Sample records for secure learning environment

  1. Designing a Secure Exam Management System (SEMS) for M-Learning Environments

    ERIC Educational Resources Information Center

    Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc

    2016-01-01

    M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…

  2. Learner Centric in M-Learning: Integration of Security, Dependability and Trust

    ERIC Educational Resources Information Center

    Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin

    2014-01-01

    The paper focus on learner centric attributes in a m-learning environment encounters the security measurements. In order to build up a systematic threat and countermeasure for protecting the learners as well as providing awareness and satisfaction in utilizing the mobile learning system, a security model need to be overhauled. The brief literature…

  3. An approach for investigation of secure access processes at a combined e-learning environment

    NASA Astrophysics Data System (ADS)

    Romansky, Radi; Noninska, Irina

    2017-12-01

    The article discuses an approach to investigate processes for regulation the security and privacy control at a heterogenous e-learning environment realized as a combination of traditional and cloud means and tools. Authors' proposal for combined architecture of e-learning system is presented and main subsystems and procedures are discussed. A formalization of the processes for using different types resources (public, private internal and private external) is proposed. The apparatus of Markovian chains (MC) is used for modeling and analytical investigation of the secure access to the resources is used and some assessments are presented.

  4. Security

    ERIC Educational Resources Information Center

    Technology & Learning, 2008

    2008-01-01

    Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…

  5. Learning Locked down: Evaluating the Treatment of Students' Rights in High Security School Environments

    ERIC Educational Resources Information Center

    Bracy, Nicole L.

    2009-01-01

    Public schools have transformed significantly over the past several decades in response to broad concerns about rising school violence. Today's public schools are high security environments employing tactics commonly found in jails and prisons such as police officers, security cameras, identification systems, and secure building strategies.…

  6. Guidelines for Network Security in the Learning Environment.

    ERIC Educational Resources Information Center

    Littman, Marlyn Kemper

    1996-01-01

    Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)

  7. A PKI Approach for Deploying Modern Secure Distributed E-Learning and M-Learning Environments

    ERIC Educational Resources Information Center

    Kambourakis, Georgios; Kontoni, Denise-Penelope N.; Rouskas, Angelos; Gritzalis, Stefanos

    2007-01-01

    While public key cryptography is continuously evolving and its installed base is growing significantly, recent research works examine its potential use in e-learning or m-learning environments. Public key infrastructure (PKI) and attribute certificates (ACs) can provide the appropriate framework to effectively support authentication and…

  8. Mobile Learning Environment with Short Messaging Service: Application to a Campus Environment in a Developing Country

    ERIC Educational Resources Information Center

    Premadasa, H. K. Salinda; Meegama, R. Gayan N.

    2013-01-01

    Purpose: The purpose of this paper is to discuss how to integrate secure, open-source and mobile-based system with the Moodle learning management system (MLMS) then describe the implementation of a campus-wide mobile learning environment with short messaging system (SMS) and how this platform is incorporated with the student's learning…

  9. Learning with Security

    ERIC Educational Resources Information Center

    Jokela, Paivi; Karlsudd, Peter

    2007-01-01

    The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…

  10. Planning Appropriate Learning Environments for Children under Three. Australian Early Childhood Resource Booklets, No. 1.

    ERIC Educational Resources Information Center

    Harrison, Linda

    This booklet provides suggestions for reassessing, modifying, and arranging child care center environments to best serve the needs of children and staff. The booklet notes that a well-planned environment can provide young children with appropriate and challenging learning experiences within a consistent and secure setting. Such an environment also…

  11. Risk and Resilience: Girls' Experiences Navigating Space and Relationships in a Secure Residential Facility

    ERIC Educational Resources Information Center

    Simonsen, Amy E.

    2010-01-01

    The purpose of this qualitative study was to examine how adolescent girls with diagnosed learning and emotional disabilities described themselves as they negotiated various environments and relationships within a secure residential facility. The goal was to explore how conditions and interactions in these environments promoted both risk and…

  12. Evaluating data distribution and drift vulnerabilities of machine learning algorithms in secure and adversarial environments

    NASA Astrophysics Data System (ADS)

    Nelson, Kevin; Corbin, George; Blowers, Misty

    2014-05-01

    Machine learning is continuing to gain popularity due to its ability to solve problems that are difficult to model using conventional computer programming logic. Much of the current and past work has focused on algorithm development, data processing, and optimization. Lately, a subset of research has emerged which explores issues related to security. This research is gaining traction as systems employing these methods are being applied to both secure and adversarial environments. One of machine learning's biggest benefits, its data-driven versus logic-driven approach, is also a weakness if the data on which the models rely are corrupted. Adversaries could maliciously influence systems which address drift and data distribution changes using re-training and online learning. Our work is focused on exploring the resilience of various machine learning algorithms to these data-driven attacks. In this paper, we present our initial findings using Monte Carlo simulations, and statistical analysis, to explore the maximal achievable shift to a classification model, as well as the required amount of control over the data.

  13. Securing Sub-Saharan Africa’s Maritime Environment: Lessons Learned from the Caribbean and Southeast Asia

    DTIC Science & Technology

    2009-06-01

    Worst of Times: Maritime Security in the Asia-Pacific eds. Joshua Ho and Catherine Zara Raymond (Singapore: Institute of Defense and Strategic Studies...Security Outlook for Southeast Asia,” in The Best of Times, the Worst of Times: Maritime Security in the Asia-Pacific eds. Joshua Ho and Catherine Zara

  14. Design of Learning Spaces: Emotional and Cognitive Effects of Learning Environments in Relation to Child Development

    ERIC Educational Resources Information Center

    Arndt, Petra A.

    2012-01-01

    The design of learning spaces is rightly gaining more and more pedagogical attention, as they influence the learning climate and learning results in multiple ways. General structural characteristics influence the willingness to learn through emotional well-being and a sense of security. Specific structural characteristics influence cognitive…

  15. Spatial Thinking: Precept for Understanding Operational Environments

    DTIC Science & Technology

    2016-06-10

    A Computer Movie Simulating Urban Growth in the Detroit Region,” 236. 29 U.S. National Research Council, Learning to Think Spatially: GIS as a... children and spatial language, the article focuses on the use of geospatial information systems (GIS) as a support mechanism for learning to think...Thinking, Cognition, Learning , Geospatial, Operating Environment, Space Perception 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18

  16. Impact on Learning Awards, 2001.

    ERIC Educational Resources Information Center

    School Planning & Management, 2001

    2001-01-01

    Recognizes 14 architectural firms for their innovative designs, which helped solve real-world problems in K-12 school facilities. Designs for retrofits, safety and security, and specialized learning environments are profiled and critiqued. (GR)

  17. The Handbook for Campus Safety and Security Reporting. 2016 Edition

    ERIC Educational Resources Information Center

    US Department of Education, 2016

    2016-01-01

    Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…

  18. TENOR Follow-on

    DTIC Science & Technology

    2002-04-01

    Training environments; Distance learning; Information sharing; System architecture; 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Public... security , and the team members generally originate from different geographical locations and different units with varied operational mission and...Use of a server provides security and flexibility in the development and updating of training material. The lessons are created in HTML, a widely

  19. Augmented Performance Environment for Enhancing Interagency Coordination in Stability, Security, Transition, and Reconstruction (SSTR) Operations

    DTIC Science & Technology

    2009-02-01

    assessments and meeting rehearsal and individual learning materials • Specify the metrics to be used to capture the quality of interagency...government; • Improve security; and • Promote reconstruction (Barno, 2004; Dziedzic & Siedl, 2005; Center for Army Lessons Learned (CALL), 2007). The...their orientations and creating group-level, hierarchical orientations out of the aggregated individual orientations (Wan, Chiu, Peng, & Tam , 2007

  20. Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ondrej Linda; Todd Vollmer; Jason Wright

    Resiliency and security in critical infrastructure control systems in the modern world of cyber terrorism constitute a relevant concern. Developing a network security system specifically tailored to the requirements of such critical assets is of a primary importance. This paper proposes a novel learning algorithm for anomaly based network security cyber sensor together with its hardware implementation. The presented learning algorithm constructs a fuzzy logic rule based model of normal network behavior. Individual fuzzy rules are extracted directly from the stream of incoming packets using an online clustering algorithm. This learning algorithm was specifically developed to comply with the constrainedmore » computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental test-bed mimicking the environment of a critical infrastructure control system.« less

  1. Learners' Ensemble Based Security Conceptual Model for M-Learning System in Malaysian Higher Learning Institution

    ERIC Educational Resources Information Center

    Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin

    2014-01-01

    M-Learning has a potential to improve efficiency in the education sector and has a tendency to grow advance and transform the learning environment in the future. Yet there are challenges in many areas faced when introducing and implementing m-learning. The learner centered attribute in mobile learning implies deployment in untrustworthy learning…

  2. vPELS: An E-Learning Social Environment for VLSI Design with Content Security Using DRM

    ERIC Educational Resources Information Center

    Dewan, Jahangir; Chowdhury, Morshed; Batten, Lynn

    2014-01-01

    This article provides a proposal for personal e-learning system (vPELS [where "v" stands for VLSI: very large scale integrated circuit])) architecture in the context of social network environment for VLSI Design. The main objective of vPELS is to develop individual skills on a specific subject--say, VLSI--and share resources with peers.…

  3. "Get Some Secured Credit Cards Homey": Hip Hop Discourse, Financial Literacy and the Design of Digital Media Learning Environments

    ERIC Educational Resources Information Center

    Devane, Ben

    2009-01-01

    In the midst of the worst economic crisis since the Great Depression, there exists a deficit of compelling financial education curricula in urban schools that serve financially vulnerable working-class students. Part of a design-based research investigation aimed at creating culturally-relevant financial literacy learning environments, this study…

  4. Supporting Safe, Secure and Caring Schools in Alberta.

    ERIC Educational Resources Information Center

    McMullen, Dean

    Alberta Learning expects all schools to have a safe and caring teaching and learning environment to ensure students have the opportunity to meet the standards of education set by the Minister of Learning. The primary objectives of this manual are to facilitate action that is legally, professionally, and educationally sound; identify and support…

  5. Men with Learning Difficulties Doing Research: Challenging Views of Learning Difficulties

    ERIC Educational Resources Information Center

    Inglis, Pamela A.; Swain, John

    2012-01-01

    This paper explores the views of men with learning difficulties living in a secure environment. Reflecting findings from a doctoral thesis based upon a research project where the participants looked at the processes and concepts of research, the dialogues within the study were analysed using critical discourse analysis. Thesis aims relevant here…

  6. Teaching Network Security in a Virtual Learning Environment

    ERIC Educational Resources Information Center

    Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik

    2004-01-01

    This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…

  7. The Handbook for Campus Crime Reporting

    ERIC Educational Resources Information Center

    Ward, Diane; Lee, Janice

    2005-01-01

    Campus security and safety are important issues in postsecondary education today. Providing students nationwide with a safe environment in which to learn and keeping students, parents and employees well informed about campus security are goals that have been voiced by many groups. These goals were advanced by the Crime Awareness and Campus…

  8. Birds of a Feather: Supporting Secure Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Braswell III, H V

    2006-04-24

    Over the past few years Lawrence Livermore National Laboratory has begun the process of moving to a diskless environment in the Secure Computer Support realm. This movement has included many moving targets and increasing support complexity. We would like to set up a forum for Security and Support professionals to get together from across the Complex and discuss current deployments, lessons learned, and next steps. This would include what hardware, software, and hard copy based solutions are being used to manage Secure Computing. The topics to be discussed include but are not limited to: Diskless computing, port locking and management,more » PC, Mac, and Linux/UNIX support and setup, system imaging, security setup documentation and templates, security documentation and management, customer tracking, ticket tracking, software download and management, log management, backup/disaster recovery, and mixed media environments.« less

  9. TH-A-12A-01: Medical Physicist's Role in Digital Information Security: Threats, Vulnerabilities and Best Practices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McDonald, K; Curran, B

    I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less

  10. Navigating between Scylla and Charybdis: The Odyssean Leader in a Complex Environment

    DTIC Science & Technology

    2008-10-21

    of action capable of being shared across the organization). See also David A. Kolb , Experiential Learning : Experience as the Source of Learning ...Army GHQ Maneuvers of 1941. Washington D.C.: United States Army Center of Military History, 1991. Kolb , David A. Experiential Learning : Experience...ABSTRACT See Abstract 15. SUBJECT TERMS Leadership, organizational design, complexity, organizational theory , learning organization 16. SECURITY

  11. School Security: A Growing Concern

    ERIC Educational Resources Information Center

    Walker, Milton G.

    1976-01-01

    Vandalism, trespassing, drug traffic, crowd control, automobile traffic, and emergencies such as fire or storms--these are the kinds of problems a school security system should be designed to eliminate or minimize. A preventive program can save more money than it costs and can improve the learning environment at the same time, says this writer.…

  12. Mobile Technology: The Foundation for an Engaged and Secure Campus Community

    ERIC Educational Resources Information Center

    Chapel, Edward

    2008-01-01

    Montclair State University, a public New Jersey institution with more than 17,000 students enrolled, has harnessed the cell phone and cellular broadband technology to foster a stronger sense of community and provide students with a safe, secure, and rich learning environment. This paper discusses the potential for new technologies to foster…

  13. Security of social network credentials for accessing course portal: Users' experience

    NASA Astrophysics Data System (ADS)

    Katuk, Norliza; Fong, Choo Sok; Chun, Koo Lee

    2015-12-01

    Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications' database. Although it has been used by many web application providers, its' applicability in accessing learning materials is not yet fully investigated. Hence, this research aims to explore users' (i.e., instructors' and students') perception and experience on the security of SL for accessing learning contents. A course portal was developed for students at a higher learning institution and it provides two types of user authentications (i) traditional user authentication, and (ii) SL facility. Users comprised instructors and students evaluated the login facility of the course portal through a controlled lab experimental study following the within-subject design. The participants provided their feedback in terms of the security of SL for accessing learning contents. The study revealed that users preferred to use SL over the traditional authentication, however, they concerned on the security of SL and their privacy.

  14. Essential, Desirable or Optional? Making Distance E-Learning Courses Available to Those without Internet Access

    ERIC Educational Resources Information Center

    Hancock, Val

    2010-01-01

    The Open University, an open distance learning institution, is increasingly using a Virtual Learning Environment (VLE) that requires internet access. This paper investigates how the move to a VLE has affected one group of students who do not have internet access--offender learners studying in prison. Members of the armed forces and secure hospital…

  15. Minimizing Security Vulnerabilities in High-Tech Classrooms

    ERIC Educational Resources Information Center

    Ozkan, Betul C.; Gunay, Vedat

    2004-01-01

    Emerging technologies are quickly becoming part of daily learning and teaching endeavors in academia. Due to the access to certain high-tech tools educators must learn how to integrate these tools in educational settings. However, many also encounter problems and weaknesses in the same high-tech environment that uses and delivers information…

  16. Creating a virtual community of learning predicated on medical student learning styles.

    PubMed

    McGowan, Julie; Abrams, Matthew; Frank, Mark; Bangert, Michael

    2003-01-01

    To create a virtual community of learning within the Indiana University School of Medicine, learning tools were developed within ANGEL to meet the learning needs and habits of the medical students. Determined by student feedback, the integration of digital audio recordings of class lectures into the course management content with several possible outputs was paramount. The other components included electronic enhancement of old exams and providing case-based tutorials within the ANGEL framework. Students are using the curriculum management system more. Faculty feel more secure about their intellectual property because of the authentication and security offered through the ANGEL system. The technology applications were comparatively easy to create and manage. The return on investment, particularly for the digital audio recording component, has been substantial. By considering student learning styles, extant curriculum management systems can be enhanced to facilitate student learning within an electronic environment.

  17. Security Is Not an Option--Learning in a Safe Environment. FEDA Paper.

    ERIC Educational Resources Information Center

    Coe, Beatrice

    1997-01-01

    A study examined what further education colleges in Britain were doing about security and what they planned for the future. A literature search found that a PEST (Political/legal, Economic, Sociocultural, and Technological) analysis was one way to examine the differential impact of external influences. A PEST analysis offered a strategy for…

  18. The Future of America's Schools. Psychology's Role in Education.

    ERIC Educational Resources Information Center

    American Psychological Association, Washington, DC.

    An environment in which children feel secure and achieve a sense of emotional well-being is an environment in which children can learn. Today, psychology's greatest contributions to education are those that promote student welfare and enhance educational effectiveness and student achievement. Schools mirror society; both are struggling with issues…

  19. Security Engineering Lessons Learned for Migrating Independent LANs to an Enterprise Environment

    ERIC Educational Resources Information Center

    Marchant, Robert L.; Bonneau, Thomas

    2013-01-01

    Transition from small, independent LANs into larger enterprise managed infrastructures is becoming more prominent in academia, business and government. Consolidation of IT resources into larger, more disciplined, and more professionally managed environments has significant advantages however they do bring their own unique issues to solve in order…

  20. Promoting Inter-Professional Teamwork and Learning--The Case of a Surgical Operating Theatre

    ERIC Educational Resources Information Center

    Collin, Kaija; Paloniemi, Susanna; Mecklin, Jukka-Pekka

    2010-01-01

    Hospitals, and surgical operating theatres (OTs) in particular, are environments in which inter-professional teamwork and learning are essential to secure patient safety and effective practice. However, it has been revealed in many studies that inter-professional collaborative work in hospital organisations faces many challenges and constraints.…

  1. Higher Stakes--The Hidden Risks of School Security Fences for Children's Learning Environments

    ERIC Educational Resources Information Center

    Rooney, Tonya

    2015-01-01

    In a move away from the open or low-fenced grounds that have traditionally been a feature of Australian school design, the last decade has seen a growth in the installation of high-security fences around schools. These structures, far from being passive and neutral, act to redefine the possibilities for movement and connectivity in the local…

  2. Masculinities, Attachment Theory and Transformative Learning: A Discussion of Some Theoretical Considerations for Developing an Emotionally Secure Teaching Praxis

    ERIC Educational Resources Information Center

    Carberry, Damien

    2017-01-01

    This paper situates education as an integral component of the overall prison rehabilitation process. The article discusses how an educational practitioner's knowledge of attachment theory and masculinities can be utilized to develop a secure methodological teaching environment in the classroom of a prison education unit and create a space where…

  3. Workshop on Education in Computer Security (WECS6) (6th): Avoiding Fear, Uncertainty and Doubt Through Effective Security Education, Held in Monterey, California on 12-16 July 2004

    DTIC Science & Technology

    2004-07-01

    Melissa ) is created in the controlled environment and propagated. The students learn how viruses are written, how they are propagated via mediums like...vulnerabilities and threats, establishing disaster response and recovery procedures. Joseph Giordano , Technical Advisor, Information Warfare Branch, AFRL 60 The

  4. Activity Learning as a Foundation for Security Monitoring in Smart Homes.

    PubMed

    Dahmen, Jessamyn; Thomas, Brian L; Cook, Diane J; Wang, Xiaobo

    2017-03-31

    Smart environment technology has matured to the point where it is regularly used in everyday homes as well as research labs. With this maturation of the technology, we can consider using smart homes as a practical mechanism for improving home security. In this paper, we introduce an activity-aware approach to security monitoring and threat detection in smart homes. We describe our approach using the CASAS smart home framework and activity learning algorithms. By monitoring for activity-based anomalies we can detect possible threats and take appropriate action. We evaluate our proposed method using data collected in CASAS smart homes and demonstrate the partnership between activity-aware smart homes and biometric devices in the context of the CASAS on-campus smart apartment testbed.

  5. Environmental Quality of Schools. Report to the New York State Board of Regents.

    ERIC Educational Resources Information Center

    New York State Education Dept., Albany.

    Education reform, besides focusing on teaching and learning, must also address the need to maintain a safe, secure, and healthy school environment. As outlined in "A New Compact for Learning," the New York State Education Department and New York educators are responsible for ensuring the safety of school buildings. Students in school…

  6. Measuring Effectiveness in Conflict Environments

    DTIC Science & Technology

    2009-09-01

    87 14. SUBJECT TERMS Type Keywords Here 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS... penetration and disruption.”53 Measuring casualties would obviously correspond with these kinds of objectives but do not provide the kind of information...39. 103 U.S. House of Representative Committee on Armed Services, “Agency Stovepipes vs . Strategic Agility: Lessons We Need to Learn from Provincial

  7. The Problem of Discipline/Control and Security in Our Schools. Position Paper, Number 1.

    ERIC Educational Resources Information Center

    National Urban League, Inc., New York, NY.

    A survey in the fall of 1969 revealed that of the 51 major cities which responded to a questionnaire, only four did not employ their own security officers or use city policemen in daily school operations. It is contended that it is impossible for a favorable climate for learning to be established within this type of environment. Further, it is…

  8. The Wonder Approach to learning

    PubMed Central

    L’Ecuyer, Catherine

    2014-01-01

    Wonder, innate in the child, is an inner desire to learn that awaits reality in order to be awakened. Wonder is at the origin of reality-based consciousness, thus of learning. The scope of wonder, which occurs at a metaphysical level, is greater than that of curiosity. Unfortunate misinterpretations of neuroscience have led to false brain-based ideas in the field of education, all of these based on the scientifically wrong assumption that children’s learning depends on an enriched environment. These beliefs have re-enforced the Behaviorist Approach to education and to parenting and have contributed to deadening our children’s sense of wonder. We suggest wonder as the center of all motivation and action in the child. Wonder is what makes life genuinely personal. Beauty is what triggers wonder. Wonder attunes to beauty through sensitivity and is unfolded by secure attachment. When wonder, beauty, sensitivity and secure attachment are present, learning is meaningful. On the contrary, when there is no volitional dimension involved (no wonder), no end or meaning (no beauty) and no trusting predisposition (secure attachment), the rigid and limiting mechanical process of so-called learning through mere repetition become a deadening and alienating routine. This could be described as training, not as learning, because it does not contemplate the human being as a whole. PMID:25339882

  9. Activity Learning as a Foundation for Security Monitoring in Smart Homes

    PubMed Central

    Dahmen, Jessamyn; Thomas, Brian L.; Cook, Diane J.; Wang, Xiaobo

    2017-01-01

    Smart environment technology has matured to the point where it is regularly used in everyday homes as well as research labs. With this maturation of the technology, we can consider using smart homes as a practical mechanism for improving home security. In this paper, we introduce an activity-aware approach to security monitoring and threat detection in smart homes. We describe our approach using the CASAS smart home framework and activity learning algorithms. By monitoring for activity-based anomalies we can detect possible threats and take appropriate action. We evaluate our proposed method using data collected in CASAS smart homes and demonstrate the partnership between activity-aware smart homes and biometric devices in the context of the CASAS on-campus smart apartment testbed. PMID:28362342

  10. MAVEN Information Security Governance, Risk Management, and Compliance (GRC): Lessons Learned

    NASA Technical Reports Server (NTRS)

    Takamura, Eduardo; Gomez-Rosa, Carlos A.; Mangum, Kevin; Wasiak, Fran

    2014-01-01

    As the first interplanetary mission managed by the NASA Goddard Space Flight Center, the Mars Atmosphere and Volatile EvolutioN (MAVEN) had three IT security goals for its ground system: COMPLIANCE, (IT) RISK REDUCTION, and COST REDUCTION. In a multiorganizational environment in which government, industry and academia work together in support of the ground system and mission operations, information security governance, risk management, and compliance (GRC) becomes a challenge as each component of the ground system has and follows its own set of IT security requirements. These requirements are not necessarily the same or even similar to each other's, making the auditing of the ground system security a challenging feat. A combination of standards-based information security management based on the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF), due diligence by the Mission's leadership, and effective collaboration among all elements of the ground system enabled MAVEN to successfully meet NASA's requirements for IT security, and therefore meet Federal Information Security Management Act (FISMA) mandate on the Agency. Throughout the implementation of GRC on MAVEN during the early stages of the mission development, the Project faced many challenges some of which have been identified in this paper. The purpose of this paper is to document these challenges, and provide a brief analysis of the lessons MAVEN learned. The historical information documented herein, derived from an internal pre-launch lessons learned analysis, can be used by current and future missions and organizations implementing and auditing GRC.

  11. A developmental approach to learning causal models for cyber security

    NASA Astrophysics Data System (ADS)

    Mugan, Jonathan

    2013-05-01

    To keep pace with our adversaries, we must expand the scope of machine learning and reasoning to address the breadth of possible attacks. One approach is to employ an algorithm to learn a set of causal models that describes the entire cyber network and each host end node. Such a learning algorithm would run continuously on the system and monitor activity in real time. With a set of causal models, the algorithm could anticipate novel attacks, take actions to thwart them, and predict the second-order effects flood of information, and the algorithm would have to determine which streams of that flood were relevant in which situations. This paper will present the results of efforts toward the application of a developmental learning algorithm to the problem of cyber security. The algorithm is modeled on the principles of human developmental learning and is designed to allow an agent to learn about the computer system in which it resides through active exploration. Children are flexible learners who acquire knowledge by actively exploring their environment and making predictions about what they will find,1, 2 and our algorithm is inspired by the work of the developmental psychologist Jean Piaget.3 Piaget described how children construct knowledge in stages and learn new concepts on top of those they already know. Developmental learning allows our algorithm to focus on subsets of the environment that are most helpful for learning given its current knowledge. In experiments, the algorithm was able to learn the conditions for file exfiltration and use that knowledge to protect sensitive files.

  12. Persistent Fear and Anxiety Can Affect Young Children's Learning and Development. Working Paper #9

    ERIC Educational Resources Information Center

    National Scientific Council on the Developing Child, 2010

    2010-01-01

    Ensuring that young children have safe, secure environments in which to grow, learn, and develop healthy brains and bodies is not only good for the children themselves but also builds a strong foundation for a thriving, prosperous society. Science shows that early exposure to circumstances that produce persistent fear and chronic anxiety can have…

  13. Graduate Research Assistant Program for Professional Development at Oak Ridge National Laboratory (ORNL) Global Nuclear Security Technology Division (GNSTD)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eipeldauer, Mary D; Shelander Jr, Bruce R

    2012-01-01

    The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) wasmore » established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.« less

  14. There and Back Again: From Research Methods to Principles of Learning, and Everything in Between: Consolidated Knowledge Using the Course Wiki

    ERIC Educational Resources Information Center

    Hogendoorn, Adrian

    2017-01-01

    A course wiki is an active environment in which students not only solve problems, but also find their own problems (Bransford, Brown, & Cocking, 1999). Wikis are novel, immersive environments requiring active participation, which enable students to build knowledge within a secure online setting (Hadjerrouit, 2011). This contribution traces a…

  15. Inclusion and Social Justice for Gay, Lesbian, Bisexual, and Transgender Members of the Learning Community in Queensland State Schools

    ERIC Educational Resources Information Center

    Michaelson, Matthew Thomas

    2008-01-01

    Although schools are meant to be safe learning environments for all children, some children are not afforded equal access to the protection of their safety and security. Every day, children who might be same-sex attracted are confronted with a unique set of challenges that are not being adequately addressed by the administrators of educational…

  16. U.S. Declining Global Rankings in Math and Science and the Impact on Our National Security: Policy Options to Elicit Another Sputnik Moment

    DTIC Science & Technology

    2014-03-01

    to school adequately prepared. Self-regulation is the ability of students to take the necessary steps to ensure they are prepared to learn . A self... schools where students are provided with a positive social learning environment that promotes self-efficacy and emulation in the classroom that has... learning process. In 2002, approximately 26 percent of student in the U.S. came to school chronically unprepared (National Center for Education

  17. Plant genetics, sustainable agriculture and global food security.

    PubMed

    Ronald, Pamela

    2011-05-01

    The United States and the world face serious societal challenges in the areas of food, environment, energy, and health. Historically, advances in plant genetics have provided new knowledge and technologies needed to address these challenges. Plant genetics remains a key component of global food security, peace, and prosperity for the foreseeable future. Millions of lives depend upon the extent to which crop genetic improvement can keep pace with the growing global population, changing climate, and shrinking environmental resources. While there is still much to be learned about the biology of plant-environment interactions, the fundamental technologies of plant genetic improvement, including crop genetic engineering, are in place, and are expected to play crucial roles in meeting the chronic demands of global food security. However, genetically improved seed is only part of the solution. Such seed must be integrated into ecologically based farming systems and evaluated in light of their environmental, economic, and social impacts-the three pillars of sustainable agriculture. In this review, I describe some lessons learned, over the last decade, of how genetically engineered crops have been integrated into agricultural practices around the world and discuss their current and future contribution to sustainable agricultural systems.

  18. Evaluation of power system security and development of transmission pricing method

    NASA Astrophysics Data System (ADS)

    Kim, Hyungchul

    The electric power utility industry is presently undergoing a change towards the deregulated environment. This has resulted in unbundling of generation, transmission and distribution services. The introduction of competition into unbundled electricity services may lead system operation closer to its security boundaries resulting in smaller operating safety margins. The competitive environment is expected to lead to lower price rates for customers and higher efficiency for power suppliers in the long run. Under this deregulated environment, security assessment and pricing of transmission services have become important issues in power systems. This dissertation provides new methods for power system security assessment and transmission pricing. In power system security assessment, the following issues are discussed (1) The description of probabilistic methods for power system security assessment; (2) The computation time of simulation methods; (3) on-line security assessment for operation. A probabilistic method using Monte-Carlo simulation is proposed for power system security assessment. This method takes into account dynamic and static effects corresponding to contingencies. Two different Kohonen networks, Self-Organizing Maps and Learning Vector Quantization, are employed to speed up the probabilistic method. The combination of Kohonen networks and Monte-Carlo simulation can reduce computation time in comparison with straight Monte-Carlo simulation. A technique for security assessment employing Bayes classifier is also proposed. This method can be useful for system operators to make security decisions during on-line power system operation. This dissertation also suggests an approach for allocating transmission transaction costs based on reliability benefits in transmission services. The proposed method shows the transmission transaction cost of reliability benefits when transmission line capacities are considered. The ratio between allocation by transmission line capacity-use and allocation by reliability benefits is computed using the probability of system failure.

  19. Lessons Learned Implementing DOORS in a Citrix Environment

    NASA Technical Reports Server (NTRS)

    Bussman, Marie

    2005-01-01

    NASA's James Web Space Telescope (JWST) Project is a large multi-national project with geographically dispersed contractors that all need access to the Projects requirement database. Initially, the project utilized multiple DOORS databases with the built-in partitions feature to exchange modules amongst the various contractor sites. As the requirements databases matured the use of partitions became extremely difficult. There have been many issues such as incompatible versions of DOORS, inefficient mechanism for sharing modules, security concerns, performance issues, and inconsistent document import and export formats. Deployment of the client software with limited IT resources available was also an issue. The solution chosen by JWST was to integrate the use of a Citrix environment with the DOORS database to address most of the project concerns. The use of the Citrix solution allowed a single Requirements database in a secure environment via a web interface. The Citrix environment allows JWST to upgrade to the most current version of DOORS without having to coordinate multiple sites and user upgrades. The single requirements database eliminates a multitude of Configuration Management concerns and facilitated the standardization of documentation formats. This paper discusses the obstacles and the lessons learned throughout the installation, implementation, usage and deployment process of a centralized DOORS database solution.

  20. ViNEL: A Virtual Networking Lab for Cyber Defense Education

    ERIC Educational Resources Information Center

    Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie

    2018-01-01

    Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…

  1. A Principal's Guide to ILS Facilities Installation.

    ERIC Educational Resources Information Center

    Ross, Tweed W.

    1992-01-01

    Outlines five facilities considerations that school principals need to address prior to the installation of an integrated learning system (ILS): (1) placement, i.e., labs or classrooms; (2) wiring; (3) environment, including furniture and noise; (4) security, including fire, theft, vandalism, and misuse; and (5) usability, including afterschool…

  2. Pathways to Safety

    ERIC Educational Resources Information Center

    Kennedy, Mike

    2006-01-01

    Education administrators have many tools available to them as they strive to establish a safe climate for learning, but no one strategy or piece of equipment is a magic solution that keeps potential trouble beyond the campus boundaries. Creating and maintaining a safe and secure school environment requires a balance of many strategies: (1)…

  3. Lessons in Innovative Funding for District Improvements

    ERIC Educational Resources Information Center

    McDaniel, Gwenn

    2010-01-01

    Near the shores of Lake Superior, Michigan's Houghton-Portage Township School District is known for academic leadership and strives to provide an exceptional and secure learning environment for its students. However, like many districts around the country, Houghton-Portage is not immune to the economic restrictions. In a recent effort to address…

  4. Day to Day

    ERIC Educational Resources Information Center

    Jurecki, Dennis

    2006-01-01

    A clean, healthy and safe school provides students, faculty and staff with an environment conducive to learning and working. However, budget and staff reductions can lead to substandard cleaning practices and unsanitary conditions. Some school facility managers have been making the switch to a day-schedule to reduce security and energy costs, and…

  5. The vulnerable do-gooders: security strategies of German aid agencies.

    PubMed

    Schneiker, Andrea

    2013-04-01

    Humanitarian and development agencies have confronted growing insecurity in some of the regions in which they work over the course of the past decade. Consequently, aid agencies are changing their approach to security issues. Compared to aid agencies from other countries, especially the United Kingdom and the United States, German aid agencies have been relatively slow to adopt security measures. In addition, the security measures they have selected differ from one agency to another, even in comparable security contexts. The literature on organisational learning helps to explain these differences. The findings show that external and internal organisational factors influence an aid agency's choice of a particular security measure. The different responses of German aid agencies to the changing security environment demonstrate that security measures are not only influenced by an organisation's identity but also can be a way for them to demonstrate their identity and thereby distinguish themselves from other actors that deliver aid. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.

  6. Privacy-preserving backpropagation neural network learning.

    PubMed

    Chen, Tingting; Zhong, Sheng

    2009-10-01

    With the development of distributed computing environment , many learning problems now have to deal with distributed input data. To enhance cooperations in learning, it is important to address the privacy concern of each data holder by extending the privacy preservation notion to original learning algorithms. In this paper, we focus on preserving the privacy in an important learning model, multilayer neural networks. We present a privacy-preserving two-party distributed algorithm of backpropagation which allows a neural network to be trained without requiring either party to reveal her data to the other. We provide complete correctness and security analysis of our algorithms. The effectiveness of our algorithms is verified by experiments on various real world data sets.

  7. In Pursuit of Goal Six: A Statewide Initiative To Improve School Safety.

    ERIC Educational Resources Information Center

    Yap, Kim O.; And Others

    National Education Goal Six calls for all schools to have safe environments conducive to teaching and learning by year 2000. In 1989, the Washington State Office of Superintendent of Public Instruction initiated the School Security Enhancement Program, which provides competitive grants to school districts to develop or improve school-based…

  8. Politic of Security, Privacy and Transparency in Human Learning Systems

    ERIC Educational Resources Information Center

    Jeghal, Adil; Oughdir, Lahcen; Tairi, Hamid

    2016-01-01

    The preservation of confidentiality has become a major issue for the majority of applications that process personal information, the sensitivity of this information requires creators to set rules for the sharing and use of access control policies. A great deal of research has already been conducted in educational environments. However, one aspect…

  9. Youth Outcomes Following Implementation of Universal SW-PBIS Strategies in a Texas Secure Juvenile Facility

    ERIC Educational Resources Information Center

    Johnson, Leah E.; Wang, Eugene W.; Gilinsky, Nicole; He, Zhaomin; Carpenter, Clint; Nelson, C. Michael; Scheuermann, Brenda K.

    2013-01-01

    School-wide positive behavior interventions and supports (SW-PBIS) is a framework for creating safe and effective learning environments and cultivating a positive educational climate. Researchers show that SW-PBIS can improve behavioral outcomes, while demonstrations of a causal relationship between improvements in students' academic achievement…

  10. Exploring Safety in Township Secondary Schools in the Free State Province

    ERIC Educational Resources Information Center

    Masitsa, M. G.

    2011-01-01

    Research overwhelmingly suggests that effective teaching and learning can occur only in a safe and secure school environment. However, despite the plethora of laws and acts protecting teachers and learners in South African schools, scores of them are still unsafe. This study examines the safety of teachers and learners in township secondary…

  11. Occupational Safety and Health: A View of Current Practices in Agricultural Education

    ERIC Educational Resources Information Center

    Threeton, Mark D.; Ewing, John C.; Evanoski, Danielle C.

    2015-01-01

    Providing safe and secure teaching and learning environments within schools is an ongoing process which requires a significant amount of attention. Therefore, this study sought to: 1) explore safety and health practices within secondary Agricultural Mechanics Education; and 2) identify the perceived obstacles which appear to hinder implementation…

  12. Occupational Safety and Health Practices: An Alarming Call to Action

    ERIC Educational Resources Information Center

    Threeton, Mark D.; Evanoski, Danielle C.

