Sample records for secure group commounication

  1. System and method for secure group transactions

    DOEpatents

    Goldsmith, Steven Y [Rochester, MN

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  2. An evaluation of the construct of earned security in adolescents: evidence from an inpatient sample.

    PubMed

    Venta, Amanda; Sharp, Carla; Shmueli-Goetz, Yael; Newlin, Elizabeth

    2015-01-01

    In adult attachment research, a group of individuals who convey secure attachments despite recalling difficult early caregiver relationships has been identified. The term earned security refers to individuals in this group, whereas continuous security refers to individuals who convey secure attachments and describe caring early relationships. Evidence on the validity of earned security in adults is mixed--with one longitudinal study showing that earned secure adults, despite contrary recollections, are actually more likely to have experienced positive caregiving than continuous secure adults. There is currently no evidence of earned security in adolescence, and exploring it in this age group may help shed light on the overall problem of the validity of this construct. Therefore, the broad aim of this study was to examine the construct of earned security in a group of inpatient adolescents. First, the authors aimed to identify a group of adolescents with secure attachments and memories of difficult caregiver relationships (i.e., proposed earned secure group) in a sample of 240 inpatient adolescents. Next, to explore external validity, the authors examined whether this group differed from others with regard to internalizing distress and emotion regulation. Findings indicated that a subset of secure adolescents recall difficult caregiving, as has been noted in adults, and that they differ from others with regard to emotion regulation. Despite this preliminary evidence that earned security can be identified in adolescents, the authors conclude with a discussion of the caveats of applying this construct in adolescents as well as adults.

  3. Secure Obfuscation for Encrypted Group Signatures

    PubMed Central

    Fan, Hongfei; Liu, Qin

    2015-01-01

    In recent years, group signature techniques are widely used in constructing privacy-preserving security schemes for various information systems. However, conventional techniques keep the schemes secure only in normal black-box attack contexts. In other words, these schemes suppose that (the implementation of) the group signature generation algorithm is running in a platform that is perfectly protected from various intrusions and attacks. As a complementary to existing studies, how to generate group signatures securely in a more austere security context, such as a white-box attack context, is studied in this paper. We use obfuscation as an approach to acquire a higher level of security. Concretely, we introduce a special group signature functionality-an encrypted group signature, and then provide an obfuscator for the proposed functionality. A series of new security notions for both the functionality and its obfuscator has been introduced. The most important one is the average-case secure virtual black-box property w.r.t. dependent oracles and restricted dependent oracles which captures the requirement of protecting the output of the proposed obfuscator against collision attacks from group members. The security notions fit for many other specialized obfuscators, such as obfuscators for identity-based signatures, threshold signatures and key-insulated signatures. Finally, the correctness and security of the proposed obfuscator have been proven. Thereby, the obfuscated encrypted group signature functionality can be applied to variants of privacy-preserving security schemes and enhance the security level of these schemes. PMID:26167686

  4. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles.

    PubMed

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  5. United States Air Force Security Forces in an Era of Terrorist Threats

    DTIC Science & Technology

    1999-06-01

    their primary duties. The third alternative is to eliminate the Palace Tenure deployments of security personnel and replace them with dedicated units...The Phoenix Raven program, the 820th Security Forces Group, and Palace Tenure commitments. The specified mission varies by organization, but the...820th Security Forces Group. January 1999, slide 4. 166 Statement of LT. Col. Larry A. Buckingham , 820th Security Forces Group Commander, “820th Security

  6. One-year results of a prospective randomized, evaluator-blinded, multicenter study comparing TVT and TVT Secur.

    PubMed

    Andrada Hamer, Maria; Larsson, Per-Göran; Teleman, Pia; Bergqvist, Christina Eten; Persson, Jan

    2013-02-01

    The aim of this prospective randomized multicenter study was to compare retropubic tension-free vaginal tape (TVT) with TVT Secur in terms of efficacy and safety. We set out to enrol 280 stress urinary incontinent (SUI) women with a half-time interim analysis of short-term cure and adverse events. The short-term results have previously been published. Of the 133 randomized women, 125 underwent surgery, and 121 (TVT n = 61, TVT Secur n = 60) were available for follow-up 1 year postsurgery. No significant differences were found between groups regarding demographics or incontinence grade. One year after surgery, both subjective and objective cure rates were significantly lower for TVT Secur than for TVT (subjective cure: TVT 98 %, TVT Secur 80 %, p = 0.03; objective cure: TVT 94 %, TVT Secur 71 % for cough test, p = 0.01; TVT 76 %, TVT Secur 58 % for pad test, p = 0.05 ). Three major complications occurred in the TVT Secur group: one tape erosion into the urethra, one tape inadvertently placed into the bladder, and one immediate postoperative bleeding due to injury to the corona mortis. No major complications occurred in the TVT group. No significant differences were found between groups regarding peroperative bleeding, hospital stay, urge symptoms, residual urinary volume, subjective bladder emptying problems, postoperative urinary tract infections, and minor complications. The TVT Secur group used more antimuscarine medication after surgery than the TVT group (p = 0.03). Median time for surgery was 13 and 22 min for TVT Secur and TVT, respectively (p < 0.0001). The TVT Secur procedure had significantly inferior subjective and objective cure rates compared with the retropubic TVT procedure. Three serious adverse events occurred in the TVT Secur group. We therefore discourage further use of TVT Secur.

  7. Combating Terrorism, Rebel Groups, and Armed Militias in the Face of Economic Prosperity Opportunities

    DTIC Science & Technology

    2012-05-04

    FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Combatting Terrorism, Rebel Groups , and Armed...facing many security threats. Al-Shabaab in Somalia, armed rebel groups , and armed militia in South Sudan pose the greatest security challenges to the...these groups . 15. SUBJECT TERMS United States Africa Command, Al-Shabaab, Lamu Oil Pipeline, Security. 16. SECURITY CLASSIFICATION OF: 17

  8. 78 FR 58376 - Home System Group, Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-23

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Home System Group, Order of Suspension of Trading September 19, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Home System Group because Home System Group...

  9. Framework for Flexible Security in Group Communications

    NASA Technical Reports Server (NTRS)

    McDaniel, Patrick; Prakash, Atul

    2006-01-01

    The Antigone software system defines a framework for the flexible definition and implementation of security policies in group communication systems. Antigone does not dictate the available security policies, but provides high-level mechanisms for implementing them. A central element of the Antigone architecture is a suite of such mechanisms comprising micro-protocols that provide the basic services needed by secure groups.

  10. 26 CFR 1.1081-7 - Sale of stock or securities received upon exchange by members of system group.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    .... Orders § 1.1081-7 Sale of stock or securities received upon exchange by members of system group. (a... which are members of the same system group consists of stock or securities issued by the corporation... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Sale of stock or securities received upon...

  11. 78 FR 30967 - Cross-Border Security-Based Swap Activities; Re-Proposal of Regulation SBSR and Certain Rules and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-23

    ... context of the security-based swap dealer definition, for affiliated groups with a registered security... for Affiliated Groups with Registered Security-Based Swap Dealers); Rule 3a71-5 (Substituted... 13n-12 (Exemption from Requirements Governing Security-Based Swap Data Repositories for Certain Non-U...

  12. Role of farmer group institutions in increasing farm production and household food security

    NASA Astrophysics Data System (ADS)

    Rahmadanih; Bulkis, S.; Arsyad, M.; Amrullah, A.; Viantika, N. M.

    2018-05-01

    Food productions and food security are still becomes serious issue in agriculture development. The research objectives are (1) Examining the role of Farmer Group in increasing farm production and (2) Analyzing the role of Farmer Group in relationship with the household food security. The research was conducted in Soppeng District, South Sulawesi, Indonesia by taking unit of analysis at household level of Farmer Group members. Sample were 6 farmer groups, consisting of 365 households. The Results showed that the Farmer Group has a good role as a production, collaboration and market unit to increase farming production (score 2.3-2.6), but haven’t much impact to increase household food security. Rice production are 4.2 – 6.2 tons per hectare and household food security level are “low and marginal food secure” (mean score 4 and 6). Nevertheless, the role of Farmer Group showed a positive relationship with the level of household food security. So, it is necessarry to increase the role of Farmer Group in order to increase income and household food security based on Farmer Group’s needs and potencies through facilitation of (a) seed and water/irrigation availability, (b) preparing organization rules (AD/ART) and (c) appropriate training and education of food and nutrition.

  13. Maritime security report. May 2000 [Organization of American States Tactical Advisory Group on Port Security

    DOT National Transportation Integrated Search

    2000-05-01

    The member countries of the Organization of American States (OAS) have recognized that a coordinated multilateral approach to improving port security in the Western Hemisphere is needed and has established a Technical Advisory Group on Port Security ...

  14. 78 FR 48029 - Improving Chemical Facility Safety and Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    ... responding to risks in chemical facilities (including during pre-inspection, inspection execution, post.... Sec. 2. Establishment of the Chemical Facility Safety and Security Working Group. (a) There is established a Chemical Facility Safety and Security Working Group (Working Group) co-chaired by the Secretary...

  15. 3 CFR 13650 - Executive Order 13650 of August 1, 2013. Improving Chemical Facility Safety and Security

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Working Group. (a) There is established a Chemical Facility Safety and Security Working Group (Working Group) co-chaired by the Secretary of Homeland Security, the Administrator of the Environmental... Secretary level or higher. In addition, the Working Group shall consist of the head of each of the following...

  16. Dynamic Key Management Schemes for Secure Group Access Control Using Hierarchical Clustering in Mobile Ad Hoc Networks

    NASA Astrophysics Data System (ADS)

    Tsaur, Woei-Jiunn; Pai, Haw-Tyng

    2008-11-01

    The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.

  17. 76 FR 6499 - China 9D Construction Group; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-04

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China 9D Construction Group; Order of Suspension of Trading February 2, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China 9D Construction Group...

  18. 75 FR 14335 - Revisions to the Export Administration Regulations To Enhance U.S. Homeland Security: Addition of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-25

    ... identified by an interagency working group that is reviewing export control issues related to homeland security. The interagency working group is made up of representatives from the Departments of Commerce, Defense, Homeland Security and State. The purpose of the interagency working group is to ensure that...

  19. Beyond grid security

    NASA Astrophysics Data System (ADS)

    Hoeft, B.; Epting, U.; Koenig, T.

    2008-07-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.

  20. Preventive Interventions and Sustained Attachment Security in Maltreated Children

    PubMed Central

    Stronach, Erin Pickreign; Toth, Sheree L.; Rogosch, Fred; Cicchetti, Dante

    2013-01-01

    Thirteen-month-old maltreated infants (n = 137) and their mothers were randomly assigned to one of three conditions: child-parent psychotherapy (CPP), psychoeducational parenting intervention (PPI), and community standard (CS). A fourth group of nonmaltreated infants (n =52) and their mothers served as a normative comparison (NC) group. A prior investigation found that the CPP and PPI groups demonstrated substantial increases in secure attachment at post-intervention, whereas this change was not found in the CS and NC groups. The current investigation involved the analysis of data obtained at a follow-up assessment that occurred 12-months after the completion of treatment. At follow-up, children in the CPP group had higher rates of secure and lower rates of disorganized attachment than did children in the PPI or CS groups. Rates of disorganized attachment did not differ between the CPP and NC groups. Intention-to-treat analyses (ITT) also showed higher rates of secure attachment at follow-up in the CPP group relative to the PPI and CS groups. However, groups did not differ on disorganized attachment. Both primary and ITT analyses demonstrated that maternal reported child behavior problems did not differ among the four groups at the follow-up assessment. This is the first investigation to demonstrate sustained attachment security in maltreated children 12 months after the completion of an attachment theory-informed intervention. Findings also suggest that, while effective in the short term, parenting interventions alone may not be effective in maintaining secure attachment in children over time. PMID:24229539

  1. SNAP-Ed (Supplemental Nutrition Assistance Program-Education) Increases Long-Term Food Security among Indiana Households with Children in a Randomized Controlled Study.

    PubMed

    Rivera, Rebecca L; Maulding, Melissa K; Abbott, Angela R; Craig, Bruce A; Eicher-Miller, Heather A

    2016-11-01

    Food insecurity is negatively associated with US children's dietary intake and health. The Supplemental Nutrition Assistance Program-Education (SNAP-Ed) aims to alleviate food insecurity by offering nutrition, budgeting, and healthy lifestyle education to low-income individuals and families. The objective of this study was to evaluate the long-term impact of the Indiana SNAP-Ed on food security among households with children. A randomized, controlled, parallel study design with SNAP-Ed as an intervention was carried out during a 4- to 10-wk intervention period. Intervention group participants received the first 4 Indiana SNAP-Ed curriculum lessons. Study participants (n = 575) were adults aged ≥18 y from low-income Indiana households with ≥1 child living in the household. Both treatment groups completed an assessment before and after the intervention period and 1 y after recruitment. The 18-item US Household Food Security Survey Module was used to classify the primary outcomes of food security for the household and adults and children in the household. A linear mixed model was used to compare intervention with control group effects over time on food security. Mean ± SEM changes in household food security score and food security score among household adults from baseline to 1-y follow-up were 1.2 ± 0.4 and 0.9 ± 0.3 units lower, respectively, in the intervention group than in the control group (P < 0.01). The mean change in food security score from baseline to 1-y follow-up among household children was not significantly different in the intervention group compared with the control group. SNAP-Ed improved food security over a longitudinal time frame among low-income Indiana households with children in this study. SNAP-Ed may be a successful intervention to improve food security. © 2016 American Society for Nutrition.

  2. Short-term results of a prospective randomized evaluator blinded multicenter study comparing TVT and TVT-Secur.

    PubMed

    Andrada Hamer, Maria; Larsson, Per-Göran; Teleman, Pia; Etén-Bergqvist, Christina; Persson, Jan

    2011-07-01

    The aim of this prospective randomized multicenter study was to compare TVT (tension-free vaginal tape) with TVT-Secur in terms of efficacy and safety. We set out to enrol 280 stress incontinent women with a half time interim analysis of short-term cure and a continuous registration of adverse events. Of 133 randomized women, 126 were operated and 123 (TVT n = 62, TVT-Secur n = 61) available for 2 months follow-up. No significant differences were found between groups regarding demographics or grade of incontinence. At 2 months follow-up, subjective cure rate following TVT-Secur was significantly lower than for TVT (72% and 92%, respectively, p = 0.01). Three major complications occurred in the TVT-Secur group: tape erosion into the urethra, a tape inadvertently placed inside the bladder, and an immediate postoperative bleeding from the corona mortis. No major complications occurred in the TVT group. No significant differences were found between groups regarding perioperative bleeding, hospital stay, urge symptoms, or postoperative urinary tract infections. Median time for surgery was 13 and 22 min for TVT-Secur and TVT, respectively (p < 0.0001). In a prospective randomized controlled study, the TVT-Secur procedure had a significantly lower subjective cure rate than the retropubic TVT procedure. Due to this, in addition to three serious complications in the TVT-Secur group, we decided to stop further enrolment after the interim analysis. We discourage from further use of the TVT-Secur.

  3. A comparison of offenders with intellectual disability across three levels of security.

    PubMed

    Hogue, Todd; Steptoe, Lesley; Taylor, John L; Lindsay, William R; Mooney, Paul; Pinkney, Lisa; Johnston, Susan; Smith, Anne H W; O'Brien, Gregory

    2006-01-01

    A number of authors have described, with disparate results, the prevalence of people with intellectual disability and their characteristics, in a range of offender cohorts defined by service use. These have included high security, a range of criminal justice services and community services. There is a need for research comparing cohorts of offenders with intellectual disabilities across different settings. AIM AND HYPOTHESIS: To conduct such a comparison and test the hypothesis that severity of characteristics measured will be highest in highest levels of residential security. A clinical-record-based comparison a offenders with intellectual disability in high security (n = 73), medium/low security (n = 70), and a community service (n = 69). Groups were similar in age and tested IQ levels. Early psychiatric service contact had been more likely in the lower security groups. In line with the hypothesis, more complex presentations, in particular comorbid personality disorder, was more likely in the highest security group. Both fatal and non-fatal interpersonal violence convictions were significantly related to group, with more in the high security group sustaining a conviction both at the index offence and prior to that. Over 50% of all groups had at least one conviction for a sexual offence. A regression model accounting for 78% of the variance was made up largely of disposal variables (Mental Health Act status and probation) and indications of antisocial traits (criminal damage, lifetime conviction for murder and ICD-10 personality disorder classification). The authors show that context of sampling affects most relationships between intellectual disability (ID) and offending when the methods for measuring ID are held constant. The results also present several questions on the relationship between risk, services available in an area and referral to higher security.

  4. Homeland security in the USA: past, present, and future.

    PubMed

    Kemp, Roger L

    2012-01-01

    This paper examines the evolving and dynamic field of homeland security in the USA. Included in this analysis is the evolution of the creation of the Department of Homeland Security, an overview of the National Warning System, a summary of citizen support groups, and how the field of homeland security has had an impact on the location and architecture of public buildings and facilities. Also included are website directories of citizen support groups and federal agencies related to the field of homeland security.

  5. Connecting the Spots: Combating Transnational Terrorist Groups Through Leveraging Indigenous Security Forces

    DTIC Science & Technology

    2009-04-01

    terrorist social networks are quite vulnerable to penetration and exploitation by indigenous personnel working in the communities where the groups operate...LEVERAGING INDIGENOUS SECURITY FORCES by Mack-Jan H. Spencer, Maj, USAF A Research Report Submitted to the Faculty In Partial Fulfillment of the...4. TITLE AND SUBTITLE Connecting the Spots: Combating Transnational Terrorist Groups Through Leveraging Indigenous Security Forces 5a. CONTRACT

  6. Integrating security in a group oriented distributed system

    NASA Technical Reports Server (NTRS)

    Reiter, Michael; Birman, Kenneth; Gong, LI

    1992-01-01

    A distributed security architecture is proposed for incorporation into group oriented distributed systems, and in particular, into the Isis distributed programming toolkit. The primary goal of the architecture is to make common group oriented abstractions robust in hostile settings, in order to facilitate the construction of high performance distributed applications that can tolerate both component failures and malicious attacks. These abstractions include process groups and causal group multicast. Moreover, a delegation and access control scheme is proposed for use in group oriented systems. The focus is the security architecture; particular cryptosystems and key exchange protocols are not emphasized.

  7. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting.

    PubMed

    Lin, Tsung-Hung; Tsung, Chen-Kun; Lee, Tian-Fu; Wang, Zeng-Bo

    2017-12-03

    The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie-Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.

  8. Comparison of secure messaging application (WhatsApp) and standard telephone usage for consultations on Length of Stay in the ED. A prospective randomized controlled study.

    PubMed

    Gulacti, Umut; Lok, Ugur

    2017-07-19

    Consultation, the process of an Emergency Physician seeking an opinion from other specialties, occurs frequently in the Emergency Department (ED). The aim of this study was to determine the effect of secure messaging application (WhatsApp) usage for medical consultations on Emergency Department Length of Stay (ED LOS) and consult time. We conducted a prospective, randomized controlled trial in the ED using allocation concealment over three months. Consultations requested in the ED were allocated into two groups: consultations requested via the secure messaging application and consultations requested by telephone as verbal. A total of 439 consultations requested in the ED were assessed for eligibility and 345 were included in the final analysis: 173 consultations were conducted using secure messaging application and 172 consultations were conducted using standard telephone communications. The median ED LOS was 240 minutes (IQR:230-270, 95% CI:240 to 255.2) for patients in the secure messaging application group and 277 minutes (IQR:270-287.8, 95% CI:277 to 279) for patients in the telephone group. The median total ED LOS was significantly lower among consults conducted using Secure messaging application relative to consults conducted by telephone (median dif: -30, 95%CI:-37to-25, p<0.0001). The median consult time was 158 minutes (IQR:133 to 177.25, 95% CI:150 to 169) for patients in the Secure messaging application group and 170 minutes (IQR:165 to 188.5, 95% CI:170-171) for patients in the Telephone group (median dif: -12, 95%CI:-19 to-7,p<0.0001). Consultations completed without ED arrival was 61.8% in the secure messaging group and 33.1% in the Telephone group (dif: 28.7, 95% CI:48.3 to 66, p<0.001). Use of secure messaging application for consultations in the ED reduces the total ED LOS and consultation time. Consultation with secure messaging application eliminated more than half of in-person ED consultation visits.

  9. The role of personal values and basic traits in perceptions of the consequences of immigration: a three-nation study.

    PubMed

    Vecchione, Michele; Caprara, Gianvittorio; Schoen, Harald; Castro, Josè Luis Gonzàlez; Schwartz, Shalom H

    2012-08-01

    Using data from Italy, Spain, and Germany (N= 1,569), this study investigated the role of basic values (universalism and security) and basic traits (openness and agreeableness) in predicting perceptions of the consequences of immigration. In line with Schwartz's (1992) theory, we conceptualized security as having two distinct components, one concerned with safety of the self (personal security) and the other with harmony and stability of larger groups and of society (group security). Structural equation modelling revealed that universalism values underlie perceptions that immigration has positive consequences and group security values underlie perceptions that it has negative consequences. Personal security makes no unique, additional contribution. Multi-group analyses revealed that these associations are invariant across the three countries except for a stronger link between universalism and perceptions of the consequences of immigration in Spain. To examine whether values mediate relations of traits to perceptions of immigration, we used the five-factor model. Findings supported a full mediation model. Individuals' traits of openness and agreeableness explained significant variance in security and universalism values. Basic values, in turn, explained perceptions of the consequences of immigration. ©2011 The British Psychological Society.

  10. Simple group password-based authenticated key agreements for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  11. 77 FR 33794 - Future Now Group, Inc., and Gammacan International, Inc.; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-07

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Future Now Group, Inc., and Gammacan International, Inc.; Order of Suspension of Trading June 5, 2012. It appears to the Securities and Exchange... concerning the securities of Gammacan International, Inc. because it has not filed any periodic reports since...

  12. A Round-Efficient Authenticated Key Agreement Scheme Based on Extended Chaotic Maps for Group Cloud Meeting

    PubMed Central

    Lee, Tian-Fu; Wang, Zeng-Bo

    2017-01-01

    The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions. PMID:29207509

  13. Comparison of three mid-urethral tension-free tapes (TVT, TVT-O, and TVT-Secur) in the treatment of female stress urinary incontinence: 1-year follow-up.

    PubMed

    Wang, Yi-jun; Li, Fei-ping; Wang, Qian; Yang, Sen; Cai, Xian-guo; Chen, Ying-he

    2011-11-01

    The purpose of the study was to evaluate and compare the clinical values of tension-free vaginal tape (TVT), tension-free vaginal tape-transobturator (TVT-O), or tension-free vaginal tape-Secur (TVT-Secur) as treatment for female stress urinary incontinence. The pre-operative and 1-year post-operative follow-up protocols for patients who were treated with serial mid-urethral tension-free tape procedures in two hospitals from October 2008 to December 2009 were prospectively studied. These patients were randomly allocated to TVT, TVT-O, or TVT-Secur. A total of 102 women participated. At the 1-year follow-up, complications were not statistically different across the three groups except for pain in the thigh, which was more common in the TVT-O group. The overall efficacy and cure rate were similar between the TVT and TVT-O groups, but were significantly lower in the TVT-Secur group. A comparison of the three procedures shows that TVT-O is easy to operate and is as safe as TVT-Secur, and it has similar long-term efficacy to TVT, though, as one of the third-generation mid-urethral tension-free tapes, TVT-Secur is still being evaluated. Basing on the outcome of our study, it had rare complications but unsatisfactory efficacy, and we suggest that TVT-Secur is not fit for severe cases. However, observation and comparison of these groups in a larger sample size on a longer term are needed.

  14. The Effects of Evaluation and Production Blocking on the Performance of Brainstorming Groups

    DTIC Science & Technology

    1992-08-01

    NUMBER OF PAGES 701 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LMIITATION OF ABSTRACT OF...special interest group. Once again, the people in the above examples share many things in common such as a sense of civil duty, an employer, a love for a...people respond differently in the presence of others, a phenomenon Zajonc refers to as compresence . In group settings, social facilitation can be

  15. A Secure and Efficient Threshold Group Signature Scheme

    NASA Astrophysics Data System (ADS)

    Zhang, Yansheng; Wang, Xueming; Qiu, Gege

    The paper presents a secure and efficient threshold group signature scheme aiming at two problems of current threshold group signature schemes: conspiracy attack and inefficiency. Scheme proposed in this paper takes strategy of separating designed clerk who is responsible for collecting and authenticating each individual signature from group, the designed clerk don't participate in distribution of group secret key and has his own public key and private key, designed clerk needs to sign part information of threshold group signature after collecting signatures. Thus verifier has to verify signature of the group after validating signature of the designed clerk. This scheme is proved to be secure against conspiracy attack at last and is more efficient by comparing with other schemes.

  16. 78 FR 50135 - AIMS Worldwide, Inc., Apollo Capital Group, Inc., CommunitySouth Financial Corp., Last Mile...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-16

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] AIMS Worldwide, Inc., Apollo Capital Group, Inc., CommunitySouth Financial Corp., Last Mile Logistics Group, Inc., Made in America Entertainment... concerning the securities of Last Mile Logistics Group, Inc. because it has not filed any periodic reports...

  17. Secure Multicast Tree Structure Generation Method for Directed Diffusion Using A* Algorithms

    NASA Astrophysics Data System (ADS)

    Kim, Jin Myoung; Lee, Hae Young; Cho, Tae Ho

    The application of wireless sensor networks to areas such as combat field surveillance, terrorist tracking, and highway traffic monitoring requires secure communication among the sensor nodes within the networks. Logical key hierarchy (LKH) is a tree based key management model which provides secure group communication. When a sensor node is added or evicted from the communication group, LKH updates the group key in order to ensure the security of the communications. In order to efficiently update the group key in directed diffusion, we propose a method for secure multicast tree structure generation, an extension to LKH that reduces the number of re-keying messages by considering the addition and eviction ratios of the history data. For the generation of the proposed key tree structure the A* algorithm is applied, in which the branching factor at each level can take on different value. The experiment results demonstrate the efficiency of the proposed key tree structure against the existing key tree structures of fixed branching factors.

  18. 77 FR 50204 - Star Entertainment Group, Inc., Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-20

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Star Entertainment Group, Inc., Order of... lack of current and accurate information concerning the securities of Star Entertainment Group, Inc. (``Star Entertainment'') because of questions regarding the accuracy of the company's financial statements...

  19. 77 FR 14839 - Harris & Harris Group, Inc.; Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-13

    ... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29976; 812-13313] Harris & Harris Group, Inc.; Notice of Application March 7, 2012. AGENCY: Securities and Exchange Commission... from section 23(c) of the Act. SUMMARY OF THE APPLICATION: Harris & Harris Group, Inc. (``Applicant...

  20. Profiles of Irish survivors of institutional abuse with different adult attachment styles.

    PubMed

    Carr, Alan; Flanagan, Edel; Dooley, Barbara; Fitzpatrick, Mark; Flanagan-Howard, Roisín; Shevlin, Mark; Tierney, Kevin; White, Megan; Daly, Margaret; Egan, Jonathan

    2009-03-01

    Two hundred and forty seven survivors of institutional abuse in Ireland were classified with the Experiences in Close Relationships Inventory as having fearful (44%), preoccupied (13%), dismissive (27%), or secure (17%) adult attachment styles. The group with the secure adult attachment style had the most positive profile, while the most negative profile occurred for the fearful group in terms of DSM IV diagnoses and scores on the Trauma Symptom Inventory, the Global Assessment of Functioning Scale, the World Health Organization Quality of Life 100 scale, and the Kansas Marital Satisfaction Scale. The profile of the preoccupied group was more similar to that of the fearful group. The profile of the dismissive group was more similar to that of the secure group.

  1. Everything moves on: referral trends to a leavers' group in a high secure hospital and trial leave progress of group graduates.

    PubMed

    Adshead, Gwen; Pyszora, Natalie; Wilson, Claire; Gopie, Ramesh; Thomas, Deryk; Smith, Julia; Glorney, Emily; Moore, Estelle; Tapp, James

    2017-04-01

    Moving on from high secure psychiatric care can be a complex and potentially stressful experience, which may hinder progression. A leavers' group in a UK high secure hospital is offered to support patients with this transition. The aims of this study are to investigate characteristics of patients referred for the leavers' group and compare outcomes for leavers' group graduates with those for patients who never attended a leavers' group for any reason. A retrospective quasi-experimental design was applied to data extracted from various records sources - within and outside the high security hospital. About one-fifth of patients who left the hospital on trial leave during the study were referred to the leavers' group (N = 109). Referred patients were significantly more likely to have either been admitted from another high-security hospital or transferred from prison for treatment and have a diagnosis of paranoid schizophrenia. Patients not referred had a significantly higher rate of previously refusing to participate in groups. There was a tendency for rate of return from trial leave for group graduates to be lower than that of patients who did not attend the leavers' group, but this just failed to reach statistical significance (rate ratio [RR] = 1.04; CI 0.97-1.11). A leavers' group appeared to be a valued therapy option for people who had spent a long time in high secure psychiatric care, or those who continued to require hospital treatment beyond prison tariffs. There was a low return rate from trial leave, which made the evaluation of this outcome difficult. A detailed study into both the reasons for return from trial leave and successes would provide further information on ideal preparation for moving on. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  2. 78 FR 24161 - Bureau of Industry and Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-24

    ... of Industry and Security senior management. 4. Discussion on General Technology Note as it applies to.... Report of Composite Working Group and other working groups. 7. Report on regime-based activities. 8...

  3. 76 FR 28499 - Data Fortress Systems Group Ltd., Digital Youth Network Corp., Fantom Technologies, Inc., and KIK...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-17

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Data Fortress Systems Group Ltd., Digital Youth Network Corp., Fantom Technologies, Inc., and KIK Technology International, Inc., Order of... of current and accurate information concerning the securities of Data Fortress Systems Group Ltd...

  4. E PLURIBUS UNUM Homeland Security versus Homeland Defense Who Does What and to Whom

    DTIC Science & Technology

    2010-04-01

    112 APPENDIX IV: SWOT ANALYSIS ............................................................................. 113 APPENDIX V...violent extremism taking root here in the United States. We don‘t have the luxury of focusing our efforts on one group ; we must protect the country from... group that engages in an activity referred to in subparagraph (A). 12 The National Security Act of 1947 created the National Security Council

  5. Unholy Charity

    DTIC Science & Technology

    2011-05-05

    groups emerge sporadic.ally. In patticular, the JMJB is widely perceived by the security and intelligent officials in Bangladesh to be the youth wing...organizations and protect others. According to National Security Intelligence sources, there are 20 to 33 Islamist ten·orist groups active in Bangladesh.29 Only...Additional Direction, National Security Intelligence , Bangladesh, broke down how the influx of charitable money is being used and misused in Bangladesh

  6. 76 FR 25702 - National Maritime Security Advisory Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-05

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0310] National Maritime Security Advisory... Maritime Security Advisory Committee (NMSAC) will meet by teleconference to discuss the results of the... Maritime Organization (IMO). Agenda (1) Results of Seafarer Access Working Group's review and...

  7. A Secure Multicast Framework in Large and High-Mobility Network Groups

    NASA Astrophysics Data System (ADS)

    Lee, Jung-San; Chang, Chin-Chen

    With the widespread use of Internet applications such as Teleconference, Pay-TV, Collaborate tasks, and Message services, how to construct and distribute the group session key to all group members securely is becoming and more important. Instead of adopting the point-to-point packet delivery, these emerging applications are based upon the mechanism of multicast communication, which allows the group member to communicate with multi-party efficiently. There are two main issues in the mechanism of multicast communication: Key Distribution and Scalability. The first issue is how to distribute the group session key to all group members securely. The second one is how to maintain the high performance in large network groups. Group members in conventional multicast systems have to keep numerous secret keys in databases, which makes it very inconvenient for them. Furthermore, in case that a member joins or leaves the communication group, many involved participants have to change their own secret keys to preserve the forward secrecy and the backward secrecy. We consequently propose a novel version for providing secure multicast communication in large network groups. Our proposed framework not only preserves the forward secrecy and the backward secrecy but also possesses better performance than existing alternatives. Specifically, simulation results demonstrate that our scheme is suitable for high-mobility environments.

  8. Implementation and evaluation of an efficient secure computation system using 'R' for healthcare statistics.

    PubMed

    Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi

    2014-10-01

    While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software 'R' by effectively combining secret-sharing-based secure computation with original computation. Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50,000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using 'R' that works interactively while secure computation protocols generally require a significant amount of processing time. We propose a secure statistical analysis system using 'R' for medical data that effectively integrates secret-sharing-based secure computation and original computation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  9. Cheating in OSCEs: The Impact of Simulated Security Breaches on OSCE Performance.

    PubMed

    Gotzmann, Andrea; De Champlain, André; Homayra, Fahmida; Fotheringham, Alexa; de Vries, Ingrid; Forgie, Melissa; Pugh, Debra

    2017-01-01

    Construct: Valid score interpretation is important for constructs in performance assessments such as objective structured clinical examinations (OSCEs). An OSCE is a type of performance assessment in which a series of standardized patients interact with the student or candidate who is scored by either the standardized patient or a physician examiner. In high-stakes examinations, test security is an important issue. Students accessing unauthorized test materials can create an unfair advantage and lead to examination scores that do not reflect students' true ability level. The purpose of this study was to assess the impact of various simulated security breaches on OSCE scores. Seventy-six 3rd-year medical students participated in an 8-station OSCE and were randomized to either a control group or to 1 of 2 experimental conditions simulating test security breaches: station topic (i.e., providing a list of station topics prior to the examination) or egregious security breach (i.e., providing detailed content information prior to the examination). Overall total scores were compared for the 3 groups using both a one-way between-subjects analysis of variance and a repeated measure analysis of variance to compare the checklist, rating scales, and oral question subscores across the three conditions. Overall total scores were highest for the egregious security breach condition (81.8%), followed by the station topic condition (73.6%), and they were lowest for the control group (67.4%). This trend was also found with checklist subscores only (79.1%, 64.9%, and 60.3%, respectively for the security breach, station topic, and control conditions). Rating scale subscores were higher for both the station topic and egregious security breach conditions compared to the control group (82.6%, 83.1%, and 77.6%, respectively). Oral question subscores were significantly higher for the egregious security breach condition (88.8%) followed by the station topic condition (64.3%), and they were the lowest for the control group (48.6%). This simulation of different OSCE security breaches demonstrated that student performance is greatly advantaged by having prior access to test materials. This has important implications for medical educators as they develop policies and procedures regarding the safeguarding and reuse of test content.

  10. Attachment, self-worth, and peer-group functioning in middle childhood.

    PubMed

    Booth-Laforce, Cathryn; Oh, Wonjung; Kim, Angel Hayoung; Rubin, Kenneth H; Rose-Krasnor, Linda; Burgess, Kim

    2006-12-01

    We evaluated links between peer-group functioning and indicators of attachment security in relation to both mother and father in middle childhood, among 73 10-year-olds (37 girls). Children's perceptions of security with both parents, coping styles with mother, and self-worth were assessed. Classmates, teachers, and mothers evaluated the participants' peer-related behavioral characteristics. Children's perceptions of security to both parents were related to others' appraisals of their social competence; perceptions of security to father were related to lower aggression. We did not find child gender effects, but children had higher security scores in relation to mother than to father. Self-worth perceptions mediated the relation between attachment and social competence.

  11. 76 FR 56244 - Dialpoint Communications Corp., Pacel Corp., Quantum Group, Inc. (The), and Tradequest...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Dialpoint Communications Corp., Pacel Corp., Quantum Group, Inc. (The), and Tradequest International, Inc.; Order of Suspension of Trading September 8... securities of Quantum Group, Inc. (The) because it has not filed any periodic reports since the period ended...

  12. Authentic leadership, group cohesion and group identification in security and emergency teams.

    PubMed

    García-Guiu López, Carlos; Molero Alonso, Fernando; Moya Morales, Miguel; Moriano León, Juan Antonio

    2015-01-01

    Authentic leadership (AL) is a kind of leadership that inspires and promotes positive psychological capacities, underlining the moral and ethical component of behavior. The proposed investigation studies the relations among AL, cohesion, and group identification in security and emergency teams. A cross-sectional research design was conducted in which participated 221 members from 26 fire departments and operative teams from the local police of three Spanish provinces. The following questionnaires were administered: Authentic Leadership (ALQ), Group Cohesion (GEQ), and Mael and Ashford's Group Identification Questionnaire. A direct and positive relation was found between AL, cohesion, and group identification. An indirect relation was also found between AL and group cohesion through group identification, indicating the existence of partial mediation. The utility of the proposed model based on AL is considered; this model can be employed by those in charge of the fire departments and operative groups in organizations to improve workteams' cohesion. Both AL and group identification help to explain group cohesion in organizations committed to security and emergencies.

  13. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks

    PubMed Central

    Castillo, Encarnación; López-Ramos, Juan A.; Morales, Diego P.

    2018-01-01

    Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature. PMID:29337921

  14. Unified Compact ECC-AES Co-Processor with Group-Key Support for IoT Devices in Wireless Sensor Networks.

    PubMed

    Parrilla, Luis; Castillo, Encarnación; López-Ramos, Juan A; Álvarez-Bermejo, José A; García, Antonio; Morales, Diego P

    2018-01-16

    Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.

  15. Educating the security forces, a high risk group in malaria elimination efforts: an example from Sri Lanka.

    PubMed

    Fernando, Sumadhya Deepika; Rodrigo, Chaturaka; de Silva, Nipun; Semege, Saveen; Rajapakse, Senaka; Samaranayake, Nilakashi; Senenayake, Sanath; Premaratne, Risintha Gayan

    2014-09-01

    The security forces are a high risk group for malaria transmission in Sri Lanka. Interrupting transmission and maintaining surveillance in this group is an important component of elimination efforts. The objective of the study was to develop a prototype educational programme on malaria for security forces serving in endemic areas. An interactive seminar was designed to deliver the required knowledge. The content was on current status, transmission, signs and symptoms and the role of security personnel in identification and prevention of malaria. Each seminar was preceded by a pre-test and followed by a post test to assess the improvement of knowledge. Fifty seminars were held in eight districts over 2 months with 2301 security forces personnel participating. Pre seminar knowledge on malaria was significantly better in the medical corps, those who had completed secondary education and in the Army compared to other security forces (p<0.001). Participation in the seminar resulted in an improvement in all domains tested as shown by test scores in post seminar assessment (p<0.001). Conducting a formal educational programme is an effective strategy to improve awareness on malaria amongst security forces personnel who are a high risk group for re-introduction of malaria into the country. © The Author 2014. Published by Oxford University Press on behalf of Royal Society of Tropical Medicine and Hygiene. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  16. Securing General Aviation

    DTIC Science & Technology

    2009-03-03

    ajor vulnerabilities still exist in ... general aviation security ,”3 the commission did not further elaborate on the nature of those vulnerabilities...commercial operations may make them an attractive alternative to terrorists seeking to identify and exploit vulnerabilities in aviation security . In this...3, 2003, p. A7. 2 See Report of the Aviation Security Advisory Committee Working Group on General Aviation Airport Security (October 1, 2003); and

  17. 78 FR 54634 - National Security Education Board; Notice of Federal Advisory Committee Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-05

    ... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), Office of the Secretary, DoD. ACTION: Meeting notice... committee working group meeting of the National Security Education Board will take place. DATES: Monday...

  18. Women's Marginalization, Economic Flows, and Environmental Flows: A Classroom Approach.

    ERIC Educational Resources Information Center

    O'Lear, Shannon

    1999-01-01

    Discusses environmental security, focusing on the meaning of "security." Defines the global economy as a process in which the security of groups is sought, maintained, or threatened. Illustrates connections among environmental security, the global economy, and abuse of women and children in less economically developed places,…

  19. Exploring Factors That Affect Adoption of Computer Security Practices among College Students

    ERIC Educational Resources Information Center

    Alqarni, Amani

    2017-01-01

    Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…

  20. 77 FR 36031 - ROK Entertainment Group, Inc., RussOil Corp., Tricell, Inc., Tunex International, Inc. (n/k/a...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-15

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] ROK Entertainment Group, Inc., RussOil Corp., Tricell, Inc., Tunex International, Inc. (n/k/a Aone Dental International Group, Inc.), and Wireless Age... there is a lack of current and accurate information concerning the securities of Wireless Age...

  1. 78 FR 35087 - Parts and Accessories Necessary for Safe Operation; Exemption Renewal for the Flatbed Carrier...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-11

    ... intermodal container loaded with eyes crosswise, grouped in rows, in which the coils are loaded to contact... cargo securement regulations for the transportation of groups of metal coils with eyes crosswise, as... cargo securement regulations (then at 49 CFR 393.100(c)) for the transportation of groups of metal coils...

  2. The Influence of Secure Emotional Expression on Team Effectiveness

    ERIC Educational Resources Information Center

    Bailey, Emily; Dewitt, Matt

    2014-01-01

    The present study examined the relationship between group effectiveness and secure emotional expression over the course of a 10 week period. The participants consisted of 12 college students who were enrolled in a senior seminar on teamwork. Participants worked in two groups of six and participated in a group meeting each week that consisted of a…

  3. Food security and the nutritional status of children in foster care: new horizons in the protection of a fragile population.

    PubMed

    Ferrara, Pietro; Scancarello, Marta; Khazrai, Yeganeh M; Romani, Lorenza; Cutrona, Costanza; DE Gara, Laura; Bona, Gianni

    2016-10-12

    The nutritional status of foster children, the quality of daily menus in group homes and the Food Security inside these organizations have been poorly studied and this study means to investigate them. A sample of 125 children, ranging in age from 0-17 years, among seven group homes (group A) was compared with 121 children of the general population we (group B). To evaluate nutritional status, BMI percentiles were used. Mean percentiles of both groups were compared through statistical analysis. Both nutritional and caloric daily distributions in each organization were obtained using the 24-hour recall method. A specific questionnaire was administered to evaluate Food Security. From the analysis of mean BMI-for-age (or height-for-length) percentiles, did not observe statistically significant differences between group A and group B. The average daily nutrient and calorie distribution in group homes proves to be nearly optimal with the exception of a slight excess in proteins and a slight deficiency in PUFAs. Moreover, a low intake of iron and calcium was revealed. All organizations obtained a "High Food Security" profile. Nutritional conditions of foster children are no worse than that of children of the general population. Foster care provides the necessary conditions to support their growth.

  4. Analyzing Cases of Resilience Success and Failure - A Research Study

    DTIC Science & Technology

    2012-12-01

    controls [NIST 2012, NIST 2008] ISO 27002 and ISO 27004 Guidelines for initiating, implementing, maintaining, and improving information security...Commission ( ISO /IEC). Information technology—Security techniques—Code of practice for information security management ( ISO /IEC 27002 :2005). ISO /IEC, 2005...security management system and controls or groups of controls [ ISO /IEC 2005, ISO /IEC 2009] CIS Security Metrics Outcome and practice metrics measuring

  5. Radioactive source security: the cultural challenges.

    PubMed

    Englefield, Chris

    2015-04-01

    Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  6. A form of relapse prevention for men in a high security hospital.

    PubMed

    Newton, Liam; Coles, Dawn; Quayle, Marie

    2005-01-01

    Marlatt and Gordon's relapse prevention model has evolved, and been applied to many repetitive problem behaviours, including drug use, gambling and sexual offending. High security hospital patients often present with a number of such behaviours. To evaluate a relapse prevention group in one high security hospital. Nine patients were selected on clinical need for the group. In a naturalistic study design, each completed several self-report questionnaires pre- and post-group. Analysis of group results demonstrated a significant increase in guilt and acceptance of responsibility for offences (GBAI ratings), and reduced endorsement of pro-offending thinking styles (PICTS). Movement towards increased empathy, and decreased impulsivity and venturesomeness, did not reach significance. All participants showed some changes in desired directions but effects were small. Both relapse prevention and its evaluation are limited in high security hospitals by the restricted opportunities for testing out new skills. The feasibility of delivering an RP programme and evaluating it in high security has nevertheless been established. The small effects found may be promising, and suggest both justification and need for a randomized controlled trial of this approach in that setting. Copyright (c) 2005 John Wiley & Sons, Ltd.

  7. NSI security task: Overview

    NASA Technical Reports Server (NTRS)

    Tencati, Ron

    1991-01-01

    An overview is presented of the NASA Science Internet (NSI) security task. The task includes the following: policies and security documentation; risk analysis and management; computer emergency response team; incident handling; toolkit development; user consulting; and working groups, conferences, and committees.

  8. Mother-Child Attachment From Infancy to the Preschool Years: Predicting Security and Stability.

    PubMed

    Meins, Elizabeth; Bureau, Jean-François; Fernyhough, Charles

    2018-05-01

    Relations between maternal mind-mindedness (appropriate and nonattuned mind-related comments), children's age-2 perspective-taking abilities, and attachment security at 44 (n = 165) and 51 (n = 128) months were investigated. Nonattuned comments predicted insecure preschool attachment, via insecure 15-month attachment security (44-month attachment) and poorer age-2 perspective-taking abilities (51-month attachment). With regard to attachment stability, higher perspective-taking abilities distinguished the stable secure groups from (a) the stable insecure groups and (b) children who changed from secure to insecure (at trend level). These effects were independent of child gender, stressful life events, and socioeconomic status (SES). The contribution of these findings to our understanding of stability and change in attachment security from infancy to the preschool years is discussed. © 2017 The Authors. Child Development © 2017 Society for Research in Child Development, Inc.

  9. How effective is high-support community-based step-down housing for women in secure mental health care? A quasi-experimental pilot study.

    PubMed

    Barr, W; Brown, A; Quinn, B; McFarlane, J; McCabe, R; Whittington, R

    2013-02-01

    In the past decade UK government policy has been to develop alternative care for women detained in secure psychiatric hospital. This study evaluated the relative benefits of community-based step-down housing. Comparisons were made between female patients in community step-down housing and a control group in secure hospital who were on the waiting list for the houses. For each woman in the sample, a range of assessments was conducted on three separate occasions over a 12-month period. We noted a gradual improvement over time in women in both settings. However, by the final assessment psychological well-being and security needs were significantly better in the community group (P < 0.05). Although risks for violence and social functioning were also somewhat better in this group throughout the study, no statistically significant differences between the groups were found in these areas at any assessment time. This study has generated evidence in support of the further development of high-support step-down community housing for women in secure psychiatric care. This initiative may provide greater personal freedom and enhanced relational security for the women concerned while also facilitating improvements in their psychological well-being, with no increased risk to the women themselves or to the wider community. © 2012 Blackwell Publishing.

