Contains basic information on the role and origins of the Selected Analytical Methods including the formation of the Homeland Security Laboratory Capacity Work Group and the Environmental Evaluation Analytical Process Roadmap for Homeland Security Events
33 CFR 104.405 - Format of the Vessel Security Plan (VSP).
Code of Federal Regulations, 2010 CFR
2010-07-01
...) Communications; (9) Security systems and equipment maintenance; (10) Security measures for access control... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Format of the Vessel Security... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Plan (VSP) § 104.405 Format of the...
Code of Federal Regulations, 2010 CFR
2010-01-01
... product to a security interest, on EFS and master list-format. 205.102 Section 205.102 Animals and Animal... of person subjecting a farm product to a security interest, on EFS and master list—format. On an EFS, and on a master list, the name of the person subjecting a farm product to a security interest must...
Code of Federal Regulations, 2012 CFR
2012-01-01
... product to a security interest, on EFS and master list-format. 205.102 Section 205.102 Animals and Animal... of person subjecting a farm product to a security interest, on EFS and master list—format. On an EFS, and on a master list, the name of the person subjecting a farm product to a security interest must...
Code of Federal Regulations, 2014 CFR
2014-01-01
... product to a security interest, on EFS and master list-format. 205.102 Section 205.102 Animals and Animal... of person subjecting a farm product to a security interest, on EFS and master list—format. On an EFS, and on a master list, the name of the person subjecting a farm product to a security interest must...
Code of Federal Regulations, 2013 CFR
2013-01-01
... product to a security interest, on EFS and master list-format. 205.102 Section 205.102 Animals and Animal... of person subjecting a farm product to a security interest, on EFS and master list—format. On an EFS, and on a master list, the name of the person subjecting a farm product to a security interest must...
Code of Federal Regulations, 2011 CFR
2011-01-01
... product to a security interest, on EFS and master list-format. 205.102 Section 205.102 Animals and Animal... of person subjecting a farm product to a security interest, on EFS and master list—format. On an EFS, and on a master list, the name of the person subjecting a farm product to a security interest must...
Preventing lateral synechia formation after endoscopic sinus surgery with a silastic sheet.
Lee, Jae Yong; Lee, Seung Won
2007-08-01
To investigate whether the insertion of a Silastic sheet between the middle turbinate and lateral nasal wall can prevent lateral synechia formation when an unstable, floppy middle turbinate results from endoscopic sinus surgery (ESS). Prospective study. University hospital. Thirty patients who developed an unstable, floppy middle turbinate during ESS were allocated in order of occurrence as follows: group 1, 15 patients, 17 sides including 2 bilateral cases; group 2, 15 patients, 18 sides including 3 bilateral cases. In group 1, a fan-shaped Silastic sheet was inserted between the middle turbinate and lateral nasal wall and secured to the caudal septum. In group 2, no specific procedure was performed except for meticulous postoperative care to prevent lateralization of the middle turbinate. We observed the patients for 5 months and compared the occurrence rate of synechia formation between the 2 groups. Synechiae developed in 1 of 17 sides (6%) in group 1 and 8 of 18 sides (44%) in group 2, for success rates of 94% and 56%, respectively. The success rates differed significantly. The middle turbinate was preserved in all patients in group 1. The results of this study suggest that the insertion of a Silastic sheet in the middle meatus is a useful method for preventing lateral synechia formation and for preserving the middle turbinate.
2003-08-01
Contingency Response Group (CRG) at Moody Air Force Base (AFB), GA . DESCRIPTION OF THE PROPOSED ACTION AND ALTERNATIVES. The United States Air Force...sinkhole formation. 3.5.3.3 Soils Moody AFB Moody AFB is located in the Tifton Upland District of the Lower Coastal Plain. In general, soils on...base. Arsenic, barium, chromium, copper, iron, selenium, and zinc have been found to be naturally occurring in the area. Predominant soils are Tifton
Threat, security and attitude formation among the young
NASA Astrophysics Data System (ADS)
Radin, Furio
1985-12-01
The perception of threat to security on the part of young people reflects a central aspect of the societal phenomenon of attitude formation, whose primary function is, ideally, to meet the need for security. In all modern societies, however, the process of socialization — which by its very nature is educational in that it prepares individuals to function as members of society — operates on the principle of systematically frustrating this need by employing a system of reward and punishment based on competition. This system creates a fundamental insecurity and a corresponding attitude (de)formation in the individual, which is exploited by the state in order to consolidate the power of the dominant groups. Due to this fundamental insecurity, the individual is incapable of coping rationally with threat and seeks pseudo-security, e.g., in conformity. Threat — particularly global threat — is perceived as an external factor over which the individual has no control, i.e., it is perceived as falling exclusively within the province of those in power, whose control is further strengthened by this perception. Since the essential damage to the individual's attitude system has been done by the time he leaves school, this undesirable condition of modern societies can only be rectified by a socialization process in general — and an educational process in particular — which cultivates in the individual the development of critical judgment, free self-realization and the spirit of co-operation instead of competition.
Iraq: Post-Saddam Governance and Security
2007-08-03
in 1918 . Britain had tried to take Iraq from the Ottomans earlier in World War I but were defeated at Al Kut in 1916. Britain’s presence in Iraq...made seven opposition groups eligible to receive U.S. CRS-4 4 Because of its role in the eventual formation of the radical Ansar al-Islam group, the...head of the Hawza until his death in 1992. Like Khoi, Sistani is a “quietist” — generally opposing a direct political role for clerics, but he believes
33 CFR 106.405 - Format and content of the Facility Security Plan (FSP).
Code of Federal Regulations, 2010 CFR
2010-07-01
...; (9) Security systems and equipment maintenance; (10) Security measures for access control; (11... Facility Security Plan (FSP). 106.405 Section 106.405 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES...
Creativity: Creativity in Complex Military Systems
2017-05-25
generation later in the problem-solving process. The design process is an alternative problem-solving framework individuals or groups use to orient...no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control ...the potential of their formations. 15. SUBJECT TERMS Creativity, Divergent Thinking, Design , Systems Thinking, Operational Art 16. SECURITY
Fitzgerald, M M; Kirk, G D; Bristow, C A
2011-05-01
Service user involvement in all levels of healthcare provision is the expectation of UK government policy. Involvement should not only include participation in the planning and delivery of health care but also the exercise of choice and opinions about that care. In practice, however, service user engagement is most often tokenistic, involving post hoc consultation over plans already committed to by services. This paper explores an Occupational Therapy-led initiative to use the Serious Game format to engage low secure service users with serious mental illness in the design, layout and refurbishment of their unit. Among other things how medication was to be dispensed on the new unit was explored by this game and led to significant replanning in response to service user involvement. The game format was found to be a useful tool in facilitating communication between professionals and a traditionally marginalized and powerless client group. It enabled service users to have a voice, it provided a format for that voice to be heard and made possible service-led change in the planning process. © 2010 Blackwell Publishing.
A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking
NASA Astrophysics Data System (ADS)
Herrmann, Dominik; Scheuer, Florian; Feustel, Philipp; Nowey, Thomas; Federrath, Hannes
We propose a centralised platform for quantitative benchmarking of key performance indicators (KPI) among mutually distrustful organisations. Our platform offers users the opportunity to request an ad-hoc benchmarking for a specific KPI within a peer group of their choice. Architecture and protocol are designed to provide anonymity to its users and to hide the sensitive KPI values from other clients and the central server. To this end, we integrate user-centric peer group formation, exchangeable secure multi-party computation protocols, short-lived ephemeral key pairs as pseudonyms, and attribute certificates. We show by empirical evaluation of a prototype that the performance is acceptable for reasonably sized peer groups.
Koenig, Kristi L
2003-01-01
The terrorist attacks of 11 September 2001 led to the largest US Government transformation since the formation of the Department of Defense following World War II. More than 22 different agencies, in whole or in part, and >170,000 employees were reorganized to form a new Cabinet-level Department of Homeland Security (DHS), with the primary mission to protect the American homeland. Legislation enacted in November 2002 transferred the entire Federal Emergency Management Agency and several Department of Health and Human Services (HHS) assets to DHS, including the Office of Emergency Response, and oversight for the National Disaster Medical System, Strategic National Stockpile, and Metropolitan Medical Response System. This created a potential separation of "health" and "medical" assets between the DHS and HHS. A subsequent presidential directive mandated the development of a National Incident Management System and an all-hazard National Response Plan. While no Department of Veterans Affairs (VA) assets were targeted for transfer, the VA remains the largest integrated healthcare system in the nation with important support roles in homeland security that complement its primary mission to provide care to veterans. The Emergency Management Strategic Healthcare Group (EMSHG) within the VA's medical component, the Veteran Health Administration (VHA), is the executive agent for the VA's Fourth Mission, emergency management. In addition to providing comprehensive emergency management services to the VA, the EMSHG coordinates medical back-up to the Department of Defense, and assists the public via the National Disaster Medical System and the National Response Plan. This article describes the VA's role in homeland security and disasters, and provides an overview of the ongoing organizational and operational changes introduced by the formation of the new DHS. Challenges and opportunities for public health are highlighted.
NASA Astrophysics Data System (ADS)
Filimonova, L. A.; Skvortsova, N. K.
2017-11-01
The article examines the problematic aspects of assessing the investment attractiveness of a region associated with the consideration of methodological issues that require refinement from the point of view of its technospheric security. Such issues include the formation of a sound system of indicators for the assessment of man-made risk which has a particular impact on the level of investment attractiveness of the region. In the context of the instability of the economic situation in Russia, the problem of man-made risks assessing in the context of the regional investment attractiveness based on an integrated approach and taking into account such principles as flexibility, adaptability, innovative orientation has not only lost its relevance but was also transformed into one of the most important conditions for ensuring the effective management of all spheres of the regional activities. The article poses the classical problem of making decisions on the results of the assessment of the investment attractiveness of the region in a matrix format evaluating the utility function. The authors of the article recommended a universal risk assessment model with its subsequent synthesis into technospheric security for the comprehensive assessment of regional investment attractiveness. The principal distinguishing feature of the study results are the schemes for manipulation in the evaluation activity associated with the selection of the optimality criteria groups and models for their study. These iterations make it possible to substantiate the choice of the solution for preserving the technospheric security of the region, a field of compromises or an “ideal” solution to the problem of the regional investment attractiveness loss.
System and method for secure group transactions
Goldsmith, Steven Y [Rochester, MN
2006-04-25
A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.
76 FR 23844 - Proposed Collection of Information; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-28
... DEPARTMENT OF LABOR Employee Benefits Security Administration Proposed Collection of Information; Comment Request AGENCY: Employee Benefits Security Administration, Department of Labor. ACTION: Notice... requested data in the desired format. The Employee Benefits Security Administration (EBSA) is soliciting...
An evaluation of the construct of earned security in adolescents: evidence from an inpatient sample.
Venta, Amanda; Sharp, Carla; Shmueli-Goetz, Yael; Newlin, Elizabeth
2015-01-01
In adult attachment research, a group of individuals who convey secure attachments despite recalling difficult early caregiver relationships has been identified. The term earned security refers to individuals in this group, whereas continuous security refers to individuals who convey secure attachments and describe caring early relationships. Evidence on the validity of earned security in adults is mixed--with one longitudinal study showing that earned secure adults, despite contrary recollections, are actually more likely to have experienced positive caregiving than continuous secure adults. There is currently no evidence of earned security in adolescence, and exploring it in this age group may help shed light on the overall problem of the validity of this construct. Therefore, the broad aim of this study was to examine the construct of earned security in a group of inpatient adolescents. First, the authors aimed to identify a group of adolescents with secure attachments and memories of difficult caregiver relationships (i.e., proposed earned secure group) in a sample of 240 inpatient adolescents. Next, to explore external validity, the authors examined whether this group differed from others with regard to internalizing distress and emotion regulation. Findings indicated that a subset of secure adolescents recall difficult caregiving, as has been noted in adults, and that they differ from others with regard to emotion regulation. Despite this preliminary evidence that earned security can be identified in adolescents, the authors conclude with a discussion of the caveats of applying this construct in adolescents as well as adults.
Iraq: Post-Saddam Governance and Security
2007-09-06
Ottomans in World War I and took control of the territory in 1918 . Britain had tried to take Iraq from the Ottomans earlier in World War I but were...INA; SICI; KDP; PUK; the CRS-4 4 Because of its role in the eventual formation of the radical Ansar al-Islam group, the IMIK did not receive U.S...political role for clerics, but he believes in clerical supervision of political leaders. He wants Iraq to maintain its Islamic culture and favors modest
Iraq: Post-Saddam Governance and Security
2007-10-04
Ottoman empire after British forces defeated the Ottomans in World War I and took control of the territory in 1918 . Britain had tried to take Iraq from the... role in the eventual formation of the radical Ansar al-Islam group, the IMIK did not receive U.S. funds after 2001, although it was not formally de...was head of the Hawza until his death in 1992. Like Khoi, Sistani is a “quietist” — generally opposing a direct political role for clerics, but he
Iraq: Post-Saddam Governance and Security
2008-04-18
in 1918 . Britain had tried to take Iraq from the Ottomans earlier in World War I but were defeated at Al Kut in 1916. Britain’s presence in Iraq...States to “support efforts” to remove CRS-4 4 Because of its role in the eventual formation of the radical Ansar al-Islam group, the IMIK did not receive...in 1992. Like Khoi, Sistani is a “quietist” — generally opposing a direct political role for clerics, but he believes in clerical supervision of
Iraq: Post-Saddam Governance and Security
2007-08-15
and took control of the territory in 1918 . Britain had tried to take Iraq from the Ottomans earlier in World War I but were defeated at Al Kut in 1916...4 Because of its role in the eventual formation of the radical Ansar al-Islam group, the IMIK did not receive U.S. funds after 2001, although it was...head of the Hawza until his death in 1992. Like Khoi, Sistani is a “quietist” — generally opposing a direct political role for clerics, but he
Iraq: Post-Saddam Governance and Security
2007-10-31
after British forces defeated the Ottomans in World War I and took control of the territory in 1918 . Britain had tried to take Iraq from the Ottomans...Because of its role in the eventual formation of the radical Ansar al-Islam group, the IMIK did not receive U.S. funds after 2001, although it was not...his death in 1992. Like Khoi, Sistani is a “quietist” — generally opposing a direct political role for clerics, but he believes in clerical supervision
Iraq: Post-Saddam Governance and Security
2008-05-09
Ottomans in World War I and took control of the territory in 1918 . Britain had tried to take Iraq from the Ottomans earlier in World War I but were...support efforts” to remove CRS-4 4 Because of its role in the eventual formation of the radical Ansar al-Islam group, the IMIK did not receive U.S...is a “quietist” — generally opposing a direct political role for clerics, but he believes in clerical supervision of political leaders.10 ! Islamic
Transition of advanced technology to military, homeland security, and law enforcement users
NASA Astrophysics Data System (ADS)
Jarrett, Stephen M.
2004-09-01
With the attack on the United States and the subsequent war on terror and the wars in Afghanistan and Iraq a need has been exposed for the transition of technology to all of our defenders both combat forces on the foreign battlefield and domestic forces here at home. The establishment of the Department of Homeland Security has also provided a focus on inserting technology to dramatically improve the capability of airport security forces, law enforcement, and all first responder networks. The drastic increase in the use of Special Forces in combat has also required new advanced technology capabilities at a much faster rate of development than the standard military procurement system. Technology developers must address the questions of interoperability, cost, commercialization, of how these groups will use the technology delivered and the adoption criteria of users in the deployment environment. The successful transition to the field must address the formation of complex concepts of operations in the user's adoption criteria. Prototype transition for two systems, a pocket infrared camera and an acoustic/seismic detector, will be highlighted in their effect on the wars in Iraq and Afghanistan and in the heightening of homeland security.
Secure Obfuscation for Encrypted Group Signatures
Fan, Hongfei; Liu, Qin
2015-01-01
In recent years, group signature techniques are widely used in constructing privacy-preserving security schemes for various information systems. However, conventional techniques keep the schemes secure only in normal black-box attack contexts. In other words, these schemes suppose that (the implementation of) the group signature generation algorithm is running in a platform that is perfectly protected from various intrusions and attacks. As a complementary to existing studies, how to generate group signatures securely in a more austere security context, such as a white-box attack context, is studied in this paper. We use obfuscation as an approach to acquire a higher level of security. Concretely, we introduce a special group signature functionality-an encrypted group signature, and then provide an obfuscator for the proposed functionality. A series of new security notions for both the functionality and its obfuscator has been introduced. The most important one is the average-case secure virtual black-box property w.r.t. dependent oracles and restricted dependent oracles which captures the requirement of protecting the output of the proposed obfuscator against collision attacks from group members. The security notions fit for many other specialized obfuscators, such as obfuscators for identity-based signatures, threshold signatures and key-insulated signatures. Finally, the correctness and security of the proposed obfuscator have been proven. Thereby, the obfuscated encrypted group signature functionality can be applied to variants of privacy-preserving security schemes and enhance the security level of these schemes. PMID:26167686
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-10
... DEPARTMENT OF LABOR Employee Benefits Security Administration Proposed Extension of Information... Review Procedures for Non-Grandfathered Plans AGENCY: Employee Benefits Security Administration... collection requirements and provide the requested data in the desired format. The Employee Benefits Security...
Measuring Security Effectiveness and Efficiency at U.S. Commercial Airports
2013-03-01
formative program evaluation and policy analysis to investigate current airport security programs. It identifies innovative public administration and...policy-analysis tools that could provide potential benefits to airport security . These tools will complement the System Based Risk Management framework if
78 FR 71668 - Proposed Extension of Information Collection Requests Submitted for Public Comment
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-29
... DEPARTMENT OF LABOR Employee Benefits Security Administration Proposed Extension of Information Collection Requests Submitted for Public Comment AGENCY: Employee Benefits Security Administration... collection requirements and provide the requested data in the desired format. The Employee Benefits Security...
77 FR 26641 - Aviation Security Advisory Committee (ASAC) Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-04
...The Transportation Security Administration (TSA) will hold a meeting of the Aviation Security Advisory Committee (ASAC) on May 21, 2012, to discuss the formation of sub-committees and the agenda for the year. This meeting will be open to the public.
Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue
2016-01-01
Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.
United States Air Force Security Forces in an Era of Terrorist Threats
1999-06-01
their primary duties. The third alternative is to eliminate the Palace Tenure deployments of security personnel and replace them with dedicated units...The Phoenix Raven program, the 820th Security Forces Group, and Palace Tenure commitments. The specified mission varies by organization, but the...820th Security Forces Group. January 1999, slide 4. 166 Statement of LT. Col. Larry A. Buckingham , 820th Security Forces Group Commander, “820th Security
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-23
... DEPARTMENT OF LABOR Employee Benefits Security Administration Proposed Extension of Information... Beneficiaries Who Are Parties in Interest With Respect to the Plan AGENCY: Employee Benefits Security... collection requirements and provide the requested data in the desired format. The Employee Benefits Security...
1988-10-20
The LOCK project , from its very beginnings as an implementation study for the Provably Secure Operating System in 1979...to the security field, can study to gain insight into the evaluation process. The project has developed an innovative format for the DTLS and FTLS...management tern becomes available, the Al Secure DBMS will be system (DBMS) that is currently being developed un- ported to it . der the Advanced
Andrada Hamer, Maria; Larsson, Per-Göran; Teleman, Pia; Bergqvist, Christina Eten; Persson, Jan
2013-02-01
The aim of this prospective randomized multicenter study was to compare retropubic tension-free vaginal tape (TVT) with TVT Secur in terms of efficacy and safety. We set out to enrol 280 stress urinary incontinent (SUI) women with a half-time interim analysis of short-term cure and adverse events. The short-term results have previously been published. Of the 133 randomized women, 125 underwent surgery, and 121 (TVT n = 61, TVT Secur n = 60) were available for follow-up 1 year postsurgery. No significant differences were found between groups regarding demographics or incontinence grade. One year after surgery, both subjective and objective cure rates were significantly lower for TVT Secur than for TVT (subjective cure: TVT 98 %, TVT Secur 80 %, p = 0.03; objective cure: TVT 94 %, TVT Secur 71 % for cough test, p = 0.01; TVT 76 %, TVT Secur 58 % for pad test, p = 0.05 ). Three major complications occurred in the TVT Secur group: one tape erosion into the urethra, one tape inadvertently placed into the bladder, and one immediate postoperative bleeding due to injury to the corona mortis. No major complications occurred in the TVT group. No significant differences were found between groups regarding peroperative bleeding, hospital stay, urge symptoms, residual urinary volume, subjective bladder emptying problems, postoperative urinary tract infections, and minor complications. The TVT Secur group used more antimuscarine medication after surgery than the TVT group (p = 0.03). Median time for surgery was 13 and 22 min for TVT Secur and TVT, respectively (p < 0.0001). The TVT Secur procedure had significantly inferior subjective and objective cure rates compared with the retropubic TVT procedure. Three serious adverse events occurred in the TVT Secur group. We therefore discourage further use of TVT Secur.
Security services negotiation through OAM cells
DOE Office of Scientific and Technical Information (OSTI.GOV)
LAURENT,MARYLINE; TARMAN,THOMAS D.
As described in contribution AF99-0335, it is interesting that new security services and mechanisms are allowed to be negotiated during a connection in progress. To do that, new ''negotiation OAM cells'' dedicated to security should be defined, as well as some acknowledgment cells allowing negotiation OAM cells to be exchanged reliably. Remarks which were given at the New Orleans meeting regarding those cell formats are taken into account. This contribution presents some baseline text describing the format of the negotiation and acknowledgment cells, and the using of those cells. All the modifications brought to the specifications are reversible using themore » Word tools.« less
2012-05-04
FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Combatting Terrorism, Rebel Groups , and Armed...facing many security threats. Al-Shabaab in Somalia, armed rebel groups , and armed militia in South Sudan pose the greatest security challenges to the...these groups . 15. SUBJECT TERMS United States Africa Command, Al-Shabaab, Lamu Oil Pipeline, Security. 16. SECURITY CLASSIFICATION OF: 17
42 CFR 37.60 - Submitting required chest roentgenograms and miner identification documents.
Code of Federal Regulations, 2012 CFR
2012-10-01
... prescribed in this subpart, all the forms shall be submitted with his or her name and social security account... miner identification document containing the miner's name, address, social security number and place of... format specified by NIOSH either using portable electronic media, or a secure electronic file transfer...
33 CFR 105.405 - Format and content of the Facility Security Plan (FSP).
Code of Federal Regulations, 2010 CFR
2010-07-01
... Vulnerability and Security Measures Summary (Form CG-6025) in appendix A to part 105-Facility Vulnerability and... resubmission of the FSP. (c) The Facility Vulnerability and Security Measures Summary (Form CG-6025) must be completed using information in the FSA concerning identified vulnerabilities and information in the FSP...
The Efficacy of Platelet-Rich Plasma in the Treatment of Rib Fractures.
Gunay, Samil; Candan, Huseyin; Yılmaz, Rahsan; Eser, Irfan; Aydoğmus, Umit
2017-10-01
Background Rib fracture is the most common result of thoracic traumas. Intrapulmonary shunt, alveolar capillary membrane damage, intra-alveolar hemorrhage, and hypoxia may develop following rib fractures. Therefore, prompt treatment is important. The aim of this experimental study was to analyze the effects of platelet-rich plasma (PRP) on rib fractures to secure a speedier and more efficient treatment method. Materials and Methods The study involved 18 New Zealand white rabbits, randomly divided into three groups as Group 1, the sham group with no surgical intervention; Group 2, the control group in which simple rib fractures were applied and no treatment; and Group 3, in which rib fractures were applied and then PRP treatment was administered. Results The mean recovery plate thickness measurements were found to be statistically significantly higher in the PRP group compared with the other groups ( p < 0.005). A thicker fibrotic cell proliferation and the formation of many capillaries were observed around the growth plate in the PRP group compared with the other groups. These structures were lesser in the control group compared with the PRP group and at the lowest level in the sham group. Larger and distinct callus formation was observed and a new intramedullary field in the PRP group. Conclusions PRP is a reliable and effective autologous product with minimal side effects, which can be considered as an alternative treatment in patients with rib fractures and used easily in pseudoarthrosis, surgical fracture, or flail chest. Georg Thieme Verlag KG Stuttgart · New York.
KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer on Smartphones
2011-05-01
format data to exchange because contact information can be exported to V- Cards using existing APIs. For these reasons it was chosen as the medium to... Card format allows customization of this field. The service provider field serves to identify the app the key is for and the username field stores the...public key data. A sample V- Card field looks like Listing 1 below. IMPP;TextSecure
Blanquer, Ignacio; Hernandez, Vicente; Segrelles, Damià; Torres, Erik
2007-01-01
Today most European healthcare centers use the digital format for their databases of images. TRENCADIS is a software architecture comprising a set of services as a solution for interconnecting, managing and sharing selected parts of medical DICOM data for the development of training and decision support tools. The organization of the distributed information in virtual repositories is based on semantic criteria. Different groups of researchers could organize themselves to propose a Virtual Organization (VO). These VOs will be interested in specific target areas, and will share information concerning each area. Although the private part of the information to be shared will be removed, special considerations will be taken into account to avoid the access by non-authorized users. This paper describes the security model implemented as part of TRENCADIS. The paper is organized as follows. First introduces the problem and presents our motivations. Section 1 defines the objectives. Section 2 presents an overview of the existing proposals per objective. Section 3 outlines the overall architecture. Section 4 describes how TRENCADIS is architected to realize the security goals discussed in the previous sections. The different security services and components of the infrastructure are briefly explained, as well as the exposed interfaces. Finally, Section 5 concludes and gives some remarks on our future work.
Apparatus for installing condition-sensing means in subterranean earth formations
Shuck, Lowell Z.
1981-01-01
The present invention is directed to an apparatus for installing strain gages or other sensors-transducers in wellbores penetrating subterranean earth formations. The subject apparatus comprises an assembly which is lowered into the wellbore, secured in place, and then actuated to sequentially clean the wellbore or casing surface at a selected location with suitable solvents, etchants and neutralizers, grind the surface to a relatively smooth finish, apply an adhesive to the surface, and attach the strain gages or the like to the adhesive-bearing surface. After installing the condition-sensing gages to the casing or earth formation the assembly is withdrawn from the wellbore leaving the sensing gages securely attached to the casing or the subterranean earth formation.
78 FR 58376 - Home System Group, Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-23
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Home System Group, Order of Suspension of Trading September 19, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Home System Group because Home System Group...
[The significance of quality of life from a socio-legal perspective].
Axer, Peter
2014-01-01
Only rarely is the term quality of life explicitly mentioned in the Social Security Code (Sozialgesetzbuch, SGB). In the statutory health insurance law (Book V of the Social Security Code, SGB V), the term is explicitly regulated within the context of the entitlement to pharmaceuticals. While there are pharmaceuticals that have the priority to increase the quality of life but are excluded from the provision of healthcare (Section 34 (1) Sentence 7 SGB V), the improvement of the quality of life has to be taken into account for the cost-benefit assessment (Section 35b SGB V) as well as for the early pharmaceutical benefit assessment (Section 35a SGB V) and for the formation of reference price groups (Section 35 SGB V) for and in the case of an entitlement to benefits in the event of illness. Copyright © 2014. Published by Elsevier GmbH.
Risholm Mothander, Pia; Furmark, Catarina; Neander, Kerstin
2018-06-01
This study presents effects of adding Circle of Security-Parenting (COS-P) to an already established comprehensive therapeutic model for early parent-child intervention in three Swedish infant mental health (IMH) clinics. Parents' internal representations and quality of parent-infant interaction were studied in a clinical sample comprised of 52 parent-infant dyads randomly allocated to two comparable groups. One group consisted of 28 dyads receiving treatment as usual (TAU) supplemented with COS-P in a small group format, and another group of 24 dyads receiving TAU only. Assessments were made at baseline (T1), 6 months after inclusion (T2) and 12 months after inclusion (T3). Changes over time were explored in 42 dyads. In the COS-P group, the proportion of balanced representations, as assessed with Working Model of the Child Interview (WMCI), significantly increased between T1 and T3. Further, the proportion of emotionally available interactions, as assessed with Emotional Availability scales (EA), significantly increased over time in the COS-P group. Improvements in the TAU-group were close to significant. Limitations of the study are mainly related to the small sample size. Strength is the real world character of the study, where COS-P was implemented in a clinical context not otherwise adapted to research. We conclude by discussing the value of supplementing TAU with COS-P in IMH treatment. © 2017 The Authors. Scandinavian Journal of Psychology published by Scandinavian Psychological Associations and John Wiley & Sons Ltd.
Framework for Flexible Security in Group Communications
NASA Technical Reports Server (NTRS)
McDaniel, Patrick; Prakash, Atul
2006-01-01
The Antigone software system defines a framework for the flexible definition and implementation of security policies in group communication systems. Antigone does not dictate the available security policies, but provides high-level mechanisms for implementing them. A central element of the Antigone architecture is a suite of such mechanisms comprising micro-protocols that provide the basic services needed by secure groups.
26 CFR 1.408-2 - Individual retirement accounts.
Code of Federal Regulations, 2011 CFR
2011-04-01
... formation of protective committees; (H) To buy, sell, receive, or deliver securities on specific directions... Employee Retirement Income Security Act of 1974, 29 U.S.C. 1023(a)(3)(D), who is independent of the...
US statutes of general interest to safeguards and security officers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cadwell, J.J.
1988-09-01
This manual is meant to serve as reference material for security personnel. Information on law violations and possible punishments are listed in the following format: offense, description, punishment, and cross reference. (JEF)
Code of Federal Regulations, 2014 CFR
2014-10-01
... software and format specified by NIOSH either using portable electronic media, or a secure electronic file... forms shall be submitted with his or her name and social security account number on each. If any of the... containing the miner's name, address, social security number and place of employment. [43 FR 33715, Aug. 1...
42 CFR 37.60 - Submitting required chest roentgenograms and miner identification documents.
Code of Federal Regulations, 2013 CFR
2013-10-01
... format specified by NIOSH either using portable electronic media, or a secure electronic file transfer... forms shall be submitted with his or her name and social security account number on each. If any of the... containing the miner's name, address, social security number and place of employment. [43 FR 33715, Aug. 1...
Confidence-Building Measures in Philippine Security.
1998-05-01
service or government agency. STRATEGY RESEARCH PROJECT i CONFIDENCE-BUILDING MEASURES IN PHILIPPINE SECURITY BY LIEUTENANT COLONEL RAMON G...WAR COLLEGE, CARLISLE BARRACKS, PA 17013-5050 rimo*’^»®*raBl USAWC STRATEGY RESEARCH PROJECT CONFIDENCE-BUILDING MEASURES IN PHILIPPINE...Colonel Ramon Santos, Philippine Army TITLE: Confidence-Building Measures in Philippine Security FORMAT: Strategy Research Project DATE: 1
26 CFR 1.1081-7 - Sale of stock or securities received upon exchange by members of system group.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... Orders § 1.1081-7 Sale of stock or securities received upon exchange by members of system group. (a... which are members of the same system group consists of stock or securities issued by the corporation... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Sale of stock or securities received upon...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-23
... context of the security-based swap dealer definition, for affiliated groups with a registered security... for Affiliated Groups with Registered Security-Based Swap Dealers); Rule 3a71-5 (Substituted... 13n-12 (Exemption from Requirements Governing Security-Based Swap Data Repositories for Certain Non-U...
Role of farmer group institutions in increasing farm production and household food security
NASA Astrophysics Data System (ADS)
Rahmadanih; Bulkis, S.; Arsyad, M.; Amrullah, A.; Viantika, N. M.
2018-05-01
Food productions and food security are still becomes serious issue in agriculture development. The research objectives are (1) Examining the role of Farmer Group in increasing farm production and (2) Analyzing the role of Farmer Group in relationship with the household food security. The research was conducted in Soppeng District, South Sulawesi, Indonesia by taking unit of analysis at household level of Farmer Group members. Sample were 6 farmer groups, consisting of 365 households. The Results showed that the Farmer Group has a good role as a production, collaboration and market unit to increase farming production (score 2.3-2.6), but haven’t much impact to increase household food security. Rice production are 4.2 – 6.2 tons per hectare and household food security level are “low and marginal food secure” (mean score 4 and 6). Nevertheless, the role of Farmer Group showed a positive relationship with the level of household food security. So, it is necessarry to increase the role of Farmer Group in order to increase income and household food security based on Farmer Group’s needs and potencies through facilitation of (a) seed and water/irrigation availability, (b) preparing organization rules (AD/ART) and (c) appropriate training and education of food and nutrition.
DOT National Transportation Integrated Search
2000-05-01
The member countries of the Organization of American States (OAS) have recognized that a coordinated multilateral approach to improving port security in the Western Hemisphere is needed and has established a Technical Advisory Group on Port Security ...
Ma, Yuanxiao; Ran, Guangming; Chen, Xu; Ma, Haijing; Hu, Na
2017-01-01
Adult attachment style is a key for understanding emotion regulation and feelings of security in human interactions as well as for the construction of the caregiving system. The caregiving system is a group of representations about affiliative behaviors, which is guided by the caregiver's sensitivity and empathy, and is mature in young adulthood. Appropriate perception and interpretation of infant emotions is a crucial component of the formation of a secure attachment relationship between infant and caregiver. As attachment styles influence the ways in which people perceive emotional information, we examined how different attachment styles associated with brain response to the perception of infant facial expressions in nulliparous females with secure, anxious, and avoidant attachment styles. The event-related potentials of 65 nulliparous females were assessed during a facial recognition task with joy, neutral, and crying infant faces. The results showed that anxiously attached females exhibited larger N170 amplitudes than those with avoidant attachment in response to all infant faces. Regarding the P300 component, securely attached females showed larger amplitudes to all infant faces in comparison with avoidantly attached females. Moreover, anxiously attached females exhibited greater amplitudes than avoidantly attached females to only crying infant faces. In conclusion, the current results provide evidence that attachment style differences are associated with brain responses to the perception of infant faces. Furthermore, these findings further separate the psychological mechanisms underlying the caregiving behavior of those with anxious and avoidant attachment from secure attachment.
78 FR 48029 - Improving Chemical Facility Safety and Security
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-07
... responding to risks in chemical facilities (including during pre-inspection, inspection execution, post.... Sec. 2. Establishment of the Chemical Facility Safety and Security Working Group. (a) There is established a Chemical Facility Safety and Security Working Group (Working Group) co-chaired by the Secretary...
Code of Federal Regulations, 2014 CFR
2014-01-01
... Working Group. (a) There is established a Chemical Facility Safety and Security Working Group (Working Group) co-chaired by the Secretary of Homeland Security, the Administrator of the Environmental... Secretary level or higher. In addition, the Working Group shall consist of the head of each of the following...
Herford, Alan Scott; Cicciù, Marco
2012-01-01
Purpose: The aim of this investigation was to evaluate whether the addition of the platelet derived growth factor type BB (PDGF-BB) to a collagen matrix applied on a titanium mesh would favor healing and resorption onto the grafted bone. A histologic and radiographic study of two different groups (test and control) was performed. Designs: A surgical procedure was performed on 8 pigs to obtain 16 bilateral mandibular alveolar defects. All the defects were then reconstructed with a mixture of autogenous bovine bone using titanium mesh positioning. Two groups, with a total of 16 defects were created: The first to study collagen sponge and PDGF-BB and the second to control collagen only. The collagen matrix was positioned directly over the mesh and soft tissue was closed without tensions onto both groups without attempting to obtain primary closure. Possible exposure of the titanium mesh as well as the height and volume of the new bone was recorded. Results: New bone formation averaged about 6.68 mm in the test group studied; the control group had less regenerated bone at 4.62 mm. Conclusion: PDGF-BB addition to the collagen matrix induced a strong increase in hard and soft tissue healing and favored bone formation, reducing bone resorption even if the mesh was exposed. PMID:23833493
9 CFR 205.105 - Master list and portion thereof distributed to registrants-format.
Code of Federal Regulations, 2011 CFR
2011-01-01
... product to a security interest (see § 205.102), in numerical order by social security number or approved... equipment. The system may, however, honor requests from registrants to substitute recordings on any medium...
9 CFR 205.105 - Master list and portion thereof distributed to registrants-format.
Code of Federal Regulations, 2014 CFR
2014-01-01
... product to a security interest (see § 205.102), in numerical order by social security number or approved... equipment. The system may, however, honor requests from registrants to substitute recordings on any medium...
9 CFR 205.105 - Master list and portion thereof distributed to registrants-format.
Code of Federal Regulations, 2012 CFR
2012-01-01
... product to a security interest (see § 205.102), in numerical order by social security number or approved... equipment. The system may, however, honor requests from registrants to substitute recordings on any medium...
9 CFR 205.105 - Master list and portion thereof distributed to registrants-format.
Code of Federal Regulations, 2013 CFR
2013-01-01
... product to a security interest (see § 205.102), in numerical order by social security number or approved... equipment. The system may, however, honor requests from registrants to substitute recordings on any medium...
9 CFR 205.105 - Master list and portion thereof distributed to registrants-format.
Code of Federal Regulations, 2010 CFR
2010-01-01
... product to a security interest (see § 205.102), in numerical order by social security number or approved... equipment. The system may, however, honor requests from registrants to substitute recordings on any medium...
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
A video on computer security is described. Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education and Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1--3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices.
Creating a data resource: what will it take to build a medical information commons?
Deverka, Patricia A; Majumder, Mary A; Villanueva, Angela G; Anderson, Margaret; Bakker, Annette C; Bardill, Jessica; Boerwinkle, Eric; Bubela, Tania; Evans, Barbara J; Garrison, Nanibaa' A; Gibbs, Richard A; Gentleman, Robert; Glazer, David; Goldstein, Melissa M; Greely, Hank; Harris, Crane; Knoppers, Bartha M; Koenig, Barbara A; Kohane, Isaac S; La Rosa, Salvatore; Mattison, John; O'Donnell, Christopher J; Rai, Arti K; Rehm, Heidi L; Rodriguez, Laura L; Shelton, Robert; Simoncelli, Tania; Terry, Sharon F; Watson, Michael S; Wilbanks, John; Cook-Deegan, Robert; McGuire, Amy L
2017-09-22
National and international public-private partnerships, consortia, and government initiatives are underway to collect and share genomic, personal, and healthcare data on a massive scale. Ideally, these efforts will contribute to the creation of a medical information commons (MIC), a comprehensive data resource that is widely available for both research and clinical uses. Stakeholder participation is essential in clarifying goals, deepening understanding of areas of complexity, and addressing long-standing policy concerns such as privacy and security and data ownership. This article describes eight core principles proposed by a diverse group of expert stakeholders to guide the formation of a successful, sustainable MIC. These principles promote formation of an ethically sound, inclusive, participant-centric MIC and provide a framework for advancing the policy response to data-sharing opportunities and challenges.
NASA Astrophysics Data System (ADS)
Tsaur, Woei-Jiunn; Pai, Haw-Tyng
2008-11-01
The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.
76 FR 6499 - China 9D Construction Group; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-04
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China 9D Construction Group; Order of Suspension of Trading February 2, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China 9D Construction Group...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-25
... identified by an interagency working group that is reviewing export control issues related to homeland security. The interagency working group is made up of representatives from the Departments of Commerce, Defense, Homeland Security and State. The purpose of the interagency working group is to ensure that...
Code of Federal Regulations, 2010 CFR
2005-10-01
... 48 Federal Acquisition Regulations System 7 2005-10-01 2005-10-01 false Content. 3001.7001 Section 3001.7001 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY..., Exceptions, Approvals, Reviews, and Submittals 3001.7001 Content. The general format at (HSAR) 48 CFR 3001...
Code of Federal Regulations, 2010 CFR
2017-10-01
... 48 Federal Acquisition Regulations System 7 2017-10-01 2017-10-01 false Content. 3001.7001 Section 3001.7001 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY..., Exceptions, Approvals, Reviews, and Submittals 3001.7001 Content. The general format at (HSAR) 48 CFR 3001...
Code of Federal Regulations, 2010 CFR
2017-10-01
... 48 Federal Acquisition Regulations System 7 2017-10-01 2017-10-01 false Content. 3001.704 Section 3001.704 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY....704 Content. The following format shall be used for all determinations and findings (D&Fs), unless...
Code of Federal Regulations, 2010 CFR
2005-10-01
... 48 Federal Acquisition Regulations System 7 2005-10-01 2005-10-01 false Content. 3001.704 Section 3001.704 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY....704 Content. The following format shall be used for all determinations and findings (D&Fs), unless...
NASA Astrophysics Data System (ADS)
Hoeft, B.; Epting, U.; Koenig, T.