    2014-01-01

    In an effort to provide additional insight on providing a secure teaching and learning environment within schools, this study sought to: (1) explore the safety and health practices within Career and Technical Education (CTE); and (2) identify the perceived obstacles which appear to hinder implementation of health and safety programs. While it…

  13. From the Ground Up: Establishing Strong Core Policies for Infants, Toddlers, and Families

    ERIC Educational Resources Information Center

    Ullrich, Rebecca; Cole, Patricia; Gebhard, Barbara; Matthews, Hannah; Schmit, Stephanie

    2017-01-01

    Because the earliest years of life are a period of incredible growth, they present an opportunity to shape strong and positive development. Good health, secure and stable families, and positive early learning environments are necessary to foster children's physical, intellectual, and social-emotional development during this significant period. Yet…

  14. Unlocking the Laboratory: Autonomous Wireless Sensor Authentication in Practice

    ERIC Educational Resources Information Center

    Huggard, Meriel; McGoldrick, Ciaran

    2013-01-01

    Purpose: The purpose of this study is to evaluate a practical laboratory task where final year undergraduate students design, implement and validate an inferred security wireless sensor access system. Design/methodology/approach: The quality of the learning and technical environment was evaluated from a number of perspectives using a mixed methods…

  15. Healing Environments: What Design Factors Really Matter According to Patients? An Exploratory Analysis.

    PubMed

    Schreuder, Eliane; Lebesque, Layla; Bottenheft, Charelle

    2016-10-01

    The main aim of this research was to identify the impact of design characteristics (DCs) of a patient room on self-reported patient well-being. This knowledge enables the construction of healing environments focusing on DCs that maximize well-being. Six themes were identified in literature that create healing environments: spatial comfort, safety and security, autonomy, sensory comfort, privacy, and social comfort. We wondered what themes and associated DCs should be prioritized if needed to maximize well-being. The physical environment of patient rooms in four hospital locations was measured and patients who stayed in these rooms were asked to evaluate the room design on above mentioned themes and its contribution to their well-being. We used a machine-learning technique and regression analysis to find relations between the physical environment of a patient room and patient well-being. We found that spatial comfort, safety and security, autonomy, and associated DCs have the strongest ability to influence patient's self-reported well-being in a patient room. Privacy appears to have the smallest influence. © The Author(s) 2016.

  16. A Security Monitoring Framework For Virtualization Based HEP Infrastructures

    NASA Astrophysics Data System (ADS)

    Gomez Ramirez, A.; Martinez Pedreira, M.; Grigoras, C.; Betev, L.; Lara, C.; Kebschull, U.; ALICE Collaboration

    2017-10-01

    High Energy Physics (HEP) distributed computing infrastructures require automatic tools to monitor, analyze and react to potential security incidents. These tools should collect and inspect data such as resource consumption, logs and sequence of system calls for detecting anomalies that indicate the presence of a malicious agent. They should also be able to perform automated reactions to attacks without administrator intervention. We describe a novel framework that accomplishes these requirements, with a proof of concept implementation for the ALICE experiment at CERN. We show how we achieve a fully virtualized environment that improves the security by isolating services and Jobs without a significant performance impact. We also describe a collected dataset for Machine Learning based Intrusion Prevention and Detection Systems on Grid computing. This dataset is composed of resource consumption measurements (such as CPU, RAM and network traffic), logfiles from operating system services, and system call data collected from production Jobs running in an ALICE Grid test site and a big set of malware samples. This malware set was collected from security research sites. Based on this dataset, we will proceed to develop Machine Learning algorithms able to detect malicious Jobs.

  17. Creating a Culture of High Expectations, Student Motivation and Instructional Support in Schools and Classrooms.

    ERIC Educational Resources Information Center

    Southern Regional Education Board (SREB), 2012

    2012-01-01

    Schoolwide support for higher achievement is essential. Students need a nurturing environment where they feel secure about learning, where the goal is success for every student and where students are confident they will receive mentoring and encouragement to prepare for their futures. Many schools are reinventing themselves to motivate students to…

  18. Helping Students with Disabilities Transition to College: 21 Tips for Students with LD and/or ADD/ADHD

    ERIC Educational Resources Information Center

    Connor, David J.

    2012-01-01

    Making the transition from high school to college poses challenges for most students. Moving from a secure, regulated world of secondary education into an unfamiliar environment requiring greater independence can be a destabilizing experience. For students with learning disabilities (LD) and/or Attention Deficit Disorder (ADD), managing this…

  19. A Unique Design for High-Impact Safety and Awareness Training

    ERIC Educational Resources Information Center

    Calandra, Brendan; Harmon, Stephen W.

    2012-01-01

    The authors were asked to design and develop a large-scale, web-based learning environment that would effectively assist international aid workers in conducting their daily tasks in the field, at home and in the office in a safer and more secure fashion. The design, development and dissemination of the training needed to be done quickly,…

  20. Promoting Continuing Computer Science Education through a Massively Open Online Course

    ERIC Educational Resources Information Center

    Oliver, Kevin

    2016-01-01

    This paper presents the results of a comparison study between graduate students taking a software security course at an American university and international working professionals taking a version of the same course online through a free massive open online course (MOOC) created in the Google CourseBuilder learning environment. A goal of the study…

  1. Achieving Learning Objectives through E-Voting Case Studies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bishop, Matt; Frincke, Deb

    2007-01-01

    The recent explosion in the use of electronic voting machines provides a wonderful opportunity to teach students about computer security. Because voting is the cornerstone of any democracy or republic, the need for secure voting systems is obvious. Further, students are familiar with how to vote. But the complexity of mapping a traditional process of voting using secret ballots to an electronic environment shows the difficulties of implementing secure processes and systems. In this article, we show a high level mapping from selected security and privacy education outcomes into a target ‘case study’ of developing electronic voting machines intended formore » traditional secret ballot elections. Our intent is to motivate both a set of lessons specifically involving e-voting, as well as illustrating the usefulness of having a mapping from outcomes to simplified case studies.« less

  2. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ezzell, G; Sanscrainte, E; Tomlinson, C

    Have a question about RO-ILS: Radiation Oncology Incident Learning System™, or interested in learning more? Sponsored by the American Society for Radiation Oncology (ASTRO) and AAPM, RO-ILS is the only medical specialty society-sponsored incident learning system for radiation oncology. It facilitates safer and higher quality care in radiation oncology by providing a mechanism for shared learning in a secure and non-punitive environment. Please join our RO-ILS experts for a question and answer session on Wednesday, July 15th at 8:30 in the Partners in Solutions Room in Exhibit Hall C. Our experts include: Gary Ezzell, PhD, Mayo Clinic Arizona, [Brett Miller,more » Phillip Beron, and Derek Brown], Emily Sanscrainte from Clarity PSO and Cindy Tomlinson, MPP, ASTRO.« less

  3. Indian Education in Wisconsin Under State Contract, Johnson-O'Malley Program, 1969-70, Twenty-Third Annual Report.

    ERIC Educational Resources Information Center

    Kingston, A. W.; Embertson, E. N.

    Johnson-O'Malley-funded projects in Wisconsin schools are described in this 1969-70 annual report on Indian education. Objectives of the Johnson-O'Malley Program are (1) to secure for Indian children the educational opportunities and learning environment necessary to fulfill their educational needs; (2) to promote understanding and improve…

  4. Spatial Data from Transportation Studies and Surveys | Transportation

    Science.gov Websites

    transportation studies and surveys, submit an application for approval to connect to a restricted secure portal environment. For a list of studies and surveys, see cleansed data. Application Process For accessing spatial data, learn about the application and approval process. If you'd like to apply to access the spatial

  5. Effective Teaching of Able Pupils in the Primary School: The Findings of the Oxfordshire Effective Teachers of Able Pupils Project.

    ERIC Educational Resources Information Center

    Eyre, Deborah; Coates, David; Fitzpatrick, Mary; Higgins, Chris; McClure, Lynne; Wilson, Helen; Chamberlin, Rosemary

    2002-01-01

    A review of British research on effective teaching of able students leads to a report on the Oxfordshire Effective Teachers of Able Pupils Project. This study found effective teachers shared similar beliefs about learning, had empathy with the needs of able children, created a secure classroom environment, held high expectations, used…

  6. Supporting Case-Based Learning in Information Security with Web-Based Technology

    ERIC Educational Resources Information Center

    He, Wu; Yuan, Xiaohong; Yang, Li

    2013-01-01

    Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…

  7. The Future of Nonproliferation in a Changed and Changing Environment: A Workshop Summary

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dreicer, M.

    2016-08-30

    The Center for Global Security Research and Global Security Principal Directorate at Lawrence Livermore National Laboratory convened a workshop in July 2016 to consider “The Future of Nonproliferation in a Changed and Changing Security Environment.” We took a broad view of nonproliferation, encompassing not just the treaty regime but also arms control, threat reduction, counter-­proliferation, and countering nuclear terrorism. We gathered a group of approximately 60 experts from the technical, academic, political, defense and think tank communities and asked them what—and how much—can reasonably be accomplished in each of these areas in the 5 to 10 years ahead. Discussion wasmore » on a not-­for-­attribution basis. This document provides a summary of key insights and lessons learned, and is provided to help stimulate broader public discussion of these issues. It is a collection of ideas as informally discussed and debated among a group of experts. The ideas reported here are the personal views of individual experts and should not be attributed to Lawrence Livermore National Laboratory.« less

  8. A Security Framework for Online Distance Learning and Training.

    ERIC Educational Resources Information Center

    Furnell, S. M.; Onions, P. D.; Bleimann, U.; Gojny, U.; Knahl, M.; Roder, H. F.; Sanders, P. W.

    1998-01-01

    Presents a generic reference model for online distance learning and discusses security issues for each stage (enrollment, study, completion, termination, suspension). Discusses a security framework (authentication and accountability, access control, intrusion detection, network communications, nonrepudiation, learning resources provider…

  9. CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 3

    DTIC Science & Technology

    2008-03-01

    describes essentials for requirements development and management. In addi- tion to providing training, eLearning and consulting services, she speaks at and...information, support sense- making, enable collaborative decision making, and effect changes in the physical environment. For example, the Global ...across layers, which enables effective use of resources and helps enforce security and confiden- tiality policies. Global Data Space DDS provides a

  10. Information Security: Federal Guidance Needed to Address Control Issues With Implementing Cloud Computing

    DTIC Science & Technology

    2010-05-01

    Figure 2: Cloud Computing Deployment Models 13 Figure 3: NIST Essential Characteristics 14 Figure 4: NASA Nebula Container 37...Access Computing Environment (RACE) program, the National Aeronautics and Space Administration’s (NASA) Nebula program, and the Department of...computing programs: the DOD’s RACE program; NASA’s Nebula program; and Department of Transportation’s CARS program, including lessons learned related

  11. A Case Study of a Southern California Elementary School District's Comprehensive School Safety Plan: Experiences and Perceptions of School Leaders and Teachers

    ERIC Educational Resources Information Center

    Favila, Marisela

    2013-01-01

    For children to be successful, schools must provide a safe and secure environment in which teachers can teach and students can learn (Skiba & Sprague, 2008). In California, state regulations require that schools maintain an appropriate school climate on campus, in classrooms, and at school sponsored events (California Education Code 35294).…

  12. Honeynet Learning: Discovering IT Security

    ERIC Educational Resources Information Center

    del Moral Talabis, Mark Ryan

    2007-01-01

    Learning IT Security in a classroom setting has often been a frustrating endeavor for both instructors and students alike. From our experience, traditional instructional methods like direct instruction and lectures though widely used and effective in most other areas have significant shortcomings when applied in IT security learning. In this…

  13. The Application of System Dynamics to the Integration of National Laboratory Research and K-12 Education

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mills, James Ignatius; Zounar Harbour, Elda D

    2001-08-01

    The Idaho National Engineering and Environmental Laboratory (INEEL) is dedicated to finding solutions to problems related to the environment, energy, economic competitiveness, and national security. In an effort to attract and retain the expertise needed to accomplish these challenges, the INEEL is developing a program of broad educational opportunities that makes continuing education readily available to all laboratory employees, beginning in the K–12 environment and progressing through post-graduate education and beyond. One of the most innovative educational approaches being implemented at the laboratory is the application of STELLA© dynamic learning environments, which facilitate captivating K–12 introductions to the complex energymore » and environmental challenges faced by global societies. These simulations are integrated into lesson plans developed by teachers in collaboration with INEEL scientists and engineers. This approach results in an enjoyable and involved learning experience, and an especially positive introduction to the application of science to emerging problems of great social and environmental consequence.« less

  14. Policies | High-Performance Computing | NREL

    Science.gov Websites

    Use Learn about policy governing user accountability, resource use, use by foreign nationals states. Data Security Learn about the data security policy, including data protection, data security retention policy, including project-centric and user-centric data. Shared Storage Usage Learn about a policy

  15. Challenges of information security incident learning: An industrial case study in a Chinese healthcare organization.

    PubMed

    He, Ying; Johnson, Chris

    2017-12-01

    Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern of the public. However, previous studies showed that organizations had not effectively learned lessons from security incidents. Incident learning as an essential activity in the "follow-up" phase of security incident response lifecycle has long been addressed but not given enough attention. This paper conducted a case study in a healthcare organization in China to explore their current obstacles in the practice of incident learning. We interviewed both IT professionals and healthcare professionals. The results showed that the organization did not have a structured way to gather and redistribute incident knowledge. Incident response was ineffective in cycling incident knowledge back to inform security management. Incident reporting to multiple stakeholders faced a great challenge. In response to this case study, we suggest the security assurance modeling framework to address those obstacles.

  16. Performing private database queries in a real-world environment using a quantum protocol.

    PubMed

    Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang

    2014-06-10

    In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre.

  17. Performing private database queries in a real-world environment using a quantum protocol

    PubMed Central

    Chan, Philip; Lucio-Martinez, Itzel; Mo, Xiaofan; Simon, Christoph; Tittel, Wolfgang

    2014-01-01

    In the well-studied cryptographic primitive 1-out-of-N oblivious transfer, a user retrieves a single element from a database of size N without the database learning which element was retrieved. While it has previously been shown that a secure implementation of 1-out-of-N oblivious transfer is impossible against arbitrarily powerful adversaries, recent research has revealed an interesting class of private query protocols based on quantum mechanics in a cheat sensitive model. Specifically, a practical protocol does not need to guarantee that the database provider cannot learn what element was retrieved if doing so carries the risk of detection. The latter is sufficient motivation to keep a database provider honest. However, none of the previously proposed protocols could cope with noisy channels. Here we present a fault-tolerant private query protocol, in which the novel error correction procedure is integral to the security of the protocol. Furthermore, we present a proof-of-concept demonstration of the protocol over a deployed fibre. PMID:24913129

  18. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template.

    PubMed

    He, Ying; Johnson, Chris

    2015-11-01

    The recurrence of past security breaches in healthcare showed that lessons had not been effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning from incidents and to share security knowledge to prevent future attacks. Generic Security Templates (GSTs) have been proposed to facilitate this knowledge transfer. The objective of this paper is to evaluate whether potential users in healthcare organisations can exploit the GST technique to share lessons learned from security incidents. We conducted a series of case studies to evaluate GSTs. In particular, we used a GST for a security incident in the US Veterans' Affairs Administration to explore whether security lessons could be applied in a very different Chinese healthcare organisation. The results showed that Chinese security professional accepted the use of GSTs and that cyber security lessons could be transferred to a Chinese healthcare organisation using this approach. The users also identified the weaknesses and strengths of GSTs, providing suggestions for future improvements. Generic Security Templates can be used to redistribute lessons learned from security incidents. Sharing cyber security lessons helps organisations consider their own practices and assess whether applicable security standards address concerns raised in previous breaches in other countries. The experience gained from this study provides the basis for future work in conducting similar studies in other healthcare organisations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  19. Review of July 2013 Nuclear Security Insider Threat Exercise November 2013

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pederson, Ann C.; Snow, Catherine L.; Townsend, Jeremy

    2013-11-01

    This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decisionmore » makers and management in determining the most effective policies and procedures for their country or facility.« less

  20. Information Security Trends and Issues in the Moodle E-Learning Platform: An Ethnographic Content Analysis

    ERIC Educational Resources Information Center

    Schultz, Christopher

    2012-01-01

    Empirical research on information security trends and practices in e-learning is scarce. Many articles that have been published apply basic information security concepts to e-learning and list potential threats or propose frameworks for classifying threats. The purpose of this research is to identify, categorize and understand trends and issues in…

  1. A cooperative model for IS security risk management in distributed environment.

    PubMed

    Feng, Nan; Zheng, Chundong

    2014-01-01

    Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively.

  2. An Optimization of the Basic School Military Occupational Skill Assignment Process

    DTIC Science & Technology

    2003-06-01

    Corps Intranet (NMCI)23 supports it. We evaluated the use of Microsoft’s SQL Server, but dismissed this after learning that TBS did not possess a SQL ...Server license or a qualified SQL Server administrator.24 SQL Server would have provided for additional security measures not available in MS...administrator. Although not has powerful as SQL Server, MS Access can handle the multi-user environment necessary for this system.25 The training

  3. Supervisory Control and Data Acquisition (SCADA) Security Awareness In a Resource Constrained Learning Environment

    DTIC Science & Technology

    2014-06-16

    SCADA systems. These professionals should be aware of the vulnerabilities so they can take intelligent precautions to mitigate attacks. SCADA...vulnerabilities • Describe mitigation options for protecting a system from SCADA attacks For students that go on to pursue a degree in Computer...from SCADA attacks For students who do not remain in the IT realm, this introduction provides an awareness to help them mitigate threats for their

  4. DOE's Computer Incident Advisory Capability (CIAC)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schultz, E.

    1990-09-01

    Computer security is essential in maintaining quality in the computing environment. Computer security incidents, however, are becoming more sophisticated. The DOE Computer Incident Advisory Capability (CIAC) team was formed primarily to assist DOE sites in responding to computer security incidents. Among CIAC's other responsibilities are gathering and distributing information to DOE sites, providing training workshops, coordinating with other agencies, response teams, and vendors, creating guidelines for incident handling, and developing software tools. CIAC has already provided considerable assistance to DOE sites faced with virus infections and worm and hacker attacks, has issued over 40 information bulletins, and has developed andmore » presented a workshop on incident handling. CIAC's experience in helping sites has produced several lessons learned, including the need to follow effective procedures to avoid virus infections in small systems and the need for sound password management and system administration in networked systems. CIAC's activity and scope will expand in the future. 4 refs.« less

  5. Secure Remote Access Issues in a Control Center Environment

    NASA Technical Reports Server (NTRS)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  6. Transitions in sensitive period attachment learning in infancy: the role of corticosterone.

    PubMed

    Sullivan, Regina M; Holman, Parker J

    2010-05-01

    Survival of altricial infants, including humans and rats, depends on attachment to the caregiver - a process that requires infants to recognize, learn, and remember their attachment figure. The demands of a dynamic environment combined with a maturing organism require frequent neurobehavioral reorganization. This restructuring of behavior and its supporting neural circuitry can be viewed through the unique lens of attachment learning in rats in which preference learning is enhanced and aversion learning is attenuated. Behavioral restructuring is well adapted to securing the crucial infant-caregiver relationship regardless of the quality of care. With maturation and the end of the infant-caregiver attachment learning period, the complex interplay of neural structures, hormones, and social behavior coordinates the developing rat's eventual transition to life outside of the nest. Nevertheless, early-life environmental and physiological stressors can alter the resilient nature of this system, particularly with respect to the amygdala, and these changes may provide important clues to understanding the lasting effects of early stress. (c) 2009 Elsevier Ltd. All rights reserved.

  7. A Cooperative Model for IS Security Risk Management in Distributed Environment

    PubMed Central

    Zheng, Chundong

    2014-01-01

    Given the increasing cooperation between organizations, the flexible exchange of security information across the allied organizations is critical to effectively manage information systems (IS) security in a distributed environment. In this paper, we develop a cooperative model for IS security risk management in a distributed environment. In the proposed model, the exchange of security information among the interconnected IS under distributed environment is supported by Bayesian networks (BNs). In addition, for an organization's IS, a BN is utilized to represent its security environment and dynamically predict its security risk level, by which the security manager can select an optimal action to safeguard the firm's information resources. The actual case studied illustrates the cooperative model presented in this paper and how it can be exploited to manage the distributed IS security risk effectively. PMID:24563626

  8. Securing 'supportive environments' for health in the face of ecosystem collapse: meeting the triple threat with a sociology of creative transformation.

    PubMed

    Poland, Blake; Dooris, Mark; Haluza-Delay, Randolph

    2011-12-01

    In this paper, we reflect on and explore what remains to be done to make the concept of supportive environments--one of the Ottawa Charter's five core action areas--a reality in the context of growing uncertainty about the future and accelerated pace of change. We pay particular attention to the physical environment, while underscoring the inextricable links between physical and social environments, and particularly the need to link social and environmental justice. The paper begins with a brief orientation to three emerging threats to health equity, namely ecological degradation, climate change, and peak oil, and their connection to economic instability, food security, energy security and other key determinants of health. We then present three contrasting perspectives on the nature of social change and how change is catalyzed, arguing for an examination of the conditions under which cultural change on the scale required to realize the vision of 'supportive environments for all' might be catalyzed, and the contribution that health promotion as a field could play in this process. Drawing on sociological theory, and specifically practice theory and the work of Pierre Bourdieu, we advocate rethinking education for social change by attending more adequately to the social conditions of transformative learning and cultural change. We conclude with an explication of three key implications for health promotion practice: a more explicit alignment with those seeking to curtail environmental destruction and promote environmental justice, strengthening engagement with local or settings-focused 'communities of practice' (such as the Transition Town movement), and finding new ways to creatively 'engage emergence', a significant departure from the current dominant focus on 'risk management'.

  9. Development of a HIPAA-compliant environment for translational research data and analytics.

    PubMed

    Bradford, Wayne; Hurdle, John F; LaSalle, Bernie; Facelli, Julio C

    2014-01-01

    High-performance computing centers (HPC) traditionally have far less restrictive privacy management policies than those encountered in healthcare. We show how an HPC can be re-engineered to accommodate clinical data while retaining its utility in computationally intensive tasks such as data mining, machine learning, and statistics. We also discuss deploying protected virtual machines. A critical planning step was to engage the university's information security operations and the information security and privacy office. Access to the environment requires a double authentication mechanism. The first level of authentication requires access to the university's virtual private network and the second requires that the users be listed in the HPC network information service directory. The physical hardware resides in a data center with controlled room access. All employees of the HPC and its users take the university's local Health Insurance Portability and Accountability Act training series. In the first 3 years, researcher count has increased from 6 to 58.

  10. A Learning-Based Approach to Reactive Security

    NASA Astrophysics Data System (ADS)

    Barth, Adam; Rubinstein, Benjamin I. P.; Sundararajan, Mukund; Mitchell, John C.; Song, Dawn; Bartlett, Peter L.

    Despite the conventional wisdom that proactive security is superior to reactive security, we show that reactive security can be competitive with proactive security as long as the reactive defender learns from past attacks instead of myopically overreacting to the last attack. Our game-theoretic model follows common practice in the security literature by making worst-case assumptions about the attacker: we grant the attacker complete knowledge of the defender's strategy and do not require the attacker to act rationally. In this model, we bound the competitive ratio between a reactive defense algorithm (which is inspired by online learning theory) and the best fixed proactive defense. Additionally, we show that, unlike proactive defenses, this reactive strategy is robust to a lack of information about the attacker's incentives and knowledge.

  11. Using K-12 Lessons Learned about How to Balance Accessibility and Test Security to Inform Licensure, Credentialing, and Certification Exam Policies

    ERIC Educational Resources Information Center

    Lazarus, Sheryl S.; van den Heuvel, Jill R.; Thurlow, Martha L.

    2017-01-01

    This paper explores how to balance test security and accessibility on licensure, credentialing, and certification exams. It examines K-12 test security policies related to educational assessments across states to discover lessons learned about how to meet accessibility needs of individuals with disabilities while minimizing test security risks. It…

  12. Data mining technique for a secure electronic payment transaction using MJk-RSA in mobile computing

    NASA Astrophysics Data System (ADS)

    G. V., Ramesh Babu; Narayana, G.; Sulaiman, A.; Padmavathamma, M.

    2012-04-01

    Due to the evolution of the Electronic Learning (E-Learning), one can easily get desired information on computer or mobile system connected through Internet. Currently E-Learning materials are easily accessible on the desktop computer system, but in future, most of the information shall also be available on small digital devices like Mobile, PDA, etc. Most of the E-Learning materials are paid and customer has to pay entire amount through credit/debit card system. Therefore, it is very important to study about the security of the credit/debit card numbers. The present paper is an attempt in this direction and a security technique is presented to secure the credit/debit card numbers supplied over the Internet to access the E-Learning materials or any kind of purchase through Internet. A well known method i.e. Data Cube Technique is used to design the security model of the credit/debit card system. The major objective of this paper is to design a practical electronic payment protocol which is the safest and most secured mode of transaction. This technique may reduce fake transactions which are above 20% at the global level.

  13. Secure Learning and Learning for Security: Research in the Intersection

    DTIC Science & Technology

    2010-05-13

    researchers to consider how Machine Learning and Statistics might be leveraged for constructing intelli - gent attacks. In a similar vein, security...Quantiles S am pl e Q ua nt ile s...8217 Residuals in Flow 144 Theoretical Quantiles S am pl e Q ua nt ile s 0 1 2 3 4 5 6 7 5. 0e + 07 1. 0e + 08 1. 5e + 08 Comparing Actual and Synthetic

  14. Evaluating the Security of Machine Learning Algorithms

    DTIC Science & Technology

    2008-05-20

    Two far-reaching trends in computing have grown in significance in recent years. First, statistical machine learning has entered the mainstream as a...computing applications. The growing intersection of these trends compels us to investigate how well machine learning performs under adversarial conditions... machine learning has a structure that we can use to build secure learning systems. This thesis makes three high-level contributions. First, we develop a

  15. Peace Operations in Mali: Theory into Practice Then Measuring Effectiveness

    DTIC Science & Technology

    2017-06-09

    community’s response along two broad lines of effort (LOE): Creating a Safe and Secure Environment and promoting Stable Governance. When seeking to achieve a... Safe and Secure Environment , two objectives were measured. Objective #1 sought the Cessation of Large Scale Violence. Success was attained, as...Creating a Safe and Secure Environment and promoting Stable Governance. When seeking to achieve a Safe and Secure Environment , two objectives were

  16. Distance Learning for Food Security and Rural Development: A Perspective from the United Nations Food and Agriculture Organization.

    ERIC Educational Resources Information Center

    McLean, Scott; Gasperini, Lavinia; Rudgard, Stephen

    2002-01-01

    The distance learning experiences of the United Nations Food and Agriculture Organization led to the following suggestions for applying distance learning strategies to the challenges of food security and rural development: use distance learning for the right reasons, be sensitive to context, use existing infrastructure, engage stakeholders, and…

  17. The Accident at TEPCO's Fukushima-Daiichi Nuclear Power Plant: Technical Description of What Happened and Lessons Learned for the Future

    NASA Astrophysics Data System (ADS)

    Omoto, Akira

    2012-02-01

    Tsunami that followed M9.0 earthquake on March 11^th left the Fukushima-Daiichi Nuclear Power Plants without power and heat sink. While water makeup continued by AC-independent systems to keep the fuel core covered by coolant, operating team tried to depressurize and enable low pressure injection to the reactor to avoid overheating but was not successful enough primarily due to limited available resources. This resulted in core melt, hydrogen explosion and release of radioactivity to the environment. Key lessons learned are; 1) safety regulation and safety culture, 2) workable/executable severe accident management procedure, 3) crisis management and 4) design. Implications on security include revealed vulnerability and the nexus of safety and security. Given the scale of damage to the environmental, attention must be paid to defense against it and to societal safety goal of nuclear power by considering offsite remedial costs, compensation to damage, energy replacement cost etc. A sort of root cause analysis first by asking ``Why nuclear community failed to prevent this accident?'' was initiated by the University of Tokyo.

  18. Interorganizational Training Opportunities for Conventional US Army Forces

    DTIC Science & Technology

    2013-03-26

    INTERORGAHIZATIOIW. TRAINING ~IllES FOR CONVENTIONAL US ARM’f FORCES (:1111~1 $1<Jit> ""’- CDf1’ S C ’ummond and Stoff Coli~’< Murin.: CtXpS t’JII...the contemporary operating environment are of great value to units in training. The partnered lessons learned in conjunction with a continued...requirements outlined in the National Security Strategy and the intent of the Commander in Chief.1 The President of the United States in conjunction with the

  19. Proceedings of the Symposium on the Role of Behavioral Science in Physical Security (5th Annual) Held at Gaithersburg, Maryland, June 11-12, 1980

    DTIC Science & Technology

    1981-06-01

    targets that have been cali- brated for different types of search tasks. Recognition tests might include visual recognition of site personnel, auditory ...Strength o Physiological processes o Auditory processes o Visual processes o Tactile sense o Psychomotor processes o Tolerance to environment o Learning...sensitive" to an easily measurable degree, and another third at a more subliminal level. This sensitivity is even further height- ened in individuals by the

  20. Behavior of Machine Learning Algorithms in Adversarial Environments

    DTIC Science & Technology

    2010-11-23

    handwriting recog- nition [cf., Plamondon and Srihari, 2000], they also have potentially far-reaching utility for many applications in security, networking...cost of the largest ℓp cost ball that fits entirely within their convex hull; let’s say this cost is C† ≤ C+0 . To achieve ǫ-multiplicative optimality...optimal on Fconvex,’+’ for ℓ2 costs. The proof of this result is in Appendix C.4. This result says that there is no algorithm can generally achieve ǫ

  1. The Security of Machine Learning

    DTIC Science & Technology

    2008-04-24

    Machine learning has become a fundamental tool for computer security, since it can rapidly evolve to changing and complex situations. That...adaptability is also a vulnerability: attackers can exploit machine learning systems. We present a taxonomy identifying and analyzing attacks against machine ...We use our framework to survey and analyze the literature of attacks against machine learning systems. We also illustrate our taxonomy by showing

  2. Secure entanglement distillation for double-server blind quantum computation.

    PubMed

    Morimae, Tomoyuki; Fujii, Keisuke

    2013-07-12

    Blind quantum computation is a new secure quantum computing protocol where a client, who does not have enough quantum technologies at her disposal, can delegate her quantum computation to a server, who has a fully fledged quantum computer, in such a way that the server cannot learn anything about the client's input, output, and program. If the client interacts with only a single server, the client has to have some minimum quantum power, such as the ability of emitting randomly rotated single-qubit states or the ability of measuring states. If the client interacts with two servers who share Bell pairs but cannot communicate with each other, the client can be completely classical. For such a double-server scheme, two servers have to share clean Bell pairs, and therefore the entanglement distillation is necessary in a realistic noisy environment. In this Letter, we show that it is possible to perform entanglement distillation in the double-server scheme without degrading the security of blind quantum computing.

  3. Archiving Data from New Survey Technologies: Lessons Learned on Enabling Research with High-Precision Data While Preserving Participant Privacy: Preprint

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gonder, J.; Burton, E.; Murakami, E.

    2014-11-01

    During the past 15 years, increasing numbers of organizations and planning agencies have begun collecting high-resolution Global Positioning System (GPS) travel data. Despite the significant effort and expense to collect it, privacy concerns often lead to underutilization of the data. To address this dilemma of providing data access while preserving privacy, the National Renewable Energy Laboratory, with support from the U.S. Department of Transportation and U.S. Department of Energy, established the Transportation Secure Data Center (TSDC). Lessons drawn from best-practice examples from other data centers have helped shape the structure and operating procedures for the TSDC, which functions under themore » philosophy of first and foremost preserving privacy, but doing so in a way that balances security with accessibility and usability of the data for legitimate research. This paper provides details about the TSDC approach toward achieving these goals, which has included creating a secure enclave with no external access for backing up and processing raw data, a publicly accessible website for downloading cleansed data, and a secure portal environment through which approved users can work with detailed spatial data using a variety of tools and reference information. This paper also describes lessons learned from operating the TSDC with respect to improvements in GPS data handling, processing, and user support, along with plans for continual enhancements to better support the needs of both data providers and users and to thus advance the research value derived from such valuable data.« less

  4. Secure and Efficient Regression Analysis Using a Hybrid Cryptographic Framework: Development and Evaluation

    PubMed Central

    Jiang, Xiaoqian; Aziz, Md Momin Al; Wang, Shuang; Mohammed, Noman

    2018-01-01

    Background Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data. Objective Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way. Methods Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time. Results Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results. Conclusions To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time. PMID:29506966

  5. Secure and Efficient Regression Analysis Using a Hybrid Cryptographic Framework: Development and Evaluation.

    PubMed

    Sadat, Md Nazmus; Jiang, Xiaoqian; Aziz, Md Momin Al; Wang, Shuang; Mohammed, Noman

    2018-03-05

    Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data. Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way. Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time. Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results. To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time. ©Md Nazmus Sadat, Xiaoqian Jiang, Md Momin Al Aziz, Shuang Wang, Noman Mohammed. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 05.03.2018.

  6. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  7. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  8. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  9. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  10. 32 CFR 2001.23 - Classification marking in the electronic environment.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Identification and Markings § 2001.23 Classification marking in the electronic environment. (a) General. Classified national security information in the electronic environment shall be: (1...

  11. Midwifery students' experiences of simulation- and skills training.

    PubMed

    Lendahls, Lena; Oscarsson, Marie G

    2017-03-01

    In Sweden, simulation- and skills training are implemented in midwifery education in order to prepare students for clinical practice. Research regarding the use of both low to high levels of fidelity in simulation in midwifery programme is limited. The aim of this study was to explore midwifery students' experiences of simulation- and skills training. Midwifery students (n=61), at advanced level, were interviewed in 13 group interviews from 2011 to 2105. A semi-structured interview guide was used, and data were analysed by content analysis. The results are presented in four main categories: develops hands on skills and communication, power of collaborative learning, highly valued learning environment and facilitates clinical practice. The majority of students felt that the simulation- and skills training were necessary to become familiar with hands on skills. Having repetitive practices in a safe and secure environment was viewed as important, and students highly valued that mistakes could be made without fear of comprising patient safety. Student's collaboration, reflections and critical thinking increased learning ability. Simulation- and skills training created links between theory and practice, and the lecturer had an important role in providing instructions and feedback. Students felt prepared and confident before their clinical practice, and simulation- and skills training increased safety for all involved, resulting in students being more confident, as patients in clinical practice became less exposed. Furthermore, mentors were satisfied with students' basic skills. Simulation- and skills training support the development of midwifery skills. It creates links between theory and practice, which facilitates students' learning ability. Training needs to include reflections and critical thinking in order to develop their learning. The lecturer has an important role in encouraging time for reflections and creating safe environment during the skills and simulation training. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Best Practices and Lessons Learned In LANL Approaches to Transportation Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Drypolcher, Katherine Carr

    Presentation includes slides on Physical Protection of Material in Transit; Graded Approach for Implementation Controls; Security Requirements; LANL Lessons Learned; Shipping Violation; Unmonitored Shipment; Foreign shipment; and the Conclusion.

  13. Machine learning based Intelligent cognitive network using fog computing

    NASA Astrophysics Data System (ADS)

    Lu, Jingyang; Li, Lun; Chen, Genshe; Shen, Dan; Pham, Khanh; Blasch, Erik

    2017-05-01

    In this paper, a Cognitive Radio Network (CRN) based on artificial intelligence is proposed to distribute the limited radio spectrum resources more efficiently. The CRN framework can analyze the time-sensitive signal data close to the signal source using fog computing with different types of machine learning techniques. Depending on the computational capabilities of the fog nodes, different features and machine learning techniques are chosen to optimize spectrum allocation. Also, the computing nodes send the periodic signal summary which is much smaller than the original signal to the cloud so that the overall system spectrum source allocation strategies are dynamically updated. Applying fog computing, the system is more adaptive to the local environment and robust to spectrum changes. As most of the signal data is processed at the fog level, it further strengthens the system security by reducing the communication burden of the communications network.

  14. Security Risks and Protection in Online Learning: A Survey

    ERIC Educational Resources Information Center

    Chen, Yong; He, Wu

    2013-01-01

    This paper describes a survey of online learning which attempts to determine online learning providers' awareness of potential security risks and the protection measures that will diminish them. The authors use a combination of two methods: blog mining and a traditional literature search. The findings indicate that, while scholars have…

  15. Survey of Machine Learning Methods for Database Security

    NASA Astrophysics Data System (ADS)

    Kamra, Ashish; Ber, Elisa

    Application of machine learning techniques to database security is an emerging area of research. In this chapter, we present a survey of various approaches that use machine learning/data mining techniques to enhance the traditional security mechanisms of databases. There are two key database security areas in which these techniques have found applications, namely, detection of SQL Injection attacks and anomaly detection for defending against insider threats. Apart from the research prototypes and tools, various third-party commercial products are also available that provide database activity monitoring solutions by profiling database users and applications. We present a survey of such products. We end the chapter with a primer on mechanisms for responding to database anomalies.