  10. Household food insecurity, diet quality, and weight status among indigenous women (Mah Meri) in Peninsular Malaysia

    PubMed Central

    2018-01-01

    BACKGROUND/OBJECTIVES This cross-sectional study assessed household food security status and determined its association with diet quality and weight status among indigenous women from the Mah Meri tribe in Peninsular Malaysia. SUBJECTS/METHODS The Radimer/Cornell Hunger and Food Insecurity Instrument and the Malaysian Healthy Eating Index (HEI) were used to assess household food security status and diet quality, respectively. Information on socio-demographic characteristics and 24-hour dietary recall data were collected through face-to-face interview, and anthropometric measurements including weight, height, and body mass index (BMI) were obtained from 222 women. RESULTS Majority of households (82.9%) experienced different levels of food insecurity: 29.3% household food insecurity, 23.4% individual food insecurity, and 30.2% fell into the child hunger group. The food-secure group had significantly fewer children and smaller household sizes than the food-insecure groups (P < 0.05). The mean household income, income per capita, and food expenditure significantly decreased as food insecurity worsened (P < 0.001). The food-secure group had significantly higher Malaysian HEI scores for grains and cereals (P < 0.01), as well as for meat, poultry, and eggs (P < 0.001), than the food-insecure groups. The child-hunger group had significantly higher fat (P < 0.05) and sodium (P < 0.001) scores than the food-secure and household food-insecure groups. Compared to the individual food-insecure and child-hunger groups, multivariate analysis of covariance showed that the food-secure group was significantly associated with a higher Malaysian HEI score while the household food-insecure group was significantly associated with a higher BMI after controlling for age (P < 0.025). CONCLUSIONS The majority of indigenous households faced food insecurity. Food insecurity at the individual and child levels was associated with lower quality of diet, while food insecurity at the household level was associated with higher body weight. Therefore, a substantial effort by all stakeholders is warranted to improve food insecurity among poorer households. The results suggest a pressing need for nutritional interventions to improve dietary intake among low income households. PMID:29629030

  11. Household food insecurity, diet quality, and weight status among indigenous women (Mah Meri) in Peninsular Malaysia.

    PubMed

    Pei, Chong Su; Appannah, Geeta; Sulaiman, Norhasmah

    2018-04-01

    This cross-sectional study assessed household food security status and determined its association with diet quality and weight status among indigenous women from the Mah Meri tribe in Peninsular Malaysia. The Radimer/Cornell Hunger and Food Insecurity Instrument and the Malaysian Healthy Eating Index (HEI) were used to assess household food security status and diet quality, respectively. Information on socio-demographic characteristics and 24-hour dietary recall data were collected through face-to-face interview, and anthropometric measurements including weight, height, and body mass index (BMI) were obtained from 222 women. Majority of households (82.9%) experienced different levels of food insecurity: 29.3% household food insecurity, 23.4% individual food insecurity, and 30.2% fell into the child hunger group. The food-secure group had significantly fewer children and smaller household sizes than the food-insecure groups ( P < 0.05). The mean household income, income per capita, and food expenditure significantly decreased as food insecurity worsened ( P < 0.001). The food-secure group had significantly higher Malaysian HEI scores for grains and cereals ( P < 0.01), as well as for meat, poultry, and eggs ( P < 0.001), than the food-insecure groups. The child-hunger group had significantly higher fat ( P < 0.05) and sodium ( P < 0.001) scores than the food-secure and household food-insecure groups. Compared to the individual food-insecure and child-hunger groups, multivariate analysis of covariance showed that the food-secure group was significantly associated with a higher Malaysian HEI score while the household food-insecure group was significantly associated with a higher BMI after controlling for age ( P < 0.025). The majority of indigenous households faced food insecurity. Food insecurity at the individual and child levels was associated with lower quality of diet, while food insecurity at the household level was associated with higher body weight. Therefore, a substantial effort by all stakeholders is warranted to improve food insecurity among poorer households. The results suggest a pressing need for nutritional interventions to improve dietary intake among low income households.

  12. 75 FR 65046 - In the Matter of Cape Systems Group, Inc., Caribbean Cigar Company, Casual Male Corp., Cell Power...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-21

    ... SECURITIES AND EXCHANGE COMMISSION In the Matter of Cape Systems Group, Inc., Caribbean Cigar...., File No. 500-1; Order of Suspension of Trading October 19, 2010. It appears to the Securities and... Cape Systems Group, Inc. because it has not filed any periodic reports since the period ended December...

  13. 78 FR 27966 - Joint Working Group on Improving Cybersecurity and Resilience Through Acquisition

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-13

    ... Working Group on Improving Cybersecurity and Resilience Through Acquisition AGENCY: Office of Emergency... the Department of Homeland Security and the Federal Acquisition Regulation Council, are required to... security standards into acquisition planning and contract administration and address what steps [[Page...

  14. Terrorism in Southeast Asia

    DTIC Science & Technology

    2007-09-11

    clerics Abu Bakar Baasyir and Abdullah Sungkar, began demanding the establishment of sharia law in Indonesia. The two considered themselves the...the violent Abu Sayyaf Group. It has also launched a Regional Maritime Security Initiative to enhance security in the Straits of Malacca, increase...15 The Abu Sayyaf Group

  15. 77 FR 19300 - National Infrastructure Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-03-30

    ... Homeland Security with advice on the security of the critical infrastructure sectors and their information systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as... Group regarding the scope of the next phase of the Working Group's critical infrastructure resilience...

  16. IPv6 Security

    NASA Astrophysics Data System (ADS)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  17. Single incision device (TVT Secur) versus retropubic tension-free vaginal tape device (TVT) for the management of stress urinary incontinence in women: a randomized clinical trial.

    PubMed

    Ross, Sue; Tang, Selphee; Schulz, Jane; Murphy, Magnus; Goncalves, Jose; Kaye, Stephen; Dederer, Lorel; Robert, Magali

    2014-12-22

    In 2006, Ethicon Inc. introduced a new minimally invasive single incision sling device for the surgical treatment of stress urinary incontinence, the Gynecare TVT Secur®. For device licensing, no new evidence of TVT Secur efficacy and safety was needed: rather evidence was provided of the long-term follow-up of patients who had a procedure using a predecate retropubic tension-free vaginal tape device. Before adopting TVT Secur into our routine clinical practice, we decided to evaluate it. The objective of our Canadian multi-centre pragmatic randomized controlled trial was to compare the effectiveness of the new single-incision device, TVT Secur, to the established TVT device, in terms of objective cure of stress urinary incontinence (SUI) at 12 months postoperatively. Other outcomes included: complications, symptoms, and incontinence-related quality of life. The sample size estimate for our trial was 300, but the trial stopped early because of poor recruitment. 74 women participated (40 allocated to TVT Secur, 34 to TVT). At 12 months postoperatively, 27/33(82%) of TVT Secur group were cured, compared with 25/28(89%) of the TVT group (relative risk 0.92, 95% confidence interval 0.75 to 1.13, p=0.49). Most women reported little or no SUI symptoms (35/37(95%) vs 29/30(97%), >0.999). Quality of life improved significantly from baseline for both groups (IIQ-7 mean change -25 for both groups) but did not differ between groups (p=0.880). Our small randomized trial did not find statistically significant differences in outcomes between women allocated to the TVT Secur device versus those allocated to the TVT device for stress urinary incontinence. Despite the discontinuation of TVT Secur in March 2013 for commercial reasons, the importance of our study lies in making evidence available for the many women who had a TVT Secur device implanted and their physicians who may be considering alternative treatments. Our experience illustrates the difficulty of undertaking research on new licensed devices in a rapidly changing surgical specialty, and further highlights the need for research before licensing if surgeons and their patients are to be confident in the effectiveness and safety of new surgical devices. ClinicalTrials.gov NCT00685217, 22 May 2008.

  18. [Our experience with mini tapes (TVT Secur and MiniArc) in the surgery for stress urinary incontinence].

    PubMed

    Jiménez Calvo, J; Hualde Alfaro, A; Raigoso Ortega, O; Cebrian Lostal, J L; Alvarez Bandres, S; Jiménez Parra, J; Montesino Semper, M; Santiago Gonzalez de Garibay, A

    2008-01-01

    The purpose of this publication is to describe the surgical technique, assess complications and short-term results of TVT secur and MiniArc tapes. From October 2006 to August 2007 it was carried out the surgical correction with TVT Secur,Women's Health & Urology, Ethicon, Johnson & Johnson, placing the tape as a hammock, to 51 patients, 38 of them with pure stress incontinence and 13 with mixed incontinence and with an average age of 57 years. From September 2007 to February 2008 41 patients, 33 of them with pure stress incontinence and 8 with mixed incontinence, with an average of age of 58 years were operated with AMS Miniarc swing system tape, posted on hammock. All procedures were performed with sedoanalgesia and Ambulatory Surgery regime. Patients were monitored in outpatient visits one month, 3 months and one year after surgical procedure. Medical history and questionnaire and ICIQ-SF, to which we added a question to quantify the degree of satisfaction, as well as physical examination, were done. We compared the results of both technical procedures and statistical survey was conducted by Student test. [Analysis with SPSS software (V14.0)]. The median follow-up in TVT secur group was 328 days (range 163-522 days) and 101 days (range 41-209 days) inthe MiniArc group. We only had one (TVT secur group) surgical complication in all the series (92 patients) being a bladder perforation. Taking into account that we read a negative test effort as an objective cure in the TVT secur group, 80.4% patients are cured and 90.2% inthe MiniArc group without significant difference between both groups (p 0095). To assess the subjective healing we utilized the ICIQ-SF test and the satisfaction extra-question and we noted that there is no significant difference between the first and third month controls. (90% of patients satisfied). 80% of patients were completely satisfied in the first year control that was only performed to TVT secur group. These new tapes show fewer complications that the TVT-O and TOT tapes and allow the possibility of placement with local anesthesia but further studies are needed.

  19. Social Security.

    ERIC Educational Resources Information Center

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  20. Integrity and security in an Ada runtime environment

    NASA Technical Reports Server (NTRS)

    Bown, Rodney L.

    1991-01-01

    A review is provided of the Formal Methods group discussions. It was stated that integrity is not a pure mathematical dual of security. The input data is part of the integrity domain. The group provided a roadmap for research. One item of the roadmap and the final position statement are closely related to the space shuttle and space station. The group's position is to use a safe subset of Ada. Examples of safe sets include the Army Secure Operating System and the Penelope Ada verification tool. It is recommended that a conservative attitude is required when writing Ada code for life and property critical systems.

  1. The influence of the different forms of appendix base closure on patient outcome in laparoscopic appendectomy: a randomized trial.

    PubMed

    Delibegović, Samir; Mehmedovic, Zlatan

    2018-05-01

    During laparoscopic appendectomy, the base of the appendix is usually secured by loop ligature or stapling device. Hem-o-lok and DS clips have been shown as alternative techniques. The aim of this study was to compare the clinical outcomes of various forms of securing the base of the appendix, in order to find the most suitable method. The study included 120 patients with acute appendicitis randomly divided into four groups with 30 patients in each. In the first group, the base of the appendix was secured using an Endoloop, in the second group using a stapling device, in the third group using Hem-o-lok, and in the fourth group using a DS clip. The primary outcome was overall morbidity following securing the base of the appendix. Secondary outcomes were time of application and operative procedure, total length of stay, and surgical outcome. No morbidity was recorded in any group. The time of application was significantly longer in the Endoloop group than in the Stapler (P < 0.0001), Hem-o-lok (P < 0.0001), and DS clips (P < 0.0001) groups. The time of application in the Stapler group was significantly shorter than in the Hem-o-lok (P < 0.0001) and the DS clips (P < 0.0001) groups. The time of the operative procedure was significantly longer in the Endoloop than in the Stapler group (P < 0.0001). The time of the operative procedure in the Stapler group was significantly shorter than in the DS clips group (P < 0.0001) but did not differ significantly from the Hem-o-lok group (P = 0.199). The time of the operative procedure in the Hem-o-lok group was significantly shorter than in the DS clips group (P = 0.044). All forms of closure of the appendix base are acceptable, but Hem-o-lok and DS clips have the best potential for further development, and will probably become the method of choice in securing the base of the appendix.

  2. 78 FR 50134 - Altus Pharmaceuticals, Inc., Blackhawk Capital Group BDC, Inc., Cargo Connection Logistics...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-16

    ... lack of current and accurate information concerning the securities of Cargo Connection Logistics... Group BDC, Inc., Cargo Connection Logistics Holding, Inc., Diapulse Corporation of America, Globus... current and accurate information concerning the securities of Altus Pharmaceuticals, Inc. because it has...

  3. Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library

    ERIC Educational Resources Information Center

    McMullen, Karen D.; Kane, Laura Townsend

    2008-01-01

    In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…

  4. 76 FR 44079 - M (2003) PLC (f/k/a Marconi PLC), Mayfair Mining & Minerals, Inc., MM2 Group, Inc., Nayna...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-22

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] M (2003) PLC (f/k/a Marconi PLC), Mayfair Mining & Minerals, Inc.,MM2 Group, Inc., Nayna Networks, Inc., NCT Group, Inc., and Neptune Industries... securities of M (2003) PLC (f/k/a Marconi PLC) because it has not filed any periodic reports since the period...

  5. 75 FR 13805 - Aspen Group Resources Corp., Commercial Concepts, Inc., Desert Health Products, Inc., Equalnet...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-23

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Aspen Group Resources Corp., Commercial Concepts, Inc., Desert Health Products, Inc., Equalnet Communications Corp., Geneva Steel Holdings Corp... securities of Commercial Concepts, Inc. because it has not filed any periodic reports since the period ended...

  6. 77 FR 66211 - Self-Regulatory Organizations; Chicago Mercantile Exchange Inc.; Notice of Filing of Proposed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-02

    ... audited by independent public accountants to all CDS Clearing Members engaged in security-based swap... clearing security-based swaps a report by independent public accountants regarding CME Group's system of... CME Group Inc. by independent public accountant regarding its system of internal accounting control...

  7. Cryptographic Research and NSA: Report of the Public Cryptography Study Group.

    ERIC Educational Resources Information Center

    Davida, George I.

    1981-01-01

    The Public Cryptography Study Group accepted the claim made by the National Security Agency that some information in some publications concerning cryptology could be inimical to national security, and is allowing the establishment of a voluntary mechanism, on an experimental basis, for NSA to review cryptology manuscripts. (MLW)

  8. Report of the Public Cryptography Study Group.

    ERIC Educational Resources Information Center

    American Council on Education, Washington, DC.

    Concerns of the National Security Agency (NSA) that information contained in some articles about cryptography in learned and professional journals and in monographs might be inimical to the national security are addressed. The Public Cryptography Study Group, with one dissenting opinion, recommends that a voluntary system of prior review of…

  9. 77 FR 22622 - AP Henderson Group, BPO Management Services, Inc., Capital Mineral Investors, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-16

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] AP Henderson Group, BPO Management Services, Inc., Capital Mineral Investors, Inc., CardioVascular BioTherapeutics, Inc., and 1st Centennial... that there is a lack of current and accurate information concerning the securities of 1st Centennial...

  10. 78 FR 46851 - Controlled Group Regulation Examples

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-02

    .... Investment Company Z, which keeps its books and makes its returns on the basis of the calendar year, at the... that illustrate the controlled group rules related to regulated investment companies (RICs). These... Government securities or the securities of other regulated investment companies) of any one issuer, (ii) the...

  11. Effective user management with high strength crypto -key in dynamic group environment in cloud

    NASA Astrophysics Data System (ADS)

    Kumar, P. J.; Suganya, P.; Karthik, G.

    2017-11-01

    Cloud Clusters consists of various collections of files which are being accessed by multiple users of Cloud. The users are managed as a group and the association of the user to a particular group is dynamic in nature. Every group has a manager who handles the membership of a user to a particular group by issuing keys for encryption and decryption. Due to the dynamic nature of a user he/she may leave the group very frequently. But an attempt can be made by the user who has recently left the group to access a file maintained by that group. Key distribution becomes a critical issue while the behavior of the user is dynamic. Existing techniques to manage the users of group in terms of security and key distribution has been investigated so that to arrive at an objective to identify the scopes to increase security and key management scheme in cloud. The usage of various key combinations to measure the strength of security and efficiency of user management in dynamic cloud environment has been investigated.

  12. 76 FR 72967 - Aviation Security Advisory Committee (ASAC) Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-28

    ...The Transportation Security Administration (TSA) will hold a meeting of the Aviation Security Advisory Committee (ASAC) via telephone conference on December 15, 2011, to establish working groups and set the agenda for future activity. This meeting will be open to the public.

  13. Job security and work performance in Chinese employees: The mediating role of organisational identification.

    PubMed

    Ma, Bing; Liu, Shanshi; Liu, Donglai; Wang, Hongchun

    2016-04-01

    This research focuses on investigating whether organisational identification mediates the effects of job security on in-role behaviour and extra-role behaviour and how these mediation mechanisms differ according to gender. Through analysing 212 supervisor-subordinate dyads from a Chinese air transportation group, the research indicated that organisational identification partially mediated the effect of job security on in-role behaviour and fully mediated the effect of job security on extra-role behaviour. A multi-group analysis also showed that there were significant differences between male and female employees in these relationships. In addition, moderated mediation analyses showed that gender moderated the indirect effects of job security on in-role behaviour and extra-role behaviour through organisational identification. Limitations and implications of these findings are discussed. © 2015 International Union of Psychological Science.

  14. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen

    2013-07-09

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  15. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOEpatents

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    2015-01-06

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.

  16. Building a highly available and intrusion tolerant Database Security and Protection System (DSPS).

    PubMed

    Cai, Liang; Yang, Xiao-Hu; Dong, Jin-Xiang

    2003-01-01

    Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.

  17. Bahrain: Reform, Security, and U.S. Policy

    DTIC Science & Technology

    2017-09-29

    responsibility for bombings and other attacks primarily against security officials. The Bahrain government’s use of repression against the dissent...activity of violent, underground groups that, among their tactics, detonate bombs and improvised explosive devices (IEDs) against security forces. These...issued its first public statement in April 2013 and has since claimed responsibility for about 20 bombings against security personnel, including one

  18. Matrix Game Methodology - Support to V2010 Olympic Marine Security Planners

    DTIC Science & Technology

    2011-02-01

    OMOC was called the Integrated Safety /Security Matrix Game – Marine III, and was held 16-17 June 2009. This was the most extensive and complex of...Protection Matrix Game Marine Two .................................................. 12 3.3 Integrated Safety /Security Matrix Game – Marine III...Integrated Safety /Security Matrix Game – Marine III Scenarios........................... 53 ISSMG Marine III – Team Groupings

  19. The Quality of Maternal Secure-Base Scripts Predicts Children's Secure-Base Behavior at Home in Three Sociocultural Groups

    ERIC Educational Resources Information Center

    Vaughn, Brian E.; Coppola, Gabrielle; Verissimo, Manuela; Monteiro, Ligia; Santos, Antonio Jose; Posada, German; Carbonell, Olga A.; Plata, Sandra J.; Waters, Harriet S.; Bost, Kelly K.; McBride, Brent; Shin, Nana; Korth, Bryan

    2007-01-01

    The secure-base phenomenon is central to the Bowlby/Ainsworth theory of attachment and is also central to the assessment of attachment across the lifespan. The present study tested whether mothers' knowledge about the secure-base phenomenon, as assessed using a recently designed wordlist prompt measure for eliciting attachment-relevant stories,…

  20. Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy

    DTIC Science & Technology

    2011-05-15

    attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks

  1. What lessons can operational planners infer from the NATO Partnership for Peace Program for the execution of contemporary US Regionally Aligned Force and UK Adaptable Force Security Cooperation missions

    DTIC Science & Technology

    2016-05-26

    research questions consist of three groups . The first group addresses an analysis of PfP. The second group determines contemporary US and UK strategy...The second group of research questions focuses upon current US, UK security cooperation initiatives and the specific policy objectives they...Ambition, Austerity and the Case for Rethinking UK Military Spending.” Oxford Research Group . Last modified May 13, 2015. Accessed September 17, 2015

  2. Marketing Strategy and Implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None, None

    This report documents the preparation of materials for the marketing campaign that has been designed for middle and high school students in New Mexico to increase interest in participation in national security careers at the National Nuclear Security Administration. The materials and the marketing campaign build on the research that was previously completed, as well as the focus groups that were conducted. This work is a part of the National Nuclear Security Preparedness Project (NSPP). Previous research included outcome analysis to determine appropriate marketing strategies. The analysis was based upon focus groups with middle school and high school students, studentmore » interactions, and surveys completed by students to understand and gauge student interest in Science, Technology, Engineering, and Math (STEM) subjects, interest in careers at NNSA, future job considerations, and student desire to pursue post-secondary education. Further, through the focus groups, students were asked to attend a presentation on NNSA job opportunities and employee requirements. The feedback received from the students was utilized to develop the focus and components of a marketing campaign divided into DISCO (Discovering Intelligence and Security Career Opportunities) for the middle school age group and DISCO…..Your Way! for high school age groups. Both campaigns have an intertwined message that focuses on the education of students in the various national security career opportunities at NNSA using the STEM concepts and the notion that almost any career they can think of has a fit within NNSA. Further, a special emphasis has been placed on the importance of obtaining a national security clearance when working at NNSA and the steps that will need to be taken during middle school, high school, and college to be allowed this opportunity.« less

  3. Perioperative complications and early follow-up with 100 TVT-SECUR procedures.

    PubMed

    Neuman, Menahem

    2008-01-01

    Our objective was to evaluate the complications and early follow-up of the tension-free vaginal tape (TVT)-SECUR, a new minimally invasive anti-incontinence operative procedure. A prospective, observational, and consecutive patient series was conducted. Perioperative and 12-month postoperative data were prospectively collected for the first 50 patients against the next consecutive 50 patients, among which TVT-SECUR specific surgical measurements were adopted (Canadian Task Force classification 2). In private hospital operative theatres, the TVT-SECUR operation was performed. Patients with urodynamically proved stress urinary incontinence were enrolled in this study after detailed informed consent was given. The TVT-SECUR, in the hammock shape to mimic the TVT-obturator placement, yet with no skin incisions, required neither bladder catheterization nor intraoperative diagnostic cystoscopy. The clinical and surgical data of 100 consecutive patients with TVT-SECUR were collected prospectively. Two patients had urinary obstructions and needed surgical tape-tension relief. One patient had a 50 mL paravesical self-remitting hematoma. At the first-month postoperative follow-up appointment, the objective therapeutic failure rate for the TVT-SECUR procedure among the 50 patients was 20.0% (10 patients). But when the tape was placed close to the urethra with no space allowed in between, the failure rate in the second patient group went down to 8.0% (4 patients); yet no further postoperative bladder outlet obstruction was diagnosed. Four (8.0%) patients in the first group had vaginal wall penetration with the inserters, requiring withdrawal, reinsertion, and vaginal wall repair. This was avoided with the second patient group by facilitating the inserters' introduction by widening the submucosal tunnel to 12 mm. Six (12.0%) other patients in the first group needed postoperative trimming of a vaginally extruded tape segment, performed in the office with satisfactory results. This problem was addressed later by making the submucosal dissection deeper to avoid intimate proximity of the tape with the vaginal mucosa. Consequently the tape protrusion rate was reduced to 8% (4 patients). Five (10.0%) patients in the first group had unintended tape removal at the time of inserter removal, necessitating the use of a second TVT-SECUR. This was addressed by meticulous detachment of the inserter before its withdrawal, after which no further unintended tape displacements were recorded. No clinical signs for bowel, bladder, or urethral injuries; intraoperative bleeding; or postoperative infections were evident. Telephone interview at the end of 12 months postoperatively was completed with 44 (88.0%) of the first patient group and 46 (92%) of the second patient group. In all, 39 (88.6%) and 43 (93.5%) of the telephone-interviewed patients of the first and second groups, respectively, reported objective urinary continence. The TVT-SECUR, a new midurethral sling, was associated with early safety and efficacy problems. These were identified and rectified, to make the TVT-SECUR a safe and effective anti-incontinence procedure. Operative complications associated with the TVT, such as bladder penetration and postoperative outlet obstruction, and TVT-obturator complications, such as postoperative thigh pain and bladder outlet obstruction, may be reduced with the TVT-SECUR. The first 100 operations' cumulative data analysis yielded some insights, including the necessity of meticulous and proper dissection before placement of the tape and the need for applying minimal extra tension to the tape. However, long-term comparative data collection will be required to draw solid conclusions regarding the appropriate position of this operative technique within the spectrum of anti-incontinence operations.

  4. Consumer Attitudes and Perceptions on mHealth Privacy and Security: Findings From a Mixed-Methods Study.

    PubMed

    Atienza, Audie A; Zarcadoolas, Christina; Vaughon, Wendy; Hughes, Penelope; Patel, Vaishali; Chou, Wen-Ying Sylvia; Pritts, Joy

    2015-01-01

    This study examined consumers' attitudes and perceptions regarding mobile health (mHealth) technology use in health care. Twenty-four focus groups with 256 participants were conducted in 5 geographically diverse locations. Participants were also diverse in age, education, race/ethnicity, gender, and rural versus urban settings. Several key themes emerged from the focus groups. Findings suggest that consumer attitudes regarding mHealth privacy/security are highly contextualized, with concerns depending on the type of information being communicated, where and when the information is being accessed, who is accessing or seeing the information, and for what reasons. Consumers frequently considered the tradeoffs between the privacy/security of using mHealth technologies and the potential benefits. Having control over mHealth privacy/security features and trust in providers were important issues for consumers. Overall, this study found significant diversity in attitudes regarding mHealth privacy/security both within and between traditional demographic groups. Thus, to address consumers' concerns regarding mHealth privacy and security, a one-size-fits-all approach may not be adequate. Health care providers and technology developers should consider tailoring mHealth technology according to how various types of information are communicated in the health care setting, as well as according to the comfort, skills, and concerns individuals may have with mHealth technology.

  5. 28 CFR 524.72 - CIM assignment categories.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... groups (e.g., prison gangs), which have a history of disrupting operations and security in either state... assignment categories. CIM cases are classified according to the following assignments: (a) Witness Security... safety of these individuals. There are two types of Witness Security cases: Department of Justice...

  6. Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications

    NASA Astrophysics Data System (ADS)

    Meyerstein, Mike; Cha, Inhyok; Shah, Yogendra

    The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.

  7. Certified Training for Nuclear and Radioactive Source Security Management.

    PubMed

    Johnson, Daniel

    2017-04-01

    Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  8. Effects of perceived job insecurity on depression, suicide ideation, and decline in self-rated health in Korea: a population-based panel study.

    PubMed

    Kim, Min-Seok; Hong, Yun-Chul; Yook, Ji-Hoo; Kang, Mo-Yeol

    2017-10-01

    To investigate the effects of job security on new development of depressive episode, suicide ideation, and decline in self-rated health. Data from the Korea Welfare Panel Study from 2012 to 2015 were analysed. A total of 2912 waged workers self-assessed their depressive episode, suicide ideation, and health annually by answering the questionnaire. Participants were divided into three groups according to the level of job security: high, intermediate and low. To evaluate the influence of job security, we performed survival analysis after stratification by gender with adjustment for covariates. The result was further stratified by whether the respondent was the head of household. After adjusting for covariates, men in low job security group showed significantly higher hazard ratios (HRs) for depression (HR 1.27, 95% CI 1.01-1.60), suicide ideation (HR 3.25, 95% CI 1.72-6.16), and decline in self-rated health (HR 1.73, 95% CI 1.16-2.59). Women showed significantly higher HR of depression in the intermediate (HR 1.37, 95% CI 1.01-1.87) and low (HR 1.50, 95% CI 1.12-1.99) job security group. Male head of household with low job security showed significantly higher HR of depression, suicide ideation, and decline in self-rated health. Non-head-of-household women with intermediate and low job security showed higher risk of depression than those with high job security. We found that perceived job insecurity is associated with the new development of depressive episode, suicide ideation, and decline in self-rated health.

  9. 78 FR 45010 - In the Matter of Camelot Entertainment Group, Inc., Cavico Corp., Global 8 Environmental...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-25

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Camelot Entertainment Group, Inc., Cavico Corp., Global 8 Environmental Technologies, Inc., GTC Telecom Corp., ICF Corporation, and... concerning the securities of GTC Telecom Corp. because it has not filed any periodic reports since the period...

  10. 76 FR 72235 - Abviva, Inc., ACTIS Global Ventures, Inc., aeroTelesis, Inc., Amwest Insurance Group, Inc., and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-22

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Abviva, Inc., ACTIS Global Ventures, Inc., aeroTelesis, Inc., Amwest Insurance Group, Inc., and Auto Underwriters of America, Inc.; Order of... concerning the securities of Auto Underwriters of America, Inc. because it has not filed any periodic reports...

  11. Efficacy and safety of TVT-O and TVT-Secur in the treatment of female stress urinary incontinence: 1-year follow-up.

    PubMed

    Tommaselli, Giovanni A; Di Carlo, Costantino; Gargano, Virginia; Formisano, Carmen; Scala, Mariamaddalena; Nappi, Carmine

    2010-10-01

    To reduce complications of transobturator tension-free vaginal tape, single-incision devices were introduced in the last years. We here report a comparison between the tension-free vaginal tape-obturator (TVT-O) and the TVT-Secur techniques in terms of efficacy and safety. Eighty-four patients with stress urinary incontinence (SUI) were scheduled to undergo TVT-O or TVT-Secur. Duration of the procedure, subjective estimate of blood loss, intraoperative and postoperative complications, postoperative postvoidal residue (PVR), time to first voiding, and pain level were recorded. Urodynamic tests, PVR, Incontinence Questionnaire Short Form (ICIQ-SF), King's Health Questionnaire, and a urinary diary were performed before and 12 months after procedure. No differences in terms of cure rate were observed between the two groups (81.6% vs. 83.8%). Complication rate in the TVT-Secur group was lower (8.1%) than in the TVT-O group (15.8%), but not significant. Both techniques seem to be effective and safe, with a low incidence of complications in both groups.

  12. Quality Group Home Care for Adults with Developmental Disabilities and/or Mental Health Disorders: Yearning for Understanding, Security and Freedom.

    PubMed

    Shipton, Leah; Lashewicz, Bonnie M

    2017-09-01

    The purpose of this study was to uncover and understand factors influencing quality of care received by adults with developmental disabilities and/or mental health disorders living in group homes. The present authors conducted a secondary analysis of data from nine focus group discussions with adults with developmental disabilities and/or mental health disorders, and their family and paid caregivers (N = 52). To focus the analysis, the present authors drew on the research literature to craft a model of quality of group home care using concepts of social inclusion and self-determination, and corresponding staff approaches that include active support and person-centred care. Social inclusion and self-determination for adults in group homes are facilitated by staff approaches and manifest in residents being understood and experiencing security and freedom. The present authors offer recommendations for group home resources, training, communication and outcome measures that promote residents' being understood and experiencing security and freedom. © 2016 John Wiley & Sons Ltd.

  13. The role of attachment insecurity in the emergence of anxiety symptoms in children and adolescents with migraine: an empirical study.

    PubMed

    Williams, Riccardo; Leone, Luigi; Faedda, Noemi; Natalucci, Giulia; Bellini, Benedetta; Salvi, Elisa; Verdecchia, Paola; Cerutti, Rita; Arruda, Marco; Guidetti, Vincenzo

    2017-12-01

    It is widely recognised that there are associations between headache, psychiatric comorbidity and attachment insecurity in both adults and children. The aims of this study were: 1) to compare perceived attachment security and anxiety in children and adolescents with migraine without aura and a healthy control group; 2) to test whether the child's perceived security of attachment to the mother and the father mediated the association between migraine and anxiety. One hundred children and adolescents with Migraine without Aura were compared with a control group of 100 children without headache. The Security Scale (measures perceived security of attachments) and the Self-Administered Psychiatric Scales for Children and Adolescents, a measure of anxiety symptoms, were administered to all participants. The clinical group had lower attachment security than the control group and higher scores on all anxiety scales. Anxiety was negatively correlated with attachment. Children's attachment to their mother mediated the increase in global anxiety in the clinical group. Insecure paternal attachment was associated with greater insecurity in maternal attachment, suggesting that there is a complex pathway from migraine to anxiety symptoms mediated by perceived insecurity of paternal attachment and hence also by perceived insecurity of maternal attachment. These results suggest that insecure parental attachment may exacerbate anxiety in children and adolescents with migraine and point to the importance of multimodal interventions, perhaps taking account of family relationships, for children and adolescents with migraine.

  14. Multinational Experiment 6 (MNE 6) Doctrine Note: Security Transitions

    DTIC Science & Technology

    2010-10-28

    to Transition in Northern Ireland In Armagh, Northern Ireland , public perception became a key driver of the security transition and shaped what had...government and non-state actors, including religious and tribal affiliations, genders , age groups and geographic areas provides a richer basis for planning...functions necessary to maintain security; gaps may also emerge within particular elements of the security and justice sectors. Partners may lack

  15. Managing the Security of Nursing Data in the Electronic Health Record

    PubMed Central

    Samadbeik, Mahnaz; Gorzin, Zahra; Khoshkam, Masomeh; Roudbari, Masoud

    2015-01-01

    Background: The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. Methods: This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts’ opinions and Cronbach’s alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. Results: The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Conclusions: Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing of these requirements helps policy makers to decide what to do when planning for EHR implementation. Therefore, to make appropriate security decisions and to achieve the expected level of protection of the electronic nursing information, it is suggested to consider the priorities of both groups of experts about security principles and also discuss the issues seem to be different between two groups of participants in the research. PMID:25870490

  16. Managing the security of nursing data in the electronic health record.

    PubMed

    Samadbeik, Mahnaz; Gorzin, Zahra; Khoshkam, Masomeh; Roudbari, Masoud

    2015-02-01

    The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts' opinions and Cronbach's alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing of these requirements helps policy makers to decide what to do when planning for EHR implementation. Therefore, to make appropriate security decisions and to achieve the expected level of protection of the electronic nursing information, it is suggested to consider the priorities of both groups of experts about security principles and also discuss the issues seem to be different between two groups of participants in the research.

  17. Secure multi-party communication with quantum key distribution managed by trusted authority

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen

    Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD aremore » extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.« less

  18. Quantum Secure Group Communication.

    PubMed

    Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M

    2018-03-01

    We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.

  19. Alternative Futures: United States Air Force Security Police in the Twenty-First Century

    DTIC Science & Technology

    1988-04-01

    34What policies should today’s Air Force leadership be pursuing to prepare for tomorrow’s combat support and security police roles?’ The monograph...Further, it addresses the capability of the Air Force to respond to its future combat support and security police missions and their integration into the...security police organizations. His most recent assignments were as the deputy commander of a combat support group and the commander of a security police

  20. Safety and Security Interface Technology Initiative

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme)more » includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ‘tool box’ of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated implementation plan includes: (1) A recommended process for handling the documentation of the security and safety disciplines, including an appropriate change control process and participation by all stakeholders. (2) A means to package security systems with sufficient information to help expedite the flow of that system through the process. In addition, a means to share successes among sites, to include information and safety basis to the extent such information is transportable. (3) Identification of key security systems and associated essential security elements being installed and an arrangement for the sites installing these systems to host an appropriate team to review a specific system and determine what information is exportable. (4) Identification of the security systems’ essential elements and appropriate controls required for testing of these essential elements in the facility. (5) The ability to help refine and improve an agreed to control set at the manufacture stage.« less

  1. 32 CFR Appendix A to Part 50 - Life Insurance Products and Securities

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Life Insurance Products and Securities A... Part 50—Life Insurance Products and Securities A. Life Insurance Product Content Prerequisites... and cost of government subsidized Servicemen's Group Life Insurance. 2. The address and phone number...

  2. 32 CFR Appendix A to Part 50 - Life Insurance Products and Securities

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Life Insurance Products and Securities A... Part 50—Life Insurance Products and Securities A. Life Insurance Product Content Prerequisites... and cost of government subsidized Servicemen's Group Life Insurance. 2. The address and phone number...

  3. Composing Alternatives to a National Security Language Policy

    ERIC Educational Resources Information Center

    Wible, Scott

    2009-01-01

    President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…

  4. 77 FR 28894 - Agency Information Collection Activities: Collection of Qualitative Feedback Through Focus Groups

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-16

    ... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services Agency Information... Department of Homeland Security, U.S. Citizenship and Immigration Services (USCIS) will be submitting the... Homeland Security (DHS), and to the Office of Management and Budget (OMB) USCIS Desk Officer. Comments may...

  5. 77 FR 27108 - Order of Suspension of Trading; In the Matter of Anthracite Capital, Inc., Auto Data Network Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-08

    ... of Anthracite Capital, Inc., Auto Data Network Inc., Avenue Group, Inc., Ckrush, Inc., Clickable... securities of Auto Data Network Inc. because it has not filed any periodic reports since the period ended... accurate information concerning the securities of Avenue Group, Inc. because it has not filed any periodic...

  6. 78 FR 55134 - Anhui Taiyang Poultry Co., Inc.; a/k/a The Parkview Group, Inc.; Business Development Solutions...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-09

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Anhui Taiyang Poultry Co., Inc.; a/k/a The Parkview Group, Inc.; Business Development Solutions, Inc., and Tsingyuan Brewery Ltd.; Order of Suspension of Trading September 5, 2013. It appears to the Securities and Exchange Commission that there is a...

  7. 77 FR 34455 - In the Matter of Aegis Assessments, Inc., APC Group, Inc., Aurelio Resource Corp., BioAuthorize...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-11

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Aegis Assessments, Inc., APC Group, Inc., Aurelio Resource Corp., BioAuthorize Holdings, Inc., and Fonix Corporation; Order of... there is a lack of current and accurate information concerning the securities of BioAuthorize Holdings...

  8. An E-payment system based on quantum group signature

    NASA Astrophysics Data System (ADS)

    Xiaojun, Wen

    2010-12-01

    Security and anonymity are essential to E-payment systems. However, existing E-payment systems will easily be broken into soon with the emergence of quantum computers. In this paper, we propose an E-payment system based on quantum group signature. In contrast to classical E-payment systems, our quantum E-payment system can protect not only the users' anonymity but also the inner structure of customer groups. Because of adopting the two techniques of quantum key distribution, a one-time pad and quantum group signature, unconditional security of our E-payment system is guaranteed.

  9. A short-term longitudinal study of correlates and sequelae of attachment security in autism

    PubMed Central

    Rozga, Agata; Hesse, Erik; Main, Mary; Duschinsky, Robbie; Beckwith, Leila; Sigman, Marian

    2018-01-01

    ABSTRACT In this short-term longitudinal study, 30 preschool-aged children with autism were first observed in Ainsworth’s Strange Situation Procedure and, separately, interacting with the primary caregiver in the home. One year later, each child completed both a developmental assessment and an observational assessment of empathic responding. Behaviors typical for children with autism were distinguished from behaviors suggestive of relationally based attachment disorganization. Forty-five percent of the children were classified as securely attached. The secure group demonstrated language skills superior to those of the insecurely attached group, concurrently and during the follow-up. Compared to parents of children who were insecurely attached, parents of securely attached children were rated as more sensitive. Compared to both organized insecure and disorganized children, secure children were rated as more responsive to an examiner’s apparent distress during the follow-up relative to their ratings at intake, whereas empathy ratings of children with insecure classifications did not increase. Importantly, attachment security was associated with empathy above and beyond the contribution of children’s language level. These results indicate that the sequelae of attachment security in autism may be similar to those documented for typically developing children. PMID:28959921

  10. A First Step Towards Network Security Virtualization: From Concept to Prototype

    DTIC Science & Technology

    2015-10-01

    ec2 security groups. http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network- security.html. [3] Jeffrey R. Ballard, Ian Rae, and Aditya...20] Matthew L. Meola Michael J. Freedman Jennifer Rexford Nate Foster, Rob Harrison and David Walker. Frenetic: A High-Level Langauge for OpenFlow

  11. Energy technology evaluation report: Energy security

    NASA Astrophysics Data System (ADS)

    Koopman, R.; Lamont, A.; Schock, R.

    1992-09-01

    Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.

  12. Current Developments and Prospects for the Future: French Security Policy in a Changing World

    DTIC Science & Technology

    1991-06-01

    GROUP SUBGROUP France , French Security Policy, Franco-German relations, NATO, French economy, Charles do Gaulle, Francois Mitterrand, European Community...concludes that the Gaullist myth of grandeur and independence can no longer be sustained . French security must now be achieved by strengthening ties...Gaulle. The thesis concludes that the Gaullist myth of grandeur and independence can no longer be sustained . French security must now be achieved by

  13. Canadian Army Trophy Analysis

    DTIC Science & Technology

    1990-10-01

    REPORT DOCUMENTATION PAGE OMBNo. 0704-0188 la. REPORT SECURITY CLASS-- CAT ;ON lb RESTRICTIVE MARKINGS Unclassified 2a. SECURITY CLASSiFICATION AUTHORITr 3...if necessary and identify by block number) FIELD GROUP SUB-GROUP CAT , Canadajn Army Trophy, International, Competition, --Gunnery, Tank--T C...accuracy, firing speed, and detection on score during the CAT competition. This study uses a custom stochastic computer model designed to replicate the

  14. 78 FR 25132 - Enercorp, Inc., FTS Group, Inc., Games, Inc. (n/k/a InQBate Corporation), Hartmarx Corporation (n...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-29

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Enercorp, Inc., FTS Group, Inc., Games, Inc. (n/k/a InQBate Corporation), Hartmarx Corporation (n/k/a XMH Corp. 1), and Penn Treaty American... current and accurate information concerning the securities of Games, Inc. (n/k/a InQBate Corporation...

  15. 76 FR 56490 - In the Matter of Amerex Group, Inc., AmeriChip International, Inc., Amish Naturals, Inc., Banker...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-13

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Amerex Group, Inc., AmeriChip International, Inc., Amish Naturals, Inc., Banker's Store Inc. (The), Champion Parts, Inc., and Gray Peaks, Inc... securities of AmeriChip International, Inc. because it has not filed any periodic reports since the period...

  16. Chair Report Consultancy Meeting on Nuclear Security Assessment Methodologies (NUSAM) Transport Case Study Working Group

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shull, Doug

    The purpose of the consultancy assignment was to (i) apply the NUSAM assessment methods to hypothetical transport security table top exercise (TTX) analyses and (ii) document its results to working materials of NUSAM case study on transport. A number of working group observations, using the results of TTX methodologies, are noted in the report.

  17. 75 FR 33667 - Parts and Accessories Necessary for Safe Operation; Application for an Exemption From the Flatbed...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-14

    ... vehicle, in a sided vehicle, or in an intermodal container loaded with eyes crosswise, grouped in rows, in... pre-January 1, 2004 cargo securement regulations for the transportation of groups of metal coils with... the pre-January 1, 2004 cargo securement regulations (then at 49 CFR 393.100(c)) for the...

  18. "Right from the Start": Randomized Trial Comparing an Attachment Group Intervention to Supportive Home Visiting

    ERIC Educational Resources Information Center

    Niccols, Alison

    2008-01-01

    Background: Infant attachment security is a protective factor for future mental health, and may be promoted by individual interventions. Given service demands, it is important to determine if a group-based intervention for parents could be used to enhance infant attachment security. Methods: In a randomized trial involving 76 mothers, an 8-session…

  19. Transitions in Friendship Attachment in Adolescence is Associated with Developmental Trajectories of Depression through Adulthood

    PubMed Central

    Heinze, Justin; Miller, Alison L.; Zimmerman, Marc A.

    2015-01-01

    Purpose Forming secure friendship attachments during adolescence are important for mental health; few, however, have specifically examined the ways in which the transitions in attachment during adolescence may influence future mental health outcomes among African-Americans. Method The current study examines how transitions in attachment in adolescence predicted changes in depression symptoms from late adolescents through adulthood in an African-American sample of adolescents. We used growth curve modeling to examine the association between transitions in friendship attachment and changes in depression symptoms in adulthood. Results At age 16, 346 (64.0%) reported secure attachment with 195 (36.0%) reporting either avoidant or resistant attachment. At age 17, 340 (62.9%) reported secure attachment and 201 (37.2%) reported avoidant or resistant attachment. The largest percentage of participants (46.2%) reported stable-secure attachment across the two time points. Results of the growth model indicated that adolescents who reported a stable-secure attachment style had lower levels of depression symptoms during adulthood than those individuals who transitioned from secure-to-insecure, from insecure-to-secure, or were in the stable-insecure group. Interestingly enough, individuals in both of the attachment transition groups had a faster declining rate of depression symptoms over time compared to the two stability groups. Conclusion Data support existing research showing an association between transitions in attachment during adolescence and depression through adulthood. Further these study findings suggest there may be protective features associated with transitioning between attachment styles during adolescence on later depression, compared to African-American’s who remain stable in their attachment style. PMID:26903426

  20. Changes in body weight and food security of adult North Korean refugees living in South Korea

    PubMed Central

    Jeong, HaYoung; Kim, Sin-Gon

    2017-01-01

    BACKGROUND/OBJECTIVES Relocation to new environments can have a negative impact on health by altering body weight and dietary patterns. This study attempted to elucidate changes in body weight, food security, and their current food and nutrient consumption in adult North Korean refugees (NKR) living in South Korea (SK). SUBJECTS/METHODS This study analyzed data on 149 adult NKR from a North Korean refugee health in SK cohort at four time points (leaving North Korea, entering SK, first examination, and second examination). Body weight was self-reported at the two earlier time points and directly measured at the two later time points. Food security, diet-related behaviors (dietary habits and food consumption), and sociodemographic information were obtained using a self-administered questionnaire. Nutrient intake information was obtained by one-day 24-hour recall. Statistical analyses were performed with SPSS ver 23.0. RESULTS Body weight increased during relocation by an average of 4 kg, although diversified patterns were observed during the settlement period in SK. Approximately 39.6% of subjects maintained their body weight between the first and second examinations, whereas 38.6% gained and 22.1% lost at least 3% of their body weight at the first examination by the second examination. Food security status improved from 12.1% food secure proportion to 61.7%. NKR showed generally good food and nutrient consumption (index of nutrient quality: 0.77–1.93). The body weight loss group showed the most irregular meal consumption pattern (P < 0.05), and eating-out was infrequent in all three groups. Consumption frequencies of food groups did not differ by group, except in the fish group (P = 0.036). CONCLUSION This study observed considerable body weight adjustment during the settlement period in SK after initial weight gain, whereas food security consistently improved. More detailed understanding of this process is needed to assist healthy settlement for NKR in SK. PMID:28765777

  1. Changes in body weight and food security of adult North Korean refugees living in South Korea.

    PubMed

    Jeong, HaYoung; Lee, Soo-Kyung; Kim, Sin-Gon

    2017-08-01

    Relocation to new environments can have a negative impact on health by altering body weight and dietary patterns. This study attempted to elucidate changes in body weight, food security, and their current food and nutrient consumption in adult North Korean refugees (NKR) living in South Korea (SK). This study analyzed data on 149 adult NKR from a North Korean refugee health in SK cohort at four time points (leaving North Korea, entering SK, first examination, and second examination). Body weight was self-reported at the two earlier time points and directly measured at the two later time points. Food security, diet-related behaviors (dietary habits and food consumption), and sociodemographic information were obtained using a self-administered questionnaire. Nutrient intake information was obtained by one-day 24-hour recall. Statistical analyses were performed with SPSS ver 23.0. Body weight increased during relocation by an average of 4 kg, although diversified patterns were observed during the settlement period in SK. Approximately 39.6% of subjects maintained their body weight between the first and second examinations, whereas 38.6% gained and 22.1% lost at least 3% of their body weight at the first examination by the second examination. Food security status improved from 12.1% food secure proportion to 61.7%. NKR showed generally good food and nutrient consumption (index of nutrient quality: 0.77-1.93). The body weight loss group showed the most irregular meal consumption pattern ( P < 0.05), and eating-out was infrequent in all three groups. Consumption frequencies of food groups did not differ by group, except in the fish group ( P = 0.036). This study observed considerable body weight adjustment during the settlement period in SK after initial weight gain, whereas food security consistently improved. More detailed understanding of this process is needed to assist healthy settlement for NKR in SK.