2008-07-01
While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 48 Federal Acquisition Regulations System 7 2014-10-01 2014-10-01 false Content. 3001.704 Section 3001.704 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Determinations and Findings 3001.704 Content. The following format shall...
Code of Federal Regulations, 2013 CFR
2013-10-01
... 48 Federal Acquisition Regulations System 7 2013-10-01 2012-10-01 true Content. 3001.704 Section 3001.704 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Determinations and Findings 3001.704 Content. The following format shall b...
Code of Federal Regulations, 2012 CFR
2012-10-01
... 48 Federal Acquisition Regulations System 7 2012-10-01 2012-10-01 false Content. 3001.704 Section 3001.704 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Determinations and Findings 3001.704 Content. The following format shall...
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Content. 3001.704 Section 3001.704 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Determinations and Findings 3001.704 Content. The following format shall...
Code of Federal Regulations, 2010 CFR
2004-10-01
... 48 Federal Acquisition Regulations System 7 2004-10-01 2004-10-01 false Content. 3001.704 Section 3001.704 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Determinations and Findings 3001.704 Content. The following format shall...
Code of Federal Regulations, 2011 CFR
2011-10-01
... 48 Federal Acquisition Regulations System 7 2011-10-01 2011-10-01 false Content. 3001.704 Section 3001.704 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Determinations and Findings 3001.704 Content. The following format shall...
Code of Federal Regulations, 2010 CFR
2006-10-01
... 48 Federal Acquisition Regulations System 7 2006-10-01 2006-10-01 false Content. 3001.704 Section 3001.704 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Determinations and Findings 3001.704 Content. The following format shall...
Code of Federal Regulations, 2011 CFR
2008-10-01
... 48 Federal Acquisition Regulations System 7 2008-10-01 2008-10-01 false Content. 3001.704 Section 3001.704 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Determinations and Findings 3001.704 Content. The following format shall...
Code of Federal Regulations, 2011 CFR
2016-10-01
... 48 Federal Acquisition Regulations System 7 2016-10-01 2014-10-01 true Content. 3001.704 Section 3001.704 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Determinations and Findings 3001.704 Content. The following format shall b...
Code of Federal Regulations, 2010 CFR
2007-10-01
... 48 Federal Acquisition Regulations System 7 2007-10-01 2007-10-01 false Content. 3001.704 Section 3001.704 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) GENERAL FEDERAL ACQUISITION REGULATIONS SYSTEM Determinations and Findings 3001.704 Content. The following format shall...
Report of the DHS Small Vessel Security Institute
2007-10-19
sector interests are integral parts of the nation’s strategy of “layered security” in the face of hostile intent. Since the earliest days of the ...and secure as possible while simultaneously protecting our citizen’s enjoyment of their maritime heritage. Today, the Department of Homeland Security...of the discussions (in a neutral, non- attribution format) to serve as the starting point of an ongoing, unprecedented partnership by DHS and the
2012-05-22
publication of the Security Cooperation Guidance ( SCG ), 32 U.S. Joint Chiefs of Staff, Joint Operation...format and content of the plans themselves. 2 The 2003 release of the classified SCG , which replaced TEPs with TSCPs, rendered CJCSM 3113.01 obsolete...interests while providing the SecDef increased visibility on and control over security cooperation activities, but the SCG was not as explicit in its
Preventive Interventions and Sustained Attachment Security in Maltreated Children
Stronach, Erin Pickreign; Toth, Sheree L.; Rogosch, Fred; Cicchetti, Dante
2013-01-01
Thirteen-month-old maltreated infants (n = 137) and their mothers were randomly assigned to one of three conditions: child-parent psychotherapy (CPP), psychoeducational parenting intervention (PPI), and community standard (CS). A fourth group of nonmaltreated infants (n =52) and their mothers served as a normative comparison (NC) group. A prior investigation found that the CPP and PPI groups demonstrated substantial increases in secure attachment at post-intervention, whereas this change was not found in the CS and NC groups. The current investigation involved the analysis of data obtained at a follow-up assessment that occurred 12-months after the completion of treatment. At follow-up, children in the CPP group had higher rates of secure and lower rates of disorganized attachment than did children in the PPI or CS groups. Rates of disorganized attachment did not differ between the CPP and NC groups. Intention-to-treat analyses (ITT) also showed higher rates of secure attachment at follow-up in the CPP group relative to the PPI and CS groups. However, groups did not differ on disorganized attachment. Both primary and ITT analyses demonstrated that maternal reported child behavior problems did not differ among the four groups at the follow-up assessment. This is the first investigation to demonstrate sustained attachment security in maltreated children 12 months after the completion of an attachment theory-informed intervention. Findings also suggest that, while effective in the short term, parenting interventions alone may not be effective in maintaining secure attachment in children over time. PMID:24229539
Rivera, Rebecca L; Maulding, Melissa K; Abbott, Angela R; Craig, Bruce A; Eicher-Miller, Heather A
2016-11-01
Food insecurity is negatively associated with US children's dietary intake and health. The Supplemental Nutrition Assistance Program-Education (SNAP-Ed) aims to alleviate food insecurity by offering nutrition, budgeting, and healthy lifestyle education to low-income individuals and families. The objective of this study was to evaluate the long-term impact of the Indiana SNAP-Ed on food security among households with children. A randomized, controlled, parallel study design with SNAP-Ed as an intervention was carried out during a 4- to 10-wk intervention period. Intervention group participants received the first 4 Indiana SNAP-Ed curriculum lessons. Study participants (n = 575) were adults aged ≥18 y from low-income Indiana households with ≥1 child living in the household. Both treatment groups completed an assessment before and after the intervention period and 1 y after recruitment. The 18-item US Household Food Security Survey Module was used to classify the primary outcomes of food security for the household and adults and children in the household. A linear mixed model was used to compare intervention with control group effects over time on food security. Mean ± SEM changes in household food security score and food security score among household adults from baseline to 1-y follow-up were 1.2 ± 0.4 and 0.9 ± 0.3 units lower, respectively, in the intervention group than in the control group (P < 0.01). The mean change in food security score from baseline to 1-y follow-up among household children was not significantly different in the intervention group compared with the control group. SNAP-Ed improved food security over a longitudinal time frame among low-income Indiana households with children in this study. SNAP-Ed may be a successful intervention to improve food security. © 2016 American Society for Nutrition.
Ma, Yuanxiao; Ran, Guangming; Chen, Xu; Ma, Haijing; Hu, Na
2017-01-01
Adult attachment style is a key for understanding emotion regulation and feelings of security in human interactions as well as for the construction of the caregiving system. The caregiving system is a group of representations about affiliative behaviors, which is guided by the caregiver’s sensitivity and empathy, and is mature in young adulthood. Appropriate perception and interpretation of infant emotions is a crucial component of the formation of a secure attachment relationship between infant and caregiver. As attachment styles influence the ways in which people perceive emotional information, we examined how different attachment styles associated with brain response to the perception of infant facial expressions in nulliparous females with secure, anxious, and avoidant attachment styles. The event-related potentials of 65 nulliparous females were assessed during a facial recognition task with joy, neutral, and crying infant faces. The results showed that anxiously attached females exhibited larger N170 amplitudes than those with avoidant attachment in response to all infant faces. Regarding the P300 component, securely attached females showed larger amplitudes to all infant faces in comparison with avoidantly attached females. Moreover, anxiously attached females exhibited greater amplitudes than avoidantly attached females to only crying infant faces. In conclusion, the current results provide evidence that attachment style differences are associated with brain responses to the perception of infant faces. Furthermore, these findings further separate the psychological mechanisms underlying the caregiving behavior of those with anxious and avoidant attachment from secure attachment. PMID:28484415
Andrada Hamer, Maria; Larsson, Per-Göran; Teleman, Pia; Etén-Bergqvist, Christina; Persson, Jan
2011-07-01
The aim of this prospective randomized multicenter study was to compare TVT (tension-free vaginal tape) with TVT-Secur in terms of efficacy and safety. We set out to enrol 280 stress incontinent women with a half time interim analysis of short-term cure and a continuous registration of adverse events. Of 133 randomized women, 126 were operated and 123 (TVT n = 62, TVT-Secur n = 61) available for 2 months follow-up. No significant differences were found between groups regarding demographics or grade of incontinence. At 2 months follow-up, subjective cure rate following TVT-Secur was significantly lower than for TVT (72% and 92%, respectively, p = 0.01). Three major complications occurred in the TVT-Secur group: tape erosion into the urethra, a tape inadvertently placed inside the bladder, and an immediate postoperative bleeding from the corona mortis. No major complications occurred in the TVT group. No significant differences were found between groups regarding perioperative bleeding, hospital stay, urge symptoms, or postoperative urinary tract infections. Median time for surgery was 13 and 22 min for TVT-Secur and TVT, respectively (p < 0.0001). In a prospective randomized controlled study, the TVT-Secur procedure had a significantly lower subjective cure rate than the retropubic TVT procedure. Due to this, in addition to three serious complications in the TVT-Secur group, we decided to stop further enrolment after the interim analysis. We discourage from further use of the TVT-Secur.
Safeguards and security research and development: Progress report, October 1994--September 1995
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rutherford, D.R.; Henriksen, P.W.
The primary goal of the Los Alamos Safeguards and Security Technology Development Program, International Safeguards, and other Safeguards and Security Programs is to continue to be the center of excellence in the field of Safeguards and Security. This annual report for 1995 describes those scientific and engineering projects that contribute to all of the aforementioned programs. The authors have presented the information in a different format from previous annual reports. Part I is devoted to Nuclear Material Measurement Systems. Part II contains projects that are specific to Integrated Safeguards Systems. Part III highlights Safeguards Systems Effectiveness Evaluations and Part IVmore » is a compilation of highlights from Information Assurance projects. Finally Part V highlights work on the projects at Los Alamos for International Safeguards. The final part of this annual report lists titles and abstracts of Los Alamos Safeguards and Security Technology Development reports, technical journal articles, and conference papers that were presented and published in 1995. This is the last annual report in this format. The authors wish to thank all of the individuals who have contributed to this annual report and made it so successful over the years.« less
A comparison of offenders with intellectual disability across three levels of security.
Hogue, Todd; Steptoe, Lesley; Taylor, John L; Lindsay, William R; Mooney, Paul; Pinkney, Lisa; Johnston, Susan; Smith, Anne H W; O'Brien, Gregory
2006-01-01
A number of authors have described, with disparate results, the prevalence of people with intellectual disability and their characteristics, in a range of offender cohorts defined by service use. These have included high security, a range of criminal justice services and community services. There is a need for research comparing cohorts of offenders with intellectual disabilities across different settings. AIM AND HYPOTHESIS: To conduct such a comparison and test the hypothesis that severity of characteristics measured will be highest in highest levels of residential security. A clinical-record-based comparison a offenders with intellectual disability in high security (n = 73), medium/low security (n = 70), and a community service (n = 69). Groups were similar in age and tested IQ levels. Early psychiatric service contact had been more likely in the lower security groups. In line with the hypothesis, more complex presentations, in particular comorbid personality disorder, was more likely in the highest security group. Both fatal and non-fatal interpersonal violence convictions were significantly related to group, with more in the high security group sustaining a conviction both at the index offence and prior to that. Over 50% of all groups had at least one conviction for a sexual offence. A regression model accounting for 78% of the variance was made up largely of disposal variables (Mental Health Act status and probation) and indications of antisocial traits (criminal damage, lifetime conviction for murder and ICD-10 personality disorder classification). The authors show that context of sampling affects most relationships between intellectual disability (ID) and offending when the methods for measuring ID are held constant. The results also present several questions on the relationship between risk, services available in an area and referral to higher security.
The International Criminal Court as a Component of U.S. National Security Strategy
2012-04-21
Security Strategy 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER LTC Jonathan R. Hirsch, U.S. Army...98) Prescribed by ANSI Std. Z39.18 USAWC CIVILIAN RESEARCH PROJECT THE INTERNATIONAL CRIMINAL COURT AS A COMPONENT OF U.S...Security Strategy FORMAT: Civilian Research Project DATE: 21 April 2012 WORD COUNT: 11,629 PAGES: 46 KEY TERMS: Lawfare, Contractor
Homeland security in the USA: past, present, and future.
Kemp, Roger L
2012-01-01
This paper examines the evolving and dynamic field of homeland security in the USA. Included in this analysis is the evolution of the creation of the Department of Homeland Security, an overview of the National Warning System, a summary of citizen support groups, and how the field of homeland security has had an impact on the location and architecture of public buildings and facilities. Also included are website directories of citizen support groups and federal agencies related to the field of homeland security.
"The group" in integrated HIV and livelihoods programming: opportunity or challenge?
Roopnaraine, Terry; Rawat, Rahul; Babirye, Frances; Ochai, Robert; Kadiyala, Suneetha
2012-01-01
HIV care and treatment providers across sub-Saharan Africa are integrating livelihood interventions to improve food security of their clientele. Many integrated HIV and livelihood programmes (IHLPs) require the formation and use of groups of HIV-infected/affected individuals as the operational target for programme interventions, indeed, virtually without exception the group is the focal point for material and intellectual inputs of IHLPs. We sought to critically examine the group approach to programming among IHLPs in Uganda, and to explore and problematise the assumptions underpinning this model. A case study approach to studying 16 IHLPs was adopted. Each IHLP was treated as a case comprising multiple in-depth interviews conducted with staff along the livelihood programme chain. Additionally, in-depth interviews were conducted with staff from The AIDS Support Organization (TASO), and with members of 71 HIV-infected TASO-registered client households. Our analysis reveals three important considerations in IHLP programming regarding the group-centred approach: (1) Group membership is widely held to confer benefits in the form of psycho-social and motivational support, particularly in empowering individuals to access HIV services and handle stigma. This is contrasted with the problem of stigma inherent in joining groups defined by HIV-status; (2) Membership in groups can bring economic benefits through the pooling of labour and resources. These benefits however need to be set against the costs of membership, when members are required to make contributions in the form of money, goods or labour; (3) Sharing of goods and labour in the context of group membership allow members to access benefits which would otherwise be inaccessible. In exchange, individual choice and control are diminished and problems of resources held in common can arise. While the group model can bring benefits to IHLP efficiency and by extension to food security, and other outcomes, its application needs to be carefully scrutinised at the individual programme level, in terms of whether it is an appropriate approach, and in terms of mitigating potentially adverse effects.
Code of Federal Regulations, 2014 CFR
2014-07-01
..., which contain the individual's name; rank/pay grade; Social Security Number; military branch or..., retiring, accessing, retaining, and disposing of records. Storage: Electronic storage media. Retrievability: Retrieved by individual's surname, Social Security Number and/or passport number. Safeguards: Electronic...
Code of Federal Regulations, 2013 CFR
2013-07-01
..., which contain the individual's name; rank/pay grade; Social Security Number; military branch or..., retiring, accessing, retaining, and disposing of records. Storage: Electronic storage media. Retrievability: Retrieved by individual's surname, Social Security Number and/or passport number. Safeguards: Electronic...
Code of Federal Regulations, 2012 CFR
2012-07-01
..., which contain the individual's name; rank/pay grade; Social Security Number; military branch or..., retiring, accessing, retaining, and disposing of records. Storage: Electronic storage media. Retrievability: Retrieved by individual's surname, Social Security Number and/or passport number. Safeguards: Electronic...
Quality of Attachment to Father and Mother and Number of Reciprocal Friends
ERIC Educational Resources Information Center
Verissimo, Manuela; Santos, Antonio J.; Vaughn, Brian E.; Torres, Nuno; Monteiro, Ligia; Santos, Orlando
2011-01-01
Attachment research suggests that children with secure attachments are more able to construct meaningful relationships with peers. Few studies, however, have attempted to map early attachment security to the formation and maintenance of preschool friendships. Special attention has been paid to affiliative relationships (particularly friendships)…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-27
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0013] Agency Information Collection... request for comment. SUMMARY: The Department of Homeland Security (DHS) invites the general public to... formation of online communities. All users are required to authenticate prior to entering the site. In...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-04
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0028] Agency Information Collection... request for comment. SUMMARY: The Department of Homeland Security (DHS) invites the general public to... formation of online communities. All users are required to authenticate prior to entering the site. In...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-13
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0042] Agency Information Collection... request for comment. SUMMARY: The Department of Homeland Security (DHS) invites the general public to... formation of online communities. All users are required to authenticate prior to entering the site. In...
Automatic Web-based Calibration of Network-Capable Shipboard Sensors
2007-09-01
Server, Java , Applet, and Servlet . 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS PAGE...49 b. Sensor Applet...........................................................................49 3. Java Servlet ...Table 1. Required System Environment Variables for Java Servlet Development. ......25 Table 2. Payload Data Format of the POST Requests from
Coalition Network Defence Common Operational Picture
2010-11-01
27000 .org/ iso -27005.htm [26] ISO 8601:2004, Data elements and interchange formats - Information interchange - Representation of dates and times, http://ww.iso.org, http://en.wikipedia.org/wiki/ISO_8601 ...Regular_expression [25] ISO /IEC 27005:2008, Information technology -- Security techniques -- Information security risk management, http://ww.iso.org,; http://www
78 FR 25723 - National Assessment Governing Board; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-02
..., assistive listening devices, materials in alternative format) should notify Munira Mwalimu at 202- 357-6938.... to review secure NAEP test materials for Science Interactive Computer Tasks (ICTs) at grades 4, 8... provided with secure items and materials which are not yet available for release to the general public...
2009-04-01
terrorist social networks are quite vulnerable to penetration and exploitation by indigenous personnel working in the communities where the groups operate...LEVERAGING INDIGENOUS SECURITY FORCES by Mack-Jan H. Spencer, Maj, USAF A Research Report Submitted to the Faculty In Partial Fulfillment of the...4. TITLE AND SUBTITLE Connecting the Spots: Combating Transnational Terrorist Groups Through Leveraging Indigenous Security Forces 5a. CONTRACT
Integrating security in a group oriented distributed system
NASA Technical Reports Server (NTRS)
Reiter, Michael; Birman, Kenneth; Gong, LI
1992-01-01
A distributed security architecture is proposed for incorporation into group oriented distributed systems, and in particular, into the Isis distributed programming toolkit. The primary goal of the architecture is to make common group oriented abstractions robust in hostile settings, in order to facilitate the construction of high performance distributed applications that can tolerate both component failures and malicious attacks. These abstractions include process groups and causal group multicast. Moreover, a delegation and access control scheme is proposed for use in group oriented systems. The focus is the security architecture; particular cryptosystems and key exchange protocols are not emphasized.
Research on key technologies of data processing in internet of things
NASA Astrophysics Data System (ADS)
Zhu, Yangqing; Liang, Peiying
2017-08-01
The data of Internet of things (IOT) has the characteristics of polymorphism, heterogeneous, large amount and processing real-time. The traditional structured and static batch processing method has not met the requirements of data processing of IOT. This paper studied a middleware that can integrate heterogeneous data of IOT, and integrated different data formats into a unified format. Designed a data processing model of IOT based on the Storm flow calculation architecture, integrated the existing Internet security technology to build the Internet security system of IOT data processing, which provided reference for the efficient transmission and processing of IOT data.
Lin, Tsung-Hung; Tsung, Chen-Kun; Lee, Tian-Fu; Wang, Zeng-Bo
2017-12-03
The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie-Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.
12 CFR 792.13 - Can I get the records in different forms or formats?
Code of Federal Regulations, 2012 CFR
2012-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED... computer disk, if the record is readily reproducible by us in that form or format, but we will not provide...
12 CFR 792.13 - Can I get the records in different forms or formats?
Code of Federal Regulations, 2013 CFR
2013-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED... computer disk, if the record is readily reproducible by us in that form or format, but we will not provide...
12 CFR 792.13 - Can I get the records in different forms or formats?
Code of Federal Regulations, 2010 CFR
2010-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED... computer disk, if the record is readily reproducible by us in that form or format, but we will not provide...
12 CFR 792.13 - Can I get the records in different forms or formats?
Code of Federal Regulations, 2014 CFR
2014-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED... computer disk, if the record is readily reproducible by us in that form or format, but we will not provide...
12 CFR 792.13 - Can I get the records in different forms or formats?
Code of Federal Regulations, 2011 CFR
2011-01-01
... FREEDOM OF INFORMATION ACT AND PRIVACY ACT, AND BY SUBPOENA; SECURITY PROCEDURES FOR CLASSIFIED... computer disk, if the record is readily reproducible by us in that form or format, but we will not provide...
Gulacti, Umut; Lok, Ugur
2017-07-19
Consultation, the process of an Emergency Physician seeking an opinion from other specialties, occurs frequently in the Emergency Department (ED). The aim of this study was to determine the effect of secure messaging application (WhatsApp) usage for medical consultations on Emergency Department Length of Stay (ED LOS) and consult time. We conducted a prospective, randomized controlled trial in the ED using allocation concealment over three months. Consultations requested in the ED were allocated into two groups: consultations requested via the secure messaging application and consultations requested by telephone as verbal. A total of 439 consultations requested in the ED were assessed for eligibility and 345 were included in the final analysis: 173 consultations were conducted using secure messaging application and 172 consultations were conducted using standard telephone communications. The median ED LOS was 240 minutes (IQR:230-270, 95% CI:240 to 255.2) for patients in the secure messaging application group and 277 minutes (IQR:270-287.8, 95% CI:277 to 279) for patients in the telephone group. The median total ED LOS was significantly lower among consults conducted using Secure messaging application relative to consults conducted by telephone (median dif: -30, 95%CI:-37to-25, p<0.0001). The median consult time was 158 minutes (IQR:133 to 177.25, 95% CI:150 to 169) for patients in the Secure messaging application group and 170 minutes (IQR:165 to 188.5, 95% CI:170-171) for patients in the Telephone group (median dif: -12, 95%CI:-19 to-7,p<0.0001). Consultations completed without ED arrival was 61.8% in the secure messaging group and 33.1% in the Telephone group (dif: 28.7, 95% CI:48.3 to 66, p<0.001). Use of secure messaging application for consultations in the ED reduces the total ED LOS and consultation time. Consultation with secure messaging application eliminated more than half of in-person ED consultation visits.
Analyzing the security of an existing computer system
NASA Technical Reports Server (NTRS)
Bishop, M.
1986-01-01
Most work concerning secure computer systems has dealt with the design, verification, and implementation of provably secure computer systems, or has explored ways of making existing computer systems more secure. The problem of locating security holes in existing systems has received considerably less attention; methods generally rely on thought experiments as a critical step in the procedure. The difficulty is that such experiments require that a large amount of information be available in a format that makes correlating the details of various programs straightforward. This paper describes a method of providing such a basis for the thought experiment by writing a special manual for parts of the operating system, system programs, and library subroutines.
Vecchione, Michele; Caprara, Gianvittorio; Schoen, Harald; Castro, Josè Luis Gonzàlez; Schwartz, Shalom H
2012-08-01
Using data from Italy, Spain, and Germany (N= 1,569), this study investigated the role of basic values (universalism and security) and basic traits (openness and agreeableness) in predicting perceptions of the consequences of immigration. In line with Schwartz's (1992) theory, we conceptualized security as having two distinct components, one concerned with safety of the self (personal security) and the other with harmony and stability of larger groups and of society (group security). Structural equation modelling revealed that universalism values underlie perceptions that immigration has positive consequences and group security values underlie perceptions that it has negative consequences. Personal security makes no unique, additional contribution. Multi-group analyses revealed that these associations are invariant across the three countries except for a stronger link between universalism and perceptions of the consequences of immigration in Spain. To examine whether values mediate relations of traits to perceptions of immigration, we used the five-factor model. Findings supported a full mediation model. Individuals' traits of openness and agreeableness explained significant variance in security and universalism values. Basic values, in turn, explained perceptions of the consequences of immigration. ©2011 The British Psychological Society.
Wang, Haili; Yan, Yanfeng; Rong, Dan; Wang, Jing; Wang, Hongduo; Liu, Zizhong; Wang, Jiaping; Yang, Ruifu; Han, Yanping
2016-10-01
Biofilm formation is closely related to the pathogenetic processes of Klebsiella pneumoniae, which frequently causes infections in immunocompromised individuals. The immune system of astronauts is compromised in spaceflight. Accordingly, K. pneumoniae, which used to be isolated from orbiting spacecraft and astronauts, poses potential threats to the health of astronauts and mission security. Microgravity is a key environmental cue during spaceflight. Therefore, determining its effects on bacterial biofilm formation is necessary. In this study, K. pneumoniae ATCC BAA-1705 was exposed to a simulated microgravity (SMG) environment. K. pneumoniae grown under SMG formed thicker biofilms compared with those under normal gravity (NG) control after 2 weeks of subculture. Two indicative dyes (i.e., Congo red and calcofluor) specifically binding to cellulose fibers and/or fimbriae were utilized to reconfirm the enhanced biofilm formation ability of K. pneumoniae grown under SMG. Further analysis showed that the biofilms formed by SMG-treated K. pneumoniae were susceptible to cellulase digestion. Yeast cells mannose-resistant agglutination by K. pneumoniae type 3 fimbriae was more obvious in the SMG group, which suggests that cellulose production and type 3 fimbriae expression in K. pneumoniae were both enhanced under the SMG condition. Transcriptomic analysis showed that 171 genes belonging to 15 functional categories were dysregulated in this organism exposed to the SMG conditions compared with those in the NG group, where the genes responsible for the type 3 fimbriae (mrkABCDF) and its regulator (mrkH) were upregulated. © 2016 The Authors. MicrobiologyOpen published by John Wiley & Sons Ltd.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-01
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0008] Submission for Review; Information... Homeland Security (DHS) invites the general public to comment on the data collection form for the DHS... select authorized non-first responder users to facilitate networking and formation of online communities...
Effects of Infant Massage on Attachment Security: An Experimental Manipulation.
ERIC Educational Resources Information Center
Jump, Vonda K.
The formation of attachments is an important phenomenon occurring in the realm of socioemotional development. This study examined the impact of infant massage on infants' subsequent attachment security. Fifty-seven mother-infant dyads (48 dyads from Head Start, 9 from the community at large) were randomly assigned to a treatment or control group…
From Charity to Security: The Emergence of the National School Lunch Program
ERIC Educational Resources Information Center
Rutledge, Jennifer Geist
2015-01-01
This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…
Components of a Course on National Security Policy.
ERIC Educational Resources Information Center
Quester, George H.
1987-01-01
Describes the components of a course on the formation of national security policy. Includes information on the amount of emphasis and instructional approach to take with each component of the course. Components include the nature of strategy, the role of war in international politics, disarmament and arms control, nuclear weapons and nuclear war,…
Telemedicine with integrated data security in ATM-based networks
NASA Astrophysics Data System (ADS)
Thiel, Andreas; Bernarding, Johannes; Kurth, Ralf; Wenzel, Rudiger; Villringer, Arno; Tolxdorff, Thomas
1997-05-01
Telemedical services rely on the digital transfer of large amounts of data in a short time. The acceptance of these services requires therefore new hard- and software concepts. The fast exchange of data is well performed within a high- speed ATM-based network. The fast access to the data from different platforms imposes more difficult problems, which may be divided into those relating to standardized data formats and those relating to different levels of data security across nations. For a standardized access to the formats and those relating to different levels of data security across nations. For a standardized access to the image data, a DICOM 3.0 server was implemented.IMages were converted into the DICOM 3.0 standard if necessary. The access to the server is provided by an implementation of DICOM in JAVA allowing access to the data from different platforms. Data protection measures to ensure the secure transfer of sensitive patient data are not yet solved within the DICOM concept. We investigated different schemes to protect data using the DICOM/JAVA modality with as little impact on data transfer speed as possible.
DBP formation and disinfection under current and future climates - slides
How to predict and monitoring DBP formation under current and future climate is a challenge and important to water plant operations and water supply security. This presentation summarizes a system approach being developed at the EPA Water Resources Adaptation Program (WRAP).
Simple group password-based authenticated key agreements for the integrated EPR information system.
Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng
2013-04-01
The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.
Rusakov, V N; Cherkashin, A V; Shishkanov, A P; Ian'shin, L A; Gracheva, T N
2010-12-01
Radiative and hygienic passportization is one of the most actual pattern of socio and hygienic monitoring in Armed Forces. Radiative and hygienic passport is the main document which characterizes the safety control in military unit and uses the sources of ionizing radiation. Sanitary and epidemiologic institutions were imputed to control the formation of radiative and hygienic passports, analysis and generalization of its data, formation of conclusions about the condition of radiation security in the military units. According to radiative and hygienic passportization, which took place in 2009, the radiation security in the Armed Forces and organizations is satisfactory, but there are some problems of providing of radiation security of personnel under the professional and medical radiation. The salvation of its problems requires the effective work of official functionary of radiac object and institutions of state sanitary and epidemiological supervision in Armed Forces of Russian Federation.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Future Now Group, Inc., and Gammacan International, Inc.; Order of Suspension of Trading June 5, 2012. It appears to the Securities and Exchange... concerning the securities of Gammacan International, Inc. because it has not filed any periodic reports since...
Code of Federal Regulations, 2014 CFR
2014-07-01
... Notice in Federal Register Format E Appendix E to Part 310 National Defense Department of Defense... Format (See paragraph (f) of § 310.30) New system of records notice DEPARTMENT OF DEFENSE Office of the..., Department of Defense. NSLRB 01 System name: The National Security Labor Relations Board (NSLRB). System...
Lee, Tian-Fu; Wang, Zeng-Bo
2017-01-01
The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions. PMID:29207509
NASA Astrophysics Data System (ADS)
Jun, An Won
2006-01-01
We implement a first practical holographic security system using electrical biometrics that combines optical encryption and digital holographic memory technologies. Optical information for identification includes a picture of face, a name, and a fingerprint, which has been spatially multiplexed by random phase mask used for a decryption key. For decryption in our biometric security system, a bit-error-detection method that compares the digital bit of live fingerprint with of fingerprint information extracted from hologram is used.
NASA Technical Reports Server (NTRS)
Tompkins, F. G.
1984-01-01
Guidance is presented to NASA Computer Security Officials for determining the acceptability or unacceptability of ADP security risks based on the technical, operational and economic feasibility of potential safeguards. The risk management process is reviewed as a specialized application of the systems approach to problem solving and information systems analysis and design. Reporting the results of the risk reduction analysis to management is considered. Report formats for the risk reduction study are provided.
NASA Astrophysics Data System (ADS)
Hedjazi, Babak
2007-12-01
This dissertation is fundamentally about the formation of new regional spaces in Central Eurasia viewed from a dynamic, comparative and historical approach. Analyzing the global-local economic and political interactions and their consequences on resource rich countries of the Caspian Sea enable us to reframe security as a central element of the new global order. In this respect, the dissertation examines how two particular states, Azerbaijan and Iran, respond to the changing global security environment and optimize their capacity to absorb or control change. Here, security as I conceive is multidimensional and engages various social, political and economic domains. My research is articulated along three hypotheses regarding the formation of a new regional space and its consequences on territorial polarization and interstate rivalry. These hypotheses, respectively and cumulatively, elucidate global and domestic contexts of regional space formation, regional strategic and discursive trajectories, and regional tensions of global/local interactions. In order to empirically test these hypotheses, a series of thirty interviews were conducted by the author with local and foreign business representatives, civilian and government representatives, and corroborated by economic data collected from the International Energy Agency. The findings of the research validate the primary assumption of the dissertation that Azerbaijan and Iran have chosen the regional scale to address discrepancies between their aspired place in the new world order and the reality of their power and international status. Extending the argument for structural scarcity of oil towards contenders, this dissertation concludes that the Caspian oil has become a fundamental element of the regional discourse. The mismatch between the rhetoric of sovereign rights and energy security on one side and the reality of regional countries' powerlessness and their need to reach international markets on the other side are fundamental focal points of divergent regional trajectories of Azerbaijan and Iran. Divergent readings of energy security and its provision by Azerbaijan and Iran on the one hand, and how energy security is interpreted and incorporated in institutionalized regulation and new regimes of governance by consumer countries on the other hand, shape the new configuration of the Caspian Sea regionalism.
Security architecture for HL/7 message interchange.
Chen, T S; Liao, B S; Lin, M G; Gough, T G
2001-01-01
The promotion of quality medical treatment is very important to the healthcare providers as well as to patients. It requires that the medical resources of different hospitals be combined to ensure that medical information is shared and that resources are not wasted. A computer-based patient record is one of the best methods to accomplish the interchange of the patient's clinical data. In our system, the Health Level/Seven (HL/7) format is used for the interchange of the clinical data, as it has been supported by many healthcare providers and become a â standard'. The security of the interchange of clinical data is a serious issue for people using the Internet for data communication. Several international well-developed security algorithms, models and secure policies are adopted in the design of a security handler for an HL/7 architecture. The goal of our system is to combine our security system with the end-to-end communication systems constructed from the HL/7 format to establish a safe delivery channel. A suitable security interchange environment is implemented to address some shortcomings in clinical data interchange. located at the application layer of the ISO/OSI reference model. The medical message components, sub-components, and related types of message event are the primary goals of the HL/7 protocols. The patient management system, the doctor's system for recording his advice, examination and diagnosis as well as any financial management system are all covered by the HL/7 protocols. Healthcare providers and hospitals in Taiwan are very interested in developing the HL/7 protocols as a common standard for clinical data interchange.
NASA Astrophysics Data System (ADS)
Bellare, Mihir; Ristenpart, Thomas; Rogaway, Phillip; Stegers, Till
Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format—for example, encrypting a valid credit-card number into a valid credit-card number. The problem has been known for some time, but it has lacked a fully general and rigorous treatment. We provide one, starting off by formally defining FPE and security goals for it. We investigate the natural approach for achieving FPE on complex domains, the “rank-then-encipher” approach, and explore what it can and cannot do. We describe two flavors of unbalanced Feistel networks that can be used for achieving FPE, and we prove new security results for each. We revisit the cycle-walking approach for enciphering on a non-sparse subset of an encipherable domain, showing that the timing information that may be divulged by cycle walking is not a damaging thing to leak.
Ontology based log content extraction engine for a posteriori security control.
Azkia, Hanieh; Cuppens-Boulahia, Nora; Cuppens, Frédéric; Coatrieux, Gouenou
2012-01-01
In a posteriori access control, users are accountable for actions they performed and must provide evidence, when required by some legal authorities for instance, to prove that these actions were legitimate. Generally, log files contain the needed data to achieve this goal. This logged data can be recorded in several formats; we consider here IHE-ATNA (Integrating the healthcare enterprise-Audit Trail and Node Authentication) as log format. The difficulty lies in extracting useful information regardless of the log format. A posteriori access control frameworks often include a log filtering engine that provides this extraction function. In this paper we define and enforce this function by building an IHE-ATNA based ontology model, which we query using SPARQL, and show how the a posteriori security controls are made effective and easier based on this function.
Wang, Yi-jun; Li, Fei-ping; Wang, Qian; Yang, Sen; Cai, Xian-guo; Chen, Ying-he
2011-11-01
The purpose of the study was to evaluate and compare the clinical values of tension-free vaginal tape (TVT), tension-free vaginal tape-transobturator (TVT-O), or tension-free vaginal tape-Secur (TVT-Secur) as treatment for female stress urinary incontinence. The pre-operative and 1-year post-operative follow-up protocols for patients who were treated with serial mid-urethral tension-free tape procedures in two hospitals from October 2008 to December 2009 were prospectively studied. These patients were randomly allocated to TVT, TVT-O, or TVT-Secur. A total of 102 women participated. At the 1-year follow-up, complications were not statistically different across the three groups except for pain in the thigh, which was more common in the TVT-O group. The overall efficacy and cure rate were similar between the TVT and TVT-O groups, but were significantly lower in the TVT-Secur group. A comparison of the three procedures shows that TVT-O is easy to operate and is as safe as TVT-Secur, and it has similar long-term efficacy to TVT, though, as one of the third-generation mid-urethral tension-free tapes, TVT-Secur is still being evaluated. Basing on the outcome of our study, it had rare complications but unsatisfactory efficacy, and we suggest that TVT-Secur is not fit for severe cases. However, observation and comparison of these groups in a larger sample size on a longer term are needed.
The Effects of Evaluation and Production Blocking on the Performance of Brainstorming Groups
1992-08-01
NUMBER OF PAGES 701 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LMIITATION OF ABSTRACT OF...special interest group. Once again, the people in the above examples share many things in common such as a sense of civil duty, an employer, a love for a...people respond differently in the presence of others, a phenomenon Zajonc refers to as compresence . In group settings, social facilitation can be
A Secure and Efficient Threshold Group Signature Scheme
NASA Astrophysics Data System (ADS)
Zhang, Yansheng; Wang, Xueming; Qiu, Gege
The paper presents a secure and efficient threshold group signature scheme aiming at two problems of current threshold group signature schemes: conspiracy attack and inefficiency. Scheme proposed in this paper takes strategy of separating designed clerk who is responsible for collecting and authenticating each individual signature from group, the designed clerk don't participate in distribution of group secret key and has his own public key and private key, designed clerk needs to sign part information of threshold group signature after collecting signatures. Thus verifier has to verify signature of the group after validating signature of the designed clerk. This scheme is proved to be secure against conspiracy attack at last and is more efficient by comparing with other schemes.
Formations of Attachment Relationships towards Teachers Lead to Conclusions for Public Child Care
ERIC Educational Resources Information Center
Beckh, Kathrin; Becker-Stoll, Fabienne
2016-01-01
The aim of this article is to demonstrate how relational experiences with parents and preschool teachers provide children with a feeling of security that facilitates the development of competence in different domains. We first focus on the mechanisms regarding how secure attachments to parents serve as an important foundation for later…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-24
... Commission has considered the proposed rule's impact on efficiency, competition, and capital formation. See... security.''). See also Newton v. Merrill, Lynch, Pierce, Fenner & Smith, Inc., 135 F.3d 266, at 271, 274 (3d Cir.), cert. denied, 525 U.S. 811 (1998); Payment for Order Flow, Securities Exchange Act Release...
Homeland Security and Emergency Management Education: An Investigation into Workforce Needs
ERIC Educational Resources Information Center
Carlson, Cameron D.
2017-01-01
The U.S. Department of Homeland Security (DHS) was created in the wake of the September 11th 2001 terrorist events. DHS's formation, the largest reorganization of a governmental agency in over 50 years, brought a new emphasis on the protection of the nation, its citizens and its infrastructure to government emergency management policy. Previously,…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] AIMS Worldwide, Inc., Apollo Capital Group, Inc., CommunitySouth Financial Corp., Last Mile Logistics Group, Inc., Made in America Entertainment... concerning the securities of Last Mile Logistics Group, Inc. because it has not filed any periodic reports...
Secure Multicast Tree Structure Generation Method for Directed Diffusion Using A* Algorithms
NASA Astrophysics Data System (ADS)
Kim, Jin Myoung; Lee, Hae Young; Cho, Tae Ho
The application of wireless sensor networks to areas such as combat field surveillance, terrorist tracking, and highway traffic monitoring requires secure communication among the sensor nodes within the networks. Logical key hierarchy (LKH) is a tree based key management model which provides secure group communication. When a sensor node is added or evicted from the communication group, LKH updates the group key in order to ensure the security of the communications. In order to efficiently update the group key in directed diffusion, we propose a method for secure multicast tree structure generation, an extension to LKH that reduces the number of re-keying messages by considering the addition and eviction ratios of the history data. For the generation of the proposed key tree structure the A* algorithm is applied, in which the branching factor at each level can take on different value. The experiment results demonstrate the efficiency of the proposed key tree structure against the existing key tree structures of fixed branching factors.
78 FR 24107 - Version 5 Critical Infrastructure Protection Reliability Standards
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-24
... native applications or print-to-PDF format and not a scanned format. Mail/Hand Delivery: Those unable to... criteria that characterize their impact for the application of cyber security requirements commensurate... recognition. Requirement R2 requires testing to verify response plan effectiveness and consistent application...
An Extension Case Study in Institutional Innovation: Microfinance Intermediary Formation
ERIC Educational Resources Information Center
Edelman, Mark A.