  16. Secure Enclaves: An Isolation-centric Approach for Creating Secure High Performance Computing Environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Aderholdt, Ferrol; Caldwell, Blake A.; Hicks, Susan Elaine

    High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges formore » the use of shared infrastructure in HPC environments. This report details current state-of-the-art in virtualization, reconfigurable network enclaving via Software Defined Networking (SDN), and storage architectures and bridging techniques for creating secure enclaves in HPC environments.« less

  17. USGS Science Data Life Cycle Tools - Lessons Learned in moving to the Cloud

    NASA Astrophysics Data System (ADS)

    Frame, M. T.; Mancuso, T.; Hutchison, V.; Zolly, L.; Wheeler, B.; Urbanowski, S.; Devarakonda, R.; Palanisamy, G.

    2016-12-01

    The U.S Geological Survey (USGS) Core Science Systems has been working for the past year to design, re-architect, and implement several key tools and systems within the USGS Cloud Hosting Service supported by Amazon Web Services (AWS). As a result of emerging USGS data management policies that align with federal Open Data mandates, and as part of a concerted effort to respond to potential increasing user demand due to these policies, the USGS strategically began migrating its core data management tools and services to the AWS environment in hopes of leveraging cloud capabilities (i.e. auto-scaling, replication, etc.). The specific tools included: USGS Online Metadata Editor (OME); USGS Digital Object Identifier (DOI) generation tool; USGS Science Data Catalog (SDC); USGS ScienceBase system; and an integrative tool, the USGS Data Release Workbench, which steps bureau personnel through the process of releasing data. All of these tools existed long before the Cloud was available and presented significant challenges in migrating, re-architecting, securing, and moving to a Cloud based environment. Initially, a `lift and shift' approach, essentially moving as is, was attempted and various lessons learned about that approach will be discussed, along with recommendations that resulted from the development and eventual operational implementation of these tools. The session will discuss lessons learned related to management of these tools in an AWS environment; re-architecture strategies utilized for the tools; time investments through sprint allocations; initial benefits observed from operating within a Cloud based environment; and initial costs to support these data management tools.

  18. Research progress of microbial corrosion of reinforced concrete structure

    NASA Astrophysics Data System (ADS)

    Li, Shengli; Li, Dawang; Jiang, Nan; Wang, Dongwei

    2011-04-01

    Microbial corrosion of reinforce concrete structure is a new branch of learning. This branch deals with civil engineering , environment engineering, biology, chemistry, materials science and so on and is a interdisciplinary area. Research progress of the causes, research methods and contents of microbial corrosion of reinforced concrete structure is described. The research in the field is just beginning and concerted effort is needed to go further into the mechanism of reinforce concrete structure and assess the security and natural life of reinforce concrete structure under the special condition and put forward the protective methods.

  19. Thutmose - Investigation of Machine Learning-Based Intrusion Detection Systems

    DTIC Science & Technology

    2016-06-01

    research is being done to incorporate the field of machine learning into intrusion detection. Machine learning is a branch of artificial intelligence (AI...adversarial drift." Proceedings of the 2013 ACM workshop on Artificial intelligence and security. ACM. (2013) Kantarcioglu, M., Xi, B., and Clifton, C. "A...34 Proceedings of the 4th ACM workshop on Security and artificial intelligence . ACM. (2011) Dua, S., and Du, X. Data Mining and Machine Learning in

  20. Secure relay selection based on learning with negative externality in wireless networks

    NASA Astrophysics Data System (ADS)

    Zhao, Caidan; Xiao, Liang; Kang, Shan; Chen, Guiquan; Li, Yunzhou; Huang, Lianfen

    2013-12-01

    In this paper, we formulate relay selection into a Chinese restaurant game. A secure relay selection strategy is proposed for a wireless network, where multiple source nodes send messages to their destination nodes via several relay nodes, which have different processing and transmission capabilities as well as security properties. The relay selection utilizes a learning-based algorithm for the source nodes to reach their best responses in the Chinese restaurant game. In particular, the relay selection takes into account the negative externality of relay sharing among the source nodes, which learn the capabilities and security properties of relay nodes according to the current signals and the signal history. Simulation results show that this strategy improves the user utility and the overall security performance in wireless networks. In addition, the relay strategy is robust against the signal errors and deviations of some user from the desired actions.

  1. The "Double-Bind of Dependency": Early Relationships in Men with Learning Disabilities in Secure Settings

    ERIC Educational Resources Information Center

    Rayner, Kelly; Wood, Harry; Beail, Nigel

    2015-01-01

    Although the development of secure attachments has been shown to be more problematic for people with learning disabilities, there is a shortage of research into the attachment experience of people with learning disabilities who have broken the law. The present study used thematic analysis to explore the attachment experiences of 10 men with…

  2. 77 FR 12355 - Enabling a Secure Environment for Vehicle-to-Vehicle and Vehicle-to-Infrastructure Transactions...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-29

    ... DEPARTMENT OF TRANSPORTATION Enabling a Secure Environment for Vehicle-to-Vehicle and Vehicle- to... Enabling a Secure Environment for Vehicle- to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I... will be presented in August 2012 during the annual Connected Vehicle Safety public meeting and via...

  3. 76 FR 81516 - Homeland Security Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-28

    ... security; and provide information on the threat of an electromagnetic pulse attack and its associated... Operational Update. Electromagnetic Pulse (EMP) Threat--Lessons Learned and Areas of Vulnerability, and... and the potential threat of an electromagnetic pulse attack. Both will include lessons learned and...

  4. Ethical Hacking in Information Security Curricula

    ERIC Educational Resources Information Center

    Trabelsi, Zouheir; McCoey, Margaret

    2016-01-01

    Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…

  5. Sustainable Food Security Measurement: A Systemic Methodology

    NASA Astrophysics Data System (ADS)

    Findiastuti, W.; Singgih, M. L.; Anityasari, M.

    2017-04-01

    Sustainable food security measures how a region provides food for its people without endangered the environment. In Indonesia, it was legally measured in Food Security and Vulnerability (FSVA). However, regard to sustainable food security policy, the measurement has not encompassed the environmental aspect. This will lead to lack of environmental aspect information for adjusting the next strategy. This study aimed to assess Sustainable Food security by encompassing both food security and environment aspect using systemic eco-efficiency. Given existing indicator of cereal production level, total emission as environment indicator was generated by constructing Causal Loop Diagram (CLD). Then, a stock-flow diagram was used to develop systemic simulation model. This model was demonstrated for Indonesian five provinces. The result showed there was difference between food security order with and without environmental aspect assessment.

  6. Secure and Privacy Enhanced Gait Authentication on Smart Phone

    PubMed Central

    Choi, Deokjai

    2014-01-01

    Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR) and false rejection rate (FRR) of 3.92% and 11.76%, respectively, in terms of key length of 50 bits. PMID:24955403

  7. A Trusted Portable Computing Device

    NASA Astrophysics Data System (ADS)

    Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang

    A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.

  8. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program

    DTIC Science & Technology

    1988-11-01

    secure Zround environment and for providing local law enforcement support for airline and airport security measures. Finally, the passengers, the...operating environment for these air carriers. Airport security programs are designed to meet the threat to the specific airport. Of the 402 airports...assistance during this project. Responding to urgent requests from the Government of Liberia for onsite training of its airport security forces, FAA

  9. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment

    PubMed Central

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun

    2015-01-01

    Objectives Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. Methods This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. Results The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. Conclusions The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff. PMID:26618034

  10. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment.

    PubMed

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun; Cha, Hyo Soung

    2015-10-01

    Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff.

  11. 17 CFR 240.17Ad-21T - Operational capability in a Year 2000 environment.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Operational capability in a Year 2000 environment. 240.17Ad-21T Section 240.17Ad-21T Commodity and Securities Exchanges SECURITIES... Company Rules § 240.17Ad-21T Operational capability in a Year 2000 environment. (a) This section applies...

  12. U.S. Pacific Command Theater Security Cooperation: A Building Block to Cooperative Security in the Asia Pacific Region

    DTIC Science & Technology

    2010-03-17

    the sole "superpower" and once again changed the international security paradigm. Finally, on September 11, 2001, a terrorist attack on the U.S. by...be employed in the near term in order to improve operations in today’s security environment. Cooperative security is intended to change how militruy...default. However, the changing world security environment has dictated that the U.S. avoids any actions that could be perceived as heavy-handed

  13. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography

    PubMed Central

    2018-01-01

    Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one. PMID:29695066

  14. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.

    PubMed

    Coutinho, Murilo; de Oliveira Albuquerque, Robson; Borges, Fábio; García Villalba, Luis Javier; Kim, Tai-Hoon

    2018-04-24

    Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one.

  15. Deterministic entanglement distillation for secure double-server blind quantum computation.

    PubMed

    Sheng, Yu-Bo; Zhou, Lan

    2015-01-15

    Blind quantum computation (BQC) provides an efficient method for the client who does not have enough sophisticated technology and knowledge to perform universal quantum computation. The single-server BQC protocol requires the client to have some minimum quantum ability, while the double-server BQC protocol makes the client's device completely classical, resorting to the pure and clean Bell state shared by two servers. Here, we provide a deterministic entanglement distillation protocol in a practical noisy environment for the double-server BQC protocol. This protocol can get the pure maximally entangled Bell state. The success probability can reach 100% in principle. The distilled maximally entangled states can be remaind to perform the BQC protocol subsequently. The parties who perform the distillation protocol do not need to exchange the classical information and they learn nothing from the client. It makes this protocol unconditionally secure and suitable for the future BQC protocol.

  16. Deterministic entanglement distillation for secure double-server blind quantum computation

    PubMed Central

    Sheng, Yu-Bo; Zhou, Lan

    2015-01-01

    Blind quantum computation (BQC) provides an efficient method for the client who does not have enough sophisticated technology and knowledge to perform universal quantum computation. The single-server BQC protocol requires the client to have some minimum quantum ability, while the double-server BQC protocol makes the client's device completely classical, resorting to the pure and clean Bell state shared by two servers. Here, we provide a deterministic entanglement distillation protocol in a practical noisy environment for the double-server BQC protocol. This protocol can get the pure maximally entangled Bell state. The success probability can reach 100% in principle. The distilled maximally entangled states can be remaind to perform the BQC protocol subsequently. The parties who perform the distillation protocol do not need to exchange the classical information and they learn nothing from the client. It makes this protocol unconditionally secure and suitable for the future BQC protocol. PMID:25588565

  17. Security-by-Experiment: Lessons from Responsible Deployment in Cyberspace.

    PubMed

    Pieters, Wolter; Hadžiosmanović, Dina; Dechesne, Francien

    2016-06-01

    Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents (attackers) may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we outline how adversarial aspects are already taken into account in technology deployment in the field of cyber security, and what the paradigm of new technologies as social experiments can learn from this. In particular, we show the importance of adversarial roles in social experiments with new technologies.

  18. Evaluation of Ecological Environment Security in Contiguous Poverty Alleviation Area of Sichuan Province

    NASA Astrophysics Data System (ADS)

    Xian, W.; Chen, Y.; Chen, J.; Luo, X.; Shao, H.

    2018-04-01

    According to the overall requirements of ecological construction and environmental protection, rely on the national key ecological engineering, strengthen ecological environmental restoration and protection, improve forest cover, control soil erosion, construct important ecological security barrier in poor areas, inhibit poverty alleviation through ecological security in this area from environmental damage to the vicious cycle of poverty. Obviously, the dynamic monitoring of ecological security in contiguous destitute areas of Sichuan province has a policy sense of urgency and practical significance. This paper adopts RS technology and GIS technology to select the Luhe region of Jinchuan county and Ganzi prefecture as the research area, combined with the characteristics of ecological environment in poor areas, the impact factors of ecological environment are determined as land use type, terrain slope, vegetation cover, surface water, soil moisture and other factors. Using the ecological environmental safety assessment model, the ecological environment safety index is calculated. According to the index, the ecological environment safety of the research area is divided into four levels. The ecological environment safety classification map of 1990 in 2009 is obtained. It can be seen that with the human modern life and improve their economic level, the surrounding environment will be destroyed, because the research area ecological environment is now in good, the ecological environment generally tends to be stable. We should keep its ecological security good and improve local economic income. The relationship between ecological environmental security and economic coordinated development in poor areas has very important strategic significance.

  19. Directional learning and the provisioning of public goods.

    PubMed

    Nax, Heinrich H; Perc, Matjaž

    2015-01-26

    We consider an environment where players are involved in a public goods game and must decide repeatedly whether to make an individual contribution or not. However, players lack strategically relevant information about the game and about the other players in the population. The resulting behavior of players is completely uncoupled from such information, and the individual strategy adjustment dynamics are driven only by reinforcement feedbacks from each player's own past. We show that the resulting "directional learning" is sufficient to explain cooperative deviations away from the Nash equilibrium. We introduce the concept of k-strong equilibria, which nest both the Nash equilibrium and the Aumann-strong equilibrium as two special cases, and we show that, together with the parameters of the learning model, the maximal k-strength of equilibrium determines the stationary distribution. The provisioning of public goods can be secured even under adverse conditions, as long as players are sufficiently responsive to the changes in their own payoffs and adjust their actions accordingly. Substantial levels of public cooperation can thus be explained without arguments involving selflessness or social preferences, solely on the basis of uncoordinated directional (mis)learning.

  20. Experiments on Adaptive Techniques for Host-Based Intrusion Detection

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    DRAELOS, TIMOTHY J.; COLLINS, MICHAEL J.; DUGGAN, DAVID P.

    2001-09-01

    This research explores four experiments of adaptive host-based intrusion detection (ID) techniques in an attempt to develop systems that can detect novel exploits. The technique considered to have the most potential is adaptive critic designs (ACDs) because of their utilization of reinforcement learning, which allows learning exploits that are difficult to pinpoint in sensor data. Preliminary results of ID using an ACD, an Elman recurrent neural network, and a statistical anomaly detection technique demonstrate an ability to learn to distinguish between clean and exploit data. We used the Solaris Basic Security Module (BSM) as a data source and performed considerablemore » preprocessing on the raw data. A detection approach called generalized signature-based ID is recommended as a middle ground between signature-based ID, which has an inability to detect novel exploits, and anomaly detection, which detects too many events including events that are not exploits. The primary results of the ID experiments demonstrate the use of custom data for generalized signature-based intrusion detection and the ability of neural network-based systems to learn in this application environment.« less

  1. Temporal and Spatial Distribution of Ecological Security in Arid Region Based on GIS: A Case Study in Xinjiang

    NASA Astrophysics Data System (ADS)

    Zhang, Q.; Song, W.; Yang, J.

    2017-12-01

    Ecological security is close related to the people's survival and development. In the context of the global warming, with the increasingly frequent human activities, ecological and environmental problems have become increasingly prominent. Ecological security has aroused widespread concern, especially in the arid region. It has an important role in national security as well as political security, military security, economic security, social security. Taken Xinjiang as the research area, which is a typical arid region in China, this study establishes an ecological safety assessment indicator system from perspective of the generic process and the formation mechanism of the ecosystem. The framework is based on natural resources dimensions, natural environment dimensions and human disturbance dimensions. Water is the restrictive factor for the development of arid region, so the water resources carrying capacity is the main natural resource of the study area. The natural environment includes SPI(standardized precipitation index), dryness index, landscape vulnerability, NDVI. Human disturbance includes urbanization rate, population density, afforestation area, per capita GDP, water-saving irrigation area, fertilizer and pesticide application, agriculture Mechanical power, energy consumption. The expert scoring method and the coefficient of variation method are used to determine the weight of each indicator, and finally a comprehensive index is constructed to evaluate the ecological security of Xinjiang, that is, the ecological security index. The results indicate that the ecological security of Xinjiang is 0.43, which is in the critical area. The ecological security of Hami, Turpan and Karamay is the lowest, and the ecological security of the Arabian and Yili is the highest. The ecological security of the south in the Xinjiang is higher than that in the north. In short, ecological environment of Xinjiang is in a sensitive period. Effective ecological protection policy will ameliorate the ecological environment, on the contrary, high-intensity human activities will make it tends to deteriorate. This research would provide scientific guidance and suggestions for the ecological environment protection and sustainable development of Xinjiang.

  2. Water security evaluation in Yellow River basin

    NASA Astrophysics Data System (ADS)

    Jiang, Guiqin; He, Liyuan; Jing, Juan

    2018-03-01

    Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.

  3. 17 CFR 240.15b7-3T - Operational capability in a Year 2000 environment.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Operational capability in a Year 2000 environment. 240.15b7-3T Section 240.15b7-3T Commodity and Securities Exchanges SECURITIES... § 240.15b7-3T Operational capability in a Year 2000 environment. (a) This section applies to every...

  4. 17 CFR 240.15b7-3T - Operational capability in a Year 2000 environment.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Operational capability in a Year 2000 environment. 240.15b7-3T Section 240.15b7-3T Commodity and Securities Exchanges SECURITIES... § 240.15b7-3T Operational capability in a Year 2000 environment. (a) This section applies to every...

  5. 17 CFR 240.15b7-3T - Operational capability in a Year 2000 environment.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Operational capability in a Year 2000 environment. 240.15b7-3T Section 240.15b7-3T Commodity and Securities Exchanges SECURITIES... § 240.15b7-3T Operational capability in a Year 2000 environment. (a) This section applies to every...

  6. 17 CFR 240.15b7-3T - Operational capability in a Year 2000 environment.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Operational capability in a Year 2000 environment. 240.15b7-3T Section 240.15b7-3T Commodity and Securities Exchanges SECURITIES... § 240.15b7-3T Operational capability in a Year 2000 environment. (a) This section applies to every...

  7. 17 CFR 240.15b7-3T - Operational capability in a Year 2000 environment.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Operational capability in a Year 2000 environment. 240.15b7-3T Section 240.15b7-3T Commodity and Securities Exchanges SECURITIES... § 240.15b7-3T Operational capability in a Year 2000 environment. (a) This section applies to every...

  8. Traffic Analysis for Network Security using Learning Theory and Streaming Algorithms

    DTIC Science & Technology

    2008-09-01

    to have had friends who have immensely improved my research and presentation – David Brumley, Hubert Chan, Elena Nabieva, Vyas Sekar, and Runting Shi...Information Assurance and Security 2001, 2001. [15] Marco Barreno, Blaine Nelson, Russell Sears, Anthony D. Joseph, and J. D. Tygar. Can machine learning be

  9. It Security and EO Systems

    NASA Astrophysics Data System (ADS)

    Burnett, M.

    2010-12-01

    One topic that is beginning to influence the systems that support these goals is that of Information Technology (IT) Security. Unsecure systems are vulnerable to increasing attacks and other negative consequences; sponsoring agencies are correspondingly responding with more refined policies and more stringent security requirements. These affect how EO systems can meet the goals of data and service interoperability and harmonization through open access, transformation and visualization services. Contemporary systems, including the vision of a system-of-systems (such as GEOSS, the Global Earth Observation System of Systems), utilize technologies that support a distributed, global, net-centric environment. These types of systems have a high reliance on the open systems, web services, shared infrastructure and data standards. The broader IT industry has developed and used these technologies in their business and mission critical systems for many years. Unfortunately, the IT industry, and their customers have learned the importance of protecting their assets and resources (computing and information) as they have been forced to respond to an ever increasing number and more complex illegitimate “attackers”. This presentation will offer an overview of work done by the CEOS WGISS organization in summarizing security threats, the challenges to responding to them and capturing the current state of the practice within the EO community.

  10. Security risks associated with radio frequency identification in medical environments.

    PubMed

    Hawrylak, Peter J; Schimke, Nakeisha; Hale, John; Papa, Mauricio

    2012-12-01

    Radio frequency identification (RFID) is a form of wireless communication that is used to identify assets and people. RFID has significant benefits to the medical environment. However, serious security threats are present in RFID systems that must be addressed in a medical environment. Of particular interest are threats to patient privacy and safety based on interception of messages, interruption of communication, modification of data, and fabrication of messages and devices. This paper presents an overview of these security threats present in RFID systems in a medical environment and provides guidance on potential solutions to these threats. This paper provides a roadmap for researchers and implementers to address the security issues facing RFID in the medical space.

  11. Human Performance Models of Pilot Behavior

    NASA Technical Reports Server (NTRS)

    Foyle, David C.; Hooey, Becky L.; Byrne, Michael D.; Deutsch, Stephen; Lebiere, Christian; Leiden, Ken; Wickens, Christopher D.; Corker, Kevin M.

    2005-01-01

    Five modeling teams from industry and academia were chosen by the NASA Aviation Safety and Security Program to develop human performance models (HPM) of pilots performing taxi operations and runway instrument approaches with and without advanced displays. One representative from each team will serve as a panelist to discuss their team s model architecture, augmentations and advancements to HPMs, and aviation-safety related lessons learned. Panelists will discuss how modeling results are influenced by a model s architecture and structure, the role of the external environment, specific modeling advances and future directions and challenges for human performance modeling in aviation.

  12. New project? Don't analyze--act.

    PubMed

    Schlesinger, Leonard A; Kiefer, Charles F; Brown, Paul B

    2012-03-01

    In a predictable world, getting a new initiative off the ground typically involves analyzing the market, creating a forecast, and writing a business plan. But what about in an unpredictable environment? The authors recommend looking to those who are experts in navigating extreme uncertainty while minimizing risk: serial entrepreneurs. These business leaders act, learn, and build their way into the future. Managers in traditional organizations can do the same, starting with smart, low-risk steps that follow simple rules: Use the means at hand; stay within an acceptable loss; secure only the commitment needed for the next step; bring along only volunteers; link the initiative to a business imperative; produce early results; and manage expectations. Momentum is gained by continuing to act based on what is learned at each step. The launch of Clorox's Green Works product line is discussed as an example.

  13. Information Security Awareness On-Line Materials Design with Knowledge Maps

    ERIC Educational Resources Information Center

    Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan

    2011-01-01

    Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…

  14. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 25 2011-07-01 2011-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National security...

  15. 40 CFR 205.5-2 - National security exemptions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false National security exemptions. 205.5-2 Section 205.5-2 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS General Provisions § 205.5-2 National security...

  16. Metacognitive components in smart learning environment

    NASA Astrophysics Data System (ADS)

    Sumadyo, M.; Santoso, H. B.; Sensuse, D. I.

    2018-03-01

    Metacognitive ability in digital-based learning process helps students in achieving learning goals. So that digital-based learning environment should make the metacognitive component as a facility that must be equipped. Smart Learning Environment is the concept of a learning environment that certainly has more advanced components than just a digital learning environment. This study examines the metacognitive component of the smart learning environment to support the learning process. A review of the metacognitive literature was conducted to examine the components involved in metacognitive learning strategies. Review is also conducted on the results of study smart learning environment, ranging from design to context in building smart learning. Metacognitive learning strategies certainly require the support of adaptable, responsive and personalize learning environments in accordance with the principles of smart learning. The current study proposed the role of metacognitive component in smart learning environment, which is useful as the basis of research in building environment in smart learning.

  17. Report: EPA’s Radiation and Indoor Environments National Laboratory Should Improve Its Computer Room Security Controls

    EPA Pesticide Factsheets

    Report #12-P-0847, September 21, 2012.Our review of the security posture and in-place environmental controls of EPA’s Radiation and Indoor Environments National Laboratory computer room disclosed an array of security and environmental control deficiencies.

  18. 77 FR 2450 - Security Zone; Potomac and Anacostia Rivers, Washington, DC

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-18

    ... implement comprehensive port security regimes designed to safeguard human life, vessels, and waterfront... protect life, property and the environment, therefore, a 30-day notice period is impracticable. Delaying... enhance public and maritime safety and security in order to safeguard life, property, and the environment...

  19. Learning to provide children with a secure base and a safe haven: The Circle of Security-Parenting (COS-P) group intervention.

    PubMed

    Kim, Monica; Woodhouse, Susan S; Dai, Chenchen

    2018-05-21

    Insecure attachment is linked to a host of negative child outcomes, including internalizing and externalizing behavior problems. Circle of Security-Parenting (COS-P) is a manualized, video-based, eight unit, group parenting intervention to promote children's attachment security. COS-P was designed to be easily implemented, so as to make attachment interventions more widely available to families. We present the theoretical background of COS-P, research evidence supporting the COS approach, as well as a description of the COS-P intervention protocol. The case example of "Alexa," mother of three children (aged 7, 6, and 4 years), illustrates how parents can make use of the COS-P intervention to better understand children's needs, build skills in observing and interpreting children's signals, learn to recognize and regulate their own responses to their children, and learn new ways of responding to children's needs. © 2018 Wiley Periodicals, Inc.

  20. Securing Resources in Collaborative Environments: A Peer-to-peerApproach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.

    2005-09-19

    We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.

  1. Empirical Analysis and Automated Classification of Security Bug Reports

    NASA Technical Reports Server (NTRS)

    Tyo, Jacob P.

    2016-01-01

    With the ever expanding amount of sensitive data being placed into computer systems, the need for effective cybersecurity is of utmost importance. However, there is a shortage of detailed empirical studies of security vulnerabilities from which cybersecurity metrics and best practices could be determined. This thesis has two main research goals: (1) to explore the distribution and characteristics of security vulnerabilities based on the information provided in bug tracking systems and (2) to develop data analytics approaches for automatic classification of bug reports as security or non-security related. This work is based on using three NASA datasets as case studies. The empirical analysis showed that the majority of software vulnerabilities belong only to a small number of types. Addressing these types of vulnerabilities will consequently lead to cost efficient improvement of software security. Since this analysis requires labeling of each bug report in the bug tracking system, we explored using machine learning to automate the classification of each bug report as a security or non-security related (two-class classification), as well as each security related bug report as specific security type (multiclass classification). In addition to using supervised machine learning algorithms, a novel unsupervised machine learning approach is proposed. An ac- curacy of 92%, recall of 96%, precision of 92%, probability of false alarm of 4%, F-Score of 81% and G-Score of 90% were the best results achieved during two-class classification. Furthermore, an accuracy of 80%, recall of 80%, precision of 94%, and F-score of 85% were the best results achieved during multiclass classification.

  2. Subtypes of Attachment Security in School-Age Children with Learning Disabilities

    ERIC Educational Resources Information Center

    Al-Yagon, Michal

    2012-01-01

    This study explored children's secure attachment with both parents versus one parent, as well as the unique role of children's patterns of close relationships with father and mother, for a deeper understanding of maladjustment problems among children with learning disabilities (LD). Specifically, this study identified subgroups of children with…

  3. A Cluster-Based Framework for the Security of Medical Sensor Environments

    NASA Astrophysics Data System (ADS)

    Klaoudatou, Eleni; Konstantinou, Elisavet; Kambourakis, Georgios; Gritzalis, Stefanos

    The adoption of Wireless Sensor Networks (WSNs) in the healthcare sector poses many security issues, mainly because medical information is considered particularly sensitive. The security mechanisms employed are expected to be more efficient in terms of energy consumption and scalability in order to cope with the constrained capabilities of WSNs and patients’ mobility. Towards this goal, cluster-based medical WSNs can substantially improve efficiency and scalability. In this context, we have proposed a general framework for cluster-based medical environments on top of which security mechanisms can rely. This framework fully covers the varying needs of both in-hospital environments and environments formed ad hoc for medical emergencies. In this paper, we further elaborate on the security of our proposed solution. We specifically focus on key establishment mechanisms and investigate the group key agreement protocols that can best fit in our framework.

  4. Is It Time to Take Learning Design to Task?

    ERIC Educational Resources Information Center

    Griffiths, David; Inman, Maggie

    2017-01-01

    Context drives learning design, but too often context is not considered within learning design literature. Reported skill gaps lead to considerations around learning design and the security, completeness and depth of learning developed by learning designers in adult learning. Frequently learning is linked to context, where learning environments…

  5. Secured Advanced Federated Environment (SAFE): A NASA Solution for Secure Cross-Organization Collaboration

    NASA Technical Reports Server (NTRS)

    Chow, Edward; Spence, Matthew Chew; Pell, Barney; Stewart, Helen; Korsmeyer, David; Liu, Joseph; Chang, Hsin-Ping; Viernes, Conan; Gogorth, Andre

    2003-01-01

    This paper discusses the challenges and security issues inherent in building complex cross-organizational collaborative projects and software systems within NASA. By applying the design principles of compartmentalization, organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate and the need to enforce enterprise and local security rules. With the SAFE approach, security is an integral component of enterprise software and network design, not an afterthought.

  6. SEED: A Suite of Instructional Laboratories for Computer Security Education

    ERIC Educational Resources Information Center

    Du, Wenliang; Wang, Ronghua

    2008-01-01

    The security and assurance of our computing infrastructure has become a national priority. To address this priority, higher education has gradually incorporated the principles of computer and information security into the mainstream undergraduate and graduate computer science curricula. To achieve effective education, learning security principles…

  7. Teaching RFID Information Systems Security

    ERIC Educational Resources Information Center

    Thompson, Dale R.; Di, Jia; Daugherty, Michael K.

    2014-01-01

    The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…

  8. 10 CFR 37.43 - General security program requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... overall security strategy to ensure the integrated and effective functioning of the security program required by this subpart. The security plan must, at a minimum: (i) Describe the measures and strategies... lessons learned; (iii) Relevant results of NRC inspections; and (iv) Relevant results of the licensee's...

  9. An evaluation index system of water security in China based on macroeconomic data from 2000 to 2012

    NASA Astrophysics Data System (ADS)

    Li, X. S.; Peng, Z. Y.; Li, T. T.

    2016-08-01

    This paper establishes an evaluation index system of water security. The index system employs 5 subsystems (water circulation security, water environment security, water ecology security, water society security and water economy security) and has 39 indicators. Using the AHP method, each indicator is given a relative weight to integrate within the whole system. With macroeconomic data from 2000 to 2012, a model of water security evaluation is applied to assess the state of water security in China. The results show an improving trend in the overall state of China's water security. In particular, the cycle of water security is at a high and low fluctuation. Water environment security presents an upward trend on the whole; however, this trend is unsteady and has shown a descending tendency in some years. Yet, water ecology security, water society security, and water economy security are basically on the rise. However, the degree of coordination of China's water security system remains in need of consolidation.

  10. Student Perceptions of High-Security School Environments

    ERIC Educational Resources Information Center

    Bracy, Nicole L.

    2011-01-01

    Public schools have transformed significantly over the past several decades in response to concerns about rising school violence. Today, most public schools are high-security environments employing police officers, security cameras, and metal detectors, as well as strict discipline policies to keep students in line and maintain safe campuses.…

  11. 76 FR 51255 - Security Zone; Potomac River, Georgetown Channel, Washington, DC

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-18

    ... security regimes designed to safeguard human life, vessels, and waterfront facilities while still... restriction of vessel traffic is necessary to protect life, property and the environment, therefore, a 30-day... maritime safety and security in order to safeguard life, property, and the environment on or near the...

  12. 77 FR 3118 - Security Zone; Choptank River and Cambridge Channel, Cambridge, MD

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-23

    ... security regimes designed to safeguard human life, vessels, and waterfront facilities while still... restriction of vessel traffic is necessary to protect life, property and the environment, therefore, a 30-day... maritime safety and security in order to safeguard life, property, and the environment on or near the...

  13. Evaluation of Traditional Security Solutions in the SCADA Environment

    DTIC Science & Technology

    2012-03-01

    Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Robert D. Larkin, Captain, USAF AFIT/GCO/ENG/12-06 DEPARTMENT OF THE AIR...views expressed in this thesis are those of the author and do not reflect the official policy or position of the United States Air Force, Department...United States. AFIT/GCO/ENG/12-06 Evaluation of Traditional Security Solutions in the SCADA Environment THESIS Presented to the Faculty Department of

  14. The role of food-security solutions in the protection of natural resources and environment of developing countries.

    PubMed

    Lashgarara, Farhad; Mirdamadi, Seyyed Mehdi; Hosseini, Seyyed Jamal Farajollah; Chizari, Mohammad

    2008-10-01

    The majority of the countries of the world, especially developing countries, face environmental problems. Limitations of basic resources (water and soil) and population growth have been the cause of these environmental problems that countries are confronted with. Developing countries have numerous problems, including destruction of forests, vegetable and animal species, and pollution of the environment. Damage to natural resources and the environment can influence the food-security situation. One of the main millennium development goals (MDGs) is protection of the environment and people's health. This cannot obtained unless there is ensured food security. Food security has been defined as a situation when all people, at all times, have physical and economic access to sufficient, safe, and nutritious food needed to maintain a healthy and active life. At the same time, with ensured food security, we can hope to protect the natural resources and environment. The methodology used is descriptive-analytical, and its main purpose is determining the importance and role of food-security solutions in the reduction of environmental hazards and improvement of natural resources and the environmental situation in developing countries. Therefore, some of the most important food-security solutions that can play an important role in this relation were discussed, including conventional research-based technology, biotechnology, information and communication technologies (ICTs), alternative energy sources, and food irradiation.

  15. Social Information Processing, Security of Attachment, and Emotion Regulation in Children with Learning Disabilities

    ERIC Educational Resources Information Center

    Bauminger, Nirit; Kimhi-Kind, Ilanit

    2008-01-01

    This study examined the contribution of attachment security and emotion regulation (ER) to the explanation of social information processing (SIP) in middle childhood boys with learning disabilities (LD) and without LD matched on age and grade level. Children analyzed four social vignettes using Dodge's SIP model and completed the Kerns security…

  16. eCX: A Secure Infrastructure for E-Course Delivery.

    ERIC Educational Resources Information Center

    Yau, Joe C. K; Hui, Lucas C. K.; Cheung, Bruce; Yiu, S. M.

    2003-01-01

    Presents a mechanism, the Secure e-Course eXchange (eCX) designed to protect learning material from unauthorized dissemination, and shows how this mechanism can be integrated in the operation model of online learning course providers. The design of eCX is flexible to fit two operating models, the Institutional Server Model and the Corporate Server…

  17. The Nature and Prevalence of Learning Deficiencies among Adult Inmates.

    ERIC Educational Resources Information Center

    Bell, Raymond; And Others

    In order to determine the nature and prevalence of learning deficiencies among adult inmates in U.S. correctional institutions, a sample of subjects was drawn from three institutions in each of the states of Louisiana, Pennsylvania, and Washington. One male maximum security, one male medium security, and one women's prison were selected in each of…

  18. What We Can Learn from the Suits

    ERIC Educational Resources Information Center

    Panettieri, Joseph C.

    2006-01-01

    This article discusses what colleges and universities can learn from Uncle Sam and corporate America when it comes to designing secure networks and ensuring privacy. After all, schools face many of the same privacy and information security challenges seen in the business and government sectors. The fact of the matter is, in the age of cyber crime…

  19. Making Our Buildings Safer: Security Management and Equipment Issues.

    ERIC Educational Resources Information Center

    Clark, James H.

    1997-01-01

    Discusses three major components of library security: physical security of the environment; operating procedures for library staff, the public, and security personnel; and a contract security force (or campus security in academic institutions.) Topics include risk management; maintenance; appropriate technology, including security systems and…

  20. Machine Learning in Intrusion Detection

    DTIC Science & Technology

    2005-07-01

    machine learning tasks. Anomaly detection provides the core technology for a broad spectrum of security-centric applications. In this dissertation, we examine various aspects of anomaly based intrusion detection in computer security. First, we present a new approach to learn program behavior for intrusion detection. Text categorization techniques are adopted to convert each process to a vector and calculate the similarity between two program activities. Then the k-nearest neighbor classifier is employed to classify program behavior as normal or intrusive. We demonstrate

  1. Multi-objects recognition for distributed intelligent sensor networks

    NASA Astrophysics Data System (ADS)

    He, Haibo; Chen, Sheng; Cao, Yuan; Desai, Sachi; Hohil, Myron E.

    2008-04-01

    This paper proposes an innovative approach for multi-objects recognition for homeland security and defense based intelligent sensor networks. Unlike the conventional way of information analysis, data mining in such networks is typically characterized with high information ambiguity/uncertainty, data redundancy, high dimensionality and real-time constrains. Furthermore, since a typical military based network normally includes multiple mobile sensor platforms, ground forces, fortified tanks, combat flights, and other resources, it is critical to develop intelligent data mining approaches to fuse different information resources to understand dynamic environments, to support decision making processes, and finally to achieve the goals. This paper aims to address these issues with a focus on multi-objects recognition. Instead of classifying a single object as in the traditional image classification problems, the proposed method can automatically learn multiple objectives simultaneously. Image segmentation techniques are used to identify the interesting regions in the field, which correspond to multiple objects such as soldiers or tanks. Since different objects will come with different feature sizes, we propose a feature scaling method to represent each object in the same number of dimensions. This is achieved by linear/nonlinear scaling and sampling techniques. Finally, support vector machine (SVM) based learning algorithms are developed to learn and build the associations for different objects, and such knowledge will be adaptively accumulated for objects recognition in the testing stage. We test the effectiveness of proposed method in different simulated military environments.