  2. Patient and public views about the security and privacy of Electronic Health Records (EHRs) in the UK: results from a mixed methods study.

    PubMed

    Papoutsi, Chrysanthi; Reed, Julie E; Marston, Cicely; Lewis, Ruth; Majeed, Azeem; Bell, Derek

    2015-10-14

    Although policy discourses frame integrated Electronic Health Records (EHRs) as essential for contemporary healthcare systems, increased information sharing often raises concerns among patients and the public. This paper examines patient and public views about the security and privacy of EHRs used for health provision, research and policy in the UK. Sequential mixed methods study with a cross-sectional survey (in 2011) followed by focus group discussions (in 2012-2013). Survey participants (N = 5331) were recruited from primary and secondary care settings in West London (UK). Complete data for 2761 (51.8 %) participants were included in the final analysis for this paper. The survey results were discussed in 13 focus groups with people living with a range of different health conditions, and in 4 mixed focus groups with patients, health professionals and researchers (total N = 120). Qualitative data were analysed thematically. In the survey, 79 % of participants reported that they would worry about the security of their record if this was part of a national EHR system and 71 % thought the National Health Service (NHS) was unable to guarantee EHR safety at the time this work was carried out. Almost half (47 %) responded that EHRs would be less secure compared with the way their health record was held at the time of the survey. Of those who reported being worried about EHR security, many would nevertheless support their development (55 %), while 12 % would not support national EHRs and a sizeable proportion (33 %) were undecided. There were also variations by age, ethnicity and education. In focus group discussions participants weighed up perceived benefits against potential security and privacy threats from wider sharing of information, as well as discussing other perceived risks: commercial exploitation, lack of accountability, data inaccuracies, prejudice and inequalities in health provision. Patient and public worries about the security risks associated with integrated EHRs highlight the need for intensive public awareness and engagement initiatives, together with the establishment of trustworthy security and privacy mechanisms for health information sharing.

  3. Utilising a multi-item questionnaire to assess household food security in Australia.

    PubMed

    Butcher, Lucy M; O'Sullivan, Therese A; Ryan, Maria M; Lo, Johnny; Devine, Amanda

    2018-03-15

    Currently, two food sufficiency questions are utilised as a proxy measure of national food security status in Australia. These questions do not capture all dimensions of food security and have been attributed to underreporting of the problem. The purpose of this study was to investigate food security using the short form of the US Household Food Security Survey Module (HFSSM) within an Australian context; and explore the relationship between food security status and multiple socio-demographic variables. Two online surveys were completed by 2334 Australian participants from November 2014 to February 2015. Surveys contained the short form of the HFSSM and twelve socio-demographic questions. Cross-tabulations chi-square tests and a multinomial logistic regression model were employed to analyse the survey data. Food security status of the respondents was classified accordingly: High or Marginal (64%, n = 1495), Low (20%, n = 460) or Very Low (16%, n = 379). Significant independent predictors of food security were age (P < .001), marital status (P = .005), household income (P < .001) and education (P < .001). Findings suggest food insecurity is an important issue across Australia and that certain groups, regardless of income, are particularly vulnerable. Government policy and health promotion interventions that specifically target "at risk" groups may assist to more effectively address the problem. Additionally, the use of a multi-item measure is worth considering as a national indicator of food security in Australia. © 2018 Australian Health Promotion Association.

  4. Information-Pooling Bias in Collaborative Security Incident Correlation Analysis.

    PubMed

    Rajivan, Prashanth; Cooke, Nancy J

    2018-03-01

    Incident correlation is a vital step in the cybersecurity threat detection process. This article presents research on the effect of group-level information-pooling bias on collaborative incident correlation analysis in a synthetic task environment. Past research has shown that uneven information distribution biases people to share information that is known to most team members and prevents them from sharing any unique information available with them. The effect of such biases on security team collaborations are largely unknown. Thirty 3-person teams performed two threat detection missions involving information sharing and correlating security incidents. Incidents were predistributed to each person in the team based on the hidden profile paradigm. Participant teams, randomly assigned to three experimental groups, used different collaboration aids during Mission 2. Communication analysis revealed that participant teams were 3 times more likely to discuss security incidents commonly known to the majority. Unaided team collaboration was inefficient in finding associations between security incidents uniquely available to each member of the team. Visualizations that augment perceptual processing and recognition memory were found to mitigate the bias. The data suggest that (a) security analyst teams, when conducting collaborative correlation analysis, could be inefficient in pooling unique information from their peers; (b) employing off-the-shelf collaboration tools in cybersecurity defense environments is inadequate; and (c) collaborative security visualization tools developed considering the human cognitive limitations of security analysts is necessary. Potential applications of this research include development of team training procedures and collaboration tool development for security analysts.

  5. Administering a healthy dose of security.

    PubMed

    Berry, D; Mullen, M; Murray, T

    The article describes how a hospital located in a poor, crime-ridden section of a large city has made the most of in-house resources and public-private liaisons to improve security at its 113-acre campus. Details on the facility's double-pronged approach--tight internal security and strong external liaisons with businesses, law enforcement, and community groups--are provided.

  6. DQC Comments on the Posted Recommendations Regarding Data Security and Privacy Protections

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2010

    2010-01-01

    The U.S. Department of Education is conducting several activities to address privacy and security issues related to education data. Earlier this year a contractor for the Department convened a group of privacy and security experts and produced a report with recommendations to the Department on ways they can address emerging challenges in…

  7. Management of Security Services in Higher Education. National Report.

    ERIC Educational Resources Information Center

    Higher Education Funding Council for Wales, Cardiff.

    This report, the seventh in a series from the Value for Money Steering Group, identifies the key management issues for governors, senior managers, and heads of security services at institutions of higher education in the United Kingdom in developing and reviewing security services to ensure that they are effective and provide value for money.…

  8. 78 FR 33142 - Lanbo Financial Group, Inc.; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-03

    ... Suspension of Trading May 30, 2013. It appears to the Securities and Exchange Commission that there is a lack... the opinion that the public interest and the protection of investors require a suspension of trading... the Securities Exchange Act of 1934, that trading in the securities of the above-listed company is...

  9. 78 FR 20960 - Face Up Entertainment Group, Inc.; Order of Suspension of Trading

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-08

    ... Suspension of Trading April 4, 2013. It appears to the Securities and Exchange Commission that there is a... business operations, and trading in its securities. Face Up is a Florida corporation based in Valley Stream... interest and the protection of investors require a suspension of trading in the securities of the above...

  10. 76 FR 19174 - In the Matter of Circuit Systems, Inc., Global Energy Group, Inc., Integrated Medical Resources...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-06

    ... SECURITIES AND EXCHANGE COMMISSION File No. 500-1 In the Matter of Circuit Systems, Inc., Global Energy Group, Inc., Integrated Medical Resources, Inc., iNTELEFILM Corp., and Lot$off Corp.; Order of Suspension of Trading April 4, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information...

  11. 77 FR 39559 - In the Matter of AngelCiti Entertainment, Inc., BodyTel Scientific, Inc., Clearant, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-03

    ...., BodyTel Scientific, Inc., Clearant, Inc., DataMetrics Corp., and Green Energy Group, Inc. (a/k/a eCom eCom.Com, Inc.); Order of Suspension of Trading June 29, 2012. It appears to the Securities and... of current and accurate information concerning the securities of Green Energy Group, Inc. (a/k/a eCom...

  12. [The comparative evaluation of level of security culture in medical organizations].

    PubMed

    Roitberg, G E; Kondratova, N V; Galanina, E V

    2016-01-01

    The study was carried out on the basis of clinic “Medicine” in 2014-2015 concerning security culture. The sampling included 465 filled HSPSC questionnaires. The comparative analysis of received was implemented. The “Zubovskaia district hospital” Having no accreditation according security standards and group of clinics from USA functioning for many years in the system of patient security support were selected as objects for comparison. The evaluation was implemented concerning dynamics of security culture in organization at implementation of strategies of security of patients during 5 years and comparison of obtained results with USA clinics was made. The study results demonstrated that in conditions of absence of implemented standards of security in medical organization total evaluation of security remains extremely low. The study of security culture using HSPSC questionnaire is an effective tool for evaluating implementation of various strategies of security ofpatient. The functioning in the system of international standards of quality, primarily JCI standards, permits during several years to achieve high indices of security culture.

  13. Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security.

    PubMed

    Pavone, Vincenzo; Esposti, Sara Degli

    2012-07-01

    As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.

  14. Marketing Strategy and Implementation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    None

    This report documents the marketing campaign that has been designed for middle and high school students in New Mexico to increase interest in participation in national security careers at the National Nuclear Security Administration. This marketing campaign builds on the research that was previously conducted, as well as the focus groups that were conducted. This work is a part of the National Nuclear Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) / National Nuclear Security Administration (NNSA) grant. Outcome analysis was performed to determine appropriate marketing strategies. The analysis was based upon focus groups with middlemore » school and high school students, student interactions, and surveys completed by students to understand and gauge student interest in Science, Technology, Engineering, and Math (STEM) subjects, interest in careers at NNSA, future job considerations, and student desire to pursue post-secondary education. Further, through the focus groups, students were asked to attend a presentation on NNSA job opportunities and employee requirements. The feedback received from the students was utilized to develop the focus and components of the marketing campaign.« less

  15. Adherence to antiretroviral therapy among a conflict-affected population in Northeastern Uganda: a qualitative study.

    PubMed

    Olupot-Olupot, Peter; Katawera, Andrew; Cooper, Curtis; Small, Will; Anema, Aranka; Mills, Edward

    2008-09-12

    We aimed to determine patient and health worker concerns regarding antiretroviral adherence in a conflict-affected population using focus groups (n = 40) and semi-structured interviews (n = 11). Patient concerns include security attending clinics, food security, distance to health centers and access to health providers. During periods of famine and flooding, the lack of food security and only single daily meals makes taking multiple doses impossible. Possible facilitating strategies included mobile teams, increased security and regularity of drug stocks.

  16. 17 CFR 270.11a-1 - Definition of “exchange” for purposes of section 11 of the Act.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... issued, and notice of intention to close the account was mailed to the security holder, and he had a... group eligible to purchase the security, the issuer required the surrender of the security and paid the redemption price thereof. (c) The provisions of paragraph (a) of this section shall not apply if, following...

  17. Security Assistance: U.S. and International Historical Perspectives

    DTIC Science & Technology

    2006-08-01

    Major Schumann’s study , A transformational approach to US security assistance – the case of Romania. 45 Quadrennial Defense Review Report (QDRR...545 A Transformational Approach to Security Assistance: The Case of Romania by Major Drew Schumann...intent of this study is to examine a small group of nineteenth- and twentieth-century cases in search of useful, or at least noteworthy

  18. 78 FR 31989 - Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Notice of Filing of Proposed Rule Change and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-28

    ... course of the two challenge months, satisfy the requirements described above for receiving assignment of... Qualified Security, the assignment of Qualified Securities to a Group will be based on factors that include... become the LMM for such Qualified Security, it may initiate a challenge by notifying the Exchange of its...

  19. National Security in the Nuclear Age: Public Library Proposal and Booklist. May 1987 Update.

    ERIC Educational Resources Information Center

    Dane, Ernest B.

    To increase public understanding of national security issues, this document proposes that a balanced and up-to-date collection of books and other materials on national security in the nuclear age be included in all U.S. public libraries. The proposal suggests that the books be grouped together on an identified shelf. Selection criteria for the…

  20. 76 FR 30418 - Self-Regulatory Organizations; New York Stock Exchange LLC; Notice of Filing of Proposed Rule...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-25

    ... securities. The marketplaces operated by OTC Markets Group Inc. include OTCQX, OTCQB and OTC Pink. II. Self... Premises in Certain OTC Bulletin Board and OTC Markets Securities May 19, 2011. Pursuant to Section 19(b)(1... approved booth premises in certain OTC Bulletin Board (``OTCBB'') and OTC Markets \\4\\ securities. The text...

  1. Security Force Assistance

    DTIC Science & Technology

    2009-05-01

    Group 8-59. Cultures may be individualistic or collectivist in their orientation. An individualist culture is one in which the ties between...individuals are loose—where people are expected to take care of themselves and their immediate families. In a collectivist culture , people are raised from...foreign security forces and their population. Conducting successful security force assistance requires adaptive units led by well- informed, culturally

  2. A security analysis of version 2 of the Network Time Protocol (NTP): A report to the privacy and security research group

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1991-01-01

    The Network Time Protocol is being used throughout the Internet to provide an accurate time service. The security requirements are examined of such a service, version 2 of the NTP protocol is analyzed to determine how well it meets these requirements, and improvements are suggested where appropriate.

  3. An investigation of the security of caregiver attachment during middle childhood in children with high-functioning autistic disorder.

    PubMed

    Chandler, Felicity; Dissanayake, Cheryl

    2014-07-01

    Previous research has investigated caregiver attachment relationships in children with autism during early childhood, with few differences found from matched control groups. However, little is known of this relationship during middle childhood (ages 8-12 years). In this study, the aim was to establish whether there are differences in the security of attachment in children with high-functioning autism compared to typically developing children. A secondary aim was to establish whether caregivers' perceptions of their child's attachment to them accorded with the children's own reports. Twenty-one children with high-functioning autism and 17 typically developing children were administered the Kerns Security Scale and the Inventory of Parent and Peer Attachment-Revised, and caregivers completed the same questionnaires from the viewpoint of their child. There were no differences between the groups in the children's and parents' reports of attachment security. Parents' and children's reports were moderately correlated on the Kerns Security Scale but were not correlated on the Inventory of Parent and Peer Attachment-Revised. The results indicate that levels of attachment security in children with high-functioning autism are not different from those in typically developing children. © The Author(s) 2013.

  4. You Should Be the Specialist! Weak Mental Rotation Performance in Aviation Security Screeners - Reduced Performance Level in Aviation Security with No Gender Effect.

    PubMed

    Krüger, Jenny K; Suchan, Boris

    2016-01-01

    Aviation security screeners analyze a large number of X-ray images per day and seem to be experts in mentally rotating diverse kinds of visual objects. A robust gender-effect that men outperform women in the Vandenberg & Kuse mental rotation task has been well documented over the last years. In addition it has been shown that training can positively influence the overall task-performance. Considering this, the aim of the present study was to investigate whether security screeners show better performance in the Mental Rotation Test (MRT) independently of gender. Forty-seven security screeners of both sexes from two German airports were examined with a computer based MRT. Their performance was compared to a large sample of control subjects. The well-known gender-effect favoring men on mental rotation was significant within the control group. However, the security screeners did not show any sex differences suggesting an effect of training and professional performance. Surprisingly this specialized group showed a lower level of overall MRT performance than the control participants. Possible aviation related influences such as secondary effects of work-shift or expertise which can cumulatively cause this result are discussed.

  5. Work-related violence against security guards--who is most at risk?

    PubMed

    Leino, Tuula; Selin, Risto; Summala, Heikki; Virtanen, Marianna

    2011-01-01

    Studies on violence in the work of security guards are largely lacking. This study is unique in that it focuses on security guards (n=1,010) in Finland, and assesses the different forms, prevalence, and risk factors of the work-related violence they often face. Information to a survey instrument was obtained by first interviewing 30 volunteers. Then we made a cross-sectional mailed survey that was sent to a randomized group of 2,000 security guards. The response rate was 52. We found the prevalence of verbal aggression, threats of assault, and physical acts against security guards at least once a month to be 39%, 19%, and 15% respectively. As regards risk factors and who is most at risk, our results show that male gender, young age, low work experience, late working hours, and time pressure were associated with all three forms of work-related violence. Unlike other forms of violence, verbal aggression was highly prevalent outside the metropolitan area and directed towards both more and less experienced security guards. In prevention policies for violence, it is important to identify high-risk groups such as those who have less work experience.

  6. Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System

    DTIC Science & Technology

    2010-03-01

    information /etc/group, passwd ,gshadow,shadow,/security/opasswd 16 User A attempts to access User B directory 17 User A attempts to access User B file w/o...configuration Handled by audit rules for root actions Audit user write attempts to system files -w /etc/group –p wxa -w /etc/ passwd –p wxa -w /etc/gshadow –p...information (/etc/group, /etc/ passwd , /etc/gshadow, /etc/shadow, /etc/sudoers, /etc/security/opasswd) Procedure: 1. User2 logs into the system

  7. Towards a Scalable Group Vehicle-based Security System

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carter, Jason M

    2016-01-01

    In August 2014, the National Highway Traffic Safety Administration (NHTSA) proposed new rulemaking to require V2V communication in light vehicles. To establish trust in the basic safety messages (BSMs) that are exchanged by vehicles to improve driver safety, a vehicle public key infrastructure (VPKI) is required. We outline a system where a group or groups of vehicles manage and generate their own BSM signing keys and authenticating certificates -- a Vehicle-Based Security System (VBSS). Based on our preliminary examination, we assert the mechanisms exist to implement a VBSS that supports V2V communications; however, maintaining uniform trust throughout the system whilemore » protecting individual privacy does require reliance on nascent group signature technology which may require a significant amount of communication overhead for trust maintenance. To better evaluate the VBSS approach, we compare it to the proposed Security Credential Management System (SCMS) in four major areas including bootstrapping, pseudonym provisioning, BSM signing and authentication, and revocation. System scale, driver privacy, and the distribution and dynamics of participants make designing an effective VPKI an interesting and challenging problem; no clear-cut strategy exists to satisfy the security and privacy expectations in a highly efficient way. More work is needed in VPKI research, so the life-saving promise of V2V technology can be achieved.« less

  8. Can Nuclear Terrorists be Deterred?

    NASA Astrophysics Data System (ADS)

    Ferguson, Charles

    2005-04-01

    Conventional thinking since September 11, 2001, posits that nuclear-armed terrorists cannot be deterred. However, not all terrorist groups are alike. For instance, those that are strongly affiliated with a national territory or a constituency that can be held hostage are more likely to be self-deterred against using or even acquiring nuclear weapons. In contrast, international terrorist organizations, such as al Qaeda, or apocalyptic groups, such as Aum Shinrikyo, may welcome retaliatory nuclear strikes because they embrace martyrdom. Such groups may be immune to traditional deterrence, which threatens direct punishment against the group in question or against territory or people the terrorists' value. Although deterring these groups may appear hopeless, nuclear forensic techniques could provide the means to establish deterrence through other means. In particular, as long as the source of the nuclear weapon or fissile material could be identified, the United States could threaten a retaliatory response against a nation that did not provide adequate security for its nuclear weapons or weapons-usable fissile material. This type of deterrent threat could be used to compel the nation with lax security to improve its security to meet rigorous standards.

  9. 78 FR 9406 - Southwest Louisiana Area Maritime Security Regional Sub-Committee; Vacancies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-08

    ..., we encourage qualified men and women and members of all racial and ethnic groups to apply. The Coast... security industries. Dates of employment and points of contact should be included for each position...

  10. NREL Workshop Convenes Industry Experts on Cybersecurity and an Evolving

    Science.gov Websites

    silos in a field that demands greater collaboration, and the benefits of systemic security architecture groups to identify possible solutions to the challenges in securing DERs-from a technology, business, and

  11. Learning to provide children with a secure base and a safe haven: The Circle of Security-Parenting (COS-P) group intervention.

    PubMed

    Kim, Monica; Woodhouse, Susan S; Dai, Chenchen

    2018-05-21

    Insecure attachment is linked to a host of negative child outcomes, including internalizing and externalizing behavior problems. Circle of Security-Parenting (COS-P) is a manualized, video-based, eight unit, group parenting intervention to promote children's attachment security. COS-P was designed to be easily implemented, so as to make attachment interventions more widely available to families. We present the theoretical background of COS-P, research evidence supporting the COS approach, as well as a description of the COS-P intervention protocol. The case example of "Alexa," mother of three children (aged 7, 6, and 4 years), illustrates how parents can make use of the COS-P intervention to better understand children's needs, build skills in observing and interpreting children's signals, learn to recognize and regulate their own responses to their children, and learn new ways of responding to children's needs. © 2018 Wiley Periodicals, Inc.

  12. Developing measures of food and nutrition security within an Australian context.

    PubMed

    Archer, Claire; Gallegos, Danielle; McKechnie, Rebecca

    2017-10-01

    To develop a measure of food and nutrition security for use among an Australian population that measures all pillars of food security and to establish its content validity. The study consisted of two phases. Phase 1 involved focus groups with experts working in the area of food security. Data were assessed using content analysis and results informed the development of a draft tool. Phase 2 consisted of a series of three online surveys using the Delphi technique. Findings from each survey were used to establish content validity and progressively modify the tool until consensus was reached for all items. Australia. Phase 1 focus groups involved twenty-five experts working in the field of food security, who were attending the Dietitians Association of Australia National Conference, 2013. Phase 2 included twenty-five experts working in food security, who were recruited via email. Findings from Phase 1 supported the need for an Australian-specific tool and highlighted the failure of current tools to measure across all pillars of food security. Participants encouraged the inclusion of items to measure barriers to food acquisition and the previous single item to enable comparisons with previous data. Phase 2 findings informed the selection and modification of items for inclusion in the final tool. The results led to the development of a draft tool to measure food and nutrition security, and supported its content validity. Further research is needed to validate the tool among the Australian population and to establish inter- and intra-rater reliability.

  13. Sharing Data and Analytical Resources Securely in a Biomedical Research Grid Environment

    PubMed Central

    Langella, Stephen; Hastings, Shannon; Oster, Scott; Pan, Tony; Sharma, Ashish; Permar, Justin; Ervin, David; Cambazoglu, B. Barla; Kurc, Tahsin; Saltz, Joel

    2008-01-01

    Objectives To develop a security infrastructure to support controlled and secure access to data and analytical resources in a biomedical research Grid environment, while facilitating resource sharing among collaborators. Design A Grid security infrastructure, called Grid Authentication and Authorization with Reliably Distributed Services (GAARDS), is developed as a key architecture component of the NCI-funded cancer Biomedical Informatics Grid (caBIG™). The GAARDS is designed to support in a distributed environment 1) efficient provisioning and federation of user identities and credentials; 2) group-based access control support with which resource providers can enforce policies based on community accepted groups and local groups; and 3) management of a trust fabric so that policies can be enforced based on required levels of assurance. Measurements GAARDS is implemented as a suite of Grid services and administrative tools. It provides three core services: Dorian for management and federation of user identities, Grid Trust Service for maintaining and provisioning a federated trust fabric within the Grid environment, and Grid Grouper for enforcing authorization policies based on both local and Grid-level groups. Results The GAARDS infrastructure is available as a stand-alone system and as a component of the caGrid infrastructure. More information about GAARDS can be accessed at http://www.cagrid.org. Conclusions GAARDS provides a comprehensive system to address the security challenges associated with environments in which resources may be located at different sites, requests to access the resources may cross institutional boundaries, and user credentials are created, managed, revoked dynamically in a de-centralized manner. PMID:18308979

  14. An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels.

    PubMed

    Burmester, Mike; Munilla, Jorge; Ortiz, Andrés; Caballero-Gil, Pino

    2017-07-04

    The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a resilient supply chain. The Internet of Things (IoT), and in particular Radio Frequency Identification (RFID) technology, can be used to realize these goals. For product identification, tracking and real-time awareness, RFID tags are attached to goods. As tagged goods move along the supply chain from the suppliers to the manufacturers, and then on to the retailers until eventually they reach the customers, two major security challenges can be identified: (I) to protect the shipment of goods that are controlled by potentially untrusted carriers; and (II) to secure the transfer of ownership at each stage of the chain. For the former, grouping proofs in which the tags of the scanned goods generate a proof of "simulatenous" presence can be employed, while for the latter, ownership transfer protocols (OTP) are used. This paper describes enhanced security solutions for both challenges. We first extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers; then, we describe a modified version of a recently published OTP based on channels with positive secrecy capacity adapted to be implemented on common RFID systems in the supply chain. The proposed solutions take into account the limitations of low cost tags employed in the supply chain, which are only required to generate pseudorandom numbers and compute one-way hash functions.

  15. Measuring relational security in forensic mental health services

    PubMed Central

    Chester, Verity; Alexander, Regi T.; Morgan, Wendy

    2017-01-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515

  16. Measuring relational security in forensic mental health services.

    PubMed

    Chester, Verity; Alexander, Regi T; Morgan, Wendy

    2017-12-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.

  17. Home care after early discharge: impact on healthy mothers and newborns.

    PubMed

    Askelsdottir, Björk; Lam-de Jonge, Willemien; Edman, Gunnar; Wiklund, Ingela

    2013-08-01

    to compare early discharge with home care versus standard postpartum care in terms of mothers' sense of security; contact between mother, newborn and partner; emotions towards breast feeding; and breast-feeding duration at one and three months after birth. retrospective case-control study. a labour ward unit in Stockholm, Sweden handling both normal and complicated births. 96 women with single, uncomplicated pregnancies and births, and their healthy newborns. early discharge at 12-24 hours post partum with 2-3 home visits during the first week after birth. The intervention group consisted of women who had a normal vaginal birth (n=45). This group was compared with healthy controls who received standard postnatal care at the hospital (n=51). mothers' sense of security was measured using the Parents' Postnatal Sense of Security Scale. Contact between mother, child and father, and emotions towards breast feeding were measured using the Alliance Scale, and breast-feeding rates at one and three months post partum were recorded. women in the intervention group reported a greater sense of security in the first postnatal week but had more negative emotions towards breast feeding compared with the control group. At three months post partum, 74% of the newborns in the intervention group were fully breast fed versus 93% in the control group (p=0.021). Contact between the mother, newborn and partner did not differ between the groups. early discharge with home care is a feasible option for healthy women and newborns, but randomised controlled studies are needed to investigate the effects of home care on breast-feeding rates. Copyright © 2012 Elsevier Ltd. All rights reserved.

  18. Usage of insecure E-mail services among researchers with different scientific background.

    PubMed

    Solić, Kresimir; Grgić, Krešimir; Ilakovac, Vesna; Zagar, Drago

    2011-08-01

    Free web‑based e-mail services are considered to have more security flaws than institutional ones, but they are frequently used among scientific researchers for professional communication. The aim of this study was to analyze frequency of usage of the insecure free e-mail services for professional communication among biomedical, economical and technical researchers, who published papers in one of three different journals: Croatian Medical Journal, Automatika and Economic Research. Contact details of the authors who provided their e‑mail address from the papers published in those three journals during one year period were collected. These e‑mail addresses were collected from the electronic archive of the journals in question. The domains of all e‑mail addresses were assessed and contacts were categorized into three groups according to the following types: world-wide known free web‑based e‑mail services, national Internet Service Provider (ISP) e-mail services, and institutional or corporate e-mail addresses. The proportion of authors using free web-based e-mail services, the least secure group type, was highest among biomedical researchers (17.8%) while every e‑mail address collected from the technical journal belonged to the secured institutional e‑mail group type. It seems that all researchers from the technical scientific field and most of the researchers from the economical field value good security practice and use more secure systems for professional communication. High percentage of the biomedical researchers who use insecure e‑mail services may mean that they need to be warned of the possible security disadvantages of those kinds of e‑mail addresses.

  19. Attachment Security Mediates the Longitudinal Association Between Child-Parent Psychotherapy and Peer Relations for Toddlers of Depressed Mothers

    PubMed Central

    Guild, Danielle J.; Toth, Sheree L.; Handley, Elizabeth D.; Rogosch, Fred A.; Cicchetti, Dante

    2017-01-01

    Numerous investigations have demonstrated that Child-Parent Psychotherapy (CPP) promotes secure attachment between mothers and offspring. However, the role of post-intervention attachment security as it relates to long-term child outcomes has never been evaluated. The present study therefore examined post-intervention attachment status as a mediator of the association between CPP for depressed mothers and their offspring and subsequent peer relations among offspring. Depressed mothers and their toddlers were randomized to receive CPP (n = 45) or to a control group (DC; n = 55). A prior investigation with this sample indicated that offpring who received CPP attained significantly higher rates of secure attachment post-intervention, wheras insecure attachment continued to predominate for offspring in the DC group. The present study examined follow-up data of teachers’ reports on participants’ competence with classroom peers when they were approximately 9 years old. Findings indicated that children who received CPP were more likely to evidence secure attachments at post-intervention, which in turn was associated with more positive peer relationships at age 9. PMID:28401848

  20. Attachment security mediates the longitudinal association between child-parent psychotherapy and peer relations for toddlers of depressed mothers.

    PubMed

    Guild, Danielle J; Toth, Sheree L; Handley, Elizabeth D; Rogosch, Fred A; Cicchetti, Dante

    2017-05-01

    Numerous investigations have demonstrated that child-parent psychotherapy (CPP) promotes secure attachment between mothers and offspring. However, the role of postintervention attachment security as it relates to long-term child outcomes has never been evaluated. The present study therefore examined postintervention attachment status as a mediator of the association between CPP for depressed mothers and their offspring and subsequent peer relations among offspring. Depressed mothers and their toddlers were randomized to receive CPP (n = 45) or to a control group (n = 55). A prior investigation with this sample indicated that offspring who received CPP attained significantly higher rates of secure attachment postintervention, whereas insecure attachment continued to predominate for offspring in the control group. The present study examined follow-up data of teachers' reports on participants' competence with classroom peers when they were approximately 9 years old. Findings indicated that children who received CPP were more likely to evidence secure attachments at postintervention, which in turn was associated with more positive peer relationships at age 9.

  1. Perceived attachment security to parents and peer victimization: Does adolescent's aggressive behaviour make a difference?

    PubMed

    Guedes, Maryse; Santos, António J; Ribeiro, Olívia; Freitas, Miguel; Rubin, Kenneth H; Veríssimo, Manuela

    2018-06-01

    Peer victimization is one of the most prominent problems during adolescence. Research has distinguished aggressive and non-aggressive victims; however, there are still significant drawbacks in understanding the social and family functioning of these different groups of victimized adolescents. This study aimed to compare social behavior and perceived attachment security to parents of Portuguese adolescents, classified as aggressive victims, non-aggressive victims and non-victims. The sample consisted of 222 adolescents (115 boys, 107 girls) who completed the Kerns Security Scale and the Extended Class Play, to assess perceived attachment security and social behavior, respectively. Controlling for age and sex, aggressive victims and non-aggressive victims differed in anxious withdrawal but shared a similar profile in peer exclusion and prosocial behavior. Only aggressive victims reported lower attachment security to mother and father when compared to non-victims. These findings underline that victimized adolescents constitute a heterogeneous group in terms of their social and family functioning. Copyright © 2018 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.

  2. East Europe Report, Political, Sociological and Military Affairs

    DTIC Science & Technology

    1984-10-09

    those of a probing attack. The object of this article was to call attention to the many opportunities of the Warsaw Pact ground forces to form combat... attention has been paid to middle-aged men, the group most vulnerable to health problems, their mortality rate has risen. Infant mortality, while lower than...up areas: The unit was divided into reconnaissance, attack, and security troops. The security group took up a position, a couple of reconnaissance

  3. Hybrid methods for cybersecurity analysis :

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davis, Warren Leon,; Dunlavy, Daniel M.

    2014-01-01

    Early 2010 saw a signi cant change in adversarial techniques aimed at network intrusion: a shift from malware delivered via email attachments toward the use of hidden, embedded hyperlinks to initiate sequences of downloads and interactions with web sites and network servers containing malicious software. Enterprise security groups were well poised and experienced in defending the former attacks, but the new types of attacks were larger in number, more challenging to detect, dynamic in nature, and required the development of new technologies and analytic capabilities. The Hybrid LDRD project was aimed at delivering new capabilities in large-scale data modeling andmore » analysis to enterprise security operators and analysts and understanding the challenges of detection and prevention of emerging cybersecurity threats. Leveraging previous LDRD research e orts and capabilities in large-scale relational data analysis, large-scale discrete data analysis and visualization, and streaming data analysis, new modeling and analysis capabilities were quickly brought to bear on the problems in email phishing and spear phishing attacks in the Sandia enterprise security operational groups at the onset of the Hybrid project. As part of this project, a software development and deployment framework was created within the security analyst work ow tool sets to facilitate the delivery and testing of new capabilities as they became available, and machine learning algorithms were developed to address the challenge of dynamic threats. Furthermore, researchers from the Hybrid project were embedded in the security analyst groups for almost a full year, engaged in daily operational activities and routines, creating an atmosphere of trust and collaboration between the researchers and security personnel. The Hybrid project has altered the way that research ideas can be incorporated into the production environments of Sandias enterprise security groups, reducing time to deployment from months and years to hours and days for the application of new modeling and analysis capabilities to emerging threats. The development and deployment framework has been generalized into the Hybrid Framework and incor- porated into several LDRD, WFO, and DOE/CSL projects and proposals. And most importantly, the Hybrid project has provided Sandia security analysts with new, scalable, extensible analytic capabilities that have resulted in alerts not detectable using their previous work ow tool sets.« less

  4. Delivering Summer Electronic Benefit Transfers for Children through the Supplemental Nutrition Assistance Program or the Special Supplemental Nutrition Program for Women, Infants, and Children: Benefit Use and Impacts on Food Security and Foods Consumed.

    PubMed

    Gordon, Anne R; Briefel, Ronette R; Collins, Ann M; Rowe, Gretchen M; Klerman, Jacob A

    2017-03-01

    The Summer Electronic Benefit Transfers for Children (SEBTC) demonstration piloted summer food assistance through electronic benefit transfers (EBTs), providing benefits either through the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) or the Supplemental Nutrition Assistance Program (SNAP) EBT. To inform food assistance policy and describe how demonstrations using WIC and SNAP models differed in benefit take-up and impacts on food security and children's food consumption. Sites chose to deliver SEBTC using the SNAP or WIC EBT system. Within each site, in 2012, households were randomly assigned to a benefit group or a no-benefit control group. Grantees (eight states and two Indian Tribal Organizations) selected school districts serving many low-income children. Schoolchildren were eligible in cases where they had been certified for free or reduced-price meals during the school year. Before the demonstration, households in the demonstration sample had lower incomes and lower food security, on average, than households with eligible children nationally. Grantees provided selected households with benefits worth $60 per child per summer month using SNAP or WIC EBT systems. SNAP-model benefits covered most foods. WIC-model benefits could only be used for a specific package of foods. Key outcomes were children's food security (assessed using the US Department of Agriculture food security scale) and food consumption (assessed using food frequency questions). Differences in mean outcomes between the benefit and control groups measured impact, after adjusting for household characteristics. In WIC sites, benefit-group households redeemed a lower percentage of SEBTC benefits than in SNAP sites. Nonetheless, the benefit groups in both sets of sites had similar large reductions in very low food security among children, relative to no-benefit controls. Children receiving benefits consumed more healthful foods, and these impacts were larger in WIC sites. Results suggest the WIC SEBTC model deserves strong consideration. Copyright © 2017 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.

  5. Securing All intraVenous devices Effectively in hospitalised patients--the SAVE trial: study protocol for a multicentre randomised controlled trial.

    PubMed

    Rickard, Claire M; Marsh, Nicole; Webster, Joan; Playford, E Geoffrey; McGrail, Matthew R; Larsen, Emily; Keogh, Samantha; McMillan, David; Whitty, Jennifer A; Choudhury, Md Abu; Dunster, Kimble R; Reynolds, Heather; Marshall, Andrea; Crilly, Julia; Young, Jeanine; Thom, Ogilvie; Gowardman, John; Corley, Amanda; Fraser, John F

    2015-09-23

    Over 70% of all hospital admissions have a peripheral intravenous device (PIV) inserted; however, the failure rate of PIVs is unacceptably high, with up to 69% of these devices failing before treatment is complete. Failure can be due to dislodgement, phlebitis, occlusion/infiltration and/or infection. This results in interrupted medical therapy; painful phlebitis and reinsertions; increased hospital length of stay, morbidity and mortality from infections; and wasted medical/nursing time. Appropriate PIV dressing and securement may prevent many cases of PIV failure, but little comparative data exist regarding the efficacy of various PIV dressing and securement methods. This trial will investigate the clinical and cost-effectiveness of 4 methods of PIV dressing and securement in preventing PIV failure. A multicentre, parallel group, superiority randomised controlled trial with 4 arms, 3 experimental groups (tissue adhesive, bordered polyurethane dressing, sutureless securement device) and 1 control (standard polyurethane dressing) is planned. There will be a 3-year recruitment of 1708 adult patients, with allocation concealment until randomisation by a centralised web-based service. The primary outcome is PIV failure which includes any of: dislodgement, occlusion/infiltration, phlebitis and infection. Secondary outcomes include: types of PIV failure, PIV dwell time, costs, device colonisation, skin colonisation, patient and staff satisfaction. Relative incidence rates of device failure per 100 devices and per 1000 device days with 95% CIs will summarise the impact of each dressing, and test differences between groups. Kaplan-Meier survival curves (with log-rank Mantel-Cox test) will compare device failure over time. p Values of <0.05 will be considered significant. Secondary end points will be compared between groups using parametric or non-parametric techniques appropriate to level of measurement. Ethical approval has been received from Queensland Health (HREC/11/QRCH/152) and Griffith University (NRS/46/11/HREC). Results will be published according to the CONSORT statement and presented at relevant conferences. Australian New Zealand Clinical Trial Registry (ACTRN); 12611000769987. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  6. Priming the Secure Attachment Schema Affects the Emotional Face Processing Bias in Attachment Anxiety: An fMRI Research

    PubMed Central

    Tang, Qingting; Chen, Xu; Hu, Jia; Liu, Ying

    2017-01-01

    Our study explored how priming with a secure base schema affects the processing of emotional facial stimuli in individuals with attachment anxiety. We enrolled 42 undergraduate students between 18 and 27 years of age, and divided them into two groups: attachment anxiety and attachment secure. All participants were primed under two conditions, the secure priming using references to the partner, and neutral priming using neutral references. We performed repeated attachment security priming combined with a dual-task paradigm and functional magnetic resonance imaging. Participants’ reaction times in terms of responding to the facial stimuli were also measured. Attachment security priming can facilitate an individual’s processing of positive emotional faces; for instance, the presentation of the partner’s name was associated with stronger activities in a wide range of brain regions and faster reaction times for positive facial expressions in the subjects. The current finding of higher activity in the left-hemisphere regions for secure priming rather than neutral priming is consistent with the prediction that attachment security priming triggers the spread of the activation of a positive emotional state. However, the difference in brain activity during processing of both, positive and negative emotional facial stimuli between the two priming conditions appeared in the attachment anxiety group alone. This study indicates that the effect of attachment secure priming on the processing of emotional facial stimuli could be mediated by chronic attachment anxiety. In addition, it highlights the association between higher-order processes of the attachment system (secure attachment schema priming) and early-stage information processing system (attention), given the increased attention toward the effects of secure base schema on the processing of emotion- and attachment-related information among the insecure population. Thus, the following study has applications in providing directions for clinical treatment of mood disorders in attachment anxiety. PMID:28473796

  7. Priming the Secure Attachment Schema Affects the Emotional Face Processing Bias in Attachment Anxiety: An fMRI Research.

    PubMed

    Tang, Qingting; Chen, Xu; Hu, Jia; Liu, Ying

    2017-01-01

    Our study explored how priming with a secure base schema affects the processing of emotional facial stimuli in individuals with attachment anxiety. We enrolled 42 undergraduate students between 18 and 27 years of age, and divided them into two groups: attachment anxiety and attachment secure. All participants were primed under two conditions, the secure priming using references to the partner, and neutral priming using neutral references. We performed repeated attachment security priming combined with a dual-task paradigm and functional magnetic resonance imaging. Participants' reaction times in terms of responding to the facial stimuli were also measured. Attachment security priming can facilitate an individual's processing of positive emotional faces; for instance, the presentation of the partner's name was associated with stronger activities in a wide range of brain regions and faster reaction times for positive facial expressions in the subjects. The current finding of higher activity in the left-hemisphere regions for secure priming rather than neutral priming is consistent with the prediction that attachment security priming triggers the spread of the activation of a positive emotional state. However, the difference in brain activity during processing of both, positive and negative emotional facial stimuli between the two priming conditions appeared in the attachment anxiety group alone. This study indicates that the effect of attachment secure priming on the processing of emotional facial stimuli could be mediated by chronic attachment anxiety. In addition, it highlights the association between higher-order processes of the attachment system (secure attachment schema priming) and early-stage information processing system (attention), given the increased attention toward the effects of secure base schema on the processing of emotion- and attachment-related information among the insecure population. Thus, the following study has applications in providing directions for clinical treatment of mood disorders in attachment anxiety.

  8. Cryptanalysis of the Quantum Group Signature Protocols

    NASA Astrophysics Data System (ADS)

    Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan

    2013-11-01

    Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.

  9. Vestibular Responses and Motion Sickness during Pitch, Roll, and Yaw Sinusoidal Whole-Body Oscillation.

    DTIC Science & Technology

    1990-03-01

    vestibulo-ocular reflex) pitch, ’- 11’, 1 3c\\ " ’ I...[ 16. PRC C nystagmus 1 ’>"( k 1.,’ roll V-) , __r_ ,_t_ _ _ 17. SECURITY CLASSIFICATION 1S SECURITY...of amplification of EOG was 3.0 s. Because of the position of subjEcts’ heads relative to the axis of rotation, vertical nystagmus comprised the VOR...response in Groups I and III. To achieve measurement of the VOR in Groups IV and V, subjects were instructed to gaze downward, 30 deg in Group IV, and

  10. Framework for behavioral analytics in anomaly identification

    NASA Astrophysics Data System (ADS)

    Touma, Maroun; Bertino, Elisa; Rivera, Brian; Verma, Dinesh; Calo, Seraphin

    2017-05-01

    Behavioral Analytics (BA) relies on digital breadcrumbs to build user profiles and create clusters of entities that exhibit a large degree of similarity. The prevailing assumption is that an entity will assimilate the group behavior of the cluster it belongs to. Our understanding of BA and its application in different domains continues to evolve and is a direct result of the growing interest in Machine Learning research. When trying to detect security threats, we use BA techniques to identify anomalies, defined in this paper as deviation from the group behavior. Early research papers in this field reveal a high number of false positives where a security alert is triggered based on deviation from the cluster learned behavior but still within the norm of what the system defines as an acceptable behavior. Further, domain specific security policies tend to be narrow and inadequately represent what an entity can do. Hence, they: a) limit the amount of useful data during the learning phase; and, b) lead to violation of policy during the execution phase. In this paper, we propose a framework for future research on the role of policies and behavior security in a coalition setting with emphasis on anomaly detection and individual's deviation from group activities.

  11. Basic Information for EPA's Selected Analytical Methods for Environmental Remediation and Recovery (SAM)

    EPA Pesticide Factsheets

    Contains basic information on the role and origins of the Selected Analytical Methods including the formation of the Homeland Security Laboratory Capacity Work Group and the Environmental Evaluation Analytical Process Roadmap for Homeland Security Events

  12. Afghanistan: Post-Taliban Governance, Security, and U.S. Policy

    DTIC Science & Technology

    2009-12-02

    relations with the Taliban leadership when it was in power, possibly viewing engagement as a more effective means of preventing spillover of radical...Building............................................................................. 23 Taliban, Al Qaeda, and Related Insurgent Groups...42 Table 5. Major Security- Related Indicators

  13. (Congressional Interest) Network Information and Space Security Center

    DTIC Science & Technology

    2011-09-30

    Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb , Croatia officials to structure terms for a...partnership with UCCS. In the short-term, UCCS will develop and deliver several courses in homeland security and assist the University of Zagreb in... Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees in homeland security. Hosted a group of

  14. Measuring Transnational Organized Crime Threats to US National Security

    DTIC Science & Technology

    2016-05-26

    typology is not designed to score TOC networks, so it is not an obvious choice, but it could be easily modified by the TMWG to rank-order TOC networks...States Strategy to Combat Transnational Organized Crime (SCTOC). The strategy identified Transnational Organized Crime ( TOC ) as a national security...identify the TOC groups that present the national security threat defined in the SCTOC? A literature review of existing organized crime assessments

  15. Design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture.

    PubMed

    Mat Kiah, M L; Al-Bakri, S H; Zaidan, A A; Zaidan, B B; Hussain, Muzammil

    2014-10-01

    One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient's and the doctor's end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.

  16. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction

    NASA Astrophysics Data System (ADS)

    Leverrier, Anthony

    2017-05-01

    Establishing the security of continuous-variable quantum key distribution against general attacks in a realistic finite-size regime is an outstanding open problem in the field of theoretical quantum cryptography if we restrict our attention to protocols that rely on the exchange of coherent states. Indeed, techniques based on the uncertainty principle are not known to work for such protocols, and the usual tools based on de Finetti reductions only provide security for unrealistically large block lengths. We address this problem here by considering a new type of Gaussian de Finetti reduction, that exploits the invariance of some continuous-variable protocols under the action of the unitary group U (n ) (instead of the symmetric group Sn as in usual de Finetti theorems), and by introducing generalized S U (2 ,2 ) coherent states. Crucially, combined with an energy test, this allows us to truncate the Hilbert space globally instead as at the single-mode level as in previous approaches that failed to provide security in realistic conditions. Our reduction shows that it is sufficient to prove the security of these protocols against Gaussian collective attacks in order to obtain security against general attacks, thereby confirming rigorously the widely held belief that Gaussian attacks are indeed optimal against such protocols.

  17. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction.

    PubMed

    Leverrier, Anthony

    2017-05-19

    Establishing the security of continuous-variable quantum key distribution against general attacks in a realistic finite-size regime is an outstanding open problem in the field of theoretical quantum cryptography if we restrict our attention to protocols that rely on the exchange of coherent states. Indeed, techniques based on the uncertainty principle are not known to work for such protocols, and the usual tools based on de Finetti reductions only provide security for unrealistically large block lengths. We address this problem here by considering a new type of Gaussian de Finetti reduction, that exploits the invariance of some continuous-variable protocols under the action of the unitary group U(n) (instead of the symmetric group S_{n} as in usual de Finetti theorems), and by introducing generalized SU(2,2) coherent states. Crucially, combined with an energy test, this allows us to truncate the Hilbert space globally instead as at the single-mode level as in previous approaches that failed to provide security in realistic conditions. Our reduction shows that it is sufficient to prove the security of these protocols against Gaussian collective attacks in order to obtain security against general attacks, thereby confirming rigorously the widely held belief that Gaussian attacks are indeed optimal against such protocols.