2015-01-01
An institutional innovation process led by Extension created a statewide microfinance intermediary. The intermediary provides business technical assistance and microloans to entrepreneurs having difficulty securing conventional credit but having workable business plans. The process included (1) gathering indicators of a problem; (2) formation of a…
Katsumata, Kazuhiro; Hirayasu, Ami; Miyoshi, Junpei; Nishi, Eriko; Ichikawa, Kento; Tateho, Kazuki; Wakuda, Airi; Matsuhara, Hirotada; Yamamoto, Ayumu
2016-01-01
During meiotic prophase, telomeres cluster, forming the bouquet chromosome arrangement, and facilitate homologous chromosome pairing. In fission yeast, bouquet formation requires switching of telomere and centromere positions. Centromeres are located at the spindle pole body (SPB) during mitotic interphase, and upon entering meiosis, telomeres cluster at the SPB, followed by centromere detachment from the SPB. Telomere clustering depends on the formation of the microtubule-organizing center at telomeres by the linker of nucleoskeleton and cytoskeleton complex (LINC), while centromere detachment depends on disassembly of kinetochores, which induces meiotic centromere formation. However, how the switching of telomere and centromere positions occurs during bouquet formation is not fully understood. Here, we show that, when impaired telomere interaction with the LINC or microtubule disruption inhibited telomere clustering, kinetochore disassembly-dependent centromere detachment and accompanying meiotic centromere formation were also inhibited. Efficient centromere detachment required telomere clustering-dependent SPB recruitment of a conserved telomere component, Taz1, and microtubules. Furthermore, when artificial SPB recruitment of Taz1 induced centromere detachment in telomere clustering-defective cells, spindle formation was impaired. Thus, detachment of centromeres from the SPB without telomere clustering causes spindle impairment. These findings establish novel regulatory mechanisms, which prevent concurrent detachment of telomeres and centromeres from the SPB during bouquet formation and secure proper meiotic divisions. PMID:27611693
2009-09-01
instructional format. Using a mixed- method coding and analysis approach, the sample of POIs were categorized, coded, statistically analyzed, and a... Method SECURITY CLASSIFICATION OF 19. LIMITATION OF 20. NUMBER 21. RESPONSIBLE PERSON 16. REPORT Unclassified 17. ABSTRACT...transition to a distributed (or blended) learning format. Procedure: A mixed- methods approach, combining qualitative coding procedures with basic
77 FR 50204 - Star Entertainment Group, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Star Entertainment Group, Inc., Order of... lack of current and accurate information concerning the securities of Star Entertainment Group, Inc. (``Star Entertainment'') because of questions regarding the accuracy of the company's financial statements...
77 FR 14839 - Harris & Harris Group, Inc.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-13
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29976; 812-13313] Harris & Harris Group, Inc.; Notice of Application March 7, 2012. AGENCY: Securities and Exchange Commission... from section 23(c) of the Act. SUMMARY OF THE APPLICATION: Harris & Harris Group, Inc. (``Applicant...
Development of a security system for assisted reproductive technology (ART).
Hur, Yong Soo; Ryu, Eun Kyung; Park, Sung Jin; Yoon, Jeong; Yoon, San Hyun; Yang, Gi Deok; Hur, Chang Young; Lee, Won Don; Lim, Jin Ho
2015-01-01
In the field of assisted reproductive technology (ART), medical accidents can result in serious legal and social consequences. This study was conducted to develop a security system (called IVF-guardian; IG) that could prevent mismatching or mix-ups in ART. A software program was developed in collaboration with outside computer programmers. A quick response (QR) code was used to identify the patients, gametes and embryos in a format that was printed on a label. There was a possibility that embryo development could be affected by volatile organic components (VOC) in the printing material and adhesive material in the label paper. Further, LED light was used as the light source to recognize the QR code. Using mouse embryos, the effects of the label paper and LED light were examined. The stability of IG was assessed when applied in clinical practice after developing the system. A total of 104 cycles formed the study group, and 82 cycles (from patients who did not want to use IG because of safety concerns and lack of confidence in the security system) to which IG was not applied comprised the control group. Many of the label paper samples were toxic to mouse embryo development. We selected a particular label paper (P touch label) that did not affect mouse embryo development. The LED lights were non-toxic to the development of the mouse embryos under any experimental conditions. There were no differences in the clinical pregnancy rates between the IG-applied group and the control group (40/104 = 38.5 % and 30/82 = 36.6 %, respectively). The application of IG in clinical practice did not affect human embryo development or clinical outcomes. The use of IG reduces the misspelling of patient names. Using IG, there was a disadvantage in that each treatment step became more complicated, but the medical staff improved and became sufficiently confident in ART to offset this disadvantage. Patients who received treatment using the IG system also went through a somewhat tedious process, but there were no complaints. These patients gained further confidence in the practitioners over the course of treatment.
Profiles of Irish survivors of institutional abuse with different adult attachment styles.
Carr, Alan; Flanagan, Edel; Dooley, Barbara; Fitzpatrick, Mark; Flanagan-Howard, Roisín; Shevlin, Mark; Tierney, Kevin; White, Megan; Daly, Margaret; Egan, Jonathan
2009-03-01
Two hundred and forty seven survivors of institutional abuse in Ireland were classified with the Experiences in Close Relationships Inventory as having fearful (44%), preoccupied (13%), dismissive (27%), or secure (17%) adult attachment styles. The group with the secure adult attachment style had the most positive profile, while the most negative profile occurred for the fearful group in terms of DSM IV diagnoses and scores on the Trauma Symptom Inventory, the Global Assessment of Functioning Scale, the World Health Organization Quality of Life 100 scale, and the Kansas Marital Satisfaction Scale. The profile of the preoccupied group was more similar to that of the fearful group. The profile of the dismissive group was more similar to that of the secure group.
Adshead, Gwen; Pyszora, Natalie; Wilson, Claire; Gopie, Ramesh; Thomas, Deryk; Smith, Julia; Glorney, Emily; Moore, Estelle; Tapp, James
2017-04-01
Moving on from high secure psychiatric care can be a complex and potentially stressful experience, which may hinder progression. A leavers' group in a UK high secure hospital is offered to support patients with this transition. The aims of this study are to investigate characteristics of patients referred for the leavers' group and compare outcomes for leavers' group graduates with those for patients who never attended a leavers' group for any reason. A retrospective quasi-experimental design was applied to data extracted from various records sources - within and outside the high security hospital. About one-fifth of patients who left the hospital on trial leave during the study were referred to the leavers' group (N = 109). Referred patients were significantly more likely to have either been admitted from another high-security hospital or transferred from prison for treatment and have a diagnosis of paranoid schizophrenia. Patients not referred had a significantly higher rate of previously refusing to participate in groups. There was a tendency for rate of return from trial leave for group graduates to be lower than that of patients who did not attend the leavers' group, but this just failed to reach statistical significance (rate ratio [RR] = 1.04; CI 0.97-1.11). A leavers' group appeared to be a valued therapy option for people who had spent a long time in high secure psychiatric care, or those who continued to require hospital treatment beyond prison tariffs. There was a low return rate from trial leave, which made the evaluation of this outcome difficult. A detailed study into both the reasons for return from trial leave and successes would provide further information on ideal preparation for moving on. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.
Verbeke, Wim; Marcu, Afrodita; Rutsaert, Pieter; Gaspar, Rui; Seibt, Beate; Fletcher, Dave; Barnett, Julie
2015-04-01
Cultured meat has evolved from an idea and concept into a reality with the August 2013 cultured hamburger tasting in London. Still, how consumers conceive cultured meat is largely an open question. This study addresses consumers' reactions and attitude formation towards cultured meat through analyzing focus group discussions and online deliberations with 179 meat consumers from Belgium, Portugal and the United Kingdom. Initial reactions when learning about cultured meat were underpinned by feelings of disgust and considerations of unnaturalness. Consumers saw few direct personal benefits but they were more open to perceiving global societal benefits relating to the environment and global food security. Both personal and societal risks were framed in terms of uncertainties about safety and health, and possible adverse societal consequences dealing with loss of farming and eating traditions and rural livelihoods. Further reflection pertained to skepticism about 'the inevitable' scientific progress, concern about risk governance and control, and need for regulation and proper labeling. Copyright © 2014 Elsevier Ltd. All rights reserved.
Anticipating the unintended consequences of security dynamics.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Backus, George A.; Overfelt, James Robert; Malczynski, Leonard A.
2010-01-01
In a globalized world, dramatic changes within any one nation causes ripple or even tsunamic effects within neighbor nations and nations geographically far removed. Multinational interventions to prevent or mitigate detrimental changes can easily cause secondary unintended consequences more detrimental and enduring than the feared change instigating the intervention. This LDRD research developed the foundations for a flexible geopolitical and socioeconomic simulation capability that focuses on the dynamic national security implications of natural and man-made trauma for a nation-state and the states linked to it through trade or treaty. The model developed contains a database for simulating all 229 recognizedmore » nation-states and sovereignties with the detail of 30 economic sectors including consumers and natural resources. The model explicitly simulates the interactions among the countries and their governments. Decisions among governments and populations is based on expectation formation. In the simulation model, failed expectations are used as a key metric for tension across states, among ethnic groups, and between population factions. This document provides the foundational documentation for the model.« less
78 FR 24161 - Bureau of Industry and Security
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-24
... of Industry and Security senior management. 4. Discussion on General Technology Note as it applies to.... Report of Composite Working Group and other working groups. 7. Report on regime-based activities. 8...
Kwan, Christine Ml; Napoles, Anna M; Chou, Jeyling; Seligman, Hilary K
2015-02-01
To develop a conceptually equivalent Chinese-language translation of the eighteen-item US Household Food Security Survey Module. In the current qualitative study, we (i) highlight methodological challenges which arise in developing survey instruments that will be used to make comparisons across language groups and (ii) describe the development of a Chinese-language translation of the US Household Food Security Survey Module, called the San Francisco Chinese Food Security Module. Community sites in San Francisco, CA, USA. We conducted cognitive interviews with twenty-two community members recruited from community sites hosting food pantries and with five professionals recruited from clinical settings. Development of conceptually equivalent surveys can be difficult. We highlight challenges related to dialect, education, literacy (e.g. preferences for more or less formal phrasing), English words and phrases for which there is no Chinese language equivalent (e.g. 'balanced meals' and 'eat less than you felt you should') and response formats. We selected final translations to maximize: (i) consistency of the Chinese translation with the intent of the English version; (ii) clarity; and (iii) similarities in understanding across dialects and literacy levels. Survey translation is essential for conducting research in many communities. The challenges encountered illustrate how literal translations can affect the conceptual equivalence of survey items across languages. Cognitive interview methods should be routinely used for survey translation when such non-equivalence is suspected, such as in surveys addressing highly culturally bound behaviours such as diet and eating behaviours. Literally translated surveys lacking conceptual equivalence may magnify or obscure important health inequalities.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chinn, D J
This month's issue has the following articles: (1) Homeland Security Begins Abroad--Commentary by John C. Doesburg; (2) Out of Harm's Way--New physical protection and accountability systems, together with a focus on security, safeguard nuclear materials in the Russian Federation; (3) A Calculated Journey to the Center of the Earth--Determining the permeability of partially melted metals in a mineral matrix unlocks secrets about the formation of Earth's core; (4) Wireless That Works--Communication technologies using ultrawideband radar are improving national security; and (5) Power to the People--Edward Teller envisioned safe and plentiful nuclear power for peaceful applications.
Privacy, confidentiality, and electronic medical records.
Barrows, R C; Clayton, P D
1996-01-01
The enhanced availability of health information in an electronic format is strategic for industry-wide efforts to improve the quality and reduce the cost of health care, yet it brings a concomitant concern of greater risk for loss of privacy among health care participants. The authors review the conflicting goals of accessibility and security for electronic medical records and discuss nontechnical and technical aspects that constitute a reasonable security solution. It is argued that with guiding policy and current technology, an electronic medical record may offer better security than a traditional paper record. PMID:8653450
2005-06-01
provisioning, maintaining and guaranteeing service levels for the shared services ? Although these shared, distributed services lie well within the... shared services that interact with a common object definition for transporting alerts. The system is built on top of a rapid SOA application
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-17
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Data Fortress Systems Group Ltd., Digital Youth Network Corp., Fantom Technologies, Inc., and KIK Technology International, Inc., Order of... of current and accurate information concerning the securities of Data Fortress Systems Group Ltd...
Method for secure electronic voting system: face recognition based approach
NASA Astrophysics Data System (ADS)
Alim, M. Affan; Baig, Misbah M.; Mehboob, Shahzain; Naseem, Imran
2017-06-01
In this paper, we propose a framework for low cost secure electronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.
E PLURIBUS UNUM Homeland Security versus Homeland Defense Who Does What and to Whom
2010-04-01
112 APPENDIX IV: SWOT ANALYSIS ............................................................................. 113 APPENDIX V...violent extremism taking root here in the United States. We don‘t have the luxury of focusing our efforts on one group ; we must protect the country from... group that engages in an activity referred to in subparagraph (A). 12 The National Security Act of 1947 created the National Security Council
2011-05-05
groups emerge sporadic.ally. In patticular, the JMJB is widely perceived by the security and intelligent officials in Bangladesh to be the youth wing...organizations and protect others. According to National Security Intelligence sources, there are 20 to 33 Islamist ten·orist groups active in Bangladesh.29 Only...Additional Direction, National Security Intelligence , Bangladesh, broke down how the influx of charitable money is being used and misused in Bangladesh
76 FR 25702 - National Maritime Security Advisory Committee; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-05
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0310] National Maritime Security Advisory... Maritime Security Advisory Committee (NMSAC) will meet by teleconference to discuss the results of the... Maritime Organization (IMO). Agenda (1) Results of Seafarer Access Working Group's review and...
Lived experience of working with female patients in a high-secure mental health setting.
Beryl, Rachel; Davies, Jason; Völlm, Birgit
2018-02-01
Women's secure hospitals are often considered to be stressful and demanding places to work, with these environments characterized as challenging and violent. However, the staff experience of working in this environment is not well represented in the literature. The present study is the first to examine the 'lived experience' of seven nurses working in the National High Secure Healthcare Service for Women. Interview transcripts were analysed with the use of interpretative phenomenological analysis, and the findings presented within four superordinate themes 'horror', 'balancing acts', 'emotional hard labour', and 'the ward as a community'. These themes all depict the challenges that participants experience in their work, the ways in which they cope with these challenges, and how they make sense of these experiences. A meta-theme of 'making sense by understanding why' is also presented, which represents the importance for participants to attempt to make sense of the tensions and challenges by formulating a fuller meaning. The findings suggest the importance of workforce development in terms of allowing sufficient protected time for reflection and formulation (e.g. within the format of group supervision or reflective practice), and for staff-support mechanisms (e.g. clinical supervision, counselling, debriefs) to be inbuilt into the ethos of a service, so as to provide proactive support for staff 'on the frontline'. © 2016 Australian College of Mental Health Nurses Inc.
A Secure Multicast Framework in Large and High-Mobility Network Groups
NASA Astrophysics Data System (ADS)
Lee, Jung-San; Chang, Chin-Chen
With the widespread use of Internet applications such as Teleconference, Pay-TV, Collaborate tasks, and Message services, how to construct and distribute the group session key to all group members securely is becoming and more important. Instead of adopting the point-to-point packet delivery, these emerging applications are based upon the mechanism of multicast communication, which allows the group member to communicate with multi-party efficiently. There are two main issues in the mechanism of multicast communication: Key Distribution and Scalability. The first issue is how to distribute the group session key to all group members securely. The second one is how to maintain the high performance in large network groups. Group members in conventional multicast systems have to keep numerous secret keys in databases, which makes it very inconvenient for them. Furthermore, in case that a member joins or leaves the communication group, many involved participants have to change their own secret keys to preserve the forward secrecy and the backward secrecy. We consequently propose a novel version for providing secure multicast communication in large network groups. Our proposed framework not only preserves the forward secrecy and the backward secrecy but also possesses better performance than existing alternatives. Specifically, simulation results demonstrate that our scheme is suitable for high-mobility environments.
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-10-01
While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software 'R' by effectively combining secret-sharing-based secure computation with original computation. Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50,000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using 'R' that works interactively while secure computation protocols generally require a significant amount of processing time. We propose a secure statistical analysis system using 'R' for medical data that effectively integrates secret-sharing-based secure computation and original computation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Cheating in OSCEs: The Impact of Simulated Security Breaches on OSCE Performance.
Gotzmann, Andrea; De Champlain, André; Homayra, Fahmida; Fotheringham, Alexa; de Vries, Ingrid; Forgie, Melissa; Pugh, Debra
2017-01-01
Construct: Valid score interpretation is important for constructs in performance assessments such as objective structured clinical examinations (OSCEs). An OSCE is a type of performance assessment in which a series of standardized patients interact with the student or candidate who is scored by either the standardized patient or a physician examiner. In high-stakes examinations, test security is an important issue. Students accessing unauthorized test materials can create an unfair advantage and lead to examination scores that do not reflect students' true ability level. The purpose of this study was to assess the impact of various simulated security breaches on OSCE scores. Seventy-six 3rd-year medical students participated in an 8-station OSCE and were randomized to either a control group or to 1 of 2 experimental conditions simulating test security breaches: station topic (i.e., providing a list of station topics prior to the examination) or egregious security breach (i.e., providing detailed content information prior to the examination). Overall total scores were compared for the 3 groups using both a one-way between-subjects analysis of variance and a repeated measure analysis of variance to compare the checklist, rating scales, and oral question subscores across the three conditions. Overall total scores were highest for the egregious security breach condition (81.8%), followed by the station topic condition (73.6%), and they were lowest for the control group (67.4%). This trend was also found with checklist subscores only (79.1%, 64.9%, and 60.3%, respectively for the security breach, station topic, and control conditions). Rating scale subscores were higher for both the station topic and egregious security breach conditions compared to the control group (82.6%, 83.1%, and 77.6%, respectively). Oral question subscores were significantly higher for the egregious security breach condition (88.8%) followed by the station topic condition (64.3%), and they were the lowest for the control group (48.6%). This simulation of different OSCE security breaches demonstrated that student performance is greatly advantaged by having prior access to test materials. This has important implications for medical educators as they develop policies and procedures regarding the safeguarding and reuse of test content.
Attachment, self-worth, and peer-group functioning in middle childhood.
Booth-Laforce, Cathryn; Oh, Wonjung; Kim, Angel Hayoung; Rubin, Kenneth H; Rose-Krasnor, Linda; Burgess, Kim
2006-12-01
We evaluated links between peer-group functioning and indicators of attachment security in relation to both mother and father in middle childhood, among 73 10-year-olds (37 girls). Children's perceptions of security with both parents, coping styles with mother, and self-worth were assessed. Classmates, teachers, and mothers evaluated the participants' peer-related behavioral characteristics. Children's perceptions of security to both parents were related to others' appraisals of their social competence; perceptions of security to father were related to lower aggression. We did not find child gender effects, but children had higher security scores in relation to mother than to father. Self-worth perceptions mediated the relation between attachment and social competence.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-12
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Dialpoint Communications Corp., Pacel Corp., Quantum Group, Inc. (The), and Tradequest International, Inc.; Order of Suspension of Trading September 8... securities of Quantum Group, Inc. (The) because it has not filed any periodic reports since the period ended...
Code of Federal Regulations, 2011 CFR
2011-07-01
... participants and beneficiaries pursuant to paragraph (d)(1) of this section. (2) Comparative format. (i... a chart or similar format that is designed to facilitate a comparison of such information for each... employer securities. In the case of designated investment alternatives designed to invest in, or primarily...
Code of Federal Regulations, 2012 CFR
2012-07-01
... participants and beneficiaries pursuant to paragraph (d)(1) of this section. (2) Comparative format. (i... a chart or similar format that is designed to facilitate a comparison of such information for each... employer securities. In the case of designated investment alternatives designed to invest in, or primarily...
Code of Federal Regulations, 2014 CFR
2014-07-01
... participants and beneficiaries pursuant to paragraph (d)(1) of this section. (2) Comparative format. (i... a chart or similar format that is designed to facilitate a comparison of such information for each... employer securities. In the case of designated investment alternatives designed to invest in, or primarily...
Code of Federal Regulations, 2013 CFR
2013-07-01
... participants and beneficiaries pursuant to paragraph (d)(1) of this section. (2) Comparative format. (i... a chart or similar format that is designed to facilitate a comparison of such information for each... employer securities. In the case of designated investment alternatives designed to invest in, or primarily...
76 FR 63923 - Formations of, Acquisitions by, and Mergers of Bank Holding Companies
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-14
... Security Bank of Washington, Mountlake Terrace, Washington, from a state savings bank to a commercial bank... FEDERAL RESERVE SYSTEM Formations of, Acquisitions by, and Mergers of Bank Holding Companies The companies listed in this notice have applied to the Board for approval, pursuant to the Bank Holding Company...
Authentic leadership, group cohesion and group identification in security and emergency teams.
García-Guiu López, Carlos; Molero Alonso, Fernando; Moya Morales, Miguel; Moriano León, Juan Antonio
2015-01-01
Authentic leadership (AL) is a kind of leadership that inspires and promotes positive psychological capacities, underlining the moral and ethical component of behavior. The proposed investigation studies the relations among AL, cohesion, and group identification in security and emergency teams. A cross-sectional research design was conducted in which participated 221 members from 26 fire departments and operative teams from the local police of three Spanish provinces. The following questionnaires were administered: Authentic Leadership (ALQ), Group Cohesion (GEQ), and Mael and Ashford's Group Identification Questionnaire. A direct and positive relation was found between AL, cohesion, and group identification. An indirect relation was also found between AL and group cohesion through group identification, indicating the existence of partial mediation. The utility of the proposed model based on AL is considered; this model can be employed by those in charge of the fire departments and operative groups in organizations to improve workteams' cohesion. Both AL and group identification help to explain group cohesion in organizations committed to security and emergencies.
Castillo, Encarnación; López-Ramos, Juan A.; Morales, Diego P.
2018-01-01
Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature. PMID:29337921
Parrilla, Luis; Castillo, Encarnación; López-Ramos, Juan A; Álvarez-Bermejo, José A; García, Antonio; Morales, Diego P
2018-01-16
Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.
17 CFR 240.13d-2 - Filing of amendments to Schedules 13D or 13G.
Code of Federal Regulations, 2013 CFR
2013-04-01
...) The first electronic amendment to a paper format Schedule 13D (§ 240.13d-101 of this chapter) or... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Filing of amendments to... Under the Securities Exchange Act of 1934 Regulation 13d-G § 240.13d-2 Filing of amendments to Schedules...
17 CFR 240.13d-2 - Filing of amendments to Schedules 13D or 13G.
Code of Federal Regulations, 2014 CFR
2014-04-01
...) The first electronic amendment to a paper format Schedule 13D (§ 240.13d-101 of this chapter) or... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Filing of amendments to... Under the Securities Exchange Act of 1934 Regulation 13d-G § 240.13d-2 Filing of amendments to Schedules...
1990-06-01
Uses visual communication . _._Changes direction/formation __Crews transmit timely, accurate quickly. messages. NOTES. Figure 22. Sample engagement...and concise. The network control station (NCS) effectively maintains network discipline. Radio security equipment, visual communication , wire...net discipline, (c) clarity and brevity of radio messages, (d) use of transmission security equipment, (e) use of visual communication , (f) use of wire
Fernando, Sumadhya Deepika; Rodrigo, Chaturaka; de Silva, Nipun; Semege, Saveen; Rajapakse, Senaka; Samaranayake, Nilakashi; Senenayake, Sanath; Premaratne, Risintha Gayan
2014-09-01
The security forces are a high risk group for malaria transmission in Sri Lanka. Interrupting transmission and maintaining surveillance in this group is an important component of elimination efforts. The objective of the study was to develop a prototype educational programme on malaria for security forces serving in endemic areas. An interactive seminar was designed to deliver the required knowledge. The content was on current status, transmission, signs and symptoms and the role of security personnel in identification and prevention of malaria. Each seminar was preceded by a pre-test and followed by a post test to assess the improvement of knowledge. Fifty seminars were held in eight districts over 2 months with 2301 security forces personnel participating. Pre seminar knowledge on malaria was significantly better in the medical corps, those who had completed secondary education and in the Army compared to other security forces (p<0.001). Participation in the seminar resulted in an improvement in all domains tested as shown by test scores in post seminar assessment (p<0.001). Conducting a formal educational programme is an effective strategy to improve awareness on malaria amongst security forces personnel who are a high risk group for re-introduction of malaria into the country. © The Author 2014. Published by Oxford University Press on behalf of Royal Society of Tropical Medicine and Hygiene. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
2009-03-03
ajor vulnerabilities still exist in ... general aviation security ,”3 the commission did not further elaborate on the nature of those vulnerabilities...commercial operations may make them an attractive alternative to terrorists seeking to identify and exploit vulnerabilities in aviation security . In this...3, 2003, p. A7. 2 See Report of the Aviation Security Advisory Committee Working Group on General Aviation Airport Security (October 1, 2003); and
78 FR 54634 - National Security Education Board; Notice of Federal Advisory Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-05
... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), Office of the Secretary, DoD. ACTION: Meeting notice... committee working group meeting of the National Security Education Board will take place. DATES: Monday...
Women's Marginalization, Economic Flows, and Environmental Flows: A Classroom Approach.
ERIC Educational Resources Information Center
O'Lear, Shannon
1999-01-01
Discusses environmental security, focusing on the meaning of "security." Defines the global economy as a process in which the security of groups is sought, maintained, or threatened. Illustrates connections among environmental security, the global economy, and abuse of women and children in less economically developed places,…
Exploring Factors That Affect Adoption of Computer Security Practices among College Students
ERIC Educational Resources Information Center
Alqarni, Amani
2017-01-01
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-15
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] ROK Entertainment Group, Inc., RussOil Corp., Tricell, Inc., Tunex International, Inc. (n/k/a Aone Dental International Group, Inc.), and Wireless Age... there is a lack of current and accurate information concerning the securities of Wireless Age...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-11
... intermodal container loaded with eyes crosswise, grouped in rows, in which the coils are loaded to contact... cargo securement regulations for the transportation of groups of metal coils with eyes crosswise, as... cargo securement regulations (then at 49 CFR 393.100(c)) for the transportation of groups of metal coils...
The Influence of Secure Emotional Expression on Team Effectiveness
ERIC Educational Resources Information Center
Bailey, Emily; Dewitt, Matt
2014-01-01
The present study examined the relationship between group effectiveness and secure emotional expression over the course of a 10 week period. The participants consisted of 12 college students who were enrolled in a senior seminar on teamwork. Participants worked in two groups of six and participated in a group meeting each week that consisted of a…
Evaluation of IT security – genesis and its state-of-art
NASA Astrophysics Data System (ADS)
Livshitz, I. I.; Neklyudov, A. V.; Lontsikh, P. A.
2018-05-01
It is topical to evolve processes of an evaluation of the IT security nowadays. Formation and application of common evaluation approaches to the IT component, which are processed by the governmental and civil organizations, are still not solving problem. Successful processing of the independent evaluation for conformity with a security standard is supposed to be the main criteria of a suitability of any IT component to be used in a trusted computer system. The solution of the mentioned-above problem is suggested through the localization of all research, development and producing processes in a national trusted area (digital sovereignty).
Trafford, Zara; Swartz, Alison; Colvin, Christopher J
2018-02-01
In this paper, we explore the increasing activity around labor rights for South African community health workers (CHWs). Contextualizing this activity within broader policy and legal developments, we track the emergence of sporadic mobilizations for decent work (supported by local health activist organizations) and subsequently, the formation of a CHW union. The National Union of Care Workers of South Africa (NUCWOSA) was inaugurated in 2016, hoping to secure formal and secure employment through government and the consequent labor and occupational health protections. Various tensions were observed during fieldwork in the run up to NUCWOSA's formation and raise important questions about representation, legitimacy, and hierarchies of power. We close by offering suggestions for future research in this developing space.
The anchoring function: parental authority and the parent-child bond.
Omer, Haim; Steinmetz, Sarit G; Carthy, Tal; von Schlippe, Arist
2013-06-01
Descriptions of parental authority and of the formation of a secure parent-child bond have remained unconnected in conceptualizations about parenting and child development. The parental anchoring function is here presented as an integrative metaphor for the two fields. Parents who fulfill an anchoring function offer a secure relational frame for the child, while also manifesting a stabilizing and legitimate kind of authority. The anchoring function enriches the two fields by: (1) adding a dimension of authority to the acknowledged functions of the safe haven and the secure base that are seen as core to a secure parent-child bond, and (2) adding considerations about the parent-child bond to Baumrind's classical description of authoritative parenting. © FPI, Inc.
Ferrara, Pietro; Scancarello, Marta; Khazrai, Yeganeh M; Romani, Lorenza; Cutrona, Costanza; DE Gara, Laura; Bona, Gianni
2016-10-12
The nutritional status of foster children, the quality of daily menus in group homes and the Food Security inside these organizations have been poorly studied and this study means to investigate them. A sample of 125 children, ranging in age from 0-17 years, among seven group homes (group A) was compared with 121 children of the general population we (group B). To evaluate nutritional status, BMI percentiles were used. Mean percentiles of both groups were compared through statistical analysis. Both nutritional and caloric daily distributions in each organization were obtained using the 24-hour recall method. A specific questionnaire was administered to evaluate Food Security. From the analysis of mean BMI-for-age (or height-for-length) percentiles, did not observe statistically significant differences between group A and group B. The average daily nutrient and calorie distribution in group homes proves to be nearly optimal with the exception of a slight excess in proteins and a slight deficiency in PUFAs. Moreover, a low intake of iron and calcium was revealed. All organizations obtained a "High Food Security" profile. Nutritional conditions of foster children are no worse than that of children of the general population. Foster care provides the necessary conditions to support their growth.
20 CFR 411.245 - What are a PM's responsibilities under the Ticket to Work program?
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false What are a PM's responsibilities under the Ticket to Work program? 411.245 Section 411.245 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE... formats. For purposes of this section, accessible format means by media that is appropriate to a...
20 CFR 411.245 - What are a PM's responsibilities under the Ticket to Work program?
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false What are a PM's responsibilities under the Ticket to Work program? 411.245 Section 411.245 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE... formats. For purposes of this section, accessible format means by media that is appropriate to a...
20 CFR 411.245 - What are a PM's responsibilities under the Ticket to Work program?
Code of Federal Regulations, 2013 CFR
2013-04-01
... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false What are a PM's responsibilities under the Ticket to Work program? 411.245 Section 411.245 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE... formats. For purposes of this section, accessible format means by media that is appropriate to a...
20 CFR 411.245 - What are a PM's responsibilities under the Ticket to Work program?
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false What are a PM's responsibilities under the Ticket to Work program? 411.245 Section 411.245 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE... formats. For purposes of this section, accessible format means by media that is appropriate to a...
20 CFR 411.245 - What are a PM's responsibilities under the Ticket to Work program?
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false What are a PM's responsibilities under the Ticket to Work program? 411.245 Section 411.245 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE... formats. For purposes of this section, accessible format means by media that is appropriate to a...
Federation for a Secure Enterprise
2016-09-10
12 October 2005 e. RFC Internet X.509 Public Key Infrastructure: Certification Path Building, 2005 f. Public Key Cryptography Standard, PKCS #1...v2.2: RSA Cryptography Standard, RSA Laboratories, October 27, 2012 g. PKCS#12 format PKCS #12 v1.0: Personal Information Exchange Syntax Standard, RSA...ClientHello padding extension, 2015-02-17 f. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier
Analyzing Cases of Resilience Success and Failure - A Research Study
2012-12-01
controls [NIST 2012, NIST 2008] ISO 27002 and ISO 27004 Guidelines for initiating, implementing, maintaining, and improving information security...Commission ( ISO /IEC). Information technology—Security techniques—Code of practice for information security management ( ISO /IEC 27002 :2005). ISO /IEC, 2005...security management system and controls or groups of controls [ ISO /IEC 2005, ISO /IEC 2009] CIS Security Metrics Outcome and practice metrics measuring
Radioactive source security: the cultural challenges.
Englefield, Chris
2015-04-01
Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
A form of relapse prevention for men in a high security hospital.
Newton, Liam; Coles, Dawn; Quayle, Marie
2005-01-01
Marlatt and Gordon's relapse prevention model has evolved, and been applied to many repetitive problem behaviours, including drug use, gambling and sexual offending. High security hospital patients often present with a number of such behaviours. To evaluate a relapse prevention group in one high security hospital. Nine patients were selected on clinical need for the group. In a naturalistic study design, each completed several self-report questionnaires pre- and post-group. Analysis of group results demonstrated a significant increase in guilt and acceptance of responsibility for offences (GBAI ratings), and reduced endorsement of pro-offending thinking styles (PICTS). Movement towards increased empathy, and decreased impulsivity and venturesomeness, did not reach significance. All participants showed some changes in desired directions but effects were small. Both relapse prevention and its evaluation are limited in high security hospitals by the restricted opportunities for testing out new skills. The feasibility of delivering an RP programme and evaluating it in high security has nevertheless been established. The small effects found may be promising, and suggest both justification and need for a randomized controlled trial of this approach in that setting. Copyright (c) 2005 John Wiley & Sons, Ltd.
NASA Technical Reports Server (NTRS)
Tencati, Ron
1991-01-01
An overview is presented of the NASA Science Internet (NSI) security task. The task includes the following: policies and security documentation; risk analysis and management; computer emergency response team; incident handling; toolkit development; user consulting; and working groups, conferences, and committees.
Kwan, Christine ML; Napoles, Anna M; Chou, Jeyling; Seligman, Hilary K
2014-01-01
Objective To develop a conceptually equivalent Chinese-language translation of the eighteen-item US Household Food Security Survey Module. Design In the current qualitative study, we (i) highlight methodological challenges which arise in developing survey instruments that will be used to make comparisons across language groups and (ii) describe the development of a Chinese-language translation of the US Household Food Security Survey Module, called the San Francisco Chinese Food Security Module. Setting Community sites in San Francisco, CA, USA. Subjects We conducted cognitive interviews with twenty-two community members recruited from community sites hosting food pantries and with five professionals recruited from clinical settings. Results Development of conceptually equivalent surveys can be difficult. We highlight challenges related to dialect, education, literacy (e.g. preferences for more or less formal phrasing), English words and phrases for which there is no Chinese language equivalent (e.g. ‘balanced meals’ and ‘eat less than you felt you should’) and response formats. We selected final translations to maximize: (i) consistency of the Chinese translation with the intent of the English version; (ii) clarity; and (iii) similarities in understanding across dialects and literacy levels. Conclusions Survey translation is essential for conducting research in many communities. The challenges encountered illustrate how literal translations can affect the conceptual equivalence of survey items across languages. Cognitive interview methods should be routinely used for survey translation when such non-equivalence is suspected, such as in surveys addressing highly culturally bound behaviours such as diet and eating behaviours. Literally translated surveys lacking conceptual equivalence may magnify or obscure important health inequalities. PMID:24642365
Mother-Child Attachment From Infancy to the Preschool Years: Predicting Security and Stability.
Meins, Elizabeth; Bureau, Jean-François; Fernyhough, Charles
2018-05-01
Relations between maternal mind-mindedness (appropriate and nonattuned mind-related comments), children's age-2 perspective-taking abilities, and attachment security at 44 (n = 165) and 51 (n = 128) months were investigated. Nonattuned comments predicted insecure preschool attachment, via insecure 15-month attachment security (44-month attachment) and poorer age-2 perspective-taking abilities (51-month attachment). With regard to attachment stability, higher perspective-taking abilities distinguished the stable secure groups from (a) the stable insecure groups and (b) children who changed from secure to insecure (at trend level). These effects were independent of child gender, stressful life events, and socioeconomic status (SES). The contribution of these findings to our understanding of stability and change in attachment security from infancy to the preschool years is discussed. © 2017 The Authors. Child Development © 2017 Society for Research in Child Development, Inc.
Barr, W; Brown, A; Quinn, B; McFarlane, J; McCabe, R; Whittington, R
2013-02-01
In the past decade UK government policy has been to develop alternative care for women detained in secure psychiatric hospital. This study evaluated the relative benefits of community-based step-down housing. Comparisons were made between female patients in community step-down housing and a control group in secure hospital who were on the waiting list for the houses. For each woman in the sample, a range of assessments was conducted on three separate occasions over a 12-month period. We noted a gradual improvement over time in women in both settings. However, by the final assessment psychological well-being and security needs were significantly better in the community group (P < 0.05). Although risks for violence and social functioning were also somewhat better in this group throughout the study, no statistically significant differences between the groups were found in these areas at any assessment time. This study has generated evidence in support of the further development of high-support step-down community housing for women in secure psychiatric care. This initiative may provide greater personal freedom and enhanced relational security for the women concerned while also facilitating improvements in their psychological well-being, with no increased risk to the women themselves or to the wider community. © 2012 Blackwell Publishing.
2018-01-01
BACKGROUND/OBJECTIVES This cross-sectional study assessed household food security status and determined its association with diet quality and weight status among indigenous women from the Mah Meri tribe in Peninsular Malaysia. SUBJECTS/METHODS The Radimer/Cornell Hunger and Food Insecurity Instrument and the Malaysian Healthy Eating Index (HEI) were used to assess household food security status and diet quality, respectively. Information on socio-demographic characteristics and 24-hour dietary recall data were collected through face-to-face interview, and anthropometric measurements including weight, height, and body mass index (BMI) were obtained from 222 women. RESULTS Majority of households (82.9%) experienced different levels of food insecurity: 29.3% household food insecurity, 23.4% individual food insecurity, and 30.2% fell into the child hunger group. The food-secure group had significantly fewer children and smaller household sizes than the food-insecure groups (P < 0.05). The mean household income, income per capita, and food expenditure significantly decreased as food insecurity worsened (P < 0.001). The food-secure group had significantly higher Malaysian HEI scores for grains and cereals (P < 0.01), as well as for meat, poultry, and eggs (P < 0.001), than the food-insecure groups. The child-hunger group had significantly higher fat (P < 0.05) and sodium (P < 0.001) scores than the food-secure and household food-insecure groups. Compared to the individual food-insecure and child-hunger groups, multivariate analysis of covariance showed that the food-secure group was significantly associated with a higher Malaysian HEI score while the household food-insecure group was significantly associated with a higher BMI after controlling for age (P < 0.025). CONCLUSIONS The majority of indigenous households faced food insecurity. Food insecurity at the individual and child levels was associated with lower quality of diet, while food insecurity at the household level was associated with higher body weight. Therefore, a substantial effort by all stakeholders is warranted to improve food insecurity among poorer households. The results suggest a pressing need for nutritional interventions to improve dietary intake among low income households. PMID:29629030
Pei, Chong Su; Appannah, Geeta; Sulaiman, Norhasmah
2018-04-01
This cross-sectional study assessed household food security status and determined its association with diet quality and weight status among indigenous women from the Mah Meri tribe in Peninsular Malaysia. The Radimer/Cornell Hunger and Food Insecurity Instrument and the Malaysian Healthy Eating Index (HEI) were used to assess household food security status and diet quality, respectively. Information on socio-demographic characteristics and 24-hour dietary recall data were collected through face-to-face interview, and anthropometric measurements including weight, height, and body mass index (BMI) were obtained from 222 women. Majority of households (82.9%) experienced different levels of food insecurity: 29.3% household food insecurity, 23.4% individual food insecurity, and 30.2% fell into the child hunger group. The food-secure group had significantly fewer children and smaller household sizes than the food-insecure groups ( P < 0.05). The mean household income, income per capita, and food expenditure significantly decreased as food insecurity worsened ( P < 0.001). The food-secure group had significantly higher Malaysian HEI scores for grains and cereals ( P < 0.01), as well as for meat, poultry, and eggs ( P < 0.001), than the food-insecure groups. The child-hunger group had significantly higher fat ( P < 0.05) and sodium ( P < 0.001) scores than the food-secure and household food-insecure groups. Compared to the individual food-insecure and child-hunger groups, multivariate analysis of covariance showed that the food-secure group was significantly associated with a higher Malaysian HEI score while the household food-insecure group was significantly associated with a higher BMI after controlling for age ( P < 0.025). The majority of indigenous households faced food insecurity. Food insecurity at the individual and child levels was associated with lower quality of diet, while food insecurity at the household level was associated with higher body weight. Therefore, a substantial effort by all stakeholders is warranted to improve food insecurity among poorer households. The results suggest a pressing need for nutritional interventions to improve dietary intake among low income households.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-21
... SECURITIES AND EXCHANGE COMMISSION In the Matter of Cape Systems Group, Inc., Caribbean Cigar...., File No. 500-1; Order of Suspension of Trading October 19, 2010. It appears to the Securities and... Cape Systems Group, Inc. because it has not filed any periodic reports since the period ended December...
Minimum Requirements for Taxicab Security Cameras.
