Consequence Prioritization Process for Potential High Consequence Events (HCE)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Freeman, Sarah G.
2016-10-31
This document describes the process for Consequence Prioritization, the first phase of the Consequence-Driven Cyber-Informed Engineering (CCE) framework. The primary goal of Consequence Prioritization is to identify potential disruptive events that would significantly inhibit an organization’s ability to provide the critical services and functions deemed fundamental to their business mission. These disruptive events, defined as High Consequence Events (HCE), include both events that have occurred or could be realized through an attack of critical infrastructure owner assets. While other efforts have been initiated to identify and mitigate disruptive events at the national security level, such as Presidential Policy Directive 41more » (PPD-41), this process is intended to be used by individual organizations to evaluate events that fall below the threshold for a national security. Described another way, Consequence Prioritization considers threats greater than those addressable by standard cyber-hygiene and includes the consideration of events that go beyond a traditional continuity of operations (COOP) perspective. Finally, Consequence Prioritization is most successful when organizations adopt a multi-disciplinary approach, engaging both cyber security and engineering expertise, as in-depth engineering perspectives are required to recognize and characterize and mitigate HCEs. Figure 1 provides a high-level overview of the prioritization process.« less
ERIC Educational Resources Information Center
Schneider, Tod
2010-01-01
Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…
How To Keep Your Schools Safe and Secure.
ERIC Educational Resources Information Center
Gilbert, Christopher B.
1996-01-01
Discusses unforeseen costs (including potential litigation expenses), benefits, and consequences of adopting security measures (such as metal detectors, drug dogs, security cameras, campus police, dress codes, crime watch programs, and communication devices) to counter on-campus violence and gang activity. High-tech gadgetry alone is insufficient.…
Negative affect as a moderator of the relationship between hookup motives and hookup consequences.
Montes, Kevin S; Napper, Lucy E; Froidevaux, Nicole M; Kenney, Shannon; LaBrie, Joseph W
2016-01-01
The current study examined the extent to which negative affect moderates the relationships between distinct hookup motives and hookup consequences. Data were collected from 271 heavy-drinking undergraduate college students. Students from 3 US universities completed online surveys assessing hooking up-related motives, behaviors, and consequences. The results showed that conformity motives to hookup and negative affect predicted hookup consequences. Furthermore, negative affect moderated the relationship between hooking up for relationship reasons and hookup consequences. Specifically, among students with high negative affect, hooking up to secure a long-term relationship was positively associated with hookup consequences whereas among students with low negative affect, securing a long-term relationship was negatively associated with hookup consequences. These findings highlight the role that motives and negative affect play in the prediction of negative hookup consequences. Moreover, the findings from the current study have the potential to inform prevention efforts designed to reduce hookup consequences.
49 CFR 1520.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2010 CFR
2010-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.17 Consequences of unauthorized disclosure of...
Vecchione, Michele; Caprara, Gianvittorio; Schoen, Harald; Castro, Josè Luis Gonzàlez; Schwartz, Shalom H
2012-08-01
Using data from Italy, Spain, and Germany (N= 1,569), this study investigated the role of basic values (universalism and security) and basic traits (openness and agreeableness) in predicting perceptions of the consequences of immigration. In line with Schwartz's (1992) theory, we conceptualized security as having two distinct components, one concerned with safety of the self (personal security) and the other with harmony and stability of larger groups and of society (group security). Structural equation modelling revealed that universalism values underlie perceptions that immigration has positive consequences and group security values underlie perceptions that it has negative consequences. Personal security makes no unique, additional contribution. Multi-group analyses revealed that these associations are invariant across the three countries except for a stronger link between universalism and perceptions of the consequences of immigration in Spain. To examine whether values mediate relations of traits to perceptions of immigration, we used the five-factor model. Findings supported a full mediation model. Individuals' traits of openness and agreeableness explained significant variance in security and universalism values. Basic values, in turn, explained perceptions of the consequences of immigration. ©2011 The British Psychological Society.
Leveraging Safety Programs to Improve and Support Security Programs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Leach, Janice; Snell, Mark K.; Pratt, R.
2015-10-01
There has been a long history of considering Safety, Security, and Safeguards (3S) as three functions of nuclear security design and operations that need to be properly and collectively integrated with operations. This paper specifically considers how safety programmes can be extended directly to benefit security as part of an integrated facility management programme. The discussion will draw on experiences implementing such a programme at Sandia National Laboratories’ Annular Research Reactor Facility. While the paper focuses on nuclear facilities, similar ideas could be used to support security programmes at other types of high-consequence facilities and transportation activities.