  18. You Should Be the Specialist! Weak Mental Rotation Performance in Aviation Security Screeners – Reduced Performance Level in Aviation Security with No Gender Effect

    PubMed Central

    Krüger, Jenny K.; Suchan, Boris

    2016-01-01

    Aviation security screeners analyze a large number of X-ray images per day and seem to be experts in mentally rotating diverse kinds of visual objects. A robust gender-effect that men outperform women in the Vandenberg & Kuse mental rotation task has been well documented over the last years. In addition it has been shown that training can positively influence the overall task-performance. Considering this, the aim of the present study was to investigate whether security screeners show better performance in the Mental Rotation Test (MRT) independently of gender. Forty-seven security screeners of both sexes from two German airports were examined with a computer based MRT. Their performance was compared to a large sample of control subjects. The well-known gender-effect favoring men on mental rotation was significant within the control group. However, the security screeners did not show any sex differences suggesting an effect of training and professional performance. Surprisingly this specialized group showed a lower level of overall MRT performance than the control participants. Possible aviation related influences such as secondary effects of work-shift or expertise which can cumulatively cause this result are discussed. PMID:27014142

  19. Promoting mother-infant interaction and infant mental health in low-income Korean families: attachment-based cognitive behavioral approach.

    PubMed

    Lee, Gyungjoo; McCreary, Linda; Breitmayer, Bonnie; Kim, Mi Ja; Yang, Soo

    2013-10-01

    This study evaluated the attachment-based cognitive behavioral approach (ACBA) to enhance mother-infant interaction and infant mental health. This quasi-experimental study used a pre-posttest control group design. Participants were 40 low-income, mother-infant (infant ages 12-36 months) dyads, 20 dyads per group. The ACBA group received 10 weekly 90-min sessions. Dependent variables were changes in mother-infant interaction and infant mental health. Additionally, we explored changes in mothers' attachment security. The groups differed significantly in changes in mother-infant interaction, infant mental health problems, and mothers' attachment security. ACBA may enhance mother-infant interaction and infants' mental health. © 2013, Wiley Periodicals, Inc.

  20. Pastoral Group Counselling at a High Security Prison in Israel: Integrating Pierre Janet's Psychological Analysis with Fritz Perls' Gestalt Therapy.

    PubMed

    Brown, Paul; Brown, Marta

    2015-03-01

    This is a report of a short-term, pastoral counselling group conducted with Jewish internees in a high security prison in Israel. It was held as an adjunct to daily secular individual and group counselling and rehabilitation run by the Department of Social Work. Pastoral counselling employed spiritual and psychosocial methodologies to reduce anger, improve prisoner frustration tolerance, and develop a sense of self-efficacy and communal identity. It combined semi-didactic scriptural input with Pierre Janet's personality model, Fritz Perls' gestalt therapy, and analysis of the group process. © The Author(s) 2015 Reprints and permissions:sagepub.co.uk/journalsPermissions.nav.

  1. Report on Activities and Programs for Countering Proliferation and NBC Terrorism. Volume 1. Executive Summary

    DTIC Science & Technology

    2011-05-01

    Homeland Security (DHS) and the Department of State (DOS), and by changing the IC’s CPRC representative from the Director of Central Intelli- gence to the...Security Strategy of the United States of America (May 2010), p. 4. 2 Nuclear Posture Review Report (April 6, 2010), p. i 3 National Strategy for...ongoing efforts with GICNT, the Nuclear Forensics International Technical Working Group (ITWG), Forensics En - gagement Working Group (FEWG), NATO

  2. Strong Password-Based Authentication in TLS Using the Three-PartyGroup Diffie-Hellman Protocol

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abdalla, Michel; Bresson, Emmanuel; Chevassut, Olivier

    2006-08-26

    The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.

  3. Self-efficacy is associated with increased food security in novel food pantry program.

    PubMed

    Martin, Katie S; Colantonio, Angela G; Picho, Katherine; Boyle, Katie E

    2016-12-01

    We examined the effect of a novel food pantry intervention (Freshplace) that includes client-choice and motivational interviewing on self-efficacy and food security in food pantry clients. The study was designed as a randomized control trial. Participants were recruited over one year from traditional food pantries in Hartford, CT. Participants were randomized to Freshplace or traditional food pantries (controls) and data collection occurred at baseline with quarterly follow-ups for 18 months. Food security was measured using the USDA 18-item Food Security Module. A newly developed scale was utilized to measure self-efficacy. Scale reliability was measured using a Cronbach alpha test; validity was measured via correlating with a related variable. Analyses included chi-square tests for bivariate analyses and hierarchical linear modeling for longitudinal analyses. A total of 227 adults were randomized to the Freshplace intervention ( n =112) or control group ( n =115). The overall group was 60% female, 73% Black, mean age=51. The new self-efficacy scale showed good reliability and validity. Self-efficacy was significantly inversely associated with very low food security ( p <.05). Being in the Freshplace intervention ( p =.01) and higher self-efficacy ( p =.04) were independently associated with decreased very low food security. The traditional food pantry model fails to recognize the influence of self-efficacy on a person's food security. A food pantry model with client-choice, motivational interviewing and targeted referral services can increase self-efficacy of clients. Prioritizing the self-efficacy of clients over the efficiency of pantry operations is required to increase food security among disadvantaged populations.

  4. Protecting ICS Systems Within the Energy Sector from Cyber Attacks

    NASA Astrophysics Data System (ADS)

    Barnes, Shaquille

    Advance persistent threat (APT) groups are continuing to attack the energy sector through cyberspace, which poses a risk to our society, national security, and economy. Industrial control systems (ICSs) are not designed to handle cyber-attacks, which is why asset owners need to implement the correct proactive and reactive measures to mitigate the risk to their ICS environments. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to 290 incidents for fiscal year 2016, where 59 of those incidents came from the Energy Sector. APT groups know how vulnerable energy sector ICS systems are and the destruction they can cause when they go offline such as loss of production, loss of life, and economic impact. Defending against APT groups requires more than just passive controls such as firewalls and antivirus solutions. Asset owners should implement a combination of best practices and active defense in their environment to defend against APT groups. Cyber-attacks against critical infrastructure will become more complex and harder to detect and respond to with traditional security controls. The purpose of this paper was to provide asset owners with the correct security controls and methodologies to help defend against APT groups.

  5. Association of market, mission, operational, and financial factors with hospitals' level of cash and security investments.

    PubMed

    McCue, M J; Thompson, J M; Dodd-McCue, D

    Using a resource dependency framework and financial theory, this study assessed the market, mission, operational, and financial factors associated with the level of cash and security investments in hospitals. We ranked hospitals in the study sample based on their cash and security investments as a percentage of total assets: hospitals in the high cash/security investment category were in the top 25th percentile of all hospitals; those in the low cash/security investment group were in the bottom 25th percentile. Findings indicate that high cash/security investment hospitals are under either public or private nonprofit ownership and have greater market share. They also serve more complex cases, offer more technology services, generate greater profits, incur a more stable patient revenue base, and maintain less debt.

  6. The cult of the amateur in agriculture threatens food security.

    PubMed

    Trewavas, Anthony

    2008-09-01

    The incorporation of science and technology into agriculture has led to enormous growth in crop yields, providing food security in many countries. From the 1950s onwards there has been increasing interference in agricultural policy by a few scientists who are marginal to agriculture and from a variety of unqualified groups. These groups and individuals have used fear and anxiety and have greatly exaggerated minor problems to persuade an unqualified public of supposed dangers in food and to try and change agricultural policy. Fear and emotion do not lead to good policy, and the cult of the amateur that has developed could have serious repercussions on vital food security and future agriculture in developing countries; it must be soundly rejected.

  7. Psychosocial working conditions in a representative sample of working Australians 2001-2008: an analysis of changes in inequalities over time.

    PubMed

    LaMontagne, A D; Krnjacki, L; Kavanagh, A M; Bentley, R

    2013-09-01

    A number of widely prevalent job stressors have been identified as modifiable risk factors for common mental and physical illnesses such as depression and cardiovascular disease, yet there has been relatively little study of population trends in exposure to job stressors over time. The aims of this paper were to assess: (1) overall time trends in job control and security and (2) whether disparities by sex, age, skill level and employment arrangement were changing over time in the Australian working population. Job control and security were measured in eight annual waves (2000-2008) from the Australian nationally-representative Household Income and Labour Dynamics of Australia panel survey (n=13 188 unique individuals for control and n=13 182 for security). Observed and model-predicted time trends were generated. Models were generated using population-averaged longitudinal linear regression, with year fitted categorically. Changes in disparities over time by sex, age group, skill level and employment arrangement were tested as interactions between each of these stratifying variables and time. While significant disparities persisted for disadvantaged compared with advantaged groups, results suggested that inequalities in job control narrowed among young workers compared with older groups and for casual, fixed-term and self-employed compared with permanent workers. A slight narrowing of disparities over time in job security was noted for gender, age, employment arrangement and occupational skill level. Despite the favourable findings of small reductions in disparities in job control and security, significant cross-sectional disparities persist. Policy and practice intervention to improve psychosocial working conditions for disadvantaged groups could reduce these persisting disparities and associated illness burdens.

  8. An RFID-Based Smart Structure for the Supply Chain: Resilient Scanning Proofs and Ownership Transfer with Positive Secrecy Capacity Channels †

    PubMed Central

    Ortiz, Andrés

    2017-01-01

    The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a resilient supply chain. The Internet of Things (IoT), and in particular Radio Frequency Identification (RFID) technology, can be used to realize these goals. For product identification, tracking and real-time awareness, RFID tags are attached to goods. As tagged goods move along the supply chain from the suppliers to the manufacturers, and then on to the retailers until eventually they reach the customers, two major security challenges can be identified: (I) to protect the shipment of goods that are controlled by potentially untrusted carriers; and (II) to secure the transfer of ownership at each stage of the chain. For the former, grouping proofs in which the tags of the scanned goods generate a proof of “simulatenous” presence can be employed, while for the latter, ownership transfer protocols (OTP) are used. This paper describes enhanced security solutions for both challenges. We first extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers; then, we describe a modified version of a recently published OTP based on channels with positive secrecy capacity adapted to be implemented on common RFID systems in the supply chain. The proposed solutions take into account the limitations of low cost tags employed in the supply chain, which are only required to generate pseudorandom numbers and compute one-way hash functions. PMID:28677637

  9. Peer-to-Peer Science Data Environment

    NASA Astrophysics Data System (ADS)

    Byrnes, J. B.; Holland, M. P.

    2004-12-01

    The goal of P2PSDE is to provide a convenient and extensible Peer-to-Peer (P2P) network architecture that allows: distributed science-data services-seamlessly incorporating collaborative value-added services with search-oriented access to remote science data. P2PSDE features the real-time discovery of data-serving peers (plus peer-groups and peer-group services), in addition to the searching for and transferring of science data. These features are implemented using "Project JXTA", the first and only standardized set of open, generalized P2P protocols that allow arbitrary network devices to communicate and collaborate as peers. The JXTA protocols standardize the manner in which peers discover each other, self-organize into peer groups, advertise and discover network services, and securely communicate with and monitor each other-even across network firewalls. The key benefits include: Potential for dramatic improvements in science-data dissemination; Real-time-discoverable, potentially redundant (reliable), science-data services; Openness/Extensibility; Decentralized use of small, inexpensive, readily-available desktop machines; and Inherently secure-with ability to create variable levels of security by group.

  10. Repair process and a repaired component

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Roberts, III, Herbert Chidsey; Simpson, Stanley F.

    Matrix composite component repair processes are disclosed. The matrix composite repair process includes applying a repair material to a matrix composite component, securing the repair material to the matrix composite component with an external securing mechanism and curing the repair material to bond the repair material to the matrix composite component during the securing by the external securing mechanism. The matrix composite component is selected from the group consisting of a ceramic matrix composite, a polymer matrix composite, and a metal matrix composite. In another embodiment, the repair process includes applying a partially-cured repair material to a matrix composite component,more » and curing the repair material to bond the repair material to the matrix composite component, an external securing mechanism securing the repair material throughout a curing period, In another embodiment, the external securing mechanism is consumed or decomposed during the repair process.« less

  11. Social security and mortality: the role of income support policies and population health in the United States.

    PubMed

    Arno, Peter S; House, James S; Viola, Deborah; Schechter, Clyde

    2011-05-01

    Social Security is the most important and effective income support program ever introduced in the United States, alleviating the burden of poverty for millions of elderly Americans. We explored the possible role of Social Security in reducing mortality among the elderly. In support of this hypothesis, we found that declines in mortality among the elderly exceeded those among younger age groups following the initial implementation of Social Security in 1940, and also in the periods following marked improvements in Social Security benefits via legislation and indexing of benefits that occurred between the mid-1960s and the early 1970s. A better understanding of the link between Social Security and health status among the elderly would add a significant and missing dimension to the public discourse over the future of Social Security, and the potential role of income support programs in reducing health-related socioeconomic disparities and improving population health.

  12. The relationship between food insecurity with cardiovascular risk markers and metabolic syndrome components in patients with diabetes: A population-based study from Kerman coronary artery disease risk study.

    PubMed

    Mahmoodi, Mohammad Reza; Najafipour, Hamid; Mohsenpour, Mohammad Ali; Amiri, Mojgan

    2017-01-01

    We sought the prevalence of food insecurity and whether cardiovascular risk markers and metabolic syndrome components are significantly different in categories of food insecurity in patients with type 2 diabetes. In this cross-sectional study, 520 patients with type 2 diabetes from the Kerman coronary artery disease risk study aged between 23 and 87 years (60.8 ± 11.4) who selected by one-stage cluster sampling were assigned into four groups of "food secure" and "mild," "moderate," and "severe" food insecure. Household food insecurity was assessed by a 9-item household food insecurity access scale questionnaire. The prevalence of food security and mild, moderate, and severe food insecurity in patients with diabetes was 24.4%, 33.1%, 28.9%, and 13.6%, respectively. There was a significant difference among the food-secure/insecure sex groups ( P = 0.001). The prevalence of food insecurity and risk factors such as total cholesterol, high low-density lipoprotein cholesterol, and visceral obesity in mild food-insecure females was significantly higher than males ( P < 0.001, 0.001, and 0.001, respectively). The fasting blood sugar significantly increased ( P = 0.020) in diabetic females with food security than the other female groups. Diastolic blood pressure significantly increased ( P = 0.028) in diabetic females with severe food insecurity than the other female groups. The glycosylated hemoglobin significantly increased ( P = 0.013) in diabetic males with severe food insecurity than the other male groups. Food insecurity odds ratio in females was 1.74 (95% confidence interval [CI]: 1.10-2.70), 2.39 (95% CI: 1.48-3.88), and 2.73 (95% CI: 1.49-5.01) times higher than in males for mild, moderate, and severe food insecurity, respectively. Food insecurity may deteriorate some cardiometabolic biomarkers in type 2 diabetes. Improving food security in patients with diabetes may help reduce cardiovascular disease.

  13. Child-specific food insecurity and its sociodemographic and nutritional determinants among Iranian schoolchildren.

    PubMed

    Alipour, Beytollah; Abbasalizad Farhangi, Mahdieh; Asghari, Somayye; Amirkhizi, Farshad; Dahri, Monireh; Abedimanesh, Nasim; Farsad-Naimi, Alireza; Hojegani, Shiva

    2016-01-01

    Despite strong evidence of the prevalence of food insecurity in adults and households with children in different areas of Iran, the prevalence of child-specific food insecurity in Iran and especially in Tabriz has not been evaluated. Therefore, the objective of the current study is to evaluate the prevalence of food insecurity in schoolchildren and to identify its social, demographic, and nutritional determinants in Tabriz, Iran. This cross-sectional study was conducted between April and September 2014 among 330 schoolchildren aged 7-11 years comprising 170 boys and 160 girls from ten public schools in Tabriz, Iran. Demographic and socioeconomic factors had been obtained from participants. Food security status was assessed by an eight-item U.S. Department of Agriculture (USDA) Food Security Module previously validated for use in Iran. Dietary information was obtained by a food frequency questionnaire (FFQ). In our findings, the prevalence of food insecurity among children was 30% with 29.1% being low food secure and 0.9% being very low food secure. Mean weight for age Z-score (WAZ) in the food insecure group was significantly lower than in the food secure group. The prevalence of food insecurity was more prevalent in boys (p = .006). Food insecure children had a significantly lower intake of energy, carbohydrate, protein, and meat (p < .001) and higher prevalence of wasting compared with their counterparts in the food secure group (p = .004). These results suggest a proportionally high prevalence of food insecurity in schoolchildren in Tabriz and its significant association with poor nutritional status and dietary habits. Our findings also ensures the necessity of nutritional support programs and nutritional education in Iranian low-income families to improve their overall health.

  14. Kingston Conference on International Security (KCIS-2011): The Changing Arctic: Sovereignty, Resources, and Security

    DTIC Science & Technology

    2011-08-26

    peoples, such as the Inuit , have been accorded greater control of their own lives, while multilateral organizations have been crafted to provide a forum...stakeholders in the Inuit community, and not all of the agreements made between aboriginal groups and national governments have been honored. As a...North America and the Arctic Council”; and, (3) Udloriak Hanson from the Inuit Tapiriit Kanatami, “Sovereignty, Resource Development and Security

  15. Structural Causes and Cyber Effects: A Response to Our Critics

    DTIC Science & Technology

    2015-01-01

    the incident, saying “North Korea’s attack on [Sony] reaf- firms that cyber threats pose one of the gravest national security dangers to the United...around the world to strengthen cyber - security , promote norms of acceptable state behavior, uphold freedom of expression, and ensure that the Internet... cyber working group that made progress toward “interna- tional cyberspace rules, and measures to boost dialogue and cooperation on cyber security .”15

  16. A scoping review of traditional food security in Alaska.

    PubMed

    Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa

    2018-12-01

    Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: "traditional foods", "food security", "access", "availability", "utilisation", "Alaska", "Alaska Native" and "indigenous". Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska.

  17. The Impact of Social Security on Return Migration among Latin American Elderly in the U.S.

    PubMed Central

    Vega, Alma

    2014-01-01

    International migration has long been considered the preserve of working-age adults. However, the rapid diversification of the elderly population calls for increased attention to the migration patterns of this group and its possible motivations. This study examines whether Latin American immigrants who are primary Social Security beneficiaries are more likely to return to their home countries during later life if they receive lower Social Security benefits. Using a regression discontinuity approach on restricted data from the U.S. Social Security Administration (N=1,515), this study presents the results of a natural experiment whereby the Social Security Administration unexpectedly lowered the Social Security benefits of the 1917-1921 birth cohorts due to a miscalculation in the benefit-calculation formula. Results suggest that approximately 10% of primary Social Security beneficiaries from Latin America born close to these dates return migrated, the probability of which was not affected by Social Security benefit levels. PMID:26279596

  18. Predictors of attachment security in preschool children from intact and divorced families.

    PubMed

    Nair, Hira; Murray, Ann D

    2005-09-01

    The authors selected 58 mother-child dyads from divorced and intact families to participate in a study on the impact of divorce on preschoolers' attachment security. The authors explored pathways that lead to security of attachment. They found that mothers from divorced families were younger, had lower income levels, and had lower levels of education compared with their intact counterparts. Divorced mothers also reported significantly higher levels of stress, depression, need for social support, and conflict with their spouses. Mothers from intact families were more likely to use positive (authoritative) parenting styles compared with divorced mothers. Children in the divorced group had lower security scores on the Attachment Q-Set instrument (E. Waters, 1995). Regression analyses indicated that parenting style made a direct (independent) contribution to attachment security. In addition, temperament was related to attachment security, but temperament did not diminish the association of parenting style with attachment security. Furthermore, regression analyses indicated that the relationship of divorce to attachment security was mediated by parenting style.

  19. Privacy-enhanced electronic mail

    NASA Astrophysics Data System (ADS)

    Bishop, Matt

    1990-06-01

    The security of electronic mail sent through the Internet may be described in exactly three words: there is none. The Privacy and Security Research Group has recommended implementing mechanisms designed to provide security enhancements. The first set of mechanisms provides a protocol to provide privacy, integrity, and authentication for electronic mail; the second provides a certificate-based key management infrastructure to support key distribution throughout the internet, to support the first set of mechanisms. These mechanisms are described, as well as the reasons behind their selection and how these mechanisms can be used to provide some measure of security in the exchange of electronic mail.

  20. A Reaction Time Experiment on Adult Attachment: The Development of a Measure for Neurophysiological Settings

    PubMed Central

    Wichmann, Theresia; Buchheim, Anna; Menning, Hans; Schenk, Ingmar; George, Carol; Pokorny, Dan

    2016-01-01

    In the last few decades, there has been an increase of experimental research on automatic unconscious processes concerning the evaluation of the self and others. Previous research investigated implicit aspects of romantic attachment using self-report measures as explicit instruments for assessing attachment style. There is a lack of experimental procedures feasible for neurobiological settings. We developed a reaction time (RT) experiment using a narrative attachment measure with an implicit nature and were interested to capture automatic processes, when the individuals’ attachment system is activated. We aimed to combine attachment methodology with knowledge from implicit measures by using a decision RT paradigm. This should serve as a means to capture implicit aspects of attachment. This experiment evaluated participants’ response to prototypic attachment sentences in association with their own attachment classification, measured with the Adult Attachment Projective Picture System (AAP). First the AAP was administered as the standardized interview procedure to 30 healthy participants, which were classified into a secure or insecure group. In the following experimental session, both experimenter and participants were blind with respect to classifications. One hundred twenty eight prototypically secure or insecure sentences related to the eight pictures of the AAP were presented to the participants. Their response and RTs were recorded. Based on the response (accept, reject) a continuous security scale was defined. Both the AAP classification and security scale were related to the RTs. Differentiated study hypotheses were confirmed for insecure sentences, which were accepted faster by participants from the insecure attachment group (or with lower security scale), and rejected faster by participants from secure attachment group (or with higher security scale). The elaborating unconscious processes were more activated by insecure sentences with potential attachment conflicts. The introduced paradigm is able to contribute to an experimental approach in attachment research. The RT analysis with the narrative procedure might be of interest for a broader variety of questions in experimental and neurophysiological settings to capture unconscious processes in association with internal working models of attachment. An electrophysiological model based on preliminary research is proposed for assessing the preconscious neuronal network related to secure or insecure attachment representations. PMID:27853426

  1. 32 CFR 701.101 - Privacy program terms and definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... or online collection that directly identifies an individual (e.g., name, address, social security... her (e.g., Social Security Number (SSN), age, military rank, civilian grade, marital status, race... biometric records. (q) Record. Any item, collection, or grouping of information, whatever the storage media...

  2. 32 CFR 701.101 - Privacy program terms and definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... or online collection that directly identifies an individual (e.g., name, address, social security... her (e.g., Social Security Number (SSN), age, military rank, civilian grade, marital status, race... biometric records. (q) Record. Any item, collection, or grouping of information, whatever the storage media...

  3. 32 CFR 701.101 - Privacy program terms and definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... or online collection that directly identifies an individual (e.g., name, address, social security... her (e.g., Social Security Number (SSN), age, military rank, civilian grade, marital status, race... biometric records. (q) Record. Any item, collection, or grouping of information, whatever the storage media...

  4. 20 CFR 404.1212 - Police officers and firefighters.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Section 404.1212 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND... May Be Covered § 404.1212 Police officers and firefighters. (a) General. For Social Security coverage... officers' and firefighters' positions not under a retirement system as part of an absolute coverage group...

  5. Digitizing and Securing Archived Laboratory Notebooks

    ERIC Educational Resources Information Center

    Caporizzo, Marilyn

    2008-01-01

    The Information Group at Millipore has been successfully using a digital rights management tool to secure the email distribution of archived laboratory notebooks. Millipore is a life science leader providing cutting-edge technologies, tools, and services for bioscience research and biopharmaceutical manufacturing. Consisting of four full-time…

  6. Civil and forensic patients in secure psychiatric settings: a comparison.

    PubMed

    Galappathie, Nuwan; Khan, Sobia Tamim; Hussain, Amina

    2017-06-01

    Aims and method To evaluate differences between male patients in secure psychiatric settings in the UK based on whether they are detained under civil or forensic sections of the Mental Health Act 1983. A cohort of patients discharged from a secure psychiatric hospital were evaluated for length of stay and frequency of risk-related incidents. Results Overall, 84 patients were included in the study: 52 in the forensic group and 32 in the civil group. Civil patients had more frequent incidents of aggression, sex offending, fire-setting and vulnerability, whereas forensic patients had more frequent episodes of self-harm. Clinical implications Secure hospitals should ensure treatment programmes are tailored to each patient's needs. Civil patients require greater emphasis on treatment of their mental illness, whereas forensic patients have additional offence-related treatment needs. Regular liaison between forensic and general adult services is essential to help ensure patients can return to appropriate settings at the earliest opportunity in their recovery.

  7. Innovative dressing and securement of tunneled central venous access devices in pediatrics: a pilot randomized controlled trial.

    PubMed

    Ullman, Amanda J; Kleidon, Tricia; Gibson, Victoria; McBride, Craig A; Mihala, Gabor; Cooke, Marie; Rickard, Claire M

    2017-08-30

    Central venous access device (CVAD) associated complications are a preventable source of patient harm, frequently resulting in morbidity and delays to vital treatment. Dressing and securement products are used to prevent infectious and mechanical complications, however current complication rates suggest customary practices are inadequate. The aim of this study was to evaluate the feasibility of launching a full-scale randomized controlled efficacy trial of innovative dressing and securement products for pediatric tunneled CVAD to prevent complication and failure. An external, pilot, four-group randomized controlled trial of standard care (bordered polyurethane dressing and suture), in comparison to integrated securement-dressing, suture-less securement device, and tissue adhesive was undertaken across two large, tertiary referral pediatric hospitals in Australia. Forty-eight pediatric participants with newly inserted tunneled CVADs were consecutively recruited. The primary outcome of study feasibility was established by elements of eligibility, recruitment, attrition, protocol adherence, missing data, parent and healthcare staff satisfaction and acceptability, and effect size estimates for CVAD failure (cessation of function prior to completion of treatment) and complication (associated bloodstream infection, thrombosis, breakage, dislodgement or occlusion). Dressing integrity, product costs and site complications were also examined. Protocol feasibility was established. CVAD failure was: 17% (2/12) integrated securement-dressing; 8% (1/13) suture-less securement device; 0% tissue adhesive (0/12); and, 0% standard care (0/11). CVAD complications were: 15% (2/13) suture-less securement device (CVAD associated bloodstream infection, and occlusion and partial dislodgement); 8% (1/12) integrated securement-dressing (partial dislodgement); 0% tissue adhesive (0/12); and, 0% standard care (0/11). One CVAD-associated bloodstream infection occurred, within the suture-less securement device group. Overall satisfaction was highest in the integrated securement-dressing (mean 8.5/10; standard deviation 1.2). Improved dressing integrity was evident in the intervention arms, with the integrated securement-dressing associated with prolonged time to first dressing change (mean days 3.5). Improving the security and dressing integrity of tunneled CVADs is likely to improve outcomes for pediatric patients. Further research is necessary to identify novel, effective CVAD securement to reduce complications, and provide reliable vascular access for children. ACTRN12614000280606 ; prospectively registered on 17/03/2014.

  8. Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks.

    PubMed

    Meganathan, Navamani Thandava; Palanichamy, Yogesh

    2015-01-01

    Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery. These properties can be achieved by implementing group signature and ID-based encryption schemes during route discovery. Due to the characteristics of WMNs, it is more vulnerable to many network layer attacks. Hence, a strong protection is needed to avoid these attacks and this can be achieved by introducing a new Cross-Layer and Subject Logic based Dynamic Reputation (CLSL-DR) mechanism during route discovery. In this paper, we propose a new Privacy preserved and Secured Reliable Routing (PSRR) protocol for WMNs. This protocol incorporates group signature, ID-based encryption schemes, and CLSL-DR mechanism to ensure strong privacy, security, and reliability in WMNs. Simulation results prove this by showing better performance in terms of most of the chosen parameters than the existing protocols.

  9. Security Personnel Practices and Policies in U.S. Hospitals: Findings From a National Survey.

    PubMed

    Schoenfisch, Ashley L; Pompeii, Lisa A

    2016-06-27

    Concerns of violence in hospitals warrant examination of current hospital security practices. Cross-sectional survey data were collected from members of a health care security and safety association to examine the type of personnel serving as security in hospitals, their policies and practices related to training and weapon/restraint tool carrying/use, and the broader context in which security personnel work to maintain staff and patient safety, with an emphasis on workplace violence prevention and mitigation. Data pertaining to 340 hospitals suggest security personnel were typically non-sworn officers directly employed (72%) by hospitals. Available tools included handcuffs (96%), batons (56%), oleoresin capsicum products (e.g., pepper spray; 52%), hand guns (52%), conducted electrical weapons (e.g., TASERs®; 47%), and K9 units (12%). Current workplace violence prevention policy components, as well as recommendations to improve hospital security practices, aligned with Occupational Safety and Health Administration guidelines. Comprehensive efforts to address the safety and effectiveness of hospital security personnel should consider security personnel's relationships with other hospital work groups and hospitals' focus on patients' safety and satisfaction. © 2016 The Author(s).

  10. 20 CFR 404.1207 - Divided retirement system coverage groups.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Divided retirement system coverage groups. 404.1207 Section 404.1207 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... retirement system coverage group. A divided retirement system coverage group is a grouping under a retirement...

  11. Food insecurity among Dutch food bank recipients: a cross-sectional study.

    PubMed

    Neter, Judith E; Dijkstra, S Coosje; Visser, Marjolein; Brouwer, Ingeborg A

    2014-05-16

    To determine the prevalence of (very) low food security among Dutch food bank recipients, and to identify potential demographic, lifestyle and nutrition-related factors associated with (very) low food security. 11 of 135 Dutch food banks were selected throughout the Netherlands. 251 Dutch food bank recipients participated in the study (93 men and 158 women). Inclusion criteria for participation were: (1) at least 18 years of age, (2) sufficiently fluent in Dutch to participate in oral and written interviews, (3) recipient of a Dutch food bank for at least 1 month and (4) collect own food parcel at the food bank. A single member per household was included. Level of food security. The prevalence of food insecurity was 72.9% (N=183), of which 40.4% (N=74) reported very low food security. Of the very low food secure participants, 56.8% (N=42) reported they were ever hungry but did not eat because they could not afford enough food in the previous 3 months. Adjusted multinomial logistic regression analyses showed that households without children were less likely to experience low food security (OR 0.39 (95% CI 0.18 to 0.88)) and men (OR 0.24 (95% CI 0.11 to 0.51)) were less likely to experience very low food security, while low-educated recipients (OR 5.05 (95% CI 1.37 to 18.61)) were more likely to experience very low food security. Furthermore, recipients with high satisfaction with overall food intake (OR 0.46 (95% CI 0.27 to 0.78)), high perceived healthiness of overall food intake (OR 0.34 (95% CI 0.19 to 0.62)) or high self-efficacy of eating healthy (OR 0.62 (95% CI 0.40 to 0.96)) were less likely to experience very low food security. Our study showed high prevalence rates of food insecurity among Dutch food bank recipients, and identified subgroups at increased risk of food insecurity. More research is urgently needed on the underlying determinants of food insecurity and the effectiveness of food assistance by food banks. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  12. Development of quantitative security optimization approach for the picture archives and carrying system between a clinic and a rehabilitation center

    NASA Astrophysics Data System (ADS)

    Haneda, Kiyofumi; Kajima, Toshio; Koyama, Tadashi; Muranaka, Hiroyuki; Dojo, Hirofumi; Aratani, Yasuhiko

    2002-05-01

    The target of our study is to analyze the level of necessary security requirements, to search for suitable security measures and to optimize security distribution to every portion of the medical practice. Quantitative expression must be introduced to our study, if possible, to enable simplified follow-up security procedures and easy evaluation of security outcomes or results. Using fault tree analysis (FTA), system analysis showed that system elements subdivided into groups by details result in a much more accurate analysis. Such subdivided composition factors greatly depend on behavior of staff, interactive terminal devices, kinds of services provided, and network routes. Security measures were then implemented based on the analysis results. In conclusion, we identified the methods needed to determine the required level of security and proposed security measures for each medical information system, and the basic events and combinations of events that comprise the threat composition factors. Methods for identifying suitable security measures were found and implemented. Risk factors for each basic event, a number of elements for each composition factor, and potential security measures were found. Methods to optimize the security measures for each medical information system were proposed, developing the most efficient distribution of risk factors for basic events.

  13. What then do we do about computer security?

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Suppona, Roger A.; Mayo, Jackson R.; Davis, Christopher Edward

    This report presents the answers that an informal and unfunded group at SNL provided for questions concerning computer security posed by Jim Gosler, Sandia Fellow (00002). The primary purpose of this report is to record our current answers; hopefully those answers will turn out to be answers indeed. The group was formed in November 2010. In November 2010 Jim Gosler, Sandia Fellow, asked several of us several pointed questions about computer security metrics. Never mind that some of the best minds in the field have been trying to crack this nut without success for decades. Jim asked Campbell to leadmore » an informal and unfunded group to answer the questions. With time Jim invited several more Sandians to join in. We met a number of times both with Jim and without him. At Jim's direction we contacted a number of people outside Sandia who Jim thought could help. For example, we interacted with IBM's T.J. Watson Research Center and held a one-day, videoconference workshop with them on the questions.« less

  14. 32 CFR 310.4 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... him or her, e.g., a social security number; age; military rank; civilian grade; marital status; race... which can be used to distinguish or trace an individual's identity, such as their name, social security... grouping of information, whatever the storage media (e.g., paper, electronic, etc.), about an individual...

  15. 32 CFR 310.4 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... him or her, e.g., a social security number; age; military rank; civilian grade; marital status; race... which can be used to distinguish or trace an individual's identity, such as their name, social security... grouping of information, whatever the storage media (e.g., paper, electronic, etc.), about an individual...

  16. 32 CFR 310.4 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... him or her, e.g., a social security number; age; military rank; civilian grade; marital status; race... which can be used to distinguish or trace an individual's identity, such as their name, social security... grouping of information, whatever the storage media (e.g., paper, electronic, etc.), about an individual...

  17. OPERATION CASTLE. The Operation Plan Number 1-53. Task Group 7.1

    DTIC Science & Technology

    1984-08-31

    reconnaissance. 2 MA-16 Search and rescue at Eniwetok. P- 3 3 C-54 Documentary photography. I P2V Project 6.4 control of drons ve_-sel. - - iujutc 7-4 telemetering, SFIR2V Security Patrol. 4 741 Security. PI4

  18. 32 CFR 152.4 - Responsibilities.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Department of Defense, as appropriate. (3) Invite the Secretary of Homeland Security to appoint... Department of Homeland Security, the Chief Counsel, United States Coast Guard. (d) The JSC Working Group (WG... 32 National Defense 1 2012-07-01 2012-07-01 false Responsibilities. 152.4 Section 152.4 National...

  19. 32 CFR 310.4 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... him or her, e.g., a social security number; age; military rank; civilian grade; marital status; race... which can be used to distinguish or trace an individual's identity, such as their name, social security... grouping of information, whatever the storage media (e.g., paper, electronic, etc.), about an individual...

  20. Military Education Workshop Addresses Threats to Stability and Security

    DTIC Science & Technology

    2007-08-01

    for an upcoming National Intelligence Estimate (NIE), the National Inteligence Council (NIC) has reached out to a broad group of U.S. government...OFFICIAL BUSINESS resource competition and conflict; water and food security; health and disease, and the stability of governments. The Army should be

  1. Infant-Mother Attachment among the Dogon of Mali.

    ERIC Educational Resources Information Center

    True, Mary McMahan; Pisani, Lelia; Oumar, Fadimata

    2001-01-01

    Examined infant-mother attachment in Mali's Dogon ethnic group. Found that distribution of Strange Situation classifications was 67 percent secure, 0 percent avoidant, 8 percent resistant, and 25 percent disorganized. Infant attachment security related to quality of mother-infant communication. Mothers of disorganized infants had significantly…

  2. Trolling New Media: Violent Extremist Groups Recruiting Through Social Media

    DTIC Science & Technology

    2015-12-01

    MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL December 2015 Approved by...55 B. COUNTERTERRORISM EFFORTS ...................................................58 C. FUTURE AREAS OF STUDY ...Kuffar video .....................26 Figure 4. Player from Under Ash assaulting military forces .....................................32 Figure 5

  3. The Security of the South Atlantic: Is It a Case for ’SATO’--South Atlantic Treaty Organization

    DTIC Science & Technology

    1982-05-10

    Studies , Georgetown University, 1976. Nitze, Paul H., and Leonard Sullivan Jr., and the Atlantic Council Working Group on Securing the Seas. Securing...to this study should include the foregoing statement.) Accession For FTIS( GRA&I DTIC TAR Uuannwouncd e "• Jus;tification. 00 Distribution...Center for Strategic and International Studies , Georgetown University, 1976), p. 1. 2. Paul H. Nitze, Leonard Sullivan Jr and the Atlantic Council

  4. Programmable Logic Controllers for Research on the Cyber Security of Industrial Power Plants

    DTIC Science & Technology

    2017-02-12

    group . 15. SUBJECT TERMS Industrial control systems, cyber security 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b. ABSTRACT c. THIS...currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (00-MM-YYYY) ,2. REPORT TYPE 3. DATES COVERED...From- To) 12/02/2017 Final 15 August 2015 - 12 February 2017 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Programmable Logic Controllers for Research

  5. Colombian Army Transformation and the Inflection Point of the Terrorist Groups

    DTIC Science & Technology

    2011-03-30

    The start of Alvaro Uribe Velez administration (2002 - 2006) marked a clear separation in overcoming the problem at the national level. For the first... Alvaro Uribe Velez, Colombian Army War College Auditorium, 2003. 32 Security is not understood in a first instance as the State´s security, nor as...President Andrés Pastrana (1998 – 2002), produced a National Security Strategy of any value.3 However, from the beginning of President Alvaro Uribe’s

  6. Making grandma's data secure: a security architecture for home telemedicine.

    PubMed Central

    Starren, J.; Sengupta, S.; Hripcsak, G.; Ring, G.; Klerer, R.; Shea, S.

    2001-01-01

    Home telemedicine presents special challenges for data security and privacy. Experience in the Informatics for Diabetes Education And Telemedicine (IDEATel) project has demonstrated that data security is not a one-size-fits-all problem. The IDEATel users include elderly patients in their homes, nurse case managers, physicians, and researchers. The project supports multiple computer systems that require a variety of user interactions, including: data entry, data review, patient education, videoconferencing, and electronic monitoring. To meet these various needs, a number of different of security solutions were utilized, including: UserID/Password, PKI certificates, time-based tokens, IP filtering, VPNs, symmetric and asymmetric encryption schemes, firewalls and dedicated connections. These were combined in different ways to meet the needs of each user groups. PMID:11825267

  7. Network-Centric Quantum Communications

    NASA Astrophysics Data System (ADS)

    Hughes, Richard

    2014-03-01

    Single-photon quantum communications (QC) offers ``future-proof'' cryptographic security rooted in the laws of physics. Today's quantum-secured communications cannot be compromised by unanticipated future technological advances. But to date, QC has only existed in point-to-point instantiations that have limited ability to address the cyber security challenges of our increasingly networked world. In my talk I will describe a fundamentally new paradigm of network-centric quantum communications (NQC) that leverages the network to bring scalable, QC-based security to user groups that may have no direct user-to-user QC connectivity. With QC links only between each of N users and a trusted network node, NQC brings quantum security to N2 user pairs, and to multi-user groups. I will describe a novel integrated photonics quantum smartcard (``QKarD'') and its operation in a multi-node NQC test bed. The QKarDs are used to implement the quantum cryptographic protocols of quantum identification, quantum key distribution and quantum secret splitting. I will explain how these cryptographic primitives are used to provide key management for encryption, authentication, and non-repudiation for user-to-user communications. My talk will conclude with a description of a recent demonstration that QC can meet both the security and quality-of-service (latency) requirements for electric grid control commands and data. These requirements cannot be met simultaneously with present-day cryptography.

  8. Enhancing maternal sensitivity and infant attachment security with video feedback: an exploratory study in Italy.

    PubMed

    Cassibba, Rosalinda; Castoro, Germana; Costantino, Elisabetta; Sette, Giovanna; Van Ijzendoorn, Marinus H

    2015-01-01

    This study aims to explore whether a short-term and attachment-based video-feedback intervention, the Video-Feedback Intervention to Promote Positive Parenting With Discussions on the Representational Level (VIPP-R; F. Juffer, M.J. Bakermans-Kranenburg, & M.H. van IJzendoorn, 2008), might be effective in enhancing maternal sensitivity and in promoting infants' attachment security in an Italian sample of dyads with primiparous mothers. Moreover, we explore whether the effectiveness of VIPP-R might be different for parents with insecure attachment representations who might be most in need of preventive intervention, as compared to parents who already have a more balanced and secure state of mind. Thirty-two infants (40% female) and their mothers participated in the study. The sample was divided into an intervention group (n = 16) and a comparison group (n = 16). At 6 and 13 months of age, the Adult Attachment Interview (AAI; M. Main, N. Kaplan, & J. Cassidy, 1985) was administered. Moreover, a 30-min mother-infant play situation was videotaped and coded for maternal sensitivity with the Emotional Availability Scales (Z. Biringen, J. Robinson, & R.N. Emde, 2000). At 13 months of age, the Strange Situation Procedure (M.D.S. Ainsworth, M.D. Blehar, E. Waters, & S. Wall, 1978) was used to assess the security of mother-infant attachment. Results revealed a significant interaction effect between intervention and AAI security for infant attachment security; moreover, main effects of AAI security and intervention for maternal sensitivity were found. The VIPP-R appears effective in enhancing maternal sensitivity and infant attachment security, although only mothers with an insecure attachment representation may benefit from the intervention. © 2014 Michigan Association for Infant Mental Health.

  9. No information flow using statistical fluctuations and quantum cryptography

    NASA Astrophysics Data System (ADS)

    Larsson, Jan-Åke

    2004-04-01

    The communication protocol of Home and Whitaker [

    Phys. Rev. A 67, 022306 (2003)
    ] is examined in some detail, and found to work equally well using a separable state. The protocol is in fact completely classical, based on postselection of suitable experimental runs. The quantum-cryptography protocol proposed in the same publication is also examined, and this protocol uses entanglement, a strictly quantum property of the system. An individual eavesdropping attack on each qubit pair would be detected by the security test proposed in the mentioned paper. However, the key is provided by groups of qubits, and there exists a coherent attack, internal to these groups, that will go unnoticed in that security test. A modified test is proposed here that will ensure security, even against such a coherent attack.

  10. Strong tobacco control program requirements and secure funding are not enough: lessons from Florida.

    PubMed

    Kennedy, Allison; Sullivan, Sarah; Hendlin, Yogi; Barnes, Richard; Glantz, Stanton

    2012-05-01

    Florida's Tobacco Pilot Program (TPP; 1998-2003), with its edgy Truth media campaign, achieved unprecedented youth smoking reductions and became a model for tobacco control programming. In 2006, 3 years after the TPP was defunded, public health groups restored funding for tobacco control programming by convincing Florida voters to amend their constitution. Despite the new program's strong legal structure, Governor Charlie Crist's Department of Health implemented a low-impact program. Although they secured the program's strong structure and funding, Florida's nongovernmental public health organizations did not mobilize to demand a high-impact program. Implementation of Florida's Amendment 4 demonstrates that a strong programmatic structure and secure funding are insufficient to ensure a successful public health program, without external pressure from nongovernmental groups.

  11. The hobbyist phenomenon in physical security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Michaud, E. C.

    Pro-Ams (professional amateurs) are groups of people who work on a problem as amateurs or unpaid persons in a given field at professional levels of competence. Astronomy is a good example of Pro-Am activity. At Galaxy Zoo, Pro-Ams evaluate data generated by professional observatories and are able to evaluate the millions of galaxies that have been observed but not classified, and report their findings at professional levels for fun. To allow the archiving of millions of galaxies that have been observed but not classified, the website has been engineered so that the public can view and classify galaxies even ifmore » they are not professional astronomers. In this endeavor, it has been found that amateurs can easily outperform automated vision systems. Today in the world of physical security, Pro-Ams are playing an ever-increasing role. Traditionally, locksmiths, corporations, and government organizations have been largely responsible for developing standards, uncovering vulnerabilities, and devising best security practices. Increasingly, however, nonprofit sporting organizations and clubs are doing this. They can be found all over the world, from Europe to the US and now South East Asia. Examples include TOOOL (The Open Organization of Lockpickers), the Longhorn Lockpicking Club, Sportsfreunde der Sperrtechnik - Deustcheland e.V., though there are many others. Members of these groups have been getting together weekly to discuss many elements of security, with some groups specializing in specific areas of security. When members are asked why they participate in these hobbyist groups, they usually reply (with gusto) that they do it for fun, and that they view defeating locks and other security devices as an interesting and entertaining puzzle. A lot of what happens at these clubs would not be possible if it weren't for 'Super Abundance', the ability to easily acquire (at little or no cost) the products, security tools, technologies, and intellectual resources traditionally limited to corporations, government organizations, or wealthy individuals. With this new access comes new discoveries. For example, hobbyist sport lockpicking groups discovered - and publicized - a number of new vulnerabilities between 2004 and 2009 that resulted in the majority of high-security lock manufacturers having to make changes and improvements to their products. A decade ago, amateur physical security discoveries were rare, at least those discussed publicly. In the interim, Internet sites such as lockpicking.org, lockpicking101.com and others have provided an online meeting place for people to trade tips, find friends with similar interests, and develop tools. The open, public discussion of software vulnerabilities, in contrast, has been going on for a long time. These two industries, physical security and software, have very different upgrade mechanisms. With software, a patch can typically be deployed quickly to fix a serious vulnerability, whereas a hardware fix for a physical security device or system can take upwards of months to implement in the field, especially if (as is often the case) hardware integrators are involved. Even when responding to publicly announced security vulnerabilities, manufacturers of physical security devices such as locks, intrusion detectors, or access control devices rarely view hobbyists as a positive resource. This is most unfortunate. In the field of software, it is common to speak of Open Source versus Closed Source. An Open Source software company may choose to distribute their software with a particular license, and give it away openly, with full details and all the lines of source code made available. Linux is a very popular example of this. A Close Source company, in contrast, chooses not to reveal its source code and will license its software products in a restrictive manor. Slowly, the idea of Open Source is now coming to the world of physical security. In the case of locks, it provides an alternative to the traditional Closed Source world of locksmiths. Now locks are physical objects, and can therefore be disassembled. As such, they have always been Open Source in a limited sense. Secrecy, in fact, is very difficult to maintain for a lock that is widely distributed. Having direct access to the lock design provides the hobbyist with a very open environment for finding security flaws, even if the lock manufacturer attempts to follow a Close Source model. It is clear that the field of physical security is going the digital route with companies such as Medeco, Mul-T-Lock, and Abloy manufacturing electromechanical locks. Various companies have already begun to add microcontrollers, cryptographic chip sets, solid-state sensors, and a number of other high-tech improvements to their product lineup in an effort to thwart people from defeating their security products.« less

  12. Securitizing the Arctic indigenous peoples: A community security perspective with special reference to the Sámi of the European high north

    NASA Astrophysics Data System (ADS)

    Hossain, Kamrul

    2016-09-01

    The theory of securitization-the so-called Copenhagen school-centers the concept of security on various identified threats. Security based on the collective identity by which a society preserves its essential characteristics has been defined as community security, or societal security. The underlying principle of the Copenhagen school is that state-based, sovereignty-oriented security is ineffective unless the other components of security threats are addressed. The concept of human security, developed nearly simultaneously to that of securitization, identifies threat components at the sub-state level which are not traditionally understood as security concerns. Both schools of security thought are similar as they offer nontraditional approaches to understanding the concept of security. In this article, I explore securitization theory and the concept of human security to elaborate community perspectives in the understanding of security. In a case study, I investigate the security concerns of the indigenous peoples of the Arctic. The transformation of the Arctic by climate change and its impacts has resulted in new challenges and opportunities, so I explore how indigenous peoples in general and the Sámi in particular understand security which promotes their societal security. Although I show that this group of people deserves recognition and the ability to exercise greater authority, I conclude that diverse concepts of security do not by any means undermine the core traditional concept of security. These aspects of security remain subject to scrutiny by states and exist in a vertical structure. The Sámi, therefore, rely on affirmative actions by states to enjoy greater rights to maintain their community security.