Zeng, Shengke; Amandus, Harlan E; Amendola, Alfred A; Newbraugh, Bradley H; Cantis, Douglas M; Weaver, Darlene
2014-07-01
The homicide rate of taxicab-industry is 20 times greater than that of all workers. A NIOSH study showed that cities with taxicab-security cameras experienced significant reduction in taxicab driver homicides. Minimum technical requirements and a standard test protocol for taxicab-security cameras for effective taxicab-facial identification were determined. The study took more than 10,000 photographs of human-face charts in a simulated-taxicab with various photographic resolutions, dynamic ranges, lens-distortions, and motion-blurs in various light and cab-seat conditions. Thirteen volunteer photograph-evaluators evaluated these face photographs and voted for the minimum technical requirements for taxicab-security cameras. Five worst-case scenario photographic image quality thresholds were suggested: the resolution of XGA-format, highlight-dynamic-range of 1 EV, twilight-dynamic-range of 3.3 EV, lens-distortion of 30%, and shutter-speed of 1/30 second. These minimum requirements will help taxicab regulators and fleets to identify effective taxicab-security cameras, and help taxicab-security camera manufacturers to improve the camera facial identification capability.
78 FR 27966 - Joint Working Group on Improving Cybersecurity and Resilience Through Acquisition
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-13
... Working Group on Improving Cybersecurity and Resilience Through Acquisition AGENCY: Office of Emergency... the Department of Homeland Security and the Federal Acquisition Regulation Council, are required to... security standards into acquisition planning and contract administration and address what steps [[Page...
2007-09-11
clerics Abu Bakar Baasyir and Abdullah Sungkar, began demanding the establishment of sharia law in Indonesia. The two considered themselves the...the violent Abu Sayyaf Group. It has also launched a Regional Maritime Security Initiative to enhance security in the Straits of Malacca, increase...15 The Abu Sayyaf Group
77 FR 19300 - National Infrastructure Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-30
... Homeland Security with advice on the security of the critical infrastructure sectors and their information systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as... Group regarding the scope of the next phase of the Working Group's critical infrastructure resilience...
NASA Astrophysics Data System (ADS)
Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.
2017-10-01
IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.
Ross, Sue; Tang, Selphee; Schulz, Jane; Murphy, Magnus; Goncalves, Jose; Kaye, Stephen; Dederer, Lorel; Robert, Magali
2014-12-22
In 2006, Ethicon Inc. introduced a new minimally invasive single incision sling device for the surgical treatment of stress urinary incontinence, the Gynecare TVT Secur®. For device licensing, no new evidence of TVT Secur efficacy and safety was needed: rather evidence was provided of the long-term follow-up of patients who had a procedure using a predecate retropubic tension-free vaginal tape device. Before adopting TVT Secur into our routine clinical practice, we decided to evaluate it. The objective of our Canadian multi-centre pragmatic randomized controlled trial was to compare the effectiveness of the new single-incision device, TVT Secur, to the established TVT device, in terms of objective cure of stress urinary incontinence (SUI) at 12 months postoperatively. Other outcomes included: complications, symptoms, and incontinence-related quality of life. The sample size estimate for our trial was 300, but the trial stopped early because of poor recruitment. 74 women participated (40 allocated to TVT Secur, 34 to TVT). At 12 months postoperatively, 27/33(82%) of TVT Secur group were cured, compared with 25/28(89%) of the TVT group (relative risk 0.92, 95% confidence interval 0.75 to 1.13, p=0.49). Most women reported little or no SUI symptoms (35/37(95%) vs 29/30(97%), >0.999). Quality of life improved significantly from baseline for both groups (IIQ-7 mean change -25 for both groups) but did not differ between groups (p=0.880). Our small randomized trial did not find statistically significant differences in outcomes between women allocated to the TVT Secur device versus those allocated to the TVT device for stress urinary incontinence. Despite the discontinuation of TVT Secur in March 2013 for commercial reasons, the importance of our study lies in making evidence available for the many women who had a TVT Secur device implanted and their physicians who may be considering alternative treatments. Our experience illustrates the difficulty of undertaking research on new licensed devices in a rapidly changing surgical specialty, and further highlights the need for research before licensing if surgeons and their patients are to be confident in the effectiveness and safety of new surgical devices. ClinicalTrials.gov NCT00685217, 22 May 2008.
Jiménez Calvo, J; Hualde Alfaro, A; Raigoso Ortega, O; Cebrian Lostal, J L; Alvarez Bandres, S; Jiménez Parra, J; Montesino Semper, M; Santiago Gonzalez de Garibay, A
2008-01-01
The purpose of this publication is to describe the surgical technique, assess complications and short-term results of TVT secur and MiniArc tapes. From October 2006 to August 2007 it was carried out the surgical correction with TVT Secur,Women's Health & Urology, Ethicon, Johnson & Johnson, placing the tape as a hammock, to 51 patients, 38 of them with pure stress incontinence and 13 with mixed incontinence and with an average age of 57 years. From September 2007 to February 2008 41 patients, 33 of them with pure stress incontinence and 8 with mixed incontinence, with an average of age of 58 years were operated with AMS Miniarc swing system tape, posted on hammock. All procedures were performed with sedoanalgesia and Ambulatory Surgery regime. Patients were monitored in outpatient visits one month, 3 months and one year after surgical procedure. Medical history and questionnaire and ICIQ-SF, to which we added a question to quantify the degree of satisfaction, as well as physical examination, were done. We compared the results of both technical procedures and statistical survey was conducted by Student test. [Analysis with SPSS software (V14.0)]. The median follow-up in TVT secur group was 328 days (range 163-522 days) and 101 days (range 41-209 days) inthe MiniArc group. We only had one (TVT secur group) surgical complication in all the series (92 patients) being a bladder perforation. Taking into account that we read a negative test effort as an objective cure in the TVT secur group, 80.4% patients are cured and 90.2% inthe MiniArc group without significant difference between both groups (p 0095). To assess the subjective healing we utilized the ICIQ-SF test and the satisfaction extra-question and we noted that there is no significant difference between the first and third month controls. (90% of patients satisfied). 80% of patients were completely satisfied in the first year control that was only performed to TVT secur group. These new tapes show fewer complications that the TVT-O and TOT tapes and allow the possibility of placement with local anesthesia but further studies are needed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education & Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1-3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices. Leaders may incorporate the Short Subjects into presentations. After talkingmore » about a subject area, one of the Short Subjects may be shown to highlight that subject matter. Another method for sharing them could be to show a Short Subject first and then lead a discussion about its topic. The cast of characters and a bit of information about their personalities in the LLNL Computer Security Short Subjects is included in this report.« less
ERIC Educational Resources Information Center
Social and Labour Bulletin, 1983
1983-01-01
This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)
The complexities of HIPAA and administration simplification.
Mozlin, R
2000-11-01
The Health Insurance Portability and Accessibility Act (HIPAA) was signed into law in 1996. Although focused on information technology issues, HIPAA will ultimately impact day-to-day operations at multiple levels within any clinical setting. Optometrists must begin to familiarize themselves with HIPAA in order to prepare themselves to practice in a technology-enriched environment. Title II of HIPAA, entitled "Administration Simplification," is intended to reduce the costs and administrative burden of healthcare by standardizing the electronic transmission of administrative and financial transactions. The Department of Health and Human Services is expected to publish the final rules and regulations that will govern HIPAA's implementation this year. The rules and regulations will cover three key aspects of healthcare delivery: electronic data interchange (EDI), security and privacy. EDI will standardize the format for healthcare transactions. Health plans must accept and respond to all transactions in the EDI format. Security refers to policies and procedures that protect the accuracy and integrity of information and limit access. Privacy focuses on how the information is used and disclosure of identifiable health information. Security and privacy regulations apply to all information that is maintained and transmitted in a digital format and require administrative, physical, and technical safeguards. HIPAA will force the healthcare industry to adopt an e-commerce paradigm and provide opportunities to improve patient care processes. Optometrists should take advantage of the opportunity to develop more efficient and profitable practices.
Integrity and security in an Ada runtime environment
NASA Technical Reports Server (NTRS)
Bown, Rodney L.
1991-01-01
A review is provided of the Formal Methods group discussions. It was stated that integrity is not a pure mathematical dual of security. The input data is part of the integrity domain. The group provided a roadmap for research. One item of the roadmap and the final position statement are closely related to the space shuttle and space station. The group's position is to use a safe subset of Ada. Examples of safe sets include the Army Secure Operating System and the Penelope Ada verification tool. It is recommended that a conservative attitude is required when writing Ada code for life and property critical systems.
Delibegović, Samir; Mehmedovic, Zlatan
2018-05-01
During laparoscopic appendectomy, the base of the appendix is usually secured by loop ligature or stapling device. Hem-o-lok and DS clips have been shown as alternative techniques. The aim of this study was to compare the clinical outcomes of various forms of securing the base of the appendix, in order to find the most suitable method. The study included 120 patients with acute appendicitis randomly divided into four groups with 30 patients in each. In the first group, the base of the appendix was secured using an Endoloop, in the second group using a stapling device, in the third group using Hem-o-lok, and in the fourth group using a DS clip. The primary outcome was overall morbidity following securing the base of the appendix. Secondary outcomes were time of application and operative procedure, total length of stay, and surgical outcome. No morbidity was recorded in any group. The time of application was significantly longer in the Endoloop group than in the Stapler (P < 0.0001), Hem-o-lok (P < 0.0001), and DS clips (P < 0.0001) groups. The time of application in the Stapler group was significantly shorter than in the Hem-o-lok (P < 0.0001) and the DS clips (P < 0.0001) groups. The time of the operative procedure was significantly longer in the Endoloop than in the Stapler group (P < 0.0001). The time of the operative procedure in the Stapler group was significantly shorter than in the DS clips group (P < 0.0001) but did not differ significantly from the Hem-o-lok group (P = 0.199). The time of the operative procedure in the Hem-o-lok group was significantly shorter than in the DS clips group (P = 0.044). All forms of closure of the appendix base are acceptable, but Hem-o-lok and DS clips have the best potential for further development, and will probably become the method of choice in securing the base of the appendix.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... lack of current and accurate information concerning the securities of Cargo Connection Logistics... Group BDC, Inc., Cargo Connection Logistics Holding, Inc., Diapulse Corporation of America, Globus... current and accurate information concerning the securities of Altus Pharmaceuticals, Inc. because it has...
Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library
ERIC Educational Resources Information Center
McMullen, Karen D.; Kane, Laura Townsend
2008-01-01
In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…
1988-07-11
OFFICE OF NAVAL RESEARCH Contract N00014-84-G-0201 Task No. 0051-865 0 Technical Report #21 Exciplex Formation Between Silver Ions and the Lowest...ELEMENT NO-. NO NO ~ ACCESSION NO 11. TITLE (include Security Classification) Exciplex Formation Between Silver Ions and the Lowest MLCT Excited State of... eXCiplexes with upIV to six silver ions per excited Cation. Lifetime, wavelength data are presented as a function of the [Agi/[Ru] ratio. An excited state
Smart, Injury-Triggered Therapy for Ocular Trauma
2016-10-01
prognosis due to retinal cell death , scar formation, and lack of functional regeneration. Proliferative vitreoretinopathy (PVR), a form of intraocular...Proteases, Metalloproteinases, Cell death , Gene Therapy 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME...vision has a poor prognosis due to retinal cell death , scar formation, and lack of functional regeneration. Proliferative vitreoretinopathy (PVR), a
Control Theoretic Modeling for Uncertain Cultural Attitudes and Unknown Adversarial Intent
2009-02-01
Constructive computational tools. 15. SUBJECT TERMS social learning, social networks , multiagent systems, game theory 16. SECURITY CLASSIFICATION OF: a...over- reactionary behaviors; 3) analysis of rational social learning in networks : analysis of belief propagation in social networks in various...general methodology as a predictive device for social network formation and for communication network formation with constraints on the lengths of
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] M (2003) PLC (f/k/a Marconi PLC), Mayfair Mining & Minerals, Inc.,MM2 Group, Inc., Nayna Networks, Inc., NCT Group, Inc., and Neptune Industries... securities of M (2003) PLC (f/k/a Marconi PLC) because it has not filed any periodic reports since the period...
NASA Astrophysics Data System (ADS)
Loveless, Sian E.; Bloomfield, John P.; Ward, Robert S.; Hart, Alwyn J.; Davey, Ian R.; Lewis, Melinda A.
2018-03-01
Shale gas is considered by many to have the potential to provide the UK with greater energy security, economic growth and jobs. However, development of a shale gas industry is highly contentious due to environmental concerns including the risk of groundwater pollution. Evidence suggests that the vertical separation between exploited shale units and aquifers is an important factor in the risk to groundwater from shale gas exploitation. A methodology is presented to assess the vertical separation between different pairs of aquifers and shales that are present across England and Wales. The application of the method is then demonstrated for two of these pairs—the Cretaceous Chalk Group aquifer and the Upper Jurassic Kimmeridge Clay Formation, and the Triassic sandstone aquifer and the Carboniferous Bowland Shale Formation. Challenges in defining what might be considered criteria for `safe separation' between a shale gas formation and an overlying aquifer are discussed, in particular with respect to uncertainties in geological properties, aquifer extents and determination of socially acceptable risk levels. Modelled vertical separations suggest that the risk of aquifer contamination from shale exploration will vary greatly between shale-aquifer pairs and between regions and this will need to be considered carefully as part of the risk assessment and management for any shale gas development.
Moniz, Marcela de Abreu; Sabóia, Vera Maria; Carmo, Cleber Nascimento do; Hacon, Sandra de Souza
2017-11-01
The aim of this study was to diagnose the priority socio environmental problems and the health risks from the surrounding communities the Petrochemical Complex of Rio de Janeiro. Characterized by a participatory approach, the action research has led to the application of interviews, focal groups, meetings and workshop with social actors of Porto das Caixas and Sambaetiba districts, located in Itaboraí city/RJ from November 2013 to December 2014. A structural analysis of the problems prioritized by the communities (water supply, sewage treatment and risk of transmissible diseases; risk of air pollution and respiratory diseases; absence of public security and risk of violence) sketched out the cause-effect-intervention relationship, on the basis of the Protocol for Assessing Community Excellence in Environmental Health. The process revealed the absence of representativity of the social actors of the studied localities in spaces of decision-making on the environmental issue. Educational actions with professionals and inhabitants that aim to promote the formation of collective movements urge, indispensable to guarantee the rights of mitigation of situations of contamination of air and access to sanitation services and public security and thus of conditions of lower risk to health.
AgMIP Training in Multiple Crop Models and Tools
NASA Technical Reports Server (NTRS)
Boote, Kenneth J.; Porter, Cheryl H.; Hargreaves, John; Hoogenboom, Gerrit; Thornburn, Peter; Mutter, Carolyn
2015-01-01
The Agricultural Model Intercomparison and Improvement Project (AgMIP) has the goal of using multiple crop models to evaluate climate impacts on agricultural production and food security in developed and developing countries. There are several major limitations that must be overcome to achieve this goal, including the need to train AgMIP regional research team (RRT) crop modelers to use models other than the ones they are currently familiar with, plus the need to harmonize and interconvert the disparate input file formats used for the various models. Two activities were followed to address these shortcomings among AgMIP RRTs to enable them to use multiple models to evaluate climate impacts on crop production and food security. We designed and conducted courses in which participants trained on two different sets of crop models, with emphasis on the model of least experience. In a second activity, the AgMIP IT group created templates for inputting data on soils, management, weather, and crops into AgMIP harmonized databases, and developed translation tools for converting the harmonized data into files that are ready for multiple crop model simulations. The strategies for creating and conducting the multi-model course and developing entry and translation tools are reviewed in this chapter.
Choto, R
1998-01-01
In Karanga community, 410 km south of Harare, Zimbabwe, the Intermediate Technology Development Group's (ITDG) farming project has successfully improved household food security through its farming project. The ITDG encouraged the formation of 35 women's garden clubs that have allowed women to reduce their individual labor, become closer to each other, and incorporate improved farming methods to increase crop production. The ITDG started work in 1991, just before a severe drought in 1992 forced over 770,000 people to rely on aid for food. ITDG changed the unsuccessful, top-down approach of state agricultural workers to a more successful, bottom-up approach. It also reintroduced intercropping and integrated farming systems to compensate for the fact that the average number of households of six people manages with only about a hectare of land. Indigenous methods, such as intercropping onions for pest management, are reducing reliance on chemicals, and chicken and goal manure is used for fertilizer. In addition to improving food security and nutrition, the gardens are producing enough surplus vegetables for sale. ITDG has also assisted the drought-prone community in developing water conservation techniques that use infiltration pits and gravity to nourish the soil after the rains have stopped.
Terekhov, G V; Furmanov, Iu A; Gvozdetskiĭ, V S; Savitskaia, I M
2008-06-01
A new method of the live biological tissues connection, using thermal energy of a high-temperature argon plasma, constituting perspective trend of application of a new nonsuture methods of the tissues connection, original for the world practice, was elaborated in the Department of Experimental Surgery together with the Institute of welding named after Academician E. O. Paton NAS of Ukraine. The argon-plasma welding application secure safe adhesion of the connecting surfaces formation due to the protein complexes temperature denaturation occurrence. The absence of foreign bodies in the connection zone as well as the presence of the plasma flow bacterocidal properties secure, while application of this new method, a significant lowering of a bacterial soiling of the formatted anastomoses, not interfering with the tissue natural regeneration process course.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-23
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Aspen Group Resources Corp., Commercial Concepts, Inc., Desert Health Products, Inc., Equalnet Communications Corp., Geneva Steel Holdings Corp... securities of Commercial Concepts, Inc. because it has not filed any periodic reports since the period ended...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-02
... audited by independent public accountants to all CDS Clearing Members engaged in security-based swap... clearing security-based swaps a report by independent public accountants regarding CME Group's system of... CME Group Inc. by independent public accountant regarding its system of internal accounting control...
Cryptographic Research and NSA: Report of the Public Cryptography Study Group.
ERIC Educational Resources Information Center
Davida, George I.
1981-01-01
The Public Cryptography Study Group accepted the claim made by the National Security Agency that some information in some publications concerning cryptology could be inimical to national security, and is allowing the establishment of a voluntary mechanism, on an experimental basis, for NSA to review cryptology manuscripts. (MLW)
Report of the Public Cryptography Study Group.
ERIC Educational Resources Information Center
American Council on Education, Washington, DC.
Concerns of the National Security Agency (NSA) that information contained in some articles about cryptography in learned and professional journals and in monographs might be inimical to the national security are addressed. The Public Cryptography Study Group, with one dissenting opinion, recommends that a voluntary system of prior review of…
77 FR 22622 - AP Henderson Group, BPO Management Services, Inc., Capital Mineral Investors, Inc...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] AP Henderson Group, BPO Management Services, Inc., Capital Mineral Investors, Inc., CardioVascular BioTherapeutics, Inc., and 1st Centennial... that there is a lack of current and accurate information concerning the securities of 1st Centennial...
78 FR 46851 - Controlled Group Regulation Examples
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-02
.... Investment Company Z, which keeps its books and makes its returns on the basis of the calendar year, at the... that illustrate the controlled group rules related to regulated investment companies (RICs). These... Government securities or the securities of other regulated investment companies) of any one issuer, (ii) the...
Query Health: standards-based, cross-platform population health surveillance.
Klann, Jeffrey G; Buck, Michael D; Brown, Jeffrey; Hadley, Marc; Elmore, Richard; Weber, Griffin M; Murphy, Shawn N
2014-01-01
Understanding population-level health trends is essential to effectively monitor and improve public health. The Office of the National Coordinator for Health Information Technology (ONC) Query Health initiative is a collaboration to develop a national architecture for distributed, population-level health queries across diverse clinical systems with disparate data models. Here we review Query Health activities, including a standards-based methodology, an open-source reference implementation, and three pilot projects. Query Health defined a standards-based approach for distributed population health queries, using an ontology based on the Quality Data Model and Consolidated Clinical Document Architecture, Health Quality Measures Format (HQMF) as the query language, the Query Envelope as the secure transport layer, and the Quality Reporting Document Architecture as the result language. We implemented this approach using Informatics for Integrating Biology and the Bedside (i2b2) and hQuery for data analytics and PopMedNet for access control, secure query distribution, and response. We deployed the reference implementation at three pilot sites: two public health departments (New York City and Massachusetts) and one pilot designed to support Food and Drug Administration post-market safety surveillance activities. The pilots were successful, although improved cross-platform data normalization is needed. This initiative resulted in a standards-based methodology for population health queries, a reference implementation, and revision of the HQMF standard. It also informed future directions regarding interoperability and data access for ONC's Data Access Framework initiative. Query Health was a test of the learning health system that supplied a functional methodology and reference implementation for distributed population health queries that has been validated at three sites. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Lengthening of fourth brachymetatarsia by three different surgical techniques.
Lee, W-C; Yoo, J H; Moon, J-S
2009-11-01
We carried out a retrospective study to assess the clinical results of lengthening the fourth metatarsal in brachymetatarsia in 153 feet of 106 patients (100 female, six males) using three different surgical techniques. In one group lengthening was performed by one-stage intercalary bone grafting secured by an intramedullary Kirschner-wire (45 feet, 35 patients). In the second group lengthening was obtained gradually using a mini-external fixator after performing an osteotomy with a saw (59 feet, 39 patients) and in the third group lengthening was achieved in a gradual manner using a mini-external fixator after undertaking an osteotomy using osteotome through pre-drilled holes (49 feet, 32 patients). The mean age of the patients was 26.3 years (13 to 48). Pre-operatively, the fourth ray of the bone-graft group was longer than that of other two groups (p < 0.000). The clinical outcome was compared in the three groups. The mean follow-up was 22 months (7 to 55). At final follow-up, the mean lengthening in the bone-graft group was 13.9 mm (3.5 to 23.0, 27.1%) which was less than that obtained in the saw group with a mean of 17.8 mm (7.0 to 33.0, 29.9%) and in the pre-drilled osteotome group with a mean of 16.8 mm (6.5 to 28.0, 29.4%, p = 0.001). However, the mean time required for retention of the fixation in the bone-graft group was the shortest of the three groups. Patients were dissatisfied with the result for five feet (11.1%) in the bone-graft group, eight (13.6%) in the saw group and none in the pre-drilled osteotomy group (p < 0.000). The saw group included eight feet with failure of bone formation after surgery. Additional operations were performed in 20 feet because of stiffness (n = 7, all groups), failure of bone formation (n = 4, saw group), skin maceration (n = 4, bone-graft group), malunion (n = 4, bone-graft and saw groups) and breakage of the external fixator (n = 1, saw group). We conclude that the gradual lengthening by distraction osteogenesis after osteotomy using an osteotome produces the most reliable results for the treatment of fourth brachymetatarsia.
Effective user management with high strength crypto -key in dynamic group environment in cloud
NASA Astrophysics Data System (ADS)
Kumar, P. J.; Suganya, P.; Karthik, G.
2017-11-01
Cloud Clusters consists of various collections of files which are being accessed by multiple users of Cloud. The users are managed as a group and the association of the user to a particular group is dynamic in nature. Every group has a manager who handles the membership of a user to a particular group by issuing keys for encryption and decryption. Due to the dynamic nature of a user he/she may leave the group very frequently. But an attempt can be made by the user who has recently left the group to access a file maintained by that group. Key distribution becomes a critical issue while the behavior of the user is dynamic. Existing techniques to manage the users of group in terms of security and key distribution has been investigated so that to arrive at an objective to identify the scopes to increase security and key management scheme in cloud. The usage of various key combinations to measure the strength of security and efficiency of user management in dynamic cloud environment has been investigated.
76 FR 72967 - Aviation Security Advisory Committee (ASAC) Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-28
...The Transportation Security Administration (TSA) will hold a meeting of the Aviation Security Advisory Committee (ASAC) via telephone conference on December 15, 2011, to establish working groups and set the agenda for future activity. This meeting will be open to the public.
Ma, Bing; Liu, Shanshi; Liu, Donglai; Wang, Hongchun
2016-04-01
This research focuses on investigating whether organisational identification mediates the effects of job security on in-role behaviour and extra-role behaviour and how these mediation mechanisms differ according to gender. Through analysing 212 supervisor-subordinate dyads from a Chinese air transportation group, the research indicated that organisational identification partially mediated the effect of job security on in-role behaviour and fully mediated the effect of job security on extra-role behaviour. A multi-group analysis also showed that there were significant differences between male and female employees in these relationships. In addition, moderated mediation analyses showed that gender moderated the indirect effects of job security on in-role behaviour and extra-role behaviour through organisational identification. Limitations and implications of these findings are discussed. © 2015 International Union of Psychological Science.
Secure multi-party communication with quantum key distribution managed by trusted authority
Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen
2013-07-09
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.
Secure multi-party communication with quantum key distribution managed by trusted authority
Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen
2015-01-06
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.
Building a highly available and intrusion tolerant Database Security and Protection System (DSPS).
Cai, Liang; Yang, Xiao-Hu; Dong, Jin-Xiang
2003-01-01
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.
Bahrain: Reform, Security, and U.S. Policy
2017-09-29
responsibility for bombings and other attacks primarily against security officials. The Bahrain government’s use of repression against the dissent...activity of violent, underground groups that, among their tactics, detonate bombs and improvised explosive devices (IEDs) against security forces. These...issued its first public statement in April 2013 and has since claimed responsibility for about 20 bombings against security personnel, including one
Matrix Game Methodology - Support to V2010 Olympic Marine Security Planners
2011-02-01
OMOC was called the Integrated Safety /Security Matrix Game – Marine III, and was held 16-17 June 2009. This was the most extensive and complex of...Protection Matrix Game Marine Two .................................................. 12 3.3 Integrated Safety /Security Matrix Game – Marine III...Integrated Safety /Security Matrix Game – Marine III Scenarios........................... 53 ISSMG Marine III – Team Groupings
ERIC Educational Resources Information Center
Vaughn, Brian E.; Coppola, Gabrielle; Verissimo, Manuela; Monteiro, Ligia; Santos, Antonio Jose; Posada, German; Carbonell, Olga A.; Plata, Sandra J.; Waters, Harriet S.; Bost, Kelly K.; McBride, Brent; Shin, Nana; Korth, Bryan
2007-01-01
The secure-base phenomenon is central to the Bowlby/Ainsworth theory of attachment and is also central to the assessment of attachment across the lifespan. The present study tested whether mothers' knowledge about the secure-base phenomenon, as assessed using a recently designed wordlist prompt measure for eliciting attachment-relevant stories,…
Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy
2011-05-15
attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks
2016-05-26
research questions consist of three groups . The first group addresses an analysis of PfP. The second group determines contemporary US and UK strategy...The second group of research questions focuses upon current US, UK security cooperation initiatives and the specific policy objectives they...Ambition, Austerity and the Case for Rethinking UK Military Spending.” Oxford Research Group . Last modified May 13, 2015. Accessed September 17, 2015
Marketing Strategy and Implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This report documents the preparation of materials for the marketing campaign that has been designed for middle and high school students in New Mexico to increase interest in participation in national security careers at the National Nuclear Security Administration. The materials and the marketing campaign build on the research that was previously completed, as well as the focus groups that were conducted. This work is a part of the National Nuclear Security Preparedness Project (NSPP). Previous research included outcome analysis to determine appropriate marketing strategies. The analysis was based upon focus groups with middle school and high school students, studentmore » interactions, and surveys completed by students to understand and gauge student interest in Science, Technology, Engineering, and Math (STEM) subjects, interest in careers at NNSA, future job considerations, and student desire to pursue post-secondary education. Further, through the focus groups, students were asked to attend a presentation on NNSA job opportunities and employee requirements. The feedback received from the students was utilized to develop the focus and components of a marketing campaign divided into DISCO (Discovering Intelligence and Security Career Opportunities) for the middle school age group and DISCO…..Your Way! for high school age groups. Both campaigns have an intertwined message that focuses on the education of students in the various national security career opportunities at NNSA using the STEM concepts and the notion that almost any career they can think of has a fit within NNSA. Further, a special emphasis has been placed on the importance of obtaining a national security clearance when working at NNSA and the steps that will need to be taken during middle school, high school, and college to be allowed this opportunity.« less
Perioperative complications and early follow-up with 100 TVT-SECUR procedures.
Neuman, Menahem
2008-01-01
Our objective was to evaluate the complications and early follow-up of the tension-free vaginal tape (TVT)-SECUR, a new minimally invasive anti-incontinence operative procedure. A prospective, observational, and consecutive patient series was conducted. Perioperative and 12-month postoperative data were prospectively collected for the first 50 patients against the next consecutive 50 patients, among which TVT-SECUR specific surgical measurements were adopted (Canadian Task Force classification 2). In private hospital operative theatres, the TVT-SECUR operation was performed. Patients with urodynamically proved stress urinary incontinence were enrolled in this study after detailed informed consent was given. The TVT-SECUR, in the hammock shape to mimic the TVT-obturator placement, yet with no skin incisions, required neither bladder catheterization nor intraoperative diagnostic cystoscopy. The clinical and surgical data of 100 consecutive patients with TVT-SECUR were collected prospectively. Two patients had urinary obstructions and needed surgical tape-tension relief. One patient had a 50 mL paravesical self-remitting hematoma. At the first-month postoperative follow-up appointment, the objective therapeutic failure rate for the TVT-SECUR procedure among the 50 patients was 20.0% (10 patients). But when the tape was placed close to the urethra with no space allowed in between, the failure rate in the second patient group went down to 8.0% (4 patients); yet no further postoperative bladder outlet obstruction was diagnosed. Four (8.0%) patients in the first group had vaginal wall penetration with the inserters, requiring withdrawal, reinsertion, and vaginal wall repair. This was avoided with the second patient group by facilitating the inserters' introduction by widening the submucosal tunnel to 12 mm. Six (12.0%) other patients in the first group needed postoperative trimming of a vaginally extruded tape segment, performed in the office with satisfactory results. This problem was addressed later by making the submucosal dissection deeper to avoid intimate proximity of the tape with the vaginal mucosa. Consequently the tape protrusion rate was reduced to 8% (4 patients). Five (10.0%) patients in the first group had unintended tape removal at the time of inserter removal, necessitating the use of a second TVT-SECUR. This was addressed by meticulous detachment of the inserter before its withdrawal, after which no further unintended tape displacements were recorded. No clinical signs for bowel, bladder, or urethral injuries; intraoperative bleeding; or postoperative infections were evident. Telephone interview at the end of 12 months postoperatively was completed with 44 (88.0%) of the first patient group and 46 (92%) of the second patient group. In all, 39 (88.6%) and 43 (93.5%) of the telephone-interviewed patients of the first and second groups, respectively, reported objective urinary continence. The TVT-SECUR, a new midurethral sling, was associated with early safety and efficacy problems. These were identified and rectified, to make the TVT-SECUR a safe and effective anti-incontinence procedure. Operative complications associated with the TVT, such as bladder penetration and postoperative outlet obstruction, and TVT-obturator complications, such as postoperative thigh pain and bladder outlet obstruction, may be reduced with the TVT-SECUR. The first 100 operations' cumulative data analysis yielded some insights, including the necessity of meticulous and proper dissection before placement of the tape and the need for applying minimal extra tension to the tape. However, long-term comparative data collection will be required to draw solid conclusions regarding the appropriate position of this operative technique within the spectrum of anti-incontinence operations.
Atienza, Audie A; Zarcadoolas, Christina; Vaughon, Wendy; Hughes, Penelope; Patel, Vaishali; Chou, Wen-Ying Sylvia; Pritts, Joy
2015-01-01
This study examined consumers' attitudes and perceptions regarding mobile health (mHealth) technology use in health care. Twenty-four focus groups with 256 participants were conducted in 5 geographically diverse locations. Participants were also diverse in age, education, race/ethnicity, gender, and rural versus urban settings. Several key themes emerged from the focus groups. Findings suggest that consumer attitudes regarding mHealth privacy/security are highly contextualized, with concerns depending on the type of information being communicated, where and when the information is being accessed, who is accessing or seeing the information, and for what reasons. Consumers frequently considered the tradeoffs between the privacy/security of using mHealth technologies and the potential benefits. Having control over mHealth privacy/security features and trust in providers were important issues for consumers. Overall, this study found significant diversity in attitudes regarding mHealth privacy/security both within and between traditional demographic groups. Thus, to address consumers' concerns regarding mHealth privacy and security, a one-size-fits-all approach may not be adequate. Health care providers and technology developers should consider tailoring mHealth technology according to how various types of information are communicated in the health care setting, as well as according to the comfort, skills, and concerns individuals may have with mHealth technology.
28 CFR 524.72 - CIM assignment categories.
Code of Federal Regulations, 2010 CFR
2010-07-01
... groups (e.g., prison gangs), which have a history of disrupting operations and security in either state... assignment categories. CIM cases are classified according to the following assignments: (a) Witness Security... safety of these individuals. There are two types of Witness Security cases: Department of Justice...
NASA Astrophysics Data System (ADS)
Meyerstein, Mike; Cha, Inhyok; Shah, Yogendra
The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.
Certified Training for Nuclear and Radioactive Source Security Management.
Johnson, Daniel
2017-04-01
Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Kim, Min-Seok; Hong, Yun-Chul; Yook, Ji-Hoo; Kang, Mo-Yeol
2017-10-01
To investigate the effects of job security on new development of depressive episode, suicide ideation, and decline in self-rated health. Data from the Korea Welfare Panel Study from 2012 to 2015 were analysed. A total of 2912 waged workers self-assessed their depressive episode, suicide ideation, and health annually by answering the questionnaire. Participants were divided into three groups according to the level of job security: high, intermediate and low. To evaluate the influence of job security, we performed survival analysis after stratification by gender with adjustment for covariates. The result was further stratified by whether the respondent was the head of household. After adjusting for covariates, men in low job security group showed significantly higher hazard ratios (HRs) for depression (HR 1.27, 95% CI 1.01-1.60), suicide ideation (HR 3.25, 95% CI 1.72-6.16), and decline in self-rated health (HR 1.73, 95% CI 1.16-2.59). Women showed significantly higher HR of depression in the intermediate (HR 1.37, 95% CI 1.01-1.87) and low (HR 1.50, 95% CI 1.12-1.99) job security group. Male head of household with low job security showed significantly higher HR of depression, suicide ideation, and decline in self-rated health. Non-head-of-household women with intermediate and low job security showed higher risk of depression than those with high job security. We found that perceived job insecurity is associated with the new development of depressive episode, suicide ideation, and decline in self-rated health.
The Rise of China: Redefining War in the 21st Century
2012-03-22
Hegemony, Africa, Cold War, Cyber Attack, Deficit 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF...FORMAT: Strategy Research Project DATE: 22 March 2012 WORD COUNT: 5,825 PAGES: 30 KEY TERMS: Debt, Security, Hegemony, Africa, Cold War, Cyber ...significantly increasing economic aid. But it’s hard to buy affection; such ‘ friendship ’ does not stand the test of difficult times.”42 The United
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-25
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Camelot Entertainment Group, Inc., Cavico Corp., Global 8 Environmental Technologies, Inc., GTC Telecom Corp., ICF Corporation, and... concerning the securities of GTC Telecom Corp. because it has not filed any periodic reports since the period...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-22
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Abviva, Inc., ACTIS Global Ventures, Inc., aeroTelesis, Inc., Amwest Insurance Group, Inc., and Auto Underwriters of America, Inc.; Order of... concerning the securities of Auto Underwriters of America, Inc. because it has not filed any periodic reports...
Temperature-dependent Study of Isobutanol Decomposition
2012-11-01
dimensional Al2O3 alumina CO2 carbon dioxide FTIR Fourier transform infrared Pd palladium Rh rhodium TPD temperature-programmed desorption TPO...that increasing temperature promotes aldehyde formation on the surface of each catalyst. In addition, it is shown that palladium (Pd) activates the...formation of aldehydes and CO2 at a lower temperature than a rhodium (Rh) catalyst. 15. SUBJECT TERMS Isobutanol, FTIR, spectroscopy 16. SECURITY
Tommaselli, Giovanni A; Di Carlo, Costantino; Gargano, Virginia; Formisano, Carmen; Scala, Mariamaddalena; Nappi, Carmine
2010-10-01
To reduce complications of transobturator tension-free vaginal tape, single-incision devices were introduced in the last years. We here report a comparison between the tension-free vaginal tape-obturator (TVT-O) and the TVT-Secur techniques in terms of efficacy and safety. Eighty-four patients with stress urinary incontinence (SUI) were scheduled to undergo TVT-O or TVT-Secur. Duration of the procedure, subjective estimate of blood loss, intraoperative and postoperative complications, postoperative postvoidal residue (PVR), time to first voiding, and pain level were recorded. Urodynamic tests, PVR, Incontinence Questionnaire Short Form (ICIQ-SF), King's Health Questionnaire, and a urinary diary were performed before and 12 months after procedure. No differences in terms of cure rate were observed between the two groups (81.6% vs. 83.8%). Complication rate in the TVT-Secur group was lower (8.1%) than in the TVT-O group (15.8%), but not significant. Both techniques seem to be effective and safe, with a low incidence of complications in both groups.
The Life Science Exchange: a case study of a sectoral and sub-sectoral knowledge exchange programme.
Perkins, Brian Lee; Garlick, Rob; Wren, Jodie; Smart, Jon; Kennedy, Julie; Stephens, Phil; Tudor, Gwyn; Bisson, Jonathan; Ford, David V
2016-04-27
Local and national governments have implemented sector-specific policies to support economic development through innovation, entrepreneurship and knowledge exchange. Supported by the Welsh Government through the European Regional Development Fund, The Life Science Exchange® project was created with the aim to increase interaction between stakeholders, to develop more effective knowledge exchange mechanisms, and to stimulate the formation and maintenance of long-term collaborative relationships within the Welsh life sciences ecosystem. The Life Science Exchange allowed participants to interact with other stakeholder communities (clinical, academic, business, governmental), exchange perspectives and discover new opportunities. Six sub-sector focus groups comprising over 200 senior stakeholders from academia, industry, the Welsh Government and National Health Service were established. Over 18 months, each focus group provided input to inform healthcare innovation policy and knowledge mapping exercises of their respective sub-sectors. Collaborative projects identified during the focus groups and stakeholder engagement were further developed through sandpit events and bespoke support. Each sub-sector focus group produced a report outlining the significant strengths and opportunities in their respective areas of focus, made recommendations to overcome any 'system failures', and identified the stakeholder groups which needed to take action. A second outcome was a stakeholder-driven knowledge mapping exercise for each area of focus. Finally, the sandpit events and bespoke support resulted in participants generating more than £1.66 million in grant funding and inward investment. This article outlines four separate outcomes from the Life Science Exchange programme. The Life Science Exchange process has resulted in a multitude of collaborations, projects, inward investment opportunities and special interest group formations, in addition to securing over ten times its own costs in funding for Wales. The Life Science Exchange model is a simple and straightforward mechanism for a regional or national government to adapt and implement in order to improve innovation, skills, networks and knowledge exchange.
Shipton, Leah; Lashewicz, Bonnie M
2017-09-01
The purpose of this study was to uncover and understand factors influencing quality of care received by adults with developmental disabilities and/or mental health disorders living in group homes. The present authors conducted a secondary analysis of data from nine focus group discussions with adults with developmental disabilities and/or mental health disorders, and their family and paid caregivers (N = 52). To focus the analysis, the present authors drew on the research literature to craft a model of quality of group home care using concepts of social inclusion and self-determination, and corresponding staff approaches that include active support and person-centred care. Social inclusion and self-determination for adults in group homes are facilitated by staff approaches and manifest in residents being understood and experiencing security and freedom. The present authors offer recommendations for group home resources, training, communication and outcome measures that promote residents' being understood and experiencing security and freedom. © 2016 John Wiley & Sons Ltd.
Williams, Riccardo; Leone, Luigi; Faedda, Noemi; Natalucci, Giulia; Bellini, Benedetta; Salvi, Elisa; Verdecchia, Paola; Cerutti, Rita; Arruda, Marco; Guidetti, Vincenzo
2017-12-01
It is widely recognised that there are associations between headache, psychiatric comorbidity and attachment insecurity in both adults and children. The aims of this study were: 1) to compare perceived attachment security and anxiety in children and adolescents with migraine without aura and a healthy control group; 2) to test whether the child's perceived security of attachment to the mother and the father mediated the association between migraine and anxiety. One hundred children and adolescents with Migraine without Aura were compared with a control group of 100 children without headache. The Security Scale (measures perceived security of attachments) and the Self-Administered Psychiatric Scales for Children and Adolescents, a measure of anxiety symptoms, were administered to all participants. The clinical group had lower attachment security than the control group and higher scores on all anxiety scales. Anxiety was negatively correlated with attachment. Children's attachment to their mother mediated the increase in global anxiety in the clinical group. Insecure paternal attachment was associated with greater insecurity in maternal attachment, suggesting that there is a complex pathway from migraine to anxiety symptoms mediated by perceived insecurity of paternal attachment and hence also by perceived insecurity of maternal attachment. These results suggest that insecure parental attachment may exacerbate anxiety in children and adolescents with migraine and point to the importance of multimodal interventions, perhaps taking account of family relationships, for children and adolescents with migraine.
