water security. In particular, the cycle of water security is at a high and low fluctuation. Water environment security presents an upward trend on the whole; however, this trend is unsteady and has shown a descending tendency in some years. Yet, water ecology security, water society security, and water economy security are basically on the rise. However, the degree of coordination of China's water security system remains in need of consolidation.
2014-05-01
The basic systems of any society rarely can operate independently. Instead, they are dependent and often interdependent upon other entities. Such entities control the resources within their respective systems. Thus, coordination and control agencies require contracts or memoranda of understanding with these entities in order to assure access to the resources required during a crisis. These administrative structures include: (1) governmental institutions and agencies, including the military; (2) intergovernmental organisations; (3) nongovernmental organisations; (4) commercial private sector organisations; and (5) academic institutions. These dependencies create potential barriers to the provision of coordination and control including: (1) the complexity of the administrative structures with which coordination and control must interact; (2) the location of resources; (3) finding responsible person(s); (4) the competence and compatibility; (5) methods of access; (6) payment; (7) contracts and memoranda of understanding; (8) inventories of accessible resources; (9) competition for the mandate, power, and resources; and (10) jealousy. The need for potential interactions between administrative structures requires that agreements for the sharing of resources during crises be reached as part of planning and preparedness. Gaining an understanding of these relationships is an important area for research.
Trute, B; Hiebert-Murphy, D; Wright, A
2008-05-01
Potential service outcome measures were tested for their utility in the assessment of the quality of 'family centred' service coordination in the provincial network of children's disability services in Manitoba, Canada. This study is based on in-home survey data provided by 103 mothers at 6 and 18 months following assignment of a 'dedicated' service coordinator. Service outcome indicators included measures of parent self-esteem, parenting stress, family functioning and the need for family support resources. Hierarchical regression analyses showed no relationship between level of quality of family-centred service coordination and standardized psychosocial measures of parent and family functioning. However, family centredness of service coordination was found to predict significant reduction in level of family need for psychosocial support resources after 18 months of contact with a service coordinator. Outcome measures that are focused on specific and tangible results of service coordination appear to be of higher utility in service quality assessment than are more global, standardized measures of parent and family functioning.
Climate Change, Instability and a Full Spectrum Approach to Conflict Prevention in Africa
2009-10-23
commander to follow. 15. SUBJECT TERMS Climate Change, Global Warming , Security Cooperation, Stability, Instability, Stabilization, Security...note that global warming could also create similar impacts on resources.19 In modern times disputes over natural resources have erupted into conflict...16. Center for Naval Analysis, National Security and the Threat of Climate Change, 18. 17. Michael T. Klare, ― Global Warming Battlefields: How
2013-04-01
their country’s eco - nomic image and prospects. Regardless of terminology, many Bang- ladeshi officers and experts express a desire to coordinate on...put on the back burner for short-term considerations. 2014 Indian central elections – A new Prime Minister in India could inject a very different tone
Coordination and Human Resource Planning in the Hawaii Visitor Industry.
ERIC Educational Resources Information Center
Hawaii State Commission on Manpower and Full Employment, Honolulu.
This report was undertaken in response to a request by the Sixth Legislature, which expressed its concern with the lack of coordination and overall human resource planning in the visitor industry and that the findings of the January 6-7, 1970 Travel Industry Congress had not been fully implemented. The State Commission on Manpower and Full…
Cooperative efforts by industry and government to develop geothermal resources
NASA Technical Reports Server (NTRS)
Butler, D. R.
1974-01-01
The Federal government's current plans for participation in the geothermal field appear to affect four major areas of interest: (1) resources exploration and assessment, (2) resources utilization projects, (3) advanced research and technology, and (4) environmental, legal, and institutional research. Private industry is also actively involved in these same areas of interest. Because of lack of coordination and communication between the private and public sector, it appears that there will be considerable duplication of effort, and, in some cases, serious conflict. It is also likely that this lack of coordination and communication may result in lack of effort in some key areas. Close coordination and communication between government and industry may resolve some of the major problems that are clearly evident.
Mental Health Services Coordination: Working towards Utopia. Human Resources Series.
ERIC Educational Resources Information Center
Paterson, Andrea
1986-01-01
The need for mental health services coordination is discussed in this report. It is noted that, without coordination, government units and service providers can operate independently and in competition with one another. The move to deinstitutionalization is discussed, including the lack of service coordination resulting from this move and the…
18 CFR 1302.12 - Effect on other regulations; supervision and coordination.
Code of Federal Regulations, 2013 CFR
2013-04-01
... regulations; supervision and coordination. 1302.12 Section 1302.12 Conservation of Power and Water Resources... OF THE CIVIL RIGHTS ACT OF 1964 § 1302.12 Effect on other regulations; supervision and coordination...) Supervision and coordination. TVA may from time to time assign to officials of other departments or agencies...
2014-12-12
and military doctrines , all contribute to slowing down the process of military integration in Southeast Asia. This thesis will argue for the...prevented Cambodia from playing a more constructive part in the ASEAN security stage. Indonesia, an archipelagic state with a thousand islands, is the...second largest archipelagic state in Southeast Asia, faces many security challenges. As a “typhoon-torn” country, it will benefit from a stronger
33 CFR 165.904 - Lake Michigan at Chicago Harbor & Burnham Park Harbor-Safety and Security Zone.
Code of Federal Regulations, 2012 CFR
2012-07-01
... & Burnham Park Harbor-Safety and Security Zone. 165.904 Section 165.904 Navigation and Navigable Waters... Guard District § 165.904 Lake Michigan at Chicago Harbor & Burnham Park Harbor—Safety and Security Zone... entrance of the harbor connecting coordinates 41°51′09″ N, 087°36′36″W and 41°51′11″ N, 087°36′22″ W. (b...
33 CFR 165.904 - Lake Michigan at Chicago Harbor & Burnham Park Harbor-Safety and Security Zone.
Code of Federal Regulations, 2014 CFR
2014-07-01
... & Burnham Park Harbor-Safety and Security Zone. 165.904 Section 165.904 Navigation and Navigable Waters... Guard District § 165.904 Lake Michigan at Chicago Harbor & Burnham Park Harbor—Safety and Security Zone... entrance of the harbor connecting coordinates 41°51′09″ N, 087°36′36″ W and 41°51′11″ N, 087°36′22″ W. (b...
33 CFR 165.904 - Lake Michigan at Chicago Harbor & Burnham Park Harbor-Safety and Security Zone.
Code of Federal Regulations, 2013 CFR
2013-07-01
... & Burnham Park Harbor-Safety and Security Zone. 165.904 Section 165.904 Navigation and Navigable Waters... Guard District § 165.904 Lake Michigan at Chicago Harbor & Burnham Park Harbor—Safety and Security Zone... entrance of the harbor connecting coordinates 41°51′09″ N, 087°36′36″W and 41°51′11″ N, 087°36′22″ W. (b...
Energy Security Strategies: An Analysis of Tanzania and Mozambique
2016-06-01
prioritizes domestic consumption or export of energy resources. The strategy a government chooses affects the overall energy security of that country...This thesis seeks to explain why countries pursue energy strategies that focus on domestic consumption of indigenous energy resources instead of...energy strategy that either prioritizes domestic consumption or export of energy resources. The strategy a government chooses affects the overall