  13. The Privacy and Security Implications of Open Data in Healthcare.

    PubMed

    Kobayashi, Shinji; Kane, Thomas B; Paton, Chris

    2018-04-22

     The International Medical Informatics Association (IMIA) Open Source Working Group (OSWG) initiated a group discussion to discuss current privacy and security issues in the open data movement in the healthcare domain from the perspective of the OSWG membership.  Working group members independently reviewed the recent academic and grey literature and sampled a number of current large-scale open data projects to inform the working group discussion.  This paper presents an overview of open data repositories and a series of short case reports to highlight relevant issues present in the recent literature concerning the adoption of open approaches to sharing healthcare datasets. Important themes that emerged included data standardisation, the inter-connected nature of the open source and open data movements, and how publishing open data can impact on the ethics, security, and privacy of informatics projects.  The open data and open source movements in healthcare share many common philosophies and approaches including developing international collaborations across multiple organisations and domains of expertise. Both movements aim to reduce the costs of advancing scientific research and improving healthcare provision for people around the world by adopting open intellectual property licence agreements and codes of practice. Implications of the increased adoption of open data in healthcare include the need to balance the security and privacy challenges of opening data sources with the potential benefits of open data for improving research and healthcare delivery. Georg Thieme Verlag KG Stuttgart.

  14. Selective processing of threatening information: effects of attachment representation and anxiety disorder on attention and memory.

    PubMed

    Zeijlmans van Emmichoven, Ingeborg A; van IJzendoorn, Marinus H; de Ruiter, Corine; Brosschot, Jos F

    2003-01-01

    To investigate the effect of the mental representation of attachment on information processing, 28 anxiety disorder outpatients, as diagnosed by the Anxiety Disorders Interview Schedule-Revised, were administered the Adult Attachment Interview and the State-Trait Anxiety Inventory. They also completed an emotional Stroop task with subliminal and supraliminal exposure conditions, a free recall memory task, and a recognition test. All tasks contained threatening, neutral, and positively valenced stimuli. A nonclinical comparison group of 56 participants completed the same measures. Results on the Stroop task showed color-naming interference for threatening words in the supraliminal condition only. Nonclinical participants with insecure attachment representations showed a global response inhibition to the Stroop task. Clinical participants with secure attachment representations showed the largest Stroop interference of the threatening words compared to the other groups. Results on the free recall task showed superior recall of all types of stimuli by participants with secure attachment representations. In the outpatient group, participants with secure attachment representations showed superior recall of threatening words on the free recall task, compared to insecure participants. Results on the recognition task showed no differences between attachment groups. We conclude that secure attachment representations are characterized by open communication about and processing of threatening information, leading to less defensive exclusion of negative material during the attentional stage of information processing and to better recall of threatening information in a later stage. Attachment insecurity, but not the type of insecurity, seems a decisive factor in attention and memory processes.

  15. Influence of taekwondo as security martial arts training on anaerobic threshold, cardiorespiratory fitness, and blood lactate recovery.

    PubMed

    Kim, Dae-Young; Seo, Byoung-Do; Choi, Pan-Am

    2014-04-01

    [Purpose] This study was conducted to determine the influence of Taekwondo as security martial arts training on anaerobic threshold, cardiorespiratory fitness, and blood lactate recovery. [Subjects and Methods] Fourteen healthy university students were recruited and divided into an exercise group and a control group (n = 7 in each group). The subjects who participated in the experiment were subjected to an exercise loading test in which anaerobic threshold, value of ventilation, oxygen uptake, maximal oxygen uptake, heart rate, and maximal values of ventilation / heart rate were measured during the exercise, immediately after maximum exercise loading, and at 1, 3, 5, 10, and 15 min of recovery. [Results] At the anaerobic threshold time point, the exercise group showed a significantly longer time to reach anaerobic threshold. The exercise group showed significantly higher values for the time to reach VO2max, maximal values of ventilation, maximal oxygen uptake and maximal values of ventilation / heart rate. Significant changes were observed in the value of ventilation volumes at the 1- and 5-min recovery time points within the exercise group; oxygen uptake and maximal oxygen uptake were significantly different at the 5- and 10-min time points; heart rate was significantly different at the 1- and 3-min time points; and maximal values of ventilation / heart rate was significantly different at the 5-min time point. The exercise group showed significant decreases in blood lactate levels at the 15- and 30-min recovery time points. [Conclusion] The study results revealed that Taekwondo as a security martial arts training increases the maximal oxygen uptake and anaerobic threshold and accelerates an individual's recovery to the normal state of cardiorespiratory fitness and blood lactate level. These results are expected to contribute to the execution of more effective security services in emergencies in which violence can occur.

  16. 29 CFR 2520.104-43 - Exemption from annual reporting requirement for certain group insurance arrangements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 104(a)(3) of the Act, the administrator of an employee welfare benefit plan which meets the... (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR REPORTING AND DISCLOSURE UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974 RULES AND REGULATIONS FOR REPORTING AND DISCLOSURE...

  17. 78 FR 69745 - Safety and Security Plans for Class 3 Hazardous Materials Transported by Rail

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-20

    ... DEPARTMENT OF TRANSPORTATION Pipeline and Hazardous Materials Safety Administration [Docket No... Security Plans for Class 3 Hazardous Materials Transported by Rail AGENCY: Pipeline and Hazardous Materials... characterization, classification, and selection of a packing group for Class 3 materials, and the corresponding...

  18. The Handbook for Campus Crime Reporting

    ERIC Educational Resources Information Center

    Ward, Diane; Lee, Janice

    2005-01-01

    Campus security and safety are important issues in postsecondary education today. Providing students nationwide with a safe environment in which to learn and keeping students, parents and employees well informed about campus security are goals that have been voiced by many groups. These goals were advanced by the Crime Awareness and Campus…

  19. Stability and Change of Adolescents' Aggressive Behavior in Residential Youth Care

    ERIC Educational Resources Information Center

    Eltink, E. M. A.; Ten Hoeve, J.; De Jongh, T.; Van der Helm, G. H. P.; Wissink, I. B.; Stams, G. J. J. M.

    2018-01-01

    Background: Aggression in residential youth care institutions is a frequent problem. Objective: The present short-term longitudinal study examined individual and institutional predictors of aggression in a group of 198 adolescents placed in open, semi-secure and secure residential institutions from the perspective of the importation and…

  20. 76 FR 6637 - Assumption Buster Workshop: Defense-in-Depth Is a Smart Investment for Cyber Security

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    ... Technology Research and Development (NITRD) Program. ACTION: Call for participation. FOR FURTHER INFORMATION... regulations and restrictions. SUMMARY: The NCO, on behalf of the Special Cyber Operations Research and Engineering (SCORE) Committee, an interagency working group that coordinates cyber security research...

  1. Food Security in Older Australians from Different Cultural Backgrounds

    ERIC Educational Resources Information Center

    Radermacher, Harriet; Feldman, Susan; Bird, Stephen

    2010-01-01

    Objective: To investigate the experiences and barriers to food security of community-dwelling older people. Design: Quantitative questionnaire and 5 focus group discussions using purposive sampling. Setting: Shire of Melton, Victoria, Australia. Participants: Thirty-seven people (13 male and 24 female), between 58 and 85 years of age, from…

  2. 17 CFR 210.12-09 - Valuation and qualifying accounts.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... period Column C—Additions (1)—Charged to costs and expenses (2)—Charged to other accounts—describe Column... qualifying accounts and reserves by descriptive title. Group (a) those valuation and qualifying accounts... accounts. 210.12-09 Section 210.12-09 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...

  3. Perilous Human Security in South Asia: Are There Ways Out?

    DTIC Science & Technology

    2011-03-21

    threats directed against women and child . Most people derive security from their membership in a group – a family, a community, an organization, a...Strategic Environment, 10-11. 84 Aun Porn Moniroth, “Economic Integration in East Asia – Cambodia’s Experience” in East Asian Visions, ed. Indermit Gil

  4. 78 FR 39399 - Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing of Proposed Rule Change...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-01

    ... Custodian's custody, subject to certain limitations based on events beyond the Gold Custodian's control... Securities Commission, Autorite des marches financiers, New Brunswick Securities Commission, Nova Scotia... are members of the Intermarket Surveillance Group (``ISG''), and FINRA, on behalf of the Exchange, may...

  5. Stability and Change of Adolescents' Aggressive Behavior in Residential Youth Care.

    PubMed

    Eltink, E M A; Ten Hoeve, J; De Jongh, T; Van der Helm, G H P; Wissink, I B; Stams, G J J M

    2018-01-01

    Aggression in residential youth care institutions is a frequent problem. The present short-term longitudinal study examined individual and institutional predictors of aggression in a group of 198 adolescents placed in open, semi-secure and secure residential institutions from the perspective of the importation and deprivation model. A total of 198 adolescents in residential youth care filled in questionnaires regarding group climate and aggression with a 3 month interval. Hierarchical multiple regression analyses were performed to test the degree to which individual and contextual factors predict aggression. Very limited support was found for the effect of contextual factors; only repression showed a trend, predicting direct aggression, while gender composition of the living groups yielded a small effect. Girls placed in same-gender groups showed lower levels of indirect (relational) aggression compared to adolescents placed in mixed-gender or boys-only groups, even when controlled for gender and initial levels of aggression. Type of institution (i.e., level of security) did not predict differences in aggression. In particular individual characteristics of the adolescents were associated with later aggression, including initial levels of aggression, showing substantial 3 months stability, age and gender of the adolescents. These findings are in line with research showing that aggression is relatively stable. Very limited support for environmental effects was found.

  6. Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks

    PubMed Central

    Guo, Hua; Zheng, Yandong; Zhang, Xiyong; Li, Zhoujun

    2016-01-01

    In resource-constrained wireless networks, resources such as storage space and communication bandwidth are limited. To guarantee secure communication in resource-constrained wireless networks, group keys should be distributed to users. The self-healing group key distribution (SGKD) scheme is a promising cryptographic tool, which can be used to distribute and update the group key for the secure group communication over unreliable wireless networks. Among all known SGKD schemes, exponential arithmetic based SGKD (E-SGKD) schemes reduce the storage overhead to constant, thus is suitable for the the resource-constrained wireless networks. In this paper, we provide a new mechanism to achieve E-SGKD schemes with backward secrecy. We first propose a basic E-SGKD scheme based on a known polynomial-based SGKD, where it has optimal storage overhead while having no backward secrecy. To obtain the backward secrecy and reduce the communication overhead, we introduce a novel approach for message broadcasting and self-healing. Compared with other E-SGKD schemes, our new E-SGKD scheme has the optimal storage overhead, high communication efficiency and satisfactory security. The simulation results in Zigbee-based networks show that the proposed scheme is suitable for the resource-restrained wireless networks. Finally, we show the application of our proposed scheme. PMID:27136550

  7. Impartial institutions, pathogen stress and the expanding social network.

    PubMed

    Hruschka, Daniel; Efferson, Charles; Jiang, Ting; Falletta-Cowden, Ashlan; Sigurdsson, Sveinn; McNamara, Rita; Sands, Madeline; Munira, Shirajum; Slingerland, Edward; Henrich, Joseph

    2014-12-01

    Anthropologists have documented substantial cross-society variation in people's willingness to treat strangers with impartial, universal norms versus favoring members of their local community. Researchers have proposed several adaptive accounts for these differences. One variant of the pathogen stress hypothesis predicts that people will be more likely to favor local in-group members when they are under greater infectious disease threat. The material security hypothesis instead proposes that institutions that permit people to meet their basic needs through impartial interactions with strangers reinforce a tendency toward impartiality, whereas people lacking such institutions must rely on local community members to meet their basic needs. Some studies have examined these hypotheses using self-reported preferences, but not with behavioral measures. We conducted behavioral experiments in eight diverse societies that measure individuals' willingness to favor in-group members by ignoring an impartial rule. Consistent with the material security hypothesis, members of societies enjoying better-quality government services and food security show a stronger preference for following an impartial rule over investing in their local in-group. Our data show no support for the pathogen stress hypothesis as applied to favoring in-groups and instead suggest that favoring in-group members more closely reflects a general adaptive fit with social institutions that have arisen in each society.

  8. Children’s Attachment to Both Parents from Toddler Age to Middle Childhood: Links to Adaptive and Maladaptive Outcomes

    PubMed Central

    Boldt, Lea J.; Kochanska, Grazyna; Yoon, Jeung Eun; Nordling, Jamie Koenig

    2014-01-01

    We examined children’s attachment security with their mothers and fathers in a community sample (N = 100). At 25 months, mothers, fathers, and trained observers completed Attachment Q-Set (AQS). At 100 months, children completed Kerns Security Scale (KSS) for each parent. Children’s adaptation (behavior problems and competence in broader ecologies of school and peer group, child- and parent-reported) was assessed at 100 months. By and large, the child’s security with the mother and father was modestly to robustly concordant across both relationships, depending on the assessment method. Observers’ AQS security scores predicted children’s self-reported security 6 years later. For children with low AQS security scores with mothers, variations in security with fathers had significant implications for adaptation: Those whose security with fathers was also low reported the most behavior problems and were seen as least competent in broader ecologies, but those whose security with fathers was high reported few problems and were seen as competent. Security with fathers, observer-rated and child-reported, predicted children’s higher competence in broader ecologies. A cumulative index of the history of security from toddler age to middle childhood, integrating measures across both relationships and diverse methodologies, was significantly associated with positive adaptation at 100 months. PMID:24605850

  9. Successful practices in the use of secure e-mail.

    PubMed

    Johnson, Laura W; Garrido, Terhilda; Christensen, Kate; Handley, Matt

    2014-01-01

    Physician use of secure e-mail with patients is anticipated to increase under Stage 2 Meaningful Use requirements, but little is known about how physicians can successfully incorporate it into daily work. We interviewed 27 "super user" physicians at Kaiser Permanente and Group Health who were identified by leaders as being technologically, operationally, and clinically adept and as having high levels of secure e-mail use with patients. They highly valued the use of secure e-mail with patients, despite concerns about a lack of adequate time to respond, and provided tips for using it successfully. They identified benefits that included better care and improved relationships with their patients.

  10. 29 CFR 2590.701-2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GROUP HEALTH PLANS RULES AND REGULATIONS FOR GROUP HEALTH PLANS Health Coverage Portability, Nondiscrimination... coverage, under a group health plan, that satisfies an applicable COBRA continuation provision. (3) COBRA...

  11. The Need for a Regional Security System Multinational Coast Guard Unit in the Eastern Caribbean

    DTIC Science & Technology

    2012-06-08

    the teaching staff of Staff Group 11 A (Mr Matt Bonnott, Dr Thomas Huber, LTC Andrew McIntyre) and Mr William Knight for officiating, my oral...assist me on this journey. Finally, to my wife Vonette, son Isaiah , daughter Makayla, my mother Muriel (this one is for you), and my friends (too...for the implementation of a new security risk management mechanism to enhance the security of the RSS sub-region. According to Thomas Norman in the

  12. Eliciting Responsivity: Exploring Programming Interests of Federal Inmates as a Function of Security Classification.

    PubMed

    Neller, Daniel J; Vitacco, Michael J; Magaletta, Philip R; Phillips-Boyles, A Brooke

    2016-03-01

    Research supports the effectiveness of the Risk-Needs-Responsivity model for reducing criminal recidivism. Yet programming interests of inmates--one facet of responsivity--remain an understudied phenomenon. In the present study, we explored the programming interests of 753 federal inmates housed across three levels of security. Results suggest that inmates, as a group, prefer specific programs over others, and that some of their interests may differ by security level. We discuss possible implications of these findings. © The Author(s) 2014.

  13. The Effect of China’s Scramble for Resources and African Resource Nationalism on the Supply of Strategic Southern African Minerals: What Can the United States Do?

    DTIC Science & Technology

    2010-01-01

    strategic partnerships, national security planning (and theater security cooperation) and US Africa Command (AFRICOM) in securing long term access to...A potential constraint on the supply of strategic minerals is the lack of a US industrial policy and contingency plans in case the flow of... planning for various contingencies, particularly for the 2020s and beyond. The region contains high concentrations of platinum group metals (PGMs

  14. Bioterrorism and biological threats dominate federal health security research; other priorities get scant attention.

    PubMed

    Shelton, Shoshana R; Connor, Kathryn; Uscher-Pines, Lori; Pillemer, Francesca Matthews; Mullikin, James M; Kellermann, Arthur L

    2012-12-01

    The federal government plays a critical role in achieving national health security by providing strategic guidance and funding research to help prevent, respond to, mitigate, and recover from disasters, epidemics, and acts of terrorism. In this article we describe the first-ever inventory of nonclassified national health security-related research funded by civilian agencies of the federal government. Our analysis revealed that the US government's portfolio of health security research is currently weighted toward bioterrorism and emerging biological threats, laboratory methods, and development of biological countermeasures. Eight of ten other priorities identified in the Department of Health and Human Services' National Health Security Strategy-such as developing and maintaining a national health security workforce or incorporating recovery into planning and response-receive scant attention. We offer recommendations to better align federal spending with health security research priorities, including the creation of an interagency working group charged with minimizing research redundancy and filling persistent gaps in knowledge.

  15. Social security and mortality: The role of income support policies and population health in the United States

    PubMed Central

    Arno, Peter S.; House, James S.; Viola, Deborah; Schechter, Clyde

    2011-01-01

    Social Security is the most important and effective income support program ever introduced in the United States, alleviating the burden of poverty for millions of elderly Americans. We explored the possible role of Social Security in reducing mortality among the elderly. In support of this hypothesis, we found that declines in mortality among the elderly exceeded those among younger age groups following the initial implementation of Social Security in 1940, and also in the periods following marked improvements in Social Security benefits via legislation and indexing of benefits that occurred between the mid-1960s and the early 1970s. A better understanding of the link between Social Security and health status among the elderly would add a significant and missing dimension to the public discourse over the future of Social Security, and the potential role of income support programs in reducing health-related socioeconomic disparities and improving population health. PMID:21326333

  16. A novel wireless local positioning system for airport (indoor) security

    NASA Astrophysics Data System (ADS)

    Zekavat, Seyed A.; Tong, Hui; Tan, Jindong

    2004-09-01

    A novel wireless local positioning system (WLPS) for airport (or indoor) security is introduced. This system is used by airport (indoor) security guards to locate all of, or a group of airport employees or passengers within the airport area. WLPS consists of two main parts: (1) a base station that is carried by security personnel; hence, introducing dynamic base station (DBS), and (2) a transponder (TRX) that is mounted on all people (including security personnel) present at the airport; thus, introducing them as active targets. In this paper, we (a) draw a futuristic view of the airport security systems, and the flow of information at the airports, (b) investigate the techniques of extending WLPS coverage area beyond the line-of-sight (LoS), and (c) study the performance of this system via standard transceivers, and direct sequence code division multiple access (DS-CDMA) systems with and without antenna arrays and conventional beamforming (BF).

  17. Emotional availability and attachment across generations: variations in patterns associated with infant health risk status.

    PubMed

    Cassibba, R; van IJzendoorn, M H; Coppola, G

    2012-07-01

    The presence of limits or distortions in the children's communicative behaviours (due to a chronic illness) may interfere with the possibility to build secure attachment relationships. Moreover, the distress that the atypical chronic illness condition brings to family life may interfere the intergenerational transmission of attachment. This study evaluated the associations between maternal attachment representations, emotional availability and mother-child attachment in a clinical and in a comparison group. Forty infants (23 female) in their 14th month of life and their mothers participated in this study, 20 dyads with clinical infants (10 premature infants and 10 infants affected by atopic dermatitis) and 20 full-term and healthy comparison infants. The Adult Attachment Interview, the Emotional Availability Scales (EAS) and the Strange Situation Procedure were used to assess, respectively, the security of mothers' attachment representations, the emotional availability and the quality of mother-child attachment. We found that the two groups (clinical vs. comparison) did not differ with respect to the Adult Attachment Interview and the Emotional Availability Scales measures. A significant difference was found in the distribution of the infant-mother attachment patterns, with a higher incidence of insecure infants in the clinical group. In the typically developing group, more secure maternal attachment representations predicted more emotional availability in mother-infant interactions, which predicted more secure infant-mother attachments. However, we did not find similar support for intergenerational transmission of attachment in the clinical group. We speculate that constant concerns about the child's health condition and communicative difficulties of clinical infants may hamper or even mitigate the intergenerational transmission of attachment. © 2011 Blackwell Publishing Ltd.

  18. Interrelatedness of child health, protection and well-being: an application of the SAFE model in Rwanda.

    PubMed

    Betancourt, Theresa S; Williams, Timothy P; Kellner, Sarah E; Gebre-Medhin, Joy; Hann, Katrina; Kayiteshonga, Yvonne

    2012-05-01

    This study examines the core components of children's basic security and well-being in order to examine issues central to improving child protection in Rwanda. Sources of data included 15 focus groups with adults, 7 focus groups with children ages 10-17, and 11 key informant interviews with child protection stakeholders, including representatives from international NGOs, community-based groups, and the Rwandan Government, all of which took place in April and May of 2010. Participants painted a complex picture of threats to children's basic security in Rwanda. Three key themes were pervasive across all interviews: (1) deterioration of social and community cohesion in post-genocide Rwanda; (2) the cascading effects of poverty; and (3) the impact of caregiver illness and death on the caregiving environment. Consistent with the SAFE (Safety/freedom from harm; Access to basic physiological needs and healthcare; Family and connection to others; Education and economic security) model of child protection, participants rarely elaborated on a child protection threat independent of other basic security needs and rights. Findings suggest a need for integrated approaches to child protection that recognize this interrelatedness and extend beyond issue-specific child protection responses. This study contributes to a growing body of work highlighting the interrelated nature of child protection threats and the implications of adaptive and dangerous survival strategies that children and families engage in to meet their basic security needs. Analysis of this interrelatedness provides a roadmap for improving policies and implementing integrated and robust child protection strategies in Rwanda and other settings. Copyright © 2012 Elsevier Ltd. All rights reserved.

  19. The association of family food security and depression in mothers having primary school children in Ray-Iran.

    PubMed

    Payab, Moloud; Motlagh, Ahmad-Reza Dorosty; Eshraghian, Mohammadreza; Rostami, Reza; Siassi, Fereydoun

    2014-01-01

    As a major public health problem, food insecurity has adverse social and psychological effects, in addition to the impact on public health. This study aimed to determine the association of household food security and depression in mothers with primary school children in Ray County. This descriptive, analytical cross-sectional study was conducted on 430 mothers with primary school children in the spring 2010. During a two-stage cluster sampling, an 18-items food security questionnaire (USDA) and the Beck depression inventory were completed via interviewing mothers. Chi-squared test, one-way analysis of variance, simple regression and stepwise multiple regression were used to describe and analyze data, and to identify related factors using SPSS-16 software. The prevalence of food insecurity and depression in mothers were 50.2% and 51.4% respectively. Also 34.6% of mothers in the "food secure" group were depressed and 77.8% in "food insecure with hunger" group were depressed and this difference was statistically significant. Twelve out of the 20 examined variables (age, family size, number of children, economic status, home ownership, employment households, educational level of the mother and also the head of household, height, energy intake, and carbohydrate and protein intakes) were significantly associated with food security and depression. Food insecurity and depression in mothers with primary school children in Ray County showed a significant positive correlation (P < 0.001). The prevalence of household food insecurity and depression in the studied population were high. Since there is a significant relationship between food insecurity and depression, more attention must be paid to this group.

  20. The 60 Minute Network Security Guide (First Steps Towards a Secure Network Environment)

    DTIC Science & Technology

    2001-10-16

    default/ passwd file in UNIX. Administrators should obtain and run password-guessing programs (i.e., “John the Ripper,’’ “L0phtCrack,” and “Crack...system on which it is running, it is a good idea to transfer the encrypted passwords (the dumped SAM database for Windows and the /etc/ passwd and /etc...ownership by root and group sys. The /etc/ passwd file should have permissions 644 with owner root and group root. n Be cracked every month to find

  1. A quantum proxy group signature scheme based on an entangled five-qubit state

    NASA Astrophysics Data System (ADS)

    Wang, Meiling; Ma, Wenping; Wang, Lili; Yin, Xunru

    2015-09-01

    A quantum proxy group signature (QPGS) scheme based on controlled teleportation is presented, by using the entangled five-qubit quantum state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. The security of the scheme is guaranteed by the entanglement correlations of the entangled five-qubit state, the secret keys based on the quantum key distribution (QKD) and the one-time pad algorithm, all of which have been proven to be unconditionally secure and the signature anonymity.

  2. Informal Assessment in Reading: Group vs. Individual.

    ERIC Educational Resources Information Center

    Shipman, Dorothy A.; Warncke, Edna W.

    A study was conducted to determine whether informal group assessment instruments could be used effectively to provide the same type of reading achievement information as that secured from informal individual instruments. The researchers developed group instruments comparable to individual instruments, including a group reading inventory for grades…

  3. 20 CFR 404.1206 - Retirement system coverage groups.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Section 404.1206 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND... of any one of the following groupings of employees as a separate retirement system: (1) The entire... coverage group is a grouping of employees in positions under a retirement system. Employees in positions...

  4. 29 CFR 2590.701-1 - Basis and scope.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GROUP... (hereinafter ERISA or the Act). (b) Scope. A group health plan or health insurance issuer offering group health... Subpart B. This Subpart B sets forth minimum requirements for group health plans and health insurance...

  5. Privacy and data security in E-health: requirements from the user's perspective.

    PubMed

    Wilkowska, Wiktoria; Ziefle, Martina

    2012-09-01

    In this study two currently relevant aspects of using medical assistive technologies were addressed-security and privacy. In a two-step empirical approach that used focus groups (n = 19) and a survey (n = 104), users' requirements for the use of medical technologies were collected and evaluated. Specifically, we focused on the perceived importance of data security and privacy issues. Outcomes showed that both security and privacy aspects play an important role in the successful adoption of medical assistive technologies in the home environment. In particular, analysis of data with respect to gender, health-status and age (young, middle-aged and old users) revealed that females and healthy adults require, and insist on, the highest security and privacy standards compared with males and the ailing elderly.

  6. 75 FR 69717 - In the Matter of: Edentify, Inc., Embryo Development Corp., Enclaves Group, Inc., Energytec, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... Development Corp., Enclaves Group, Inc., Energytec, Inc., Enesco Group, Inc., Entertainment Is Us, Inc., Entrada Networks, Inc., Entropin, Inc., Epic Financial Corp., Epicus Communications Group, Inc., Epixtar... concerning the securities of Enclaves Group, Inc. because it has not filed any periodic reports since the...

  7. Stories of People Who Have Attended a Lesbian, Gay, Bisexual and Trans Support Group in a Secure Intellectual Disability Service.

    PubMed

    Tallentire, Liz; Smith, Matthew; David, Lee; Roberts, Adam; Bruce; Morrow, Sarah; Withers, Paul; Smith, Ian

    2016-08-31

    This research is about people who have intellectual disabilities and live in a secure hospital. It is about a group of people who meet at a support group. The support group is for people who are lesbian, gay, bisexual or transgender. These people with intellectual disabilities helped with planning, doing, and telling other people about the research. They told their stories about going to the support group. Their stories were joined together into a group story. The story said that the group helped people in lots of different ways. For some people going to the group was difficult at first because it was ?coming out'. This means telling other people you are lesbian, gay, bisexual, or transgender. Then it got easier and people started to feel better about themselves. Then they wanted to help others and this was important in their lives. This group seemed to help people get better. We have given some ideas for setting up other groups and doing more research. © 2016 John Wiley & Sons Ltd.

  8. Achieving the four dimensions of food security for resettled refugees in Australia: A systematic review.

    PubMed

    Lawlis, Tanya; Islam, Wasima; Upton, Penney

    2018-04-01

    Food security is defined by four dimensions: food availability, access, utilisation and stability. Resettled refugees face unique struggles securing these dimensions and, thus, food security when moving to a new country. This systematic review aimed to identify the challenges Australian refugees experience in achieving the four dimensions of food security. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines were followed; the SPIDER tool was used to determine eligibility criteria. Three databases were searched using terms relating to food in/security and refugees from 2000 to 20 May 2017. Seven articles were retained for analysis. Studies were categorised against the four dimensions, with four studies identifying challenges against all dimensions. Challenges contributing to high levels of food insecurity in each dimension included: availability and cost of traditional foods, difficulty in accessing preferred food outlets, limited food knowledge and preparation skills and food stability due to low income and social support. Food insecurity adversely impacts refugee health and integration. Methodical research framed by the four dimensions of food security is imperative to address challenges to securing food security in refugee groups and assisting in the development of sustainable interventions. © 2017 Dietitians Association of Australia.

  9. Smart Grid Communications Security Project, U.S. Department of Energy

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Barnes, Frank

    There were four groups that worked on this project in different areas related to Smart Girds and Security. They included faculty and students from electric computer and energy engineering, law, business and sociology. The results of the work are summarized in a verity of reports, papers and thesis. A major report to the Governor of Colorado’s energy office with contributions from all the groups working on this project is given bellow. Smart Grid Deployment in Colorado: Challenges and Opportunities, Report to Colorado Governor’s Energy Office and Colorado Smart Grid Task Force(2010) (Kevin Doran, Frank Barnes, and Puneet Pasrich, eds.) Thismore » report includes information on the state of the grid cyber security, privacy, energy storage and grid stability, workforce development, consumer behavior with respect to the smart grid and safety issues.« less

  10. Strong Tobacco Control Program Requirements and Secure Funding Are Not Enough: Lessons From Florida

    PubMed Central

    Kennedy, Allison; Sullivan, Sarah; Hendlin, Yogi; Barnes, Richard

    2012-01-01

    Florida’s Tobacco Pilot Program (TPP; 1998–2003), with its edgy Truth media campaign, achieved unprecedented youth smoking reductions and became a model for tobacco control programming. In 2006, 3 years after the TPP was defunded, public health groups restored funding for tobacco control programming by convincing Florida voters to amend their constitution. Despite the new program’s strong legal structure, Governor Charlie Crist’s Department of Health implemented a low-impact program. Although they secured the program’s strong structure and funding, Florida’s nongovernmental public health organizations did not mobilize to demand a high-impact program. Implementation of Florida’s Amendment 4 demonstrates that a strong programmatic structure and secure funding are insufficient to ensure a successful public health program, without external pressure from nongovernmental groups. PMID:22420813

  11. No information flow using statistical fluctuations and quantum cryptography

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Larsson, Jan-Aake

    2004-04-01

    The communication protocol of Home and Whitaker [Phys. Rev. A 67, 022306 (2003)] is examined in some detail, and found to work equally well using a separable state. The protocol is in fact completely classical, based on postselection of suitable experimental runs. The quantum-cryptography protocol proposed in the same publication is also examined, and this protocol uses entanglement, a strictly quantum property of the system. An individual eavesdropping attack on each qubit pair would be detected by the security test proposed in the mentioned paper. However, the key is provided by groups of qubits, and there exists a coherent attack,more » internal to these groups, that will go unnoticed in that security test. A modified test is proposed here that will ensure security, even against such a coherent attack.« less

  12. Understanding High Incidence of Severe Obesity and Very Low Food Security in Food Pantry Clients: Implications For Social Work.

    PubMed

    Kaiser, Michelle L; Cafer, Anne

    2018-01-01

    The United States is facing two interconnected social and public health crises of severe obesity and food insecurity within the social-ecological environment. Marginalized groups experience the highest rates and the greatest impacts in terms of morbidity, mortality, and financial burdens. Consequences include experiencing multimorbidities, mental health issues, and decreased quality of life. Food pantries have served as spaces to obtain food to meet household needs, but for some, food pantries have become long-term solutions. We surveyed 2,634 people who accessed pantries in 2005, 2010, and 2013 across 32 counties in a Midwest state. The authors sought to understand to what extent does length of time using a food pantry, food security status, income sources, use of federal food benefits, visiting a doctor, and demographic variables increase odds of severe obesity. More than 14% were severely obese; those who were long-term food pantry users and very low food secure were 1.732 times more likely to be severely obese. Receiving Disability/Supplemental Security Income, seeing a doctor in the last year, being female, and older age reduced the odds of severe obesity. Discussion includes implications for social workers who interact with groups likely to experience very low food security and severe obesity at different systems levels.

  13. Food security and nutritional outcomes among urban poor orphans in Nairobi, Kenya.

    PubMed

    Kimani-Murage, Elizabeth W; Holding, Penny A; Fotso, Jean-Christophe; Ezeh, Alex C; Madise, Nyovani J; Kahurani, Elizabeth N; Zulu, Eliya M

    2011-06-01

    The study examines the relationship between orphanhood status and nutritional status and food security among children living in the rapidly growing and uniquely vulnerable slum settlements in Nairobi, Kenya. The study was conducted between January and June 2007 among children aged 6-14 years, living in informal settlements of Nairobi, Kenya. Anthropometric measurements were taken using standard procedures and z scores generated using the NCHS/WHO reference. Data on food security were collected through separate interviews with children and their caregivers, and used to generate a composite food security score. Multiple regression analysis was done to determine factors related to vulnerability with regards to food security and nutritional outcomes. The results show that orphans were more vulnerable to food insecurity than non-orphans and that paternal orphans were the most vulnerable orphan group. However, these effects were not significant for nutritional status, which measures long-term food deficiencies. The results also show that the most vulnerable children are boys, those living in households with lowest socioeconomic status, with many dependants, and female-headed and headed by adults with low human capital (low education). This study provides useful insights to inform policies and practice to identify target groups and intervention programs to improve the welfare of orphans and vulnerable children living in urban poor communities.

  14. On the security of consumer wearable devices in the Internet of Things.

    PubMed

    Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus

    2018-01-01

    Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands.

  15. On the security of consumer wearable devices in the Internet of Things

    PubMed Central

    Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus

    2018-01-01

    Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands. PMID:29668756

  16. Sense of security - searching for its meaning by using stories: a Participatory Action Research study in health and social care in Sweden.

    PubMed

    Petersson, Pia; Blomqvist, Kerstin

    2011-03-01

    The aim of this study was to make sense of the Swedish concept 'trygghet' by using stories from daily life in a Participatory Action Research project. In Sweden, attempts to implement core values to ensure high quality health and social care for older people are given high priority and concepts such as security and dignity are often used. As concepts are abstract they are difficult to transform into practical work. One group of six assistant nurses and one group of five Registered Nurses working in a municipality participated in Story Dialogue Method and four older women were interviewed. 'Trygghet' was found to be an internal sense - an intrinsic state based on faith and trust in oneself and others called Sense of security. External factors that strengthened Sense of security were to be part of a community, to recognize and be familiar with things and situations and to use various kinds of aids. A prerequisite for the professionals being able to support the care receivers adequately is that they have a sense of security themselves, and that they are allowed to operate in a system that facilitates for the care receivers to maintain trustworthy and reliable relations over time. © 2010 Blackwell Publishing Ltd.

  17. Characteristics and Pathways of Long-Stay Patients in High and Medium Secure Settings in England; A Secondary Publication From a Large Mixed-Methods Study.

    PubMed

    Völlm, Birgit A; Edworthy, Rachel; Huband, Nick; Talbot, Emily; Majid, Shazmin; Holley, Jessica; Furtado, Vivek; Weaver, Tim; McDonald, Ruth; Duggan, Conor

    2018-01-01

    Background: Many patients experience extended stays within forensic care, but the characteristics of long-stay patients are poorly understood. Aims: To describe the characteristics of long-stay patients in high and medium secure settings in England. Method: Detailed file reviews provided clinical, offending and risk data for a large representative sample of 401 forensic patients from 2 of the 3 high secure settings and from 23 of the 57 medium secure settings in England on 1 April 2013. The threshold for long-stay status was defined as 5 years in medium secure care or 10 years in high secure care, or 15 years in a combination of high and medium secure settings. Results: 22% of patients in high security and 18% in medium security met the definition for "long-stay," with 20% staying longer than 20 years. Of the long-stay sample, 58% were violent offenders (22% both sexual and violent), 27% had been convicted for violent or sexual offences whilst in an institutional setting, and 26% had committed a serious assault on staff in the last 5 years. The most prevalent diagnosis was schizophrenia (60%) followed by personality disorder (47%, predominantly antisocial and borderline types); 16% were categorised as having an intellectual disability. Overall, 7% of the long-stay sample had never been convicted of any offence, and 16.5% had no index offence prompting admission. Although some significant differences were found between the high and medium secure samples, there were more similarities than contrasts between these two levels of security. The treatment pathways of these long-stay patients involved multiple moves between settings. An unsuccessful referral to a setting of lower security was recorded over the last 5 years for 33% of the sample. Conclusions: Long-stay patients accounted for one fifth of the forensic inpatient population in England in this representative sample. A significant proportion of this group remain unsettled. High levels of personality pathology and the risk of assaults on staff and others within the care setting are likely to impact on treatment and management. Further research into the treatment pathways of longer stay patients is warranted to understand the complex trajectories of this group.

  18. Characteristics and Pathways of Long-Stay Patients in High and Medium Secure Settings in England; A Secondary Publication From a Large Mixed-Methods Study

    PubMed Central

    Völlm, Birgit A.; Edworthy, Rachel; Huband, Nick; Talbot, Emily; Majid, Shazmin; Holley, Jessica; Furtado, Vivek; Weaver, Tim; McDonald, Ruth; Duggan, Conor

    2018-01-01

    Background: Many patients experience extended stays within forensic care, but the characteristics of long-stay patients are poorly understood. Aims: To describe the characteristics of long-stay patients in high and medium secure settings in England. Method: Detailed file reviews provided clinical, offending and risk data for a large representative sample of 401 forensic patients from 2 of the 3 high secure settings and from 23 of the 57 medium secure settings in England on 1 April 2013. The threshold for long-stay status was defined as 5 years in medium secure care or 10 years in high secure care, or 15 years in a combination of high and medium secure settings. Results: 22% of patients in high security and 18% in medium security met the definition for “long-stay,” with 20% staying longer than 20 years. Of the long-stay sample, 58% were violent offenders (22% both sexual and violent), 27% had been convicted for violent or sexual offences whilst in an institutional setting, and 26% had committed a serious assault on staff in the last 5 years. The most prevalent diagnosis was schizophrenia (60%) followed by personality disorder (47%, predominantly antisocial and borderline types); 16% were categorised as having an intellectual disability. Overall, 7% of the long-stay sample had never been convicted of any offence, and 16.5% had no index offence prompting admission. Although some significant differences were found between the high and medium secure samples, there were more similarities than contrasts between these two levels of security. The treatment pathways of these long-stay patients involved multiple moves between settings. An unsuccessful referral to a setting of lower security was recorded over the last 5 years for 33% of the sample. Conclusions: Long-stay patients accounted for one fifth of the forensic inpatient population in England in this representative sample. A significant proportion of this group remain unsettled. High levels of personality pathology and the risk of assaults on staff and others within the care setting are likely to impact on treatment and management. Further research into the treatment pathways of longer stay patients is warranted to understand the complex trajectories of this group. PMID:29713294

  19. Personal value preferences, group identifications, and cultural practices of Palestinian Israelis working in close contact with Jewish Israelis.

    PubMed

    Tartakovsky, Eugene; Abu Kheit, Ayat

    2017-01-01

    The present study investigates the connection between personal value preferences, group identifications, and cultural practices among Palestinian Israelis working in close contact with the Jewish population in Israel. One hundred twenty-two Palestinian Israelis participated in the study. The participants were employed in different professional positions in the Tel Aviv Metropolitan area and were recruited to the study using the snowball technique. A stronger national identification was associated with a higher preference for the security and conformity values, and a lower preference for the humility values. A stronger ethnic identification was associated with a lower preference for the security, power, and stimulation values. Group identifications mediated the connection between personal value preferences and cultural practices. A longer time working in close contact with the majority group and less frequent visits home were associated with a greater adherence to the majority group's cultural practices but not with adherence to the ethnic group's practices and not with the group identifications.

  20. Community Savings Groups, Financial Security, and HIV Risk Among Female Sex Workers in Iringa, Tanzania.

    PubMed

    Mantsios, Andrea; Galai, Noya; Mbwambo, Jessie; Likindikoki, Samuel; Shembilu, Catherine; Mwampashi, Ard; Beckham, S W; Leddy, Anna; Davis, Wendy; Sherman, Susan; Kennedy, Caitlin; Kerrigan, Deanna

    2018-02-24

    This study assessed the association between community savings group participation and consistent condom use (CCU) among female sex workers (FSW) in Iringa, Tanzania. Using cross-sectional data from a survey of venue-based FSW (n = 496), logistic regression was used to examine the associations between financial indicators including community savings group participation and CCU. Over one-third (35%) of the women participated in a savings group. Multivariable regression results indicated that participating in a savings group was significantly associated with nearly two times greater odds of CCU with new clients in the last 30 days (aOR = 1.77, 95% CI 1.10-2.86). Exploratory mediation analysis indicated that the relationship between savings group participation and CCU was partially mediated by financial security, as measured by monthly income. Findings indicate that community savings groups may play an important role in reducing sexual risk behaviors of FSW and hold promise as part of comprehensive, community-led HIV prevention strategies among FSW.

  1. 77 FR 29746 - In the Matter of QPC Lasers, Inc., Sweet Success Enterprises, Inc., Trinsic, Inc., Veridicom...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-18

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of QPC Lasers, Inc., Sweet Success Enterprises, Inc., Trinsic, Inc., Veridicom International, Inc., Windswept Environmental Group... securities of QPC Lasers, Inc. because it has not filed any periodic reports since the period ended June 30...

  2. Violent Extremism, National Security and Prevention. Institutional Discourses and Their Implications for Schooling

    ERIC Educational Resources Information Center

    Mattsson, Christer; Säljö, Roger

    2018-01-01

    Currently, threats to societal security from extremist groups are high on the political agenda in many countries. Politicians, policymakers at various levels and communities are searching for methods to counteract recruitment to violent organizations. These efforts are often referred to as Prevention of Violent Extremism (PVE-programmes). One of…

  3. 12 CFR Appendix D-2 to Part 208 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    .... Design its information security program to control the identified risks, commensurate with the... Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service Provider Arrangements E. Adjust the... score, derived from a group of consumer reports; or (B) Blind data, such as payment history on accounts...

  4. 12 CFR Appendix B to Part 170 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    .... You shall: 1. Design your information security program to control the identified risks, commensurate... Control Risk D. Oversee Service Provider Arrangements E. Adjust the Program F. Report to the Board G... information does not include: (A) Aggregate information, such as the mean credit score, derived from a group...

  5. 12 CFR Appendix D-2 to Part 208 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    .... Design its information security program to control the identified risks, commensurate with the... Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service Provider Arrangements E. Adjust the... score, derived from a group of consumer reports; or (B) Blind data, such as payment history on accounts...

  6. Is Test Security an Issue in a Multistation Clinical Assessment?--A Preliminary Study.

    ERIC Educational Resources Information Center

    Stillman, Paula L.; And Others

    1991-01-01

    A study investigated possible differences in standardized patient examination scores for three groups of undergraduate (n=176) and graduate (n=221) medical students assessed at different sites over two years. Results show no systematic change in scores over testing dates, suggesting no problems with breach of test security. (MSE)

  7. Food Insecurity: Is It an Issue among Tertiary Students?

    ERIC Educational Resources Information Center

    Gallegos, Danielle; Ramsey, Rebecca; Ong, Kai Wen

    2014-01-01

    Insufficient access to food is known to compromise tertiary studies. Students often belong to groups known to have poor food security such as those renting or relying on government payments. The present study administered a cross-sectional survey incorporating the USDA food security survey module (FSSM) to 810 students at a metropolitan university…

  8. 78 FR 42983 - Submission for Renewal: Information Collection; Questionnaire for National Security Positions...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-18

    ... and certified investigative data remains secured in the e-QIP system until the next time the... respondent will be allowed to update information and certify that data. In this instance, time to complete... Administration (FAA), and commenters from the public and OPM. Five advocacy groups, the Bazelon Center for Mental...

  9. The Contribution of University Accommodation to International Student Security

    ERIC Educational Resources Information Center

    Paltridge, Toby; Mayson, Susan; Schapper, Jan

    2010-01-01

    In this paper we argue that living in university accommodation is a possible means of improving the security of international students. Our argument is supported by a qualitative case study of a single Hall of Residence on Monash University's Clayton campus. Data were collected primarily from interviews with three groups of participants--six…

  10. 75 FR 77925 - Self-Regulatory Organizations; NASDAQ OMX BX, Inc.; Notice of Filing and Immediate Effectiveness...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-14

    ... Establish Strike Price Intervals and Trading Hours for Options on Index-Linked Securities December 8, 2010... Business) of the Rules of the Boston Options Exchange Group, LLC (``BOX'') to establish strike price... proposing to establish strike price intervals and trading hours for these products. The Securities and...

  11. 78 FR 58376 - American Asset Development, Inc., aVinci Media Corp., Ceragenix Pharmaceuticals, Inc., Marshall...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-23

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] American Asset Development, Inc., aVinci Media..., and Millenium Holding Group, Inc., Order of Suspension of Trading September 19, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information...