Multinational Experiment 6 (MNE 6) Doctrine Note: Security Transitions
2010-10-28
to Transition in Northern Ireland In Armagh, Northern Ireland , public perception became a key driver of the security transition and shaped what had...government and non-state actors, including religious and tribal affiliations, genders , age groups and geographic areas provides a richer basis for planning...functions necessary to maintain security; gaps may also emerge within particular elements of the security and justice sectors. Partners may lack
Managing the Security of Nursing Data in the Electronic Health Record
Samadbeik, Mahnaz; Gorzin, Zahra; Khoshkam, Masomeh; Roudbari, Masoud
2015-01-01
Background: The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. Methods: This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts’ opinions and Cronbach’s alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. Results: The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Conclusions: Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing of these requirements helps policy makers to decide what to do when planning for EHR implementation. Therefore, to make appropriate security decisions and to achieve the expected level of protection of the electronic nursing information, it is suggested to consider the priorities of both groups of experts about security principles and also discuss the issues seem to be different between two groups of participants in the research. PMID:25870490
Managing the security of nursing data in the electronic health record.
Samadbeik, Mahnaz; Gorzin, Zahra; Khoshkam, Masomeh; Roudbari, Masoud
2015-02-01
The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts' opinions and Cronbach's alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing of these requirements helps policy makers to decide what to do when planning for EHR implementation. Therefore, to make appropriate security decisions and to achieve the expected level of protection of the electronic nursing information, it is suggested to consider the priorities of both groups of experts about security principles and also discuss the issues seem to be different between two groups of participants in the research.
Greenberg, Sheldon F
2007-09-01
In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.
Minimum Requirements for Taxicab Security Cameras*
Zeng, Shengke; Amandus, Harlan E.; Amendola, Alfred A.; Newbraugh, Bradley H.; Cantis, Douglas M.; Weaver, Darlene
2015-01-01
Problem The homicide rate of taxicab-industry is 20 times greater than that of all workers. A NIOSH study showed that cities with taxicab-security cameras experienced significant reduction in taxicab driver homicides. Methods Minimum technical requirements and a standard test protocol for taxicab-security cameras for effective taxicab-facial identification were determined. The study took more than 10,000 photographs of human-face charts in a simulated-taxicab with various photographic resolutions, dynamic ranges, lens-distortions, and motion-blurs in various light and cab-seat conditions. Thirteen volunteer photograph-evaluators evaluated these face photographs and voted for the minimum technical requirements for taxicab-security cameras. Results Five worst-case scenario photographic image quality thresholds were suggested: the resolution of XGA-format, highlight-dynamic-range of 1 EV, twilight-dynamic-range of 3.3 EV, lens-distortion of 30%, and shutter-speed of 1/30 second. Practical Applications These minimum requirements will help taxicab regulators and fleets to identify effective taxicab-security cameras, and help taxicab-security camera manufacturers to improve the camera facial identification capability. PMID:26823992
Secure multi-party communication with quantum key distribution managed by trusted authority
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD aremore » extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.« less
Quantum Secure Group Communication.
Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M
2018-03-01
We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.
Alternative Futures: United States Air Force Security Police in the Twenty-First Century
1988-04-01
34What policies should today’s Air Force leadership be pursuing to prepare for tomorrow’s combat support and security police roles?’ The monograph...Further, it addresses the capability of the Air Force to respond to its future combat support and security police missions and their integration into the...security police organizations. His most recent assignments were as the deputy commander of a combat support group and the commander of a security police
Quantum key distribution network for multiple applications
NASA Astrophysics Data System (ADS)
Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.
2017-09-01
The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.
Safety and Security Interface Technology Initiative
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie
Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme)more » includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ‘tool box’ of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated implementation plan includes: (1) A recommended process for handling the documentation of the security and safety disciplines, including an appropriate change control process and participation by all stakeholders. (2) A means to package security systems with sufficient information to help expedite the flow of that system through the process. In addition, a means to share successes among sites, to include information and safety basis to the extent such information is transportable. (3) Identification of key security systems and associated essential security elements being installed and an arrangement for the sites installing these systems to host an appropriate team to review a specific system and determine what information is exportable. (4) Identification of the security systems’ essential elements and appropriate controls required for testing of these essential elements in the facility. (5) The ability to help refine and improve an agreed to control set at the manufacture stage.« less
32 CFR Appendix A to Part 50 - Life Insurance Products and Securities
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Life Insurance Products and Securities A... Part 50—Life Insurance Products and Securities A. Life Insurance Product Content Prerequisites... and cost of government subsidized Servicemen's Group Life Insurance. 2. The address and phone number...
32 CFR Appendix A to Part 50 - Life Insurance Products and Securities
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Life Insurance Products and Securities A... Part 50—Life Insurance Products and Securities A. Life Insurance Product Content Prerequisites... and cost of government subsidized Servicemen's Group Life Insurance. 2. The address and phone number...
Composing Alternatives to a National Security Language Policy
ERIC Educational Resources Information Center
Wible, Scott
2009-01-01
President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-16
... DEPARTMENT OF HOMELAND SECURITY U.S. Citizenship and Immigration Services Agency Information... Department of Homeland Security, U.S. Citizenship and Immigration Services (USCIS) will be submitting the... Homeland Security (DHS), and to the Office of Management and Budget (OMB) USCIS Desk Officer. Comments may...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-08
... of Anthracite Capital, Inc., Auto Data Network Inc., Avenue Group, Inc., Ckrush, Inc., Clickable... securities of Auto Data Network Inc. because it has not filed any periodic reports since the period ended... accurate information concerning the securities of Avenue Group, Inc. because it has not filed any periodic...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-09
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Anhui Taiyang Poultry Co., Inc.; a/k/a The Parkview Group, Inc.; Business Development Solutions, Inc., and Tsingyuan Brewery Ltd.; Order of Suspension of Trading September 5, 2013. It appears to the Securities and Exchange Commission that there is a...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-11
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Aegis Assessments, Inc., APC Group, Inc., Aurelio Resource Corp., BioAuthorize Holdings, Inc., and Fonix Corporation; Order of... there is a lack of current and accurate information concerning the securities of BioAuthorize Holdings...
Peterson, Christopher; Watzlaf, Valerie
2014-01-01
An overview of store and forward applications commonly used in physical and occupational therapy practice is reviewed with respect to regulation, privacy, security, and clinical applications. A privacy and security checklist provides a clear reference of pertinent regulatory issues regarding these software applications. A case study format is used to highlight clinical applications of store and forward software features. Important considerations of successful implementation of store and forward applications are also identified and discussed.
An E-payment system based on quantum group signature
NASA Astrophysics Data System (ADS)
Xiaojun, Wen
2010-12-01
Security and anonymity are essential to E-payment systems. However, existing E-payment systems will easily be broken into soon with the emergence of quantum computers. In this paper, we propose an E-payment system based on quantum group signature. In contrast to classical E-payment systems, our quantum E-payment system can protect not only the users' anonymity but also the inner structure of customer groups. Because of adopting the two techniques of quantum key distribution, a one-time pad and quantum group signature, unconditional security of our E-payment system is guaranteed.
The Tumor Suppressor Actions of the Vitamin D Receptor in Skin
2014-10-01
induced tumor formation. In previous studies we determined that the hedgehog (HH) and wnt/β-catenin pathways were activated in the skin of VDR null...SUBJECT TERMS epidermal tumors, keratinocytes, vitamin D receptor, sonic hedgehog , β-catenin, UVB 16. SECURITY CLASSIFICATION OF: 17. LIMITATION...epidermal tumor formation by blocking the β-catenin and hedgehog pathways, key pathways in keratinocyte proliferation that if left unchecked lead to
The U.S. Combat and Tactical Wheeled Vehicle Fleets: Issues and Suggestions for Congress
2011-01-01
nonlinear, irregular distribution of brigade and battalion formations means that there is no longer a relatively more secure rear area, an...enhancement package, according to civilian sources, included depleted- uranium armor, digital command- and-control architecture, digital color terrain maps...system robustness and flexibility, and (3) more often than not, the preparation of the analysis (e.g., terrain formatting , laydown of forces, timing of
A short-term longitudinal study of correlates and sequelae of attachment security in autism
Rozga, Agata; Hesse, Erik; Main, Mary; Duschinsky, Robbie; Beckwith, Leila; Sigman, Marian
2018-01-01
ABSTRACT In this short-term longitudinal study, 30 preschool-aged children with autism were first observed in Ainsworth’s Strange Situation Procedure and, separately, interacting with the primary caregiver in the home. One year later, each child completed both a developmental assessment and an observational assessment of empathic responding. Behaviors typical for children with autism were distinguished from behaviors suggestive of relationally based attachment disorganization. Forty-five percent of the children were classified as securely attached. The secure group demonstrated language skills superior to those of the insecurely attached group, concurrently and during the follow-up. Compared to parents of children who were insecurely attached, parents of securely attached children were rated as more sensitive. Compared to both organized insecure and disorganized children, secure children were rated as more responsive to an examiner’s apparent distress during the follow-up relative to their ratings at intake, whereas empathy ratings of children with insecure classifications did not increase. Importantly, attachment security was associated with empathy above and beyond the contribution of children’s language level. These results indicate that the sequelae of attachment security in autism may be similar to those documented for typically developing children. PMID:28959921
A First Step Towards Network Security Virtualization: From Concept to Prototype
2015-10-01
ec2 security groups. http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network- security.html. [3] Jeffrey R. Ballard, Ian Rae, and Aditya...20] Matthew L. Meola Michael J. Freedman Jennifer Rexford Nate Foster, Rob Harrison and David Walker. Frenetic: A High-Level Langauge for OpenFlow
Energy technology evaluation report: Energy security
NASA Astrophysics Data System (ADS)
Koopman, R.; Lamont, A.; Schock, R.
1992-09-01
Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
He, Fulin; Cao, Yang; Zhang, Jun Jason
Ensuring flexible and reliable data routing is indispensable for the integration of Advanced Metering Infrastructure (AMI) networks, we propose a secure-oriented and load-balancing wireless data routing scheme. A novel utility function is designed based on security routing scheme. Then, we model the interactive security-oriented routing strategy among meter data concentrators or smart grid meters as a mixed-strategy network formation game. Finally, such problem results in a stable probabilistic routing scheme with proposed distributed learning algorithm. One contributions is that we studied that different types of applications affect the routing selection strategy and the strategy tendency. Another contributions is that themore » chosen strategy of our mixed routing can adaptively to converge to a new mixed strategy Nash equilibrium (MSNE) during the learning process in the smart grid.« less
The National Ignition Facility (NIF) as a User Facility
NASA Astrophysics Data System (ADS)
Keane, Christopher; NIF Team
2013-10-01
The National Ignition Facility (NIF) has made significant progress towards operation as a user facility. Through June 2013, NIF conducted over 1200 experiments in support of ICF, HED science, and development of facility capabilities. The NIF laser has met or achieved all specifications and a wide variety of diagnostic and target fabrication capabilities are in place. A NIF User Group and associated Executive Board have been formed. Two User Group meetings have been conducted since formation of the User Group. NIF experiments in fundamental science have provided important new results. NIF ramp compression experiments have been conducted using diamond and iron, with EOS results obtained at pressures up to approximately 50 Mbar and 8 Mbar, respectively. Initial experiments in supernova hydrodynamics, the fundamental physics of the Rayleigh-Taylor instability, and equation of state in the Gbar pressure regime have also been conducted. This presentation will discuss the fundamental science program at NIF, including the proposal solicitation and scientific review processes and other aspects of user facility operation. This work was performed under the auspices of the Lawrence Livermore National Security, LLC, (LLNS) under Contract No. DE-AC52-07NA27344.
Tennant, Kaylin S; Segura, Valerie D; Morris, Megan C; Snyder, Kristen Denninger; Bocian, David; Maloney, Dan; Maple, Terry L
2017-07-29
Compared to other megafauna managed in zoos and aquariums, the current state of welfare for the Nile hippopotamus (Hippopotamus amphibius) is poorly understood. Complex behavior and physiological characteristics make hippos a difficult species to manage. Thus, hippos in managed care are currently at risk for a decreased state of welfare. In an effort to assess and improve conditions for this species, a survey was administered to North American institutions housing Nile hippos. This assessment utilized a multiple-choice format and consisted of questions relating to group structure, behavior, and exhibit design, allowing for the creation of cross-institutional, welfare-based analysis. Responses were gathered from 85.29% of the institutions to which the survey was distributed. Despite recommendations for maintaining groups of at least five individuals (Forthman, 1998), only 34.25% of hippos in North America were housed in groups of three or more. The survey also highlighted that 39.29% of institutions secure their hippos in holding areas overnight, despite their highly active nocturnal propensities. A better understanding of hippo behavior and environmental preferences can be used to inform wellness-oriented management practices to achieve a state of "optimal welfare". Copyright © 2017 Elsevier B.V. All rights reserved.
Current Developments and Prospects for the Future: French Security Policy in a Changing World
1991-06-01
GROUP SUBGROUP France , French Security Policy, Franco-German relations, NATO, French economy, Charles do Gaulle, Francois Mitterrand, European Community...concludes that the Gaullist myth of grandeur and independence can no longer be sustained . French security must now be achieved by strengthening ties...Gaulle. The thesis concludes that the Gaullist myth of grandeur and independence can no longer be sustained . French security must now be achieved by
1990-10-01
REPORT DOCUMENTATION PAGE OMBNo. 0704-0188 la. REPORT SECURITY CLASS-- CAT ;ON lb RESTRICTIVE MARKINGS Unclassified 2a. SECURITY CLASSiFICATION AUTHORITr 3...if necessary and identify by block number) FIELD GROUP SUB-GROUP CAT , Canadajn Army Trophy, International, Competition, --Gunnery, Tank--T C...accuracy, firing speed, and detection on score during the CAT competition. This study uses a custom stochastic computer model designed to replicate the
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-29
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Enercorp, Inc., FTS Group, Inc., Games, Inc. (n/k/a InQBate Corporation), Hartmarx Corporation (n/k/a XMH Corp. 1), and Penn Treaty American... current and accurate information concerning the securities of Games, Inc. (n/k/a InQBate Corporation...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-13
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Amerex Group, Inc., AmeriChip International, Inc., Amish Naturals, Inc., Banker's Store Inc. (The), Champion Parts, Inc., and Gray Peaks, Inc... securities of AmeriChip International, Inc. because it has not filed any periodic reports since the period...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shull, Doug
The purpose of the consultancy assignment was to (i) apply the NUSAM assessment methods to hypothetical transport security table top exercise (TTX) analyses and (ii) document its results to working materials of NUSAM case study on transport. A number of working group observations, using the results of TTX methodologies, are noted in the report.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-14
... vehicle, in a sided vehicle, or in an intermodal container loaded with eyes crosswise, grouped in rows, in... pre-January 1, 2004 cargo securement regulations for the transportation of groups of metal coils with... the pre-January 1, 2004 cargo securement regulations (then at 49 CFR 393.100(c)) for the...
ERIC Educational Resources Information Center
Niccols, Alison
2008-01-01
Background: Infant attachment security is a protective factor for future mental health, and may be promoted by individual interventions. Given service demands, it is important to determine if a group-based intervention for parents could be used to enhance infant attachment security. Methods: In a randomized trial involving 76 mothers, an 8-session…
Heinze, Justin; Miller, Alison L.; Zimmerman, Marc A.
2015-01-01
Purpose Forming secure friendship attachments during adolescence are important for mental health; few, however, have specifically examined the ways in which the transitions in attachment during adolescence may influence future mental health outcomes among African-Americans. Method The current study examines how transitions in attachment in adolescence predicted changes in depression symptoms from late adolescents through adulthood in an African-American sample of adolescents. We used growth curve modeling to examine the association between transitions in friendship attachment and changes in depression symptoms in adulthood. Results At age 16, 346 (64.0%) reported secure attachment with 195 (36.0%) reporting either avoidant or resistant attachment. At age 17, 340 (62.9%) reported secure attachment and 201 (37.2%) reported avoidant or resistant attachment. The largest percentage of participants (46.2%) reported stable-secure attachment across the two time points. Results of the growth model indicated that adolescents who reported a stable-secure attachment style had lower levels of depression symptoms during adulthood than those individuals who transitioned from secure-to-insecure, from insecure-to-secure, or were in the stable-insecure group. Interestingly enough, individuals in both of the attachment transition groups had a faster declining rate of depression symptoms over time compared to the two stability groups. Conclusion Data support existing research showing an association between transitions in attachment during adolescence and depression through adulthood. Further these study findings suggest there may be protective features associated with transitioning between attachment styles during adolescence on later depression, compared to African-American’s who remain stable in their attachment style. PMID:26903426
Vinegar, Harold J.; Coit, William George; Griffin, Peter Terry; Hamilton, Paul Taylor; Hsu, Chia-Fu; Mason, Stanley Leroy; Samuel, Allan James; Watkins, Ronnie Wade
2010-11-09
A system for treating a hydrocarbon containing formation is described. The system includes two or more groups of elongated heaters. The group includes two or more heaters placed in two or more openings in the formation. The heaters in the group are electrically coupled below the surface of the formation. The openings include at least partially uncased wellbores in a hydrocarbon layer of the formation. The groups are electrically configured such that current flow through the formation between at least two groups is inhibited. The heaters are configured to provide heat to the formation.
Vinegar, Harold J [Bellaire, TX; Coit, William George [Bellaire, TX; Griffin, Peter Terry [Brixham, GB; Hamilton, Paul Taylor [Houston, TX; Hsu, Chia-Fu [Granada Hills, CA; Mason, Stanley Leroy [Allen, TX; Samuel, Allan James [Kular Lumpar, ML; Watkins, Ronnie Wade [Cypress, TX
2012-07-31
A system for treating a hydrocarbon containing formation is described. The system includes two or more groups of elongated heaters. The group includes two or more heaters placed in two or more openings in the formation. The heaters in the group are electrically coupled below the surface of the formation. The openings include at least partially uncased wellbores in a hydrocarbon layer of the formation. The groups are electrically configured such that current flow through the formation between at least two groups is inhibited. The heaters are configured to provide heat to the formation.
Metadata to Describe Genomic Information.
Delgado, Jaime; Naro, Daniel; Llorente, Silvia; Gelpí, Josep Lluís; Royo, Romina
2018-01-01
Interoperable metadata is key for the management of genomic information. We propose a flexible approach that we contribute to the standardization by ISO/IEC of a new format for efficient and secure compressed storage and transmission of genomic information.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-25
... material: principal and interest payment delinquencies; non- payment related defaults; unscheduled draws on... considered the proposed rule's impact on efficiency, competition and capital formation. 15 U.S.C. 78c(f). \\13...
Investigation of Chemical Processes Involving Laser-generated Nanoenergetic Materials
2010-02-01
nanoparticle formation, nanoenergetic materials, laser ablation, plasma chemistry , optical emission 16. SECURITY CLASSIFICATION OF: 17...alloys with known trace metal concentrations. In addition to observing the effect of trace metals on the plasma chemistry , commercially available
ERIC Educational Resources Information Center
Spoor, Dana L.
1997-01-01
Presents interviews with five school administrators, representing a variety of school systems. Discusses their strategies for addressing concerns that all school systems share. Using a question and answer format, the article focuses on handicap accessibility, energy management, funding, security, and technology. (RJM)
Changes in body weight and food security of adult North Korean refugees living in South Korea
Jeong, HaYoung; Kim, Sin-Gon
2017-01-01
BACKGROUND/OBJECTIVES Relocation to new environments can have a negative impact on health by altering body weight and dietary patterns. This study attempted to elucidate changes in body weight, food security, and their current food and nutrient consumption in adult North Korean refugees (NKR) living in South Korea (SK). SUBJECTS/METHODS This study analyzed data on 149 adult NKR from a North Korean refugee health in SK cohort at four time points (leaving North Korea, entering SK, first examination, and second examination). Body weight was self-reported at the two earlier time points and directly measured at the two later time points. Food security, diet-related behaviors (dietary habits and food consumption), and sociodemographic information were obtained using a self-administered questionnaire. Nutrient intake information was obtained by one-day 24-hour recall. Statistical analyses were performed with SPSS ver 23.0. RESULTS Body weight increased during relocation by an average of 4 kg, although diversified patterns were observed during the settlement period in SK. Approximately 39.6% of subjects maintained their body weight between the first and second examinations, whereas 38.6% gained and 22.1% lost at least 3% of their body weight at the first examination by the second examination. Food security status improved from 12.1% food secure proportion to 61.7%. NKR showed generally good food and nutrient consumption (index of nutrient quality: 0.77–1.93). The body weight loss group showed the most irregular meal consumption pattern (P < 0.05), and eating-out was infrequent in all three groups. Consumption frequencies of food groups did not differ by group, except in the fish group (P = 0.036). CONCLUSION This study observed considerable body weight adjustment during the settlement period in SK after initial weight gain, whereas food security consistently improved. More detailed understanding of this process is needed to assist healthy settlement for NKR in SK. PMID:28765777
Changes in body weight and food security of adult North Korean refugees living in South Korea.
Jeong, HaYoung; Lee, Soo-Kyung; Kim, Sin-Gon
2017-08-01
Relocation to new environments can have a negative impact on health by altering body weight and dietary patterns. This study attempted to elucidate changes in body weight, food security, and their current food and nutrient consumption in adult North Korean refugees (NKR) living in South Korea (SK). This study analyzed data on 149 adult NKR from a North Korean refugee health in SK cohort at four time points (leaving North Korea, entering SK, first examination, and second examination). Body weight was self-reported at the two earlier time points and directly measured at the two later time points. Food security, diet-related behaviors (dietary habits and food consumption), and sociodemographic information were obtained using a self-administered questionnaire. Nutrient intake information was obtained by one-day 24-hour recall. Statistical analyses were performed with SPSS ver 23.0. Body weight increased during relocation by an average of 4 kg, although diversified patterns were observed during the settlement period in SK. Approximately 39.6% of subjects maintained their body weight between the first and second examinations, whereas 38.6% gained and 22.1% lost at least 3% of their body weight at the first examination by the second examination. Food security status improved from 12.1% food secure proportion to 61.7%. NKR showed generally good food and nutrient consumption (index of nutrient quality: 0.77-1.93). The body weight loss group showed the most irregular meal consumption pattern ( P < 0.05), and eating-out was infrequent in all three groups. Consumption frequencies of food groups did not differ by group, except in the fish group ( P = 0.036). This study observed considerable body weight adjustment during the settlement period in SK after initial weight gain, whereas food security consistently improved. More detailed understanding of this process is needed to assist healthy settlement for NKR in SK.
Papoutsi, Chrysanthi; Reed, Julie E; Marston, Cicely; Lewis, Ruth; Majeed, Azeem; Bell, Derek
2015-10-14
Although policy discourses frame integrated Electronic Health Records (EHRs) as essential for contemporary healthcare systems, increased information sharing often raises concerns among patients and the public. This paper examines patient and public views about the security and privacy of EHRs used for health provision, research and policy in the UK. Sequential mixed methods study with a cross-sectional survey (in 2011) followed by focus group discussions (in 2012-2013). Survey participants (N = 5331) were recruited from primary and secondary care settings in West London (UK). Complete data for 2761 (51.8 %) participants were included in the final analysis for this paper. The survey results were discussed in 13 focus groups with people living with a range of different health conditions, and in 4 mixed focus groups with patients, health professionals and researchers (total N = 120). Qualitative data were analysed thematically. In the survey, 79 % of participants reported that they would worry about the security of their record if this was part of a national EHR system and 71 % thought the National Health Service (NHS) was unable to guarantee EHR safety at the time this work was carried out. Almost half (47 %) responded that EHRs would be less secure compared with the way their health record was held at the time of the survey. Of those who reported being worried about EHR security, many would nevertheless support their development (55 %), while 12 % would not support national EHRs and a sizeable proportion (33 %) were undecided. There were also variations by age, ethnicity and education. In focus group discussions participants weighed up perceived benefits against potential security and privacy threats from wider sharing of information, as well as discussing other perceived risks: commercial exploitation, lack of accountability, data inaccuracies, prejudice and inequalities in health provision. Patient and public worries about the security risks associated with integrated EHRs highlight the need for intensive public awareness and engagement initiatives, together with the establishment of trustworthy security and privacy mechanisms for health information sharing.
Ethics in Public Health Research
Myers, Julie; Frieden, Thomas R.; Bherwani, Kamal M.; Henning, Kelly J.
2008-01-01
Public health agencies increasingly use electronic means to acquire, use, maintain, and store personal health information. Electronic data formats can improve performance of core public health functions, but potentially threaten privacy because they can be easily duplicated and transmitted to unauthorized people. Although such security breaches do occur, electronic data can be better secured than paper records, because authentication, authorization, auditing, and accountability can be facilitated. Public health professionals should collaborate with law and information technology colleagues to assess possible threats, implement updated policies, train staff, and develop preventive engineering measures to protect information. Tightened physical and electronic controls can prevent misuse of data, minimize the risk of security breaches, and help maintain the reputation and integrity of public health agencies. PMID:18382010
DOE Office of Scientific and Technical Information (OSTI.GOV)
Peach, D.F.
1987-12-01
Fiber optic telecommunication systems are susceptible to both natural and man-made stress. National Security/Emergency Preparedness (NSEP) is a function of how durable these systems are in light of projected levels of stress. Emergency Preparedness in 1987 is not just a matter of--can they deliver food, water, energy and other essentials--but can they deliver the vital information necessary to maintain corporate function of our country. 'Communication stamina' is a function of 'probability of survival' when faced with stress. This report provides an overview of the enhancements to a fiber-optic communication system/installation that will increase durability. These enhancements are grouped, based onmore » their value in protecting the system, such that a Multitier Specification is created that presents multiple levels of hardness. Mitigation of effects due to high-altitude electromagnetic pulse (HEMP) and gamma radiation, and protection from vandalism and weather events are discussed in the report. The report is presented in two volumes. Volume I presents the Multitier Specification in a format that is usable for management review. The attributes of specified physical parameters, and the levels of protection stated in Volume I, are discussed in more detail in Volume II.« less
Utilising a multi-item questionnaire to assess household food security in Australia.
Butcher, Lucy M; O'Sullivan, Therese A; Ryan, Maria M; Lo, Johnny; Devine, Amanda
2018-03-15
Currently, two food sufficiency questions are utilised as a proxy measure of national food security status in Australia. These questions do not capture all dimensions of food security and have been attributed to underreporting of the problem. The purpose of this study was to investigate food security using the short form of the US Household Food Security Survey Module (HFSSM) within an Australian context; and explore the relationship between food security status and multiple socio-demographic variables. Two online surveys were completed by 2334 Australian participants from November 2014 to February 2015. Surveys contained the short form of the HFSSM and twelve socio-demographic questions. Cross-tabulations chi-square tests and a multinomial logistic regression model were employed to analyse the survey data. Food security status of the respondents was classified accordingly: High or Marginal (64%, n = 1495), Low (20%, n = 460) or Very Low (16%, n = 379). Significant independent predictors of food security were age (P < .001), marital status (P = .005), household income (P < .001) and education (P < .001). Findings suggest food insecurity is an important issue across Australia and that certain groups, regardless of income, are particularly vulnerable. Government policy and health promotion interventions that specifically target "at risk" groups may assist to more effectively address the problem. Additionally, the use of a multi-item measure is worth considering as a national indicator of food security in Australia. © 2018 Australian Health Promotion Association.
Information-Pooling Bias in Collaborative Security Incident Correlation Analysis.
Rajivan, Prashanth; Cooke, Nancy J
2018-03-01
Incident correlation is a vital step in the cybersecurity threat detection process. This article presents research on the effect of group-level information-pooling bias on collaborative incident correlation analysis in a synthetic task environment. Past research has shown that uneven information distribution biases people to share information that is known to most team members and prevents them from sharing any unique information available with them. The effect of such biases on security team collaborations are largely unknown. Thirty 3-person teams performed two threat detection missions involving information sharing and correlating security incidents. Incidents were predistributed to each person in the team based on the hidden profile paradigm. Participant teams, randomly assigned to three experimental groups, used different collaboration aids during Mission 2. Communication analysis revealed that participant teams were 3 times more likely to discuss security incidents commonly known to the majority. Unaided team collaboration was inefficient in finding associations between security incidents uniquely available to each member of the team. Visualizations that augment perceptual processing and recognition memory were found to mitigate the bias. The data suggest that (a) security analyst teams, when conducting collaborative correlation analysis, could be inefficient in pooling unique information from their peers; (b) employing off-the-shelf collaboration tools in cybersecurity defense environments is inadequate; and (c) collaborative security visualization tools developed considering the human cognitive limitations of security analysts is necessary. Potential applications of this research include development of team training procedures and collaboration tool development for security analysts.
Jaffe, Karin Enstam; Isbell, Lynne A
2010-06-01
Socio-ecological theory predicts that group fusion in female-philopatric primate species will be rare because females experience increased costs by associating with non-relatives. Indeed, fusion has been reported only 14 times in only 4 female-philopatric cercopithecines despite many years of observation. Here, we describe changes in ranging and agonistic behavior of vervet monkeys (Cercopithecus aethiops) after the fusion of two groups, the sole group fusion during 11 years of observation, induced by a brief but intense period of apparent leopard predation. Before fusion, both groups made few incursions into the other group's territory and spent most of the time in their own territories. After the fusion, the amalgamated group shifted its activities and used both territories in similar proportion. Rates of female agonism increased after fusion, particularly in the 2 weeks following fusion, and the small group females assumed the lowest ranks in the female dominance hierarchy. Rates of agonism returned to prefusion rates a month later. Although rates of high-intensity interactions (i.e., chases) did not increase after fusion, small group females were more likely to be the recipients of, and lose, agonistic interactions than large group females; a small group female and her infant were attacked and wounded by a coalition of large group females shortly after the fusion. The observations presented here reveal that the circumstances surrounding group fusions are more variable than previously realized, but are still in accordance with expectations from socio-ecological theory that predation can favor the formation of larger groups. In this case, under threat of severe predation, individuals may have surrendered group autonomy for the greater security of larger numbers. (c) 2010 Wiley-Liss, Inc.
Administering a healthy dose of security.
Berry, D; Mullen, M; Murray, T
The article describes how a hospital located in a poor, crime-ridden section of a large city has made the most of in-house resources and public-private liaisons to improve security at its 113-acre campus. Details on the facility's double-pronged approach--tight internal security and strong external liaisons with businesses, law enforcement, and community groups--are provided.
DQC Comments on the Posted Recommendations Regarding Data Security and Privacy Protections
ERIC Educational Resources Information Center
Data Quality Campaign, 2010
2010-01-01
The U.S. Department of Education is conducting several activities to address privacy and security issues related to education data. Earlier this year a contractor for the Department convened a group of privacy and security experts and produced a report with recommendations to the Department on ways they can address emerging challenges in…
Management of Security Services in Higher Education. National Report.
ERIC Educational Resources Information Center
Higher Education Funding Council for Wales, Cardiff.
This report, the seventh in a series from the Value for Money Steering Group, identifies the key management issues for governors, senior managers, and heads of security services at institutions of higher education in the United Kingdom in developing and reviewing security services to ensure that they are effective and provide value for money.…
78 FR 33142 - Lanbo Financial Group, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-03
... Suspension of Trading May 30, 2013. It appears to the Securities and Exchange Commission that there is a lack... the opinion that the public interest and the protection of investors require a suspension of trading... the Securities Exchange Act of 1934, that trading in the securities of the above-listed company is...
78 FR 20960 - Face Up Entertainment Group, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-08
... Suspension of Trading April 4, 2013. It appears to the Securities and Exchange Commission that there is a... business operations, and trading in its securities. Face Up is a Florida corporation based in Valley Stream... interest and the protection of investors require a suspension of trading in the securities of the above...
DOE`s nation-wide system for access control can solve problems for the federal government
DOE Office of Scientific and Technical Information (OSTI.GOV)
Callahan, S.; Tomes, D.; Davis, G.
1996-07-01
The U.S. Department of Energy`s (DOE`s) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by manymore » different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location`s level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals.« less
Fast Video Encryption Using the H.264 Error Propagation Property for Smart Mobile Devices
Chung, Yongwha; Lee, Sungju; Jeon, Taewoong; Park, Daihee
2015-01-01
In transmitting video data securely over Video Sensor Networks (VSNs), since mobile handheld devices have limited resources in terms of processor clock speed and battery size, it is necessary to develop an efficient method to encrypt video data to meet the increasing demand for secure connections. Selective encryption methods can reduce the amount of computation needed while satisfying high-level security requirements. This is achieved by selecting an important part of the video data and encrypting it. In this paper, to ensure format compliance and security, we propose a special encryption method for H.264, which encrypts only the DC/ACs of I-macroblocks and the motion vectors of P-macroblocks. In particular, the proposed new selective encryption method exploits the error propagation property in an H.264 decoder and improves the collective performance by analyzing the tradeoff between the visual security level and the processing speed compared to typical selective encryption methods (i.e., I-frame, P-frame encryption, and combined I-/P-frame encryption). Experimental results show that the proposed method can significantly reduce the encryption workload without any significant degradation of visual security. PMID:25850068
A transmission security framework for email-based telemedicine.
Caffery, Liam J; Smith, Anthony C
2010-01-01
Encryption is used to convert an email message to an unreadable format thereby securing patient privacy during the transmission of the message across the Internet. Two available means of encryption are: public key infrastructure (PKI) used in conjunction with ordinary email and secure hypertext transfer protocol (HTTPS) used by secure web-mail applications. Both of these approaches have advantages and disadvantages in terms of viability, cost, usability and compliance. The aim of this study was develop an instrument to identify the most appropriate means of encrypting email communication for telemedicine. A multi-method approach was used to construct the instrument. Technical assessment and existing bodies of knowledge regarding the utility of PKI were analyzed, along with survey results from users of Queensland Health's Child and Youth Mental Health Service secure web-mail service. The resultant decision support model identified that the following conditions affect the choice of encryption technology: correspondent's risk perception, correspondent's identification to the security afforded by encryption, email-client used by correspondents, the tolerance to human error and the availability of technical resources. A decision support model is presented as a flow chart to identify the most appropriate encryption for a specific email-based telemedicine service.
Design of the national health security preparedness index.
Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M
2014-01-01
The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-06
... SECURITIES AND EXCHANGE COMMISSION File No. 500-1 In the Matter of Circuit Systems, Inc., Global Energy Group, Inc., Integrated Medical Resources, Inc., iNTELEFILM Corp., and Lot$off Corp.; Order of Suspension of Trading April 4, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-03
...., BodyTel Scientific, Inc., Clearant, Inc., DataMetrics Corp., and Green Energy Group, Inc. (a/k/a eCom eCom.Com, Inc.); Order of Suspension of Trading June 29, 2012. It appears to the Securities and... of current and accurate information concerning the securities of Green Energy Group, Inc. (a/k/a eCom...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-15
..., cell phones and electronic highway signs. CAP will also allow an alert initiator to send alerts... CAP-formatted alerts delivered via any new delivery systems, whether wireline, internet, satellite, or...
29 CFR 2550.408b-19 - Statutory exemption for cross-trading of securities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... any other agreement or disclosure involving the asset management relationship. For purposes of section... 408(b)(19) of the Act. (2) Style and format. The content of the policies and procedures required by...
Adaptively loaded SP-offset-QAM OFDM for IM/DD communication systems.
Zhao, Jian; Chan, Chun-Kit
2017-09-04
In this paper, we propose adaptively loaded set-partitioned offset quadrature amplitude modulation (SP-offset-QAM) orthogonal frequency division multiplexing (OFDM) for low-cost intensity-modulation direct-detection (IM/DD) communication systems. We compare this scheme with multi-band carrier-less amplitude phase modulation (CAP) and conventional OFDM, and demonstrate >40 Gbit/s transmission over 50-km single-mode fiber. It is shown that the use of SP-QAM formats, together with the adaptive loading algorithm specifically designed to this group of formats, results in significant performance improvement for all these three schemes. SP-offset-QAM OFDM exhibits greatly reduced complexity compared to SP-QAM based multi-band CAP, via parallelized implementation and minimized memory length for spectral shaping. On the other hand, this scheme shows better performance than SP-QAM based conventional OFDM at both back-to-back and after transmission. We also characterize the proposed scheme in terms of enhanced tolerance to fiber intra-channel nonlinearity and the potential to increase the communication security. The studies show that adaptive SP-offset-QAM OFDM is a promising IM/DD solution for medium- and long-reach optical access networks and data center connections.
VisANT 3.0: new modules for pathway visualization, editing, prediction and construction.
Hu, Zhenjun; Ng, David M; Yamada, Takuji; Chen, Chunnuan; Kawashima, Shuichi; Mellor, Joe; Linghu, Bolan; Kanehisa, Minoru; Stuart, Joshua M; DeLisi, Charles
2007-07-01
With the integration of the KEGG and Predictome databases as well as two search engines for coexpressed genes/proteins using data sets obtained from the Stanford Microarray Database (SMD) and Gene Expression Omnibus (GEO) database, VisANT 3.0 supports exploratory pathway analysis, which includes multi-scale visualization of multiple pathways, editing and annotating pathways using a KEGG compatible visual notation and visualization of expression data in the context of pathways. Expression levels are represented either by color intensity or by nodes with an embedded expression profile. Multiple experiments can be navigated or animated. Known KEGG pathways can be enriched by querying either coexpressed components of known pathway members or proteins with known physical interactions. Predicted pathways for genes/proteins with unknown functions can be inferred from coexpression or physical interaction data. Pathways produced in VisANT can be saved as computer-readable XML format (VisML), graphic images or high-resolution Scalable Vector Graphics (SVG). Pathways in the format of VisML can be securely shared within an interested group or published online using a simple Web link. VisANT is freely available at http://visant.bu.edu.
NASA Astrophysics Data System (ADS)
Tian, Yue; Leng, Lufeng; Su, Yikai
2008-11-01
All-optical virtual private network (VPN), which offers dedicated optical channels to connect users within a VPN group, is considered a promising approach to efficient internetworking with low latency and enhanced security implemented in the physical layer. On the other hand, time-division multiplexed (TDM) / wavelength-division multiplexed (WDM) network architecture based on a feeder-ring with access-tree topology, is considered a pragmatic migration scenario from current TDM-PONs to future WDM-PONs and a potential convergence scheme for access and metropolitan networks, due to its efficiently shared hardware and bandwidth resources. All-optical VPN internetworking in such a metro-access integrated structure is expected to cover a wider service area and therefore is highly desirable. In this paper, we present a TDM/WDM metro-access integrated network supporting all-optical VPN internetworking among ONUs in different sub- PONs based on orthogonal differential-phase-shift keying (DPSK) / amplitude-shift keying (ASK) modulation format. In each ONU, no laser but a single Mach-Zehnder modulator (MZM) is needed for the upstream and VPN signal generation, which is cost-effective. Experiments and simulations are performed to verify its feasibility as a potential solution to the future access service.
[The comparative evaluation of level of security culture in medical organizations].
Roitberg, G E; Kondratova, N V; Galanina, E V
2016-01-01
The study was carried out on the basis of clinic “Medicine” in 2014-2015 concerning security culture. The sampling included 465 filled HSPSC questionnaires. The comparative analysis of received was implemented. The “Zubovskaia district hospital” Having no accreditation according security standards and group of clinics from USA functioning for many years in the system of patient security support were selected as objects for comparison. The evaluation was implemented concerning dynamics of security culture in organization at implementation of strategies of security of patients during 5 years and comparison of obtained results with USA clinics was made. The study results demonstrated that in conditions of absence of implemented standards of security in medical organization total evaluation of security remains extremely low. The study of security culture using HSPSC questionnaire is an effective tool for evaluating implementation of various strategies of security ofpatient. The functioning in the system of international standards of quality, primarily JCI standards, permits during several years to achieve high indices of security culture.