  2. U.S.-Canadian Border Security: Lessons Learned from Denmarks Experience with the Schengen Convention

    DTIC Science & Technology

    2014-03-01

    January 1, 1994, binding the North American continent with similar economic interests and pursuits.10 NAFTA does not deal with security and laws in the...SC). The Department of Homeland Security coordinates U.S. security with representatives from law enforcement, military and civilian entities. Public...European Schengen Convention (SC). The Department of Homeland Security coordinates U.S. security with representatives from law enforcement, military

  3. Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals

    NASA Astrophysics Data System (ADS)

    Fleischmann, Kenneth R.

    The biggest challenge facing computer security researchers and professionals is not learning how to make ethical decisions; rather it is learning how to recognize ethical decisions. All too often, technology development suffers from what Langdon Winner terms technological somnambulism - we sleepwalk through our technology design, following past precedents without a second thought, and fail to consider the perspectives of other stakeholders [1]. Computer security research and practice involves a number of opportunities for ethical decisions. For example, decisions about whether or not to automatically provide security updates involve tradeoffs related to caring versus user autonomy. Decisions about online voting include tradeoffs between convenience and security. Finally, decisions about routinely screening e-mails for spam involve tradeoffs of efficiency and privacy. It is critical that these and other decisions facing computer security researchers and professionals are confronted head on as value-laden design decisions, and that computer security researchers and professionals consider the perspectives of various stakeholders in making these decisions.

  4. The strategic security officer.

    PubMed

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  5. Effects of congruence between preferred and perceived learning environments in nursing education in Taiwan: a cross-sectional study.

    PubMed

    Yeh, Ting-Kuang; Huang, Hsiu-Mei; Chan, Wing P; Chang, Chun-Yen

    2016-05-20

    To investigate the effects of congruence between preferred and perceived learning environments on learning outcomes of nursing students. A nursing course at a university in central Taiwan. 124 Taiwanese nursing students enrolled in a 13-week problem-based Fundamental Nursing curriculum. Students' preferred learning environment, perceptions about the learning environment and learning outcomes (knowledge, self-efficacy and attitudes) were assessed. On the basis of test scores measuring their preferred and perceived learning environments, students were assigned to one of two groups: a 'preferred environment aligned with perceived learning environment' group and a 'preferred environment discordant with perceived learning environment' group. Learning outcomes were analysed by group. Most participants preferred learning in a classroom environment that combined problem-based and lecture-based instruction. However, a mismatch of problem-based instruction with students' perceptions occurred. Learning outcomes were significantly better when students' perceptions of their instructional activities were congruent with their preferred learning environment. As problem-based learning becomes a focus of educational reform in nursing, teachers need to be aware of students' preferences and perceptions of the learning environment. Teachers may also need to improve the match between an individual student's perception and a teacher's intention in the learning environment, and between the student's preferred and actual perceptions of the learning environment. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  6. Security culture for nuclear facilities

    NASA Astrophysics Data System (ADS)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  7. Effects of congruence between preferred and perceived learning environments in nursing education in Taiwan: a cross-sectional study

    PubMed Central

    Yeh, Ting-Kuang; Huang, Hsiu-Mei; Chan, Wing P; Chang, Chun-Yen

    2016-01-01

    Objective To investigate the effects of congruence between preferred and perceived learning environments on learning outcomes of nursing students. Setting A nursing course at a university in central Taiwan. Participants 124 Taiwanese nursing students enrolled in a 13-week problem-based Fundamental Nursing curriculum. Design and methods Students' preferred learning environment, perceptions about the learning environment and learning outcomes (knowledge, self-efficacy and attitudes) were assessed. On the basis of test scores measuring their preferred and perceived learning environments, students were assigned to one of two groups: a ‘preferred environment aligned with perceived learning environment’ group and a ‘preferred environment discordant with perceived learning environment’ group. Learning outcomes were analysed by group. Outcome measures Most participants preferred learning in a classroom environment that combined problem-based and lecture-based instruction. However, a mismatch of problem-based instruction with students' perceptions occurred. Learning outcomes were significantly better when students' perceptions of their instructional activities were congruent with their preferred learning environment. Conclusions As problem-based learning becomes a focus of educational reform in nursing, teachers need to be aware of students' preferences and perceptions of the learning environment. Teachers may also need to improve the match between an individual student's perception and a teacher's intention in the learning environment, and between the student's preferred and actual perceptions of the learning environment. PMID:27207620

  8. Secure environment for real-time tele-collaboration on virtual simulation of radiation treatment planning.

    PubMed

    Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S

    2003-01-01

    A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.

  9. 78 FR 27392 - Statement of Organization, Functions, and Delegations of Authority

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-10

    ... Office (AMSO) provides a safe, secure, healthy, and functional workplace environment for CDC staff by... provides the tools needed for workers to be safe, work in a healthy environment, and ensures environmental... Office of Security and Emergency Preparedness (CAJJ); Office of Safety, Health and Environment (CAJP...

  10. 75 FR 55290 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL-031...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-10

    ...; Department of Homeland Security/ALL-031 Information Sharing Environment Suspicious Activity Reporting... Environment Suspicious Activity Reporting Initiative System of Records'' and this proposed rulemaking. In this... establish a new DHS system of records titled, ``DHS/ALL-031 Information Sharing Environment (ISE) Suspicious...

  11. Development of an Audit Classification Index (ACI) for Federal E-Learning Systems Security Vulnerabilities

    ERIC Educational Resources Information Center

    Johnson, Gerald D.

    2012-01-01

    As U.S federal government agencies have increased the use of the Internet to utilize technologies such as e-learning, U.S. federal government information systems have become more exposed to security vulnerabilities that may contribute to system attacks and system exploitation. U.S. federal government agencies are required to come up with their own…

  12. Coping With Their Lives Women, Learning Disabilities, Self-Harm And The Secure Unit: A Q-Methodological Study

    ERIC Educational Resources Information Center

    James, Melissa; Warner, Sam

    2005-01-01

    Deliberate self-harm represents a significant, yet it can be argued, a poorly theorized area of concern with respect to women who have learning disabilities particularly in the context of secure service provision. Utilizing ideas from social constructionism we explore how some ways of understanding dominate the professional literature and,…

  13. Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language

    ERIC Educational Resources Information Center

    Boutnaru, Shlomi; Hershkovitz, Arnon

    2015-01-01

    In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to…

  14. Science Learning Outcomes in Alignment with Learning Environment Preferences

    NASA Astrophysics Data System (ADS)

    Chang, Chun-Yen; Hsiao, Chien-Hua; Chang, Yueh-Hsia

    2011-04-01

    This study investigated students' learning environment preferences and compared the relative effectiveness of instructional approaches on students' learning outcomes in achievement and attitude among 10th grade earth science classes in Taiwan. Data collection instruments include the Earth Science Classroom Learning Environment Inventory and Earth Science Learning Outcomes Inventory. The results showed that most students preferred learning in a classroom environment where student-centered and teacher-centered instructional approaches coexisted over a teacher-centered learning environment. A multivariate analysis of covariance also revealed that the STBIM students' cognitive achievement and attitude toward earth science were enhanced when the learning environment was congruent with their learning environment preference.

  15. Evaluation of multi-level social learning for sustainable landscapes: perspective of a development initiative in Bergslagen, Sweden.

    PubMed

    Axelsson, Robert; Angelstam, Per; Myhrman, Lennart; Sädbom, Stefan; Ivarsson, Milis; Elbakidze, Marine; Andersson, Kenneth; Cupa, Petr; Diry, Christian; Doyon, Frederic; Drotz, Marcus K; Hjorth, Arne; Hermansson, Jan Olof; Kullberg, Thomas; Lickers, F Henry; McTaggart, Johanna; Olsson, Anders; Pautov, Yurij; Svensson, Lennart; Törnblom, Johan

    2013-03-01

    To implement policies about sustainable landscapes and rural development necessitates social learning about states and trends of sustainability indicators, norms that define sustainability, and adaptive multi-level governance. We evaluate the extent to which social learning at multiple governance levels for sustainable landscapes occur in 18 local development initiatives in the network of Sustainable Bergslagen in Sweden. We mapped activities over time, and interviewed key actors in the network about social learning. While activities resulted in exchange of experiences and some local solutions, a major challenge was to secure systematic social learning and make new knowledge explicit at multiple levels. None of the development initiatives used a systematic approach to secure social learning, and sustainability assessments were not made systematically. We discuss how social learning can be improved, and how a learning network of development initiatives could be realized.

  16. An alternative to sneakernet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orrell, S.; Ralstin, S.

    1992-04-01

    Many computer security plans specify that only a small percentage of the data processed will be classified. Thus, the bulk of the data on secure systems must be unclassified. Secure limited access sites operating approved classified computing systems sometimes also have a system ostensibly containing only unclassified files but operating within the secure environment. That system could be networked or otherwise connected to a classified system(s) in order that both be able to use common resources for file storage or computing power. Such a system must operate under the same rules as the secure classified systems. It is in themore » nature of unclassified files that they either came from, or will eventually migrate to, a non-secure system. Today, unclassified files are exported from systems within the secure environment typically by loading transport media and carrying them to an open system. Import of unclassified files is handled similarly. This media transport process, sometimes referred to as sneaker net, often is manually logged and controlled only by administrative procedures. A comprehensive system for secure bi-directional transfer of unclassified files between secure and open environments has yet to be developed. Any such secure file transport system should be required to meet several stringent criteria. It is the purpose of this document to begin a definition of these criteria.« less

  17. An alternative to sneakernet

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Orrell, S.; Ralstin, S.

    1992-01-01

    Many computer security plans specify that only a small percentage of the data processed will be classified. Thus, the bulk of the data on secure systems must be unclassified. Secure limited access sites operating approved classified computing systems sometimes also have a system ostensibly containing only unclassified files but operating within the secure environment. That system could be networked or otherwise connected to a classified system(s) in order that both be able to use common resources for file storage or computing power. Such a system must operate under the same rules as the secure classified systems. It is in themore » nature of unclassified files that they either came from, or will eventually migrate to, a non-secure system. Today, unclassified files are exported from systems within the secure environment typically by loading transport media and carrying them to an open system. Import of unclassified files is handled similarly. This media transport process, sometimes referred to as sneaker net, often is manually logged and controlled only by administrative procedures. A comprehensive system for secure bi-directional transfer of unclassified files between secure and open environments has yet to be developed. Any such secure file transport system should be required to meet several stringent criteria. It is the purpose of this document to begin a definition of these criteria.« less

  18. ATAC Process Proof of Concept Final Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bri Rolston; Sarah Freeman

    Researchers at INL with funding from the Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) evaluated a novel approach for near real-time consumption of threat intelligence. Demonstration testing in an industry environment supported the development of this new process to assist the electric sector in securing their critical networks. This report provides the reader with an understanding of the methods used during this proof of concept project. The processes and templates were further advanced with an industry partner during an onsite assessment. This report concludes with lessons learned and a roadmap for final development of these materialsmore » for use by industry.« less

  19. Self-adaptive trust based ABR protocol for MANETs using Q-learning.

    PubMed

    Kumar, Anitha Vijaya; Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation.

  20. Self-Adaptive Trust Based ABR Protocol for MANETs Using Q-Learning

    PubMed Central

    Jeyapal, Akilandeswari

    2014-01-01

    Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a complex problem. Nodes also share routing information among the neighbours in order to find the route to the destination. This requires nodes to trust each other. Thus we can state that trust is a key concept in secure routing mechanisms. A number of cryptographic protection techniques based on trust have been proposed. Q-learning is a recently used technique, to achieve adaptive trust in MANETs. In comparison to other machine learning computational intelligence techniques, Q-learning achieves optimal results. Our work focuses on computing a score using Q-learning to weigh the trust of a particular node over associativity based routing (ABR) protocol. Thus secure and stable route is calculated as a weighted average of the trust value of the nodes in the route and associativity ticks ensure the stability of the route. Simulation results show that Q-learning based trust ABR protocol improves packet delivery ratio by 27% and reduces the route selection time by 40% over ABR protocol without trust calculation. PMID:25254243

  1. A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography.

    PubMed

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Zhao, Jining

    2015-03-01

    Radio Frequency Identification(RFID) is an automatic identification technology, which can be widely used in healthcare environments to locate and track staff, equipment and patients. However, potential security and privacy problems in RFID system remain a challenge. In this paper, we design a mutual authentication protocol for RFID based on elliptic curve cryptography(ECC). We use pre-computing method within tag's communication, so that our protocol can get better efficiency. In terms of security, our protocol can achieve confidentiality, unforgeability, mutual authentication, tag's anonymity, availability and forward security. Our protocol also can overcome the weakness in the existing protocols. Therefore, our protocol is suitable for healthcare environments.

  2. Emergence of trend trading and its effects in minority game

    NASA Astrophysics Data System (ADS)

    Liu, Xing-Hua; Liang, Xiao-Bei; Wang, Nai-Jing

    2006-09-01

    In this paper, we extended Minority Game (MG) by equipping agents with both value and trend strategies. In the new model, agents (we call them strong-adaptation agents) can autonomically select to act as trend trader or value trader when they game and learn in system. So the new model not only can reproduce stylized factors but also has the potential to investigate into the process of some problems of securities market. We investigated the dynamics of trend trading and its impacts on securities market based on the new model. Our research found that trend trading is inevitable when strong-adaptation agents make decisions by inductive reasoning. Trend trading (of strong-adaptation agents) is not irrational behavior but shows agent's strong-adaptation intelligence, because strong-adaptation agents can take advantage of the pure value agents when they game together in hybrid system. We also found that strong-adaptation agents do better in real environment. The results of our research are different with those of behavior finance researches.

  3. Additional Security Considerations for Grid Management

    NASA Technical Reports Server (NTRS)

    Eidson, Thomas M.

    2003-01-01

    The use of Grid computing environments is growing in popularity. A Grid computing environment is primarily a wide area network that encompasses multiple local area networks, where some of the local area networks are managed by different organizations. A Grid computing environment also includes common interfaces for distributed computing software so that the heterogeneous set of machines that make up the Grid can be used more easily. The other key feature of a Grid is that the distributed computing software includes appropriate security technology. The focus of most Grid software is on the security involved with application execution, file transfers, and other remote computing procedures. However, there are other important security issues related to the management of a Grid and the users who use that Grid. This note discusses these additional security issues and makes several suggestions as how they can be managed.

  4. Information Security Assessment of SMEs as Coursework -- Learning Information Security Management by Doing

    ERIC Educational Resources Information Center

    Ilvonen, Ilona

    2013-01-01

    Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…

  5. The Threat of Security: Hindering Technology Integration in the Classroom

    ERIC Educational Resources Information Center

    Robinson, LeAnne K.; Brown, Abbie; Green, Tim

    2007-01-01

    For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…

  6. Meeting the challenges of installing a mobile robotic system

    NASA Technical Reports Server (NTRS)

    Decorte, Celeste

    1994-01-01

    The challenges of integrating a mobile robotic system into an application environment are many. Most problems inherent to installing the mobile robotic system fall into one of three categories: (1) the physical environment - location(s) where, and conditions under which, the mobile robotic system will work; (2) the technological environment - external equipment with which the mobile robotic system will interact; and (3) the human environment - personnel who will operate and interact with the mobile robotic system. The successful integration of a mobile robotic system into these three types of application environment requires more than a good pair of pliers. The tools for this job include: careful planning, accurate measurement data (as-built drawings), complete technical data of systems to be interfaced, sufficient time and attention of key personnel for training on how to operate and program the robot, on-site access during installation, and a thorough understanding and appreciation - by all concerned - of the mobile robotic system's role in the security mission at the site, as well as the machine's capabilities and limitations. Patience, luck, and a sense of humor are also useful tools to keep handy during a mobile robotic system installation. This paper will discuss some specific examples of problems in each of three categories, and explore approaches to solving these problems. The discussion will draw from the author's experience with on-site installations of mobile robotic systems in various applications. Most of the information discussed in this paper has come directly from knowledge learned during installations of Cybermotion's SR2 security robots. A large part of the discussion will apply to any vehicle with a drive system, collision avoidance, and navigation sensors, which is, of course, what makes a vehicle autonomous. And it is with these sensors and a drive system that the installer must become familiar in order to foresee potential trouble areas in the physical, technical, and human environment.

  7. Toward a critical approach to the study of learning environments in science classrooms

    NASA Astrophysics Data System (ADS)

    Lorsbach, Anthony; Tobin, Kenneth

    1995-03-01

    Traditional learning environment research in science classrooms has been built on survey methods meant to measure students' and teachers' perceptions of variables used to define the learning environment. This research has led mainly to descriptions of learning environments. We argue that learning environment research should play a transformative role in science classrooms; that learning environment research should take into account contemporary post-positivist ways of thinking about learning and teaching to assist students and teachers to construct a more emancipatory learning environment. In particular, we argue that a critical perspective could lead to research playing a larger role in the transformation of science classroom learning environments. This argument is supplemented with an example from a middle school science classroom.

  8. A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform

    PubMed Central

    Kang, Jungho; Kim, Mansik; Park, Jong Hyuk

    2016-01-01

    With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms. PMID:27399699

  9. A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform.

    PubMed

    Kang, Jungho; Kim, Mansik; Park, Jong Hyuk

    2016-07-05

    With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms.

  10. Urban Ecological Security Simulation and Prediction Using an Improved Cellular Automata (CA) Approach-A Case Study for the City of Wuhan in China.

    PubMed

    Gao, Yuan; Zhang, Chuanrong; He, Qingsong; Liu, Yaolin

    2017-06-15

    Ecological security is an important research topic, especially urban ecological security. As highly populated eco-systems, cities always have more fragile ecological environments. However, most of the research on urban ecological security in literature has focused on evaluating current or past status of the ecological environment. Very little literature has carried out simulation or prediction of future ecological security. In addition, there is even less literature exploring the urban ecological environment at a fine scale. To fill-in the literature gap, in this study we simulated and predicted urban ecological security at a fine scale (district level) using an improved Cellular Automata (CA) approach. First we used the pressure-state-response (PSR) method based on grid-scale data to evaluate urban ecological security. Then, based on the evaluation results, we imported the geographically weighted regression (GWR) concept into the CA model to simulate and predict urban ecological security. We applied the improved CA approach in a case study-simulating and predicting urban ecological security for the city of Wuhan in Central China. By comparing the simulated ecological security values from 2010 using the improved CA model to the actual ecological security values of 2010, we got a relatively high value of the kappa coefficient, which indicates that this CA model can simulate or predict well future development of ecological security in Wuhan. Based on the prediction results for 2020, we made some policy recommendations for each district in Wuhan.

  11. Implementing healthcare information security: standards can help.

    PubMed

    Orel, Andrej; Bernik, Igor

    2013-01-01

    Using widely spread common approaches to systems security in health dedicated controlled environments, a level of awareness, confidence and acceptance of relevant standardisation is evaluated. Patients' information is sensitive, so putting appropriate organisational techniques as well as modern technology in place to secure health information is of paramount importance. Mobile devices are becoming the top priorities in advanced information security planning with healthcare environments being no exception. There are less and less application areas in healthcare without having a need for a mobile functionality which represents an even greater information security challenge. This is also true in emergency treatments, rehabilitation and homecare just to mention a few areas outside hospital controlled environments. Unfortunately quite often traditional unsecured communications principles are still in routine use for communicating sensitive health related information. The security awareness level with users, patients and care professionals is not high enough so potential threats and risks may not be addressed and the respective information security management is therefore weak. Standards like ISO/IEC 27000 ISMS family, the ISO/IEC 27799 information security guidelines in health are often not well known, but together with legislation principles such as HIPAA, they can help.

  12. A secure medical data exchange protocol based on cloud environment.

    PubMed

    Chen, Chin-Ling; Yang, Tsai-Tung; Shih, Tzay-Farn

    2014-09-01

    In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. In spite of many literatures discussed about medical systems, but these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a secure medical data exchange protocol based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples use medical resources on the cloud environment to seek medical advice conveniently.

  13. The GLOBAL Learning and Observations to Benefit the Environment (GLOBE) Collaboration System. Building a robust international collaboration environment for teachers, scientists and students.

    NASA Astrophysics Data System (ADS)

    Overoye, D.; Lewis, C.

    2016-12-01

    The Global Learning and Observations to Benefit the Environment (GLOBE) Program is a worldwide hands-on, primary and secondary school-based science and education program founded on Earth Day 1995. Implemented in 117 countries, GLOBE promotes the teaching and learning of science, supporting students, teachers and scientists worldwide to collaborate with each other on inquiry-based investigations of the Earth system. As an international platform supporting a large number and variety of stakeholders, the GLOBE Data Information System (DIS) was re-built with the goal of providing users the support needed to foster and develop collaboration between teachers, students and scientists while supporting the collection and visualization of over 50 different earth science investigations (protocols). There have been many challenges to consider as we have worked to prototype and build various tools to support collaboration across the GLOBE community - language, security, time zones, user roles and the Child Online Protection Act (COPA) to name a few. During the last 3 years the re-built DIS has been in operation we have supported user to user collaboration, school to school collaboration, project/campaign to user collaboration and scientist to scientist collaboration. We have built search tools to facilitate finding collaboration partners. The tools and direction continue to evolve based on feedback, evolving needs and changes in technology. With this paper we discuss our approach for dealing with some of the collaboration challenges, review tools built to encourage and support collaboration, and analyze which tools have been successful and which have not. We will review new ideas for collaboration in the GLOBE community that are guiding upcoming development.

  14. An Examination through Conjoint Analysis of the Preferences of Students Concerning Online Learning Environments According to Their Learning Styles

    ERIC Educational Resources Information Center

    Daghan, Gökhan; Akkoyunlu, Buket

    2012-01-01

    This study examines learning styles of students receiving education via online learning environments, and their preferences concerning the online learning environment. Maggie McVay Lynch Learning Style Inventory was used to determine learning styles of the students. The preferences of students concerning online learning environments were detected…

  15. Infusing Aging and Public Policy Content into Gerontology Courses: Collaborative Learning Methods To Teach about Social Security and Medicare.

    ERIC Educational Resources Information Center

    Cianciolo, Patricia K.; Henderson, Tammy L.

    2003-01-01

    Describes modules on Social Security and Medicare for gerontology policy courses. Discusses collaborative exercises in which students explore Internet resources on Social Security and health care finance, identity major concerns about reforms, and enact scenarios about retirees with varying degrees of income and health care security. (Contains 33…

  16. A Method for Evaluating Information Security Governance (ISG) Components in Banking Environment

    NASA Astrophysics Data System (ADS)

    Ula, M.; Ula, M.; Fuadi, W.

    2017-02-01

    As modern banking increasingly relies on the internet and computer technologies to operate their businesses and market interactions, the threats and security breaches have highly increased in recent years. Insider and outsider attacks have caused global businesses lost trillions of Dollars a year. Therefore, that is a need for a proper framework to govern the information security in the banking system. The aim of this research is to propose and design an enhanced method to evaluate information security governance (ISG) implementation in banking environment. This research examines and compares the elements from the commonly used information security governance frameworks, standards and best practices. Their strength and weakness are considered in its approaches. The initial framework for governing the information security in banking system was constructed from document review. The framework was categorized into three levels which are Governance level, Managerial level, and technical level. The study further conducts an online survey for banking security professionals to get their professional judgment about the ISG most critical components and the importance for each ISG component that should be implemented in banking environment. Data from the survey was used to construct a mathematical model for ISG evaluation, component importance data used as weighting coefficient for the related component in the mathematical model. The research further develops a method for evaluating ISG implementation in banking based on the mathematical model. The proposed method was tested through real bank case study in an Indonesian local bank. The study evidently proves that the proposed method has sufficient coverage of ISG in banking environment and effectively evaluates the ISG implementation in banking environment.

  17. PennDOT transportation security strategy : volume 2 : effective practices of state departments of transportation security planning

    DOT National Transportation Integrated Search

    2004-08-01

    Since September 11, 2001, state departments of transportation (DOTs) have been assuming a more proactive role in security and emergency management. The purpose of this Effective Practices Report is to document key lessons learned by state DOTs as the...

  18. Pre-Service English Teachers in Blended Learning Environment in Respect to Their Learning Approaches

    ERIC Educational Resources Information Center

    Yilmaz, M. Betul; Orhan, Feza

    2010-01-01

    Blended learning environment (BLE) is increasingly used in the world, especially in university degrees and it is based on integrating web-based learning and face-to-face (FTF) learning environments. Besides integrating different learning environments, BLE also addresses to students with different learning approaches. The "learning…

  19. The effects of environmental resource and security on aggressive behavior.

    PubMed

    Ng, Henry Kin Shing; Chow, Tak Sang

    2017-05-01

    Exposure to different environments has been reported to change aggressive behavior, but previous research did not consider the underlying elements that caused such an effect. Based on previous work on environmental perception, we examined the role of environmental resource and security in altering aggression level. In three experiments, participants were exposed to environments that varied in resource (High vs. Low) and security (High vs. Low) levels, after which aggression was measured. The environments were presented through visual priming (Experiments 1-2) and a first-person gameplay (Experiment 3). We observed a consistent resource-security interaction effect on aggression, operationalized as the level of noise blast (Experiment 1) and number of unpleasant pictures (Experiments 2-3) delivered to strangers by the participants. High resource levels associated with higher aggression in insecure conditions, but lower aggression in secure conditions. The findings suggest that the adaptive value of aggression varies under different environmental constraints. Implications are discussed in terms of the effects of adverse environments on aggression, and the nature's effects on social behavior. Aggr. Behav. 43:304-314, 2017. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.

  20. Is the biggest security threat to medical information simply a lack of understanding?

    PubMed

    Williams, Patricia A H

    2011-01-01

    Connecting Australian health services and the e-health initiative is a major focus in the current health environment. Many issues are presented as key to its success including solving issues with confidentiality and privacy. However, the main problem may not be these issues in sharing information but the fact that the point of origin of such records is still relatively insecure. This paper highlights why this may be the case. Research into the security of medical information has shown that many primary healthcare providers are unable to create an environment with effective information security. Numerous factors contribute to this complex situation including a trustful environment, the resultant security culture and the capability of individual healthcare organisations. Further, the growing importance of new directions in the use of patient information is considered. This paper discusses these issues and positions them within the complex environment that is healthcare. In our current health system infrastructure, the points of origin of patient information are our most vulnerable. This entwined with progressively new uses of this information expose additional security concerns, such as re-identification of information, that require attention.

  1. Does the PCEHR mean a new paradigm for information security? Implications for health information management.

    PubMed

    Williams, Patricia A H

    Australia is stepping up to the new e-health environment. With this comes new legislation and new demands on information security. The expanded functionality of e-health and the increased legislative requirements, coupled with new uses of technology, means that enhancement of existing security practice will be necessary. This paperanalyses the new operating environment for Australian healthcare and the legislation governing it, and highlights the changes that are required to meet this new context. Individuals are now more responsible for security and organisations should be prompted to review their security measures in light of the new demands of legislative compliance.

  2. System and method for secure group transactions

    DOEpatents

    Goldsmith, Steven Y [Rochester, MN

    2006-04-25

    A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.

  3. 40 CFR 11.5 - Procedures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Procedures. 11.5 Section 11.5 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS...” shall be directed to: Director, Security and Inspection Division, Environmental Protection Agency...

  4. 40 CFR 11.1 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Purpose. 11.1 Section 11.1 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS PURSUANT... the classification and declassification of national security information. They apply also to...

  5. Security and privacy issues of personal health.

    PubMed

    Blobel, Bernd; Pharow, Peter

    2007-01-01

    While health systems in developed countries and increasingly also in developing countries are moving from organisation-centred to person-centred health service delivery, the supporting communication and information technology is faced with new risks regarding security and privacy of stakeholders involved. The comprehensively distributed environment puts special burden on guaranteeing communication security services, but even more on guaranteeing application security services dealing with privilege management, access control and audit regarding social implication and connected sensitivity of personal information recorded, processed, communicated and stored in an even internationally distributed environment.

  6. Integrating Learning, Problem Solving, and Engagement in Narrative-Centered Learning Environments

    ERIC Educational Resources Information Center

    Rowe, Jonathan P.; Shores, Lucy R.; Mott, Bradford W.; Lester, James C.

    2011-01-01

    A key promise of narrative-centered learning environments is the ability to make learning engaging. However, there is concern that learning and engagement may be at odds in these game-based learning environments. This view suggests that, on the one hand, students interacting with a game-based learning environment may be engaged but unlikely to…

  7. Factors Influencing Learning Environments in an Integrated Experiential Program

    NASA Astrophysics Data System (ADS)

    Koci, Peter

    The research conducted for this dissertation examined the learning environment of a specific high school program that delivered the explicit curriculum through an integrated experiential manner, which utilized field and outdoor experiences. The program ran over one semester (five months) and it integrated the grade 10 British Columbian curriculum in five subjects. A mixed methods approach was employed to identify the students' perceptions and provide richer descriptions of their experiences related to their unique learning environment. Quantitative instruments were used to assess changes in students' perspectives of their learning environment, as well as other supporting factors including students' mindfulness, and behaviours towards the environment. Qualitative data collection included observations, open-ended questions, and impromptu interviews with the teacher. The qualitative data describe the factors and processes that influenced the learning environment and give a richer, deeper interpretation which complements the quantitative findings. The research results showed positive scores on all the quantitative measures conducted, and the qualitative data provided further insight into descriptions of learning environment constructs that the students perceived as most important. A major finding was that the group cohesion measure was perceived by students as the most important attribute of their preferred learning environment. A flow chart was developed to help the researcher conceptualize how the learning environment, learning process, and outcomes relate to one another in the studied program. This research attempts to explain through the consideration of this case study: how learning environments can influence behavioural change and how an interconnectedness among several factors in the learning process is influenced by the type of learning environment facilitated. Considerably more research is needed in this area to understand fully the complexity learning environments and how they influence learning and behaviour. Keywords: learning environments; integrated experiential programs; environmental education.

  8. Being in Community: A Food Security Themed Approach to Public Scholarship

    ERIC Educational Resources Information Center

    Harrison, Barbara; Nelson, Connie; Stroink, Mirella

    2013-01-01

    For six years the Food Security Research Network at Lakehead University, Canada, has been engaged in an interdisciplinary theme-based service-learning initiative focusing on food security. Informed by complexity theory, the contextual fluidity partnership model brings community partners, students, and faculty into a nexus through which new…

  9. Emotional Security in the Classroom: What Works for Young Children

    ERIC Educational Resources Information Center

    Janson, Gregory R.; King, Margaret A.

    2006-01-01

    Discussions regarding young children and secure schools often focus on children's physical safety and external stressors such as chaotic families, dangerous neighborhoods, and terrorism. Less attention is given to the emotional security of children in schools, a necessary prerequisite to learning and healthy development. The most effective way to…

  10. Urban Ecological Security Simulation and Prediction Using an Improved Cellular Automata (CA) Approach—A Case Study for the City of Wuhan in China

    PubMed Central

    Gao, Yuan; Zhang, Chuanrong; He, Qingsong; Liu, Yaolin

    2017-01-01

    Ecological security is an important research topic, especially urban ecological security. As highly populated eco-systems, cities always have more fragile ecological environments. However, most of the research on urban ecological security in literature has focused on evaluating current or past status of the ecological environment. Very little literature has carried out simulation or prediction of future ecological security. In addition, there is even less literature exploring the urban ecological environment at a fine scale. To fill-in the literature gap, in this study we simulated and predicted urban ecological security at a fine scale (district level) using an improved Cellular Automata (CA) approach. First we used the pressure-state-response (PSR) method based on grid-scale data to evaluate urban ecological security. Then, based on the evaluation results, we imported the geographically weighted regression (GWR) concept into the CA model to simulate and predict urban ecological security. We applied the improved CA approach in a case study—simulating and predicting urban ecological security for the city of Wuhan in Central China. By comparing the simulated ecological security values from 2010 using the improved CA model to the actual ecological security values of 2010, we got a relatively high value of the kappa coefficient, which indicates that this CA model can simulate or predict well future development of ecological security in Wuhan. Based on the prediction results for 2020, we made some policy recommendations for each district in Wuhan. PMID:28617348

  11. Wikis, blogs and podcasts: a new generation of Web-based tools for virtual collaborative clinical practice and education.

    PubMed

    Boulos, Maged N Kamel; Maramba, Inocencio; Wheeler, Steve

    2006-08-15

    We have witnessed a rapid increase in the use of Web-based 'collaborationware' in recent years. These Web 2.0 applications, particularly wikis, blogs and podcasts, have been increasingly adopted by many online health-related professional and educational services. Because of their ease of use and rapidity of deployment, they offer the opportunity for powerful information sharing and ease of collaboration. Wikis are Web sites that can be edited by anyone who has access to them. The word 'blog' is a contraction of 'Web Log' - an online Web journal that can offer a resource rich multimedia environment. Podcasts are repositories of audio and video materials that can be "pushed" to subscribers, even without user intervention. These audio and video files can be downloaded to portable media players that can be taken anywhere, providing the potential for "anytime, anywhere" learning experiences (mobile learning). Wikis, blogs and podcasts are all relatively easy to use, which partly accounts for their proliferation. The fact that there are many free and Open Source versions of these tools may also be responsible for their explosive growth. Thus it would be relatively easy to implement any or all within a Health Professions' Educational Environment. Paradoxically, some of their disadvantages also relate to their openness and ease of use. With virtually anybody able to alter, edit or otherwise contribute to the collaborative Web pages, it can be problematic to gauge the reliability and accuracy of such resources. While arguably, the very process of collaboration leads to a Darwinian type 'survival of the fittest' content within a Web page, the veracity of these resources can be assured through careful monitoring, moderation, and operation of the collaborationware in a closed and secure digital environment. Empirical research is still needed to build our pedagogic evidence base about the different aspects of these tools in the context of medical/health education. If effectively deployed, wikis, blogs and podcasts could offer a way to enhance students', clinicians' and patients' learning experiences, and deepen levels of learners' engagement and collaboration within digital learning environments. Therefore, research should be conducted to determine the best ways to integrate these tools into existing e-Learning programmes for students, health professionals and patients, taking into account the different, but also overlapping, needs of these three audience classes and the opportunities of virtual collaboration between them. Of particular importance is research into novel integrative applications, to serve as the "glue" to bind the different forms of Web-based collaborationware synergistically in order to provide a coherent wholesome learning experience.

  12. U.S. Space Policy and Space Industry Strangulation

    DTIC Science & Technology

    2010-03-01

    protecting U.S. national security, and creating an environment in which non-U.S. citizens can participate fully in the U.S. space industry. 14...still protecting U.S. national security, and creating an environment in which non-U.S. citizens can participate fully in the U.S. space industry...security, and creating and sustaining a globally competitive space industry. These realms are not mutually exclusive. If technologies are overly guarded

  13. Healthcare teams over the Internet: programming a certificate-based approach.

    PubMed

    Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I

    2003-07-01

    Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modern healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has, therefore, become a major concern. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security model is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control (HAC) security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.

  14. Healthcare teams over the Internet: towards a certificate-based approach.

    PubMed

    Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I

    2002-01-01

    Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modem healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has therefore become a major concern for healthcare applications over the Internet. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security policy is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.

  15. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    NASA Astrophysics Data System (ADS)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  16. 40 CFR 11.4 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Definitions. 11.4 Section 11.4 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY GENERAL SECURITY CLASSIFICATION REGULATIONS.... Confidential refers to that national security information or material which requires protection. The test for...

  17. Land Ecological Security Evaluation of Underground Iron Mine Based on PSR Model

    NASA Astrophysics Data System (ADS)

    Xiao, Xiao; Chen, Yong; Ruan, Jinghua; Hong, Qiang; Gan, Yong

    2018-01-01

    Iron ore mine provides an important strategic resource to the national economy while it also causes many serious ecological problems to the environment. The study summed up the characteristics of ecological environment problems of underground iron mine. Considering the mining process of underground iron mine, we analysis connections between mining production, resource, environment and economical background. The paper proposed a land ecological security evaluation system and method of underground iron mine based on Pressure-State-Response model. Our application in Chengchao iron mine proves its efficiency and promising guide on land ecological security evaluation.

  18. Security Systems Consideration: A Total Security Approach

    NASA Astrophysics Data System (ADS)

    Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.

    2007-12-01

    The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.