  12. 78 FR 63964 - Request for Comments on Draft NIST Interagency Report (NISTIR) 7628 Rev. 1, Guidelines for Smart...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-25

    ... Grid Cyber Security AGENCY: National Institute of Standards and Technology (NIST), Department of... and Technology (NIST) seeks comments on draft NISTIR 7628 Rev. 1, Guidelines for Smart Grid Cyber... (formerly the Cyber Security Working Group) of the Smart Grid Interoperability Panel. The document has been...

  13. 75 FR 5156 - Ariel Corp., Classica Group, Inc., Commodore Environmental Services, Inc., Dupont Direct...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-01

    ... Environmental Services, Inc., Dupont Direct Financial Holdings, Inc., New Paradigm Software Corp. (n/k/a Brunton... concerning the securities of Commodore Environmental Services, Inc. because it has not filed any periodic... accurate information concerning the securities of New Paradigm Software Corp. (n/k/a Brunton Vineyards...

  14. WMD Proliferation, Globalization, and International Security: Whither the Nexus and National Security?

    DTIC Science & Technology

    2006-07-01

    group Aum Shinrikyo on the Tokyo subway system, which resulted in 10 deaths, is regarded by many as the dawn of the era of modern WMD terrorism...organizations have become truly global in character. Al Qaeda, for example, is franchising operations around the world either directly or indirectly

  15. Attachment security representations in institutionalized children and children living with their families: links to problem behaviour.

    PubMed

    Torres, Nuno; Maia, Joana; Veríssimo, Manuela; Fernandes, Marilia; Silva, Filipa

    2012-01-01

    The present work analyses differences in the attachment representations of institutionalized children as compared with children from low and high educational level living with their natural families. Participants were 91 Portuguese children, 52% girls, aged 48-96 months. There were three different groups: 19 institutionalized children, 16 low educational level families' children and 56 from high educational level families'. Attachment representations were assessed for Security of the narratives of the Attachment Story Completion Task (ASCT). Psychopathological symptoms were assessed using the Child Behaviour Checklist for parents and caretakers. Verbal skills were assessed using the Wechsler Preschool and Primary Scale of Intelligence--Revised. Results show that institutionalized children have significantly lower security of attachment representations, less verbal skills and higher aggressive behaviour than the other two groups. Attachment representations were associated with social/withdrawal and aggression, independently of age, verbal skills and parents' education. The main effect of institutionalization on externalizing aggressive behaviour was completely mediated by the security of attachment representations.  Copyright © 2010 John Wiley & Sons, Ltd.

  16. DIRAC distributed secure framework

    NASA Astrophysics Data System (ADS)

    Casajus, A.; Graciani, R.; LHCb DIRAC Team

    2010-04-01

    DIRAC, the LHCb community Grid solution, provides access to a vast amount of computing and storage resources to a large number of users. In DIRAC users are organized in groups with different needs and permissions. In order to ensure that only allowed users can access the resources and to enforce that there are no abuses, security is mandatory. All DIRAC services and clients use secure connections that are authenticated using certificates and grid proxies. Once a client has been authenticated, authorization rules are applied to the requested action based on the presented credentials. These authorization rules and the list of users and groups are centrally managed in the DIRAC Configuration Service. Users submit jobs to DIRAC using their local credentials. From then on, DIRAC has to interact with different Grid services on behalf of this user. DIRAC has a proxy management service where users upload short-lived proxies to be used when DIRAC needs to act on behalf of them. Long duration proxies are uploaded by users to a MyProxy service, and DIRAC retrieves new short delegated proxies when necessary. This contribution discusses the details of the implementation of this security infrastructure in DIRAC.

  17. Operationalising United Nations Security Council Resolution 1325 within the Australian Defence Force

    DTIC Science & Technology

    2016-01-01

    Hutchinson Joint & Operations Analysis Division Defence Science and Technology Group DST- Group -GD-0909 ABSTRACT This literature...LIMITATION UNCLASSIFIED UNCLASSIFIED Published by Joint & Operations Analysis Division Defence Science and Technology Group 506 Lorimer St...This page intentionally blank UNCLASSIFIED DST- Group -GD-0909 UNCLASSIFIED Contents 1. INTRODUCTION

  18. 75 FR 71171 - Social Security Disability Program Demonstration Project: Benefit Offset National Demonstration...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-22

    ... project. Stage 2 Offset and Enhanced Benefits Counseling Treatment Group--We will assign approximately 3... treatment of earnings and the enhanced benefits counseling, depending on their treatment group. Alternate... Treatment Group be eligible for counseling services? A beneficiary assigned to this Stage 2 treatment group...

  19. 20 CFR 404.1205 - Absolute coverage groups.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Absolute coverage groups. 404.1205 Section 404.1205 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY... grouping of employees, e.g., all the employees of a city or town. It is a coverage group for coverage and...

  20. 44 CFR 61.17 - Group Flood Insurance Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program INSURANCE COVERAGE AND RATES § 61.17 Group Flood Insurance Policy. (a) A Group Flood Insurance Policy (GFIP) is a... 44 Emergency Management and Assistance 1 2013-10-01 2013-10-01 false Group Flood Insurance Policy...

  1. 44 CFR 61.17 - Group Flood Insurance Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program INSURANCE COVERAGE AND RATES § 61.17 Group Flood Insurance Policy. (a) A Group Flood Insurance Policy (GFIP) is a... 44 Emergency Management and Assistance 1 2012-10-01 2011-10-01 true Group Flood Insurance Policy...

  2. 44 CFR 61.17 - Group Flood Insurance Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program INSURANCE COVERAGE AND RATES § 61.17 Group Flood Insurance Policy. (a) A Group Flood Insurance Policy (GFIP) is a... 44 Emergency Management and Assistance 1 2011-10-01 2011-10-01 false Group Flood Insurance Policy...

  3. 44 CFR 61.17 - Group Flood Insurance Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program INSURANCE COVERAGE AND RATES § 61.17 Group Flood Insurance Policy. (a) A Group Flood Insurance Policy (GFIP) is a... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Group Flood Insurance Policy...

  4. 44 CFR 61.17 - Group Flood Insurance Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program INSURANCE COVERAGE AND RATES § 61.17 Group Flood Insurance Policy. (a) A Group Flood Insurance Policy (GFIP) is a... 44 Emergency Management and Assistance 1 2014-10-01 2014-10-01 false Group Flood Insurance Policy...

  5. A scoping review of traditional food security in Alaska

    PubMed Central

    Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa

    2018-01-01

    ABSTRACT Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: “traditional foods”, “food security”, “access”, “availability”, “utilisation”, “Alaska”, “Alaska Native” and “indigenous”. Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska. PMID:29292675

  6. Secrecy vs. the need for ecological information: challenges to environmental activism in Russia.

    PubMed

    Jandl, T

    1998-01-01

    This article identifies the lessons learned from the Nikitin case study in Russia. The Nikitin case involves the analysis of sources of radioactive contamination in several Russian counties and in the Russian Northern Fleet. Norway was interested in the issue due to proximity to the storage sites. The issue involved national security and environmental protection. It was learned that mixing national security issues with environmental issues offers dangerous and multiple challenges. Environmental groups must build relationships with a wide audience. International security policy must include the issues of globalization of trade and the spread of environmental problems into the global commons (oceans and atmosphere). The risk of an environmentally dangerous accident as a consequence of Cold War activities is greater than the risk of nuclear war. Secrecy in military affairs is not justified when there is inadequate storage of nuclear weapons and contaminated materials. In Russia, the concern is great due to their economic transition and shortages of funds for even the most basic needs, which excludes nuclear waste clean up. The Bellona Foundation studied the extent of nuclear pollution from military nuclear reactors in the Kola peninsula of northwest Russia, in 1994 and 1996. Russian security police arrested one of the report authors for alleged national security violations. A valuable lesson learned was that local Russian environmental groups needed international support. The military nuclear complex poses an enormous hazard. Limiting inspections is an unacceptable national security risk. The new Russian law on state secrets is too broad.

  7. A birth intervention: the therapeutic effects of Doula support versus Lamaze preparation on first-time mothers' working models of caregiving.

    PubMed

    Manning-Orenstein, G

    1998-07-01

    A working model of caregiving has been defined as an internalized schema of caregiving that guides a mother's behavior with her infant. This schema is strongly influenced by the mother's first attachment relationship with her own mother, which frequently operates outside her conscious awareness. To examine doula support at birth as an intervention that might correct distortions of a mother's unconscious schema of caregiving, promoting more secure caregiving following childbirth. The effects of doula support versus Lamaze birth preparation on the working models of caregiving of 35 first-time pregnant mothers were compared. An interview was used to assess the mothers' working models in the third trimester of pregnancy and again 4 months after the mothers gave birth. Mood state and self-esteem were measured at these times. A post hoc analysis was performed on the mothers' birth experiences, the quality of their postpartum support, and their evaluations of their infants' temperaments. The prebirth to postbirth rating analysis of the interviews revealed that the mothers in the doula group were significantly less rejecting and helpless in their working models of caregiving than were the mothers in the Lamaze group. The mothers in the doula group also showed greater security than did mothers in the Lamaze group, a difference that approached but did not reach significance. In addition, the women in the doula group were less emotionally distressed and had higher self-esteem than did the women in the Lamaze group, and the women in the doula group rated their infants as significantly less fussy than the mothers in the Lamaze group rated their infants. When viewed in the context of working models of caregiving, mothers who used a doula were significantly less rejecting and helpless, and approached significantly higher scores on the secure scale, than did mothers who used Lamaze birth preparation. Mothers rated as secure showed significantly less mood disturbance and higher prebirth and postbirth self-esteem than did mothers rated as insecure, providing construct validity for the caregiving interviews.

  8. Enhancing effectiveness of agriculture group in supporting government program to increase food security

    NASA Astrophysics Data System (ADS)

    Retnowati, Daru; Subarjo, A. H.

    2018-05-01

    Food Security is closely related to agriculture, including fisheries. Food is a basic necessity and indispensable to humans. Nowadays, there are many agricultural lands and fisheries are turning to settlements and offices. To overcome these obstacles, the government took the policy of forming farmer groups. Farmer groups are channeling the government assistance, whether capital, seeds, training, or technology and knowledge assistance. This research is qualitative. The population in this study were members of the fish farming group in Purwomartani, Kalasan, Sleman. The population in this study were 4 Farmers Group in Purwomartani, Kalasan, Sleman. The sample in this research is 1 farmer group with the largest number of members that is 31 people. For the other three groups of fish farmers the number of members is 20 people. The results show that farmer groups are effective in supporting government programs. The role of farmer groups is needed to support the successful management of agricultural land, improvement of knowledge and skills of fish farmers, renewal of agricultural technology and equipment, and marketing of agricultural products.

  9. Food acquisition methods and correlates of food insecurity in adults on probation in Rhode Island.

    PubMed

    Dong, Kimberly R; Tang, Alice M; Stopka, Thomas J; Beckwith, Curt G; Must, Aviva

    2018-01-01

    Individuals under community corrections supervision may be at increased risk for food insecurity because they face challenges similar to other marginalized populations, such as people experiencing housing instability or substance users. The prevalence of food insecurity and its correlates have not been studied in the community corrections population. We conducted a cross-sectional study in 2016, surveying 304 probationers in Rhode Island to estimate the prevalence of food insecurity, identify food acquisition methods, and determine characteristics of groups most at-risk for food insecurity. We used chi-square and Fisher's exact tests to assess differences in sociodemographics and eating and food acquisition patterns, GIS to examine geospatial differences, and ordinal logistic regression to identify independent correlates across the four levels of food security. Nearly three-quarters (70.4%) of the participants experienced food insecurity, with almost half (48.0%) having very low food security. This is substantially higher than the general population within the state of Rhode Island, which reported a prevalence of 12.8% food insecurity with 6.1% very low food security in 2016. Participants with very low food security most often acquired lunch foods from convenience stores (and less likely from grocery stores) compared to the other three levels of food security. Participants did not differ significantly with regards to places for food acquisition related to breakfast or dinner meals based upon food security status. In adjusted models, being homeless (AOR 2.34, 95% CI: 1.31, 4.18) and depressed (AOR 3.12, 95% CI: 1.98, 4.91) were independently associated with a greater odds of being in a food insecure group. Compared to having help with meals none of the time, participants who reported having meal help all of the time (AOR 0.28, 95% CI: 0.12, 0.64), most of the time (AOR 0.31, 95% CI: 0.15, 0.61), and some of the time (AOR 0.54, 95% CI: 0.29, 0.98) had a lower odds of being in a food insecure group. Food insecure participants resided in different neighborhoods than food secure participants. The highest density of food insecure participants resided in census tracts with the lowest median incomes for the general population. The areas of highest density for each level of food security for our participants were in the census tracts with the lowest levels of full-time employment for the general population. The prevalence of food insecurity and very low food security were markedly higher in our probation population compared to the general RI population. These findings suggest that access to food on a regular basis is a challenge for adults on probation. Depression and being homeless were independently associated with a greater odds of being in a food insecure group. In addition to intervening directly on food insecurity, developing interventions and policies that address the contributing factors of food insecurity, such as safe housing and treatment for depression, are critical.

  10. Implementing an electronic medication overview in Belgium.

    PubMed

    Storms, Hannelore; Marquet, Kristel; Nelissen, Katherine; Hulshagen, Leen; Lenie, Jan; Remmen, Roy; Claes, Neree

    2014-12-16

    An accurate medication overview is essential to reduce medication errors. Therefore, it is essential to keep the medication overview up-to-date and to exchange healthcare information between healthcare professionals and patients. Digitally shared information yields possibilities to improve communication. However, implementing a digitally shared medication overview is challenging. This articles describes the development process of a secured, electronic platform designed for exchanging medication information as executed in a pilot study in Belgium, called "Vitalink". The goal of "Vitalink" is to improve the exchange of medication information between professionals working in healthcare and patients in order to achieve a more efficient cooperation and better quality of care. Healthcare professionals of primary and secondary health care and patients of four Belgian regions participated in the project. In each region project groups coordinated implementation and reported back to the steering committee supervising the pilot study. The electronic medication overview was developed based on consensus in the project groups. The steering committee agreed to establish secured and authorized access through the use of electronic identity documents (eID) and a secured, eHealth-platform conform prior governmental regulations regarding privacy and security of healthcare information. A successful implementation of an electronic medication overview strongly depends on the accessibility and usability of the tool for healthcare professionals. Coordinating teams of the project groups concluded, based on their own observations and on problems reported to them, that secured and quick access to medical data needed to be pursued. According to their observations, the identification process using the eHealth platform, crucial to ensure secured data, was very time consuming. Secondly, software packages should meet the needs of their users, thus be adapted to daily activities of healthcare professionals. Moreover, software should be easy to install and run properly. The project would have benefited from a cost analysis executed by the national bodies prior to implementation.

  11. Comparing 2 Adhesive Methods on Skin Integrity in the High-Risk Neonate.

    PubMed

    Boswell, Nicole; Waker, Cheryl L

    2016-12-01

    Nurses have a primary role in promoting neonatal skin integrity and skin care management of the critically ill neonate. Adhesive products are essential to secure needed medical devices but can be a significant factor contributing to skin breakdown. Current literature does not offer a definitive answer regarding which products most safely and effectively work to secure needed devices in the high-risk neonatal population. To determine which adhesive method is best practice to safely and effectively secure lines/tubes in the high-risk neonate population. The only main effect that was significant was age group with mean skin scores. Subjects in the younger group (24-28 weeks) had higher skin scores than in the older group (28-34 weeks), validating that younger gestations are at higher risk of breakdown with the use of adhesives. The findings did not clearly identify which product was superior to secure tubes and lines, or was the least injurious to skin of the high-risk neonate. Neither a transparent dressing only or transparent dressing over hydrocolloid method clearly demonstrated an advantage in the high-risk, preterm neonate. Anecdotal comments suggested staff preferred the transparent dressing over hydrocolloid method as providing better adhesive while protecting skin integrity. The findings validated that younger gestations are at higher risk of breakdown with the use of adhesives and therefore require close vigilance to maintain skin integrity.

  12. Successful Practices in the Use of Secure E-mail

    PubMed Central

    Johnson, Laura W; Garrido, Terhilda; Christensen, Kate; Handley, Matt

    2014-01-01

    Physician use of secure e-mail with patients is anticipated to increase under Stage 2 Meaningful Use requirements, but little is known about how physicians can successfully incorporate it into daily work. We interviewed 27 “super user” physicians at Kaiser Permanente and Group Health who were identified by leaders as being technologically, operationally, and clinically adept and as having high levels of secure e-mail use with patients. They highly valued the use of secure e-mail with patients, despite concerns about a lack of adequate time to respond, and provided tips for using it successfully. They identified benefits that included better care and improved relationships with their patients. PMID:24937149

  13. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    PubMed

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  14. Evaluation of the awareness and effectiveness of IT security programs in a large publicly funded health care system.

    PubMed

    Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam

    2017-01-01

    Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.

  15. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks

    PubMed Central

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-01-01

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure. PMID:28338632

  16. Do 'flexicurity' Policies Work for People With Low Education and Health Problems? A Comparison of Labour Market Policies and Employment Rates in Denmark, The Netherlands, Sweden, and the United Kingdom 1990-2010.

    PubMed

    McAllister, Ashley; Nylén, Lotta; Backhans, Mona; Boye, Katarina; Thielen, Karsten; Whitehead, Margaret; Burström, Bo

    2015-01-01

    People with limiting longstanding illness and low education may experience problems in the labor market. Reduced employment protection that maintains economic security for the individual, known as "flexicurity," has been proposed as a way to increase overall employment. We compared the development of labor market policies and employment rates from 1990 to 2010 in Denmark and the Netherlands (representing flexicurity), the United Kingdom, and Sweden. Employment rates in all countries were much lower in the target group than for other groups over the study period. However, "flexicurity" as practiced in Denmark, far from being a "magic bullet," appeared to fail low-educated people with longstanding illness in particular. The Swedish policy, on the other hand, with higher employment protection and higher economic security, particularly earlier in the study period, led to higher employment rates in this group. Findings also revealed that economic security policies in all countries were eroding and shifting toward individual responsibility. Finally, results showed that active labor market policies need to be subcategorized to better understand which types are best suited for the target group. Increasing employment among the target group could reduce adverse health consequences and contribute to decreasing inequalities in health. © The Author(s) 2015.

  17. The OCA CCD Camera Controller

    DTIC Science & Technology

    1996-01-01

    multi CCD arrays for wide field telescopes with an array of 8x8 1K CCDs in use at Las Campanas Observatory in Chile . The same group is also involved...Verify key EPROM -292H VIH . VIH Program security bitl 1 29AH . VPP Program security’ bit 2 *. .298H -Vpp Verify security bits - 9HVIH ViI NOTE: 1...Pulsed from V.. to VIL and returned to VIH . EPROM PROGRAMMING AND VERIFICATION ..t= 21’C to-+27 ’rC:-VCC= 5V ±10%VS3 = OV. SYMBOL I .-- PARAMETER MIN MAX

  18. Home blood pressure monitoring, secure electronic messaging and medication intensification for improving hypertension control: a mediation analysis.

    PubMed

    Ralston, J D; Cook, A J; Anderson, M L; Catz, S L; Fishman, P A; Carlson, J; Johnson, R; Green, B B

    2014-01-01

    We evaluated the role of home monitoring, communication with pharmacists, medication intensification, medication adherence and lifestyle factors in contributing to the effectiveness of an intervention to improve blood pressure control in patients with uncontrolled essential hypertension. We performed a mediation analysis of a published randomized trial based on the Chronic Care Model delivered over a secure patient website from June 2005 to December 2007. Study arms analyzed included usual care with a home blood pressure monitor and usual care with home blood pressure monitor and web-based pharmacist care. Mediator measures included secure messaging and telephone encounters; home blood pressure monitoring; medications intensification and adherence and lifestyle factors. Overall fidelity to the Chronic Care Model was assessed with the Patient Assessment of Chronic Care (PACIC) instrument. The primary outcome was percent of participants with blood pressure (BP) <140/90 mm Hg. At 12 months follow-up, patients in the web-based pharmacist care group were more likely to have BP <140/90 mm Hg (55%) compared to patients in the group with home blood pressure monitors only (37%) (p = 0.001). Home blood pressure monitoring accounted for 30.3% of the intervention effect, secure electronic messaging accounted for 96%, and medication intensification for 29.3%. Medication adherence and self-report of fruit and vegetable intake and weight change were not different between the two study groups. The PACIC score accounted for 22.0 % of the main intervention effect. The effect of web-based pharmacist care on improved blood pressure control was explained in part through a combination of home blood pressure monitoring, secure messaging, and antihypertensive medication intensification.

  19. Head start is too late: integrating and applying infant observation studies, and attachment, trauma, and neurobiological research to groups with pregnant and new mothers.

    PubMed

    Harwood, Irene

    2006-01-01

    In this paper new knowledge generated from theoretical and empirical work in infant observation studies and attachment, trauma, and neurobiology research is integrated and applied to the development of a group for pregnant and new mothers. The purposes of this group were to (1) promote the establishment of a secure base for each baby through optimum self and dyadic affect regulation, the repair of ruptures, and the emergence of positive heightened affective moments; (2) to facilitate secure attachment between mother and infant by helping mothers mentalize the experiences of their babies; (3) to build affiliative bonds between group members and; at the very least, (4) to prevent insecure disorganized attachments. The group interactions also were thought to prevent new psychopathology from developing, as well as to minimize the intergenerational transmission of trauma. A discussion of how this group came out of gestation and birthed itself in a community setting is included.

  20. Biological Terrorism: US Policies to Reduce Global Biothreats

    DTIC Science & Technology

    2008-09-01

    program for pro- jects that advance BEP objectives. Global Cooperation to develop bio- safety and pathogen security stan- dards that are consistent with...security. The Organization for Economic Cooperation and Development ( OECD ) has recently developed voluntary biosecurity guidelines for implementation...Abbreviations AG Australia Group BEP Biosecurity Engagement Program BSL Biosafety level BWC Biological Weapons Convention BWC-ISU Biological Weapons

  1. 12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... risks. C. Manage and Control Risk. Each bank shall: 1. Design its information security program to... A. Involve the Board of Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service...) Aggregate information, such as the mean credit score, derived from a group of consumer reports; or (B) Blind...

  2. 12 CFR Appendix B to Part 30 - Interagency Guidelines Establishing Information Security Standards

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... risks. C. Manage and Control Risk. Each bank shall: 1. Design its information security program to... A. Involve the Board of Directors B. Assess Risk C. Manage and Control Risk D. Oversee Service...) Aggregate information, such as the mean credit score, derived from a group of consumer reports; or (B) Blind...

  3. 76 FR 65768 - ADS Media Group, Inc., American Enterprise Development Corp., and Arcland Energy Corp.; Order of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-24

    ... Development Corp., and Arcland Energy Corp.; Order of Suspension of Trading October 20, 2011. It appears to... current and accurate information concerning the securities of American Enterprise Development Corp... securities of Arcland Energy Corp. because it has not filed any periodic reports since the period ended April...

  4. Enhanced Security for Online Exams Using Group Cryptography

    ERIC Educational Resources Information Center

    Jung, I. Y.; Yeom, H. Y.

    2009-01-01

    While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…

  5. Afghanistan: Post-Taliban Governance, Security, and U.S. Policy

    DTIC Science & Technology

    2010-07-21

    presidency, but later joined Rabbani’s 5 A pharmaceutical plant in Sudan (Al Shifa... plant was strictly civilian in nature. 6 http://www.msnbc.msn.com/id/4540958. Afghanistan: Post-Taliban Governance, Security, and U.S. Policy...commercially profitable for China Metallurgical Group, includes construction of two coal-fired electric power plant (one of which will supply more

  6. 78 FR 56978 - In the Matter of Carbiz, Inc., InZon Corporation, IQ Micro, Inc., Irwin Financial Corporation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-16

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Carbiz, Inc., InZon Corporation, IQ Micro, Inc., Irwin Financial Corporation, and Princeton Media Group, Inc.; Order of Suspension of Trading September 12, 2013. It appears to the Securities and Exchange Commission that there is a...

  7. International Earth Science Constellation Mission Operations Working Group: Constellation Coordination System (CCS) Status. [Constellation Coordination System (CCS) Status

    NASA Technical Reports Server (NTRS)

    Skeberdis, Daniel

    2016-01-01

    This is a presentation at the MOWG fall meeting that will discuss CCS purpose, future status, security enhancements, arbitrary ephemeris mission features, overview of CCS 7.3, approach for the use of NORAD TLEs, account and data security, CCS System virtualization, control box visualization modification and other enhancements.

  8. 75 FR 10331 - In the Matter of: Amalgamated Explorations, Inc., Areawide Cellular, Inc., Genomed, Inc., Global...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-05

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: Amalgamated Explorations, Inc., Areawide Cellular, Inc., Genomed, Inc., Global Maintech Corp., Military Resale Group, Inc., Verado Holdings, Inc., and World Transport Authority, Inc.; Order of Suspension of Trading It appears to the Securities and Exchange Commission that ther...

  9. Protecting America's economy, environment, health, and security against invasive species requires a strong federal program in systematic biology

    Treesearch

    Hilda Diaz-Soltero; Amy Y. Rossman

    2011-01-01

    Systematics is the science that identifies and groups organisms by understanding their origins, relationships, and distributions. It is fundamental to understanding life on earth, our crops, wildlife, and diseases, and it provides the scientific foundation to recognize and manage invasive species. Protecting America's economy, environment, health, and security...

  10. 3D Digital Legos for Teaching Security Protocols

    ERIC Educational Resources Information Center

    Yu, Li; Harrison, L.; Lu, Aidong; Li, Zhiwei; Wang, Weichao

    2011-01-01

    We have designed and developed a 3D digital Lego system as an education tool for teaching security protocols effectively in Information Assurance courses (Lego is a trademark of the LEGO Group. Here, we use it only to represent the pieces of a construction set.). Our approach applies the pedagogical methods learned from toy construction sets by…

  11. 29 CFR 2590.715-2719 - Internal claims and appeals and external review processes.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GROUP HEALTH PLANS RULES AND REGULATIONS FOR GROUP HEALTH... and appeals and external review processes for group health plans and health insurance issuers that are..., 2010. (b) Internal claims and appeals process—(1) In general. A group health plan and a health...

  12. 29 CFR 2590.715-2719 - Internal claims and appeals and external review processes.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GROUP HEALTH PLANS RULES AND REGULATIONS FOR GROUP HEALTH... and appeals and external review processes for group health plans and health insurance issuers that are..., 2010. (b) Internal claims and appeals process—(1) In general. A group health plan and a health...

  13. 29 CFR 2590.715-2719 - Internal claims and appeals and external review processes.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GROUP HEALTH PLANS RULES AND REGULATIONS FOR GROUP HEALTH... and appeals and external review processes for group health plans and health insurance issuers that are..., 2010. (b) Internal claims and appeals process—(1) In general. A group health plan and a health...

  14. 29 CFR 2590.715-2719 - Internal claims and appeals and external review processes.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... may not own or control, or be owned or controlled by a health insurance issuer, a group health plan... SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GROUP HEALTH PLANS RULES AND REGULATIONS FOR GROUP HEALTH... for group health plans and health insurance issuers that are not grandfathered health plans under...

  15. Psychosocial predictors of cannabis use in adolescents at risk.

    PubMed

    Hüsler, Gebhard; Plancherel, Bernard; Werlen, Egon

    2005-09-01

    This research has tested a social disintegration model in conjunction with risk and protection factors that have the power to differentiate relative, weighted interactions among variables in different socially disintegrated groups. The model was tested in a cross-sectional sample of 1082 at-risk youth in Switzerland. Structural equation analyses show significant differences between the social disintegration (low, moderate, high) groups and gender, indicating that the model works differently for groups and for gender. For the highly disintegrated adolescents results clearly show that the risk factors (negative mood, peer network, delinquency) are more important than the protective factors (family relations, secure sense of self). Family relations lose all protective value against negative peer influence, but personal variables, such as secure self, gain protective power.

  16. Wireless Sensors Grouping Proofs for Medical Care and Ambient Assisted-Living Deployment

    PubMed Central

    Trček, Denis

    2016-01-01

    Internet of Things (IoT) devices are rapidly penetrating e-health and assisted living domains, and an increasing proportion among them goes on the account of computationally-weak devices, where security and privacy provisioning alone are demanding tasks, not to mention grouping proofs. This paper, therefore, gives an extensive analysis of such proofs and states lessons learnt to avoid possible pitfalls in future designs. It sticks with prudent engineering techniques in this field and deploys in a novel way the so called non-deterministic principle to provide not only grouping proofs, but (among other) also privacy. The developed solution is analyzed by means of a tangible metric and it is shown to be lightweight, and formally for security. PMID:26729131

  17. Wireless Sensors Grouping Proofs for Medical Care and Ambient Assisted-Living Deployment.

    PubMed

    Trček, Denis

    2016-01-02

    Internet of Things (IoT) devices are rapidly penetrating e-health and assisted living domains, and an increasing proportion among them goes on the account of computationally-weak devices, where security and privacy provisioning alone are demanding tasks, not to mention grouping proofs. This paper, therefore, gives an extensive analysis of such proofs and states lessons learnt to avoid possible pitfalls in future designs. It sticks with prudent engineering techniques in this field and deploys in a novel way the so called non-deterministic principle to provide not only grouping proofs, but (among other) also privacy. The developed solution is analyzed by means of a tangible metric and it is shown to be lightweight, and formally for security.

  18. Toward protocols for quantum-ensured privacy and secure voting

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bonanome, Marianna; Buzek, Vladimir; Ziman, Mario

    2011-08-15

    We present a number of schemes that use quantum mechanics to preserve privacy, in particular, we show that entangled quantum states can be useful in maintaining privacy. We further develop our original proposal [see M. Hillery, M. Ziman, V. Buzek, and M. Bielikova, Phys. Lett. A 349, 75 (2006)] for protecting privacy in voting, and examine its security under certain types of attacks, in particular dishonest voters and external eavesdroppers. A variation of these quantum-based schemes can be used for multiparty function evaluation. We consider functions corresponding to group multiplication of N group elements, with each element chosen by amore » different party. We show how quantum mechanics can be useful in maintaining the privacy of the choices group elements.« less

  19. Education and Outreach in the Life Sciences: Qualitative Analysis Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Burbank, Roberta L.; John, Lisa; Mahy, Heidi A.

    The DOE's National Nuclear Security Agency (NNSA) asked Pacific Northwest National Laboratory (PNNL) to consider the role of individual scientists in upholding safety and security. The views of scientists were identified as being a critical component of this policy process. Therefore, scientists, managers, and representatives of Institutional Biosafety Committees (IBCs) at the national labs were invited to participate in a brief survey and a set of focus groups. In addition, three focus groups were conducted with scientists, managers, and IBC representatives to discuss some of the questions related to education, outreach, and codes of conduct in further detail and gathermore » additional input on biosecurity and dual-use awareness at the laboratories. The overall purpose of this process was to identify concerns related to these topics and to gather suggestions for creating an environment where both the scientific enterprise and national security are enhanced.« less

  20. Activating attachment representations during memory retrieval modulates intrusive traumatic memories.

    PubMed

    Bryant, Richard A; Chan, Iris

    2017-10-01

    Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.

  1. The HEPiX Virtualisation Working Group: Towards a Grid of Clouds

    NASA Astrophysics Data System (ADS)

    Cass, Tony

    2012-12-01

    The use of virtual machine images, as for example with Cloud services such as Amazon's Elastic Compute Cloud, is attractive for users as they have a guaranteed execution environment, something that cannot today be provided across sites participating in computing grids such as the Worldwide LHC Computing Grid. However, Grid sites often operate within computer security frameworks which preclude the use of remotely generated images. The HEPiX Virtualisation Working Group was setup with the objective to enable use of remotely generated virtual machine images at Grid sites and, to this end, has introduced the idea of trusted virtual machine images which are guaranteed to be secure and configurable by sites such that security policy commitments can be met. This paper describes the requirements and details of these trusted virtual machine images and presents a model for their use to facilitate the integration of Grid- and Cloud-based computing environments for High Energy Physics.

  2. Safety assessment of a home-based telecare system for adults with developmental disabilities in Indiana: a multi-stakeholder perspective.

    PubMed

    Brewer, Jeffrey L; Taber-Doughty, Teresa; Kubik, Sara

    2010-01-01

    We investigated the perceptions of people about the safety, security and privacy of a telecare monitoring system for adults with developmental disabilities living in residential settings. The telecare system was used by remote caregivers overnight, when staff were not present in the homes. We surveyed 127 people from different stakeholder groups in the state of Indiana. The people surveyed included those with knowledge or experience of telecare, and those without. The stakeholders were clients, their advocates, service provider administrators and independent case coordinators. The responses in each category for every group were positive except one: only 4 of the 11 telecare case coordinators agreed that the telecare system provided a secure environment. Overall, the telecare system was perceived to be as safe, secure and private as the conventional alternative of having staff in the home.

  3. Deficiencies of the cryptography based on multiple-parameter fractional Fourier transform.

    PubMed

    Ran, Qiwen; Zhang, Haiying; Zhang, Jin; Tan, Liying; Ma, Jing

    2009-06-01

    Methods of image encryption based on fractional Fourier transform have an incipient flaw in security. We show that the schemes have the deficiency that one group of encryption keys has many groups of keys to decrypt the encrypted image correctly for several reasons. In some schemes, many factors result in the deficiencies, such as the encryption scheme based on multiple-parameter fractional Fourier transform [Opt. Lett.33, 581 (2008)]. A modified method is proposed to avoid all the deficiencies. Security and reliability are greatly improved without increasing the complexity of the encryption process. (c) 2009 Optical Society of America.

  4. [Infants' attachment security in a vulnerable French sample].

    PubMed

    Tereno, S; Guedeney, N; Dugravier, R; Greacen, T; Saïas, T; Tubach, F; Ulgen, S; Matos, I; Guédeney, A

    2017-04-01

    Attachment is a long lasting emotional link established between infants and their caregivers. The quality of early relationships allows infants to safely explore their environment and contribute to the establishment of a broad range of social skills. Several intervention programs targeting infant attachment have been implemented in different contexts, showing diverse degrees of efficacy. The present paper describes, for the first time, children's attachment quality distributions in a French multi-risk population, with a preventive intervention, usual or reinforced. In the CAPEDP study (Parenting and Attachment in Early Childhood: reducing mental health disorder risks and promoting resilience), a sub-sample of 117 women was recruited to assess the effects of this home-visiting program on children's attachment security. With that intent, the Strange Situation Paradigm was used when infants were between 12 and 16 months of age. In the intervention group, 63% (n=41) of the infants were coded as secure, while 15% (n=10) of them were coded as insecure-avoidant and 22% (n=14) as insecure-ambivalent/resistant. 56% (n=29) of control group infants (usual care) were coded as secure, while 27% (n=14) were coded as insecure-avoidant and 17% (n=9) as insecure-ambivalent/resistant. Even if the percentage of children with a secure attachment in the reinforced intervention group was higher than that of the control group, this difference did not reach the threshold of significance [Chi 2 (2)=2.40, P=0.30]. Intervention group distributions were closer to normative samples, and these distributions show the clinical impact of our program. In general, preventive interventions focused on attachment quality have moderate effects but, in our case, several factors might have contributed to lower the statistical impact of the program. Firstly, the control group cannot be considered has having received zero intervention for two reasons: (a) the French usual perinatal health system (Maternal and Infant Protection System) is particularly generous and (b) the effect of this usual system might have been increased by the project intensive assessment protocol (6 visits during 28 months). Secondly, it is possible that the full effect of the intervention had not yet been detected because, when a child's attachment was assessed, only two thirds of the intervention visits had been performed (29 of 44 visits). A "sleeper effect" is still possible: we hope that a more clear result will be seen when children are assessed again, at 48 months, in our follow-up study (CAPEDP-A II). By clarifying the mechanisms involved in the development of a secure attachment, our study aims to contribute and refine the development of early preventive intervention strategies in high perinatal and psychosocial vulnerability contexts. Copyright © 2016 L’Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  5. Infant nutrition in Saskatoon: barriers to infant food security.

    PubMed

    Partyka, Brendine; Whiting, Susan; Grunerud, Deanna; Archibald, Karen; Quennell, Kara

    2010-01-01

    We explored infant nutrition in Saskatoon by assessing current accessibility to all forms of infant nourishment, investigating challenges in terms of access to infant nutrition, and determining the use and effectiveness of infant nutrition programs and services. We also examined recommendations to improve infant food security in Saskatoon. Semi-structured community focus groups and stakeholder interviews were conducted between June 2006 and August 2006. Thematic analysis was used to identify themes related to infant feeding practices and barriers, as well as recommendations to improve infant food security in Saskatoon. Our study showed that infant food security is a concern among lower-income families in Saskatoon. Barriers that limited breastfeeding sustainability or nourishing infants through other means included knowledge of feeding practices, lack of breastfeeding support, access and affordability of infant formula, transportation, and poverty. Infant nutrition and food security should be improved by expanding education and programming opportunities, increasing breastfeeding support, and identifying acceptable ways to provide emergency formula. If infant food security is to be addressed successfully, discussion and change must occur in social policy and family food security contexts.

  6. Insider Threat and Information Security Management

    NASA Astrophysics Data System (ADS)

    Coles-Kemp, Lizzie; Theoharidou, Marianthi

    The notion of insider has multiple facets. An organization needs to identify which ones to respond to. The selection, implementetion and maintenance of information security countermeasures requires a complex combination of organisational policies, functions and processes, which form Information Security Management. This chapter examines the role of current information security management practices in addressing the insider threat. Most approaches focus on frameworks for regulating insider behaviour and do not allow for the various cultural responses to the regulatory and compliance framework. Such responses are not only determined by enforcement of policies and awareness programs, but also by various psychological and organisational factors at an individual or group level. Crime theories offer techniques that focus on such cultural responses and can be used to enhance the information security management design. The chapter examines the applicability of several crime theories and concludes that they can contribute in providing additional controls and redesign of information security management processes better suited to responding to the insider threat.

  7. Assessing Security of Supply: Three Methods Used in Finland

    NASA Astrophysics Data System (ADS)

    Sivonen, Hannu

    Public Private Partnership (PPP) has an important role in securing supply in Finland. Three methods are used in assessing the level of security of supply. First, in national expert groups, a linear mathematical model has been used. The model is based on interdependency estimates. It ranks societal functions or its more detailed components, such as items in the food supply chain, according to the effect and risk pertinent to the interdependencies. Second, the security of supply is assessed in industrial branch committees (clusters and pools) in the form of indicators. The level of security of supply is assessed against five generic factors (dimension 1) and tens of business branch specific functions (dimension 2). Third, in two thousand individual critical companies, the maturity of operational continuity management is assessed using Capability Maturity Model (CMM) in an extranet application. The pool committees and authorities obtain an anonymous summary. The assessments are used in allocating efforts for securing supply. The efforts may be new instructions, training, exercising, and in some cases, investment and regulation.

  8. Complexity of food preparation and food security status in low-income young women.

    PubMed

    Engler-Stringer, Rachel; Stringer, Bernadette; Haines, Ted

    2011-01-01

    This study was conducted to explore whether preparing more complex meals was associated with higher food security status. This mixed-methods, community-based study involved the use of semistructured interviews to examine the cooking practices of a group of young, low-income women in Montreal. Fifty participants aged 18 to 35 were recruited at 10 locations in five low-income neighbourhoods. Food security status was the main outcome measure and the main exposure variable, "complex food preparation," combined the preparation of three specific food types (soups, sauces, and baked goods) using basic ingredients. Low-income women preparing a variety of meals using basic ingredients at least three times a week were more than twice as likely to be food secure as were women preparing more complex meals less frequently. Women who prepared more complex meals more frequently had higher food security. Whether this means that preparing more complex foods results in greater food security remains unclear, as this was an exploratory study.

  9. Effects of early intervention and the moderating effects of brain activity on institutionalized children's social skills at age 8.

    PubMed

    Almas, Alisa N; Degnan, Kathryn A; Radulescu, Anca; Nelson, Charles A; Zeanah, Charles H; Fox, Nathan A

    2012-10-16

    The present study examined the social skills of previously institutionalized, 8-y-old Romanian children from the Bucharest Early Intervention Project and the influence of attachment security and brain electrical activity (alpha power) on these skills. Participants included children randomized to an intervention involving foster care [Foster Care Group (FCG)], children randomized to remain in institutions [Care As Usual Group (CAUG)], and never-institutionalized children living with their families in the Bucharest community [Never-Institutionalized Group (NIG)]. A continuous rating of children's attachment security to their primary caregiver was assessed at 42 mo of age. When children were 8 y old, teachers rated their social skills, and the children's resting electroencephalogram alpha power was recorded. Teachers rated social skills of FCG children who were placed into foster care before 20 mo of age as no different from NIG children, and both of these groups were higher than CAUG children and FCG children placed after 20 mo. Electroencephalogram alpha power at age 8 significantly moderated the relations between attachment security and social skills. These findings characterize institutionalized children's social skills in middle childhood within the context of a randomized intervention while highlighting the roles of both relational and biological factors in these developmental trajectories.

  10. 29 CFR 2590.609-1 - [Reserved

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GROUP HEALTH PLANS RULES AND REGULATIONS FOR GROUP HEALTH PLANS Continuation Coverage, Qualified Medical Child Support Orders, Coverage for Adopted Children § 2590.609-1 [Reserved] ...

  11. 48 CFR 3028.307-1 - Group insurance plans.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Group insurance plans. 3028.307-1 Section 3028.307-1 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY... advice of legal counsel. ...

  12. Travel Survey Manual

    DOT National Transportation Integrated Search

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  13. 41. Upper level, electronic racks, left to rightprogrammer group, status ...

    Library of Congress Historic Buildings Survey, Historic Engineering Record, Historic Landscapes Survey

    41. Upper level, electronic racks, left to right--programmer group, status command message processing group, UHF radio, impss rack security - Ellsworth Air Force Base, Delta Flight, Launch Facility, On County Road T512, south of Exit 116 off I-90, Interior, Jackson County, SD

  14. Screening for mental health needs of New Zealand youth in secure care facilities using the MAYSI-2.

    PubMed

    McArdle, Sean; Lambie, Ian

    2018-06-01

    Young people admitted to secure facilities generally have particularly high rates of mental, emotional and behavioural problems, but little is known about the mental health needs of this group in New Zealand. To describe prevalence of probable mental health disorder and related needs among young people in secure facilities in New Zealand. Massachusetts youth screening instrument - second version (MAYSI-2) data were obtained from the records of young people admitted to one secure care facility (n = 204) within a 12 month period. We used descriptive statistics to determine prevalence of problems overall and multivariate analysis of variance to compare MAYSI-2 scores between gender and ethnic groups. Nearly 80% of these young people scored above the 'caution' or 'warning' cut-off on the MAYSI-2, a substantially higher proportion than reported in studies in other countries. There was a tendency for girls and for Maori and Pacific Islander subgroups to have a higher rate of probable psychopathology. Young people in secure facilities in New Zealand have substantial service needs. Early intervention that engages them in services upon first contact with the youth justice system might help reduce this burden. Further validation of the MAYSI-2 in New Zealand may be warranted because of the unique ethnic make-up of these young offenders. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  15. Securing stent during multi-stage laryngotracheoplasty--an evolved technique.

    PubMed

    Siegel, Bianca; Bent, John P

    2015-09-01

    Multi-stage laryngotracheoplasty (LTP) typically requires a stent be secured to the airway for 2-6 weeks. Our technique has evolved over time to securing the stent to the strap muscles and tying a series of knots long enough to leave the suture tail protruding through the skin incision, which simplifies stent removal. Retrospective chart review. Twenty-four patients underwent multi-stage LTP at our institution from 2007 to 2013. Eight patients were excluded from the study because they either did not have a stent placed (n=4), or they had a t-tube placed which was not sutured in place (n=4). Of the remaining 16 patients, 62.5% (n=10) had their stent secured via sutures which were buried below the skin, and 37.5% (n=6) via a long suture tail which was left protruding through the end of the skin incision. An incision was required for stent removal 100% of buried sutures patients, and 33% of exposed suture patients (p=0.0009). Average operative time for stent removal was 60min in the buried sutures group, and 25min in the exposed sutures group (p=0.0075). Securing stents via an exposed suture technique decreases the need for making a skin incision during the second stage of the operation, and significantly decreases the operative time of the second stage. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  16. Association between secure patient-clinician email and clinical services utilisation in a US integrated health system: a retrospective cohort study.

    PubMed

    Meng, Di; Palen, Ted E; Tsai, Joanne; McLeod, Melanie; Garrido, Terhilda; Qian, Heather

    2015-11-09

    To assess associations between secure patient-clinician email use and clinical services utilisation over time. Retrospective cohort study between July 2010 and December 2013. Controlling for a utilisation surge around first secure email use, we analysed difference of differences between propensity score-matched groups of secure patient-clinician email users and non-users for utilisation 1-12 months before and 7-18 months after first email (users) or a randomly assigned index date (non-users). US integrated healthcare delivery system. 9345 adults with first secure email use between July 2011 and July 2012 and continuous enrolment for ≥30 months and 9345 adults without secure email use between July 2010 and July 2012 matched to users on demographics, health status, and baseline utilisation. Rates of office visits, patient-initiated phone calls, scheduled telephone visits, after-hours clinic visits, emergency department visits, and hospitalisations. After controlling for multiple factors, no statistically significant differences in utilisation between secure email users and non-users occurred. Utilisation transiently increased by 88-237% around first email use. Annual rates of patient-initiated phone calls decreased among secure email users, 0.2 fewer calls per person (95% CI -0.3 to -0.1), from a mean of 4.1 calls per person 1-12 months before first use to a mean of 3.8 calls per person 7-18 months after first use. Rates of patient-initiated phone calls also decreased among non-users, 0.1 fewer calls per person (95% CI -0.2 to 0.0), from a mean of 4.2 calls per person 1-12 months before the index date to mean of 4.1 calls per person 7-18 months after the index date. Compared with non-users, patient use of secure email with clinicians was not associated with statistically significant differences in clinical services utilisation 7-18 months after first use. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  17. A Cluster-Based Framework for the Security of Medical Sensor Environments

    NASA Astrophysics Data System (ADS)

    Klaoudatou, Eleni; Konstantinou, Elisavet; Kambourakis, Georgios; Gritzalis, Stefanos

    The adoption of Wireless Sensor Networks (WSNs) in the healthcare sector poses many security issues, mainly because medical information is considered particularly sensitive. The security mechanisms employed are expected to be more efficient in terms of energy consumption and scalability in order to cope with the constrained capabilities of WSNs and patients’ mobility. Towards this goal, cluster-based medical WSNs can substantially improve efficiency and scalability. In this context, we have proposed a general framework for cluster-based medical environments on top of which security mechanisms can rely. This framework fully covers the varying needs of both in-hospital environments and environments formed ad hoc for medical emergencies. In this paper, we further elaborate on the security of our proposed solution. We specifically focus on key establishment mechanisms and investigate the group key agreement protocols that can best fit in our framework.