Sablok, Kavita; Bhalla, Vijayender; Sharma, Priyanka; Kaushal, Roohi; Chaudhary, Shilpa; Suri, C Raman
2013-03-15
Binding of electron-deficient trinitrotoluene (TNT) to the electron rich amine groups on a substrate form specific charge-transfer Jackson-Meisenheimer (JM) complex. In the present work, we report formation of specific JM complex on amine functionalized reduced graphene oxide/carbon nanotubes- (a-rGO/CNT) nanocomposite leading to sensitive detection of TNT. The CNT were dispersed using graphene oxide that provides excellent dispersion by attaching to CNT through its hydrophobic domains and solubilizes through the available OH and COOH groups on screen printed electrode (SPE). The GO was reduced electrochemically to form reduced graphene that remarkably increases electrochemical properties owing to the intercalation of high aspect CNT on graphene flakes as shown by TEM micrograph. The surface amine functionalization of dropcasted and rGO/CNT was carried out using a bi-functional cross linker ethylenediamine. The extent of amine functionalization on modified electrodes was confirmed using energy dispersive X-ray (EDX), X-ray photoelectron spectroscopy (XPS) and confocal microscopy. The FTIR and Raman spectra further suggested the formation of JM complex between amine functionalized electrodes and TNT leading to a shift in peak intensity together with peak broadening. The a-rGO/CNT nanocomposite prepared electrode surface leads to ultra-trace detection of TNT upto 0.01 ppb with good reproducibility (n=3). The a-rGO/CNT sensing platform could be an alternate for sensitive detection of TNT explosive for various security and environmental applications. Copyright © 2013 Elsevier B.V. All rights reserved.
Pavone, Vincenzo; Esposti, Sara Degli
2012-07-01
As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.
2006-11-01
initiatives. Political Stability Iraq’s Council of Representatives has passed key legislation to initiate the constitutional review process, to...facilitate foreign invest- ment, and to outline a process for region formation. Most important for long-term political stability is the success of...November 30, 2006 5 1. Stability and Security in Iraq 1.1 Political Stability 1.1.1 Steps to a Free and Self-Governing Iraq As detailed in the August
Electronic Derivative Classifier/Reviewing Official
DOE Office of Scientific and Technical Information (OSTI.GOV)
Harris, Joshua C; McDuffie, Gregory P; Light, Ken L
2017-02-17
The electronic Derivative Classifier, Reviewing Official (eDC/RO) is a web based document management and routing system that reduces security risks and increases workflow efficiencies. The system automates the upload, notification review request, and document status tracking of documents for classification review on a secure server. It supports a variety of document formats (i.e., pdf, doc, docx, xls, xlsx, xlsm, ppt, pptx, vsd, vsdx and txt), and allows for the dynamic placement of classification markings such as the classification level, category and caveats on the document, in addition to a document footer and digital signature.
Marketing Strategy and Implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This report documents the marketing campaign that has been designed for middle and high school students in New Mexico to increase interest in participation in national security careers at the National Nuclear Security Administration. This marketing campaign builds on the research that was previously conducted, as well as the focus groups that were conducted. This work is a part of the National Nuclear Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) / National Nuclear Security Administration (NNSA) grant. Outcome analysis was performed to determine appropriate marketing strategies. The analysis was based upon focus groups with middlemore » school and high school students, student interactions, and surveys completed by students to understand and gauge student interest in Science, Technology, Engineering, and Math (STEM) subjects, interest in careers at NNSA, future job considerations, and student desire to pursue post-secondary education. Further, through the focus groups, students were asked to attend a presentation on NNSA job opportunities and employee requirements. The feedback received from the students was utilized to develop the focus and components of the marketing campaign.« less
Olupot-Olupot, Peter; Katawera, Andrew; Cooper, Curtis; Small, Will; Anema, Aranka; Mills, Edward
2008-09-12
We aimed to determine patient and health worker concerns regarding antiretroviral adherence in a conflict-affected population using focus groups (n = 40) and semi-structured interviews (n = 11). Patient concerns include security attending clinics, food security, distance to health centers and access to health providers. During periods of famine and flooding, the lack of food security and only single daily meals makes taking multiple doses impossible. Possible facilitating strategies included mobile teams, increased security and regularity of drug stocks.
NASA Astrophysics Data System (ADS)
Zhang, Q.; Song, W.; Yang, J.
2017-12-01
Ecological security is close related to the people's survival and development. In the context of the global warming, with the increasingly frequent human activities, ecological and environmental problems have become increasingly prominent. Ecological security has aroused widespread concern, especially in the arid region. It has an important role in national security as well as political security, military security, economic security, social security. Taken Xinjiang as the research area, which is a typical arid region in China, this study establishes an ecological safety assessment indicator system from perspective of the generic process and the formation mechanism of the ecosystem. The framework is based on natural resources dimensions, natural environment dimensions and human disturbance dimensions. Water is the restrictive factor for the development of arid region, so the water resources carrying capacity is the main natural resource of the study area. The natural environment includes SPI(standardized precipitation index), dryness index, landscape vulnerability, NDVI. Human disturbance includes urbanization rate, population density, afforestation area, per capita GDP, water-saving irrigation area, fertilizer and pesticide application, agriculture Mechanical power, energy consumption. The expert scoring method and the coefficient of variation method are used to determine the weight of each indicator, and finally a comprehensive index is constructed to evaluate the ecological security of Xinjiang, that is, the ecological security index. The results indicate that the ecological security of Xinjiang is 0.43, which is in the critical area. The ecological security of Hami, Turpan and Karamay is the lowest, and the ecological security of the Arabian and Yili is the highest. The ecological security of the south in the Xinjiang is higher than that in the north. In short, ecological environment of Xinjiang is in a sensitive period. Effective ecological protection policy will ameliorate the ecological environment, on the contrary, high-intensity human activities will make it tends to deteriorate. This research would provide scientific guidance and suggestions for the ecological environment protection and sustainable development of Xinjiang.
17 CFR 270.11a-1 - Definition of “exchange” for purposes of section 11 of the Act.
Code of Federal Regulations, 2010 CFR
2010-04-01
... issued, and notice of intention to close the account was mailed to the security holder, and he had a... group eligible to purchase the security, the issuer required the surrender of the security and paid the redemption price thereof. (c) The provisions of paragraph (a) of this section shall not apply if, following...
Security Assistance: U.S. and International Historical Perspectives
2006-08-01
Major Schumann’s study , A transformational approach to US security assistance – the case of Romania. 45 Quadrennial Defense Review Report (QDRR...545 A Transformational Approach to Security Assistance: The Case of Romania by Major Drew Schumann...intent of this study is to examine a small group of nineteenth- and twentieth-century cases in search of useful, or at least noteworthy
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
... course of the two challenge months, satisfy the requirements described above for receiving assignment of... Qualified Security, the assignment of Qualified Securities to a Group will be based on factors that include... become the LMM for such Qualified Security, it may initiate a challenge by notifying the Exchange of its...
National Security in the Nuclear Age: Public Library Proposal and Booklist. May 1987 Update.
ERIC Educational Resources Information Center
Dane, Ernest B.
To increase public understanding of national security issues, this document proposes that a balanced and up-to-date collection of books and other materials on national security in the nuclear age be included in all U.S. public libraries. The proposal suggests that the books be grouped together on an identified shelf. Selection criteria for the…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
... securities. The marketplaces operated by OTC Markets Group Inc. include OTCQX, OTCQB and OTC Pink. II. Self... Premises in Certain OTC Bulletin Board and OTC Markets Securities May 19, 2011. Pursuant to Section 19(b)(1... approved booth premises in certain OTC Bulletin Board (``OTCBB'') and OTC Markets \\4\\ securities. The text...
2009-05-01
Group 8-59. Cultures may be individualistic or collectivist in their orientation. An individualist culture is one in which the ties between...individuals are loose—where people are expected to take care of themselves and their immediate families. In a collectivist culture , people are raised from...foreign security forces and their population. Conducting successful security force assistance requires adaptive units led by well- informed, culturally
NASA Technical Reports Server (NTRS)
Bishop, Matt
1991-01-01
The Network Time Protocol is being used throughout the Internet to provide an accurate time service. The security requirements are examined of such a service, version 2 of the NTP protocol is analyzed to determine how well it meets these requirements, and improvements are suggested where appropriate.
Chandler, Felicity; Dissanayake, Cheryl
2014-07-01
Previous research has investigated caregiver attachment relationships in children with autism during early childhood, with few differences found from matched control groups. However, little is known of this relationship during middle childhood (ages 8-12 years). In this study, the aim was to establish whether there are differences in the security of attachment in children with high-functioning autism compared to typically developing children. A secondary aim was to establish whether caregivers' perceptions of their child's attachment to them accorded with the children's own reports. Twenty-one children with high-functioning autism and 17 typically developing children were administered the Kerns Security Scale and the Inventory of Parent and Peer Attachment-Revised, and caregivers completed the same questionnaires from the viewpoint of their child. There were no differences between the groups in the children's and parents' reports of attachment security. Parents' and children's reports were moderately correlated on the Kerns Security Scale but were not correlated on the Inventory of Parent and Peer Attachment-Revised. The results indicate that levels of attachment security in children with high-functioning autism are not different from those in typically developing children. © The Author(s) 2013.
Krüger, Jenny K; Suchan, Boris
2016-01-01
Aviation security screeners analyze a large number of X-ray images per day and seem to be experts in mentally rotating diverse kinds of visual objects. A robust gender-effect that men outperform women in the Vandenberg & Kuse mental rotation task has been well documented over the last years. In addition it has been shown that training can positively influence the overall task-performance. Considering this, the aim of the present study was to investigate whether security screeners show better performance in the Mental Rotation Test (MRT) independently of gender. Forty-seven security screeners of both sexes from two German airports were examined with a computer based MRT. Their performance was compared to a large sample of control subjects. The well-known gender-effect favoring men on mental rotation was significant within the control group. However, the security screeners did not show any sex differences suggesting an effect of training and professional performance. Surprisingly this specialized group showed a lower level of overall MRT performance than the control participants. Possible aviation related influences such as secondary effects of work-shift or expertise which can cumulatively cause this result are discussed.
Work-related violence against security guards--who is most at risk?
Leino, Tuula; Selin, Risto; Summala, Heikki; Virtanen, Marianna
2011-01-01
Studies on violence in the work of security guards are largely lacking. This study is unique in that it focuses on security guards (n=1,010) in Finland, and assesses the different forms, prevalence, and risk factors of the work-related violence they often face. Information to a survey instrument was obtained by first interviewing 30 volunteers. Then we made a cross-sectional mailed survey that was sent to a randomized group of 2,000 security guards. The response rate was 52. We found the prevalence of verbal aggression, threats of assault, and physical acts against security guards at least once a month to be 39%, 19%, and 15% respectively. As regards risk factors and who is most at risk, our results show that male gender, young age, low work experience, late working hours, and time pressure were associated with all three forms of work-related violence. Unlike other forms of violence, verbal aggression was highly prevalent outside the metropolitan area and directed towards both more and less experienced security guards. In prevention policies for violence, it is important to identify high-risk groups such as those who have less work experience.
Weems, Robert E.; Tanner, Lawrence H.; Lucas, Spencer G.
2016-01-01
The Upper Permian? - Lower Jurassic Newark Supergroup of eastern North America has a strikingly uniform succession of lithologic units. This uniformity is seen regardless of whether these units are characterized on the basis of their lithostratigraphy, allostratigraphy, biostratigraphy, or chemostratigraphy. After deposition, these units were broken up tectonically and attacked erosionally; parts of them survive today only within localized, down-faulted areas. Many lines of evidence compellingly demonstrate that most or all of these remnant units once were physically continuous between remaining outcrops. It is needlessly confusing to give every remnant of each unit a different name in each area where it persists simply because it is now physically isolated by erosion from other portions of the same unit. Instead, these units should be defined within a regional lithostratigraphic framework that emphasizes their common origins and original stratigraphic continuity. To this end, the formation-level stratigraphy of the Newark Supergroup is reduced from 58 locally applied and locally defined formations to a succession of only 16 uniformly defined and regionally recognizable formations. In all cases the oldest name validly applied to each formation is given priority over more recently erected synonymous names, which are either abandoned or, in a few cases, changed in rank to a member of one of the formations recognized here. The Newark Supergroup is here organized into four regionally recognizable groups, each subdivided into regionally recognizable formations. In ascending order, the Upper Permian?-Middle Triassic Acadia Group (new name) includes the Honeycomb Point Formation, Chedabucto Formation, Economy Formation, and Evangeline Formation. This group is preserved only in the Canadian Fundy and Chedabucto basins. The Upper Triassic (Carnian-Norian) Chatham Group includes the Doswell Formation, Stockton Formation, Lockatong Formation, and Passaic Formation. The Upper Triassic-Lower Jurassic (upper Rhaetian-lower Hettangian) Meriden Group includes the Talcott Formation, Shuttle Meadow Formation, Holyoke Formation, East Berlin Formation, and Hampden Formation. The term "Agawam Group," previously proposed to encompass all Newark Supergroup strata above the highest basalt of the Meriden Group, is here abandoned and replaced with the name "Portland Group" for the same suite of strata. The Lower Jurassic (upper Hettangian-lower Sinemurian) Portland Group includes a lower Boonton Formation, an overlying Longmeadow Sandstone (here reinstated), and the Mount Toby Conglomerate, which laterally intertongues with both the Boonton Formation and the Longmeadow Sandstone.
2018-03-01
computational parameters needs to be established. We used density functional theory to compute defect formation energies of the neutral and charged hh... energies for the 3A to 3E transition (absorption, zero phonon lines, and emission), which is essential for optical initialization and read-out. We...PBE, defect formation energy , charge transition levels, absorption, zero phonon lines, emission 16. SECURITY CLASSIFICATION OF: 17. LIMITATION
Development of a Methodology for Customizing Insider Threat Auditing on a Linux Operating System
2010-03-01
information /etc/group, passwd ,gshadow,shadow,/security/opasswd 16 User A attempts to access User B directory 17 User A attempts to access User B file w/o...configuration Handled by audit rules for root actions Audit user write attempts to system files -w /etc/group –p wxa -w /etc/ passwd –p wxa -w /etc/gshadow –p...information (/etc/group, /etc/ passwd , /etc/gshadow, /etc/shadow, /etc/sudoers, /etc/security/opasswd) Procedure: 1. User2 logs into the system
Towards a Scalable Group Vehicle-based Security System
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carter, Jason M
2016-01-01
In August 2014, the National Highway Traffic Safety Administration (NHTSA) proposed new rulemaking to require V2V communication in light vehicles. To establish trust in the basic safety messages (BSMs) that are exchanged by vehicles to improve driver safety, a vehicle public key infrastructure (VPKI) is required. We outline a system where a group or groups of vehicles manage and generate their own BSM signing keys and authenticating certificates -- a Vehicle-Based Security System (VBSS). Based on our preliminary examination, we assert the mechanisms exist to implement a VBSS that supports V2V communications; however, maintaining uniform trust throughout the system whilemore » protecting individual privacy does require reliance on nascent group signature technology which may require a significant amount of communication overhead for trust maintenance. To better evaluate the VBSS approach, we compare it to the proposed Security Credential Management System (SCMS) in four major areas including bootstrapping, pseudonym provisioning, BSM signing and authentication, and revocation. System scale, driver privacy, and the distribution and dynamics of participants make designing an effective VPKI an interesting and challenging problem; no clear-cut strategy exists to satisfy the security and privacy expectations in a highly efficient way. More work is needed in VPKI research, so the life-saving promise of V2V technology can be achieved.« less
Can Nuclear Terrorists be Deterred?
NASA Astrophysics Data System (ADS)
Ferguson, Charles
2005-04-01
Conventional thinking since September 11, 2001, posits that nuclear-armed terrorists cannot be deterred. However, not all terrorist groups are alike. For instance, those that are strongly affiliated with a national territory or a constituency that can be held hostage are more likely to be self-deterred against using or even acquiring nuclear weapons. In contrast, international terrorist organizations, such as al Qaeda, or apocalyptic groups, such as Aum Shinrikyo, may welcome retaliatory nuclear strikes because they embrace martyrdom. Such groups may be immune to traditional deterrence, which threatens direct punishment against the group in question or against territory or people the terrorists' value. Although deterring these groups may appear hopeless, nuclear forensic techniques could provide the means to establish deterrence through other means. In particular, as long as the source of the nuclear weapon or fissile material could be identified, the United States could threaten a retaliatory response against a nation that did not provide adequate security for its nuclear weapons or weapons-usable fissile material. This type of deterrent threat could be used to compel the nation with lax security to improve its security to meet rigorous standards.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-25
... power systems in support of space exploration and national security; and the environmental cleanup of... and industrial equipment and exploration of geologic formations for oil and gas. They are located in...
The Effect of Patient Choice of Intervention on Health Outcomes
Clark, Noreen M.; Janz, Nancy K.; Dodge, Julia A.; Mosca, Lori; Lin, Xihong; Long, Qi; Little, Roderick J; Wheeler, John R.C.; Keteyian, Steven; Liang, Jersey
2008-01-01
Background Patient preference may influence intervention effects, but has not been extensively studied. Randomized controlled design (N=1075) assessed outcomes when women (60 years +) were given a choice of two formats of a program to enhance heart disease management. Methods Randomization to "no choice" or "choice" study arms. Further randomization of "no choice” to: 1) Group intervention program format, 2) Self-Directed program format, 3) Control Group. "Choice" arm selected their preferred program format. Baseline, four, twelve, and eighteen month follow-up data collected. Two analyses: health outcomes for choice compared to being randomized; and preference effect on treatment efficacy. Results Women who chose a format compared to being assigned a format had better psychosocial functioning at four months (p=0.02) and tended toward better physical functioning at twelve months (p=0.07). At eighteen months women who chose versus being assigned a format had more symptoms measured as: number (p=0.004), frequency (p=0.006) and bother (p=0.004). At four months women who preferred the Group format had better psychosocial functioning when assigned the Group format than when they were assigned the Self Directed format (p=0.03). At eighteen months women preferring a Group format had more symptoms: number (p=0.001), frequency (p=0.001), bother (p=0.001) when assigned the Group format than when assigned the Self Directed format. Conclusions Choice and preference for the Group format each enhanced psychosocial and physical functioning up to one year. Despite the preference for Group format, over the longer term (eighteen months) cardiac symptoms were fewer when assigned the Self-Directed format. PMID:18515187
Learning Group Formation Based on Learner Profile and Context
ERIC Educational Resources Information Center
Muehlenbrock, Martin
2006-01-01
An important but often neglected aspect in Computer-Supported Collaborative Learning (CSCL) is the formation of learning groups. Until recently, most support for group formation was based on learner profile information. In addition, the perspective of ubiquitous computing and ambient intelligence allows for a wider perspective on group formation,…
Yabe, Kimiko; Nakamura, Miki; Hamasaki, Takashi
1999-01-01
We detected biosynthetic activity for aflatoxins G1 and G2 in cell extracts of Aspergillus parasiticus NIAH-26. We found that in the presence of NADPH, aflatoxins G1 and G2 were produced from O-methylsterigmatocystin and dihydro-O-methylsterigmatocystin, respectively. No G-group aflatoxins were produced from aflatoxin B1, aflatoxin B2, 5-methoxysterigmatocystin, dimethoxysterigmatocystin, or sterigmatin, confirming that B-group aflatoxins are not the precursors of G-group aflatoxins and that G- and B-group aflatoxins are independently produced from the same substrates (O-methylsterigmatocystin and dihydro-O-methylsterigmatocystin). In competition experiments in which the cell-free system was used, formation of aflatoxin G2 from dihydro-O-methylsterigmatocystin was suppressed when O-methylsterigmatocystin was added to the reaction mixture, whereas aflatoxin G1 was newly formed. This result indicates that the same enzymes can catalyze the formation of aflatoxins G1 and G2. Inhibition of G-group aflatoxin formation by methyrapone, SKF-525A, or imidazole indicated that a cytochrome P-450 monooxygenase may be involved in the formation of G-group aflatoxins. Both the microsome fraction and a cytosol protein with a native mass of 220 kDa were necessary for the formation of G-group aflatoxins. Due to instability of the microsome fraction, G-group aflatoxin formation was less stable than B-group aflatoxin formation. The ordA gene product, which may catalyze the formation of B-group aflatoxins, also may be required for G-group aflatoxin biosynthesis. We concluded that at least three reactions, catalyzed by the ordA gene product, an unstable microsome enzyme, and a 220-kDa cytosol protein, are involved in the enzymatic formation of G-group aflatoxins from either O-methylsterigmatocystin or dihydro-O-methylsterigmatocystin. PMID:10473388
78 FR 9406 - Southwest Louisiana Area Maritime Security Regional Sub-Committee; Vacancies
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-08
..., we encourage qualified men and women and members of all racial and ethnic groups to apply. The Coast... security industries. Dates of employment and points of contact should be included for each position...
NREL Workshop Convenes Industry Experts on Cybersecurity and an Evolving
silos in a field that demands greater collaboration, and the benefits of systemic security architecture groups to identify possible solutions to the challenges in securing DERs-from a technology, business, and
Kim, Monica; Woodhouse, Susan S; Dai, Chenchen
2018-05-21
Insecure attachment is linked to a host of negative child outcomes, including internalizing and externalizing behavior problems. Circle of Security-Parenting (COS-P) is a manualized, video-based, eight unit, group parenting intervention to promote children's attachment security. COS-P was designed to be easily implemented, so as to make attachment interventions more widely available to families. We present the theoretical background of COS-P, research evidence supporting the COS approach, as well as a description of the COS-P intervention protocol. The case example of "Alexa," mother of three children (aged 7, 6, and 4 years), illustrates how parents can make use of the COS-P intervention to better understand children's needs, build skills in observing and interpreting children's signals, learn to recognize and regulate their own responses to their children, and learn new ways of responding to children's needs. © 2018 Wiley Periodicals, Inc.
Developing measures of food and nutrition security within an Australian context.
Archer, Claire; Gallegos, Danielle; McKechnie, Rebecca
2017-10-01
To develop a measure of food and nutrition security for use among an Australian population that measures all pillars of food security and to establish its content validity. The study consisted of two phases. Phase 1 involved focus groups with experts working in the area of food security. Data were assessed using content analysis and results informed the development of a draft tool. Phase 2 consisted of a series of three online surveys using the Delphi technique. Findings from each survey were used to establish content validity and progressively modify the tool until consensus was reached for all items. Australia. Phase 1 focus groups involved twenty-five experts working in the field of food security, who were attending the Dietitians Association of Australia National Conference, 2013. Phase 2 included twenty-five experts working in food security, who were recruited via email. Findings from Phase 1 supported the need for an Australian-specific tool and highlighted the failure of current tools to measure across all pillars of food security. Participants encouraged the inclusion of items to measure barriers to food acquisition and the previous single item to enable comparisons with previous data. Phase 2 findings informed the selection and modification of items for inclusion in the final tool. The results led to the development of a draft tool to measure food and nutrition security, and supported its content validity. Further research is needed to validate the tool among the Australian population and to establish inter- and intra-rater reliability.
NASA Astrophysics Data System (ADS)
Xu, Yunjun; Remeikas, Charles; Pham, Khanh
2014-03-01
Cooperative trajectory planning is crucial for networked vehicles to respond rapidly in cluttered environments and has a significant impact on many applications such as air traffic or border security monitoring and assessment. One of the challenges in cooperative planning is to find a computationally efficient algorithm that can accommodate both the complexity of the environment and real hardware and configuration constraints of vehicles in the formation. Inspired by a local pursuit strategy observed in foraging ants, feasible and optimal trajectory planning algorithms are proposed in this paper for a class of nonlinear constrained cooperative vehicles in environments with densely populated obstacles. In an iterative hierarchical approach, the local behaviours, such as the formation stability, obstacle avoidance, and individual vehicle's constraints, are considered in each vehicle's (i.e. follower's) decentralised optimisation. The cooperative-level behaviours, such as the inter-vehicle collision avoidance, are considered in the virtual leader's centralised optimisation. Early termination conditions are derived to reduce the computational cost by not wasting time in the local-level optimisation if the virtual leader trajectory does not satisfy those conditions. The expected advantages of the proposed algorithms are (1) the formation can be globally asymptotically maintained in a decentralised manner; (2) each vehicle decides its local trajectory using only the virtual leader and its own information; (3) the formation convergence speed is controlled by one single parameter, which makes it attractive for many practical applications; (4) nonlinear dynamics and many realistic constraints, such as the speed limitation and obstacle avoidance, can be easily considered; (5) inter-vehicle collision avoidance can be guaranteed in both the formation transient stage and the formation steady stage; and (6) the computational cost in finding both the feasible and optimal solutions is low. In particular, the feasible solution can be computed in a very quick fashion. The minimum energy trajectory planning for a group of robots in an obstacle-laden environment is simulated to showcase the advantages of the proposed algorithms.
Sharing Data and Analytical Resources Securely in a Biomedical Research Grid Environment
Langella, Stephen; Hastings, Shannon; Oster, Scott; Pan, Tony; Sharma, Ashish; Permar, Justin; Ervin, David; Cambazoglu, B. Barla; Kurc, Tahsin; Saltz, Joel
2008-01-01
Objectives To develop a security infrastructure to support controlled and secure access to data and analytical resources in a biomedical research Grid environment, while facilitating resource sharing among collaborators. Design A Grid security infrastructure, called Grid Authentication and Authorization with Reliably Distributed Services (GAARDS), is developed as a key architecture component of the NCI-funded cancer Biomedical Informatics Grid (caBIG™). The GAARDS is designed to support in a distributed environment 1) efficient provisioning and federation of user identities and credentials; 2) group-based access control support with which resource providers can enforce policies based on community accepted groups and local groups; and 3) management of a trust fabric so that policies can be enforced based on required levels of assurance. Measurements GAARDS is implemented as a suite of Grid services and administrative tools. It provides three core services: Dorian for management and federation of user identities, Grid Trust Service for maintaining and provisioning a federated trust fabric within the Grid environment, and Grid Grouper for enforcing authorization policies based on both local and Grid-level groups. Results The GAARDS infrastructure is available as a stand-alone system and as a component of the caGrid infrastructure. More information about GAARDS can be accessed at http://www.cagrid.org. Conclusions GAARDS provides a comprehensive system to address the security challenges associated with environments in which resources may be located at different sites, requests to access the resources may cross institutional boundaries, and user credentials are created, managed, revoked dynamically in a de-centralized manner. PMID:18308979
Burmester, Mike; Munilla, Jorge; Ortiz, Andrés; Caballero-Gil, Pino
2017-07-04
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a resilient supply chain. The Internet of Things (IoT), and in particular Radio Frequency Identification (RFID) technology, can be used to realize these goals. For product identification, tracking and real-time awareness, RFID tags are attached to goods. As tagged goods move along the supply chain from the suppliers to the manufacturers, and then on to the retailers until eventually they reach the customers, two major security challenges can be identified: (I) to protect the shipment of goods that are controlled by potentially untrusted carriers; and (II) to secure the transfer of ownership at each stage of the chain. For the former, grouping proofs in which the tags of the scanned goods generate a proof of "simulatenous" presence can be employed, while for the latter, ownership transfer protocols (OTP) are used. This paper describes enhanced security solutions for both challenges. We first extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers; then, we describe a modified version of a recently published OTP based on channels with positive secrecy capacity adapted to be implemented on common RFID systems in the supply chain. The proposed solutions take into account the limitations of low cost tags employed in the supply chain, which are only required to generate pseudorandom numbers and compute one-way hash functions.
Measuring relational security in forensic mental health services
Chester, Verity; Alexander, Regi T.; Morgan, Wendy
2017-01-01
Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515
Measuring relational security in forensic mental health services.
Chester, Verity; Alexander, Regi T; Morgan, Wendy
2017-12-01
Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.
NoSQL: collection document and cloud by using a dynamic web query form
NASA Astrophysics Data System (ADS)
Abdalla, Hemn B.; Lin, Jinzhao; Li, Guoquan
2015-07-01
Mongo-DB (from "humongous") is an open-source document database and the leading NoSQL database. A NoSQL (Not Only SQL, next generation databases, being non-relational, deal, open-source and horizontally scalable) presenting a mechanism for storage and retrieval of documents. Previously, we stored and retrieved the data using the SQL queries. Here, we use the MonogoDB that means we are not utilizing the MySQL and SQL queries. Directly importing the documents into our Drives, retrieving the documents on that drive by not applying the SQL queries, using the IO BufferReader and Writer, BufferReader for importing our type of document files to my folder (Drive). For retrieving the document files, the usage is BufferWriter from the particular folder (or) Drive. In this sense, providing the security for those storing files for what purpose means if we store the documents in our local folder means all or views that file and modified that file. So preventing that file, we are furnishing the security. The original document files will be changed to another format like in this paper; Binary format is used. Our documents will be converting to the binary format after that direct storing in one of our folder, that time the storage space will provide the private key for accessing that file. Wherever any user tries to discover the Document files means that file data are in the binary format, the document's file owner simply views that original format using that personal key from receive the secret key from the cloud.
VanTieghem, Michelle R.; Gabard-Durnam, Laurel; Goff, Bonnie; Flannery, Jessica; Humphreys, Kathryn L.; Telzer, Eva H.; Caldera, Christina; Louie, Jennifer Y.; Shapiro, Mor; Bolger, Niall; Tottenham, Nim
2018-01-01
Institutional caregiving is associated with significant deviations from species-expected caregiving, altering the normative sequence of attachment formation and placing children at risk for long-term emotional difficulties. However, little is known about factors that can promote resilience following early institutional caregiving. In the current study, we investigated how adaptations in affective processing (i.e. positive valence bias) and family-level protective factors (i.e. secure parent-child relationships) moderate risk for internalizing symptoms in Previously Institutionalized (PI) youth. Children and adolescents with and without a history of institutional care performed a laboratory-based affective processing task and self-reported measures of parent-child relationship security. PI youth were more likely than comparison youth to show positive valence biases when interpreting ambiguous facial expressions. Both positive valence bias and parent-child relationship security moderated the association between institutional care and parent-reported internalizing symptoms, such that greater positive valence bias and more secure parent-child relationships predicted fewer symptoms in PI youth. However, when both factors were tested concurrently, parent-child relationship security more strongly moderated the link between PI status and internalizing symptoms. These findings suggest that both individual-level adaptations in affective processing and family-level factors of secure parent-child relationships may ameliorate risk for internalizing psychopathology following early institutional caregiving. PMID:28401841
Vantieghem, Michelle R; Gabard-Durnam, Laurel; Goff, Bonnie; Flannery, Jessica; Humphreys, Kathryn L; Telzer, Eva H; Caldera, Christina; Louie, Jennifer Y; Shapiro, Mor; Bolger, Niall; Tottenham, Nim
2017-05-01
Institutional caregiving is associated with significant deviations from species-expected caregiving, altering the normative sequence of attachment formation and placing children at risk for long-term emotional difficulties. However, little is known about factors that can promote resilience following early institutional caregiving. In the current study, we investigated how adaptations in affective processing (i.e., positive valence bias) and family-level protective factors (i.e., secure parent-child relationships) moderate risk for internalizing symptoms in previously institutionalized (PI) youth. Children and adolescents with and without a history of institutional care performed a laboratory-based affective processing task and self-reported measures of parent-child relationship security. PI youth were more likely than comparison youth to show positive valence biases when interpreting ambiguous facial expressions. Both positive valence bias and parent-child relationship security moderated the association between institutional care and parent-reported internalizing symptoms, such that greater positive valence bias and more secure parent-child relationships predicted fewer symptoms in PI youth. However, when both factors were tested concurrently, parent-child relationship security more strongly moderated the link between PI status and internalizing symptoms. These findings suggest that both individual-level adaptations in affective processing and family-level factors of secure parent-child relationships may ameliorate risk for internalizing psychopathology following early institutional caregiving.
Home care after early discharge: impact on healthy mothers and newborns.
Askelsdottir, Björk; Lam-de Jonge, Willemien; Edman, Gunnar; Wiklund, Ingela
2013-08-01
to compare early discharge with home care versus standard postpartum care in terms of mothers' sense of security; contact between mother, newborn and partner; emotions towards breast feeding; and breast-feeding duration at one and three months after birth. retrospective case-control study. a labour ward unit in Stockholm, Sweden handling both normal and complicated births. 96 women with single, uncomplicated pregnancies and births, and their healthy newborns. early discharge at 12-24 hours post partum with 2-3 home visits during the first week after birth. The intervention group consisted of women who had a normal vaginal birth (n=45). This group was compared with healthy controls who received standard postnatal care at the hospital (n=51). mothers' sense of security was measured using the Parents' Postnatal Sense of Security Scale. Contact between mother, child and father, and emotions towards breast feeding were measured using the Alliance Scale, and breast-feeding rates at one and three months post partum were recorded. women in the intervention group reported a greater sense of security in the first postnatal week but had more negative emotions towards breast feeding compared with the control group. At three months post partum, 74% of the newborns in the intervention group were fully breast fed versus 93% in the control group (p=0.021). Contact between the mother, newborn and partner did not differ between the groups. early discharge with home care is a feasible option for healthy women and newborns, but randomised controlled studies are needed to investigate the effects of home care on breast-feeding rates. Copyright © 2012 Elsevier Ltd. All rights reserved.
Usage of insecure E-mail services among researchers with different scientific background.
Solić, Kresimir; Grgić, Krešimir; Ilakovac, Vesna; Zagar, Drago
2011-08-01
Free web‑based e-mail services are considered to have more security flaws than institutional ones, but they are frequently used among scientific researchers for professional communication. The aim of this study was to analyze frequency of usage of the insecure free e-mail services for professional communication among biomedical, economical and technical researchers, who published papers in one of three different journals: Croatian Medical Journal, Automatika and Economic Research. Contact details of the authors who provided their e‑mail address from the papers published in those three journals during one year period were collected. These e‑mail addresses were collected from the electronic archive of the journals in question. The domains of all e‑mail addresses were assessed and contacts were categorized into three groups according to the following types: world-wide known free web‑based e‑mail services, national Internet Service Provider (ISP) e-mail services, and institutional or corporate e-mail addresses. The proportion of authors using free web-based e-mail services, the least secure group type, was highest among biomedical researchers (17.8%) while every e‑mail address collected from the technical journal belonged to the secured institutional e‑mail group type. It seems that all researchers from the technical scientific field and most of the researchers from the economical field value good security practice and use more secure systems for professional communication. High percentage of the biomedical researchers who use insecure e‑mail services may mean that they need to be warned of the possible security disadvantages of those kinds of e‑mail addresses.
Guild, Danielle J.; Toth, Sheree L.; Handley, Elizabeth D.; Rogosch, Fred A.; Cicchetti, Dante
2017-01-01
Numerous investigations have demonstrated that Child-Parent Psychotherapy (CPP) promotes secure attachment between mothers and offspring. However, the role of post-intervention attachment security as it relates to long-term child outcomes has never been evaluated. The present study therefore examined post-intervention attachment status as a mediator of the association between CPP for depressed mothers and their offspring and subsequent peer relations among offspring. Depressed mothers and their toddlers were randomized to receive CPP (n = 45) or to a control group (DC; n = 55). A prior investigation with this sample indicated that offpring who received CPP attained significantly higher rates of secure attachment post-intervention, wheras insecure attachment continued to predominate for offspring in the DC group. The present study examined follow-up data of teachers’ reports on participants’ competence with classroom peers when they were approximately 9 years old. Findings indicated that children who received CPP were more likely to evidence secure attachments at post-intervention, which in turn was associated with more positive peer relationships at age 9. PMID:28401848
Guild, Danielle J; Toth, Sheree L; Handley, Elizabeth D; Rogosch, Fred A; Cicchetti, Dante
2017-05-01
Numerous investigations have demonstrated that child-parent psychotherapy (CPP) promotes secure attachment between mothers and offspring. However, the role of postintervention attachment security as it relates to long-term child outcomes has never been evaluated. The present study therefore examined postintervention attachment status as a mediator of the association between CPP for depressed mothers and their offspring and subsequent peer relations among offspring. Depressed mothers and their toddlers were randomized to receive CPP (n = 45) or to a control group (n = 55). A prior investigation with this sample indicated that offspring who received CPP attained significantly higher rates of secure attachment postintervention, whereas insecure attachment continued to predominate for offspring in the control group. The present study examined follow-up data of teachers' reports on participants' competence with classroom peers when they were approximately 9 years old. Findings indicated that children who received CPP were more likely to evidence secure attachments at postintervention, which in turn was associated with more positive peer relationships at age 9.
Guedes, Maryse; Santos, António J; Ribeiro, Olívia; Freitas, Miguel; Rubin, Kenneth H; Veríssimo, Manuela
2018-06-01
Peer victimization is one of the most prominent problems during adolescence. Research has distinguished aggressive and non-aggressive victims; however, there are still significant drawbacks in understanding the social and family functioning of these different groups of victimized adolescents. This study aimed to compare social behavior and perceived attachment security to parents of Portuguese adolescents, classified as aggressive victims, non-aggressive victims and non-victims. The sample consisted of 222 adolescents (115 boys, 107 girls) who completed the Kerns Security Scale and the Extended Class Play, to assess perceived attachment security and social behavior, respectively. Controlling for age and sex, aggressive victims and non-aggressive victims differed in anxious withdrawal but shared a similar profile in peer exclusion and prosocial behavior. Only aggressive victims reported lower attachment security to mother and father when compared to non-victims. These findings underline that victimized adolescents constitute a heterogeneous group in terms of their social and family functioning. Copyright © 2018 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
East Europe Report, Political, Sociological and Military Affairs
1984-10-09
those of a probing attack. The object of this article was to call attention to the many opportunities of the Warsaw Pact ground forces to form combat... attention has been paid to middle-aged men, the group most vulnerable to health problems, their mortality rate has risen. Infant mortality, while lower than...up areas: The unit was divided into reconnaissance, attack, and security troops. The security group took up a position, a couple of reconnaissance
Armada, F; Muntaner, C; Navarro, V
2001-01-01
International financial institutions have played an increasing role in the formation of social policy in Latin American countries over the last two decades, particularly in health and pension programs. World Bank loans and their attached policy conditions have promoted several social security reforms within a neoliberal framework that privileges the role of the market in the provision of health and pensions. Moreover, by endorsing the privatization of health services in Latin America, the World Health Organization has converged with these policies. The privatization of social security has benefited international corporations that become partners with local business elites. Thus the World Health Organization, international financial institutions, and transnational corporations have converged in the neoliberal reforms of social security in Latin America. Overall, the process represents a mechanism of resource transfer from labor to capital and sheds light on one of the ways in which neoliberalism may affect the health of Latin American populations.
Secure uniform random-number extraction via incoherent strategies
NASA Astrophysics Data System (ADS)
Hayashi, Masahito; Zhu, Huangjun
2018-01-01
To guarantee the security of uniform random numbers generated by a quantum random-number generator, we study secure extraction of uniform random numbers when the environment of a given quantum state is controlled by the third party, the eavesdropper. Here we restrict our operations to incoherent strategies that are composed of the measurement on the computational basis and incoherent operations (or incoherence-preserving operations). We show that the maximum secure extraction rate is equal to the relative entropy of coherence. By contrast, the coherence of formation gives the extraction rate when a certain constraint is imposed on the eavesdropper's operations. The condition under which the two extraction rates coincide is then determined. Furthermore, we find that the exponential decreasing rate of the leaked information is characterized by Rényi relative entropies of coherence. These results clarify the power of incoherent strategies in random-number generation, and can be applied to guarantee the quality of random numbers generated by a quantum random-number generator.
Inherent secure communications using lattice based waveform design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pugh, Matthew Owen
2013-12-01
The wireless communications channel is innately insecure due to the broadcast nature of the electromagnetic medium. Many techniques have been developed and implemented in order to combat insecurities and ensure the privacy of transmitted messages. Traditional methods include encrypting the data via cryptographic methods, hiding the data in the noise floor as in wideband communications, or nulling the signal in the spatial direction of the adversary using array processing techniques. This work analyzes the design of signaling constellations, i.e. modulation formats, to combat eavesdroppers from correctly decoding transmitted messages. It has been shown that in certain channel models the abilitymore » of an adversary to decode the transmitted messages can be degraded by a clever signaling constellation based on lattice theory. This work attempts to optimize certain lattice parameters in order to maximize the security of the data transmission. These techniques are of interest because they are orthogonal to, and can be used in conjunction with, traditional security techniques to create a more secure communication channel.« less
NASA Astrophysics Data System (ADS)
Chalmers, Alex
2004-09-01
To increase the security and throughput of ISO traffic through international terminals more technology must be applied to the problem. A transnational central archive of inspection records is discussed that can be accessed by national agencies as ISO containers approach their borders. The intent is to improve the throughput and security of the cargo inspection process. A review of currently available digital media archiving technologies is presented and their possible application to the tracking of international ISO container shipments. Specific image formats employed by current x-ray inspection systems are discussed. Sample x-ray data from systems in use today are shown that could be entered into such a system. Data from other inspection technologies are shown to be easily integrated, as well as the creation of database records suitable for interfacing with other computer systems. Overall system performance requirements are discussed in terms of security, response time and capacity. Suggestions for pilot projects based on existing border inspection processes are made also.
Method and apparatus for production of subsea hydrocarbon formations
Blandford, Joseph W.