  19. Measuring Stability and Security in Iraq

    DTIC Science & Technology

    2008-06-01

    1 1.1. Political Stability .....................................................................................................1...Section 1—Stability and Security 1.1 Political Stability With recent improvements in security, the current political environment in Iraq is

  20. MYSEA: The Monterey Security Architecture

    DTIC Science & Technology

    2009-01-01

    Security and Protection, Organization and Design General Terms: Design; Security Keywords: access controls, authentication, information flow controls...Applicable environments include: mil- itary coalitions, agencies and organizations responding to security emergencies, and mandated sharing in business ...network architecture affords users the abil- ity to securely access information across networks at dif- ferent classifications using standardized

  1. Hypermedia in Vocational Learning: A Hypermedia Learning Environment for Training Management Skills

    ERIC Educational Resources Information Center

    Konradt, Udo

    2004-01-01

    A learning environment is defined as an arrangement of issues, methods, techniques, and media in a given domain. Besides temporal and spatial features a learning environment considers the social situation in which learning takes place. In (hypermedia) learning environments the concept of exploration and the active role of the learner is…

  2. Using Wikis as a Support and Assessment Tool in Collaborative Digital Game-Based Learning Environments

    ERIC Educational Resources Information Center

    Samur, Yavuz

    2011-01-01

    In computer-supported collaborative learning (CSCL) environments, there are many researches done on collaborative learning activities; however, in game-based learning environments, more research and literature on collaborative learning activities are required. Actually, both game-based learning environments and wikis enable us to use new chances…

  3. Assessing culturally sensitive factors in the learning environment of science classrooms

    NASA Astrophysics Data System (ADS)

    Fisher, Darrell L.; Waldrip, Bruce G.

    1997-03-01

    As schools are becoming increasingly diverse in their scope and clientele, any examination of the interaction of culturally sensitive factors of students' learning environments with learning science assumes critical importance. The purpose of this exploratory study was to develop an instrument to assess learning environment factors that are culturally sensitive, to provide initial validation information on the instrument and to examine associations between students' perceptions of their learning environments and their attitudes towards science and achievement of enquiry skills. A measure of these factors of science student's learning environment, namely the Cultural Learning Environment Questionnaire (CLEQ), was developed from past learning environment instruments and influenced by Hofstede's four dimensions of culture (Power Distance, Uncertainty Avoidance, Individualism, and Masculinity/Femininity). The reliability and discriminant validity for each scale were obtained and associations between learning environment, attitude to science and enquiry skills achievement were found.

  4. Library and Archival Security: Policies and Procedures To Protect Holdings from Theft and Damage.

    ERIC Educational Resources Information Center

    Trinkaus-Randall, Gregor

    1998-01-01

    Firm policies and procedures that address the environment, patron/staff behavior, general attitude, and care and handling of materials need to be at the core of the library/archival security program. Discussion includes evaluating a repository's security needs, collections security, security in non-public areas, security in the reading room,…

  5. Enhancing Security by System-Level Virtualization in Cloud Computing Environments

    NASA Astrophysics Data System (ADS)

    Sun, Dawei; Chang, Guiran; Tan, Chunguang; Wang, Xingwei

    Many trends are opening up the era of cloud computing, which will reshape the IT industry. Virtualization techniques have become an indispensable ingredient for almost all cloud computing system. By the virtual environments, cloud provider is able to run varieties of operating systems as needed by each cloud user. Virtualization can improve reliability, security, and availability of applications by using consolidation, isolation, and fault tolerance. In addition, it is possible to balance the workloads by using live migration techniques. In this paper, the definition of cloud computing is given; and then the service and deployment models are introduced. An analysis of security issues and challenges in implementation of cloud computing is identified. Moreover, a system-level virtualization case is established to enhance the security of cloud computing environments.

  6. Variation in beliefs about ‘fracking’ between the UK and US

    NASA Astrophysics Data System (ADS)

    Evensen, Darrick; Stedman, Richard; O'Hara, Sarah; Humphrey, Mathew; Andersson-Hudson, Jessica

    2017-12-01

    In decision-making on the politically-contentious issue of unconventional gas development, the UK Government and European Commission are attempting to learn from the US experience. Although economic, environmental, and health impacts and regulatory contexts have been compared cross-nationally, public perceptions and their antecedents have not. We conducted similar online panel surveys of national samples of UK and US residents simultaneously in September 2014 to compare public perceptions and beliefs affecting such perceptions. The US sample was more likely to associate positive impacts with development (i.e. production of clean energy, cheap energy, and advancing national energy security). The UK sample was more likely to associate negative impacts (i.e. water contamination, higher carbon emissions, and earthquakes). Multivariate analyses reveal divergence cross-nationally in the relationship between beliefs about impacts and support/opposition—especially for beliefs about energy security. People who associated shale gas development with increased energy security in the UK were over three times more likely to support development than people in the US with this same belief. We conclude with implications for policy and communication, discussing communication approaches that could be successful cross-nationally and policy foci to which the UK might need to afford more attention in its continually evolving regulatory environment.

  7. Two RFID standard-based security protocols for healthcare environments.

    PubMed

    Picazo-Sanchez, Pablo; Bagheri, Nasour; Peris-Lopez, Pedro; Tapiador, Juan E

    2013-10-01

    Radio Frequency Identification (RFID) systems are widely used in access control, transportation, real-time inventory and asset management, automated payment systems, etc. Nevertheless, the use of this technology is almost unexplored in healthcare environments, where potential applications include patient monitoring, asset traceability and drug administration systems, to mention just a few. RFID technology can offer more intelligent systems and applications, but privacy and security issues have to be addressed before its adoption. This is even more dramatical in healthcare applications where very sensitive information is at stake and patient safety is paramount. In Wu et al. (J. Med. Syst. 37:19, 43) recently proposed a new RFID authentication protocol for healthcare environments. In this paper we show that this protocol puts location privacy of tag holders at risk, which is a matter of gravest concern and ruins the security of this proposal. To facilitate the implementation of secure RFID-based solutions in the medical sector, we suggest two new applications (authentication and secure messaging) and propose solutions that, in contrast to previous proposals in this field, are fully based on ISO Standards and NIST Security Recommendations.

  8. 2014 Year End Report: Center for Development of Security Excellence

    DTIC Science & Technology

    2014-01-01

    the increased availability of products available through Open eLearning and the first of its kind Facility Security Officer (FSO) Toolkit available...Toolkits 15 New Shorts 16 New Courses at CDSE 18 CDSE Webinars 18 CDSE Open eLearning Courses 19 International Engagements 19 CDSE Virtual Instructor...training, and certification future to over 1,000 registered civilian and military personnel from around the globe. Rather than travelling to a central

  9. Enterprise systems security management: a framework for breakthrough protection

    NASA Astrophysics Data System (ADS)

    Farroha, Bassam S.; Farroha, Deborah L.

    2010-04-01

    Securing the DoD information network is a tremendous task due to its size, access locations and the amount of network intrusion attempts on a daily basis. This analysis investigates methods/architecture options to deliver capabilities for secure information sharing environment. Crypto-binding and intelligent access controls are basic requirements for secure information sharing in a net-centric environment. We introduce many of the new technology components to secure the enterprise. The cooperative mission requirements lead to developing automatic data discovery and data stewards granting access to Cross Domain (CD) data repositories or live streaming data. Multiple architecture models are investigated to determine best-of-breed approaches including SOA and Private/Public Clouds.

  10. Relationship between learning environment characteristics and academic engagement.

    PubMed

    Opdenakker, Marie-Christine; Minnaert, Alexander

    2011-08-01

    The relationship between learning environment characteristics and academic engagement of 777 Grade 6 children located in 41 learning environments was explored. Questionnaires were used to tap learning environment perceptions of children, their academic engagement, and their ethnic-cultural background. The basis of the learning environment questionnaire was the International System for Teacher Observation and Feedback (ISTOF). Factor analysis indicated three factors: the teacher as a helpful and good instructor (having good instructional skills, clear instruction), the teacher as promoter of active learning and differentiation, and the teacher as manager and organizer of classroom activities. Multilevel analysis indicated that about 12% of the differences in engagement between children was related to the learning environment. All the mentioned learning environment characteristics mattered, but the teacher as a helpful, good instructor was most important followed by the teacher as promoter of active learning and differentiation.

  11. Nigerian Physiotherapy Clinical Students' Perception of Their Learning Environment Measured by the Dundee Ready Education Environment Measure Inventory

    ERIC Educational Resources Information Center

    Odole, Adesola C.; Oyewole, Olufemi O.; Ogunmola, Oluwasolape T.

    2014-01-01

    The identification of the learning environment and the understanding of how students learn will help teacher to facilitate learning and plan a curriculum to achieve the learning outcomes. The purpose of this study was to investigate undergraduate physiotherapy clinical students' perception of University of Ibadan's learning environment. Using the…

  12. Supporting cognitive engagement in a learning-by-doing learning environment: Case studies of participant engagement and social configurations in Kitchen Science Investigators

    NASA Astrophysics Data System (ADS)

    Gardner, Christina M.

    Learning-by-doing learning environments support a wealth of physical engagement in activities. However, there is also a lot of variability in what participants learn in each enactment of these types of environments. Therefore, it is not always clear how participants are learning in these environments. In order to design technologies to support learning in these environments, we must have a greater understanding of how participants engage in learning activities, their goals for their engagement, and the types of help they need to cognitively engage in learning activities. To gain a greater understanding of participant engagement and factors and circumstances that promote and inhibit engagement, this dissertation explores and answers several questions: What are the types of interactions and experiences that promote and /or inhibit learning and engagement in learning-by-doing learning environments? What are the types of configurations that afford or inhibit these interactions and experiences in learning-by-doing learning environments? I explore answers to these questions through the context of two enactments of Kitchen Science Investigators (KSI), a learning-by-doing learning environment where middle-school aged children learn science through cooking from customizing recipes to their own taste and texture preferences. In small groups, they investigate effects of ingredients through the design of cooking and science experiments, through which they experience and learn about chemical, biological, and physical science phenomena and concepts (Clegg, Gardner, Williams, & Kolodner, 2006). The research reported in this dissertation sheds light on the different ways participant engagement promotes and/or inhibits cognitive engagement in by learning-by-doing learning environments through two case studies. It also provides detailed descriptions of the circumstances (social, material, and physical configurations) that promote and/or inhibit participant engagement in these learning environments through cross-case analyses of these cases. Finally, it offers suggestions about structuring activities, selecting materials and resources, and designing facilitation and software-realized scaffolding in the design of these types of learning environments. These design implications focus on affording participant engagement in science content and practices learning. Overall, the case studies, cross-case analyses, and empirically-based design implications begin to bridge the gap between theory and practice in the design and implementation of these learning environments. This is demonstrated by providing detailed and explanatory examples and factors that affect how participants take up the affordances of the learning opportunities designed into these learning environments.

  13. Challenges in researching violence affecting health service delivery in complex security environments.

    PubMed

    Foghammar, Ludvig; Jang, Suyoun; Kyzy, Gulzhan Asylbek; Weiss, Nerina; Sullivan, Katherine A; Gibson-Fall, Fawzia; Irwin, Rachel

    2016-08-01

    Complex security environments are characterized by violence (including, but not limited to "armed conflict" in the legal sense), poverty, environmental disasters and poor governance. Violence directly affecting health service delivery in complex security environments includes attacks on individuals (e.g. doctors, nurses, administrators, security guards, ambulance drivers and translators), obstructions (e.g. ambulances being stopped at checkpoints), discrimination (e.g. staff being pressured to treat one patient instead of another), attacks on and misappropriation of health facilities and property (e.g. vandalism, theft and ambulance theft by armed groups), and the criminalization of health workers. This paper examines the challenges associated with researching the context, scope and nature of violence directly affecting health service delivery in these environments. With a focus on data collection, it considers how these challenges affect researchers' ability to analyze the drivers of violence and impact of violence. This paper presents key findings from two research workshops organized in 2014 and 2015 which convened researchers and practitioners in the fields of health and humanitarian aid delivery and policy, and draws upon an analysis of organizational efforts to address violence affecting healthcare delivery and eleven in-depth interviews with representatives of organizations working in complex security environments. Despite the urgency and impact of violence affecting healthcare delivery, there is an overall lack of research that is of health-specific, publically accessible and comparable, as well as a lack of gender-disaggregated data, data on perpetrator motives and an assessment of the 'knock-on' effects of violence. These gaps limit analysis and, by extension, the ability of organizations operating in complex security environments to effectively manage the security of their staff and facilities and to deliver health services. Increased research collaboration among aid organizations, researchers and multilateral organizations, such as the WHO, is needed to address these challenges. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Strategic Paralysis: An Airpower Theory for the Present

    DTIC Science & Technology

    1992-05-01

    Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...Control as: �The role that encompasses all actions taken to secure and control the aerospace environment and to deny the use of that environment to the...destruction is to damage one�s own future prosperity, and, by sowing the seeds of revenge, to jeopardize one�s future security .�48 This is a hauntingly

  15. 20 CFR 404.633 - Deemed filing date in a case of misinformation.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... misinformation. 404.633 Section 404.633 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE.... Example 1: Mrs. Smith, a widow of an insured individual, contacts a Social Security office when she... contacts a Social Security office to ask about filing for widow's insurance benefits and learns that she...

  16. 20 CFR 404.633 - Deemed filing date in a case of misinformation.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... misinformation. 404.633 Section 404.633 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE.... Example 1: Mrs. Smith, a widow of an insured individual, contacts a Social Security office when she... contacts a Social Security office to ask about filing for widow's insurance benefits and learns that she...

  17. 20 CFR 404.633 - Deemed filing date in a case of misinformation.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... misinformation. 404.633 Section 404.633 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE.... Example 1: Mrs. Smith, a widow of an insured individual, contacts a Social Security office when she... contacts a Social Security office to ask about filing for widow's insurance benefits and learns that she...

  18. 20 CFR 404.633 - Deemed filing date in a case of misinformation.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... misinformation. 404.633 Section 404.633 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE.... Example 1: Mrs. Smith, a widow of an insured individual, contacts a Social Security office when she... contacts a Social Security office to ask about filing for widow's insurance benefits and learns that she...

  19. 20 CFR 404.633 - Deemed filing date in a case of misinformation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... misinformation. 404.633 Section 404.633 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE.... Example 1: Mrs. Smith, a widow of an insured individual, contacts a Social Security office when she... contacts a Social Security office to ask about filing for widow's insurance benefits and learns that she...

  20. Teaching Information Security with Workflow Technology--A Case Study Approach

    ERIC Educational Resources Information Center

    He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang

    2014-01-01

    In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…

  1. Threat driven modeling framework using petri nets for e-learning system.

    PubMed

    Khamparia, Aditya; Pandey, Babita

    2016-01-01

    Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.

  2. Robust free-space optical communication for indoor information environment

    NASA Astrophysics Data System (ADS)

    Nakada, Toyohisa; Itoh, Hideo; Kunifuji, Susumu; Nakashima, Hideyuki

    2003-10-01

    The purpose of our study is to establish a robust communication, while keeping security and privacy, between a handheld communicator and the surrounding information environment. From the viewpoint of low power consumption, we have been developing a reflectivity modulating communication module composed of a liquid crystal light modulator and a corner-reflecting mirror sheet. We installed a corner-reflecting sheet instead of light scattering sheet in a handheld videogame machine with a display screen with a reflection-type liquid crystal. Infrared (IR) LED illuminator attached next to the IR camera of a base station illuminates all the room, and the terminal send their data to the base station by switching ON and OFF of the reflected IR beam. Intensity of reflected light differs with the position and the direction of the terminal, and sometimes the intensity of OFF signal at a certain condition is brighter than that of ON signal at another condition. To improve the communication quality, use of machine learning technique is a possibility of the solution. In this paper, we compare various machine learning techniques for the purpose of free space optical communication, and propose a new algorithm that improves the robustness of the data link. Evaluation using an actual free-space communication system is also described.

  3. How People Learn in an Asynchronous Online Learning Environment: The Relationships between Graduate Students' Learning Strategies and Learning Satisfaction

    ERIC Educational Resources Information Center

    Choi, Beomkyu

    2016-01-01

    The purpose of this study was to examine the relationships between learners' learning strategies and learning satisfaction in an asynchronous online learning environment. In an attempt to shed some light on how people learn in an online learning environment, one hundred and sixteen graduate students who were taking online learning courses…

  4. Development of a user-centered radiology teaching file system

    NASA Astrophysics Data System (ADS)

    dos Santos, Marcelo; Fujino, Asa

    2011-03-01

    Learning radiology requires systematic and comprehensive study of a large knowledge base of medical images. In this work is presented the development of a digital radiology teaching file system. The proposed system has been created in order to offer a set of customized services regarding to users' contexts and their informational needs. This has been done by means of an electronic infrastructure that provides easy and integrated access to all relevant patient data at the time of image interpretation, so that radiologists and researchers can examine all available data to reach well-informed conclusions, while protecting patient data privacy and security. The system is presented such as an environment which implements a distributed clinical database, including medical images, authoring tools, repository for multimedia documents, and also a peer-reviewed model which assures dataset quality. The current implementation has shown that creating clinical data repositories on networked computer environments points to be a good solution in terms of providing means to review information management practices in electronic environments and to create customized and contextbased tools for users connected to the system throughout electronic interfaces.

  5. Learning through Work: Emerging Perspectives and New Challenges

    ERIC Educational Resources Information Center

    Billett, Stephen; Choy, Sarojni

    2013-01-01

    Purpose: This paper aims to consider and appraise current developments and emerging perspectives on learning in the circumstances of work, to propose how some of the challenges for securing effective workplace learning may be redressed. Design/methodology/approach: First, new challenges and perspectives on learning in the circumstances of work are…

  6. Designing Ensemble Based Security Framework for M-Learning System

    ERIC Educational Resources Information Center

    Mahalingam, Sheila; Abdollah, Mohd Faizal; bin Sahibuddin, Shahrin

    2014-01-01

    Mobile Learning has a potential to improve efficiency in the education sector and expand educational opportunities to underserved remote area in higher learning institutions. However there are multi challenges in different altitude faced when introducing and implementing m-learning. Despite the evolution of technology changes in education,…

  7. Scaffolding in Connectivist Mobile Learning Environment

    ERIC Educational Resources Information Center

    Ozan, Ozlem

    2013-01-01

    Social networks and mobile technologies are transforming learning ecology. In this changing learning environment, we find a variety of new learner needs. The aim of this study is to investigate how to provide scaffolding to the learners in connectivist mobile learning environment: (1) to learn in a networked environment; (2) to manage their…

  8. Online Resource-Based Learning Environment: Case Studies in Primary Classrooms

    ERIC Educational Resources Information Center

    So, Winnie Wing Mui; Ching, Fiona Ngai Ying

    2012-01-01

    This paper discusses the creation of learning environments with online resources by three primary school teachers for pupil's learning of science-related topics with reference to the resource-based e-learning environments (RBeLEs) framework. Teachers' choice of contexts, resources, tools, and scaffolds in designing the learning environments are…

  9. The Predicaments of Language Learners in Traditional Learning Environments

    ERIC Educational Resources Information Center

    Shafie, Latisha Asmaak; Mansor, Mahani

    2009-01-01

    Some public universities in developing countries have traditional language learning environments such as classrooms with only blackboards and furniture which do not provide conducive learning environments. These traditional environments are unable to cater for digital learners who need to learn with learning technologies. In order to create…

  10. The Integration of Personal Learning Environments & Open Network Learning Environments

    ERIC Educational Resources Information Center

    Tu, Chih-Hsiung; Sujo-Montes, Laura; Yen, Cherng-Jyh; Chan, Junn-Yih; Blocher, Michael

    2012-01-01

    Learning management systems traditionally provide structures to guide online learners to achieve their learning goals. Web 2.0 technology empowers learners to create, share, and organize their personal learning environments in open network environments; and allows learners to engage in social networking and collaborating activities. Advanced…

  11. Experiential Learning and Learning Environments: The Case of Active Listening Skills

    ERIC Educational Resources Information Center

    Huerta-Wong, Juan Enrique; Schoech, Richard

    2010-01-01

    Social work education research frequently has suggested an interaction between teaching techniques and learning environments. However, this interaction has never been tested. This study compared virtual and face-to-face learning environments and included active listening concepts to test whether the effectiveness of learning environments depends…

  12. Associations between the local food environment and the severity of food insecurity among new families using community food security interventions in Montreal.

    PubMed

    Pérez, Elsury; Roncarolo, Federico; Potvin, Louise

    2017-04-20

    To examine the association between the local food environment and the severity of food insecurity among new families using community food security interventions in Montreal. In this cross-sectional study, we analyzed baseline data from 785 adults aged 18-65 years enrolled in the evaluation of the effects of organizations delivering community food security interventions in Montreal. The dependent variable was household food insecurity, while the independent variable was the local food environment, assessed through: location of the most frequently used grocery store, distance between the participant's residence and the community organization used, mode of transportation, walking time to the most frequently used grocery store, satisfaction with the acceptability and affordability of food available at the most frequently used grocery store, and self-reported difficulties in accessing food. We used polytomous logistic regression to estimate the association between household food insecurity and the local food environment. In all the models, we coded food security status in three categories: food security, moderate food insecurity and severe food insecurity. The last group was used as a reference group. Our data suggest that compared to households with severe food insecurity, those with moderate food insecurity (OR = 0.43, 95% CI: 0.28-0.62) and those with food security (OR = 0.13, 95% CI: 0.06-0.26) were less likely to report difficulties in accessing food due to food affordability. Food-secure households also had lower odds of reporting difficulties in accessing food due to transportation constraints (OR = 0.18, 95% CI: 0.06-0.55) compared with severe food-insecure households. Living a distance of between 1 and 2 km from the organization used was significantly correlated with moderate food insecurity (OR = 1.80, 95% CI: 1.12-2.88). The local food environment is associated with severity of household food insecurity among new families using community food security interventions in Montreal. Future studies should study the relationship between the local food environment and food insecurity across all dimensions of food access.

  13. MACCIS 2.0 - An Architecture Description Framework for Technical Infostructures and Their Enterprise Environment

    DTIC Science & Technology

    2004-06-01

    Viewpoint Component Viewpoint View Architecture Description of Enterprise or Infostructure View Security Concern Business Security Model Business...security concern, when applied to the different viewpoints, addresses both stakeholders, and is described as a business security model or component...Viewpoint View Architecture Description of Enterprise or Infostructure View Security Concern Business Security Model Business Stakeholder IT Architect

  14. Transboundary natural area protection: Broadening the definition of national security

    Treesearch

    Haven B. Cook

    2007-01-01

    This paper looks at the definition and concept of national security, and examines how the environment is linked with national security. The traditional, state view of national security that guides most foreign policy includes the concepts of military power, sovereignty and geopolitical stability. This paper advocates broadening the definition of security to include...

  15. Secrecy vs. the need for ecological information: challenges to environmental activism in Russia.

    PubMed

    Jandl, T

    1998-01-01

    This article identifies the lessons learned from the Nikitin case study in Russia. The Nikitin case involves the analysis of sources of radioactive contamination in several Russian counties and in the Russian Northern Fleet. Norway was interested in the issue due to proximity to the storage sites. The issue involved national security and environmental protection. It was learned that mixing national security issues with environmental issues offers dangerous and multiple challenges. Environmental groups must build relationships with a wide audience. International security policy must include the issues of globalization of trade and the spread of environmental problems into the global commons (oceans and atmosphere). The risk of an environmentally dangerous accident as a consequence of Cold War activities is greater than the risk of nuclear war. Secrecy in military affairs is not justified when there is inadequate storage of nuclear weapons and contaminated materials. In Russia, the concern is great due to their economic transition and shortages of funds for even the most basic needs, which excludes nuclear waste clean up. The Bellona Foundation studied the extent of nuclear pollution from military nuclear reactors in the Kola peninsula of northwest Russia, in 1994 and 1996. Russian security police arrested one of the report authors for alleged national security violations. A valuable lesson learned was that local Russian environmental groups needed international support. The military nuclear complex poses an enormous hazard. Limiting inspections is an unacceptable national security risk. The new Russian law on state secrets is too broad.

  16. The Role of the Constructivist Learning Theory and Collaborative Learning Environment on Wiki Classroom, and the Relationship between Them

    ERIC Educational Resources Information Center

    Alzahrani, Ibraheem; Woollard, John

    2013-01-01

    This paper seeks to discover the relationship between both the social constructivist learning theory and the collaborative learning environment. This relationship can be identified by giving an example of the learning environment. Due to wiki characteristics, Wiki technology is one of the most famous learning environments that can show the…

  17. Practice education learning environments: the mismatch between perceived and preferred expectations of undergraduate health science students.

    PubMed

    Brown, Ted; Williams, Brett; McKenna, Lisa; Palermo, Claire; McCall, Louise; Roller, Louis; Hewitt, Lesley; Molloy, Liz; Baird, Marilyn; Aldabah, Ligal

    2011-11-01

    Practical hands-on learning opportunities are viewed as a vital component of the education of health science students, but there is a critical shortage of fieldwork placement experiences. It is therefore important that these clinical learning environments are well suited to students' perceptions and expectations. To investigate how undergraduate students enrolled in health-related education programs view their clinical learning environments and specifically to compare students' perception of their 'actual' clinical learning environment to that of their 'preferred/ideal' clinical learning environment. The Clinical Learning Environment Inventory (CLEI) was used to collect data from 548 undergraduate students (55% response rate) enrolled in all year levels of paramedics, midwifery, radiography and medical imaging, occupational therapy, pharmacy, nutrition and dietetics, physiotherapy and social work at Monash University via convenience sampling. Students were asked to rate their perception of the clinical learning environment at the completion of their placements using the CLEI. Satisfaction of the students enrolled in the health-related disciplines was closely linked with the five constructs measured by the CLEI: Personalization, Student Involvement, Task Orientation, Innovation, and Individualization. Significant differences were found between the student's perception of their 'actual' clinical learning environment and their 'ideal' clinical learning environment. The study highlights the importance of a supportive clinical learning environment that places emphasis on effective two-way communication. A thorough understanding of students' perceptions of their clinical learning environments is essential. Copyright © 2010 Elsevier Ltd. All rights reserved.

  18. Applying a Framework for Student Modeling in Exploratory Learning Environments: Comparing Data Representation Granularity to Handle Environment Complexity

    ERIC Educational Resources Information Center

    Fratamico, Lauren; Conati, Cristina; Kardan, Samad; Roll, Ido

    2017-01-01

    Interactive simulations can facilitate inquiry learning. However, similarly to other Exploratory Learning Environments, students may not always learn effectively in these unstructured environments. Thus, providing adaptive support has great potential to help improve student learning with these rich activities. Providing adaptive support requires a…

  19. A Simultaneous Mobile E-Learning Environment and Application

    ERIC Educational Resources Information Center

    Karal, Hasan; Bahcekapili, Ekrem; Yildiz, Adil

    2010-01-01

    The purpose of the present study was to design a mobile learning environment that enables the use of a teleconference application used in simultaneous e-learning with mobile devices and to evaluate this mobile learning environment based on students' views. With the mobile learning environment developed in the study, the students are able to follow…

  20. Using Scenarios to Design Complex Technology-Enhanced Learning Environments

    ERIC Educational Resources Information Center

    de Jong, Ton; Weinberger, Armin; Girault, Isabelle; Kluge, Anders; Lazonder, Ard W.; Pedaste, Margus; Ludvigsen, Sten; Ney, Muriel; Wasson, Barbara; Wichmann, Astrid; Geraedts, Caspar; Giemza, Adam; Hovardas, Tasos; Julien, Rachel; van Joolingen, Wouter R.; Lejeune, Anne; Manoli, Constantinos C.; Matteman, Yuri; Sarapuu, Tago; Verkade, Alex; Vold, Vibeke; Zacharia, Zacharias C.

    2012-01-01

    Science Created by You (SCY) learning environments are computer-based environments in which students learn about science topics in the context of addressing a socio-scientific problem. Along their way to a solution for this problem students produce many types of intermediate products or learning objects. SCY learning environments center the entire…

  1. Applying Acquisition Lessons Learned to Operational Energy Initiatives

    DTIC Science & Technology

    2013-03-01

    current and future platforms to meet the demands of Energy-Informed Operations. Endnotes 1 Charles F. Wald , and Tom Captain, Energy Security America’s...2013); Wald and Captain, Energy Security America’s Best Defense, 1. 3 The Army’s agile process involves seven phases and three decision points to...https://acc.dau.mil/adl/en- US/329976/file/47235/EVM_Report_to_Congress.pdf (accessed January 14, 2013). 22 Lisa Pracchia, “The AV-8B Team Learns Synergy

  2. Learning Environments Designed According to Learning Styles and Its Effects on Mathematics Achievement

    ERIC Educational Resources Information Center

    Özerem, Aysen; Akkoyunlu, Buket

    2015-01-01

    Problem Statement: While designing a learning environment it is vital to think about learner characteristics (learning styles, approaches, motivation, interests… etc.) in order to promote effective learning. The learning environment and learning process should be designed not to enable students to learn in the same manner and at the same level,…

  3. Spent Nuclear Fuel Transportation: An Examination of Potential Lessons Learned From Prior Shipping Campaigns

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Marsha Keister; Kathryn McBride

    The Nuclear Waste Policy Act of 1982 (NWPA), as amended, assigned the Department of Energy (DOE) responsibility for developing and managing a Federal system for the disposal of spent nuclear fuel (SNF) and high-level radioactive waste (HLW). The Office of Civilian Radioactive Waste Management (OCRWM) is responsible for accepting, transporting, and disposing of SNF and HLW at the Yucca Mountain repository in a manner that protects public health, safety, and the environment; enhances national and energy security; and merits public confidence. OCRWM faces a near-term challenge—to develop and demonstrate a transportation system that will sustain safe and efficient shipments ofmore » SNF and HLW to a repository. To better inform and improve its current planning, OCRWM has extensively reviewed plans and other documents related to past high-visibility shipping campaigns of SNF and other radioactive materials within the United States. This report summarizes the results of this review and, where appropriate, lessons learned.« less

  4. 7 CFR 1962.18 - Unapproved disposition of chattel security.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., RURAL BUSINESS-COOPERATIVE SERVICE, RURAL UTILITIES SERVICE, AND FARM SERVICE AGENCY, DEPARTMENT OF... learns that a borrower has made a disposition of chattel security in a manner not provided for on Form Fm...

  5. 7 CFR 1962.18 - Unapproved disposition of chattel security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ..., RURAL BUSINESS-COOPERATIVE SERVICE, RURAL UTILITIES SERVICE, AND FARM SERVICE AGENCY, DEPARTMENT OF... learns that a borrower has made a disposition of chattel security in a manner not provided for on Form Fm...

  6. Web-Based Learning Environment Based on Students’ Needs

    NASA Astrophysics Data System (ADS)

    Hamzah, N.; Ariffin, A.; Hamid, H.

    2017-08-01

    Traditional learning needs to be improved since it does not involve active learning among students. Therefore, in the twenty-first century, the development of internet technology in the learning environment has become the main needs of each student. One of the learning environments to meet the needs of the teaching and learning process is a web-based learning environment. This study aims to identify the characteristics of a web-based learning environment that supports students’ learning needs. The study involved 542 students from fifteen faculties in a public higher education institution in Malaysia. A quantitative method was used to collect the data via a questionnaire survey by randomly. The findings indicate that the characteristics of a web-based learning environment that support students’ needs in the process of learning are online discussion forum, lecture notes, assignments, portfolio, and chat. In conclusion, the students overwhelmingly agreed that online discussion forum is the highest requirement because the tool can provide a space for students and teachers to share knowledge and experiences related to teaching and learning.

  7. Afghanistan: Key Oversight Issues

    DTIC Science & Technology

    2013-02-01

    2012. Afghan Security : Renewed Sharing of Biometric Data Could Strengthen U.S. Efforts to Protect U.S. Personnel from Afghan Security Force Attacks...SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18. NUMBER OF PAGES 59 19a. NAME OF RESPONSIBLE PERSON...Afghanistan’s Security Environment 17 Enclosure II Transition of Lead Security to Afghan Security Forces 19 Enclosure III Future Cost and

  8. Beyond Conflict and Kinetics: Airpower Strategy for Human Security Operations

    DTIC Science & Technology

    2014-08-26

    America to a leadership role of the international community while dramatically altering its security environment. After World War II, American security...health, environmental, personal, community , and political security. At the same time it stopped short of providing a finite definition, instead...seven areas of human security are economic, food, health, environmental, personal, community and political security. These components are a “universal

  9. Defining a risk-informed framework for whole-of-government lessons learned: A Canadian perspective.

    PubMed

    Friesen, Shaye K; Kelsey, Shelley; Legere, J A Jim

    Lessons learned play an important role in emergency management (EM) and organizational agility. Virtually all aspects of EM can derive benefit from a lessons learned program. From major security events to exercises, exploiting and applying lessons learned and "best practices" is critical to organizational resilience and adaptiveness. A robust lessons learned process and methodology provides an evidence base with which to inform decisions, guide plans, strengthen mitigation strategies, and assist in developing tools for operations. The Canadian Safety and Security Program recently supported a project to define a comprehensive framework that would allow public safety and security partners to regularly share event response best practices, and prioritize recommendations originating from after action reviews. This framework consists of several inter-locking elements: a comprehensive literature review/environmental scan of international programs; a survey to collect data from end users and management; the development of a taxonomy for organizing and structuring information; a risk-informed methodology for selecting, prioritizing, and following through on recommendations; and standardized templates and tools for tracking recommendations and ensuring implementation. This article discusses the efforts of the project team, which provided "best practice" advice and analytical support to ensure that a systematic approach to lessons learned was taken by the federal community to improve prevention, preparedness, and response activities. It posits an approach by which one might design a systematic process for information sharing and event response coordination-an approach that will assist federal departments to institutionalize a cross-government lessons learned program.

  10. Assessment of ecological security based on soil and water conservation: a case study from Gansu Province, China

    NASA Astrophysics Data System (ADS)

    Li, Z. J.; Tian, Q.; Song, L. L.

    2016-08-01

    In this study, the analytic hierarchy process (ahp), ecological security index(S) and PSR model were used to evaluate Gansu's ecological security based on the large number of survey data. The results indicated that Gansu's ecological security index increased from 0.31 in 1986 to 0.66 in 2013, which reflected ecological security was in sensitive state (0.7༞S≥⃒0.5). The main reason was that national policy on protecting the ecological environment has played a crucial role, especially the national project of returning farmland to forest and grass carried out in recent years. Moreover, the environmental issues such as the higher PM2.5, sand storms and climate extremes, had significantly improved people's environmental awareness in the study area. The regional difference of ecological security index was significant in Gansu Provinces, and the part of Yangtze river basin was higher than the part of Yellow River basin, whiles the in-land river basin was the lowest value. In a world, Gansu's ecological security had improved in recent years, but there was strong need for paying more attention to policy for ecological environment protection and increasing the propaganda to ensure the Gansu's ecological security in the future. This study will provide a scientific basis for the sustainable development of regional social economy and ecological environment.

  11. Distributing vs. Blocking Learning Questions in a Web-Based Learning Environment

    ERIC Educational Resources Information Center

    Kapp, Felix; Proske, Antje; Narciss, Susanne; Körndle, Hermann

    2015-01-01

    Effective studying in web-based learning environments (web-LEs) requires cognitive engagement and demands learners to regulate their learning activities. One way to support learners in web-LEs is to provide interactive learning questions within the learning environment. Even though research on learning questions has a long tradition, there are…

  12. Learning with Collaborative Inquiry: A Science Learning Environment for Secondary Students

    ERIC Educational Resources Information Center

    Sun, Daner; Looi, Chee-Kit; Xie, Wenting

    2017-01-01

    When inquiry-based learning is designed for a collaborative context, the interactions that arise in the learning environment can become fairly complex. While the learning effectiveness of such learning environments has been reported in the literature, there have been fewer studies on the students' learning processes. To address this, the article…

  13. Learning in a u-Museum: Developing a Context-Aware Ubiquitous Learning Environment

    ERIC Educational Resources Information Center

    Chen, Chia-Chen; Huang, Tien-Chi

    2012-01-01

    Context-awareness techniques can support learners in learning without time or location constraints by using mobile devices and associated learning activities in a real learning environment. Enrichment of context-aware technologies has enabled students to learn in an environment that integrates learning resources from both the real world and the…

  14. Coping with Iran: Confrontation, Containment, or Engagement?

    DTIC Science & Technology

    2007-01-01

    David Ignatius (national security columnist , The Washington Post) IRAN’S NATIONAL SECURITY ENVIRONMENT Mohammad Javad Zarif Iran’s national security...senior editor, Newsweek) David Ignatius (national security columnist , The Washington Post) HOW THE U.S. GOVERNMENT VIEWS IRAN R. Nicholas Burns...Iranian Ambassador to the United Nations Questions Michael Hirsh Senior Editor Newsweek David Ignatius National Security Columnist The Washington

  15. Assessing the Impact of Student Learning Style Preferences

    NASA Astrophysics Data System (ADS)

    Davis, Stacey M.; Franklin, Scott V.

    2004-09-01

    Students express a wide range of preferences for learning environments. We are trying to measure the manifestation of learning styles in various learning environments. In particular, we are interested in performance in an environment that disagrees with the expressed learning style preference, paying close attention to social (group vs. individual) and auditory (those who prefer to learn by listening) environments. These are particularly relevant to activity-based curricula which typically emphasize group-work and de-emphasize lectures. Our methods include multiple-choice assessments, individual student interviews, and a study in which we attempt to isolate the learning environment.