  18. A review of video security training and assessment-systems and their applications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Cellucci, J.; Hall, R.J.

    1991-01-01

    This paper reports that during the last 10 years computer-aided video data collection and playback systems have been used as nuclear facility security training and assessment tools with varying degrees of success. These mobile systems have been used by trained security personnel for response force training, vulnerability assessment, force-on-force exercises and crisis management. Typically, synchronous recordings from multiple video cameras, communications audio, and digital sensor inputs; are played back to the exercise participants and then edited for training and briefing. Factors that have influence user acceptance include: frequency of use, the demands placed on security personnel, fear of punishment, usermore » training requirements and equipment cost. The introduction of S-VHS video and new software for scenario planning, video editing and data reduction; should bring about a wider range of security applications and supply the opportunity for significant cost sharing with other user groups.« less

  19. China's approach to control of HIV. Modern use of tradition in a public security system.

    PubMed

    Anderson, A F

    1995-01-01

    HIV/AIDS control policy in China focuses on high risk populations. The public security system is intricately intertwined with the Chinese government's HIV control activities. The government can justify its control of high risk activities because prostitution, related trafficking in females, drug abuse, and drug trafficking are elements of the Six Evils: social problems considered to be pre-revolutionary, influenced by decadent western morality, and incompatible with modernization. Public security campaigns involve arresting tens of thousands of people annually in the combined efforts against HIV and the social evils. Instigators of crime are given punitive prison sentences. For their victims, however, incarceration leans toward treatment. The moral-rehabilitative philosophy is the normative foundation of the Chinese criminal justice process. Confucian thought holds that teaching the disobedient person proper social conduct, not punishment, will effect endless change. So correction officials use patient persuasion and re-education with most criminals. The public security system coercively collects drug abusers for as much as three months of counseling and detoxification (methadone or clonidine). The police detain prostitutes for 6 months to 2 years for re-education, including legal indoctrination, labor, and prevention of sexually transmitted diseases. Family members and community groups participate in treatment and aftercare. All drug abusers and prostitutes undergo HIV testing. HIV-positive offenders are separated from HIV-negative offenders. Pimps, panderers, or traffickers in females or drugs are either executed or put in prison for at least 10 years. A weakness of China's approach is its exclusive focus on high-risk groups rather than on high-risk practices. This approach assumes HIV will be restricted to these groups. Police will likely increase its punitive and regressive responses to group members as its approach fails to prevent HIV transmission.

  20. A Security Architecture for Grid-enabling OGC Web Services

    NASA Astrophysics Data System (ADS)

    Angelini, Valerio; Petronzio, Luca

    2010-05-01

    In the proposed presentation we describe an architectural solution for enabling a secure access to Grids and possibly other large scale on-demand processing infrastructures through OGC (Open Geospatial Consortium) Web Services (OWS). This work has been carried out in the context of the security thread of the G-OWS Working Group. G-OWS (gLite enablement of OGC Web Services) is an international open initiative started in 2008 by the European CYCLOPS , GENESI-DR, and DORII Project Consortia in order to collect/coordinate experiences in the enablement of OWS's on top of the gLite Grid middleware. G-OWS investigates the problem of the development of Spatial Data and Information Infrastructures (SDI and SII) based on the Grid/Cloud capacity in order to enable Earth Science applications and tools. Concerning security issues, the integration of OWS compliant infrastructures and gLite Grids needs to address relevant challenges, due to their respective design principles. In fact OWS's are part of a Web based architecture that demands security aspects to other specifications, whereas the gLite middleware implements the Grid paradigm with a strong security model (the gLite Grid Security Infrastructure: GSI). In our work we propose a Security Architectural Framework allowing the seamless use of Grid-enabled OGC Web Services through the federation of existing security systems (mostly web based) with the gLite GSI. This is made possible mediating between different security realms, whose mutual trust is established in advance during the deployment of the system itself. Our architecture is composed of three different security tiers: the user's security system, a specific G-OWS security system, and the gLite Grid Security Infrastructure. Applying the separation-of-concerns principle, each of these tiers is responsible for controlling the access to a well-defined resource set, respectively: the user's organization resources, the geospatial resources and services, and the Grid resources. While the gLite middleware is tied to a consolidated security approach based on X.509 certificates, our system is able to support different kinds of user's security infrastructures. Our central component, the G-OWS Security Framework, is based on the OASIS WS-Trust specifications and on the OGC GeoRM architectural framework. This allows to satisfy advanced requirements such as the enforcement of specific geospatial policies and complex secure web service chained requests. The typical use case is represented by a scientist belonging to a given organization who issues a request to a G-OWS Grid-enabled Web Service. The system initially asks the user to authenticate to his/her organization's security system and, after verification of the user's security credentials, it translates the user's digital identity into a G-OWS identity. This identity is linked to a set of attributes describing the user's access rights to the G-OWS services and resources. Inside the G-OWS Security system, access restrictions are applied making use of the enhanced Geospatial capabilities specified by the OGC GeoXACML. If the required action needs to make use of the Grid environment the system checks if the user is entitled to access a Grid infrastructure. In that case his/her identity is translated to a temporary Grid security token using the Short Lived Credential Services (IGTF Standard). In our case, for the specific gLite Grid infrastructure, some information (VOMS Attributes) is plugged into the Grid Security Token to grant the access to the user's Virtual Organization Grid resources. The resulting token is used to submit the request to the Grid and also by the various gLite middleware elements to verify the user's grants. Basing on the presented framework, the G-OWS Security Working Group developed a prototype, enabling the execution of OGC Web Services on the EGEE Production Grid through the federation with a Shibboleth based security infrastructure. Future plans aim to integrate other Web authentication services such as OpenID, Kerberos and WS-Federation.

  1. A Look at the Law, Public Safety, Corrections & Security Cluster

    ERIC Educational Resources Information Center

    Coffee, Joseph N.

    2008-01-01

    A month after the 9/11 terrorist attack in 2001, an advisory group met in Little Rock, Arkansas, to begin the development of the Law, Public Safety, Corrections and Security (LPSCS) career cluster. At that time there were five pathways of what was then called the Law and Public Safety cluster--fire and emergency services, law enforcement,…

  2. Transportation Secure Data Center Newsletter | Transportation Secure Data

    Science.gov Websites

    Travel Study: A pilot study conducted February-March 2015, the In the Moment Travel Study used an Transportation Study: In February and March 2014, Resource Systems Group, Inc., conducted the Heartland in Motion Transportation Study for the Madison County Council of Governments. The study included a household travel survey

  3. SIGAR Special Inspector General for Afghanistan Reconstruction

    DTIC Science & Technology

    2017-10-30

    Daniel Fisher, Economic and Social Development Subject Matter Expert Emmett Schneider, Funding Subject Matter Expert Clark Irwin, Lead Writer/Editor...governance, economic development, peace and reconciliation, and security issues. Each working group has a matrix of benchmarks—subject to change—to chart...the U.S. efforts to build the Afghan security forces, improve governance, facilitate economic and social development, and combat the sale and

  4. Afghanistan: Post-Taliban Governance, Security, and U.S. Policy

    DTIC Science & Technology

    2010-06-25

    during his 1992-96 presidency, but later joined Rabbani’s 5 A pharmaceutical plant in...assertions that the plant was strictly civilian in nature. 6 http://www.msnbc.msn.com/id/4540958. Afghanistan: Post-Taliban Governance, Security, and...profitable for China Metallurgical Group, includes construction of two coal-fired electric power plant (one of which will supply more electricity to

  5. Bahrain: Reform, Security, and U.S. Policy

    DTIC Science & Technology

    2016-10-28

    reportedly supported by Iran, have claimed responsibility for bombings and other attacks primarily against security officials. The Bahrain government’s use...political settlement is the activity of violent, underground groups that, among their tactics, detonate bombs and Improvised Explosive Devices (IEDs...Sayara al-Ashtar (Ashtar Brigades). It issued its first public statement in April 2013 and has since claimed responsibility for about 20 bombings

  6. 76 FR 30415 - Self-Regulatory Organizations; NYSE Amex LLC; Notice of Filing of Proposed Rule Change Amending...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-25

    ... marketplaces operated by OTC Markets Group Inc. include OTCQX, OTCQB and OTC Pink. II. Self-Regulatory... Premises in Certain OTC Bulletin Board and OTC Markets Securities May 19, 2011. Pursuant to Section 19(b)(1... premises in certain OTC Bulletin Board (``OTCBB'') and OTC Markets \\4\\ securities. The text of the proposed...

  7. The Perceptions of the Psychological Counselors about Their Roles and Responsibilities Related to School Security

    ERIC Educational Resources Information Center

    Peker, Adem

    2015-01-01

    The purpose of this study is to analyze the perceptions of the psychological counselors about their roles and responsibilities related to school security. The study group of the study is formed of 12 psychological counselors working in different school grades in Erzurum city center. The study is formed in qualitative design. Three themes as…

  8. Indicators of Children's Well-Being: Conference Papers. Child Health, Education, and Economic Security. Volume II. Special Report Series. Special Report Number 60b.

    ERIC Educational Resources Information Center

    Wisconsin Univ., Madison. Inst. for Research on Poverty.

    This volume groups papers discussing indicators of children's well-being into three areas: child health, education, and economic security. Papers concerning child health include: (1) "Prenatal and Infant Health Indicators" (Paula Lantz and Melissa Partin); (2) "Health Indicators for Preschool Children (Ages 1-4)" (Barbara L.…

  9. 78 FR 56264 - Big Bear Mining Corp., Four Rivers BioEnergy, Inc., Mainland Resources, Inc., QI Systems Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-12

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Big Bear Mining Corp., Four Rivers BioEnergy, Inc., Mainland Resources, Inc., QI Systems Inc., South Texas Oil Co., and Synova Healthcare Group, Inc... concerning the securities of Four Rivers BioEnergy, Inc. because it has not filed any periodic reports since...

  10. 49 CFR 393.124 - What are the rules for securing concrete pipe?

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... place by blocks and/or wedges; and (iii) Every pipe in the bottom tier must also be held firmly in... not secured individually with a tiedown, then: (A) Either one 1/2-inch diameter chain or wire rope, or two 3/8-inch diameter chain or wire rope, must be placed longitudinally over the group of pipes; (B...

  11. 49 CFR 393.124 - What are the rules for securing concrete pipe?

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... place by blocks and/or wedges; and (iii) Every pipe in the bottom tier must also be held firmly in... not secured individually with a tiedown, then: (A) Either one 1/2-inch diameter chain or wire rope, or two 3/8-inch diameter chain or wire rope, must be placed longitudinally over the group of pipes; (B...

  12. 49 CFR 393.124 - What are the rules for securing concrete pipe?

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... place by blocks and/or wedges; and (iii) Every pipe in the bottom tier must also be held firmly in... not secured individually with a tiedown, then: (A) Either one 1/2-inch diameter chain or wire rope, or two 3/8-inch diameter chain or wire rope, must be placed longitudinally over the group of pipes; (B...

  13. 49 CFR 393.124 - What are the rules for securing concrete pipe?

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... place by blocks and/or wedges; and (iii) Every pipe in the bottom tier must also be held firmly in... not secured individually with a tiedown, then: (A) Either one 1/2-inch diameter chain or wire rope, or two 3/8-inch diameter chain or wire rope, must be placed longitudinally over the group of pipes; (B...

  14. 49 CFR 393.124 - What are the rules for securing concrete pipe?

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... place by blocks and/or wedges; and (iii) Every pipe in the bottom tier must also be held firmly in... not secured individually with a tiedown, then: (A) Either one 1/2-inch diameter chain or wire rope, or two 3/8-inch diameter chain or wire rope, must be placed longitudinally over the group of pipes; (B...

  15. Health consequences of shift-work: the case of iranian hospital security personnel.

    PubMed

    Abedini, Roghayeh; Soltanzadeh, Ahmad; Faghih, Mohammad Amin; Mohammadi, Heidar; Kamalinia, Mojtaba; Mohraz, Majid Habibi; Arassi, Maziyar; Veyseh, Peyman Piran; Aghaei, Hamed; Hosseini, Seyed Younes

    2015-01-01

    Shift-work, which is an ergonomics issue in workplaces, can negatively affect workers. The security personnel of medical centers in Iran have multiple responsibilities and consequently are exposed to such unwanted situations as observing patients, disputing with patient's attendants, unwanted shift schedules, and being away from family for long periods. This study assessed health problems of Iranian hospital security personnel (shift-worker personnel) using the Survey of Shift-workers (SOS) questionnaire (Persian version). This cross-sectional study was conducted in seven medical centers (4 hospitals and 3 clinics). A total of 416 workers were surveyed: shift-workers (exposed group) (n=209) and non-shift-workers (unexposed group) (n=207). The prevalence of adverse health effects was higher in shift-workers than day-workers. The level of education and mean Body Mass Index (BMI) in shift-workers were significantly higher compared with day-workers. The prevalence of gastrointestinal disorders, cardiovascular and psychological problems were also significantly higher in shift-workers compared with day-workers. Overall, the prevalence of health problems among the security personnel of medical centers was high. Hence, it is recommended that personnel be put under periodic monitoring and receive medical counseling and treatment if there is any disorder.

  16. 48 CFR 3028.307-1 - Group insurance plans.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Group insurance plans. 3028.307-1 Section 3028.307-1 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY....307-1 Group insurance plans. Plans shall be submitted to the contracting officer, who must obtain the...

  17. 48 CFR 3028.307-1 - Group insurance plans.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 48 Federal Acquisition Regulations System 7 2013-10-01 2012-10-01 true Group insurance plans. 3028.307-1 Section 3028.307-1 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY....307-1 Group insurance plans. Plans shall be submitted to the contracting officer, who must obtain the...

  18. 48 CFR 3028.307-1 - Group insurance plans.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 48 Federal Acquisition Regulations System 7 2012-10-01 2012-10-01 false Group insurance plans. 3028.307-1 Section 3028.307-1 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY....307-1 Group insurance plans. Plans shall be submitted to the contracting officer, who must obtain the...

  19. Effective Group Work for Elementary School-Age Children Whose Parents Are Divorcing.

    ERIC Educational Resources Information Center

    DeLucia-Waack, Janice; Gerrity, Deborah

    2001-01-01

    Parental divorce is the issue of most concern for elementary school children. This article describes interventions for children-of-divorce groups for elementary school children. Suggests guidelines related to goal setting; securing agency and parental consent; leadership planning; recruitment, screening, and selection of members; group member…

  20. 29 CFR 2590.701-4 - Rules relating to creditable coverage.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 2590.701-4 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GROUP HEALTH PLANS RULES AND REGULATIONS FOR GROUP HEALTH PLANS Health Coverage... I of the Act, and without regard to whether the coverage is offered in the group market, the...

  1. 29 CFR 2590.701-4 - Rules relating to creditable coverage.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 2590.701-4 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GROUP HEALTH PLANS RULES AND REGULATIONS FOR GROUP HEALTH PLANS Health Coverage... I of the Act, and without regard to whether the coverage is offered in the group market, the...

  2. 29 CFR 2590.701-4 - Rules relating to creditable coverage.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 2590.701-4 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GROUP HEALTH PLANS RULES AND REGULATIONS FOR GROUP HEALTH PLANS Health Coverage... I of the Act, and without regard to whether the coverage is offered in the group market, the...

  3. Minority Rights and Majority Rule: Ethnic Tolerance in Romania and Bulgaria.

    ERIC Educational Resources Information Center

    McIntosh, Mary E.; And Others

    1995-01-01

    Analysis of data from national surveys of majority ethnic groups in Romania and Bulgaria examined the effects on tolerance toward minority groups of education, community ethnic composition, urbanism, age, gender, perceived threat to national security from the minority group's homeland, democratic values, and prevailing political ideology. Contains…

  4. 77 FR 21587 - Bayer Cropscience, LP, Including On-Site Leased Workers From Jacobs PSG, Middough Associates, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-10

    ...., Digital Management Group, Mercury Air Group, Inc., Greenwood, and Professional Maintenance of Charleston... Solutions, Becht Engineering, Engineering Support Systems, Manufacturing Management Services, US Securities, WB Wells, Belcan, American Engineers, CH2M Hill Engineers, Inc., Digital Management Group, Mercury...

  5. Alcohol Outlet Workers and Managers: Focus Groups on Responsible Service Practices.

    ERIC Educational Resources Information Center

    Gehan, John P.; Toomey, Traci L.; Jones-Webb, Rhonda; Rothstein, Catherine; Wagenaar, Alexander C.

    1999-01-01

    Reports on focus group discussions with managers, bartenders, waitstaff, and security staff of retail alcohol establishments. Purpose of the focus groups was to identify beliefs, attitudes, behaviors, and practices among management and staff to guide development of training programs. Results indicate that, compared to management, staff had…

  6. 75 FR 81662 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Affordable...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-28

    .... SUMMARY: The Department of Labor (DOL) hereby announces the submission of the Employee Benefits Security... coverage for group health plans and health insurance issuers offering group or individual health insurance... health insurance issuer offering group or individual health insurance coverage generally must not rescind...

  7. 76 FR 68128 - Materials Technical Advisory Committee; Notice of Partially Closed Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-03

    ... Bureau of Industry and Security senior management. 3. Presentation from DuPont on impact of export controls. 4. Report on Composite Working Group and other working groups. 5. Discussion of proposed changes...

  8. Traffic volume trends 1998

    DOT National Transportation Integrated Search

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  9. Transportation users' views of quality

    DOT National Transportation Integrated Search

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  10. Health education needs of incarcerated women.

    PubMed

    Dinkel, Shirley; Schmidt, Katie

    2014-07-01

    This study identifies the healthcare education needs of incarcerated women in a state corrections facility. This was a naturalistic qualitative study. Focus groups included two groups of adult women incarcerated in a state corrections facility. One group consisted of women housed in maximum security, and one group consisted of women housed in medium security. Data were analyzed using a constant comparison approach. Three guiding questions provided the foundation for the identified themes. Themes included six healthcare education topics important to incarcerated women and three related to health education strategies best suited for incarcerated women. Trust, respect and empowerment are key concepts in educating incarcerated women about their personal health and health of their families. With over 200,000 women incarcerated in the United States today, creating policies and practices that focus on the healthcare education needs of women that are woman focused may enhance knowledge and skills and may ultimately lead to reduced recidivism. © 2014 Sigma Theta Tau International.

  11. Enhanced Facial Symmetry Assessment in Orthodontists

    PubMed Central

    Jackson, Tate H.; Clark, Kait; Mitroff, Stephen R.

    2013-01-01

    Assessing facial symmetry is an evolutionarily important process, which suggests that individual differences in this ability should exist. As existing data are inconclusive, the current study explored whether a group trained in facial symmetry assessment, orthodontists, possessed enhanced abilities. Symmetry assessment was measured using face and non-face stimuli among orthodontic residents and two control groups: university participants with no symmetry training and airport security luggage screeners, a group previously shown to possess expert visual search skills unrelated to facial symmetry. Orthodontic residents were more accurate at assessing symmetry in both upright and inverted faces compared to both control groups, but not for non-face stimuli. These differences are not likely due to motivational biases or a speed-accuracy tradeoff—orthodontic residents were slower than the university participants but not the security screeners. Understanding such individual differences in facial symmetry assessment may inform the perception of facial attractiveness. PMID:24319342

  12. Capital financing options for group practices.

    PubMed

    Galtney, B

    2000-05-01

    Group practices that are looking for capital partners need to demonstrate that they have the necessary management capability to operate a successful business capable of repaying the debt. Two basic types of debt financing are available to group practices: fixed-rate financing and variable-rate financing. Fixed-rate financing, the more common method, involves borrowing a specific amount of money and then paying off the debt in principal-and-interest payments, much like a fixed-rate mortgage. Variable-rate financing, on the other hand, involves obtaining a letter of credit from the lender itself or independent guarantor to secure a loan. The variable-rate method is more efficient and flexible, because the notes secured by the letter of credit can be rated independently and sold into public capital markets like short-term, variable-rate paper. Both types of financing can require the personal guarantee of all physicians in the group practice.

  13. Research on fully distributed optical fiber sensing security system localization algorithm

    NASA Astrophysics Data System (ADS)

    Wu, Xu; Hou, Jiacheng; Liu, Kun; Liu, Tiegen

    2013-12-01

    A new fully distributed optical fiber sensing and location technology based on the Mach-Zehnder interferometers is studied. In this security system, a new climbing point locating algorithm based on short-time average zero-crossing rate is presented. By calculating the zero-crossing rates of the multiple grouped data separately, it not only utilizes the advantages of the frequency analysis method to determine the most effective data group more accurately, but also meets the requirement of the real-time monitoring system. Supplemented with short-term energy calculation group signal, the most effective data group can be quickly picked out. Finally, the accurate location of the climbing point can be effectively achieved through the cross-correlation localization algorithm. The experimental results show that the proposed algorithm can realize the accurate location of the climbing point and meanwhile the outside interference noise of the non-climbing behavior can be effectively filtered out.

  14. Food acquisition methods and correlates of food insecurity in adults on probation in Rhode Island

    PubMed Central

    Stopka, Thomas J.; Beckwith, Curt G.

    2018-01-01

    Background Individuals under community corrections supervision may be at increased risk for food insecurity because they face challenges similar to other marginalized populations, such as people experiencing housing instability or substance users. The prevalence of food insecurity and its correlates have not been studied in the community corrections population. Methods We conducted a cross-sectional study in 2016, surveying 304 probationers in Rhode Island to estimate the prevalence of food insecurity, identify food acquisition methods, and determine characteristics of groups most at-risk for food insecurity. We used chi-square and Fisher’s exact tests to assess differences in sociodemographics and eating and food acquisition patterns, GIS to examine geospatial differences, and ordinal logistic regression to identify independent correlates across the four levels of food security. Results Nearly three-quarters (70.4%) of the participants experienced food insecurity, with almost half (48.0%) having very low food security. This is substantially higher than the general population within the state of Rhode Island, which reported a prevalence of 12.8% food insecurity with 6.1% very low food security in 2016. Participants with very low food security most often acquired lunch foods from convenience stores (and less likely from grocery stores) compared to the other three levels of food security. Participants did not differ significantly with regards to places for food acquisition related to breakfast or dinner meals based upon food security status. In adjusted models, being homeless (AOR 2.34, 95% CI: 1.31, 4.18) and depressed (AOR 3.12, 95% CI: 1.98, 4.91) were independently associated with a greater odds of being in a food insecure group. Compared to having help with meals none of the time, participants who reported having meal help all of the time (AOR 0.28, 95% CI: 0.12, 0.64), most of the time (AOR 0.31, 95% CI: 0.15, 0.61), and some of the time (AOR 0.54, 95% CI: 0.29, 0.98) had a lower odds of being in a food insecure group. Food insecure participants resided in different neighborhoods than food secure participants. The highest density of food insecure participants resided in census tracts with the lowest median incomes for the general population. The areas of highest density for each level of food security for our participants were in the census tracts with the lowest levels of full-time employment for the general population. Conclusions The prevalence of food insecurity and very low food security were markedly higher in our probation population compared to the general RI population. These findings suggest that access to food on a regular basis is a challenge for adults on probation. Depression and being homeless were independently associated with a greater odds of being in a food insecure group. In addition to intervening directly on food insecurity, developing interventions and policies that address the contributing factors of food insecurity, such as safe housing and treatment for depression, are critical. PMID:29883491

  15. A wireless electronic monitoring system for securing milk from farm to processor

    NASA Astrophysics Data System (ADS)

    Womble, Phillip; Hopper, Lindsay; Thompson, Chris; Alexander, Suraj M.; Crist, William; Payne, Fred; Stombaugh, Tim; Paschal, Jon; Moore, Ryan; Luck, Brian; Tabayehnejab, Nasrin

    2008-04-01

    The Department of Homeland Security and the Department of Health and Human Services have targeted bulk food contamination as a focus for attention. The contamination of bulk food poses a high consequence threat to our society. Milk transport falls into three of the 17 targeted NIPP (National Infrastructure Protection Plan) sectors including agriculture-food, public health, and commercial facilities. Minimal security safeguards have been developed for bulk milk transport. The current manual methods of securing milk are paper intensive and prone to errors. The bulk milk transportation sector requires a security enhancement that will both reduce recording errors and enable normal transport activities to occur while providing security against unauthorized access. Milk transportation companies currently use voluntary seal programs that utilize plastic, numbered seals on milk transport tank openings. Our group has developed a Milk Transport Security System which is an electromechanical access control and communication system that assures the secure transport of milk, milk samples, milk data, and security data between locations and specifically between dairy farms, transfer stations, receiving stations, and milk plants. It includes a security monitoring system installed on the milk transport tank, a hand held device, optional printers, data server, and security evaluation software. The system operates automatically and requires minimal or no attention by the bulk milk hauler/sampler. The system is compatible with existing milk transport infrastructure, and has the support of the milk producers, milk transportation companies, milk marketing agencies, and dairy processors. The security protocol developed is applicable for transport of other bulk foods both nationally and internationally. This system adds significantly to the national security infrastructure for bulk food transport. We are currently demonstrating the system in central Kentucky and will report on the results of the demonstration.

  16. Patients' willingness to pay for electronic communication with their general practitioner.

    PubMed

    Bergmo, Trine Strand; Wangberg, Silje Camilla

    2007-06-01

    Despite the common use of electronic communication in other aspects of everyday life, its use between patients and health care providers has been slow to diffuse. Possible explanations are security issues and lack of payment mechanisms. This study investigated how patients value secure electronic access to their general practitioner (GP). One hundred and ninety-nine patients were asked an open-ended willingness-to-pay (WTP) question as part of a randomised controlled trial. We compared the WTP values between two groups of respondents; one group had had the opportunity to communicate electronically with their GP for a year and the other group had not. Fifty-two percent of the total sample was willing to pay for electronic GP contact. The group of patients with access revealed a significantly lower WTP than the group without such access. Possible explanations are that the system had fewer benefits than expected, a presence of hypothetical bias or simply a preference for face-to-face encounters.

  17. Evaluation of anger management groups in a high-security hospital.

    PubMed

    Wilson, Claire; Gandolfi, Stacy; Dudley, Alison; Thomas, Brian; Tapp, James; Moore, Estelle

    2013-12-01

    Anger management programmes for offenders typically aim to improve the management of emotion associated with aggressive and antisocial behaviour. Such programmes have been quite extensively evaluated in prison and probation settings, but there is less published research in forensic mental health settings. This study aimed to evaluate anger management groups in a high-security hospital. Eighty-six patients were referred for a 20-session anger management intervention. Outcomes were self-reported experiences of anger and changes in institutionally documented incidents of aggression. Incident rates were retrospectively reviewed for all group graduates, where data were available, including a comparison group of graduates who acted as their own controls. Group graduates reported sustained reductions in feelings of anger and positive changes in their use of aggression in reaction to provocation. Some reduction in incidents of physical aggression was noted when group completers were compared with non-completers. Incidents of verbal aggression were observed to increase for graduates. There was also a trend towards improvement when treated men were compared with men on the waiting list. Our findings contribute to the growing evidence for anger management groups for aggressive men, although the low-base rate of incidents, typical of such a containing and therapeutic hospital setting, rendered the analysis of behavioural outcomes difficult. Anger management sessions for male forensic psychiatric patients can be effective in reducing incidents of physical aggression in response to provocation. Evaluation of treatments for anger is particularly difficult in secure and protective settings, where the aim is to keep incidents of actual physical aggression to a minimum. Further research of this kind is needed to test the value of self-reported reduction in angry feelings as an indicator of clinically useful progress. Copyright © 2013 John Wiley & Sons, Ltd.

  18. Securing the appendiceal stump with the Gea extracorporeal sliding knot during laparoscopic appendectomy is safe and economical.

    PubMed

    Arcovedo, R; Barrera, H; Reyes, H S

    2007-10-01

    Laparoscopic appendectomy (LA) has become very popular. One criticism of this approach is the high cost of the disposable equipment such as the linear stapler. An alternative would be suture ligation of the appendiceal base. To prove the safety of the Gea extracorporeal sliding knot (GESK) for closure of the stump after LA, a retrospective study was conducted. For this study, 63 LA procedures performed by one surgeon using the Gea knot (group A) were reviewed and compared with 63 LA procedures performed by two other surgeons (group B) using the linear stapler. The GESK is created with 0-prolene in the manner already described. The main variable was the presence or absence of blowout, leak, or fistula from the appendiceal stump. The secondary variables were abdominal abscess, wound infection, and need for readmission or reoperation. The results were analyzed using the appropriate statistical methods. Both groups were similar in terms of age, gender, and pathologic diagnosis. No patient in group A or B experienced a colonic fistula, stump blowout, or leak. In group A, one patient experienced interloop abscesses. There were two wound infections. In group B, one patient experienced a wound infection, and another patient had a wound dehiscence of the umbilical port, which required reoperation. No statistical differences were noted between the two groups. There are surgeons who routinely use sutures to secure the stump of the appendectomy. This study aimed to demonstrate that the GESK is as secure as the stapler for closure of the appendiceal stump. The GESK could be passed through a 5-mm trocar, potentially avoiding complications of a larger trocar site. The GESK seems to be an economic and safe alternative to the stapler.

  19. Adult Attachment Affects Neural Response to Preference-Inferring in Ambiguous Scenarios: Evidence From an fMRI Study

    PubMed Central

    Zhang, Xing; Ran, Guangming; Xu, Wenjian; Ma, Yuanxiao; Chen, Xu

    2018-01-01

    Humans are highly social animals, and the ability to cater to the preferences of other individuals is encouraged by society. Preference-inferring is an important aspect of the theory of mind (TOM). Many previous studies have shown that attachment style is closely related to TOM ability. However, little is known about the effects of adult attachment style on preferences inferring under different levels of certainty. Here, we investigated how adult attachment style affects neural activity underlying preferences inferred under different levels of certainty by using functional magnetic resonance imaging (fMRI). The fMRI results demonstrated that adult attachment influenced the activation of anterior insula (AI) and inferior parietal lobule (IPL) in response to ambiguous preference-inferring. More specifically, in the ambiguous preference condition, the avoidant attached groups exhibited a significantly enhanced activation than secure and anxious attached groups in left IPL; the anxious attached groups exhibited a significantly reduced activation secure attached group in left IPL. In addition, the anxious attached groups exhibited a significantly reduced activation than secure and avoidant attached groups in left AI. These results were also further confirmed by the subsequent PPI analysis. The results from current study suggest that, under ambiguous situations, the avoidant attached individuals show lower sensitivity to the preference of other individuals and need to invest more cognitive resources for preference-reasoning; while compared with avoidant attached group, the anxious attached individuals express high tolerance for uncertainty and a higher ToM proficiency. Results from the current study imply that differences in preference-inferring under ambiguous conditions associated with different levels of individual attachment may explain the differences in interpersonal interaction. PMID:29559932

  20. The Basic Shelf Experience: a comprehensive evaluation.

    PubMed

    Dewolfe, Judith A; Greaves, Gaye

    2003-01-01

    The Basic Shelf Experience is a program designed to assist people living on limited incomes to make better use of their food resources. The purpose of this research was to learn if the Basic Shelf Experience program helps such people to 1. utilize food resources more effectively and 2. cope, through group support, with poverty-associated stressors that influence food security. Both quantitative and qualitative methods were used to evaluate the program objectives. Participants completed a questionnaire at the beginning and end of the six-week program. The questionnaire asked about their food access, food security, and feelings about themselves. Participants returned for a focus group discussion and completed the questionnaire again three months after the program ended. The focus group was designed to elicit information about perceived changes, if any, attributed to the program. Forty-two people completed the questionnaires pre-program and 20 post-program; 17 participated in the three-month follow-up session. While results from quantitative data analysis indicate that program objectives were not met, qualitative data provide evidence that the program did achieve its stated objectives. Our results suggest such programs as the Basic Shelf Experience can assist people living on limited incomes to achieve food security.

  1. Adaptation in Arctic circumpolar communities: food and water security in a changing climate.

    PubMed

    Berner, James; Brubaker, Michael; Revitch, Boris; Kreummel, Eva; Tcheripanoff, Moses; Bell, Jake

    2016-01-01

    The AMAP Human Health Assessment Group has developed different adaptation strategies through a long-term collaboration with all Arctic countries. Different adaptation strategies are discussed, with examples mainly from native population groups in Alaska.

  2. The changing face of Hanford security 1990--1994

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thielman, J.

    The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE`s Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almostmore » literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here.« less

  3. Very low food security in the USA is linked with exposure to violence.

    PubMed

    Chilton, Mariana M; Rabinowich, Jenny R; Woolf, Nicholas H

    2014-01-01

    To investigate characteristics of exposure to violence in relation to food security status among female-headed households. Ongoing mixed-method participatory action study. Questions addressed food insecurity, public assistance, and maternal and child health. Grounded theory analysis of qualitative themes related to violence was performed. These themes were then categorized by food security status. Homes of low-income families in Philadelphia, PA, USA. Forty-four mothers of children under 3 years of age participating in public assistance programmes. Forty women described exposure to violence ranging from fear of violence to personal experiences with rape. Exposure to violence affected mental health, ability to continue school and obtain work with living wages, and subsequently the ability to afford food. Exposure to violence during childhood and being a perpetrator of violence were both linked to very low food security status and depressive symptoms. Ten of seventeen (59%) participants reporting very low food security described life-changing violence, compared with three of fifteen (20%) participants reporting low food security and four of twelve (33%) reporting food security. Examples of violent experiences among the very low food secure group included exposure to child abuse, neglect and rape that suggest exposure to violence is an important factor in the experience of very low food security. Descriptions of childhood trauma and life-changing violence are linked with severe food security. Policy makers and clinicians should incorporate violence prevention efforts when addressing hunger.

  4. Seasonal Difference in National School Lunch Program Participation and Its Impacts on Household Food Security.

    PubMed

    Huang, Jin; Kim, Youngmi; Barnidge, Ellen

    2016-11-20

    The National School Lunch Program (NSLP) is one of the most important food assistance programs in the United States to ensure children's food security and healthy development. Previous studies have offered mixed results and challenges in estimating the effects of program participation. This study assesses NSLP's effect on household food security using data from the Survey of Income and Program Participation (SIPP). SIPP collects information on food security that covers four reference months, including both summer (June, July, August) and nonsummer months. The number of summer months in these four reference months varies by SIPP rotation group. These unique features allow this study to address the potential selection bias in the research of NSLP and food security by examining a seasonal difference in program participation. The analysis found that one more summer month in the reference period increases the difference in low food security rates by about 1.5 percentage points between recipients and nonrecipients eligible for free or reduced-price lunch. Findings have important social work and health policy implications for increasing food security among low-income households with children. © 2016 National Association of Social Workers.

  5. Securing All intraVenous devices Effectively in hospitalised patients—the SAVE trial: study protocol for a multicentre randomised controlled trial

    PubMed Central

    Rickard, Claire M; Marsh, Nicole; Webster, Joan; Playford, E Geoffrey; McGrail, Matthew R; Larsen, Emily; Keogh, Samantha; McMillan, David; Whitty, Jennifer A; Choudhury, Md Abu; Dunster, Kimble R; Reynolds, Heather; Marshall, Andrea; Crilly, Julia; Young, Jeanine; Thom, Ogilvie; Gowardman, John; Corley, Amanda; Fraser, John F

    2015-01-01

    Introduction Over 70% of all hospital admissions have a peripheral intravenous device (PIV) inserted; however, the failure rate of PIVs is unacceptably high, with up to 69% of these devices failing before treatment is complete. Failure can be due to dislodgement, phlebitis, occlusion/infiltration and/or infection. This results in interrupted medical therapy; painful phlebitis and reinsertions; increased hospital length of stay, morbidity and mortality from infections; and wasted medical/nursing time. Appropriate PIV dressing and securement may prevent many cases of PIV failure, but little comparative data exist regarding the efficacy of various PIV dressing and securement methods. This trial will investigate the clinical and cost-effectiveness of 4 methods of PIV dressing and securement in preventing PIV failure. Methods and analysis A multicentre, parallel group, superiority randomised controlled trial with 4 arms, 3 experimental groups (tissue adhesive, bordered polyurethane dressing, sutureless securement device) and 1 control (standard polyurethane dressing) is planned. There will be a 3-year recruitment of 1708 adult patients, with allocation concealment until randomisation by a centralised web-based service. The primary outcome is PIV failure which includes any of: dislodgement, occlusion/infiltration, phlebitis and infection. Secondary outcomes include: types of PIV failure, PIV dwell time, costs, device colonisation, skin colonisation, patient and staff satisfaction. Relative incidence rates of device failure per 100 devices and per 1000 device days with 95% CIs will summarise the impact of each dressing, and test differences between groups. Kaplan-Meier survival curves (with log-rank Mantel-Cox test) will compare device failure over time. p Values of <0.05 will be considered significant. Secondary end points will be compared between groups using parametric or non-parametric techniques appropriate to level of measurement. Ethics and dissemination Ethical approval has been received from Queensland Health (HREC/11/QRCH/152) and Griffith University (NRS/46/11/HREC). Results will be published according to the CONSORT statement and presented at relevant conferences. Trial registration number Australian New Zealand Clinical Trial Registry (ACTRN); 12611000769987. PMID:26399574

  6. 17 CFR Appendix D to Part 30 - Information That a Foreign Board of Trade Should Submit When Seeking No-Action Relief To Offer...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... COMMISSION FOREIGN FUTURES AND FOREIGN OPTIONS TRANSACTIONS Pt. 30, App. D Appendix D to Part 30—Information... trading of futures contracts on a group or index of securities on contract markets and derivatives... United States, a Futures Contract on a Foreign Non-Narrow-Based Security Index Traded on That Foreign...

  7. 78 FR 43959 - In the Matter of American Technologies Group, Inc., Bonanza Oil & Gas, Inc., and Gulf Coast Oil...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-22

    ..., Inc., Bonanza Oil & Gas, Inc., and Gulf Coast Oil & Gas, Inc.; Order of Suspension of Trading July 18... Commission that there is a lack of current and accurate information concerning the securities of Bonanza Oil... concerning the securities of Gulf Coast Oil & Gas, Inc. because it has not filed any periodic reports since...

  8. Chemical Facility Security: Reauthorization, Policy Issues, and Options for Congress

    DTIC Science & Technology

    2009-11-10

    chlorine disinfection to chloramine disinfection —a change identified by some advocacy groups as being an inherently safer substitution—as being...Congressional Research Service 9 such as chlorine, for purposes such as disinfection .22 Advocates for their inclusion in security regulations cite the...Science and Technology (S& T ) Directorate is engaged in a Chemical Infrastructure Risk Assessment Project that, among other goals, will assess the

  9. Executive Guide: Information Security Management. Learning From Leading Organizations

    DTIC Science & Technology

    1998-05-01

    data. In September 1996, we reported that audit reports and agency self - assessments issued during the previous 2 years showed that weak information...company has developed an efficient and disciplined process for ensuring that information security-related risks to business operations are considered and...protection group at the utility was required to approve all new applications to indicate that risks had been adequately considered. Providing self

  10. Meeting EHR security requirements: SeAAS approach.

    PubMed

    Katt, Basel; Trojer, Thomas; Breu, Ruth; Schabetsberger, Thomas; Wozak, Florian

    2010-01-01

    In the last few years, Electronic Health Record (EHR) systems have received a great attention in the literature, as well as in the industry. They are expected to lead to health care savings, increase health care quality and reduce medical errors. This interest has been accompanied by the development of different standards and frameworks to meet EHR challenges. One of the most important initiatives that was developed to solve problems of EHR is IHE (Integrating the Healthcare Enterprise), which adapts the distributed approach to store and manage healthcare data. IHE aims at standardizing the way healthcare systems exchange information in distributed environments. For this purpose it defines several so called Integration Profiles that specify the interactions and the interfaces (Transactions) between various healthcare systems (Actors) or entities. Security was considered also in few profiles that tackled the main security requirements, mainly authentication and audit trails. The security profiles of IHE currently suffer two drawbacks. First, they apply end point security methodology, which has been proven recently to be insufficient and cumbersome in distributed and heterogeneous environment. Second, the current security profiles for more complex security requirements are oversimplified, vague and do not consider architectural design. This recently changed to some extend e.g., with the introduction of newly published white papers regarding privacy [5] and access control [9]. In order to solve the first problem we utilize results of previous studies conducted in the area of security-aware IHE-based systems and the state-of-the-art Security-as-a-Service approach as a convenient methodology to group domain-wide security needs and overcome the end point security shortcomings.

  11. 76 FR 67243 - In the Matter of Accesspoint Corp., Aero Performance Products, Inc., Apex Resources Group, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-31

    ... Performance Products, Inc., Apex Resources Group, Inc., Aradyme Corp., Bancroft Uranium, Inc., Fightersoft Multimedia Corp., Fortress Financial Group, Inc., and Global Aircraft Solutions, Inc.; Order of Suspension of... securities of Aero Performance Products, Inc. because it has not filed any periodic reports since the period...

  12. Grief Counseling Groups in a Medium-Security Prison

    ERIC Educational Resources Information Center

    Olson, Margaret J.; McEwen, Margaret A.

    2004-01-01

    The authors discuss their facilitation of four grief counseling groups with male inmates in a state prison over a two-year period. Worden's Tasks of Mourning were used as a guide for the group process. Disenfranchised grief and gender and cultural issues in grieving are explored. Catalytic exercises are described, and written feedback from inmates…

  13. REARING CHILDREN TO MEET THE CHALLENGE OF CHANGE.

    ERIC Educational Resources Information Center

    DODSON, DAN W.

    PARENTS HAVE A RESPONSIBILITY IN REARING THEIR CHILDREN TO BECOME MATURE, RESPONSIBLE, AND USEFUL CITIZENS. CHILDREN SHOULD SEE AND UNDERSTAND HOW GROUPS BECOME DIFFERENTIATED. PARENTS CAN ALSO HELP CHILDREN BECOME SECURE WITHIN THEIR OWN GROUP, THEREBY LESSENING THE THREAT OF CONTACT WITH PEOPLE OF OTHER GROUPS. MAKING THE CHILDREN LOVED, WANTED,…

  14. 20 CFR 229.49 - Adjustment of benefits under family maximum for change in family group.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... for change in family group. 229.49 Section 229.49 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.49 Adjustment of benefits under family maximum for change in family group. (a...

  15. Older Adults' Knowledge of Internet Hazards

    ERIC Educational Resources Information Center

    Grimes, Galen A.; Hough, Michelle G.; Mazur, Elizabeth; Signorella, Margaret L.

    2010-01-01

    Older adults are less likely to be using computers and less knowledgeable about Internet security than are younger users. The two groups do not differ on trust of Internet information. The younger group shows no age or gender differences. Within the older group, computer users are more trusting of Internet information, and along with those with…

  16. Does standard deviation matter? Using "standard deviation" to quantify security of multistage testing.

    PubMed

    Wang, Chun; Zheng, Yi; Chang, Hua-Hua

    2014-01-01

    With the advent of web-based technology, online testing is becoming a mainstream mode in large-scale educational assessments. Most online tests are administered continuously in a testing window, which may post test security problems because examinees who take the test earlier may share information with those who take the test later. Researchers have proposed various statistical indices to assess the test security, and one most often used index is the average test-overlap rate, which was further generalized to the item pooling index (Chang & Zhang, 2002, 2003). These indices, however, are all defined as the means (that is, the expected proportion of common items among examinees) and they were originally proposed for computerized adaptive testing (CAT). Recently, multistage testing (MST) has become a popular alternative to CAT. The unique features of MST make it important to report not only the mean, but also the standard deviation (SD) of test overlap rate, as we advocate in this paper. The standard deviation of test overlap rate adds important information to the test security profile, because for the same mean, a large SD reflects that certain groups of examinees share more common items than other groups. In this study, we analytically derived the lower bounds of the SD under MST, with the results under CAT as a benchmark. It is shown that when the mean overlap rate is the same between MST and CAT, the SD of test overlap tends to be larger in MST. A simulation study was conducted to provide empirical evidence. We also compared the security of MST under the single-pool versus the multiple-pool designs; both analytical and simulation studies show that the non-overlapping multiple-pool design will slightly increase the security risk.

  17. Are patients deemed 'dangerous and severely personality disordered' different from other personality disordered patients detained in forensic settings?

    PubMed

    Howard, Rick; Khalifa, Najat; Duggan, Conor; Lumsden, John

    2012-02-01

    In 1999, the UK government initiated a programme for the assessment and treatment of individuals deemed to have 'dangerous and severe personality disorder' (DSPD). After over 10 years of specialist service development, it is not clear whether DSPD patients represent a distinct group. The aim of this study was to establish whether people admitted to DSPD hospital units could be distinguished in presentation or personality traits from people with personality disorder admitted to standard secure hospital services. Thirty-eight men detained in high-security hospital DSPD units were compared with 62 men detained in conventional medium or high security hospital units, using the Psychopathy Checklist-Revised (PCL-R) and other standard personality disorder, clinical and offending measures. Compared with their counterparts in standard services, the DSPD group had higher scores on PCL-R psychopathy, significantly more convictions before age 18 years, greater severity of institutional violence and more prior crimes of sexual violence. Regression analysis confirmed that only PCL-R Factor 1, reflecting core interpersonal and affective features of psychopathy, predicted group membership. The DSPD group emerged as having higher psychopathy scores, but as there is currently no evidence that the core personality features of psychopathy are amenable to treatment, there is little justification for treating high-psychopathy forensic patients differently from those with other disorders of personality. Copyright © 2011 John Wiley & Sons, Ltd.

  18. Seasonal food insecurity and perceived social support in rural Tanzania.

    PubMed

    Hadley, Craig; Mulder, Monique Borgerhoff; Fitzherbert, Emily

    2007-06-01

    To examine whether the occurrence of seasonal food insecurity was related to ethnicity, household wealth and perceived social support, and to assess whether social support was more efficacious in protecting against food insecurity in wealthier households. Secondary objectives were to assess the association between past food insecurity, current dietary intake and perceived health. A sample of 208 randomly selected mothers from two ethnic groups living in the same villages in rural Tanzania participated in a cross-sectional survey. Food insecurity was highly prevalent in this area, particularly among the poorer ethnic group. Half of ethnically Sukuma households fell into the most food-secure category, compared with only 20% of ethnically Pimbwe households. Among both groups, measures of household wealth and social support were strongly associated with food security. Interestingly, social support appeared to be more effective among the wealthier ethnic group/community. Past food insecurity was also related to current indicators of dietary intake and women's self-perceptions of health. Greater social support is associated with food security, suggesting that it may protect against the occurrence of seasonal food insecurity. Social support also interacts with wealth to offer greater protection against food insecurity, suggesting that increasing wealth at the community level may influence food insecurity through both direct and indirect means. Seasonal food insecurity also appears to have lasting effects that likely create and reinforce poverty.