1995-01-01
A system for controlling, separating, processing and exporting well fluids produced from subsea hydrocarbon formations is disclosed. The subsea well tender system includes a surface buoy supporting one or more decks above the water surface for accommodating equipment to process oil, gas and water recovered from the subsea hydrocarbon formation. The surface buoy includes a surface-piercing central flotation column connected to one or more external floatation tanks located below the water surface. The surface buoy is secured to the seabed by one or more tendons which are anchored to a foundation with piles imbedded in the seabed. The system accommodates multiple versions on the surface buoy configuration.
1990-06-01
reader is cautioned that computer programs developed in this research may not have been exercised for all cases of interest. While every effort has been...Source of Funding Numbers _. Program Element No Project No I Task No I Work Unit Accession No 11 Title (Include security classflcation) APPLICATION OF...formats. Previous applications of these encoding formats were on industry standard computers (PC) over a 16-20 klIz channel. This report discusses the
Method and apparatus for production of subsea hydrocarbon formations
Blandford, Joseph W.
1994-01-01
A well tender system for controlling, separating, storing and offloading well fluids produced from subsea hydrocarbon formations. The system comprises a vertically aligned series of tethered cylindrical tanks which are torsionally stabilized by flexible catenary production riser and export riser bundles, and serviced by separate catenary pipe bundles. Piles are secured to the seabed, each pile assembly being pivotally connected to a lower rigid tendon, which is in turn connected to tendons arranged about the periphery of the interconnected cylindrical tanks.
Method and apparatus for production of subsea hydrocarbon formations
Blandford, Joseph W.
1992-01-01
A well tender system for controlling, separating, storing and offloading well fluids produced from subsea hydrocarbon formations. The system comprises a vertically aligned series of tethered cylindrical tanks which are torsionally stabilized by flexible catenary production riser and expert riser bundles, and serviced by separate catenary pipe bundles. Piles are secured to the seabed, each pile assembly being pivotally connected to a lower rigid tendon, which is in turn connected to tendons arranged about the periphery of the interconnected cylindrical tanks.
Hybrid methods for cybersecurity analysis :
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, Warren Leon,; Dunlavy, Daniel M.
2014-01-01
Early 2010 saw a signi cant change in adversarial techniques aimed at network intrusion: a shift from malware delivered via email attachments toward the use of hidden, embedded hyperlinks to initiate sequences of downloads and interactions with web sites and network servers containing malicious software. Enterprise security groups were well poised and experienced in defending the former attacks, but the new types of attacks were larger in number, more challenging to detect, dynamic in nature, and required the development of new technologies and analytic capabilities. The Hybrid LDRD project was aimed at delivering new capabilities in large-scale data modeling andmore » analysis to enterprise security operators and analysts and understanding the challenges of detection and prevention of emerging cybersecurity threats. Leveraging previous LDRD research e orts and capabilities in large-scale relational data analysis, large-scale discrete data analysis and visualization, and streaming data analysis, new modeling and analysis capabilities were quickly brought to bear on the problems in email phishing and spear phishing attacks in the Sandia enterprise security operational groups at the onset of the Hybrid project. As part of this project, a software development and deployment framework was created within the security analyst work ow tool sets to facilitate the delivery and testing of new capabilities as they became available, and machine learning algorithms were developed to address the challenge of dynamic threats. Furthermore, researchers from the Hybrid project were embedded in the security analyst groups for almost a full year, engaged in daily operational activities and routines, creating an atmosphere of trust and collaboration between the researchers and security personnel. The Hybrid project has altered the way that research ideas can be incorporated into the production environments of Sandias enterprise security groups, reducing time to deployment from months and years to hours and days for the application of new modeling and analysis capabilities to emerging threats. The development and deployment framework has been generalized into the Hybrid Framework and incor- porated into several LDRD, WFO, and DOE/CSL projects and proposals. And most importantly, the Hybrid project has provided Sandia security analysts with new, scalable, extensible analytic capabilities that have resulted in alerts not detectable using their previous work ow tool sets.« less
Gordon, Anne R; Briefel, Ronette R; Collins, Ann M; Rowe, Gretchen M; Klerman, Jacob A
2017-03-01
The Summer Electronic Benefit Transfers for Children (SEBTC) demonstration piloted summer food assistance through electronic benefit transfers (EBTs), providing benefits either through the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) or the Supplemental Nutrition Assistance Program (SNAP) EBT. To inform food assistance policy and describe how demonstrations using WIC and SNAP models differed in benefit take-up and impacts on food security and children's food consumption. Sites chose to deliver SEBTC using the SNAP or WIC EBT system. Within each site, in 2012, households were randomly assigned to a benefit group or a no-benefit control group. Grantees (eight states and two Indian Tribal Organizations) selected school districts serving many low-income children. Schoolchildren were eligible in cases where they had been certified for free or reduced-price meals during the school year. Before the demonstration, households in the demonstration sample had lower incomes and lower food security, on average, than households with eligible children nationally. Grantees provided selected households with benefits worth $60 per child per summer month using SNAP or WIC EBT systems. SNAP-model benefits covered most foods. WIC-model benefits could only be used for a specific package of foods. Key outcomes were children's food security (assessed using the US Department of Agriculture food security scale) and food consumption (assessed using food frequency questions). Differences in mean outcomes between the benefit and control groups measured impact, after adjusting for household characteristics. In WIC sites, benefit-group households redeemed a lower percentage of SEBTC benefits than in SNAP sites. Nonetheless, the benefit groups in both sets of sites had similar large reductions in very low food security among children, relative to no-benefit controls. Children receiving benefits consumed more healthful foods, and these impacts were larger in WIC sites. Results suggest the WIC SEBTC model deserves strong consideration. Copyright © 2017 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.
NASA Astrophysics Data System (ADS)
Ross, A.; Little, M. M.
2013-12-01
NASA's Atmospheric Science Data Center (ASDC) is piloting the use of Geographic Information System (GIS) technology that can be leveraged for crisis planning, emergency response, and disaster management/awareness. Many different organizations currently use GIS tools and geospatial data during a disaster event. ASDC datasets have not been fully utilized by this community in the past due to incompatible data formats that ASDC holdings are archived in. Through the successful implementation of this pilot effort and continued collaboration with the larger Homeland Defense and Department of Defense emergency management community through the Homeland Infrastructure Foundation-Level Data Working Group (HIFLD WG), our data will be easily accessible to those using GIS and increase the ability to plan, respond, manage, and provide awareness during disasters. The HIFLD WG Partnership has expanded to include more than 5,900 mission partners representing the 14 executive departments, 98 agencies, 50 states (and 3 territories), and more than 700 private sector organizations to directly enhance the federal, state, and local government's ability to support domestic infrastructure data gathering, sharing and protection, visualization, and spatial knowledge management.The HIFLD WG Executive Membership is lead by representatives from the Department of Defense (DoD) Office of the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs - OASD (HD&ASA); the Department of Homeland Security (DHS), National Protection and Programs Directorate's Office of Infrastructure Protection (NPPD IP); the National Geospatial-Intelligence Agency (NGA) Integrated Working Group - Readiness, Response and Recovery (IWG-R3); the Department of Interior (DOI) United States Geological Survey (USGS) National Geospatial Program (NGP), and DHS Federal Emergency Management Agency (FEMA).
Rickard, Claire M; Marsh, Nicole; Webster, Joan; Playford, E Geoffrey; McGrail, Matthew R; Larsen, Emily; Keogh, Samantha; McMillan, David; Whitty, Jennifer A; Choudhury, Md Abu; Dunster, Kimble R; Reynolds, Heather; Marshall, Andrea; Crilly, Julia; Young, Jeanine; Thom, Ogilvie; Gowardman, John; Corley, Amanda; Fraser, John F
2015-09-23
Over 70% of all hospital admissions have a peripheral intravenous device (PIV) inserted; however, the failure rate of PIVs is unacceptably high, with up to 69% of these devices failing before treatment is complete. Failure can be due to dislodgement, phlebitis, occlusion/infiltration and/or infection. This results in interrupted medical therapy; painful phlebitis and reinsertions; increased hospital length of stay, morbidity and mortality from infections; and wasted medical/nursing time. Appropriate PIV dressing and securement may prevent many cases of PIV failure, but little comparative data exist regarding the efficacy of various PIV dressing and securement methods. This trial will investigate the clinical and cost-effectiveness of 4 methods of PIV dressing and securement in preventing PIV failure. A multicentre, parallel group, superiority randomised controlled trial with 4 arms, 3 experimental groups (tissue adhesive, bordered polyurethane dressing, sutureless securement device) and 1 control (standard polyurethane dressing) is planned. There will be a 3-year recruitment of 1708 adult patients, with allocation concealment until randomisation by a centralised web-based service. The primary outcome is PIV failure which includes any of: dislodgement, occlusion/infiltration, phlebitis and infection. Secondary outcomes include: types of PIV failure, PIV dwell time, costs, device colonisation, skin colonisation, patient and staff satisfaction. Relative incidence rates of device failure per 100 devices and per 1000 device days with 95% CIs will summarise the impact of each dressing, and test differences between groups. Kaplan-Meier survival curves (with log-rank Mantel-Cox test) will compare device failure over time. p Values of <0.05 will be considered significant. Secondary end points will be compared between groups using parametric or non-parametric techniques appropriate to level of measurement. Ethical approval has been received from Queensland Health (HREC/11/QRCH/152) and Griffith University (NRS/46/11/HREC). Results will be published according to the CONSORT statement and presented at relevant conferences. Australian New Zealand Clinical Trial Registry (ACTRN); 12611000769987. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Tang, Qingting; Chen, Xu; Hu, Jia; Liu, Ying
2017-01-01
Our study explored how priming with a secure base schema affects the processing of emotional facial stimuli in individuals with attachment anxiety. We enrolled 42 undergraduate students between 18 and 27 years of age, and divided them into two groups: attachment anxiety and attachment secure. All participants were primed under two conditions, the secure priming using references to the partner, and neutral priming using neutral references. We performed repeated attachment security priming combined with a dual-task paradigm and functional magnetic resonance imaging. Participants’ reaction times in terms of responding to the facial stimuli were also measured. Attachment security priming can facilitate an individual’s processing of positive emotional faces; for instance, the presentation of the partner’s name was associated with stronger activities in a wide range of brain regions and faster reaction times for positive facial expressions in the subjects. The current finding of higher activity in the left-hemisphere regions for secure priming rather than neutral priming is consistent with the prediction that attachment security priming triggers the spread of the activation of a positive emotional state. However, the difference in brain activity during processing of both, positive and negative emotional facial stimuli between the two priming conditions appeared in the attachment anxiety group alone. This study indicates that the effect of attachment secure priming on the processing of emotional facial stimuli could be mediated by chronic attachment anxiety. In addition, it highlights the association between higher-order processes of the attachment system (secure attachment schema priming) and early-stage information processing system (attention), given the increased attention toward the effects of secure base schema on the processing of emotion- and attachment-related information among the insecure population. Thus, the following study has applications in providing directions for clinical treatment of mood disorders in attachment anxiety. PMID:28473796
Tang, Qingting; Chen, Xu; Hu, Jia; Liu, Ying
2017-01-01
Our study explored how priming with a secure base schema affects the processing of emotional facial stimuli in individuals with attachment anxiety. We enrolled 42 undergraduate students between 18 and 27 years of age, and divided them into two groups: attachment anxiety and attachment secure. All participants were primed under two conditions, the secure priming using references to the partner, and neutral priming using neutral references. We performed repeated attachment security priming combined with a dual-task paradigm and functional magnetic resonance imaging. Participants' reaction times in terms of responding to the facial stimuli were also measured. Attachment security priming can facilitate an individual's processing of positive emotional faces; for instance, the presentation of the partner's name was associated with stronger activities in a wide range of brain regions and faster reaction times for positive facial expressions in the subjects. The current finding of higher activity in the left-hemisphere regions for secure priming rather than neutral priming is consistent with the prediction that attachment security priming triggers the spread of the activation of a positive emotional state. However, the difference in brain activity during processing of both, positive and negative emotional facial stimuli between the two priming conditions appeared in the attachment anxiety group alone. This study indicates that the effect of attachment secure priming on the processing of emotional facial stimuli could be mediated by chronic attachment anxiety. In addition, it highlights the association between higher-order processes of the attachment system (secure attachment schema priming) and early-stage information processing system (attention), given the increased attention toward the effects of secure base schema on the processing of emotion- and attachment-related information among the insecure population. Thus, the following study has applications in providing directions for clinical treatment of mood disorders in attachment anxiety.
Cryptanalysis of the Quantum Group Signature Protocols
NASA Astrophysics Data System (ADS)
Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan
2013-11-01
Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.
1990-03-01
vestibulo-ocular reflex) pitch, ’- 11’, 1 3c\\ " ’ I...[ 16. PRC C nystagmus 1 ’>"( k 1.,’ roll V-) , __r_ ,_t_ _ _ 17. SECURITY CLASSIFICATION 1S SECURITY...of amplification of EOG was 3.0 s. Because of the position of subjEcts’ heads relative to the axis of rotation, vertical nystagmus comprised the VOR...response in Groups I and III. To achieve measurement of the VOR in Groups IV and V, subjects were instructed to gaze downward, 30 deg in Group IV, and
Framework for behavioral analytics in anomaly identification
NASA Astrophysics Data System (ADS)
Touma, Maroun; Bertino, Elisa; Rivera, Brian; Verma, Dinesh; Calo, Seraphin
2017-05-01
Behavioral Analytics (BA) relies on digital breadcrumbs to build user profiles and create clusters of entities that exhibit a large degree of similarity. The prevailing assumption is that an entity will assimilate the group behavior of the cluster it belongs to. Our understanding of BA and its application in different domains continues to evolve and is a direct result of the growing interest in Machine Learning research. When trying to detect security threats, we use BA techniques to identify anomalies, defined in this paper as deviation from the group behavior. Early research papers in this field reveal a high number of false positives where a security alert is triggered based on deviation from the cluster learned behavior but still within the norm of what the system defines as an acceptable behavior. Further, domain specific security policies tend to be narrow and inadequately represent what an entity can do. Hence, they: a) limit the amount of useful data during the learning phase; and, b) lead to violation of policy during the execution phase. In this paper, we propose a framework for future research on the role of policies and behavior security in a coalition setting with emphasis on anomaly detection and individual's deviation from group activities.
Afghanistan: Post-Taliban Governance, Security, and U.S. Policy
2009-12-02
relations with the Taliban leadership when it was in power, possibly viewing engagement as a more effective means of preventing spillover of radical...Building............................................................................. 23 Taliban, Al Qaeda, and Related Insurgent Groups...42 Table 5. Major Security- Related Indicators
(Congressional Interest) Network Information and Space Security Center
2011-09-30
Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb , Croatia officials to structure terms for a...partnership with UCCS. In the short-term, UCCS will develop and deliver several courses in homeland security and assist the University of Zagreb in... Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees in homeland security. Hosted a group of
Measuring Transnational Organized Crime Threats to US National Security
2016-05-26
typology is not designed to score TOC networks, so it is not an obvious choice, but it could be easily modified by the TMWG to rank-order TOC networks...States Strategy to Combat Transnational Organized Crime (SCTOC). The strategy identified Transnational Organized Crime ( TOC ) as a national security...identify the TOC groups that present the national security threat defined in the SCTOC? A literature review of existing organized crime assessments
Mat Kiah, M L; Al-Bakri, S H; Zaidan, A A; Zaidan, B B; Hussain, Muzammil
2014-10-01
One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient's and the doctor's end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.
Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction
NASA Astrophysics Data System (ADS)
Leverrier, Anthony
2017-05-01
Establishing the security of continuous-variable quantum key distribution against general attacks in a realistic finite-size regime is an outstanding open problem in the field of theoretical quantum cryptography if we restrict our attention to protocols that rely on the exchange of coherent states. Indeed, techniques based on the uncertainty principle are not known to work for such protocols, and the usual tools based on de Finetti reductions only provide security for unrealistically large block lengths. We address this problem here by considering a new type of Gaussian de Finetti reduction, that exploits the invariance of some continuous-variable protocols under the action of the unitary group U (n ) (instead of the symmetric group Sn as in usual de Finetti theorems), and by introducing generalized S U (2 ,2 ) coherent states. Crucially, combined with an energy test, this allows us to truncate the Hilbert space globally instead as at the single-mode level as in previous approaches that failed to provide security in realistic conditions. Our reduction shows that it is sufficient to prove the security of these protocols against Gaussian collective attacks in order to obtain security against general attacks, thereby confirming rigorously the widely held belief that Gaussian attacks are indeed optimal against such protocols.
Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction.
Leverrier, Anthony
2017-05-19
Establishing the security of continuous-variable quantum key distribution against general attacks in a realistic finite-size regime is an outstanding open problem in the field of theoretical quantum cryptography if we restrict our attention to protocols that rely on the exchange of coherent states. Indeed, techniques based on the uncertainty principle are not known to work for such protocols, and the usual tools based on de Finetti reductions only provide security for unrealistically large block lengths. We address this problem here by considering a new type of Gaussian de Finetti reduction, that exploits the invariance of some continuous-variable protocols under the action of the unitary group U(n) (instead of the symmetric group S_{n} as in usual de Finetti theorems), and by introducing generalized SU(2,2) coherent states. Crucially, combined with an energy test, this allows us to truncate the Hilbert space globally instead as at the single-mode level as in previous approaches that failed to provide security in realistic conditions. Our reduction shows that it is sufficient to prove the security of these protocols against Gaussian collective attacks in order to obtain security against general attacks, thereby confirming rigorously the widely held belief that Gaussian attacks are indeed optimal against such protocols.
Krüger, Jenny K.; Suchan, Boris
2016-01-01
Aviation security screeners analyze a large number of X-ray images per day and seem to be experts in mentally rotating diverse kinds of visual objects. A robust gender-effect that men outperform women in the Vandenberg & Kuse mental rotation task has been well documented over the last years. In addition it has been shown that training can positively influence the overall task-performance. Considering this, the aim of the present study was to investigate whether security screeners show better performance in the Mental Rotation Test (MRT) independently of gender. Forty-seven security screeners of both sexes from two German airports were examined with a computer based MRT. Their performance was compared to a large sample of control subjects. The well-known gender-effect favoring men on mental rotation was significant within the control group. However, the security screeners did not show any sex differences suggesting an effect of training and professional performance. Surprisingly this specialized group showed a lower level of overall MRT performance than the control participants. Possible aviation related influences such as secondary effects of work-shift or expertise which can cumulatively cause this result are discussed. PMID:27014142
15 CFR Supplement No. 2 to Part 710 - Definitions of Production
Code of Federal Regulations, 2010 CFR
2010-01-01
... reaction Produced by synthesis* Formation through chemical synthesis.Processing to extract and isolate... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS GENERAL INFORMATION AND OVERVIEW OF THE CHEMICAL WEAPONS CONVENTION REGULATIONS (CWCR) Pt. 710, Supp. 2...
76 FR 2688 - Formations of, Acquisitions by, and Mergers of Bank Holding Companies
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-14
...; Wilmington Trust Investment Management, LLC, Wilmington, Delaware; and thereby engage in (1) operating a... Square Management Corp., Wilmington, Delaware; Roxbury Capital Management, LLC, Santa Monica, California...) acting as an investment advisor; (7) providing tax planning services; (8) securities brokerage services...
Indicators and Indices of Conflict and Security: A Review and Classification of Open-Source Data
2008-09-01
Supporting Institution / PI Department of Comparative Politics, University of Bergen, Norway PI: Dr. Jan Oskar Engene Institution Type...incidents that involve the intentional and premeditated use of chemical , biological, radiological, or nuclear (CBRN) materials. Format Access is
7 CFR 3565.451 - Preclaim requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... take possession of the security collateral and dispose of the property. (b) Due diligence by lender... required, guaranteed lenders shall perform due diligence in conjunction with the appraisal and submit it to... Testing and Materials is considered an acceptable format for due diligence. (c) Environmental review. The...
Lee, Gyungjoo; McCreary, Linda; Breitmayer, Bonnie; Kim, Mi Ja; Yang, Soo
2013-10-01
This study evaluated the attachment-based cognitive behavioral approach (ACBA) to enhance mother-infant interaction and infant mental health. This quasi-experimental study used a pre-posttest control group design. Participants were 40 low-income, mother-infant (infant ages 12-36 months) dyads, 20 dyads per group. The ACBA group received 10 weekly 90-min sessions. Dependent variables were changes in mother-infant interaction and infant mental health. Additionally, we explored changes in mothers' attachment security. The groups differed significantly in changes in mother-infant interaction, infant mental health problems, and mothers' attachment security. ACBA may enhance mother-infant interaction and infants' mental health. © 2013, Wiley Periodicals, Inc.
Brown, Paul; Brown, Marta
2015-03-01
This is a report of a short-term, pastoral counselling group conducted with Jewish internees in a high security prison in Israel. It was held as an adjunct to daily secular individual and group counselling and rehabilitation run by the Department of Social Work. Pastoral counselling employed spiritual and psychosocial methodologies to reduce anger, improve prisoner frustration tolerance, and develop a sense of self-efficacy and communal identity. It combined semi-didactic scriptural input with Pierre Janet's personality model, Fritz Perls' gestalt therapy, and analysis of the group process. © The Author(s) 2015 Reprints and permissions:sagepub.co.uk/journalsPermissions.nav.
2011-05-01
Homeland Security (DHS) and the Department of State (DOS), and by changing the IC’s CPRC representative from the Director of Central Intelli- gence to the...Security Strategy of the United States of America (May 2010), p. 4. 2 Nuclear Posture Review Report (April 6, 2010), p. i 3 National Strategy for...ongoing efforts with GICNT, the Nuclear Forensics International Technical Working Group (ITWG), Forensics En - gagement Working Group (FEWG), NATO
Strong Password-Based Authentication in TLS Using the Three-PartyGroup Diffie-Hellman Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abdalla, Michel; Bresson, Emmanuel; Chevassut, Olivier
2006-08-26
The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.
Self-efficacy is associated with increased food security in novel food pantry program.
Martin, Katie S; Colantonio, Angela G; Picho, Katherine; Boyle, Katie E
2016-12-01
We examined the effect of a novel food pantry intervention (Freshplace) that includes client-choice and motivational interviewing on self-efficacy and food security in food pantry clients. The study was designed as a randomized control trial. Participants were recruited over one year from traditional food pantries in Hartford, CT. Participants were randomized to Freshplace or traditional food pantries (controls) and data collection occurred at baseline with quarterly follow-ups for 18 months. Food security was measured using the USDA 18-item Food Security Module. A newly developed scale was utilized to measure self-efficacy. Scale reliability was measured using a Cronbach alpha test; validity was measured via correlating with a related variable. Analyses included chi-square tests for bivariate analyses and hierarchical linear modeling for longitudinal analyses. A total of 227 adults were randomized to the Freshplace intervention ( n =112) or control group ( n =115). The overall group was 60% female, 73% Black, mean age=51. The new self-efficacy scale showed good reliability and validity. Self-efficacy was significantly inversely associated with very low food security ( p <.05). Being in the Freshplace intervention ( p =.01) and higher self-efficacy ( p =.04) were independently associated with decreased very low food security. The traditional food pantry model fails to recognize the influence of self-efficacy on a person's food security. A food pantry model with client-choice, motivational interviewing and targeted referral services can increase self-efficacy of clients. Prioritizing the self-efficacy of clients over the efficiency of pantry operations is required to increase food security among disadvantaged populations.
IVS Working Group 4: VLBI Data Structures
NASA Technical Reports Server (NTRS)
Gipson, John
2010-01-01
In 2007 the IVS Directing Board established IVS Working Group 4 on VLBI Data Structures. This note discusses the current VLBI data format, goals for a new format, the history and formation of the Working Group, and a timeline for the development of a new VLBI data format.
Resistance and Security Index of Networks: Structural Information Perspective of Network Security
NASA Astrophysics Data System (ADS)
Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng
2016-06-01
Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.
[Goals in the discussion of old age insurance - a sketch].
Schmähl, W
1980-01-01
In the Federal Republic of Germany often the discussion on social policy deals with instruments, yet seldom with goals to be realised. Scientific work on goals for old-age security policy is just starting. In this article the importance of distinctly defined goals is shown for rational economic and social policy, for an assessment of the existing situation, for a goal oriented selection and formation of measures and for success control. With reference to distributive goals in old-age security policy it is exemplified in which way scientific work can be helpful in defining goals in an operationalised form. For this it is important to deal with several distributive aspects, which are often mixed in discussions. As measures in one area of economic and social policy cannot be taken isolated, in order to avoid unwanted consequences, it is necessary for old-age security policies too, to take into consideration a general system of economic and social policy goals. As an example, it must be stated that e.g. aspects of business cycle and growth policy have to be considered while constructing a system of old-age security. Finally, some other criteria for old-age security policies, such as transparence, political feasibility and practicability are mentioned.
Resistance and Security Index of Networks: Structural Information Perspective of Network Security.
Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng
2016-06-03
Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.
Resistance and Security Index of Networks: Structural Information Perspective of Network Security
Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng
2016-01-01
Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks. PMID:27255783
Protecting ICS Systems Within the Energy Sector from Cyber Attacks
NASA Astrophysics Data System (ADS)
Barnes, Shaquille
Advance persistent threat (APT) groups are continuing to attack the energy sector through cyberspace, which poses a risk to our society, national security, and economy. Industrial control systems (ICSs) are not designed to handle cyber-attacks, which is why asset owners need to implement the correct proactive and reactive measures to mitigate the risk to their ICS environments. The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) responded to 290 incidents for fiscal year 2016, where 59 of those incidents came from the Energy Sector. APT groups know how vulnerable energy sector ICS systems are and the destruction they can cause when they go offline such as loss of production, loss of life, and economic impact. Defending against APT groups requires more than just passive controls such as firewalls and antivirus solutions. Asset owners should implement a combination of best practices and active defense in their environment to defend against APT groups. Cyber-attacks against critical infrastructure will become more complex and harder to detect and respond to with traditional security controls. The purpose of this paper was to provide asset owners with the correct security controls and methodologies to help defend against APT groups.
Sward, Katherine A; Newth, Christopher JL; Khemani, Robinder G; Cryer, Martin E; Thelen, Julie L; Enriquez, Rene; Shaoyu, Su; Pollack, Murray M; Harrison, Rick E; Meert, Kathleen L; Berg, Robert A; Wessel, David L; Shanley, Thomas P; Dalton, Heidi; Carcillo, Joseph; Jenkins, Tammara L; Dean, J Michael
2015-01-01
Objectives To examine the feasibility of deploying a virtual web service for sharing data within a research network, and to evaluate the impact on data consistency and quality. Material and Methods Virtual machines (VMs) encapsulated an open-source, semantically and syntactically interoperable secure web service infrastructure along with a shadow database. The VMs were deployed to 8 Collaborative Pediatric Critical Care Research Network Clinical Centers. Results Virtual web services could be deployed in hours. The interoperability of the web services reduced format misalignment from 56% to 1% and demonstrated that 99% of the data consistently transferred using the data dictionary and 1% needed human curation. Conclusions Use of virtualized open-source secure web service technology could enable direct electronic abstraction of data from hospital databases for research purposes. PMID:25796596
Tan, Chun Kiat; Ng, Jason Changwei; Xu, Xiaotian; Poh, Chueh Loo; Guan, Yong Liang; Sheah, Kenneth
2011-06-01
Teleradiology applications and universal availability of patient records using web-based technology are rapidly gaining importance. Consequently, digital medical image security has become an important issue when images and their pertinent patient information are transmitted across public networks, such as the Internet. Health mandates such as the Health Insurance Portability and Accountability Act require healthcare providers to adhere to security measures in order to protect sensitive patient information. This paper presents a fully reversible, dual-layer watermarking scheme with tamper detection capability for medical images. The scheme utilizes concepts of public-key cryptography and reversible data-hiding technique. The scheme was tested using medical images in DICOM format. The results show that the scheme is able to ensure image authenticity and integrity, and to locate tampered regions in the images.
McCue, M J; Thompson, J M; Dodd-McCue, D
Using a resource dependency framework and financial theory, this study assessed the market, mission, operational, and financial factors associated with the level of cash and security investments in hospitals. We ranked hospitals in the study sample based on their cash and security investments as a percentage of total assets: hospitals in the high cash/security investment category were in the top 25th percentile of all hospitals; those in the low cash/security investment group were in the bottom 25th percentile. Findings indicate that high cash/security investment hospitals are under either public or private nonprofit ownership and have greater market share. They also serve more complex cases, offer more technology services, generate greater profits, incur a more stable patient revenue base, and maintain less debt.
The cult of the amateur in agriculture threatens food security.
Trewavas, Anthony
2008-09-01
The incorporation of science and technology into agriculture has led to enormous growth in crop yields, providing food security in many countries. From the 1950s onwards there has been increasing interference in agricultural policy by a few scientists who are marginal to agriculture and from a variety of unqualified groups. These groups and individuals have used fear and anxiety and have greatly exaggerated minor problems to persuade an unqualified public of supposed dangers in food and to try and change agricultural policy. Fear and emotion do not lead to good policy, and the cult of the amateur that has developed could have serious repercussions on vital food security and future agriculture in developing countries; it must be soundly rejected.
LaMontagne, A D; Krnjacki, L; Kavanagh, A M; Bentley, R
2013-09-01
A number of widely prevalent job stressors have been identified as modifiable risk factors for common mental and physical illnesses such as depression and cardiovascular disease, yet there has been relatively little study of population trends in exposure to job stressors over time. The aims of this paper were to assess: (1) overall time trends in job control and security and (2) whether disparities by sex, age, skill level and employment arrangement were changing over time in the Australian working population. Job control and security were measured in eight annual waves (2000-2008) from the Australian nationally-representative Household Income and Labour Dynamics of Australia panel survey (n=13 188 unique individuals for control and n=13 182 for security). Observed and model-predicted time trends were generated. Models were generated using population-averaged longitudinal linear regression, with year fitted categorically. Changes in disparities over time by sex, age group, skill level and employment arrangement were tested as interactions between each of these stratifying variables and time. While significant disparities persisted for disadvantaged compared with advantaged groups, results suggested that inequalities in job control narrowed among young workers compared with older groups and for casual, fixed-term and self-employed compared with permanent workers. A slight narrowing of disparities over time in job security was noted for gender, age, employment arrangement and occupational skill level. Despite the favourable findings of small reductions in disparities in job control and security, significant cross-sectional disparities persist. Policy and practice intervention to improve psychosocial working conditions for disadvantaged groups could reduce these persisting disparities and associated illness burdens.
Ortiz, Andrés
2017-01-01
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a resilient supply chain. The Internet of Things (IoT), and in particular Radio Frequency Identification (RFID) technology, can be used to realize these goals. For product identification, tracking and real-time awareness, RFID tags are attached to goods. As tagged goods move along the supply chain from the suppliers to the manufacturers, and then on to the retailers until eventually they reach the customers, two major security challenges can be identified: (I) to protect the shipment of goods that are controlled by potentially untrusted carriers; and (II) to secure the transfer of ownership at each stage of the chain. For the former, grouping proofs in which the tags of the scanned goods generate a proof of “simulatenous” presence can be employed, while for the latter, ownership transfer protocols (OTP) are used. This paper describes enhanced security solutions for both challenges. We first extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers; then, we describe a modified version of a recently published OTP based on channels with positive secrecy capacity adapted to be implemented on common RFID systems in the supply chain. The proposed solutions take into account the limitations of low cost tags employed in the supply chain, which are only required to generate pseudorandom numbers and compute one-way hash functions. PMID:28677637
Heart disease management by women: does intervention format matter?
Clark, Noreen M; Janz, Nancy K; Dodge, Julia A; Lin, Xihong; Trabert, Britton L; Kaciroti, Niko; Mosca, Lori; Wheeler, John R; Keteyian, Steven
2014-10-01
A randomized controlled trial of two formats of a program (Women Take PRIDE) to enhance management of heart disease by patients was conducted. Older women (N = 575) were randomly assigned to a group or self-directed format or to a control group. Data regarding symptoms, functional health status, and weight were collected at baseline and at 4, 12, and 18 months. The formats produced different outcomes. At 18 months, the self-directed format was better than the control in reducing the number (p ≤ .02), frequency (p ≤ .03), and bothersomeness (p ≤ .02) of cardiac symptoms. The self-directed format was also better than the group format in reducing symptom frequency of all types (p ≤ .04). The group format improved ambulation at 12 months (p ≤ .04) and weight loss at 18 months (p ≤ .03), and group participants were more likely to complete the program (p ≤ .05). The availability of different learning formats could enhance management of cardiovascular disease by patients. © 2014 Society for Public Health Education.
Heart disease management by women: does intervention format matter?
Clark, Noreen M; Janz, Nancy K; Dodge, Julia A; Lin, Xihong; Trabert, Britton L; Kaciroti, Niko; Mosca, Lori; Wheeler, John R; Keteyian, Steven
2009-04-01
A randomized controlled trial of two formats of a program (Women Take PRIDE) to enhance management of heart disease by patients was conducted. Older women (N = 575) were randomly assigned to a group or self-directed format or to a control group. Data regarding symptoms, functional health status, and weight were collected at baseline and at 4, 12, and 18 months. The formats produced different outcomes. At 18 months, the self-directed format was better than the control in reducing the number (p < or = .02), frequency (p < or = .03), and bothersomeness (p < or = .02) of cardiac symptoms. The self-directed format was also better than the group format in reducing symptom frequency of all types (p < or = .04). The group format improved ambulation at 12 months (p < or = .04) and weight loss at 18 months (p < or = .03), and group participants were more likely to complete the program ( p < or = .05). The availability of different learning formats could enhance management of cardiovascular disease by patients.
Peer-to-Peer Science Data Environment
NASA Astrophysics Data System (ADS)
Byrnes, J. B.; Holland, M. P.
2004-12-01
The goal of P2PSDE is to provide a convenient and extensible Peer-to-Peer (P2P) network architecture that allows: distributed science-data services-seamlessly incorporating collaborative value-added services with search-oriented access to remote science data. P2PSDE features the real-time discovery of data-serving peers (plus peer-groups and peer-group services), in addition to the searching for and transferring of science data. These features are implemented using "Project JXTA", the first and only standardized set of open, generalized P2P protocols that allow arbitrary network devices to communicate and collaborate as peers. The JXTA protocols standardize the manner in which peers discover each other, self-organize into peer groups, advertise and discover network services, and securely communicate with and monitor each other-even across network firewalls. The key benefits include: Potential for dramatic improvements in science-data dissemination; Real-time-discoverable, potentially redundant (reliable), science-data services; Openness/Extensibility; Decentralized use of small, inexpensive, readily-available desktop machines; and Inherently secure-with ability to create variable levels of security by group.
Repair process and a repaired component
DOE Office of Scientific and Technical Information (OSTI.GOV)
Roberts, III, Herbert Chidsey; Simpson, Stanley F.
Matrix composite component repair processes are disclosed. The matrix composite repair process includes applying a repair material to a matrix composite component, securing the repair material to the matrix composite component with an external securing mechanism and curing the repair material to bond the repair material to the matrix composite component during the securing by the external securing mechanism. The matrix composite component is selected from the group consisting of a ceramic matrix composite, a polymer matrix composite, and a metal matrix composite. In another embodiment, the repair process includes applying a partially-cured repair material to a matrix composite component,more » and curing the repair material to bond the repair material to the matrix composite component, an external securing mechanism securing the repair material throughout a curing period, In another embodiment, the external securing mechanism is consumed or decomposed during the repair process.« less
Arno, Peter S; House, James S; Viola, Deborah; Schechter, Clyde
2011-05-01
Social Security is the most important and effective income support program ever introduced in the United States, alleviating the burden of poverty for millions of elderly Americans. We explored the possible role of Social Security in reducing mortality among the elderly. In support of this hypothesis, we found that declines in mortality among the elderly exceeded those among younger age groups following the initial implementation of Social Security in 1940, and also in the periods following marked improvements in Social Security benefits via legislation and indexing of benefits that occurred between the mid-1960s and the early 1970s. A better understanding of the link between Social Security and health status among the elderly would add a significant and missing dimension to the public discourse over the future of Social Security, and the potential role of income support programs in reducing health-related socioeconomic disparities and improving population health.
Mahmoodi, Mohammad Reza; Najafipour, Hamid; Mohsenpour, Mohammad Ali; Amiri, Mojgan
2017-01-01
We sought the prevalence of food insecurity and whether cardiovascular risk markers and metabolic syndrome components are significantly different in categories of food insecurity in patients with type 2 diabetes. In this cross-sectional study, 520 patients with type 2 diabetes from the Kerman coronary artery disease risk study aged between 23 and 87 years (60.8 ± 11.4) who selected by one-stage cluster sampling were assigned into four groups of "food secure" and "mild," "moderate," and "severe" food insecure. Household food insecurity was assessed by a 9-item household food insecurity access scale questionnaire. The prevalence of food security and mild, moderate, and severe food insecurity in patients with diabetes was 24.4%, 33.1%, 28.9%, and 13.6%, respectively. There was a significant difference among the food-secure/insecure sex groups ( P = 0.001). The prevalence of food insecurity and risk factors such as total cholesterol, high low-density lipoprotein cholesterol, and visceral obesity in mild food-insecure females was significantly higher than males ( P < 0.001, 0.001, and 0.001, respectively). The fasting blood sugar significantly increased ( P = 0.020) in diabetic females with food security than the other female groups. Diastolic blood pressure significantly increased ( P = 0.028) in diabetic females with severe food insecurity than the other female groups. The glycosylated hemoglobin significantly increased ( P = 0.013) in diabetic males with severe food insecurity than the other male groups. Food insecurity odds ratio in females was 1.74 (95% confidence interval [CI]: 1.10-2.70), 2.39 (95% CI: 1.48-3.88), and 2.73 (95% CI: 1.49-5.01) times higher than in males for mild, moderate, and severe food insecurity, respectively. Food insecurity may deteriorate some cardiometabolic biomarkers in type 2 diabetes. Improving food security in patients with diabetes may help reduce cardiovascular disease.
Alipour, Beytollah; Abbasalizad Farhangi, Mahdieh; Asghari, Somayye; Amirkhizi, Farshad; Dahri, Monireh; Abedimanesh, Nasim; Farsad-Naimi, Alireza; Hojegani, Shiva
2016-01-01
Despite strong evidence of the prevalence of food insecurity in adults and households with children in different areas of Iran, the prevalence of child-specific food insecurity in Iran and especially in Tabriz has not been evaluated. Therefore, the objective of the current study is to evaluate the prevalence of food insecurity in schoolchildren and to identify its social, demographic, and nutritional determinants in Tabriz, Iran. This cross-sectional study was conducted between April and September 2014 among 330 schoolchildren aged 7-11 years comprising 170 boys and 160 girls from ten public schools in Tabriz, Iran. Demographic and socioeconomic factors had been obtained from participants. Food security status was assessed by an eight-item U.S. Department of Agriculture (USDA) Food Security Module previously validated for use in Iran. Dietary information was obtained by a food frequency questionnaire (FFQ). In our findings, the prevalence of food insecurity among children was 30% with 29.1% being low food secure and 0.9% being very low food secure. Mean weight for age Z-score (WAZ) in the food insecure group was significantly lower than in the food secure group. The prevalence of food insecurity was more prevalent in boys (p = .006). Food insecure children had a significantly lower intake of energy, carbohydrate, protein, and meat (p < .001) and higher prevalence of wasting compared with their counterparts in the food secure group (p = .004). These results suggest a proportionally high prevalence of food insecurity in schoolchildren in Tabriz and its significant association with poor nutritional status and dietary habits. Our findings also ensures the necessity of nutritional support programs and nutritional education in Iranian low-income families to improve their overall health.
Ekeland, Anne G; Skipenes, Eva; Nyheim, Beate; Christiansen, Ellen K
2011-01-01
The University Hospital of North Norway selected a web-based ulcer record used in Denmark, available from mobile phones. Data was stored in a common database and easily accessible. According to Norwegian legislation, only employees of the organization that owns an IT system can access the system, and use of mobile units requires strong security solutions. The system had to be changed. The paper addresses interactions in order to make the system legal, and assesses regulations that followed. By addressing conflicting scripts and the contingent nature of knowledge, we conducted a formative evaluation aiming at improving the object being studied. Participatory observation in a one year process, minutes from meetings and information from participants, constitute the data material. In the technological domain, one database was replaced by four. In the health care delivery domain, easy access was replaced by a more complicated log on procedure, and in the domain of law and security, a clarification of risk levels was obtained, thereby allowing for access by mobile phones with today's authentication mechanisms. Flexibility concerning predefined scripts was important in all domains. Changes were made that improved the platform for further development of legitimate communication of patient data via mobile units. The study also shows the value of formative evaluations in innovations.