  16. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.

    DTIC Science & Technology

    1987-12-31

    This report also provides data on the initiatives being implemented as a result of the review of domestic airport security by the Secretary’s Safety...enforcement support for airline and airport security measures. Finally, the passengers-the ultimate beneficiaries of the security program--pay for...of these airports is required to implement a security program which provides a secure operating environment for these air carriers. Airport security programs

  17. Construction of a Digital Learning Environment Based on Cloud Computing

    ERIC Educational Resources Information Center

    Ding, Jihong; Xiong, Caiping; Liu, Huazhong

    2015-01-01

    Constructing the digital learning environment for ubiquitous learning and asynchronous distributed learning has opened up immense amounts of concrete research. However, current digital learning environments do not fully fulfill the expectations on supporting interactive group learning, shared understanding and social construction of knowledge.…

  18. A Well Designed School Environment Facilitates Brain Learning.

    ERIC Educational Resources Information Center

    Chan, Tak Cheung; Petrie, Garth

    2000-01-01

    Examines how school design facilitates learning by complementing how the brain learns. How the brain learns is discussed and how an artistic environment, spaciousness in the learning areas, color and lighting, and optimal thermal and acoustical environments aid student learning. School design suggestions conclude the article. (GR)

  19. 40 CFR 264.14 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 26 2011-07-01 2011-07-01 false Security. 264.14 Section 264.14... Standards § 264.14 Security. (a) The owner or operator must prevent the unknowing entry, and minimize the...) for discussion of security requirements at disposal facilities during the post-closure care period...

  20. 40 CFR 265.14 - Security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 40 Protection of Environment 26 2011-07-01 2011-07-01 false Security. 265.14 Section 265.14... Facility Standards § 265.14 Security. (a) The owner or operator must prevent the unknowing entry, and...) for discussion of security requirements at disposal facilities during the post-closure care period...

  1. 40 CFR 264.14 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 27 2012-07-01 2012-07-01 false Security. 264.14 Section 264.14... Standards § 264.14 Security. (a) The owner or operator must prevent the unknowing entry, and minimize the...) for discussion of security requirements at disposal facilities during the post-closure care period...

  2. 40 CFR 264.14 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 27 2013-07-01 2013-07-01 false Security. 264.14 Section 264.14... Standards § 264.14 Security. (a) The owner or operator must prevent the unknowing entry, and minimize the...) for discussion of security requirements at disposal facilities during the post-closure care period...

  3. 40 CFR 265.14 - Security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 40 Protection of Environment 27 2012-07-01 2012-07-01 false Security. 265.14 Section 265.14... Facility Standards § 265.14 Security. (a) The owner or operator must prevent the unknowing entry, and...) for discussion of security requirements at disposal facilities during the post-closure care period...

  4. 40 CFR 265.14 - Security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 40 Protection of Environment 27 2013-07-01 2013-07-01 false Security. 265.14 Section 265.14... Facility Standards § 265.14 Security. (a) The owner or operator must prevent the unknowing entry, and...) for discussion of security requirements at disposal facilities during the post-closure care period...

  5. 40 CFR 265.14 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 26 2014-07-01 2014-07-01 false Security. 265.14 Section 265.14... Facility Standards § 265.14 Security. (a) The owner or operator must prevent the unknowing entry, and...) for discussion of security requirements at disposal facilities during the post-closure care period...

  6. 40 CFR 264.14 - Security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 40 Protection of Environment 26 2014-07-01 2014-07-01 false Security. 264.14 Section 264.14... Standards § 264.14 Security. (a) The owner or operator must prevent the unknowing entry, and minimize the...) for discussion of security requirements at disposal facilities during the post-closure care period...

  7. 40 CFR 92.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 92.908... Provisions § 92.908 National security exemption. A manufacturer or remanufacturer requesting a national security exemption must state the purpose for which the exemption is required and the request must be...

  8. 40 CFR 85.1708 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 18 2010-07-01 2010-07-01 false National security exemption. 85.1708... Vehicle Engines § 85.1708 National security exemption. A manufacturer requesting a national security... agency of the Federal Government charged with responsibility for national defense. [39 FR 32611, Sept. 10...

  9. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Booker, Paul M.; Maple, Scott A.

    2010-06-08

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a causemore » add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance to smuggling activities after training or technology is deployed at a given location. This paper will present an approach to holistic border security information analysis.« less

  10. Beyond Performativity: A Pragmatic Model of Teacher Professional Learning

    ERIC Educational Resources Information Center

    Lloyd, Margaret; Davis, James P.

    2018-01-01

    The intent and content of teacher professional learning has changed in recent times to meet the demands of performativity. In this article, we offer and demonstrate a pragmatic way to map teacher professional learning that both meets current demands and secures a place for teacher-led catalytic learning. To achieve this, we position identified…

  11. E-Learning "Bites" for Adult Learners: Mixed Messages from Research

    ERIC Educational Resources Information Center

    Morrison, Marlene

    2005-01-01

    Accompanying awareness of the potential for lifelong learning to secure social inclusion and economic survival, e-learning has grown in significance and a fragile consensus about its purposes has emerged among stakeholders. The University for Industry (Ufi) and its e-learning arm, learndirect, have focused efforts especially (but not entirely)…

  12. Distance Learning: What's Holding Back This Boundless Delivery System?

    ERIC Educational Resources Information Center

    Bruder, Isabelle

    1989-01-01

    Discusses distance learning, identifies who distance learners may be, and examines issues involved in establishing distance learning systems. Topics discussed include teacher concerns, including job security and certification; curriculum concerns, including state and local requirements and cross-cultural issues; cooperative development,…

  13. APPLICATIONS OF CFD SIMULATIONS OF POLLUTANT TRANSPORT AND DISPERSION WITHIN AMBIENT URBAN BUILDING ENVIRONMENTS: INCLUDING HOMELAND SECURITY

    EPA Science Inventory

    There is presently much focus on Homeland Security and the need to understand how potential sources of toxic material are transported and dispersed in the urban environment. Material transport and dispersion within these urban centers is highly influenced by the buildings. Compu...

  14. 77 FR 20872 - Enabling a Secure Environment for Vehicle-to-Infrastructure Research Workshop; Notice of Public...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-06

    ... DEPARTMENT OF TRANSPORTATION Enabling a Secure Environment for Vehicle-to-Infrastructure Research Workshop; Notice of Public Meeting AGENCY: ITS Joint Program Office, Research and Innovative Technology Administration, U.S. Department of Transportation. ACTION: Notice. The U.S. Department of Transportation (USDOT...

  15. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks.

    PubMed

    Park, YoHan; Park, YoungHo

    2016-12-14

    Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.

  16. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks

    PubMed Central

    Park, YoHan; Park, YoungHo

    2016-01-01

    Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment. PMID:27983616

  17. Students' perception of the learning environment in a distributed medical programme.

    PubMed

    Veerapen, Kiran; McAleer, Sean

    2010-09-24

    The learning environment of a medical school has a significant impact on students' achievements and learning outcomes. The importance of equitable learning environments across programme sites is implicit in distributed undergraduate medical programmes being developed and implemented. To study the learning environment and its equity across two classes and three geographically separate sites of a distributed medical programme at the University of British Columbia Medical School that commenced in 2004. The validated Dundee Ready Educational Environment Survey was sent to all students in their 2nd and 3rd year (classes graduating in 2009 and 2008) of the programme. The domains of the learning environment surveyed were: students' perceptions of learning, students' perceptions of teachers, students' academic self-perceptions, students' perceptions of the atmosphere, and students' social self-perceptions. Mean scores, frequency distribution of responses, and inter- and intrasite differences were calculated. The perception of the global learning environment at all sites was more positive than negative. It was characterised by a strongly positive perception of teachers. The work load and emphasis on factual learning were perceived negatively. Intersite differences within domains of the learning environment were more evident in the pioneer class (2008) of the programme. Intersite differences consistent across classes were largely related to on-site support for students. Shared strengths and weaknesses in the learning environment at UBC sites were evident in areas that were managed by the parent institution, such as the attributes of shared faculty and curriculum. A greater divergence in the perception of the learning environment was found in domains dependent on local arrangements and social factors that are less amenable to central regulation. This study underlines the need for ongoing comparative evaluation of the learning environment at the distributed sites and interaction between leaders of these sites.

  18. Development of a Total Energy, Environment and Asset Management (TE2AM tm) Curriculum

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    O'Leary, Phillip R.

    2012-12-31

    The University of Wisconsin Department of Engineering Professional Development (EPD) has completed the sponsored project entitled, Development of a Total Energy, Environment and Asset Management (TE2AM) Curriculum. The project involved the development of a structured professional development program to improve the knowledge, skills, capabilities, and competencies of engineers and operators of commercial buildings. TE2AM advances a radically different approach to commercial building design, operation, maintenance, and end of life disposition. By employing asset management principles to the lifecycle of a commercial building, owners and occupants will realize improved building performance, reduced energy consumption and positive environmental impacts. Through our commercializationmore » plan, we intend to offer TE2AM courses and certificates to the professional community and continuously improve TE2AM course materials. The TE2AM project supports the DOE Strategic Theme 1 Energy Security; and will further advance the DOE Strategic Goal 1.4 Energy Productivity. Through participation in the TE2AM curriculum, engineers and operators of commercial buildings will be eligible for a professional certificate; denoting the completion of a prescribed series of learning activities. The project involved a comprehensive, rigorous approach to curriculum development, and accomplished the following goals: 1. Identify, analyze and prioritize key learning needs of engineers, architects and technical professionals as operators of commercial buildings. 2. Design and develop TE2AM curricula and instructional strategies to meet learning needs of the target learning community. 3. Establish partnerships with the sponsor and key stakeholders to enhance the development and delivery of learning programs. 4. Successfully commercialize and sustain the training and certificate programs for a substantial time following the term of the award. The project team was successful in achieving the goals and deliverables set forth in the original proposal. Though attempts were made to adhere to the original project timeline, the team requested, and was granted a 6 month project extension, during which time the project was completed.« less

  19. Framework for behavioral analytics in anomaly identification

    NASA Astrophysics Data System (ADS)

    Touma, Maroun; Bertino, Elisa; Rivera, Brian; Verma, Dinesh; Calo, Seraphin

    2017-05-01

    Behavioral Analytics (BA) relies on digital breadcrumbs to build user profiles and create clusters of entities that exhibit a large degree of similarity. The prevailing assumption is that an entity will assimilate the group behavior of the cluster it belongs to. Our understanding of BA and its application in different domains continues to evolve and is a direct result of the growing interest in Machine Learning research. When trying to detect security threats, we use BA techniques to identify anomalies, defined in this paper as deviation from the group behavior. Early research papers in this field reveal a high number of false positives where a security alert is triggered based on deviation from the cluster learned behavior but still within the norm of what the system defines as an acceptable behavior. Further, domain specific security policies tend to be narrow and inadequately represent what an entity can do. Hence, they: a) limit the amount of useful data during the learning phase; and, b) lead to violation of policy during the execution phase. In this paper, we propose a framework for future research on the role of policies and behavior security in a coalition setting with emphasis on anomaly detection and individual's deviation from group activities.

  20. Personal Learning Environments: A Solution for Self-Directed Learners

    ERIC Educational Resources Information Center

    Haworth, Ryan

    2016-01-01

    In this paper I discuss "personal learning environments" and their diverse benefits, uses, and implications for life-long learning. Personal Learning Environments (PLEs) are Web 2.0 and social media technologies that enable individual learners the ability to manage their own learning. Self-directed learning is explored as a foundation…

  1. Ubiquitous Learning Environments in Higher Education: A Scoping Literature Review

    ERIC Educational Resources Information Center

    Virtanen, Mari Aulikki; Haavisto, Elina; Liikanen, Eeva; Kääriäinen, Maria

    2018-01-01

    Ubiquitous learning and the use of ubiquitous learning environments heralds a new era in higher education. Ubiquitous learning environments enhance context-aware and seamless learning experiences available from any location at any time. They support smooth interaction between authentic and digital learning resources and provide personalized…

  2. Co-Regulation of Learning in Computer-Supported Collaborative Learning Environments: A Discussion

    ERIC Educational Resources Information Center

    Chan, Carol K. K.

    2012-01-01

    This discussion paper for this special issue examines co-regulation of learning in computer-supported collaborative learning (CSCL) environments extending research on self-regulated learning in computer-based environments. The discussion employs a socio-cognitive perspective focusing on social and collective views of learning to examine how…

  3. Directional learning and the provisioning of public goods

    PubMed Central

    Nax, Heinrich H.; Perc, Matjaž

    2015-01-01

    We consider an environment where players are involved in a public goods game and must decide repeatedly whether to make an individual contribution or not. However, players lack strategically relevant information about the game and about the other players in the population. The resulting behavior of players is completely uncoupled from such information, and the individual strategy adjustment dynamics are driven only by reinforcement feedbacks from each player's own past. We show that the resulting “directional learning” is sufficient to explain cooperative deviations away from the Nash equilibrium. We introduce the concept of k–strong equilibria, which nest both the Nash equilibrium and the Aumann-strong equilibrium as two special cases, and we show that, together with the parameters of the learning model, the maximal k–strength of equilibrium determines the stationary distribution. The provisioning of public goods can be secured even under adverse conditions, as long as players are sufficiently responsive to the changes in their own payoffs and adjust their actions accordingly. Substantial levels of public cooperation can thus be explained without arguments involving selflessness or social preferences, solely on the basis of uncoordinated directional (mis)learning. PMID:25619192

  4. Trajectories of the home learning environment across the first 5 years: associations with children's vocabulary and literacy skills at prekindergarten.

    PubMed

    Rodriguez, Eileen T; Tamis-LeMonda, Catherine S

    2011-01-01

    Children's home learning environments were examined in a low-income sample of 1,852 children and families when children were 15, 25, 37, and 63 months. During home visits, children's participation in literacy activities, the quality of mothers' engagements with their children, and the availability of learning materials were assessed, yielding a total learning environment score at each age. At 63 months, children's vocabulary and literacy skills were assessed. Six learning environment trajectories were identified, including environments that were consistently low, environments that were consistently high, and environments characterized by varying patterns of change. The skills of children at the extremes of learning environment trajectories differed by more than 1 SD and the timing of learning experiences related to specific emerging skills. © 2011 The Authors. Child Development © 2011 Society for Research in Child Development, Inc.

  5. The Interplay of Perceptions of the Learning Environment, Personality and Learning Strategies: A Study amongst International Business Studies Students

    ERIC Educational Resources Information Center

    Nijhuis, Jan; Segers, Mien; Gijselaers, Wim

    2007-01-01

    Previous research on students' learning strategies has examined the relationships between either perceptions of the learning environment or personality and learning strategies. The focus of this study was on the joint relationships between the students' perceptions of the learning environment, their personality, and the learning strategies they…

  6. An overview of the DII-HEP OpenStack based CMS data analysis

    NASA Astrophysics Data System (ADS)

    Osmani, L.; Tarkoma, S.; Eerola, P.; Komu, M.; Kortelainen, M. J.; Kraemer, O.; Lindén, T.; Toor, S.; White, J.

    2015-05-01

    An OpenStack based private cloud with the Cluster File System has been built and used with both CMS analysis and Monte Carlo simulation jobs in the Datacenter Indirection Infrastructure for Secure High Energy Physics (DII-HEP) project. On the cloud we run the ARC middleware that allows running CMS applications without changes on the job submission side. Our test results indicate that the adopted approach provides a scalable and resilient solution for managing resources without compromising on performance and high availability. To manage the virtual machines (VM) dynamically in an elastic fasion, we are testing the EMI authorization service (Argus) and the Execution Environment Service (Argus-EES). An OpenStackplugin has been developed for Argus-EES. The Host Identity Protocol (HIP) has been designed for mobile networks and it provides a secure method for IP multihoming. HIP separates the end-point identifier and locator role for IP address which increases the network availability for the applications. Our solution leverages HIP for traffic management. This presentation gives an update on the status of the work and our lessons learned in creating an OpenStackbased cloud for HEP.

  7. Intrusion Prevention and Detection in Grid Computing - The ALICE Case

    NASA Astrophysics Data System (ADS)

    Gomez, Andres; Lara, Camilo; Kebschull, Udo

    2015-12-01

    Grids allow users flexible on-demand usage of computing resources through remote communication networks. A remarkable example of a Grid in High Energy Physics (HEP) research is used in the ALICE experiment at European Organization for Nuclear Research CERN. Physicists can submit jobs used to process the huge amount of particle collision data produced by the Large Hadron Collider (LHC). Grids face complex security challenges. They are interesting targets for attackers seeking for huge computational resources. Since users can execute arbitrary code in the worker nodes on the Grid sites, special care should be put in this environment. Automatic tools to harden and monitor this scenario are required. Currently, there is no integrated solution for such requirement. This paper describes a new security framework to allow execution of job payloads in a sandboxed context. It also allows process behavior monitoring to detect intrusions, even when new attack methods or zero day vulnerabilities are exploited, by a Machine Learning approach. We plan to implement the proposed framework as a software prototype that will be tested as a component of the ALICE Grid middleware.

  8. Security-Oriented and Load-Balancing Wireless Data Routing Game in the Integration of Advanced Metering Infrastructure Network in Smart Grid

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    He, Fulin; Cao, Yang; Zhang, Jun Jason

    Ensuring flexible and reliable data routing is indispensable for the integration of Advanced Metering Infrastructure (AMI) networks, we propose a secure-oriented and load-balancing wireless data routing scheme. A novel utility function is designed based on security routing scheme. Then, we model the interactive security-oriented routing strategy among meter data concentrators or smart grid meters as a mixed-strategy network formation game. Finally, such problem results in a stable probabilistic routing scheme with proposed distributed learning algorithm. One contributions is that we studied that different types of applications affect the routing selection strategy and the strategy tendency. Another contributions is that themore » chosen strategy of our mixed routing can adaptively to converge to a new mixed strategy Nash equilibrium (MSNE) during the learning process in the smart grid.« less

  9. Computer Assisted Exercise Environment for Terrorist Attack Consequence Management

    DTIC Science & Technology

    2006-09-01

    security and crisis management. Fig. 3. Third Generation SSR for Integrated Security Sector MoD MoI MoEM MoFA Special Services Integrated Security...Ministries: MoEM , MoI, MoD, MH, MoEW, MoE, MoAF National Media, NGOs, other agencies District EOC / LEMA MHS/IDS/WIS Field EOC MHS/IDS/WIS MHS IDS...SRA EDA DG Environment ... EU SR Fund MoD MoI MoE&S MoEM ... National USA Great Britain Netherlands Germany ... Bilateral BSEC Stab. Pact ... Regional

  10. 77 FR 31186 - Security Zone; USS MISSISSIPPI Commissioning; Pascagoula Harbor & Pascagoula River; Pascagoula, MS

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-25

    ... significant effect on the human environment. This rule involves security during the arrival, commissioning... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0333] RIN 1625-AA87 Security Zone; USS MISSISSIPPI Commissioning; Pascagoula Harbor & Pascagoula River; Pascagoula, MS...

  11. School Security Assessment Programme in Australia

    ERIC Educational Resources Information Center

    Marrapodi, John

    2007-01-01

    This article describes a successful security risk management programme in Australia. The state-wide programme follows a structured risk management approach focusing on the safety and security of people, information, provision, and assets in the school environment. To assist school principals, a Security Risk Assessment Programme was developed on a…

  12. 40 CFR 90.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 90.908... Exemption of Nonroad Engines from Regulations § 90.908 National security exemption. (a)(1) Any nonroad... defense, will be considered exempt from this part for purposes of national security. No request for...

  13. 40 CFR 89.908 - National security exemption.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 20 2010-07-01 2010-07-01 false National security exemption. 89.908... Provisions § 89.908 National security exemption. (a)(1) Any nonroad engine, otherwise subject to this part... regulations for purposes of national security. No request for exemption is necessary. (2) Manufacturers may...

  14. Computer-Based Testing: Test Site Security.

    ERIC Educational Resources Information Center

    Rosen, Gerald A.

    Computer-based testing places great burdens on all involved parties to ensure test security. A task analysis of test site security might identify the areas of protecting the test, protecting the data, and protecting the environment as essential issues in test security. Protecting the test involves transmission of the examinations, identifying the…

  15. Summary of vulnerability related technologies based on machine learning

    NASA Astrophysics Data System (ADS)

    Zhao, Lei; Chen, Zhihao; Jia, Qiong

    2018-04-01

    As the scale of information system increases by an order of magnitude, the complexity of system software is getting higher. The vulnerability interaction from design, development and deployment to implementation stages greatly increases the risk of the entire information system being attacked successfully. Considering the limitations and lags of the existing mainstream security vulnerability detection techniques, this paper summarizes the development and current status of related technologies based on the machine learning methods applied to deal with massive and irregular data, and handling security vulnerabilities.

  16. CLEW: A Cooperative Learning Environment for the Web.

    ERIC Educational Resources Information Center

    Ribeiro, Marcelo Blois; Noya, Ricardo Choren; Fuks, Hugo

    This paper outlines CLEW (collaborative learning environment for the Web). The project combines MUD (Multi-User Dimension), workflow, VRML (Virtual Reality Modeling Language) and educational concepts like constructivism in a learning environment where students actively participate in the learning process. The MUD shapes the environment structure.…

  17. Evaluating and Implementing Learning Environments: A United Kingdom Experience.

    ERIC Educational Resources Information Center

    Ingraham, Bruce; Watson, Barbara; McDowell, Liz; Brockett, Adrian; Fitzpatrick, Simon

    2002-01-01

    Reports on ongoing work at five universities in northeastern England that have been evaluating and implementing online learning environments known as virtual learning environments (VLEs) or managed learning environments (MLEs). Discusses do-it-yourself versus commercial systems; transferability; Web-based versus client-server; integration with…

  18. The Department of Homeland Security’s Role in Protecting the National Economy

    DTIC Science & Technology

    2017-09-01

    national influence, power, and security. However, new characteristics of the modern trade environment have the potential to undermine U.S. economic ...prosperity. The Department of Homeland Security (DHS) claims that homeland security is inseparable from economic security and, as such, that the...department has a role to play in supporting national economic security goals. However, DHS has yet to fully reconcile the tension between its trade

  19. Group Modeling in Social Learning Environments

    ERIC Educational Resources Information Center

    Stankov, Slavomir; Glavinic, Vlado; Krpan, Divna

    2012-01-01

    Students' collaboration while learning could provide better learning environments. Collaboration assumes social interactions which occur in student groups. Social theories emphasize positive influence of such interactions on learning. In order to create an appropriate learning environment that enables social interactions, it is important to…

  20. The clinical learning environment in nursing education: a concept analysis.

    PubMed

    Flott, Elizabeth A; Linden, Lois

    2016-03-01

    The aim of this study was to report an analysis of the clinical learning environment concept. Nursing students are evaluated in clinical learning environments where skills and knowledge are applied to patient care. These environments affect achievement of learning outcomes, and have an impact on preparation for practice and student satisfaction with the nursing profession. Providing clarity of this concept for nursing education will assist in identifying antecedents, attributes and consequences affecting student transition to practice. The clinical learning environment was investigated using Walker and Avant's concept analysis method. A literature search was conducted using WorldCat, MEDLINE and CINAHL databases using the keywords clinical learning environment, clinical environment and clinical education. Articles reviewed were written in English and published in peer-reviewed journals between 1995-2014. All data were analysed for recurring themes and terms to determine possible antecedents, attributes and consequences of this concept. The clinical learning environment contains four attribute characteristics affecting student learning experiences. These include: (1) the physical space; (2) psychosocial and interaction factors; (3) the organizational culture and (4) teaching and learning components. These attributes often determine achievement of learning outcomes and student self-confidence. With better understanding of attributes comprising the clinical learning environment, nursing education programmes and healthcare agencies can collaborate to create meaningful clinical experiences and enhance student preparation for the professional nurse role. © 2015 John Wiley & Sons Ltd.

  1. Community Garden: A Bridging Program between Formal and Informal Learning

    ERIC Educational Resources Information Center

    Datta, Ranjan

    2016-01-01

    Community garden activities can play a significant role in bridging formal and informal learning, particularly in urban children's science and environmental education. It promotes relational methods of learning, discussing, and practicing that will integrate food security, social interactions, community development, environmental activism, and…

  2. 78 FR 68987 - Guides for Private Vocational and Distance Education Schools

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-18

    ... placement assistance and assistance overcoming language barriers or learning disabilities, it will provide... learning, the source of funding for student loans, and security policies and crime statistics. In response... misrepresentations relating to student financial assistance, assistance overcoming language barriers or learning...

  3. Derived virtual devices: a secure distributed file system mechanism

    NASA Technical Reports Server (NTRS)

    VanMeter, Rodney; Hotz, Steve; Finn, Gregory

    1996-01-01

    This paper presents the design of derived virtual devices (DVDs). DVDs are the mechanism used by the Netstation Project to provide secure shared access to network-attached peripherals distributed in an untrusted network environment. DVDs improve Input/Output efficiency by allowing user processes to perform I/O operations directly from devices without intermediate transfer through the controlling operating system kernel. The security enforced at the device through the DVD mechanism includes resource boundary checking, user authentication, and restricted operations, e.g., read-only access. To illustrate the application of DVDs, we present the interactions between a network-attached disk and a file system designed to exploit the DVD abstraction. We further discuss third-party transfer as a mechanism intended to provide for efficient data transfer in a typical NAP environment. We show how DVDs facilitate third-party transfer, and provide the security required in a more open network environment.

  4. Educational environment and approaches to learning of undergraduate nursing students in an Indonesian school of nursing.

    PubMed

    Rochmawati, Erna; Rahayu, Gandes Retno; Kumara, Amitya

    2014-11-01

    The aims of this study were to assess students' perceptions of their educational environment and approaches to learning, and determine if perceptions of learning environment associates with approaches to learning. A survey was conducted to collect data from a regional private university in Indonesia. A total of 232 nursing students completed two questionnaires that measured their perceptions of educational environment and approaches to learning. The measurement was based on Dundee Ready Education Environment Measurement (DREEM) and Approaches and Study Skills Inventory for Students (ASSIST). Five learning environments dimensions and three learning approaches dimensions from two measures were measured. The overall score of DREEM was 131.03/200 (SD 17.04), it was in the range considered to be favourable. The overall score is different significantly between years of study (p value = 0.01). This study indicated that the majority of undergraduate nursing students' adopt strategic approach (n = 139. 59.9%). The finding showed that perceived educational environment significantly associated with approaches to learning. This study implicated the need to maintain conducive learning environment. There is also a need to improve the management of learning activities that reflect the use of student-centered learning. Copyright © 2014 Elsevier Ltd. All rights reserved.

  5. Case study: adapting the IAHSS curriculum in Thailand.

    PubMed

    Goss, Richard J

    2009-01-01

    In late 2007 Corporate Protective Solutions (CPS), headquartered in Langley, B.C. Canada, an independent security consulting company that specialises in healthcare security, approached the IAHSS concerning the adaptation of the Basic Training Manual and Study Guide for Healthcare Security Officers for one of their clients. In this article, its managing director for Asia Pacific outlines the challenges of this project from which other international healthcare security managers can learn to replicate the process for their own facilities.

  6. Learning with Hypertext Learning Environments: Theory, Design, and Research.

    ERIC Educational Resources Information Center

    Jacobson, Michael J.; And Others

    1996-01-01

    Studied 69 undergraduates who used conceptually-indexed hypertext learning environments with differently structured thematic criss-crossing (TCC) treatments: guided and learner selected. Found that students need explicit modeling and scaffolding support to learn complex knowledge from these learning environments, and considers implications for…

  7. A study on an information security system of a regional collaborative medical platform.

    PubMed

    Zhao, Junping; Peng, Kun; Leng, Jinchang; Sun, Xiaowei; Zhang, Zhenjiang; Xue, Wanguo; Ren, Lianzhong

    2010-01-01

    The objective of this study was to share the experience of building an information security system for a regional collaborative medical platform (RCMP) and discuss the lessons learned from practical projects. Safety measures are analyzed from the perspective of system engineering. We present the essential requirements, critical architectures, and policies for system security of regional collaborative medical platforms.

  8. Facilitative and obstructive factors in the clinical learning environment: Experiences of pupil enrolled nurses.

    PubMed

    Lekalakala-Mokgele, Eucebious; Caka, Ernestine M

    2015-03-31

    The clinical learning environment is a complex social entity that influences student learning outcomes in the clinical setting. Students can experience the clinical learning environment as being both facilitative and obstructive to their learning. The clinical environment may be a source of stress, creating feelings of fear and anxiety which in turn affect the students' responses to learning. Equally, the environment can enhance learning if experienced positively. This study described pupil enrolled nurses' experiences of facilitative and obstructive factors in military and public health clinical learning settings. Using a qualitative, contextual, exploratory descriptive design, three focus group interviews were conducted until data saturation was reached amongst pupil enrolled nurses in a military School of Nursing. Data analysed provided evidence that acceptance by clinical staff and affordance of self-directed learning facilitated learning. Students felt safe to practise when they were supported by the clinical staff. They felt a sense of belonging when the staff showed an interest in and welcomed them. Learning was obstructed when students were met with condescending comments. Wearing of a military uniform in the public hospital and horizontal violence obstructed learning in the clinical learning environment. Students cannot have effective clinical preparation if the environment is not conducive to and supportive of clinical learning, The study shows that military nursing students experience unique challenges as they are trained in two professions that are hierarchical in nature. The students experienced both facilitating and obstructing factors to their learning during their clinical practice. Clinical staff should be made aware of factors which can impact on students' learning. Policies need to be developed for supporting students in the clinical learning environment.

  9. Enabling a Secure Environment for Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) Transactions : April 2012 Public Workshop Proceedings

    DOT National Transportation Integrated Search

    2012-06-08

    This report provides a summary and overview of the Public Workshop entitled, Enabling a Secure Environment for Vehicle-to-Vehicle and Vehicle-to-Infrastructure Transactions, presented by USDOT. The workshop took place on April 19-20, 2012 at th...

  10. A Shift in the International Security Environment: Potential Implications for Defense - Issues for Congress

    DTIC Science & Technology

    2016-06-08

    Affairs June 8, 2016 Congressional Research Service 7-5700 www.crs.gov R43838 A Shift in the International Security Environment: Potential...Implications for Defense Congressional Research Service Summary World events have led some observers, starting in late 2013, to conclude that the...Defense Congressional Research Service Contents Introduction

  11. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem.

    PubMed

    Zhao, Zhenguo

    2014-05-01

    With the fast advancement of the wireless communication technology and the widespread use of medical systems, the radio frequency identification (RFID) technology has been widely used in healthcare environments. As the first important protocol for ensuring secure communication in healthcare environment, the RFID authentication protocols derive more and more attentions. Most of RFID authentication protocols are based on hash function or symmetric cryptography. To get more security properties, elliptic curve cryptosystem (ECC) has been used in the design of RFID authentication protocol. Recently, Liao and Hsiao proposed a new RFID authentication protocol using ECC and claimed their protocol could withstand various attacks. In this paper, we will show that their protocol suffers from the key compromise problem, i.e. an adversary could get the private key stored in the tag. To enhance the security, we propose a new RFID authentication protocol using ECC. Detailed analysis shows the proposed protocol not only could overcome weaknesses in Liao and Hsiao's protocol but also has the same performance. Therefore, it is more suitable for healthcare environments.

  12. Location-Enhanced Activity Recognition in Indoor Environments Using Off the Shelf Smart Watch Technology and BLE Beacons.

    PubMed

    Filippoupolitis, Avgoustinos; Oliff, William; Takand, Babak; Loukas, George

    2017-05-27

    Activity recognition in indoor spaces benefits context awareness and improves the efficiency of applications related to personalised health monitoring, building energy management, security and safety. The majority of activity recognition frameworks, however, employ a network of specialised building sensors or a network of body-worn sensors. As this approach suffers with respect to practicality, we propose the use of commercial off-the-shelf devices. In this work, we design and evaluate an activity recognition system composed of a smart watch, which is enhanced with location information coming from Bluetooth Low Energy (BLE) beacons. We evaluate the performance of this approach for a variety of activities performed in an indoor laboratory environment, using four supervised machine learning algorithms. Our experimental results indicate that our location-enhanced activity recognition system is able to reach a classification accuracy ranging from 92% to 100%, while without location information classification accuracy it can drop to as low as 50% in some cases, depending on the window size chosen for data segmentation.

  13. Science Learning Outcomes in Alignment with Learning Environment Preferences

    ERIC Educational Resources Information Center

    Chang, Chun-Yen; Hsiao, Chien-Hua; Chang, Yueh-Hsia

    2011-01-01

    This study investigated students' learning environment preferences and compared the relative effectiveness of instructional approaches on students' learning outcomes in achievement and attitude among 10th grade earth science classes in Taiwan. Data collection instruments include the Earth Science Classroom Learning Environment Inventory and Earth…

  14. Exploring Collaborative Learning Effect in Blended Learning Environments

    ERIC Educational Resources Information Center

    Sun, Z.; Liu, R.; Luo, L.; Wu, M.; Shi, C.

    2017-01-01

    The use of new technology encouraged exploration of the effectiveness and difference of collaborative learning in blended learning environments. This study investigated the social interactive network of students, level of knowledge building and perception level on usefulness in online and mobile collaborative learning environments in higher…

  15. Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks.

    PubMed

    Elgenaidi, Walid; Newe, Thomas; O'Connell, Eoin; Toal, Daniel; Dooly, Gerard

    2016-12-21

    There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper.

  16. Secure and Efficient Key Coordination Algorithm for Line Topology Network Maintenance for Use in Maritime Wireless Sensor Networks

    PubMed Central

    Elgenaidi, Walid; Newe, Thomas; O’Connell, Eoin; Toal, Daniel; Dooly, Gerard

    2016-01-01

    There has been a significant increase in the proliferation and implementation of Wireless Sensor Networks (WSNs) in different disciplines, including the monitoring of maritime environments, healthcare systems, and industrial sectors. It has now become critical to address the security issues of data communication while considering sensor node constraints. There are many proposed schemes, including the scheme being proposed in this paper, to ensure that there is a high level of security in WSNs. This paper presents a symmetric security scheme for a maritime coastal environment monitoring WSN. The scheme provides security for travelling packets via individually encrypted links between authenticated neighbors, thus avoiding a reiteration of a global rekeying process. Furthermore, this scheme proposes a dynamic update key based on a trusted node configuration, called a leader node, which works as a trusted third party. The technique has been implemented in real time on a Waspmote test bed sensor platform and the results from both field testing and indoor bench testing environments are discussed in this paper. PMID:28009834

  17. Identifying changing aviation threat environments within an adaptive Homeland Security Advisory System.

    PubMed

    Lee, Adrian J; Jacobson, Sheldon H

    2012-02-01

    A critical component of aviation security consists of screening passengers and baggage to protect airports and aircraft from terrorist threats. Advancements in screening device technology have increased the ability to detect these threats; however, specifying the operational configurations of these devices in response to changes in the threat environment can become difficult. This article proposes to use Fisher information as a statistical measure for detecting changes in the threat environment. The perceived risk of passengers, according to prescreening information and behavior analysis, is analyzed as the passengers sequentially enter the security checkpoint. The alarm responses from the devices used to detect threats are also analyzed to monitor significant changes in the frequency of threat items uncovered. The key results are that this information-based measure can be used within the Homeland Security Advisory System to indicate changes in threat conditions in real time, and provide the flexibility of security screening detection devices to responsively and automatically adapt operational configurations to these changing threat conditions. © 2012 Society for Risk Analysis. All rights reserved.

  18. Maximizing profit and endangering health: corporate strategies to avoid litigation and regulation.

    PubMed

    Bohme, Susanna Rankin; Zorabedian, John; Egilman, David S

    2005-01-01

    Corporations and industries use various tactics to obscure the fact that their products are dangerous or deadly. Their aim is to secure the least restrictive possible regulatory environment and avert legal liability for deaths or injuries in order to maximize profit. They work with attorneys and public relations professionals, using scientists, science advisory boards; front groups, industry organizations, think tanks, and the media to influence scientific and popular opinion of the risks of their products or processes. The strategy, which depends on corrupt science, profits corporations at the expense of public health. Public health professionals can learn from this strategy how to effectively build scientific and public opinion that prioritizes both good science and the public health.

  19. NASA Advanced Computing Environment for Science and Engineering

    NASA Technical Reports Server (NTRS)

    Biswas, Rupak

    2017-01-01

    Vision: To reach for new heights and reveal the unknown so that what we do and learn will benefit all humankind. Mission: To pioneer the future in space exploration, scientific discovery, and aeronautics research. Aeronautics Research (ARMD): Pioneer and prove new flight technologies for safer, more secure, efficient, and environmental friendly air transportation. Human Exploration and Operations (HEOMD): Focus on ISS operations; and develop new spacecraft and other capabilities for affordable, sustainable exploration beyond low Earth orbit. Science (SCMD): Explore the Earth, solar system, and universe beyond; chart best route for discovery; and reap the benefits of Earth and space exploration for society. Space Technology (STMD): Rapidly develop, demonstrate, and infuse revolutionary, high-payoff technologies through collaborative partnerships, expanding the boundaries of aerospace enterprise.