  19. Securely Measuring the Overlap between Private Datasets with Cryptosets

    PubMed Central

    Swamidass, S. Joshua; Matlock, Matthew; Rozenblit, Leon

    2015-01-01

    Many scientific questions are best approached by sharing data—collected by different groups or across large collaborative networks—into a combined analysis. Unfortunately, some of the most interesting and powerful datasets—like health records, genetic data, and drug discovery data—cannot be freely shared because they contain sensitive information. In many situations, knowing if private datasets overlap determines if it is worthwhile to navigate the institutional, ethical, and legal barriers that govern access to sensitive, private data. We report the first method of publicly measuring the overlap between private datasets that is secure under a malicious model without relying on private protocols or message passing. This method uses a publicly shareable summary of a dataset’s contents, its cryptoset, to estimate its overlap with other datasets. Cryptosets approach “information-theoretic” security, the strongest type of security possible in cryptography, which is not even crackable with infinite computing power. We empirically and theoretically assess both the accuracy of these estimates and the security of the approach, demonstrating that cryptosets are informative, with a stable accuracy, and secure. PMID:25714898

  20. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  1. Our Nation's Travel: 1995 NPTS Early Results Report

    DOT National Transportation Integrated Search

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  2. Adaptation in Arctic circumpolar communities: food and water security in a changing climate

    PubMed Central

    Berner, James; Brubaker, Michael; Revitch, Boris; Kreummel, Eva; Tcheripanoff, Moses; Bell, Jake

    2016-01-01

    The AMAP Human Health Assessment Group has developed different adaptation strategies through a long-term collaboration with all Arctic countries. Different adaptation strategies are discussed, with examples mainly from native population groups in Alaska. PMID:27974139

  3. Indicators of food and water security in an Arctic Health context--results from an international workshop discussion.

    PubMed

    Nilsson, Lena Maria; Berner, James; Dudarev, Alexey A; Mulvad, Gert; Odland, Jon Øyvind; Parkinson, Alan; Rautio, Arja; Tikhonov, Constantine; Evengård, Birgitta

    2013-01-01

    In August 2012, a literature search with the aim of describing indicators on food and water security in an Arctic health context was initialized in collaboration between the Arctic Human Health Expert Group, SDWG/AHHEG and the AMAP (Arctic Monitoring and Assessment Programme within the Arctic Council) Human Health Assessment Group, AMAP/HHAG. In December 2012, workshop discussions were performed with representatives from both of these organizations, including 7 Arctic countries. The aim of this article is to describe the workshop discussions and the rational for the 12 indicators selected and the 9 rejected and to discuss the potential feasibility of these. Advantages and disadvantages of candidate indicators were listed. Informative value and costs for collecting were estimated separately on a 3-level scale: low, medium and high. Based on these reviews, the final selection of promoted and rejected indicators was performed and summarized in tables. Among 10 suggested indicators of food security, 6 were promoted: healthy weight, traditional food proportion in diet, monetary food costs, non-monetary food accessibility, food-borne diseases and food-related contaminants. Four were rejected: per-person dietary energy supply, food security modules, self-estimated food safety and healthy eating. Among 10 suggested indicators of water security, 6 were promoted: per-capita renewable water, accessibility of running water, waterborne diseases, drinking-water-related contaminants, authorized water quality assurance and water safety plans. Four were rejected: water consumption, types of water sources, periodic water shortages and household water costs.

  4. Indicators of food and water security in an Arctic Health context – results from an international workshop discussion

    PubMed Central

    Nilsson, Lena Maria; Berner, James; Dudarev, Alexey A.; Mulvad, Gert; Odland, Jon Øyvind; Parkinson, Alan; Rautio, Arja; Tikhonov, Constantine; Evengård, Birgitta

    2013-01-01

    In August 2012, a literature search with the aim of describing indicators on food and water security in an Arctic health context was initialized in collaboration between the Arctic Human Health Expert Group, SDWG/AHHEG and the AMAP (Arctic Monitoring and Assessment Programme within the Arctic Council) Human Health Assessment Group, AMAP/HHAG. In December 2012, workshop discussions were performed with representatives from both of these organizations, including 7 Arctic countries. The aim of this article is to describe the workshop discussions and the rational for the 12 indicators selected and the 9 rejected and to discuss the potential feasibility of these. Advantages and disadvantages of candidate indicators were listed. Informative value and costs for collecting were estimated separately on a 3-level scale: low, medium and high. Based on these reviews, the final selection of promoted and rejected indicators was performed and summarized in tables. Among 10 suggested indicators of food security, 6 were promoted: healthy weight, traditional food proportion in diet, monetary food costs, non-monetary food accessibility, food-borne diseases and food-related contaminants. Four were rejected: per-person dietary energy supply, food security modules, self-estimated food safety and healthy eating. Among 10 suggested indicators of water security, 6 were promoted: per-capita renewable water, accessibility of running water, waterborne diseases, drinking-water-related contaminants, authorized water quality assurance and water safety plans. Four were rejected: water consumption, types of water sources, periodic water shortages and household water costs. PMID:23940840

  5. Home equity conversion plans as a source of retirement income.

    PubMed

    Springer, P B

    1985-09-01

    This article describes in detail a variety of home equity conversion plans and discusses their relevance for social security beneficiaries, as well as for the aged in general. Under these plans, a dormant asset--accumulated home equity--is converted into current retirement income. The plans vary: Some are debt instruments; others involve the sale and leaseback of the residence. Some provide income for a fixed term; others offer a lifetime annuity. Some include a public subsidy; others are free of governmental involvement. The advantages and disadvantages of these plans, as well as examples of how they operate and their respective income potential, are discussed in this article. The relevance of home equity conversion plans for social security beneficiaries is illustrated by means of data from the Retirement History Study. These data allow comparison of various demographic groups in terms of their dependence on social security benefits. Each group is examined in terms of available home equity and home equity potential under several conversion plans.

  6. Attachment, attractiveness, and social interaction: a diary study.

    PubMed

    Tidwell, M C; Reis, H T; Shaver, P R

    1996-10-01

    To what extent are attachment styles manifested in natural social activity? A total of 125 participants categorized as possessing secure, avoidant, or anxious-ambivalent attachment styles kept structured social interaction diaries for 1 week. Several theoretically important findings emerged. First, compared with secure and anxious-ambivalent persons, avoidant persons reported lower levels of intimacy, enjoyment, promotive interaction, and positive emotions, and higher levels of negative emotions, primarily in opposite-sex interactions. Analyses indicated that avoidant persons may structure social activities in ways that minimize closeness. Second, secure people differentiated more clearly than either insecure group between romantic and other opposite-sex partners. Third, the subjective experiences of anxious-ambivalent persons were more variable than those of the other groups. Finally, the authors examined and rejected the possibility that attachment effects might be confounded with physical attractiveness. These findings suggest that feeling and behaviors that arise during spontaneous, everyday social activity may contribute to the maintenance of attachment styles in adulthood.

  7. Associations between the local food environment and the severity of food insecurity among new families using community food security interventions in Montreal.

    PubMed

    Pérez, Elsury; Roncarolo, Federico; Potvin, Louise

    2017-04-20

    To examine the association between the local food environment and the severity of food insecurity among new families using community food security interventions in Montreal. In this cross-sectional study, we analyzed baseline data from 785 adults aged 18-65 years enrolled in the evaluation of the effects of organizations delivering community food security interventions in Montreal. The dependent variable was household food insecurity, while the independent variable was the local food environment, assessed through: location of the most frequently used grocery store, distance between the participant's residence and the community organization used, mode of transportation, walking time to the most frequently used grocery store, satisfaction with the acceptability and affordability of food available at the most frequently used grocery store, and self-reported difficulties in accessing food. We used polytomous logistic regression to estimate the association between household food insecurity and the local food environment. In all the models, we coded food security status in three categories: food security, moderate food insecurity and severe food insecurity. The last group was used as a reference group. Our data suggest that compared to households with severe food insecurity, those with moderate food insecurity (OR = 0.43, 95% CI: 0.28-0.62) and those with food security (OR = 0.13, 95% CI: 0.06-0.26) were less likely to report difficulties in accessing food due to food affordability. Food-secure households also had lower odds of reporting difficulties in accessing food due to transportation constraints (OR = 0.18, 95% CI: 0.06-0.55) compared with severe food-insecure households. Living a distance of between 1 and 2 km from the organization used was significantly correlated with moderate food insecurity (OR = 1.80, 95% CI: 1.12-2.88). The local food environment is associated with severity of household food insecurity among new families using community food security interventions in Montreal. Future studies should study the relationship between the local food environment and food insecurity across all dimensions of food access.

  8. Review of the transportation planning process in the Denver metropolitan area

    DOT National Transportation Integrated Search

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  9. Review of the transportation planning process in the Pittsburgh metropolitan area

    DOT National Transportation Integrated Search

    2012-11-12

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  10. Development and Management of University Research Groups.

    ERIC Educational Resources Information Center

    Smith, Robert V.

    Guidelines for managers of university research groups cover securing resources, personnel, and services and choosing collaborators, as well as organizing, supervising, and controlling research activities. Attention is directed to: orientation of personnel; reporting mechanisms; boosting morale; the needs of different personnel; handling travel,…

  11. 5 CFR 9901.211 - Career groups.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Career groups. 9901.211 Section 9901.211 Administrative Personnel DEPARTMENT OF DEFENSE HUMAN RESOURCES MANAGEMENT AND LABOR RELATIONS SYSTEMS (DEPARTMENT OF DEFENSE-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF DEFENSE NATIONAL SECURITY PERSONNEL SYSTEM...

  12. Perception of health risks of electromagnetic fields by MRI radiographers and airport security officers compared to the general Dutch working population: a cross sectional analysis

    PubMed Central

    2011-01-01

    Background The amount of exposure to electromagnetic fields (EMF) at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Methods Three occupational groups, the general Dutch working population (n = 567), airport security officers who work with metal detectors (n = 106), and MRI radiographers who work with MRI (n = 193), were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Results Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. Conclusions These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF. PMID:22070906

  13. The pervasive triad of food security, gender inequity and women's health: exploratory research from sub-Saharan Africa.

    PubMed

    Hyder, Adnan A; Maman, Suzanne; Nyoni, Joyce E; Khasiani, Shaniysa A; Teoh, Noreen; Premji, Zul; Sohani, Salim

    2005-12-01

    This study was designed to explore the interactions between food securing activities, health and gender equity from the perspective of rural east African women. The specific objectives were to document the critical interaction among these three issues-food security, gender inequity, women's health within the context of sub-Saharan Africa; to describe the nature of this triad from the perspective of women farmers in Africa; and to propose a framework for linking available interventions to the vicious nature of this triad. In-depth interviews and focus group discussions were conducted with rural women farmers in Kwale District, Kenya and Bagamoyo District, Tanzania. A total of 12 in-depth interviews and 4 focus group discussions have been included in this analysis. Transcribed text from interviews and focus group discussions were coded and thematic conceptual matrices were developed to compare dimensions of common themes across interviews and settings. A thematic analysis was then performed and a framework developed to understand the nature of the triad and explore the potential for interventions within the interactions. The vicious cycle of increasing work, lack of time, and lack of independent decision making for women who are responsible for food production and health of their families, has health and social consequences. Food securing activities have negative health consequences for women, which are further augmented by issues of gender inequity. The African development community must respond by thinking of creative solutions and appropriate interventions for the empowerment of women farmers in the region to ensure their health.

  14. Perception of health risks of electromagnetic fields by MRI radiographers and airport security officers compared to the general Dutch working population: a cross sectional analysis.

    PubMed

    van Dongen, Diana; Smid, Tjabe; Timmermans, Daniëlle R M

    2011-11-09

    The amount of exposure to electromagnetic fields (EMF) at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Three occupational groups, the general Dutch working population (n = 567), airport security officers who work with metal detectors (n = 106), and MRI radiographers who work with MRI (n = 193), were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF. © 2011 van Dongen et al; licensee BioMed Central Ltd.

  15. [Social Security Needs Social Medicine: Self-image of Physicians Practicing Social Medicine in Statutory Health Insurances and Social Security Systems].

    PubMed

    Nüchtern, E; Bahemann, A; Egdmann, W; van Essen, J; Gostomzyk, J; Hemmrich, K; Manegold, B; Müller, B; Robra, B P; Röder, M; Schmidt, L; Zobel, A; von Mittelstaedt, G

    2015-09-01

    In January, 2014, the division "Social Medicine in Practice and Rehabilitation" of the German Society for Social Medicine and Prevention established a working group on the self-image of the physicians active in the field of social medicine (medical expertise and counseling). The result of this work is the contribution presented here after consensus was achieved by specialists of social medicine from different fields and institutions (social security etc.) and in good cooperation with Prof. Dr. Gostomzyk and Prof. Dr. Robra. Based on the importance of an up to date social medicine for claimants and recipients of benefits on the one hand and the social security system on the other, and also on a description of the subjects, objectives and methods the following aspects are presented: · The perspective of social medicine. · Qualification in social medicine, concerning specialist training and continuing medical education. · The fields of duty of experts in social medicine. · The proceedings in social medicine. The working group identified challenges for the specialists in social medicine by a narrowed perception of social medicine by physicians in hospitals and practice, accompanied by an enlarged importance of expertise in social medicine, by the demand for more "patient orientation" and gain of transparency, and concerning the scientific foundation of social medicine. The working group postulates: · The perspective of social medicine should be spread more widely.. · Confidence in experts of social medicine and their independency should be strengthened.. · The not case-related consulting of the staff and executives should be expanded.. · Social medicine in practice needs support by politics and society, and especially by research and teaching.. · Good cooperation and transfer of experiences of the different branches of social security are essential for the impact of social medicine.. © Georg Thieme Verlag KG Stuttgart · New York.

  16. Threshold Things That Think: Authorisation for Resharing

    NASA Astrophysics Data System (ADS)

    Peeters, Roel; Kohlweiss, Markulf; Preneel, Bart

    As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user.

  17. 26 CFR 1.367(a)-3T - Treatment of transfers of stock or securities to foreign corporations (temporary).

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... exchange. For purposes of this paragraph (e), the definitions of control group, control group member, and non-control group member in § 1.367(a)-7(f)(1), ownership interest percentage in § 1.367(a)-7(f)(7... recognizes gain equal to the product of the aggregate ownership interest percentage of such non-control group...

  18. 26 CFR 1.367(a)-3T - Treatment of transfers of stock or securities to foreign corporations (temporary).

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... exchange. For purposes of this paragraph (e), the definitions of control group, control group member, and non-control group member in § 1.367(a)-7(f)(1), ownership interest percentage in § 1.367(a)-7(f)(7... recognizes gain equal to the product of the aggregate ownership interest percentage of such non-control group...

  19. The Cognitive Battlefield: A Framework for Strategic Communications

    DTIC Science & Technology

    2011-12-01

    York: Alfred A. Knopf Publishers, 1993), 83. 35 Richard Ned Lebow, “Thucydides and Deterrence,” Security Studies, 16:2, 163-188. 36 Brayton Harris...University Press of Kansas, 2004. Harris, Brayton . Blue & Gray in Black & White: Newspapers in the Civil War. Washington DC: Brassey’s Inc...Army Capabilities. Santa Monica, CA: Rand Arroyo Center, 2009. Lebel, Udi. Communicating Security. New York, Routledge Taylor and Francis Group, 2008

  20. Facial emotion recognition and sleep in mentally disordered patients: A natural experiment in a high security hospital.

    PubMed

    Chu, Simon; McNeill, Kimberley; Ireland, Jane L; Qurashi, Inti

    2015-12-15

    We investigated the relationship between a change in sleep quality and facial emotion recognition accuracy in a group of mentally-disordered inpatients at a secure forensic psychiatric unit. Patients whose sleep improved over time also showed improved facial emotion recognition while patients who showed no sleep improvement showed no change in emotion recognition. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  1. 75 FR 41559 - In the Matter of E-Sync Networks, Inc. (n/k/a ESNI, Inc.), EchoCath, Inc., Edison Brothers Stores...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-16

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of E[dash]Sync Networks, Inc. (n/k/a ESNI, Inc.), EchoCath, Inc., Edison Brothers Stores, Inc., Electronic Technology Group, Inc. (n... information concerning the securities of E-Sync Networks, Inc. (n/k/a ESNI, Inc.) because it has not filed any...

  2. Chemical Facility Security: Reauthorization, Policy Issues, and Options for Congress

    DTIC Science & Technology

    2010-12-10

    gaseous chlorine disinfection to chloramine disinfection —a change identified by some advocacy groups as being an inherently safer substitution—as being...chemicals, such as chlorine, for purposes such as disinfection .29 Advocates for their inclusion in security regulations cite the presence of such...Science and Technology (S& T ) Directorate is engaged in a Chemical Infrastructure Risk Assessment Project that, among other goals, will assess the

  3. Asian Americans. A Status Report

    DTIC Science & Technology

    1990-03-01

    concentrations of Asian Americans, now employ bilingual staff. The Social Security Administration, for example, once a week sends a bilin- gual Cantonese ...Survey of Income and Program Participation SsA Social Security Administration 1 SlplePhnelltal S(’Curity Ifncoin WIC Special Sipplcnicit’al Food Prograin...return for fear of persecution on the basis of race, religion, nationality, membership in a part,,- ular social group, or political opinion. (In certain

  4. Social problem-solving interventions in medium secure settings for women.

    PubMed

    Long, C G; Fulton, B; Dolley, O; Hollin, C R

    2011-10-01

    Problem-solving interventions are a feature of overall medium secure treatment programmes. However, despite the relevance of such treatment to personality disorder there are few descriptions of such interventions for women. Beneficial effects for women who completed social problem-solving group treatment were evident on a number of psychometric assessments. A treatment non-completion rate of one-third raises questions of both acceptability and timing of cognitive behavioural interventions.

  5. Enduring Attraction: America’s Dependence on and Need to Secure Its Supply of Permanent Magnets

    DTIC Science & Technology

    2011-02-16

    AIR WAR COLLEGE AIR UNIVERSITY ENDURING ATTRACTION: AMERICA‟S DEPENDENCE ON AND NEED TO SECURE ITS SUPPLY OF PERMANENT MAGNETS by...February 2011 Distribution A: Approved for public release; distribution unlimited ii DISCLAIMER The views expressed in this academic...command of the 628th Mission Support Group at Joint Base Charleston, South Carolina following graduation from Air War College. iv TABLE OF CONTENTS

  6. The Fracturing of China? Ethnic Separatism and Political Violence in the Xinjiang Uyghur Autonomous Region

    DTIC Science & Technology

    2007-09-01

    deprivation, rational choice 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18 . SECURITY CLASSIFICATION OF THIS PAGE...Prescribed by ANSI Std. 239- 18 ii THIS PAGE INTENTIONALLY LEFT BLANK iii Approved for public release; distribution is unlimited. THE...psychological, or erotic in nature.10 This argument purports that when individuals participate within a group for the advancement of collective good, they

  7. Projected Successes and Shortfalls of a Semi-Permanent Inspection Location in Western Lake Erie for Vessels Entering the United States and Its Effect on National Security

    DTIC Science & Technology

    2013-06-13

    Department of Homeland Security Northern Border Strategy states that the open travel through the maritime environment increases the possibility that a...for success in this thesis and in class, but for the rest of my career. I would also like to express my gratitude to my classmates in Staff Group ...

  8. Augmented Performance Environment for Enhancing Interagency Coordination in Stability, Security, Transition, and Reconstruction (SSTR) Operations

    DTIC Science & Technology

    2009-02-01

    assessments and meeting rehearsal and individual learning materials • Specify the metrics to be used to capture the quality of interagency...government; • Improve security; and • Promote reconstruction (Barno, 2004; Dziedzic & Siedl, 2005; Center for Army Lessons Learned (CALL), 2007). The...their orientations and creating group-level, hierarchical orientations out of the aggregated individual orientations (Wan, Chiu, Peng, & Tam , 2007

  9. The Mexican Social Security counterreform: pensions for profit.

    PubMed

    Laurell, A C

    1999-01-01

    The social security counterreform, initiated in 1997, forms part of the neoliberal reorganization of Mexican society. The reform implies a profound change in the guiding principles of social security, as the public model based on integrality, solidarity, and redistribution is replaced by a model based on private administration of funds and services, individualization of entitlement, and reduction of rights. Its economic purpose is to move social services and benefits into the direct sphere of private capital accumulation. Although these changes will involve the whole social security system--old-age and disability pensions, health care, child care, and workers' compensation--they are most immediately evident in the pension scheme. The pay-as-you-go scheme is being replaced by privately managed individual retirement accounts which especially favor the big financial groups. These groups are gaining control over huge amounts of capital, are authorized to charge a high commission, and run no financial risks. The privatization of the system requires decisive state intervention with a legal change and a sizable state subsidy (1 to 1.5 percent of GNP) over five decades. The supposed positive impact on economic growth and employment is uncertain. A review of the new law and of the estimates of future annuities reveals shrinking pension coverage and inadequate incomes from pensions.

  10. Attention Bias of Avoidant Individuals to Attachment Emotion Pictures.

    PubMed

    Liu, Ying; Ding, Yi; Lu, Luluzi; Chen, Xu

    2017-01-27

    How attachment style affects emotion processing is tightly connected with individuals' attention bias. This experiment explored avoidant individuals' attentional engagement and attentional disengagement using a cue-target paradigm in fMRI. The experimental group consisted of 17 avoidant participants, while the control group consisted of 16 secure participants; these were identified by the Experiences in Close Relationships inventory and the Relationship Questionnaire. Each reacted to pictures of positive parent-child attachment, negative parent-child attachment, positive romantic attachment, negative romantic attachment, and neutral non-attachment. Behaviorally, avoidant individuals were slower than secure individuals in responding to emotions and their attentional disengagement effect for negative parent-child emotions was stronger than positive ones. fMRI results showed that avoidant compared to secure individuals activated more strongly in the right superior temporal gyrus, middle occipital gyrus, and the left medial frontal gyrus, middle occipital gyrus, supplementary motor area, and cingulate gyrus. They also showed stronger activation in disengaging from positive than negative emotions in the bilateral fusiform and middle occipital gyri. In conclusion, avoidant individuals could detect emotions as effective as secure individuals in attentioal engaging stages. They can disengage from positive emotions with effective cognitive resources and were harder to get rid of negative emotions with insufficient resource.

  11. Supplemental security income and social security disability insurance coverage among long-term childhood cancer survivors.

    PubMed

    Kirchhoff, Anne C; Parsons, Helen M; Kuhlthau, Karen A; Leisenring, Wendy; Donelan, Karen; Warner, Echo L; Armstrong, Gregory T; Robison, Leslie L; Oeffinger, Kevin C; Park, Elyse R

    2015-06-01

    Supplemental security income (SSI) and social security disability insurance (DI) are federal programs that provide disability benefits. We report on SSI/DI enrollment in a random sample of adult, long-term survivors of childhood cancer (n = 698) vs a comparison group without cancer (n = 210) from the Childhood Cancer Survivor Study who completed a health insurance survey. A total of 13.5% and 10.0% of survivors had ever been enrolled on SSI or DI, respectively, compared with 2.6% and 5.4% of the comparison group. Cranial radiation doses of 25 Gy or more were associated with a higher risk of current SSI (relative risk [RR] = 3.93, 95% confidence interval [CI] = 2.05 to 7.56) and DI (RR = 3.65, 95% CI = 1.65 to 8.06) enrollment. Survivors with severe/life-threatening conditions were more often enrolled on SSI (RR = 3.77, 95% CI = 2.04 to 6.96) and DI (RR = 2.73, 95% CI = 1.45 to 5.14) compared with those with mild/moderate or no health conditions. Further research is needed on disability-related financial challenges after childhood cancer. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  12. Safety and privacy outcomes from a moderated online social therapy for young people with first-episode psychosis.

    PubMed

    Gleeson, John F; Lederman, Reeva; Wadley, Greg; Bendall, Sarah; McGorry, Patrick D; Alvarez-Jimenez, Mario

    2014-04-01

    Internet-based treatments for early psychosis offer considerable promise, but safety and security need to be established. This study pilot tested Horyzons, a novel online treatment application that integrates purpose-built moderated social networking with psychoeducation for recovery from early psychosis. Safety, privacy, and security were evaluated during a one-month single-group trial with 20 young consumers recovering from early psychosis who were recruited in Melbourne, Australia. Known clinical risk factors informed the safety protocol. Safety, privacy, and security were evaluated with respect to relapse and self-harm, users' perceptions of safety and privacy, and activity using Horyzons. No clinical or security problems with use of Horyzons were noted. Participants described feeling safe and trusting Horyzons. Private moderated online social networking combined with psychoeducation was a safe and secure therapeutic environment for consumers recovering from a first episode of psychosis. Testing the intervention in a randomized controlled trial is warranted.

  13. Mothers who are securely attached in pregnancy show more attuned infant mirroring at 7 months postpartum

    PubMed Central

    Kim, Sohye; Fonagy, Peter; Allen, Jon; Martinez, Sheila; Iyengar, Udita; Strathearn, Lane

    2014-01-01

    This study contrasted two forms of mother-infant mirroring: the mother's imitation of the infant's facial, gestural, or vocal behavior (i.e., “direct mirroring”) and the mother's ostensive verbalization of the infant's internal state, marked as distinct from the infant's experience (i.e., “intention mirroring”). Fifty mothers completed the Adult Attachment Interview during the third trimester of pregnancy. Mothers returned with their infants 7 months postpartum and completed a modified still-face procedure. While direct mirroring did not distinguish between secure and insecure/dismissing mothers, secure mothers were observed to engage in intention mirroring more than twice as frequently as did insecure/dismissing mothers. Infants of the two mother groups also demonstrated differences, with infants of secure mothers directing their attention toward their mothers at a higher frequency than did infants of insecure/dismissing mothers. The findings underscore marked and ostensive verbalization as a distinguishing feature of secure mothers’ well-attuned, affect-mirroring communication with their infants. PMID:25020112

  14. Development of an Internet Security Policy for health care establishments.

    PubMed

    Ilioudis, C; Pangalos, G

    2000-01-01

    The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.

  15. Airport Viz - a 3D Tool to Enhance Security Operations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Koch, Daniel B

    2006-01-01

    In the summer of 2000, the National Safe Skies Alliance (NSSA) awarded a project to the Applied Visualization Center (AVC) at the University of Tennessee, Knoxville (UTK) to develop a 3D computer tool to assist the Federal Aviation Administration security group, now the Transportation Security Administration (TSA), in evaluating new equipment and procedures to improve airport checkpoint security. A preliminary tool was demonstrated at the 2001 International Aviation Security Technology Symposium. Since then, the AVC went on to construct numerous detection equipment models as well as models of several airports. Airport Viz has been distributed by the NSSA to amore » number of airports around the country which are able to incorporate their own CAD models into the software due to its unique open architecture. It provides a checkpoint design and passenger flow simulation function, a layout design and simulation tool for checked baggage and cargo screening, and a means to assist in the vulnerability assessment of airport access points for pedestrians and vehicles.« less

  16. 77 FR 59986 - General Motors Vehicle Manufacturing Including On-Site Leased Workers from Aerotek, Kelly...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-01

    ..., Shreveport Ramp Services, Dana Holding Corporation, The Landing of GM, Filtration Services Group, BASF, G4s..., Shreveport Ramp Services, Dana Holding Corporation, The Landing of GM, Filtration Services Group, BASF, G4S... Corporation, The Landing of GM, Filtration Services Group, BASF, G4S Secure Services, Seibert Powder Coating...

  17. 76 FR 26331 - Dijji Corp., Hydro Environmental Resources, Inc. (n/k/a EXIM Internet Group, Inc.), Hydrogen...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-06

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Dijji Corp., Hydro Environmental Resources, Inc. (n/k/a EXIM Internet Group, Inc.), Hydrogen Power, Inc., and InsynQ, Inc.; Order of Suspension of... Environmental Resources, Inc. (n/k/a EXIM Internet Group, Inc.) because it has not filed any periodic reports...

  18. 76 FR 70520 - Rovac Corp., RS Group of Companies, Inc., Rymer Foods, Inc. Stratus Services Group, Inc., Sun Cal...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-14

    ...., Rymer Foods, Inc. Stratus Services Group, Inc., Sun Cal Energy, Inc., Sun Motor International, Inc... current and accurate information concerning the securities of Sun Cal Energy, Inc. because it has not... Sun Motor International, Inc. because it has not filed any periodic reports since the period ended...

  19. Ethnicity, Household Food Security, and Nutrition and Activity Patterns in Families With Preschool Children.

    PubMed

    Asfour, Lila; Natale, Ruby; Uhlhorn, Susan; Arheart, Kris L; Haney, Kanathy; Messiah, Sarah E

    2015-01-01

    This study evaluated the relationship between food security and child nutritional intake, sedentary behavior, and body mass index (BMI) and potential moderation by ethnic subgroup membership. Cross-sectional data analysis from baseline data of a preschool intervention trial. Twenty-eight subsidized child care centers in Miami-Dade County, FL. Children ages 2 to 5 (n = 1,211) and their caregivers. The BMI percentile and the following 4 factors (via confirmatory factor analysis): food security, consumption of fruits/vegetables, consumption of unhealthy foods, and sedentary behaviors. Separate linear mixed models tested relationships between food security and main outcome measures with an interaction term to test for possible moderation by ethnicity. Results indicated a significant relationship (P < .05) between food security and child consumption of fruit/vegetables, consumption of unhealthy foods, and sedentary behavior, but not with BMI percentile. With greater food security, Haitians reported greater consumption of fruit/vegetables and sedentary behavior. With greater food security, Cubans and non-Hispanic whites reported less consumption of unhealthy foods, while Haitians reported greater consumption. Results showed higher food security was associated with higher consumption of fruit/vegetables, consumption of unhealthy foods, and sedentary behavior, but this was moderated by ethnicity. Implications for healthy weight interventions among low-income preschoolers should focus on the importance of food security and tailor intervention strategies for diverse ethnic groups accordingly. Copyright © 2015 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  20. Does political ideology moderate stress: the special case of soldiers conducting forced evacuation.

    PubMed

    Shechner, Tomer; Slone, Michelle; Bialik, Gadi

    2007-04-01

    This study examined the moderating role of political ideology on psychological outcomes for Israeli soldiers participating in the forced evacuation of Jewish settlements from Gaza. Change in psychopathology and well-being was assessed for 3 concurrent mission groups differing in their political ideological contentiousness--forced evacuation, Gaza security, and Northern border security. After soldiers in each mission group were classified on the basis of relatively left- or right-wing political ideological tendencies, the authors examined differential impact of each mission on soldiers of differing political ideology. Results confirmed strong moderation effects of political ideology on psychological outcomes in these extreme contexts. Implications for research, prevention, and treatment are discussed. 2007 APA, all rights reserved

  1. Attachment anxiety benefits from security priming: Evidence from working memory performance

    PubMed Central

    2018-01-01

    The present study investigates the relationship between the attachment dimensions (anxious vs. avoidance) and the cognitive performance of individuals, specifically whether the attachment dimensions would predict the working memory (WM) performance. In the n-back task, reflecting the WM capacity, both attachment related and non-attachment related words were used. Participants were randomly assigned into two groups that received either the secure or the neutral subliminal priming. In the secure priming condition, the aim was to induce sense of security by presenting secure attachment words prior to the n-back task performance. In neutral priming condition, neutral words that did not elicit sense of security were presented. Structural equation modeling revealed divergent patterns for attachment anxiety and avoidance dimensions under the different priming conditions. In neutral priming condition, WM performance declined in terms of capacity in the n-back task for individuals who rated higher levels of attachment anxiety. However in the secure priming condition, WM performance was boosted in the n-back task for individuals who rated higher levels of attachment anxiety. In other words, the subliminal priming of the security led to increased WM capacity of individuals who rated higher levels of attachment anxiety. This effect, however, was not observed for higher levels of attachment avoidance. Results are discussed along the lines of hyperactivation and deactivation strategies of the attachment system. PMID:29522549

  2. U.S.-CHINA RADIOLOGICAL SOURCE SECURITY PROJECT: CONTINUING AND EXPANDING BILATERAL COOPERATION

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun

    2009-10-07

    The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy’s National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic andmore » beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.« less

  3. Arm yourself for the coming battle over Social Security.

    PubMed

    Pozen, Robert C

    2002-11-01

    The U.S. Social Security system is in deep trouble--and that's not just bad news for your friends and family. It's also bad news for your company. Unless the Social Security system is changed, by 2017 the cash flowing out of it will exceed the cash coming in, and by 2041 the system will be utterly insolvent. But the trouble will start sooner than that: In the next decade, the very prospect of the rising deficit will mean serious pressure on recent tax cuts, higher long-term interest rates, increased pension-funding costs, and other punishing conditions for U.S. businesses. Clearly, there's a lot at stake for companies, which is why executives need to participate in the growing debate about Social Security reform, says Robert Pozen, a visiting professor at Harvard Law School who served on the President's Commission to Strengthen Social Security. In this article, he urges business leaders to take a stance on how the system should be reformed, suggesting they work with interest groups to make their voices heard. After taking a comprehensive look at the debates surrounding Social Security reform, Pozen outlines the three main alternatives executives might choose to support: increasing contributions to Social Security, decreasing the growth of benefits for more-affluent workers, and increasing investment returns on Social Security assets. What's needed to fix the current system, he contends, is a careful balance of all three.

  4. Predictive validity of the HCR-20 for inpatient aggression: the effect of intellectual disability on accuracy.

    PubMed

    O'Shea, L E; Picchioni, M M; McCarthy, J; Mason, F L; Dickens, G L

    2015-11-01

    People with intellectual disability (ID) account for a large proportion of aggressive incidents in secure and forensic psychiatric services. Although the Historical, Clinical, Risk Management 20 (HCR-20) has good predictive validity in inpatient settings, it does not perform equally in all groups and there is little evidence for its efficacy in those with ID. A pseudo-prospective cohort study of the predictive efficacy of the HCR-20 for those with ID (n = 109) was conducted in a UK secure mental health setting using routinely collected risk data. Performance of the HCR-20 in the ID group was compared with a comparison group of adult inpatients without an ID (n = 504). Analysis controlled for potential covariates including security level, length of stay, gender and diagnosis. The HCR-20 total score was a significant predictor of any aggression and of physical aggression for both groups, although the area under the curve values did not reach the threshold for a large effect size. The clinical subscale performed significantly better in those without an ID compared with those with. The ID group had a greater number of relevant historical and risk management items. The clinicians' summary judgment significantly predicted both types of aggressive outcomes in the ID group, but did not predict either in those without an ID. This study demonstrates that, after controlling for a range of potential covariates, the HCR-20 is a significant predictor of inpatient aggression in people with an ID and performs as well as for a comparison group of mentally disordered individuals without ID. The potency of HCR-20 subscales and items varied between the ID and comparison groups suggesting important target areas for improved prediction and risk management interventions in those with ID. © 2015 MENCAP and International Association of the Scientific Study of Intellectual and Developmental Disabilities and John Wiley & Sons Ltd.

  5. Client Personality Variables Associated with Counselor Perceptions.

    ERIC Educational Resources Information Center

    Livneh, Hanoch

    1979-01-01

    Studies the relationship between clients' personality variables and rehabilitation counselors' perception of these variables. Four client groups were created along two dimensions of personality variables: emotional security need and sexual problems. A significant relationship was found between the client's group membership and his evaluation with…

  6. Origins of Ethnic Strife.

    ERIC Educational Resources Information Center

    Firestone, Robert W.

    Group identification is a major cause of religious, racial, and international conflict. Many forms of group identification are fantasy bonds, imagined connections with others offering security at the expense of individual self-realization. The fantasy bond forms in childhood in response to inadequate parenting. Human beings are not inherently…

  7. Review of the transportation planning process in the Portland, Orgeon, metropolitan area

    DOT National Transportation Integrated Search

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  8. Review of the transportation planning process in the southern California metropolitan area

    DOT National Transportation Integrated Search

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  9. Review of the transportation planning process in the Minneapolis-St. Paul metropolitan area

    DOT National Transportation Integrated Search

    2012-11-01

    Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...

  10. Reconsidering non-traditional export agriculture and household food security: A case study in rural Guatemala

    PubMed Central

    Bennett, Elena M.

    2018-01-01

    As the production of non-traditional export (NTX) crops by smallholder households in developing countries expands, there is a compelling need to understand the potential effects of this type of agricultural production on household food security and nutrition. We use two household surveys with a sample of 52 households, interviews, and focus groups to examine whether smallholder farmers who produce broccoli for export in a rural Guatemalan community have different household food security than farmers in the same community who are still growing traditional maize and bean crops. We explore and compare the food security status of broccoli farmers (adopters) and traditional farmers (non-adopters) across four dimensions of food security: availability, access, utilization, and stability. Adopters earned significantly more income (40%) than non-adopters, but higher incomes did not coincide with improvements in food availability, food access, or food utilization. Results indicate that adopters and non-adopters alike struggle with access to food, while the intensity of broccoli production may be undermining the ability of local agricultural systems to naturally control pests and regulate nutrients. More systematic approaches to food security assessment, especially those that consider all four dimensions of food security, are needed to better target interventions designed to alleviate food insecurity among rural smallholders. PMID:29795691

  11. Reconsidering non-traditional export agriculture and household food security: A case study in rural Guatemala.

    PubMed

    Méthot, Josée; Bennett, Elena M

    2018-01-01

    As the production of non-traditional export (NTX) crops by smallholder households in developing countries expands, there is a compelling need to understand the potential effects of this type of agricultural production on household food security and nutrition. We use two household surveys with a sample of 52 households, interviews, and focus groups to examine whether smallholder farmers who produce broccoli for export in a rural Guatemalan community have different household food security than farmers in the same community who are still growing traditional maize and bean crops. We explore and compare the food security status of broccoli farmers (adopters) and traditional farmers (non-adopters) across four dimensions of food security: availability, access, utilization, and stability. Adopters earned significantly more income (40%) than non-adopters, but higher incomes did not coincide with improvements in food availability, food access, or food utilization. Results indicate that adopters and non-adopters alike struggle with access to food, while the intensity of broccoli production may be undermining the ability of local agricultural systems to naturally control pests and regulate nutrients. More systematic approaches to food security assessment, especially those that consider all four dimensions of food security, are needed to better target interventions designed to alleviate food insecurity among rural smallholders.

  12. Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android

    PubMed Central

    Dehling, Tobias; Gao, Fangjian; Schneider, Stephan

    2015-01-01

    Background Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex. Objective The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements. Methods We assessed apps available in English and offered in the categories “Medical” and “Health & Fitness” in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties. Results We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose at least some potential damage through information security and privacy infringements. There were 11.67% (2098/17,979) of apps that scored the highest assessments of potential damages. Conclusions Various kinds of mHealth apps collect and offer critical, sensitive, private medical information, calling for a special focus on information security and privacy of mHealth apps. In order to foster user acceptance and trust, appropriate security measures and processes need to be devised and employed so that users can benefit from seamlessly accessible, tailored mHealth apps without exposing themselves to the serious repercussions of information security and privacy infringements. PMID:25599627

  13. Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android.

    PubMed

    Dehling, Tobias; Gao, Fangjian; Schneider, Stephan; Sunyaev, Ali

    2015-01-19

    Mobile health (mHealth) apps aim at providing seamless access to tailored health information technology and have the potential to alleviate global health burdens. Yet, they bear risks to information security and privacy because users need to reveal private, sensitive medical information to redeem certain benefits. Due to the plethora and diversity of available mHealth apps, implications for information security and privacy are unclear and complex. The objective of this study was to establish an overview of mHealth apps offered on iOS and Android with a special focus on potential damage to users through information security and privacy infringements. We assessed apps available in English and offered in the categories "Medical" and "Health & Fitness" in the iOS and Android App Stores. Based on the information retrievable from the app stores, we established an overview of available mHealth apps, tagged apps to make offered information machine-readable, and clustered the discovered apps to identify and group similar apps. Subsequently, information security and privacy implications were assessed based on health specificity of information available to apps, potential damage through information leaks, potential damage through information manipulation, potential damage through information loss, and potential value of information to third parties. We discovered 24,405 health-related apps (iOS; 21,953; Android; 2452). Absence or scarceness of ratings for 81.36% (17,860/21,953) of iOS and 76.14% (1867/2452) of Android apps indicates that less than a quarter of mHealth apps are in more or less widespread use. Clustering resulted in 245 distinct clusters, which were consolidated into 12 app archetypes grouping clusters with similar assessments of potential damage through information security and privacy infringements. There were 6426 apps that were excluded during clustering. The majority of apps (95.63%, 17,193/17,979; of apps) pose at least some potential damage through information security and privacy infringements. There were 11.67% (2098/17,979) of apps that scored the highest assessments of potential damages. Various kinds of mHealth apps collect and offer critical, sensitive, private medical information, calling for a special focus on information security and privacy of mHealth apps. In order to foster user acceptance and trust, appropriate security measures and processes need to be devised and employed so that users can benefit from seamlessly accessible, tailored mHealth apps without exposing themselves to the serious repercussions of information security and privacy infringements.

  14. "I will never be the granny with rosy cheeks": perceptions of aging in precarious and financially secure middle-aged Germans.

    PubMed

    Craciun, Catrinel; Flick, Uwe

    2014-04-01

    Nowadays people are growing old in a context where youth culture is the norm and where self-initiative is required in order to prepare for a good old age. However, planning old age may be more difficult for certain social groups with insecure work and living conditions. Precariousness, defined as bad financial conditions but also as having an insecure, unpredictable existence, has been little studied in the context of aging. This study brings its contribution by exploring how middle-aged adults with different social security backgrounds (insurance versus no insurance) think about aging. Episodic interviews were conducted to explore their concepts of aging, contexts of thinking about aging and perceptions of aging. These were compared between groups who have a secure old age ahead of them (N=10) versus those who have to struggle with an uncertain present and future (N=10). Also, differences between men (N=11) and women (N=9) were addressed. Results of the thematic analysis showed the predominance of fears related to aging as well as an emerging meaninglessness attached to old age. Starting from the different images of aging found in the two studied groups, the need for tailored interventions and policy are discussed. Copyright © 2014 Elsevier Inc. All rights reserved.

  15. Security Force Assistance: Strategic, Advisory, and Partner Nation Considerations

    DTIC Science & Technology

    2010-12-01

    ethnic groups and tribes (which are further divided into sub-tribes and clans),97 spread out throughout a country with little (and in many places...and Hazara ethnic groups . Claims of certain ethnic groups receiving preferential treatment are common (and certainly not unique to the GIRoA or...the Pashtuns, despite being Afghanistan’s largest ethnic group (comprising 42% of the population),128 continue to be highly underrepresented in the

  16. Synthesis of Potential Trypanocides

    DTIC Science & Technology

    1987-12-01

    0188 Ia. REPORT SECURITY CLASSIFICATION 1b RESTRICTIVE MARKINGS Unclassified 2a. SECURITY CLASSIFICATION AUTHORITY 3 . DISTRIBUTION /AVAILABILITY OF...and the phenyl ring, ring structures 2 and 3 , introduction of a -CH:CII- group between the phenyl ring and its 4’-substituent, ring structure 4...imidazole (9, 15) thiazole (11) and pyridine (12-14) into ether-linked and vinyl-linked structures. 3 t % SCHEME 1 HETEROAROMATIC RINGS OHw Ch3 CH3 +1 N% f

  17. The Millennial Generation: Developing Leaders for the Future Security Environment

    DTIC Science & Technology

    2011-02-15

    Dumbest Generation (Penguin Group, New York, New York: 2009) p 8, 10. 19 National Academy of Sciences, “Generation Y : The Millennials …Ready or Not, Here...St ra te gy R es ea rc h Pr oj ec t THE MILLENNIAL GENERATION: DEVELOPING LEADERS FOR THE FUTURE SECURITY ENVIRONMENT BY COLONEL LANCE...Strategy Research Project 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE The Millennial Generation: Developing Leaders for the Future

  18. An Artificial Neural Network-Based Decision-Support System for Integrated Network Security

    DTIC Science & Technology

    2014-09-01

    group that they need to know in order to make team-based decisions in real-time environments, (c) Employ secure cloud computing services to host mobile...THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of Engineering and Management Air Force...out-of-the-loop syndrome and create complexity creep. As a result, full automation efforts can lead to inappropriate decision-making despite a

  19. Network Centric Warfare Case Study: U.S. V Corps and 3rd Infantry Division (Mechanized) During Operation Iraqi Freedom Combat Operations (Mar-Apr 2003). Volume 3. Network Centric Warfare Insights

    DTIC Science & Technology

    2003-01-01

    OPSEC), military deception, psychological operations (PSYOPS), special information operations (IO), information assurance, physical security...nonlethal effects, such as operational 8 Network Centric Warfare Case Study security (OPSEC), military deception, psychological operations (PSYOP...Support Operations Group ASR Alternate Supply Route; or, Ammunition Supply Rate ATACMS Army Tactical Missile System ATARS Advanced

  20. Randomized Comparative Study of the U- and H-Type Approaches of the TVT-Secur Procedure for the Treatment of Female Stress Urinary Incontinence: One-Year Follow-Up

    PubMed Central

    Kim, Jung Jun; Lee, Young-Suk

    2010-01-01

    Purpose We compared outcomes of the U- and H-type approaches of the tension-free vaginal tape (TVT)-Secur procedure for the treatment of female stress urinary incontinence (SUI). Materials and Methods From March 2007 to July 2008, 115 women with SUI underwent TVT-Secur by a single surgeon. Patients were randomly assigned to either the U- or the H-type approach. After 12 months, postoperative changes in the Sandvik questionnaire, incontinence quality of life questionnaire (I-QoL), Bristol female lower urinary tract symptoms-scored form (BFLUTS-SF), and postoperative patient satisfaction were evaluated. Cure was regarded as no leakage on the Sandvik questionnaire. Complications were also evaluated. Results Of 115 women, 53 were treated with the U approach, and 62 women were treated with the H approach. At 12 months, 88.7% of those treated with the U approach and 87.1% of those treated with the H approach were cured (p=0.796). The I-QoL and filling, incontinence, sexual function, and QoL sum (BFLUTS-SF) scores were improved with both approaches, and there were no significant differences in the degree of improvement between approaches. Approximately 83.7% and 82.9% of the women treated with the U and H approaches, respectively, were satisfied with the outcome (p=0.858). There were 3 cases of intra-operative vaginal wall perforation in the H-type group. Immediate postoperative retention was observed in 2 women in the U-type group and 1 woman in the H-type group. One woman in the U-type group underwent tape releasing and cutting procedures for persistent large post-void residuals. Conclusions The U- and the H-type approaches of the TVT-Secur procedure provided comparable effectiveness for the treatment of female SUI. PMID:20428427

Top