ERIC Educational Resources Information Center
VanLengen, Craig Alan
2010-01-01
The Securities and Exchange Commission (SEC) has recently announced a proposal that will require all public companies to report their financial data in Extensible Business Reporting Language (XBRL). XBRL is an extension of Extensible Markup Language (XML). Moving to a standard reporting format makes it easier for organizations to report the…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-10
... impact on efficiency, competition, and capital formation. See 15 U.S.C. 78c(f). \\8\\ 15 U.S.C. 78f(b)(5... that according to the ISE, each set of CMM quotes will have independent quoting obligations, and thus...
99 Facts about the FBI: Questions and Answers.
ERIC Educational Resources Information Center
Federal Bureau of Investigation, Quantico, VA.
This booklet on the Federal Bureau of Investigation (FBI) attempts to provide an overview of the FBI's functions. Presented in a question and answer format, the 99 questions and answers discuss the federal government agency's history, administrative matters, jurisdiction, criminal investigations, security matters, foreign counter-intelligence, and…
ERIC Educational Resources Information Center
Becker, Kirk A.; Bergstrom, Betty A.
2013-01-01
The need for increased exam security, improved test formats, more flexible scheduling, better measurement, and more efficient administrative processes has caused testing agencies to consider converting the administration of their exams from paper-and-pencil to computer-based testing (CBT). Many decisions must be made in order to provide an optimal…
ICCE Policy Statement on Network and Multiple Machine Software.
ERIC Educational Resources Information Center
Computing Teacher, 1983
1983-01-01
Issued to provide guidance for the resolution of problems inherent in providing and securing good educational software, this statement outlines responsibilities of educators, hardware vendors, and software developers/vendors. Sample policy statements for school districts and community colleges, suggested format for software licenses, and technical…
Global Situational Awareness with Free Tools
2015-01-15
Client Technical Solutions • Software Engineering Measurement and Analysis • Architecture Practices • Product Line Practice • Team Software Process...multiple data sources • Snort (Snorby on Security Onion ) • Nagios • SharePoint RSS • Flow • Others • Leverage standard data formats • Keyhole Markup Language
Code of Federal Regulations, 2010 CFR
2010-10-01
... it is later determined that the cost is greater or less than that originally claimed. Audit exception... virtue of an audit. Claim means a request for Federal financial participation in the manner and format... definitions in the appropriate program's regulations. The Act means the Social Security Act, as amended. We...
Code of Federal Regulations, 2011 CFR
2011-10-01
... it is later determined that the cost is greater or less than that originally claimed. Audit exception... virtue of an audit. Claim means a request for Federal financial participation in the manner and format... definitions in the appropriate program's regulations. The Act means the Social Security Act, as amended. We...
75 FR 23327 - Asset-Backed Securities
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-03
... information would be provided according to proposed standards and in a tagged data format using extensible... Market Developments, March 2008 (the ``PWG March 2008 Report'') at 9 (discussing subprime mortgages and... information about underlying asset pool performance.\\41\\ Our focus on both the public and private markets for...
Dissanayaka, Waruna Lakmal; Hargreaves, Kenneth M.; Jin, Lijian; Samaranayake, Lakshman P.
2015-01-01
Securing an adequate blood supply for the survival of cell transplants is critical for a successful outcome in tissue engineering. Interactions between endothelial and progenitor/stem cells are important for vascularization of regenerating tissue. Recently, self-assembling peptide nanofibers were described as a promising environment for pulp regeneration due to their synthetic nature and controlled physicochemical properties. In this study, the peptide hydrogel PuraMatrix™ was used as a scaffold system to investigate the role of dental pulp stem cells (DPSCs) in triggering angiogenesis and the potential for regenerating vascularized pulp in vivo. Human umbilical vein endothelial cells (HUVECs), DPSCs, or cocultures of both cell types were encapsulated in three-dimensional PuraMatrix. The peptide nanofiber microenvironment supported cell survival, cell migration, and capillary network formation in the absence of exogenous growth factors. DPSCs increased early vascular network formation by facilitating the migration of HUVECs and by increasing vascular endothelial growth factor (VEGF) expression. Both the DPSC-monoculture and coculture groups exhibited vascularized pulp-like tissue with patches of osteodentin after transplantation in mice. The cocultured groups exhibited more extracellular matrix, vascularization, and mineralization than the DPSC-monocultures in vivo. The DPSCs play a critical role in initial angiogenesis, whereas coordinated efforts by the HUVECs and DPSCs are required to achieve a balance between extracellular matrix deposition and mineralization. The findings of this study also highlighted the importance of a microenvironment that supports cell–cell interactions and cell migration, which contribute to successful dental pulp regeneration. PMID:25203774
2011-08-26
peoples, such as the Inuit , have been accorded greater control of their own lives, while multilateral organizations have been crafted to provide a forum...stakeholders in the Inuit community, and not all of the agreements made between aboriginal groups and national governments have been honored. As a...North America and the Arctic Council”; and, (3) Udloriak Hanson from the Inuit Tapiriit Kanatami, “Sovereignty, Resource Development and Security
Structural Causes and Cyber Effects: A Response to Our Critics
2015-01-01
the incident, saying “North Korea’s attack on [Sony] reaf- firms that cyber threats pose one of the gravest national security dangers to the United...around the world to strengthen cyber - security , promote norms of acceptable state behavior, uphold freedom of expression, and ensure that the Internet... cyber working group that made progress toward “interna- tional cyberspace rules, and measures to boost dialogue and cooperation on cyber security .”15
A scoping review of traditional food security in Alaska.
Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa
2018-12-01
Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: "traditional foods", "food security", "access", "availability", "utilisation", "Alaska", "Alaska Native" and "indigenous". Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska.
The Impact of Social Security on Return Migration among Latin American Elderly in the U.S.
Vega, Alma
2014-01-01
International migration has long been considered the preserve of working-age adults. However, the rapid diversification of the elderly population calls for increased attention to the migration patterns of this group and its possible motivations. This study examines whether Latin American immigrants who are primary Social Security beneficiaries are more likely to return to their home countries during later life if they receive lower Social Security benefits. Using a regression discontinuity approach on restricted data from the U.S. Social Security Administration (N=1,515), this study presents the results of a natural experiment whereby the Social Security Administration unexpectedly lowered the Social Security benefits of the 1917-1921 birth cohorts due to a miscalculation in the benefit-calculation formula. Results suggest that approximately 10% of primary Social Security beneficiaries from Latin America born close to these dates return migrated, the probability of which was not affected by Social Security benefit levels. PMID:26279596
Predictors of attachment security in preschool children from intact and divorced families.
Nair, Hira; Murray, Ann D
2005-09-01
The authors selected 58 mother-child dyads from divorced and intact families to participate in a study on the impact of divorce on preschoolers' attachment security. The authors explored pathways that lead to security of attachment. They found that mothers from divorced families were younger, had lower income levels, and had lower levels of education compared with their intact counterparts. Divorced mothers also reported significantly higher levels of stress, depression, need for social support, and conflict with their spouses. Mothers from intact families were more likely to use positive (authoritative) parenting styles compared with divorced mothers. Children in the divorced group had lower security scores on the Attachment Q-Set instrument (E. Waters, 1995). Regression analyses indicated that parenting style made a direct (independent) contribution to attachment security. In addition, temperament was related to attachment security, but temperament did not diminish the association of parenting style with attachment security. Furthermore, regression analyses indicated that the relationship of divorce to attachment security was mediated by parenting style.
Privacy-enhanced electronic mail
NASA Astrophysics Data System (ADS)
Bishop, Matt
1990-06-01
The security of electronic mail sent through the Internet may be described in exactly three words: there is none. The Privacy and Security Research Group has recommended implementing mechanisms designed to provide security enhancements. The first set of mechanisms provides a protocol to provide privacy, integrity, and authentication for electronic mail; the second provides a certificate-based key management infrastructure to support key distribution throughout the internet, to support the first set of mechanisms. These mechanisms are described, as well as the reasons behind their selection and how these mechanisms can be used to provide some measure of security in the exchange of electronic mail.
Wichmann, Theresia; Buchheim, Anna; Menning, Hans; Schenk, Ingmar; George, Carol; Pokorny, Dan
2016-01-01
In the last few decades, there has been an increase of experimental research on automatic unconscious processes concerning the evaluation of the self and others. Previous research investigated implicit aspects of romantic attachment using self-report measures as explicit instruments for assessing attachment style. There is a lack of experimental procedures feasible for neurobiological settings. We developed a reaction time (RT) experiment using a narrative attachment measure with an implicit nature and were interested to capture automatic processes, when the individuals’ attachment system is activated. We aimed to combine attachment methodology with knowledge from implicit measures by using a decision RT paradigm. This should serve as a means to capture implicit aspects of attachment. This experiment evaluated participants’ response to prototypic attachment sentences in association with their own attachment classification, measured with the Adult Attachment Projective Picture System (AAP). First the AAP was administered as the standardized interview procedure to 30 healthy participants, which were classified into a secure or insecure group. In the following experimental session, both experimenter and participants were blind with respect to classifications. One hundred twenty eight prototypically secure or insecure sentences related to the eight pictures of the AAP were presented to the participants. Their response and RTs were recorded. Based on the response (accept, reject) a continuous security scale was defined. Both the AAP classification and security scale were related to the RTs. Differentiated study hypotheses were confirmed for insecure sentences, which were accepted faster by participants from the insecure attachment group (or with lower security scale), and rejected faster by participants from secure attachment group (or with higher security scale). The elaborating unconscious processes were more activated by insecure sentences with potential attachment conflicts. The introduced paradigm is able to contribute to an experimental approach in attachment research. The RT analysis with the narrative procedure might be of interest for a broader variety of questions in experimental and neurophysiological settings to capture unconscious processes in association with internal working models of attachment. An electrophysiological model based on preliminary research is proposed for assessing the preconscious neuronal network related to secure or insecure attachment representations. PMID:27853426
32 CFR 701.101 - Privacy program terms and definitions.
Code of Federal Regulations, 2012 CFR
2012-07-01
... or online collection that directly identifies an individual (e.g., name, address, social security... her (e.g., Social Security Number (SSN), age, military rank, civilian grade, marital status, race... biometric records. (q) Record. Any item, collection, or grouping of information, whatever the storage media...
32 CFR 701.101 - Privacy program terms and definitions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... or online collection that directly identifies an individual (e.g., name, address, social security... her (e.g., Social Security Number (SSN), age, military rank, civilian grade, marital status, race... biometric records. (q) Record. Any item, collection, or grouping of information, whatever the storage media...
32 CFR 701.101 - Privacy program terms and definitions.
Code of Federal Regulations, 2013 CFR
2013-07-01
... or online collection that directly identifies an individual (e.g., name, address, social security... her (e.g., Social Security Number (SSN), age, military rank, civilian grade, marital status, race... biometric records. (q) Record. Any item, collection, or grouping of information, whatever the storage media...
20 CFR 404.1212 - Police officers and firefighters.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Section 404.1212 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND... May Be Covered § 404.1212 Police officers and firefighters. (a) General. For Social Security coverage... officers' and firefighters' positions not under a retirement system as part of an absolute coverage group...
Digitizing and Securing Archived Laboratory Notebooks
ERIC Educational Resources Information Center
Caporizzo, Marilyn
2008-01-01
The Information Group at Millipore has been successfully using a digital rights management tool to secure the email distribution of archived laboratory notebooks. Millipore is a life science leader providing cutting-edge technologies, tools, and services for bioscience research and biopharmaceutical manufacturing. Consisting of four full-time…
Civil and forensic patients in secure psychiatric settings: a comparison.
Galappathie, Nuwan; Khan, Sobia Tamim; Hussain, Amina
2017-06-01
Aims and method To evaluate differences between male patients in secure psychiatric settings in the UK based on whether they are detained under civil or forensic sections of the Mental Health Act 1983. A cohort of patients discharged from a secure psychiatric hospital were evaluated for length of stay and frequency of risk-related incidents. Results Overall, 84 patients were included in the study: 52 in the forensic group and 32 in the civil group. Civil patients had more frequent incidents of aggression, sex offending, fire-setting and vulnerability, whereas forensic patients had more frequent episodes of self-harm. Clinical implications Secure hospitals should ensure treatment programmes are tailored to each patient's needs. Civil patients require greater emphasis on treatment of their mental illness, whereas forensic patients have additional offence-related treatment needs. Regular liaison between forensic and general adult services is essential to help ensure patients can return to appropriate settings at the earliest opportunity in their recovery.
Ullman, Amanda J; Kleidon, Tricia; Gibson, Victoria; McBride, Craig A; Mihala, Gabor; Cooke, Marie; Rickard, Claire M
2017-08-30
Central venous access device (CVAD) associated complications are a preventable source of patient harm, frequently resulting in morbidity and delays to vital treatment. Dressing and securement products are used to prevent infectious and mechanical complications, however current complication rates suggest customary practices are inadequate. The aim of this study was to evaluate the feasibility of launching a full-scale randomized controlled efficacy trial of innovative dressing and securement products for pediatric tunneled CVAD to prevent complication and failure. An external, pilot, four-group randomized controlled trial of standard care (bordered polyurethane dressing and suture), in comparison to integrated securement-dressing, suture-less securement device, and tissue adhesive was undertaken across two large, tertiary referral pediatric hospitals in Australia. Forty-eight pediatric participants with newly inserted tunneled CVADs were consecutively recruited. The primary outcome of study feasibility was established by elements of eligibility, recruitment, attrition, protocol adherence, missing data, parent and healthcare staff satisfaction and acceptability, and effect size estimates for CVAD failure (cessation of function prior to completion of treatment) and complication (associated bloodstream infection, thrombosis, breakage, dislodgement or occlusion). Dressing integrity, product costs and site complications were also examined. Protocol feasibility was established. CVAD failure was: 17% (2/12) integrated securement-dressing; 8% (1/13) suture-less securement device; 0% tissue adhesive (0/12); and, 0% standard care (0/11). CVAD complications were: 15% (2/13) suture-less securement device (CVAD associated bloodstream infection, and occlusion and partial dislodgement); 8% (1/12) integrated securement-dressing (partial dislodgement); 0% tissue adhesive (0/12); and, 0% standard care (0/11). One CVAD-associated bloodstream infection occurred, within the suture-less securement device group. Overall satisfaction was highest in the integrated securement-dressing (mean 8.5/10; standard deviation 1.2). Improved dressing integrity was evident in the intervention arms, with the integrated securement-dressing associated with prolonged time to first dressing change (mean days 3.5). Improving the security and dressing integrity of tunneled CVADs is likely to improve outcomes for pediatric patients. Further research is necessary to identify novel, effective CVAD securement to reduce complications, and provide reliable vascular access for children. ACTRN12614000280606 ; prospectively registered on 17/03/2014.
Method and apparatus for production of subsea hydrocarbon formations
Blandford, J.W.
1995-01-17
A system for controlling, separating, processing and exporting well fluids produced from subsea hydrocarbon formations is disclosed. The subsea well tender system includes a surface buoy supporting one or more decks above the water surface for accommodating equipment to process oil, gas and water recovered from the subsea hydrocarbon formation. The surface buoy includes a surface-piercing central flotation column connected to one or more external flotation tanks located below the water surface. The surface buoy is secured to the sea bed by one or more tendons which are anchored to a foundation with piles imbedded in the sea bed. The system accommodates multiple versions on the surface buoy configuration. 20 figures.
Privacy Preserved and Secured Reliable Routing Protocol for Wireless Mesh Networks.
Meganathan, Navamani Thandava; Palanichamy, Yogesh
2015-01-01
Privacy preservation and security provision against internal attacks in wireless mesh networks (WMNs) are more demanding than in wired networks due to the open nature and mobility of certain nodes in the network. Several schemes have been proposed to preserve privacy and provide security in WMNs. To provide complete privacy protection in WMNs, the properties of unobservability, unlinkability, and anonymity are to be ensured during route discovery. These properties can be achieved by implementing group signature and ID-based encryption schemes during route discovery. Due to the characteristics of WMNs, it is more vulnerable to many network layer attacks. Hence, a strong protection is needed to avoid these attacks and this can be achieved by introducing a new Cross-Layer and Subject Logic based Dynamic Reputation (CLSL-DR) mechanism during route discovery. In this paper, we propose a new Privacy preserved and Secured Reliable Routing (PSRR) protocol for WMNs. This protocol incorporates group signature, ID-based encryption schemes, and CLSL-DR mechanism to ensure strong privacy, security, and reliability in WMNs. Simulation results prove this by showing better performance in terms of most of the chosen parameters than the existing protocols.
NASA Astrophysics Data System (ADS)
Saniz, R.; Xu, Y.; Matsubara, M.; Amini, M. N.; Dixit, H.; Lamoen, D.; Partoens, B.
2013-01-01
The calculation of defect levels in semiconductors within a density functional theory approach suffers greatly from the band gap problem. We propose a band gap correction scheme that is based on the separation of energy differences in electron addition and relaxation energies. We show that it can predict defect levels with a reasonable accuracy, particularly in the case of defects with conduction band character, and yet is simple and computationally economical. We apply this method to ZnO doped with group III elements (Al, Ga, In). As expected from experiment, the results indicate that Zn substitutional doping is preferred over interstitial doping in Al, Ga, and In-doped ZnO, under both zinc-rich and oxygen-rich conditions. Further, all three dopants act as shallow donors, with the +1 charge state having the most advantageous formation energy. Also, doping effects on the electronic structure of ZnO are sufficiently mild so as to affect little the fundamental band gap and lowest conduction bands dispersion, which secures their n-type transparent conducting behavior. A comparison with the extrapolation method based on LDA+U calculations and with the Heyd-Scuseria-Ernzerhof hybrid functional (HSE) shows the reliability of the proposed scheme in predicting the thermodynamic transition levels in shallow donor systems.
Security Personnel Practices and Policies in U.S. Hospitals: Findings From a National Survey.
Schoenfisch, Ashley L; Pompeii, Lisa A
2016-06-27
Concerns of violence in hospitals warrant examination of current hospital security practices. Cross-sectional survey data were collected from members of a health care security and safety association to examine the type of personnel serving as security in hospitals, their policies and practices related to training and weapon/restraint tool carrying/use, and the broader context in which security personnel work to maintain staff and patient safety, with an emphasis on workplace violence prevention and mitigation. Data pertaining to 340 hospitals suggest security personnel were typically non-sworn officers directly employed (72%) by hospitals. Available tools included handcuffs (96%), batons (56%), oleoresin capsicum products (e.g., pepper spray; 52%), hand guns (52%), conducted electrical weapons (e.g., TASERs®; 47%), and K9 units (12%). Current workplace violence prevention policy components, as well as recommendations to improve hospital security practices, aligned with Occupational Safety and Health Administration guidelines. Comprehensive efforts to address the safety and effectiveness of hospital security personnel should consider security personnel's relationships with other hospital work groups and hospitals' focus on patients' safety and satisfaction. © 2016 The Author(s).
20 CFR 404.1207 - Divided retirement system coverage groups.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Divided retirement system coverage groups. 404.1207 Section 404.1207 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... retirement system coverage group. A divided retirement system coverage group is a grouping under a retirement...
Food insecurity among Dutch food bank recipients: a cross-sectional study.
Neter, Judith E; Dijkstra, S Coosje; Visser, Marjolein; Brouwer, Ingeborg A
2014-05-16
To determine the prevalence of (very) low food security among Dutch food bank recipients, and to identify potential demographic, lifestyle and nutrition-related factors associated with (very) low food security. 11 of 135 Dutch food banks were selected throughout the Netherlands. 251 Dutch food bank recipients participated in the study (93 men and 158 women). Inclusion criteria for participation were: (1) at least 18 years of age, (2) sufficiently fluent in Dutch to participate in oral and written interviews, (3) recipient of a Dutch food bank for at least 1 month and (4) collect own food parcel at the food bank. A single member per household was included. Level of food security. The prevalence of food insecurity was 72.9% (N=183), of which 40.4% (N=74) reported very low food security. Of the very low food secure participants, 56.8% (N=42) reported they were ever hungry but did not eat because they could not afford enough food in the previous 3 months. Adjusted multinomial logistic regression analyses showed that households without children were less likely to experience low food security (OR 0.39 (95% CI 0.18 to 0.88)) and men (OR 0.24 (95% CI 0.11 to 0.51)) were less likely to experience very low food security, while low-educated recipients (OR 5.05 (95% CI 1.37 to 18.61)) were more likely to experience very low food security. Furthermore, recipients with high satisfaction with overall food intake (OR 0.46 (95% CI 0.27 to 0.78)), high perceived healthiness of overall food intake (OR 0.34 (95% CI 0.19 to 0.62)) or high self-efficacy of eating healthy (OR 0.62 (95% CI 0.40 to 0.96)) were less likely to experience very low food security. Our study showed high prevalence rates of food insecurity among Dutch food bank recipients, and identified subgroups at increased risk of food insecurity. More research is urgently needed on the underlying determinants of food insecurity and the effectiveness of food assistance by food banks. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
NASA Astrophysics Data System (ADS)
Haneda, Kiyofumi; Kajima, Toshio; Koyama, Tadashi; Muranaka, Hiroyuki; Dojo, Hirofumi; Aratani, Yasuhiko
2002-05-01
The target of our study is to analyze the level of necessary security requirements, to search for suitable security measures and to optimize security distribution to every portion of the medical practice. Quantitative expression must be introduced to our study, if possible, to enable simplified follow-up security procedures and easy evaluation of security outcomes or results. Using fault tree analysis (FTA), system analysis showed that system elements subdivided into groups by details result in a much more accurate analysis. Such subdivided composition factors greatly depend on behavior of staff, interactive terminal devices, kinds of services provided, and network routes. Security measures were then implemented based on the analysis results. In conclusion, we identified the methods needed to determine the required level of security and proposed security measures for each medical information system, and the basic events and combinations of events that comprise the threat composition factors. Methods for identifying suitable security measures were found and implemented. Risk factors for each basic event, a number of elements for each composition factor, and potential security measures were found. Methods to optimize the security measures for each medical information system were proposed, developing the most efficient distribution of risk factors for basic events.
de Sa, Joia; Bouttasing, Namthipkesone; Sampson, Louise; Perks, Carol; Osrin, David; Prost, Audrey
2013-01-01
Chronic malnutrition in children remains highly prevalent in Laos, particularly among ethnic minority groups. There is limited knowledge of specific nutrition practices among these groups. We explored nutritional status, cultural beliefs and practices of Laos' Khmu ethnic group to inform interventions for undernutrition as part of a Primary Health Care (PHC) project. Mixed methods were used. For background, we disaggregated anthropometric and behavioural indicators from Laos' Multiple Indicator Cluster Survey. We then conducted eight focus group discussions and 33 semi-structured interviews with Khmu villagers and health care workers, exploring beliefs and practices related to nutrition. The setting was two rural districts in Luang Prabang province, in one of which the PHC project had been established for 3 years. There was a higher prevalence of stunting in the Khmu than in other groups. Disaggregation showed nutrition behaviours were associated with ethnicity, including exclusive breastfeeding. Villagers described strong adherence to post-partum food restrictions for women, while little change was described in intake during pregnancy. Most children were breastfed, although early introduction of pre-lacteal foods was noted in the non-PHC district. There was widespread variation in introduction and diversity of complementary foods. Guidance came predominantly from the community, with some input from health care workers. Interventions to address undernutrition in Khmu communities should deliver clear, consistent messages on optimum nutrition behaviours. Emphasis should be placed on dietary diversity for pregnant and post-partum mothers, encouraging exclusive breastfeeding and timely, appropriate complementary feeding. The impact of wider governmental policies on food security needs to be further assessed. PMID:22515273
Torres, Bárbara; Alonso-Arbiol, Itziar; Cantero, María José; Abubakar, Amina
2011-11-01
The quality of infant-mother attachment has been linked to competence in different domains of child development. Research indicates that early intervention can enhance the quality of infant-mother attachment, though its efficacy in a group format has yet to be evaluated. The current study is aimed at examining the usefulness of a group intervention in enhancing infant-mother attachment. An intervention aimed at addressing aspects such as maternal responsivity, sensitivity and childrearing behaviour was developed by the researchers and experienced psychologists. The intervention spanned a period of 14 months starting from the third quarter of pregnancy. The intervention was evaluated among 24 mothers from the Basque region of Spain. The sample consisted of children of both genders in a similar proportion: 45.8% were boys and 54.2% were girls. The children in this sample were full-term born and did not present symptoms of any serious pre- or postnatal complications. The intervention had a statistically non-significant medium effect. Infants whose mothers had received the intervention showed higher rates of secure attachment compared to children from the control group, as assessed by the Strange Situation observation procedure. A potentially significant confounding variable, maternal attachment, was balanced across the intervention and comparison groups. We can tentatively point out that a group intervention may enhance the quality of infant-mother attachment. Nevertheless, because the study design was not randomized, the results of this study remain preliminary and need replication in a full randomized controlled trial designed study.
20 CFR 411.315 - What are the minimum qualifications necessary to be an EN?
Code of Federal Regulations, 2014 CFR
2014-04-01
... to be an EN? 411.315 Section 411.315 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO... capability of making documents and literature available in alternate media including Braille, recorded formats, enlarged print, and electronic media; and insuring that data systems available to clients are...
20 CFR 411.315 - What are the minimum qualifications necessary to be an EN?
Code of Federal Regulations, 2011 CFR
2011-04-01
... to be an EN? 411.315 Section 411.315 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO... capability of making documents and literature available in alternate media including Braille, recorded formats, enlarged print, and electronic media; and insuring that data systems available to clients are...
20 CFR 411.315 - What are the minimum qualifications necessary to be an EN?
Code of Federal Regulations, 2013 CFR
2013-04-01
... to be an EN? 411.315 Section 411.315 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO... capability of making documents and literature available in alternate media including Braille, recorded formats, enlarged print, and electronic media; and insuring that data systems available to clients are...
20 CFR 411.315 - What are the minimum qualifications necessary to be an EN?
Code of Federal Regulations, 2012 CFR
2012-04-01
... to be an EN? 411.315 Section 411.315 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO... capability of making documents and literature available in alternate media including Braille, recorded formats, enlarged print, and electronic media; and insuring that data systems available to clients are...
ERIC Educational Resources Information Center
Herrera, Sandra; Holland, Lana; Wesson, Suzanne
School districts in the Education Service Center, Region 2, (southern Texas) were surveyed to examine procedures the districts have put in place to identify threats of violence to school safety and security. The target population was 47 school districts. Data collection was done using mailed questionnaires with a simple yes/no answer format.…
Course Notes and Suggestions for Consumer Education.
ERIC Educational Resources Information Center
Sweetwater Union High School District, Chula Vista, CA.
The document is a guide to a consumer education course; the course format is a series of several activity-based miniunits for each of 15 instructional areas: components of life styles, decision making, settling conflicts, budgeting, handling and controlling family income, credit, interest rates, savings institutions, family financial security,…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-16
..., instrumental, and comparative examinations, as necessary and appropriate. Depending on the document type, these... documents and reference materials in both hard copy and electronic format for use in comparative forensic... authenticate questionable documents through comparative forensic examinations. These travel and identity...
Stability of Attachment Representations during Adolescence: The Influence of Ego-Identity Status.
ERIC Educational Resources Information Center
Zimmermann, Peter; Becker-Stoll, Fabienne
2002-01-01
Examines two core assumptions of attachment theory: internal working models of attachment should increase in stability during development, and attachment is related to the adaptive solution of stage-salient issues, in adolescence, specifically to identity formation. Results show secure attachment representation was positively associated with the…
20 CFR 411.315 - What are the minimum qualifications necessary to be an EN?
Code of Federal Regulations, 2010 CFR
2010-04-01
... to be an EN? 411.315 Section 411.315 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO... capability of making documents and literature available in alternate media including Braille, recorded formats, enlarged print, and electronic media; and insuring that data systems available to clients are...
76 FR 1542 - Disclosure of Records or Information
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-11
....30 Contracts for the operation of record systems. 304.31 Use and collection of social security... category in paragraph (d)(1)(ii) of this section, if not a full-time member of the news media, must... requested form or format. (4) ``Educational institution'' means a preschool, a public or private elementary...
Toward Improved Security and Privacy in Modern Healthcare
ERIC Educational Resources Information Center
Pagano, Matthew Wallach
2013-01-01
The conversion of paper-based medical records into electronic formats is set to bring many benefits to healthcare. This includes creating a more seamless exchange of electronic health records (EHRs) between providers, improving healthcare while lowering its costs, and providing patients with increased access to their EHRs. As more medical…
Secure Channel Establishment in Disadvantaged Networks: TLS Optimization Using Intercepting Proxies
2009-08-18
50 4.1.2 Link Emulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 4.1.3 Openssl ...59 5 5.3 Acquired Skills . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 5.3.1 Openssl ...an openssl library [4], which is designed to work with differing certificate formats. 1.2.3.4 TLS Handshakes A TLS connection begins with a handshake
Children's Perspectives on Coping and Support Following Parental Separation
ERIC Educational Resources Information Center
Halpenny, Ann Marie; Greene, Sheila; Hogan, Diane
2008-01-01
Families represent the primary setting in which most children's lives are shaped and determined. Increasingly, children experience ongoing change in family formation and structure, and such fluctuation may threaten or diminish their feelings of security with regard to established family roles, relationships and routines. A number of studies have…
ERIC Educational Resources Information Center
Internet Research, 1996
1996-01-01
Electronic ground was broken in 1995 with the development of the completely Internet-based bank Security First Network Bank. This article discusses the need for developing online services, outlines the reasons for the formation of an Internet-based bank and argues that to remain competitive financial services providers must provide easier customer…
17 CFR 229.1001 - (Item 1001) Summary term sheet.
Code of Federal Regulations, 2010 CFR
2010-04-01
... sheet that is written in plain English. The summary term sheet must briefly describe in bullet point format the most material terms of the proposed transaction. The summary term sheet must provide security... transaction. The bullet points must cross-reference a more detailed discussion contained in the disclosure...
Security Code Red or Ready? Leaders Sharing--For Tech Leaders
ERIC Educational Resources Information Center
Hall, Don; Kelly, Pat
2005-01-01
Increasingly, teachers rely on computer software and networks to both enhance curriculum management and provide engaging learning opportunities in instruction. New software is enabling more frequent formative assessments to better focus day-to-day lessons on the unique needs of individual learners. Administrators use increasingly complex data…
Index Nuclear Wallet Cards Contents Current Version Radioactive Nuclides (Homeland Security) Nuclear Materials Management & Safeguards System 8th Edition 2011 Nuclear Wallet Cards Resources Search Nuclear Wallet Cards 8th Edition PDF Format 8thEdition, Android Market Download Nuclear Wallet Cards Nuclear
A Cyber Security Self-Assessment Method for Nuclear Power Plants
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.
2004-11-01
A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is amore » digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process.« less
What then do we do about computer security?
DOE Office of Scientific and Technical Information (OSTI.GOV)
Suppona, Roger A.; Mayo, Jackson R.; Davis, Christopher Edward
This report presents the answers that an informal and unfunded group at SNL provided for questions concerning computer security posed by Jim Gosler, Sandia Fellow (00002). The primary purpose of this report is to record our current answers; hopefully those answers will turn out to be answers indeed. The group was formed in November 2010. In November 2010 Jim Gosler, Sandia Fellow, asked several of us several pointed questions about computer security metrics. Never mind that some of the best minds in the field have been trying to crack this nut without success for decades. Jim asked Campbell to leadmore » an informal and unfunded group to answer the questions. With time Jim invited several more Sandians to join in. We met a number of times both with Jim and without him. At Jim's direction we contacted a number of people outside Sandia who Jim thought could help. For example, we interacted with IBM's T.J. Watson Research Center and held a one-day, videoconference workshop with them on the questions.« less
National assessment of geologic carbon dioxide storage resources: methodology implementation
Blondes, Madalyn S.; Brennan, Sean T.; Merrill, Matthew D.; Buursink, Marc L.; Warwick, Peter D.; Cahan, Steven M.; Corum, Margo D.; Cook, Troy A.; Craddock, William H.; DeVera, Christina A.; Drake II, Ronald M.; Drew, Lawrence J.; Freeman, P.A.; Lohr, Celeste D.; Olea, Ricardo A.; Roberts-Ashby, Tina L.; Slucher, Ernie R.; Varela, Brian A.
2013-01-01
In response to the 2007 Energy Independence and Security Act, the U.S. Geological Survey (USGS) conducted a national assessment of potential geologic storage resources for carbon dioxide (CO2). Storage of CO2 in subsurface saline formations is one important method to reduce greenhouse gas emissions and curb global climate change. This report provides updates and implementation details of the assessment methodology of Brennan and others (2010, http://pubs.usgs.gov/of/2010/1127/) and describes the probabilistic model used to calculate potential storage resources in subsurface saline formations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... him or her, e.g., a social security number; age; military rank; civilian grade; marital status; race... which can be used to distinguish or trace an individual's identity, such as their name, social security... grouping of information, whatever the storage media (e.g., paper, electronic, etc.), about an individual...
Code of Federal Regulations, 2011 CFR
2011-07-01
... him or her, e.g., a social security number; age; military rank; civilian grade; marital status; race... which can be used to distinguish or trace an individual's identity, such as their name, social security... grouping of information, whatever the storage media (e.g., paper, electronic, etc.), about an individual...
Code of Federal Regulations, 2014 CFR
2014-07-01
... him or her, e.g., a social security number; age; military rank; civilian grade; marital status; race... which can be used to distinguish or trace an individual's identity, such as their name, social security... grouping of information, whatever the storage media (e.g., paper, electronic, etc.), about an individual...
OPERATION CASTLE. The Operation Plan Number 1-53. Task Group 7.1
1984-08-31
reconnaissance. 2 MA-16 Search and rescue at Eniwetok. P- 3 3 C-54 Documentary photography. I P2V Project 6.4 control of drons ve_-sel. - - iujutc 7-4 telemetering, SFIR2V Security Patrol. 4 741 Security. PI4
32 CFR 152.4 - Responsibilities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Department of Defense, as appropriate. (3) Invite the Secretary of Homeland Security to appoint... Department of Homeland Security, the Chief Counsel, United States Coast Guard. (d) The JSC Working Group (WG... 32 National Defense 1 2012-07-01 2012-07-01 false Responsibilities. 152.4 Section 152.4 National...
Code of Federal Regulations, 2010 CFR
2010-07-01
... him or her, e.g., a social security number; age; military rank; civilian grade; marital status; race... which can be used to distinguish or trace an individual's identity, such as their name, social security... grouping of information, whatever the storage media (e.g., paper, electronic, etc.), about an individual...
Military Education Workshop Addresses Threats to Stability and Security
2007-08-01
for an upcoming National Intelligence Estimate (NIE), the National Inteligence Council (NIC) has reached out to a broad group of U.S. government...OFFICIAL BUSINESS resource competition and conflict; water and food security; health and disease, and the stability of governments. The Army should be
Infant-Mother Attachment among the Dogon of Mali.
ERIC Educational Resources Information Center
True, Mary McMahan; Pisani, Lelia; Oumar, Fadimata
2001-01-01
Examined infant-mother attachment in Mali's Dogon ethnic group. Found that distribution of Strange Situation classifications was 67 percent secure, 0 percent avoidant, 8 percent resistant, and 25 percent disorganized. Infant attachment security related to quality of mother-infant communication. Mothers of disorganized infants had significantly…
Trolling New Media: Violent Extremist Groups Recruiting Through Social Media
2015-12-01
MASTER OF ARTS IN SECURITY STUDIES (HOMELAND SECURITY AND DEFENSE) from the NAVAL POSTGRADUATE SCHOOL December 2015 Approved by...55 B. COUNTERTERRORISM EFFORTS ...................................................58 C. FUTURE AREAS OF STUDY ...Kuffar video .....................26 Figure 4. Player from Under Ash assaulting military forces .....................................32 Figure 5
NASA Astrophysics Data System (ADS)
Gunel, Murat; Hand, Brian; Gunduz, Sevket
2006-11-01
Physics as a subject for school students requires an understanding and ability to move between different modes of representation for the concepts under review. However, the inability of students to have a multimodal understanding of the concepts is seen as restricting their understandings of the concepts. The aim of this study was to explore the effectiveness of using writing-to-learn strategies that required students to embed multimodal representations of the concepts. In particular, the study compared a presentation format with a summary report format for students learning quantum theory. A pre-post test design was used to compare performances of these two groups across two units. For unit 1, students' scores from groups that completed either a presentation format (PowerPoint presentation) or a summary report format (chapter summary) were compared. No limits were placed on the amount of text or the number of representations used. For unit 2, products of both groups were constructed for an audience of year 10 students. The presentation format group (PowerPoint) was limited to 15 slides, with a maximum of 10 words displayed per slide; a script was written to accompany the presentation. Slides could include graphical and mathematical formulae; however, the text could not. The summary report format group that wrote out its explanations was limited to four pages and was required to incorporate multimodal representations. Results indicated that for both units students using the presentation format group scored significantly better on tests than the summary report format group. The effect size difference between the groups increased for the second unit, indicating that more practice was leading to better student understanding of the physics concepts.
The Security of the South Atlantic: Is It a Case for ’SATO’--South Atlantic Treaty Organization
1982-05-10
Studies , Georgetown University, 1976. Nitze, Paul H., and Leonard Sullivan Jr., and the Atlantic Council Working Group on Securing the Seas. Securing...to this study should include the foregoing statement.) Accession For FTIS( GRA&I DTIC TAR Uuannwouncd e "• Jus;tification. 00 Distribution...Center for Strategic and International Studies , Georgetown University, 1976), p. 1. 2. Paul H. Nitze, Leonard Sullivan Jr and the Atlantic Council
Programmable Logic Controllers for Research on the Cyber Security of Industrial Power Plants
2017-02-12
group . 15. SUBJECT TERMS Industrial control systems, cyber security 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b. ABSTRACT c. THIS...currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (00-MM-YYYY) ,2. REPORT TYPE 3. DATES COVERED...From- To) 12/02/2017 Final 15 August 2015 - 12 February 2017 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Programmable Logic Controllers for Research
Colombian Army Transformation and the Inflection Point of the Terrorist Groups
2011-03-30
The start of Alvaro Uribe Velez administration (2002 - 2006) marked a clear separation in overcoming the problem at the national level. For the first... Alvaro Uribe Velez, Colombian Army War College Auditorium, 2003. 32 Security is not understood in a first instance as the State´s security, nor as...President Andrés Pastrana (1998 – 2002), produced a National Security Strategy of any value.3 However, from the beginning of President Alvaro Uribe’s
Making grandma's data secure: a security architecture for home telemedicine.
Starren, J.; Sengupta, S.; Hripcsak, G.; Ring, G.; Klerer, R.; Shea, S.
2001-01-01
Home telemedicine presents special challenges for data security and privacy. Experience in the Informatics for Diabetes Education And Telemedicine (IDEATel) project has demonstrated that data security is not a one-size-fits-all problem. The IDEATel users include elderly patients in their homes, nurse case managers, physicians, and researchers. The project supports multiple computer systems that require a variety of user interactions, including: data entry, data review, patient education, videoconferencing, and electronic monitoring. To meet these various needs, a number of different of security solutions were utilized, including: UserID/Password, PKI certificates, time-based tokens, IP filtering, VPNs, symmetric and asymmetric encryption schemes, firewalls and dedicated connections. These were combined in different ways to meet the needs of each user groups. PMID:11825267
Network-Centric Quantum Communications
NASA Astrophysics Data System (ADS)
Hughes, Richard
2014-03-01
Single-photon quantum communications (QC) offers ``future-proof'' cryptographic security rooted in the laws of physics. Today's quantum-secured communications cannot be compromised by unanticipated future technological advances. But to date, QC has only existed in point-to-point instantiations that have limited ability to address the cyber security challenges of our increasingly networked world. In my talk I will describe a fundamentally new paradigm of network-centric quantum communications (NQC) that leverages the network to bring scalable, QC-based security to user groups that may have no direct user-to-user QC connectivity. With QC links only between each of N users and a trusted network node, NQC brings quantum security to N2 user pairs, and to multi-user groups. I will describe a novel integrated photonics quantum smartcard (``QKarD'') and its operation in a multi-node NQC test bed. The QKarDs are used to implement the quantum cryptographic protocols of quantum identification, quantum key distribution and quantum secret splitting. I will explain how these cryptographic primitives are used to provide key management for encryption, authentication, and non-repudiation for user-to-user communications. My talk will conclude with a description of a recent demonstration that QC can meet both the security and quality-of-service (latency) requirements for electric grid control commands and data. These requirements cannot be met simultaneously with present-day cryptography.