  20. Secure data exchange between intelligent devices and computing centers

    NASA Astrophysics Data System (ADS)

    Naqvi, Syed; Riguidel, Michel

    2005-03-01

    The advent of reliable spontaneous networking technologies (commonly known as wireless ad-hoc networks) has ostensibly raised stakes for the conception of computing intensive environments using intelligent devices as their interface with the external world. These smart devices are used as data gateways for the computing units. These devices are employed in highly volatile environments where the secure exchange of data between these devices and their computing centers is of paramount importance. Moreover, their mission critical applications require dependable measures against the attacks like denial of service (DoS), eavesdropping, masquerading, etc. In this paper, we propose a mechanism to assure reliable data exchange between an intelligent environment composed of smart devices and distributed computing units collectively called 'computational grid'. The notion of infosphere is used to define a digital space made up of a persistent and a volatile asset in an often indefinite geographical space. We study different infospheres and present general evolutions and issues in the security of such technology-rich and intelligent environments. It is beyond any doubt that these environments will likely face a proliferation of users, applications, networked devices, and their interactions on a scale never experienced before. It would be better to build in the ability to uniformly deal with these systems. As a solution, we propose a concept of virtualization of security services. We try to solve the difficult problems of implementation and maintenance of trust on the one hand, and those of security management in heterogeneous infrastructure on the other hand.

  1. A Preliminary Investigation of Self-Directed Learning Activities in a Non-Formal Blended Learning Environment

    ERIC Educational Resources Information Center

    Schwier, Richard A.; Morrison, Dirk; Daniel, Ben K.

    2009-01-01

    This research considers how professional participants in a non-formal self-directed learning environment (NFSDL) made use of self-directed learning activities in a blended face-to-face and on line learning professional development course. The learning environment for the study was a professional development seminar on teaching in higher education…

  2. Students' Reflections on the Relationships between Safe Learning Environments, Learning Challenge and Positive Experiences of Learning in a Simulated GP Clinic

    ERIC Educational Resources Information Center

    Young, J. E.; Williamson, M. I.; Egan, T. G.

    2016-01-01

    Learning environments are a significant determinant of student behaviour, achievement and satisfaction. In this article we use students' reflective essays to identify key features of the learning environment that contributed to positive and transformative learning experiences. We explore the relationships between these features, the students'…

  3. Personal Learning Environments in the Workplace: An Exploratory Study into the Key Business Decision Factors

    ERIC Educational Resources Information Center

    Chatterjee, Arunangsu; Law, Effie Lai-Chong; Mikroyannidis, Alexander; Owen, Glyn; Velasco, Karen

    2013-01-01

    Personal Learning Environments (PLEs) have emerged as a solution to the need of learners for open and easily customisable learning environments. PLEs essentially hand complete control over the learning process to the learner. However, this learning model is not fully compatible with learning in the workplace, which is influenced by certain…

  4. Preparing for Emergency Situations

    NASA Astrophysics Data System (ADS)

    Asproth, Viveca; Amcoff Nyström, Christina

    2010-11-01

    Disaster relief can be seen as a dynamic multi actor process with actors both joining and leaving the relief work during the help and rescue phase after the disaster has occurred. Actors may be governmental agencies, non profit voluntary organisations or spontaneous helpers comprised of individual citizens or temporal groups of citizens. Hence, they will vary widely in agility, competence, resources, and endurance. To prepare for for disasters a net based Agora with simulation of emergency situations for mutual preparation, training, and organisational learning is suggested. Such an Agora will ensure future security by: -Rising awareness and preparedness of potential disaster responders by help of the components and resources in the netAgora environment; -Improving cooperation and coordination between responders; -Improving competence and performance of organisations involved in security issues; -Bridging cultural differences between responders from different organizations and different backgrounds. The developed models are intended to reflect intelligent anticipatory systems for human operator anticipation of future consequences. As a way to catch what should be included in this netbased Agora and to join the split pictures that is present, Team Syntegrity could be a helpful tool. The purpose of Team Syntegrity is to stimulate collaboration and incite cross fertilization and creativity. The difference between syntegration and other group work is that the participants are evenly and uniquely distributed and will collectively have the means, the knowledge, the experience, the perspectives, and the expertise, to deal with the topic. In this paper the possibilities with using Team Syntegrity in preparation for the development of a netbased Agora is discussed. We have identified that Team Syntegrity could be useful in the steps User Integration, Designing the netAgora environment, developing Test Scenarios, and assessment of netAgora environment.

  5. 40 CFR 80.606 - What national security exemption applies to fuels covered under this subpart?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 40 Protection of Environment 16 2010-07-01 2010-07-01 false What national security exemption... national security exemption applies to fuels covered under this subpart? (a) The standards of all the fuels..., including locomotive and marine, having an EPA national security exemption from the motor vehicle emission...

  6. 77 FR 65215 - In the Matter of Licensee Identified in Attachment 1 and all Other Persons Who Obtain Safeguards...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-25

    ... a computing environment that has adequate computer security controls in place to prevent... NRC intends to issue a security Order to this Licensee in the near future. The Order will require compliance with specific Additional Security Measures to enhance the security for certain radioactive...

  7. Determination of ISRA Framework Using Delphi Methodology for Small and Midsized Enterprises

    ERIC Educational Resources Information Center

    Shah, Ashish

    2017-01-01

    Unfathomable a few decades ago, the velocity of revolution in information technology (IT) security is accelerating. Small and midsized enterprises (SMEs) continue to make IT security a highest priority and foster security controls to safeguard their environments from adverse effects. Information technology security professionals must rely on one…

  8. Argumentative Knowledge Construction in Online Learning Environments in and across Different Cultures: A Collaboration Script Perspective

    ERIC Educational Resources Information Center

    Weinberger, A.; Clark, D. B.; Haekkinen, P.; Tamura, Y.; Fischer, F.

    2007-01-01

    In recent years, information and communication technology has established new opportunities to participate in online learning environments around the globe. These opportunities include the dissemination of specific online learning environments as well as opportunities for learners to connect to online learning environments in distant locations.…

  9. Turkish High School Student's Perceptions of Learning Environment in Biology Classrooms and Their Attitudes toward Biology.

    ERIC Educational Resources Information Center

    Cakiroglu, Jale; Telli, Sibel; Cakiroglu, Erdinc

    The purpose of this study was to examine Turkish high school students' perceptions of learning environment in biology classrooms and to investigate relationships between learning environment and students' attitudes toward biology. Secondly, the study aimed to investigate the differences in students' perceptions of learning environments in biology…

  10. Protecting and securing networked medical devices.

    PubMed

    Riha, Chris

    2004-01-01

    Designing, building, and maintaining a secure environment for medical devices is a critical component in health care technology management. This article will address several avenues to harden a health care information network to provide a secure enclave for medical devices.

  11. Does academic performance or personal growth share a stronger association with learning environment perception?

    PubMed

    Colbert-Getz, Jorie M; Tackett, Sean; Wright, Scott M; Shochet, Robert S

    2016-08-28

    This study was conducted to characterize the relative strength of associations of learning environment perception with academic performance and with personal growth. In 2012-2014 second and third year students at Johns Hopkins University School of Medicine completed a learning environment survey and personal growth scale. Hierarchical linear regression analysis was employed to determine if the proportion of variance in learning environment scores accounted for by personal growth was significantly larger than the proportion accounted for by academic performance (course/clerkship grades). The proportion of variance in learning environment scores accounted for by personal growth was larger than the proportion accounted for by academic performance in year 2 [R(2)Δ of 0.09, F(1,175) = 14.99,  p < .001] and year 3 [R(2)Δ of 0.28, F(1,169) = 76.80, p < .001]. Learning environment scores shared a small amount of variance with academic performance in years 2 and 3.  The amount of variance between learning environment scores and personal growth was small in year 2 and large in year 3. Since supportive learning environments are essential for medical education, future work must determine if enhancing personal growth prior to and during the clerkship year will increase learning environment perception.

  12. Does academic performance or personal growth share a stronger association with learning environment perception?

    PubMed Central

    Tackett, Sean; Wright, Scott M.; Shochet, Robert S.

    2016-01-01

    Objectives This study was conducted to characterize the relative strength of associations of learning environment perception with academic performance and with personal growth. Methods In 2012-2014 second and third year students at Johns Hopkins University School of Medicine completed a learning environment survey and personal growth scale. Hierarchical linear regression analysis was employed to determine if the proportion of variance in learning environment scores accounted for by personal growth was significantly larger than the proportion accounted for by academic performance (course/clerkship grades). Results The proportion of variance in learning environment scores accounted for by personal growth was larger than the proportion accounted for by academic performance in year 2 [R2Δ of 0.09, F(1,175) = 14.99,  p < .001] and year 3 [R2Δ of 0.28, F(1,169) = 76.80, p < .001]. Learning environment scores shared a small amount of variance with academic performance in years 2 and 3.  The amount of variance between learning environment scores and personal growth was small in year 2 and large in year 3. Conclusions Since supportive learning environments are essential for medical education, future work must determine if enhancing personal growth prior to and during the clerkship year will increase learning environment perception. PMID:27570912

  13. Developing Learning Theory by Refining Conjectures Embodied in Educational Designs

    ERIC Educational Resources Information Center

    Sandoval, William A.

    2004-01-01

    Designed learning environments embody conjectures about learning and instruction, and the empirical study of learning environments allows such conjectures to be refined over time. The construct of embodied conjecture is introduced as a way to demonstrate the theoretical nature of learning environment design and to frame methodological issues in…

  14. Virtual Learning Environment for Interactive Engagement with Advanced Quantum Mechanics

    ERIC Educational Resources Information Center

    Pedersen, Mads Kock; Skyum, Birk; Heck, Robert; Müller, Romain; Bason, Mark; Lieberoth, Andreas; Sherson, Jacob F.

    2016-01-01

    A virtual learning environment can engage university students in the learning process in ways that the traditional lectures and lab formats cannot. We present our virtual learning environment "StudentResearcher," which incorporates simulations, multiple-choice quizzes, video lectures, and gamification into a learning path for quantum…

  15. Issues of Learning Games: From Virtual to Real

    ERIC Educational Resources Information Center

    Carron, Thibault; Pernelle, Philippe; Talbot, Stéphane

    2013-01-01

    Our research work deals with the development of new learning environments, and we are particularly interested in studying the different aspects linked to users' collaboration in these environments. We believe that Game-based Learning can significantly enhance learning. That is why we have developed learning environments grounded on graphical…

  16. Agent-Based Learning Environments as a Research Tool for Investigating Teaching and Learning.

    ERIC Educational Resources Information Center

    Baylor, Amy L.

    2002-01-01

    Discusses intelligent learning environments for computer-based learning, such as agent-based learning environments, and their advantages over human-based instruction. Considers the effects of multiple agents; agents and research design; the use of Multiple Intelligent Mentors Instructing Collaboratively (MIMIC) for instructional design for…

  17. Student-Centred Learning Environments: An Investigation into Student Teachers' Instructional Preferences and Approaches to Learning

    ERIC Educational Resources Information Center

    Baeten, Marlies; Dochy, Filip; Struyven, Katrien; Parmentier, Emmeline; Vanderbruggen, Anne

    2016-01-01

    The use of student-centred learning environments in education has increased. This study investigated student teachers' instructional preferences for these learning environments and how these preferences are related to their approaches to learning. Participants were professional Bachelor students in teacher education. Instructional preferences and…

  18. Active Learning Environment with Lenses in Geometric Optics

    ERIC Educational Resources Information Center

    Tural, Güner

    2015-01-01

    Geometric optics is one of the difficult topics for students within physics discipline. Students learn better via student-centered active learning environments than the teacher-centered learning environments. So this study aimed to present a guide for middle school teachers to teach lenses in geometric optics via active learning environment…

  19. Practical Applications and Experiences in K-20 Blended Learning Environments

    ERIC Educational Resources Information Center

    Kyei-Blankson, Lydia, Ed.; Ntuli, Esther, Ed.

    2014-01-01

    Learning environments continue to change considerably and is no longer confined to the face-to-face classroom setting. As learning options have evolved, educators must adopt a variety of pedagogical strategies and innovative technologies to enable learning. "Practical Applications and Experiences in K-20 Blended Learning Environments"…

  20. Wikis, blogs and podcasts: a new generation of Web-based tools for virtual collaborative clinical practice and education

    PubMed Central

    Boulos, Maged N Kamel; Maramba, Inocencio; Wheeler, Steve

    2006-01-01

    Background We have witnessed a rapid increase in the use of Web-based 'collaborationware' in recent years. These Web 2.0 applications, particularly wikis, blogs and podcasts, have been increasingly adopted by many online health-related professional and educational services. Because of their ease of use and rapidity of deployment, they offer the opportunity for powerful information sharing and ease of collaboration. Wikis are Web sites that can be edited by anyone who has access to them. The word 'blog' is a contraction of 'Web Log' – an online Web journal that can offer a resource rich multimedia environment. Podcasts are repositories of audio and video materials that can be "pushed" to subscribers, even without user intervention. These audio and video files can be downloaded to portable media players that can be taken anywhere, providing the potential for "anytime, anywhere" learning experiences (mobile learning). Discussion Wikis, blogs and podcasts are all relatively easy to use, which partly accounts for their proliferation. The fact that there are many free and Open Source versions of these tools may also be responsible for their explosive growth. Thus it would be relatively easy to implement any or all within a Health Professions' Educational Environment. Paradoxically, some of their disadvantages also relate to their openness and ease of use. With virtually anybody able to alter, edit or otherwise contribute to the collaborative Web pages, it can be problematic to gauge the reliability and accuracy of such resources. While arguably, the very process of collaboration leads to a Darwinian type 'survival of the fittest' content within a Web page, the veracity of these resources can be assured through careful monitoring, moderation, and operation of the collaborationware in a closed and secure digital environment. Empirical research is still needed to build our pedagogic evidence base about the different aspects of these tools in the context of medical/health education. Summary and conclusion If effectively deployed, wikis, blogs and podcasts could offer a way to enhance students', clinicians' and patients' learning experiences, and deepen levels of learners' engagement and collaboration within digital learning environments. Therefore, research should be conducted to determine the best ways to integrate these tools into existing e-Learning programmes for students, health professionals and patients, taking into account the different, but also overlapping, needs of these three audience classes and the opportunities of virtual collaboration between them. Of particular importance is research into novel integrative applications, to serve as the "glue" to bind the different forms of Web-based collaborationware synergistically in order to provide a coherent wholesome learning experience. PMID:16911779

  1. Students' perception of the learning environment in a distributed medical programme

    PubMed Central

    Veerapen, Kiran; McAleer, Sean

    2010-01-01

    Background The learning environment of a medical school has a significant impact on students' achievements and learning outcomes. The importance of equitable learning environments across programme sites is implicit in distributed undergraduate medical programmes being developed and implemented. Purpose To study the learning environment and its equity across two classes and three geographically separate sites of a distributed medical programme at the University of British Columbia Medical School that commenced in 2004. Method The validated Dundee Ready Educational Environment Survey was sent to all students in their 2nd and 3rd year (classes graduating in 2009 and 2008) of the programme. The domains of the learning environment surveyed were: students' perceptions of learning, students' perceptions of teachers, students' academic self-perceptions, students' perceptions of the atmosphere, and students' social self-perceptions. Mean scores, frequency distribution of responses, and inter- and intrasite differences were calculated. Results The perception of the global learning environment at all sites was more positive than negative. It was characterised by a strongly positive perception of teachers. The work load and emphasis on factual learning were perceived negatively. Intersite differences within domains of the learning environment were more evident in the pioneer class (2008) of the programme. Intersite differences consistent across classes were largely related to on-site support for students. Conclusions Shared strengths and weaknesses in the learning environment at UBC sites were evident in areas that were managed by the parent institution, such as the attributes of shared faculty and curriculum. A greater divergence in the perception of the learning environment was found in domains dependent on local arrangements and social factors that are less amenable to central regulation. This study underlines the need for ongoing comparative evaluation of the learning environment at the distributed sites and interaction between leaders of these sites. PMID:20922033

  2. The effects of different learning environments on students' motivation for learning and their achievement.

    PubMed

    Baeten, Marlies; Dochy, Filip; Struyven, Katrien

    2013-09-01

    Research in higher education on the effects of student-centred versus lecture-based learning environments generally does not take into account the psychological need support provided in these learning environments. From a self-determination theory perspective, need support is important to study because it has been associated with benefits such as autonomous motivation and achievement. The purpose of the study is to investigate the effects of different learning environments on students' motivation for learning and achievement, while taking into account the perceived need support. First-year student teachers (N= 1,098) studying a child development course completed questionnaires assessing motivation and perceived need support. In addition, a prior knowledge test and case-based assessment were administered. A quasi-experimental pre-test/post-test design was set up consisting of four learning environments: (1) lectures, (2) case-based learning (CBL), (3) alternation of lectures and CBL, and (4) gradual implementation with lectures making way for CBL. Autonomous motivation and achievement were higher in the gradually implemented CBL environment, compared to the CBL environment. Concerning achievement, two additional effects were found; students in the lecture-based learning environment scored higher than students in the CBL environment, and students in the gradually implemented CBL environment scored higher than students in the alternated learning environment. Additionally, perceived need support was positively related to autonomous motivation, and negatively to controlled motivation. The study shows the importance of gradually introducing students to CBL, in terms of their autonomous motivation and achievement. Moreover, the study emphasizes the importance of perceived need support for students' motivation. © 2012 The British Psychological Society.

  3. Privacy Act System of Records: Federal Lead-Based Paint Program System of Records, EPA-54

    EPA Pesticide Factsheets

    Learn about the Federal Lead-Based Paint Program System of Records (FLPPSOR), including the security classification, individuals covered by the system, categories of records, routine uses of the records, and other security procedures.

  4. The Role of Schools and their Capabilities to Ensure Safe Sheltering During a Storm

    DTIC Science & Technology

    2017-03-01

    and security aspects include establishing a safe environment in a confined space. While absent from Florida’s 2016 Statewide Emergency Shelter Plan...offer a safe environment for sheltering, and new building codes have been created for this purpose. The northern school districts in Texas sit in...Special Feature 2: Building a Safe and Secure Educational Environment ,” accessed January 15, 2017, http://www.mext.go.jp/b_menu/hakusho/html/hpab201201

  5. Homeland Security and Defense Applications

    ScienceCinema

    None

    2018-01-16

    Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

  6. Understanding teacher responses to constructivist learning environments: Challenges and resolutions

    NASA Astrophysics Data System (ADS)

    Rosenfeld, Melodie; Rosenfeld, Sherman

    2006-05-01

    The research literature is just beginning to uncover factors involved in sustaining constructivist learning environments, such as Project-Based Learning (PBL). Our case study investigates teacher responses to the challenges of constructivist environments, since teachers can play strong roles in supporting or undermining even the best constructivist environments or materials. We were invited to work as mediators with a middle-school science staff that was experiencing conflicts regarding two learning environments, PBL (which was the school's politically correc learning environment) and traditional. With mediated group workshops, teachers were sensitized to their own and colleagues' individual learning differences (ILDs), as measured by two styles inventories (the LSI - Kolb, 1976; and the LCI - Johnston & Dainton, 1997). Using these inventories, a learning-environment questionnaire, field notes, and delayed interviews a year later, we found that there was a relationship between teachers' preferred styles, epistemological beliefs, and their preferred teaching environment. Moreover, when the participating teachers, including early-adopters and nonvolunteers to PBL, became more sensitive to their colleagues' preferences, many staff conflicts were resolved and some mismatched teachers expressed more openness to PBL. We argue that having teachers understand their own ILDs and related responses to constructivist learning environments can contribute to resolving staff conflicts and sustaining such environments. We present a cognitive model and a strategy which illustrate this argument.

  7. Security for Multimedia Space Data Distribution over the Internet

    NASA Technical Reports Server (NTRS)

    Stone, Thom; Picinich, Lou; Givens, John J. (Technical Monitor)

    1995-01-01

    Distribution of interactive multimedia to remote investigators will be required for high quality science on the International Space Station (ISS). The Internet with the World Wide Web (WWW) and the JAVA environment are a good match for distribution of data, video and voice to remote science centers. Utilizing the "open" Internet in a secure manner is the major hurdle in making use of this cost effective, off-the-shelf, universal resource. This paper examines the major security threats to an Internet distribution system for payload data and the mitigation of these threats. A proposed security environment for the Space Station Biological Research Facility (SSBRP) is presented with a short description of the tools that have been implemented or planned. Formulating and implementing a security policy, firewalls, host hardware and software security are also discussed in this paper. Security is a vast topic and this paper can only give an overview of important issues. This paper postulates that a structured approach is required and stresses that security must be built into a network from the start. Ignoring security issues or putting them off until late in the development cycle can be disastrous.

  8. Use of Heuristics to Facilitate Scientific Discovery Learning in a Simulation Learning Environment in a Physics Domain

    ERIC Educational Resources Information Center

    Veermans, Koen; van Joolingen, Wouter; de Jong, Ton

    2006-01-01

    This article describes a study into the role of heuristic support in facilitating discovery learning through simulation-based learning. The study compares the use of two such learning environments in the physics domain of collisions. In one learning environment (implicit heuristics) heuristics are only used to provide the learner with guidance…

  9. The Impacts of Network Centrality and Self-Regulation on an E-Learning Environment with the Support of Social Network Awareness

    ERIC Educational Resources Information Center

    Lin, Jian-Wei; Huang, Hsieh-Hong; Chuang, Yuh-Shy

    2015-01-01

    An e-learning environment that supports social network awareness (SNA) is a highly effective means of increasing peer interaction and assisting student learning by raising awareness of social and learning contexts of peers. Network centrality profoundly impacts student learning in an SNA-related e-learning environment. Additionally,…

  10. Students' Conception of Learning Environment and Their Approach to Learning and Its Implication on Quality Education

    ERIC Educational Resources Information Center

    Belaineh, Matheas Shemelis

    2017-01-01

    Quality of education in higher institutions can be affected by different factors. It partly rests on the learning environment created by teachers and the learning approach students are employing during their learning. The main purpose of this study is to examine the learning environment at Mizan Tepi University from students' perspective and their…

  11. Recession in the Regions

    ERIC Educational Resources Information Center

    Plant, Helen

    2009-01-01

    National policy stresses the key role of adult learning and skills in securing economic recovery. This close linking of adult learning policy to the recession agenda raises important questions. How has the recession impacted on the implementation of adult learning policy? What has it meant for service delivery? And what have been the consequences…

  12. Social-Emotional Learning Is Essential to Classroom Management

    ERIC Educational Resources Information Center

    Jones, Stephanie M.; Bailey, Rebecca; Jacob, Robin

    2014-01-01

    Research tells us that children's social-emotional development can propel learning. A new program, SECURe, embeds that research into classroom management strategies that improve teaching and learning. Across all classrooms and grade levels, four principles of effective management are constant: Effective classroom management is based in…

  13. An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards.

    PubMed

    Moon, Jongho; Choi, Younsung; Jung, Jaewook; Won, Dongho

    2015-01-01

    In multi-server environments, user authentication is a very important issue because it provides the authorization that enables users to access their data and services; furthermore, remote user authentication schemes for multi-server environments have solved the problem that has arisen from user's management of different identities and passwords. For this reason, numerous user authentication schemes that are designed for multi-server environments have been proposed over recent years. In 2015, Lu et al. improved upon Mishra et al.'s scheme, claiming that their remote user authentication scheme is more secure and practical; however, we found that Lu et al.'s scheme is still insecure and incorrect. In this paper, we demonstrate that Lu et al.'s scheme is vulnerable to outsider attack and user impersonation attack, and we propose a new biometrics-based scheme for authentication and key agreement that can be used in multi-server environments; then, we show that our proposed scheme is more secure and supports the required security properties.

  14. 17 CFR 200.551 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Applicability. 200.551 Section 200.551 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Regulations Pertaining to the Protection of the Environment...

  15. 75 FR 65232 - Security Zones; Sabine Bank Channel, Sabine Pass Channel and Sabine-Neches Waterway, TX

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-22

    ... security zones would be part of a comprehensive port security regime designed to safeguard human life... do not individually or cumulatively have a significant effect on the human environment. This rule is...

  16. Review of Opinions of Math Teachers Concerning the Learning Environment That They Design

    ERIC Educational Resources Information Center

    Aydin, Bünyamin; Yavuz, Ayse

    2016-01-01

    Design of appropriate learning environment has a significant importance in creation of aims of the math teaching. In the design of learning environments, teachers play a significant role. The aim of this study is determination of opinions of the math teachers concerning the learning environment that they design. In accordance with this aim, an…

  17. An Effect of the Learning Environment Management System toward Student Quality of Thai Secondary School

    ERIC Educational Resources Information Center

    Wirussawa, Seatuch; Tesaputa, Kowat; Duangpaeng, Amporn

    2016-01-01

    This study aimed at 1) investigating the element of the learning environment management system in the secondary schools, 2) exploring the current states and problems of the system on the learning environment management in the secondary schools, 3) designing the learning environment management system for the secondary schools, and 4) identifying…

  18. Authoring Adaptive 3D Virtual Learning Environments

    ERIC Educational Resources Information Center

    Ewais, Ahmed; De Troyer, Olga

    2014-01-01

    The use of 3D and Virtual Reality is gaining interest in the context of academic discussions on E-learning technologies. However, the use of 3D for learning environments also has drawbacks. One way to overcome these drawbacks is by having an adaptive learning environment, i.e., an environment that dynamically adapts to the learner and the…

  19. Assessing the Quality of Learning Environments in Swedish Schools: Development and Analysis of a Theory-Based Instrument

    ERIC Educational Resources Information Center

    Westling Allodi, Mara

    2007-01-01

    The Goals, Attitudes and Values in School (GAVIS) questionnaire was developed on the basis of theoretical frameworks concerning learning environments, universal human values and studies of students' experience of learning environments. The theory hypothesises that learning environments can be described and structured in a circumplex model using…

  20. Students' Perceptions of Computer-Based Learning Environments, Their Attitude towards Business Statistics, and Their Academic Achievement: Implications from a UK University

    ERIC Educational Resources Information Center

    Nguyen, ThuyUyen H.; Charity, Ian; Robson, Andrew

    2016-01-01

    This study investigates students' perceptions of computer-based learning environments, their attitude towards business statistics, and their academic achievement in higher education. Guided by learning environments concepts and attitudinal theory, a theoretical model was proposed with two instruments, one for measuring the learning environment and…

  1. Blackboard as an Online Learning Environment: What Do Teacher Education Students and Staff Think?

    ERIC Educational Resources Information Center

    Heirdsfield, Ann; Walker, Susan; Tambyah, Mallihai; Beutel, Denise

    2011-01-01

    As online learning environments now have an established presence in higher education we need to ask the question: How effective are these environments for student learning? Online environments can provide a different type of learning experience than traditional face-to-face contexts (for on-campus students) or print-based materials (for distance…

  2. Effects of the Physical Environment on Cognitive Load and Learning: Towards a New Model of Cognitive Load

    ERIC Educational Resources Information Center

    Choi, Hwan-Hee; van Merriënboer, Jeroen J. G.; Paas, Fred

    2014-01-01

    Although the theoretical framework of cognitive load theory has acknowledged a role for the learning environment, the specific characteristics of the physical learning environment that could affect cognitive load have never been considered, neither theoretically nor empirically. In this article, we argue that the physical learning environment, and…

  3. Context Aware Ubiquitous Learning Environments for Peer-to-Peer Collaborative Learning

    ERIC Educational Resources Information Center

    Yang, Stephen J. H.

    2006-01-01

    A ubiquitous learning environment provides an interoperable, pervasive, and seamless learning architecture to connect, integrate, and share three major dimensions of learning resources: learning collaborators, learning contents, and learning services. Ubiquitous learning is characterized by providing intuitive ways for identifying right learning…

  4. MIT Lincoln Laboratory Annual Report 2007: Technology in Support of National Security

    DTIC Science & Technology

    2007-01-01

    technical innovation and scientific discoveries. MISSION: TechnoLogy In SupporT of naTIonaL SecurITy 2007 Dr. Claude R. Canizares Vice president for...problems. The Lincoln Laboratory New Technology Initiatives Program is one of several internal technology innovation mechanisms. Technologies emerging...externships. LIFT2, an innovative professional learning program for science, technology , and math teachers, serves Massachusetts metro south/west region

  5. [The use of virtual learning environment in teaching basic and advanced life support].

    PubMed

    Cogo, Ana Luísa Petersen; Silveira, Denise Tolfo; Lírio, Aline de Morais; Severo, Carolina Lopes

    2003-12-01

    The present paper is the result of an experiment conducted as part of the Nursing: basic and advanced life support course, which was offered as a semi-online course using the virtual learning environment called Learning Space. The virtual learning environment optimizes classroom dynamics, since in the classroom setting, practical activities may be privileged; besides, learning is customized as students may access the environment whenever and wherever they wish.

  6. Smile: Student Modification in Learning Environments. Establishing Congruence between Actual and Preferred Classroom Learning Environment.

    ERIC Educational Resources Information Center

    Yarrow, Allan; Millwater, Jan

    1995-01-01

    This study investigated whether classroom psychosocial environment, as perceived by student teachers, could be improved to their preferred level. Students completed the College and University Classroom Environment Inventory, discussed interventions, then completed it again. Significant deficiencies surfaced in the learning environment early in the…

  7. Protecting America's economy, environment, health, and security against invasive species requires a strong federal program in systematic biology

    Treesearch

    Hilda Diaz-Soltero; Amy Y. Rossman

    2011-01-01

    Systematics is the science that identifies and groups organisms by understanding their origins, relationships, and distributions. It is fundamental to understanding life on earth, our crops, wildlife, and diseases, and it provides the scientific foundation to recognize and manage invasive species. Protecting America's economy, environment, health, and security...

  8. Integrating Model-Driven and Data-Driven Techniques for Analyzing Learning Behaviors in Open-Ended Learning Environments

    ERIC Educational Resources Information Center

    Kinnebrew, John S.; Segedy, James R.; Biswas, Gautam

    2017-01-01

    Research in computer-based learning environments has long recognized the vital role of adaptivity in promoting effective, individualized learning among students. Adaptive scaffolding capabilities are particularly important in open-ended learning environments, which provide students with opportunities for solving authentic and complex problems, and…

  9. A Comparison of Participation Patterns in Selected Formal, Non-Formal, and Informal Online Learning Environments

    ERIC Educational Resources Information Center

    Schwier, Richard A.; Seaton, J. X.

    2013-01-01

    Does learner participation vary depending on the learning context? Are there characteristic features of participation evident in formal, non-formal, and informal online learning environments? Six online learning environments were chosen as epitomes of formal, non-formal, and informal learning contexts and compared. Transcripts of online…

  10. Student-Teachers' Approaches to Learning, Academic Performance and Teaching Efficacy

    ERIC Educational Resources Information Center

    Swee-Choo, Pauline Goh; Kung-Teck, Wong; Osman, Rosma

    2012-01-01

    Purpose: It is argued that the approaches to learning of students undergoing teacher training are likely to be related to their teaching and learning environment, especially as they move from a more regimented, structured learning environment in school to a tertiary learning environment that encourages more independent thinking and perhaps…

  11. Visits to Cultural Learning Places in the Early Childhood

    ERIC Educational Resources Information Center

    Mudiappa, Michael; Kluczniok, Katharina

    2015-01-01

    Studies show the important role of the home learning environment in early childhood for later school success. This article focuses on a particular aspect of the home learning environment: visits to cultural learning places (e.g. museums) as a component of the quality of the home learning environment. Therefore the educational concept of…

  12. Investigating Learning through Work: Learning Environment Scale & User Guide to the Provider. Support Document

    ERIC Educational Resources Information Center

    Hawke, Geof; Chappell, Clive

    2008-01-01

    This Support Document was produced by the authors based on their research for the report, "Investigating Learning through Work: The Development of the 'Provider Learning Environment Scale'" (ED503392). It provides readers with a complete copy of the "Provider Learning Environment Scale" (version 2.0); and an accompanying user…

  13. Assessing and Monitoring Student Progress in an E-Learning Personnel Preparation Environment.

    ERIC Educational Resources Information Center

    Meyen, Edward L.; Aust, Ronald J.; Bui, Yvonne N.; Isaacson, Robert

    2002-01-01

    Discussion of e-learning in special education personnel preparation focuses on student assessment in e-learning environments. It includes a review of the literature, lessons learned by the authors from assessing student performance in e-learning environments, a literature perspective on electronic portfolios in monitoring student progress, and the…

  14. A Context-Adaptive Teacher Training Model in a Ubiquitous Learning Environment

    ERIC Educational Resources Information Center

    Chen, Min; Chiang, Feng Kuang; Jiang, Ya Na; Yu, Sheng Quan

    2017-01-01

    In view of the discrepancies in teacher training and teaching practice, this paper put forward a context-adaptive teacher training model in a ubiquitous learning (u-learning) environment. The innovative model provides teachers of different subjects with adaptive and personalized learning content in a u-learning environment, implements intra- and…

  15. Sparsity and Nullity: Paradigm for Analysis Dictionary Learning

    DTIC Science & Technology

    2016-08-09

    16. SECURITY CLASSIFICATION OF: Sparse models in dictionary learning have been successfully applied in a wide variety of machine learning and...we investigate the relation between the SNS problem and the analysis dictionary learning problem, and show that the SNS problem plays a central role...and may be utilized to solve dictionary learning problems. 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 13. SUPPLEMENTARY NOTES 12

  16. The governance dimensions of water security: a review.

    PubMed

    Bakker, Karen; Morinville, Cynthia

    2013-11-13

    Water governance is critical to water security, and to the long-term sustainability of the Earth's freshwater systems. This review examines recent debates regarding the governance dimensions of water security, including adaptive governance, polycentric governance, social learning and multi-level governance. The analysis emphasizes the political and institutional dimensions of water governance, and explores the relevance of social power-an overlooked yet important aspect of the water security debate. In addition, the review explores the intersection and potential synergies between water governance perspectives and risk-based approaches to water security, and offers critiques and suggestions for further research questions and agendas.

  17. Trust Model to Enhance Security and Interoperability of Cloud Environment

    NASA Astrophysics Data System (ADS)

    Li, Wenjuan; Ping, Lingdi

    Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider's resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.

  18. Medical Student Perceptions of the Learning Environment in Medical School Change as Students Transition to Clinical Training in Undergraduate Medical School.

    PubMed

    Dunham, Lisette; Dekhtyar, Michael; Gruener, Gregory; CichoskiKelly, Eileen; Deitz, Jennifer; Elliott, Donna; Stuber, Margaret L; Skochelak, Susan E

    2017-01-01

    Phenomenon: The learning environment is the physical, social, and psychological context in which a student learns. A supportive learning environment contributes to student well-being and enhances student empathy, professionalism, and academic success, whereas an unsupportive learning environment may lead to burnout, exhaustion, and cynicism. Student perceptions of the medical school learning environment may change over time and be associated with students' year of training and may differ significantly depending on the student's gender or race/ethnicity. Understanding the changes in perceptions of the learning environment related to student characteristics and year of training could inform interventions that facilitate positive experiences in undergraduate medical education. The Medical School Learning Environment Survey (MSLES) was administered to 4,262 students who matriculated at one of 23 U.S. and Canadian medical schools in 2010 and 2011. Students completed the survey at the end of each year of medical school as part of a battery of surveys in the Learning Environment Study. A mixed-effects longitudinal model, t tests, Cohen's d effect size, and analysis of variance assessed the relationship between MSLES score, year of training, and demographic variables. After controlling for gender, race/ethnicity, and school, students reported worsening perceptions toward the medical school learning environment, with the worst perceptions in the 3rd year of medical school as students begin their clinical experiences, and some recovery in the 4th year after Match Day. The drop in MSLES scores associated with the transition to the clinical learning environment (-0.26 point drop in addition to yearly change, effect size = 0.52, p < .0001) is more than 3 times greater than the drop between the 1st and 2nd year (0.07 points, effect size = 0.14, p < .0001). The largest declines were from items related to work-life balance and informal student relationships. There was some, but not complete, recovery in perceptions of the medical school learning environment in the 4th year. Insights: Perceptions of the medical school learning environment worsen as students continue through medical school, with a stronger decline in perception scores as students' transition to the clinical learning environment. Students reported the greatest drop in finding time for outside activities and students helping one another in the 3rd year. Perceptions differed based on gender and race/ethnicity. Future studies should investigate the specific features of medical schools that contribute most significantly to student perceptions of the medical school learning environment, both positive and negative, to pinpoint potential interventions and improvements.

  19. Research review of nongovernmental organizations' security policies for humanitarian programs in war, conflict, and postconflict environments.

    PubMed

    Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert

    2013-06-01

    To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.

  20. Interdependent Risk and Cyber Security: An Analysis of Security Investment and Cyber Insurance

    ERIC Educational Resources Information Center

    Shim, Woohyun

    2010-01-01

    An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…

  1. 40 CFR 1068.225 - What are the provisions for exempting engines/equipment for national security?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... engines/equipment for national security? 1068.225 Section 1068.225 Protection of Environment ENVIRONMENTAL... security? (a) An engine/equipment is exempt without a request if it will be used or owned by an agency of...) Manufacturers may request a national security exemption for engines/equipment not meeting the conditions of...

  2. Reputation-Based Internet Protocol Security: A Multilayer Security Framework for Mobile Ad Hoc Networks

    DTIC Science & Technology

    2010-09-01

    secure ad-hoc networks of mobile sensors deployed in a hostile environment . These sensors are normally small 86 and resource...Communications Magazine, 51, 2008. 45. Kumar, S.A. “Classification and Review of Security Schemes in Mobile Comput- ing”. Wireless Sensor Network , 2010... Networks ”. Wireless /Mobile Network Security , 2008. 85. Xiao, Y. “Accountability for Wireless LANs, Ad Hoc Networks , and Wireless

  3. Information security for compliance with select agent regulations.

    PubMed

    Lewis, Nick; Campbell, Mark J; Baskin, Carole R

    2015-01-01

    The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as "select agents." While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts--still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment.

  4. Information Security for Compliance with Select Agent Regulations

    PubMed Central

    Lewis, Nick; Campbell, Mark J.

    2015-01-01

    The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as “select agents.” While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts—still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment. PMID:26042864

  5. The Use of Deep and Surface Learning Strategies among Students Learning English as a Foreign Language in an Internet Environment

    ERIC Educational Resources Information Center

    Aharony, Noa

    2006-01-01

    Background: The learning context is learning English in an Internet environment. The examination of this learning process was based on the Biggs and Moore's teaching-learning model (Biggs & Moore, 1993). Aim: The research aims to explore the use of the deep and surface strategies in an Internet environment among EFL students who come from…

  6. Virtual Workshop Environment (VWE): A Taxonomy and Service Oriented Architecture (SOA) Framework for Modularized Virtual Learning Environments (VLE)--Applying the Learning Object Concept to the VLE

    ERIC Educational Resources Information Center

    Paulsson, Fredrik; Naeve, Ambjorn

    2006-01-01

    Based on existing Learning Object taxonomies, this article suggests an alternative Learning Object taxonomy, combined with a general Service Oriented Architecture (SOA) framework, aiming to transfer the modularized concept of Learning Objects to modularized Virtual Learning Environments. The taxonomy and SOA-framework exposes a need for a clearer…

  7. Employee retention tools: looking beyond radiology.

    PubMed

    Snuttjer, D

    2001-01-01

    In an era of low unemployment rates, companies are not only struggling to recruit talented employees, but they are straining to keep the ones they have. The purpose of this literature review is to look at companies, including many outside of the healthcare industry, and learn how they use incentives to retain employees. A review of a recently published book lists the following reasons why people stay with companies: Career growth, learning and development, exciting work challenges Meaningful work, making a difference and a contribution Great people Being part of a team Good boss, inspiring leadership Recognition for a job well done Fun on the job Autonomy, a sense of control over work and job security Flexibility Fair pay and benefits Great work environment and location Pride in the organization, it's mission and quality of product Family friendly Companies have to change with the times to retain a good work force. To survive, companies should ask employees what would keep them committed, look at all the possibilities, and then create an environment that makes employees want to stay because it provides the life balance they are looking for. There is risk in asking employees what would keep them from looking elsewhere. Employers need to weigh the risk of losing employees with the possibility of raising expectations by asking employees directly what they want. In the current climate, that may be a necessary risk.

  8. Pre-registration student nurses perception of the hospital-learning environment during clinical placements.

    PubMed

    Midgley, Kirsten

    2006-05-01

    If we subscribe to the notion that nursing is an action profession, that nurses learn by doing [Neary, M., 2000. Responsive assessment: assessing student nurses' clinical competence. Nurse Education Today 21, 3-17], then the mastery of fundamental clinical skills must be a key component of courses leading to registration. The last two decades have seen widespread changes to nurse education but the clinical field remains an invaluable resource in preparing students for the reality of their professional role supporting the integration of theory and practice and linking the 'knowing what' with the 'knowing how'. The clinical-learning environment represents an essential element of nurse education that needs to be measurable and warrants further investigation. This exploratory cohort study (n = 67) examined pre-registration student nurses' perception of the hospital-learning environment during clinical placements together with the key characteristics of the students' preferred learning environment utilising an established tool, the clinical-learning environment inventory (CLEI) tool [Chan, D., 2001a. Development of an innovative tool to assess hospital-learning environments. Nurse Education Today 21, 624-631; Chan, D., 2001b. Combining qualitative and quantitative methods in assessing hospital-learning environments. International Journal of Nursing Studies 3, 447-459]. The results demonstrated that in comparison with the actual hospital environment, students would prefer an environment with higher levels of individualisation, innovation in teaching and learning strategies, student involvement, personalisation and task orientation.

  9. UDENTE (Universal Dental E-Learning) a golden opportunity for dental education.

    PubMed

    Reynolds, Patricia

    2012-01-10

    The incorporation of technological advancements in higher education has started to bridge the gap in local, national and global delivery of dental courses. This gap, including the global decrease in senior clinical academics, has influenced the development of new teaching and learning techniques. Institutional virtual learning environments (VLE) and other e-learning resources are now in higher demand. This paper describes how one such innovative solutions has been IVIDENT (International Virtual Dental School), has enabled secure and seamless access to high quality e-content and tools through an innovative, universal flexible learning platform. IVIDENT, now UDENTE (Universal Dental E-learning) has been shown to offer new learning experiences for students of dentistry, but its approach can apply across all educational domains. UDENTE also benefits staff as it allows them to contribute and access resources through peer reviewed publishing processes, which ensure the highest quality in education. UDENTE was developed thanks to a £2.3 million grant from the Higher Education Funding Council for England (HEFCE) and the Department of Health. http://www.udente.org. This academically led educational research project involved dental schools in seven countries. An initially scoping of requirements was followed by elaboration of the tools needed. Pilot testing of the tools, systems and learning resources in particular and the impact of the UDENTE in general were carried out. The pilots revealed evidence of positive impact of a space for learning, teaching, development and communication, with tools for planning of electives and administrative support. The results of these initial pilots have been positive and encouraging, describing UDENTE as an accessible, user friendly platform providing tools that otherwise would be difficult to access in a single space. However, attention to supporting faculty to embrace these new learning domains is essential if such technology enhanced learning (TEL) is to be viewed as a golden opportunity in Higher Education.

  10. 17 CFR 200.550 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Purpose. 200.550 Section 200.550 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Regulations Pertaining to the Protection of the Environment § 200...

  11. 17 CFR 200.552 - NEPA planning.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false NEPA planning. 200.552 Section 200.552 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Regulations Pertaining to the Protection of the Environment...

  12. The Security Factor in School Renovations.

    ERIC Educational Resources Information Center

    Fickes, Michael

    1998-01-01

    Discusses how one Indiana high school used its renovation as an opportunity to reevaluate the school's security design. Security considerations in the building's external and internal environment include lighting, directional signage, parking, access control technology, and issues regarding the use of closed circuit television. (GR)

  13. Unconditional security from noisy quantum storage

    NASA Astrophysics Data System (ADS)

    Wehner, Stephanie

    2010-03-01

    We consider the implementation of two-party cryptographic primitives based on the sole physical assumption that no large-scale reliable quantum storage is available to the cheating party. An important example of such a task is secure identification. Here, Alice wants to identify herself to Bob (possibly an ATM machine) without revealing her password. More generally, Alice and Bob wish to solve problems where Alice holds an input x (e.g. her password), and Bob holds an input y (e.g. the password an honest Alice should possess), and they want to obtain the value of some function f(x,y) (e.g. the equality function). Security means that the legitimate users should not learn anything beyond this specification. That is, Alice should not learn anything about y and Bob should not learn anything about x, other than what they may be able to infer from the value of f(x,y). We show that any such problem can be solved securely in the noisy-storage model by constructing protocols for bit commitment and oblivious transfer, where we prove security against the most general attack. Our protocols can be implemented with present-day hardware used for quantum key distribution. In particular, no quantum storage is required for the honest parties. Our work raises a large number of immediate theoretical as well as experimental questions related to many aspects of quantum information science, such as for example understanding the information carrying properties of quantum channels and memories, randomness extraction, min-entropy sampling, as well as constructing small handheld devices which are suitable for the task of secure identification. [4pt] Full version available at arXiv:0906.1030 (theoretical) and arXiv:0911.2302 (practically oriented).

  14. Nursing students' perceptions of factors influencing their learning environment in a clinical skills laboratory: A qualitative study.

    PubMed

    Haraldseid, Cecilie; Friberg, Febe; Aase, Karina

    2015-09-01

    The mastery of clinical skills learning is required to become a trained nurse. Due to limited opportunities for clinical skills training in clinical practice, undergraduate training at clinical skills laboratories (CSLs) is an essential part of nursing education. In a sociocultural learning perspective learning is situated in an environment. Growing student cohorts, rapid introduction of technology-based teaching methods and a shift from a teaching- to a learning-centered education all influence the environment of the students. These changes also affect CSLs and therefore compel nursing faculties to adapt to the changing learning environment. This study aimed to explore students' perceptions of their learning environment in a clinical skills laboratory, and to increase the knowledge base for improving CSL learning conditions identifying the most important environmental factors according to the students. An exploratory qualitative methodology was used. Nineteen second-year students enrolled in an undergraduate nursing program in Norway participated in the study. They took the same clinical skills course. Eight were part-time students (group A) and 11 were full-time students (group B). Focus group interviews and content analysis were conducted to capture the students' perception of the CSL learning environment. The study documents students' experience of the physical (facilities, material equipment, learning tools, standard procedures), psychosocial (expectations, feedback, relations) and organizational (faculty resources, course structure) factors that affect the CSL learning environment. Creating an authentic environment, facilitating motivation, and providing resources for multiple methods and repetitions within clinical skills training are all important for improving CSL learning environments from the student perspective. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Validation of the Clinical Learning Environment Inventory.

    PubMed

    Chan, Dominic S

    2003-08-01

    One hundred eight preregistration nursing students took part in this survey study, which assessed their perceptions of the clinical learning environment. Statistical data based on the sample confirmed the reliability and validity of the Clinical Learning Environment Inventory (CLEI), which was developed using the concept of classroom learning environment studies. The study also found that there were significant differences between students' actual and preferred perceptions of the clinical learning environments. In terms of the CLEI scales, students preferred a more positive and favorable clinical environment than they perceived as being actually present. The achievement of certain outcomes of clinical field placements might be enhanced by attempting to change the actual clinical environment in ways that make it more congruent with that preferred by the students.

  16. Nursing students' perceptions of learning in practice environments: a review.

    PubMed

    Henderson, Amanda; Cooke, Marie; Creedy, Debra K; Walker, Rachel

    2012-04-01

    Effective clinical learning requires integration of nursing students into ward activities, staff engagement to address individual student learning needs, and innovative teaching approaches. Assessing characteristics of practice environments can provide useful insights for development. This study identified predominant features of clinical learning environments from nursing students' perspectives across studies using the same measure in different countries over the last decade. Six studies, from three different countries, using the Clinical Leaning Environment Inventory (CLEI) were reviewed. Studies explored consistent trends about learning environment. Students rated sense of task accomplishment high. Affiliation also rated highly though was influenced by models of care. Feedback measuring whether students' individual needs and views were accommodated consistently rated lower. Across different countries students report similar perceptions about learning environments. Clinical learning environments are most effective in promoting safe practice and are inclusive of student learners, but not readily open to innovation and challenges to routine practices. Crown Copyright © 2011. Published by Elsevier Ltd. All rights reserved.

  17. Influences of Formal Learning, Personal Learning Orientation, and Supportive Learning Environment on Informal Learning

    ERIC Educational Resources Information Center

    Choi, Woojae; Jacobs, Ronald L.

    2011-01-01

    While workplace learning includes formal and informal learning, the relationship between the two has been overlooked, because they have been viewed as separate entities. This study investigated the effects of formal learning, personal learning orientation, and supportive learning environment on informal learning among 203 middle managers in Korean…

  18. Effects of Presence, Copresence, and Flow on Learning Outcomes in 3D Learning Spaces

    ERIC Educational Resources Information Center

    Hassell, Martin D.; Goyal, Sandeep; Limayem, Moez; Boughzala, Imed

    2012-01-01

    The level of satisfaction and effectiveness of 3D virtual learning environments were examined. Additionally, 3D virtual learning environments were compared with face-to-face learning environments. Students that experienced higher levels of flow and presence also experienced more satisfaction but not necessarily more effectiveness with 3D virtual…

  19. Student Experiences on Interaction in an Online Learning Environment as Part of a Blended Learning Implementation: What Is Essential?

    ERIC Educational Resources Information Center

    Salmi, Laura

    2013-01-01

    Interaction and community building are essential elements of a well functioning online learning environment, especially in learning environments based on investigative learning with a strong emphasis on teamwork. In this paper, practical solutions covering quality criteria for interaction in online education are presented for a simple…

  20. Investigating Learners' Attitudes toward Virtual Reality Learning Environments: Based on a Constructivist Approach

    ERIC Educational Resources Information Center

    Huang, Hsiu-Mei; Rauch, Ulrich; Liaw, Shu-Sheng

    2010-01-01

    The use of animation and multimedia for learning is now further extended by the provision of entire Virtual Reality Learning Environments (VRLE). This highlights a shift in Web-based learning from a conventional multimedia to a more immersive, interactive, intuitive and exciting VR learning environment. VRLEs simulate the real world through the…

  1. Factors of Learner-Instructor Interaction Which Predict Perceived Learning Outcomes in Online Learning Environment

    ERIC Educational Resources Information Center

    Kang, M.; Im, T.

    2013-01-01

    Interaction in the online learning environment has been regarded as one of the most critical elements that affect learning outcomes. This study examined what factors in learner-instructor interaction can predict the learner's outcomes in the online learning environment. Learners in K Online University participated by answering the survey, and data…

  2. Self-Regulated Learning in Technology Enhanced Learning Environments: An Investigation with University Students

    ERIC Educational Resources Information Center

    Lenne, Dominique; Abel, Marie-Helene; Trigano, Philippe; Leblanc, Adeline

    2008-01-01

    In Technology Enhanced Learning Environments, self-regulated learning (SRL) partly relies on the features of the technological tools. The authors present two environments they designed in order to facilitate SRL: the first one (e-Dalgo) is a website dedicated to the learning of algorithms and computer programming. It is structured as a classical…

  3. Using Student-Centred Learning Environments to Stimulate Deep Approaches to Learning: Factors Encouraging or Discouraging Their Effectiveness

    ERIC Educational Resources Information Center

    Baeten, Marlies; Kyndt, Eva; Struyven, Katrien; Dochy, Filip

    2010-01-01

    This review outlines encouraging and discouraging factors in stimulating the adoption of deep approaches to learning in student-centred learning environments. Both encouraging and discouraging factors can be situated in the context of the learning environment, in students' perceptions of that context and in characteristics of the students…

  4. Perceived Satisfaction, Perceived Usefulness and Interactive Learning Environments as Predictors to Self-Regulation in e-Learning Environments

    ERIC Educational Resources Information Center

    Liaw, Shu-Sheng; Huang, Hsiu-Mei

    2013-01-01

    The research purpose is to investigate learner self-regulation in e-learning environments. In order to better understand learner attitudes toward e-learning, 196 university students answer a questionnaire survey after use an e-learning system few months. The statistical results showed that perceived satisfaction, perceived usefulness, and…

  5. The adoption of IT security standards in a healthcare environment.

    PubMed

    Gomes, Rui; Lapão, Luís Velez

    2008-01-01

    Security is a vital part of daily life to Hospitals that need to ensure that the information is adequately secured. In Portugal, more CIOs are seeking that their hospital IS departments are properly protecting information assets from security threats. It is imperative to take necessary measures to ensure risk management and business continuity. Security management certification provides just such a guarantee, increasing patient and partner confidence. This paper introduces one best practice for implementing four security controls in a hospital datacenter infrastructure (ISO27002), and describes the security assessment for implementing such controls.

  6. Learning in a Changing Environment

    ERIC Educational Resources Information Center

    Speekenbrink, Maarten; Shanks, David R.

    2010-01-01

    Multiple cue probability learning studies have typically focused on stationary environments. We present 3 experiments investigating learning in changing environments. A fine-grained analysis of the learning dynamics shows that participants were responsive to both abrupt and gradual changes in cue-outcome relations. We found no evidence that…

  7. Student-Teacher Interaction in Online Learning Environments

    ERIC Educational Resources Information Center

    Wright, Robert D., Ed.

    2015-01-01

    As face-to-face interaction between student and instructor is not present in online learning environments, it is increasingly important to understand how to establish and maintain social presence in online learning. "Student-Teacher Interaction in Online Learning Environments" provides successful strategies and procedures for developing…

  8. Preferred-Actual Learning Environment "Spaces" and Earth Science Outcomes in Taiwan

    ERIC Educational Resources Information Center

    Chang, Chun-Yen; Hsiao, Chien-Hua; Barufaldi, James P.

    2006-01-01

    This study examines the possibilities of differential impacts on students' earth science learning outcomes between different preferred-actual learning environment spaces by using a newly developed ESCLEI (Earth Science Classroom Learning Environment Instrument). The instrument emphasizes three simultaneously important classroom components:…

  9. Causal Model Progressions as a Foundation for Intelligent Learning Environments.

    DTIC Science & Technology

    1987-11-01

    Foundation for Intelligent Learning Environments 3Barbara Y. White and John R. Frederiksen ~DTIC Novemr1987 ELECTE November1987 JUNO 9 88 Approved I )’I...Learning Environments 12. PERSONAL AUTHOR(S? Barbara Y. White and John R. Frederiksen 13a. TYPE OF REPORT 13b TIME COVERED 14. DATE OF REPORT (Year...architecture of a new type of learning environment that incorporates features of microworlds and of intelligent tutorng systems. The environment is based on

  10. How basic psychological needs and motivation affect vitality and lifelong learning adaptability of pharmacists: a structural equation model.

    PubMed

    Tjin A Tsoi, Sharon L N M; de Boer, Anthonius; Croiset, Gerda; Koster, Andries S; van der Burgt, Stéphanie; Kusurkar, Rashmi A

    2018-01-31

    Insufficient professional development may lead to poor performance of healthcare professionals. Therefore, continuing education (CE) and continuing professional development (CPD) are needed to secure safe and good quality healthcare. The aim of the study was to investigate the hypothesized associations and their directions between pharmacists' basic psychological needs in CE, their academic motivation, well-being, learning outcomes. Self-determination theory was used as a theoretical framework for this study. Data were collected through four questionnaires measuring: academic motivation, basic psychological needs (BPN), vitality and lifelong learning adaptability of pharmacists in the CE/CPD learning context. Structural equation modelling was used to analyze the data. Demographic factors like gender and working environment influenced the observed scores for frustration of BPN and factors like training status and working experience influenced the observed scores for academic motivation. A good model fit could be found only for a part of the hypothesized pathway. Frustration of BPN is positively directly related to the less desirable type of academic motivation, controlled motivation (0.88) and negatively directly related to vitality (- 1.61) and negatively indirectly related to learning outcomes in CE. Fulfillment or frustration of BPN are important predictors for well-being and learning outcomes. Further research should be conducted to discover how we can prevent these needs from being frustrated in order to design a motivating, vitalizing and sustainable CE/CPD system for pharmacists and other healthcare professionals. Basic psychological needs are very important predictors for well-being and learning outcomes. Further research should be conducted to discover how we can prevent these needs from being frustrated in order to design a motivating, vitalizing and sustainable CE/CPD system for pharmacists and other healthcare professionals.

  11. Sharing Data and Analytical Resources Securely in a Biomedical Research Grid Environment

    PubMed Central

    Langella, Stephen; Hastings, Shannon; Oster, Scott; Pan, Tony; Sharma, Ashish; Permar, Justin; Ervin, David; Cambazoglu, B. Barla; Kurc, Tahsin; Saltz, Joel

    2008-01-01

    Objectives To develop a security infrastructure to support controlled and secure access to data and analytical resources in a biomedical research Grid environment, while facilitating resource sharing among collaborators. Design A Grid security infrastructure, called Grid Authentication and Authorization with Reliably Distributed Services (GAARDS), is developed as a key architecture component of the NCI-funded cancer Biomedical Informatics Grid (caBIG™). The GAARDS is designed to support in a distributed environment 1) efficient provisioning and federation of user identities and credentials; 2) group-based access control support with which resource providers can enforce policies based on community accepted groups and local groups; and 3) management of a trust fabric so that policies can be enforced based on required levels of assurance. Measurements GAARDS is implemented as a suite of Grid services and administrative tools. It provides three core services: Dorian for management and federation of user identities, Grid Trust Service for maintaining and provisioning a federated trust fabric within the Grid environment, and Grid Grouper for enforcing authorization policies based on both local and Grid-level groups. Results The GAARDS infrastructure is available as a stand-alone system and as a component of the caGrid infrastructure. More information about GAARDS can be accessed at http://www.cagrid.org. Conclusions GAARDS provides a comprehensive system to address the security challenges associated with environments in which resources may be located at different sites, requests to access the resources may cross institutional boundaries, and user credentials are created, managed, revoked dynamically in a de-centralized manner. PMID:18308979

  12. Review of Congressional Issues. News from Capitol Hill.

    ERIC Educational Resources Information Center

    Heinz, Ann Simeo

    2002-01-01

    Focuses on U.S. congressional issues in two categories: (1) enacted legislation, and (2) proposed legislation. Addresses topics such as the resolution related to Iraq, the Department of Homeland Security, Pledge of Allegiance, social security protection, elder justice, and women's rights. Includes learning activities. (CMK)

  13. The use of deep and surface learning strategies among students learning English as a foreign language in an Internet environment.

    PubMed

    Aharony, Noa

    2006-12-01

    The learning context is learning English in an Internet environment. The examination of this learning process was based on the Biggs and Moore's teaching-learning model (Biggs & Moore, 1993). The research aims to explore the use of the deep and surface strategies in an Internet environment among EFL students who come from different socio-economic backgrounds. The results of the research may add an additional level to the understanding of students' functioning in the Internet environment. One hundred fourty-eight Israeli junior and high school students participated in this research. The methodology was based on special computer software: Screen Cam, which recorded the students' learning process. In addition, expert judges completed a questionnaire which examined and categorized the students' learning strategies. The research findings show a clear preference of participants from all socio-economic backgrounds towards the surface learning strategy. The findings also showed that students from the medium to high socio-economic background used both learning strategies more frequently than low socio-economic students. The results reflect the habits that students acquire during their adjustment process throughout their education careers. A brief encounter with the Internet learning environment apparently cannot change norms or habits, which were acquired in the non-Internet learning environment.

  14. DS-ARP: a new detection scheme for ARP spoofing attacks based on routing trace for ubiquitous environments.

    PubMed

    Song, Min Su; Lee, Jae Dong; Jeong, Young-Sik; Jeong, Hwa-Young; Park, Jong Hyuk

    2014-01-01

    Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.

  15. DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments

    PubMed Central

    Song, Min Su; Lee, Jae Dong; Jeong, Hwa-Young; Park, Jong Hyuk

    2014-01-01

    Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system. PMID:25243205

  16. Designing new collaborative learning spaces in clinical environments: experiences from a children's hospital in Australia.

    PubMed

    Bines, Julie E; Jamieson, Peter

    2013-09-01

    Hospitals are complex places that provide a rich learning environment for students, staff, patients and their families, professional groups and the community. The "new" Royal Children's Hospital opened in late 2011. Its mission is focused on improving health and well-being of children and adolescents through leadership in healthcare, research and education. Addressing the need to create "responsive learning environments" aligned with the shift to student-centred pedagogy, two distinct learning environments were developed within the new Royal Children's Hospital; (i) a dedicated education precinct providing a suite of physical environments to promote a more active, collaborative and social learning experience for education and training programs conducted on the Royal Children's Hospital campus and (ii) a suite of learning spaces embedded within clinical areas so that learning becomes an integral part of the daily activities of this busy Hospital environment. The aim of this article is to present the overarching educational principles that lead the design of these learning spaces and describe the opportunities and obstacles encountered in the development of collaborative learning spaces within a large hospital development.

  17. Integration of Control Algorithms for Quadrotor UAV’s Using an Indoor Sensor Environment

    DTIC Science & Technology

    2011-09-01

    PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS PAGE Unclassified 19. SECURITY...gorgeous wife, Maggie, thank you for your loving support and continuous study snacks . xvi THIS PAGE INTENTIONALLY LEFT BLANK 1 I

  18. 15 CFR 784.3 - Scope and conduct of complementary access.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ..., safety, and security regulations (e.g., regulations for protection of controlled environments within the... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS... presence of a U.S. Government Host Team. No information of direct national security significance shall be...

  19. High Assurance Models for Secure Systems

    ERIC Educational Resources Information Center

    Almohri, Hussain M. J.

    2013-01-01

    Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…

  20. What Vendors Wished You Knew

    ERIC Educational Resources Information Center

    Weinstein, Margery

    2010-01-01

    The vendor-learning professional relationship is a delicate one. In the rush to scour the marketplace for the best products and services for learners, and secure a deal favorable to one's company, the learning vendor can be one of the greatest allies. Among the first steps to making a satisfying learning technology purchase is ensuring one's…

  1. Designing an e-Portfolio for Assurance of Learning Focusing on Adoptability and Learning Analytics

    ERIC Educational Resources Information Center

    Oliver, Beverley; Whelan, Barbara

    2011-01-01

    The "Assurance of Learning for Graduate Employability" framework is a quality assurance model for curriculum enhancement for graduate employability, enabling graduates to achieve "the skills, understandings and personal attributes that make [them] more likely to secure employment and be successful in their chosen occupations to the…

  2. OLMS: Online Learning Management System for E-Learning

    ERIC Educational Resources Information Center

    Ippakayala, Vinay Kumar; El-Ocla, Hosam

    2017-01-01

    In this paper we introduce a learning management system that provides a management system for centralized control of course content. A secure system to record lectures is implemented as a key feature of this application. This feature would be accessed through web camera and mobile recording. These features are mainly designed for e-learning…

  3. Preservice Teachers' Motivational Beliefs and Self-Regulation of Learning

    ERIC Educational Resources Information Center

    Bembenutty, Hefer

    2007-01-01

    Successful learners are those who engage in self-regulation of learning by using learning strategies to secure task completion. They exercise behavioral control to not only choose or plan valuable academic tasks, but also to maintain motivation and intention in the light of distracting alternatives. It was expected that teachers' self-efficacy…

  4. An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing.

    PubMed

    Kumar, Vinod; Jangirala, Srinivas; Ahmad, Musheer

    2018-06-28

    The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility for patients to explore medical treatment, accumulate and approach medical data through internet connectivity. Security and privacy preservation is necessary for medical data of the patient in TMIS because of the very perceptive purpose. Recently, Mohit et al.'s proposed a mutual authentication protocol for TMIS in the cloud computing environment. In this work, we reviewed their protocol and found that it is not secure against stolen verifier attack, many logged in patient attack, patient anonymity, impersonation attack, and fails to protect session key. For enhancement of security level, we proposed a new mutual authentication protocol for the similar environment. The presented framework is also more capable in terms of computation cost. In addition, the security evaluation of the protocol protects resilience of all possible security attributes, and we also explored formal security evaluation based on random oracle model. The performance of the proposed protocol is much better in comparison to the existing protocol.

  5. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    PubMed

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  6. Assessing staff attitudes towards information security in a European healthcare establishment.

    PubMed

    Furnell, S M; Gaunt, P N; Holben, R F; Sanders, P W; Stockel, C T; Warren, M J

    1996-01-01

    Information security is now recognized as an important consideration in modern healthcare establishments (HCEs), with a variety of guidelines and standards currently available to enable the environments to be properly protected. However, financial and operational constraints often exist which influence the practicality of these recommendations. This paper establishes that the staff culture of the organization is of particular importance in determining the level and types of security that will be accepted. This culture will be based upon staff awareness of and attitudes towards security and it is, therefore, important to have a clear idea of what these attitudes are. To this end, two surveys have been conducted within a reference environment to establish the attitudes of general users and technical staff, allowing the results to be fed back to HCE management to enable security policy to be appropriately defined. These results indicated that, although the establishment had participated in a European healthcare security initiative, staff attitudes and awareness were still weak in some areas.

  7. Clinicians, security and information technology support services in practice settings--a pilot study.

    PubMed

    Fernando, Juanita

    2010-01-01

    This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.

  8. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    PubMed Central

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs. PMID:22163874

  9. Network Monitoring: A 360-Degree Plan--Learn How to Get the Vital Feedback You Need to Make Your System--And Its Users--More Secure

    ERIC Educational Resources Information Center

    Miller, Steven E.; Seiberling, Chris

    2004-01-01

    This article represents the second part of a series in this journal called "How to Perform a Security Audit." It continues the conversation on setting up a process for identifying security-related concerns and implementation safeguards. It continues the conversation from the perspective of system monitoring. This article discusses how to use a…

  10. Can GPs working in secure environments in England re-license using the Royal College of General Practitioners revalidation proposals?

    PubMed Central

    2012-01-01

    Background Revalidation for UK doctors is expected to be introduced from late 2012. For general practitioners (GPs), this entails collecting supporting information to be submitted and assessed in a revalidation portfolio every five years. The aim of this study was to explore the feasibility of GPs working in secure environments to collect supporting information for the Royal College of General Practitioners’ (RCGP) proposed revalidation portfolio. Methods We invited GPs working in secure environments in England to submit items of supporting information collected during the previous 12 months using criteria and standards required for the proposed RCGP revalidation portfolio and complete a GP issues log. Initial focus groups and initial and follow-up semi-structured face-to-face and telephone interviews were held to explore GPs’ views of this process. Quantitative and qualitative data were analysed using descriptive statistics and identifying themes respectively. Results Of the 50 GPs who consented to participate in the study, 20 submitted a portfolio. Thirty-eight GPs participated in an initial interview, nine took part in a follow-up interview and 17 completed a GP issues log. GPs reported difficulty in collecting supporting information for valid patient feedback, full-cycle clinical audits and evidence for their extended practice role(s) as sessional practitioners in the high population turnover custodial environment. Peripatetic practitioners experienced more difficulty than their institution based counterparts collating this evidence. Conclusions GPs working in secure environments may experience difficulties in collecting the newer types of supporting information for the proposed RCGP revalidation portfolio primarily due to their employment status within a non-medical environment and characteristics of the detainee population. Increased support from secure environment service commissioners and employers will be a prerequisite for these practitioners to enable them to re-license using the RCGP revalidation proposals. PMID:23253694

  11. Perceptions of Pre-Service Teachers on the Design of a Learning Environment Based on the Seven Principles of Good Practice

    ERIC Educational Resources Information Center

    Al-Furaih, Suad Abdul Aziz

    2017-01-01

    This study explored the perceptions of 88 pre-service teachers on the design of a learning environment using the Seven Principles of Good Practice and its effect on participants' abilities to create their Cloud Learning Environment (CLE). In designing the learning environment, a conceptual model under the name 7 Principles and Integrated Learning…

  12. A Case Study of the Experiences of Instructors and Students in a Virtual Learning Environment (VLE) with Different Cultural Backgrounds

    ERIC Educational Resources Information Center

    Lim, Keol; Kim, Mi Hwa

    2015-01-01

    The use of virtual learning environments (VLEs) has become more common and educators recognized the potential of VLEs as educational environments. The learning community in VLEs can be a mixture of people from all over the world with different cultural backgrounds. However, despite many studies about the use of virtual environments for learning,…

  13. Virtual Representations in 3D Learning Environments

    ERIC Educational Resources Information Center

    Shonfeld, Miri; Kritz, Miki

    2013-01-01

    This research explores the extent to which virtual worlds can serve as online collaborative learning environments for students by increasing social presence and engagement. 3D environments enable learning, which simulates face-to-face encounters while retaining the advantages of online learning. Students in Education departments created avatars…

  14. The Reality Of The Homeland Security Enterprise Information Sharing Environment

    DTIC Science & Technology

    2017-12-01

    THE HOMELAND SECURITY ENTERPRISE INFORMATION SHARING ENVIRONMENT by Michael E. Brown December 2017 Thesis Advisors: Erik Dahl Robert...collection of information is estimated to average 1 hour per response, including the time for reviewing instruction, searching existing data sources...gathering and maintaining the data needed, and completing and reviewing the collection of information . Send comments regarding this burden estimate or

  15. Adolescents' Perception of the Psychological Security of School Environment, Emotional Development and Academic Performance in Secondary Schools in Gombe Metropolis

    ERIC Educational Resources Information Center

    Musa, Alice K. J.; Meshak, Bibi; Sagir, Jummai Ibrahim

    2016-01-01

    The purpose of the study was to determine adolescents' perceptions of the psychological security of their schools environments and their relationship with their emotional development and academic performance in secondary schools in Gombe Metropolis. A sample of 239 (107 males and 133 females) secondary school students selected via stratified…

  16. A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments.

    PubMed

    Farash, Mohammad Sabzinejad; Nawaz, Omer; Mahmood, Khalid; Chaudhry, Shehzad Ashraf; Khan, Muhammad Khurram

    2016-07-01

    To enhance the quality of healthcare in the management of chronic disease, telecare medical information systems have increasingly been used. Very recently, Zhang and Qi (J. Med. Syst. 38(5):47, 32), and Zhao (J. Med. Syst. 38(5):46, 33) separately proposed two authentication schemes for telecare medical information systems using radio frequency identification (RFID) technology. They claimed that their protocols achieve all security requirements including forward secrecy. However, this paper demonstrates that both Zhang and Qi's scheme, and Zhao's scheme could not provide forward secrecy. To augment the security, we propose an efficient RFID authentication scheme using elliptic curves for healthcare environments. The proposed RFID scheme is secure under common random oracle model.

  17. Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program

    DTIC Science & Technology

    1991-02-01

    enforcement support for airline and airport security measures. Airline passengers, as the ultimate beneficiaries of the security program. pay for the...environment for these air carriers. Airport security programs are designed to meet the threat to the specific airport. Of the 4(02 airports. 18...essential to many passengers. " FAA is currently reviewing Parts 107 and 108 of the Federal Aviation Regulations, covering airport security and airplane

  18. Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges

    NASA Astrophysics Data System (ADS)

    Cayirci, Erdal; Rong, Chunming; Huiskamp, Wim; Verkoelen, Cor

    Military/civilian education training and experimentation networks (ETEN) are an important application area for the cloud computing concept. However, major security challenges have to be overcome to realize an ETEN. These challenges can be categorized as security challenges typical to any cloud and multi-level security challenges specific to an ETEN environment. The cloud approach for ETEN is introduced and its security challenges are explained in this paper.

  19. 2011 Defense Industrial Base Critical Infrastructure Protection Conference (DIBCIP)

    DTIC Science & Technology

    2011-08-25

    Office of the Program Manager, Information Sharing Environment u Mr. Vince Jarvie , Vice President, Corporate Security, L-3 Communications...National Defense University IRM College and in 2008 he obtained the Certified Information System Security Professional certificate. MR. VINCE JARVIE ...Vice President, Corporate Security, L-3 Communciations Corporation Mr. Vincent (Vince) Jarvie is the Vice President, Corporate Security for L-3

  20. Comprehensive evaluation of ecological security in mining area based on PSR-ANP-GRAY.

    PubMed

    He, Gang; Yu, Baohua; Li, Shuzhou; Zhu, Yanna

    2017-09-06

    With the large exploitation of mineral resources, a series of problems have appeared in the ecological environment of the mining area. Therefore, evaluating the ecological security of mining area is of great significance to promote its healthy development. In this paper, the evaluation index system of ecological security in mining area was constructed from three dimensions of nature, society and economy, combined with Pressure-State-Response framework model. Then network analytic hierarchy process and GRAY relational analysis method were used to evaluate the ecological security of the region, and the weighted correlation degree of ecological security was calculated through the index data of a coal mine from 2012 to 2016 in China. The results show that the ecological security in the coal mine area is on the rise as a whole, though it alternatively rose and dropped from 2012 to 2016. Among them, the ecological security of the study mining area is at the general security level from 2012 to 2015, and at a relatively safe level in 2016. It shows that the ecological environment of the study mining area can basically meet the requirement of the survival and development of the enterprises.

Top