17 CFR 229.915 - (Item 915) Federal income tax consequences.
Code of Federal Regulations, 2010 CFR
2010-04-01
... consequences. 229.915 Section 229.915 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...) Federal income tax consequences. (a) Provide a brief, clear and understandable summary of the material Federal income tax consequences of the roll-up transaction and an investment in the successor. Where a tax...
1990-07-01
i k RAYMOND P. URTZ, JR. Technical Director Directorate of Command & Control FOR TH!E C0OKANDER: IGOR G. PLONISCH Directorate of Plans & Programs If...access controls and for thwarting inference and aggregation attacks ae generally considered inadequate for high usurance systems. Consequently, thee is...requirements was to have been based on a state-of-the-art survey involving interviews with TDBMS researchers and developers and security officers and auditors
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-04-12
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.
Self Managing the Consequences of Major Limb Trauma
2007-03-01
rehabilitation to the community – whether that be in the military or 15. SUBJECT TERMS Self Management, Trauma, Online Learning 16. SECURITY...Task # 1). The Flash platform was chosen based on its high level of market penetration (greater than 98% in the U.S.A.), ease of integration with...management system to facilitate seamless transitions between lessons, online chats, message boards, and evaluation questionnaires using a single security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brigantic, Robert T.; Betzsold, Nick J.; Bakker, Craig KR
In this presentation we overview a methodology for dynamic security risk quantification and optimal resource allocation of security assets for high profile venues. This methodology is especially applicable to venues that require security screening operations such as mass transit (e.g., train or airport terminals), critical infrastructure protection (e.g., government buildings), and largescale public events (e.g., concerts or professional sports). The method starts by decomposing the three core components of risk -- threat, vulnerability, and consequence -- into their various subcomponents. For instance, vulnerability can be decomposed into availability, accessibility, organic security, and target hardness and each of these can bemore » evaluated against the potential threats of interest for the given venue. Once evaluated, these subcomponents are rolled back up to compute the specific value for the vulnerability core risk component. Likewise, the same is done for consequence and threat, and then risk is computed as the product of these three components. A key aspect of our methodology is dynamically quantifying risk. That is, we incorporate the ability to uniquely allow the subcomponents and core components, and in turn, risk, to be quantified as a continuous function of time throughout the day, week, month, or year as appropriate.« less
Gangwar, Amit Kumar; Gupta, Ashish; Kedawat, Garima; Kumar, Pawan; Singh, Bhanu Pratap; Singh, Nidhi; Srivastava, Avanish K; Dhakate, Sanjay R; Gupta, Bipin Kumar
2018-05-23
Increasing counterfeiting of important data, currency, stamp papers, branded products etc., has become a major security threat which could lead to serious damage to the global economy. Consequences of such damage are compelling for researchers to develop new high-end security features to address full-proof solutions. Herein, we report a dual mode flexible highly luminescent white security paper and nanotaggants composed of nanophosphors incorporated in polymer matrix to form a nanofiber-based mat for anti-counterfeiting applications. The dual mode nanofibers are fabricated by electrospinning technique by admixing the composite of NaYF 4 :Eu 3+ @NaYF 4 :Yb 3+ , Er 3+ nanophosphors in the polyvinyl alcohol solution. This flexible polymer mat derived from nanofibers appears white in daylight, while emitting strong red (NaYF 4 :Eu 3+ ) and green (NaYF 4 :Yb 3+ , Er 3+ ) colors at excitation wavelengths of 254 nm and 980 nm, respectively. These luminescent nanofibers can also be encrypted as a new class of nanotaggants to protect confidential documents. These obtained results suggest that highly luminescent dual mode polymeric nanofiber-based flexible white security paper and nanotaggants could offer next-generation high-end unique security features against counterfeiting. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.
17 CFR 12.35 - Consequences of a party's failure to comply with a discovery order.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Consequences of a party's failure to comply with a discovery order. 12.35 Section 12.35 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES RELATING TO REPARATIONS Discovery § 12.35 Consequences of a party's...
2016-07-13
adequate security testing , and segment their networks and systems into separate defended enclaves. Finally, cyber defenders should posi- tion themselves...explicitly tied to following security practices, and there should be consequences for security failures that are regularly tested via a continuing testing ...program. Users should be routinely tested and probed, and those who do not perform well should face escalating consequences. For example, cyber
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-01-01
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866
Bialas, Andrzej
2010-01-01
The paper is focused on the security issues of sensors provided with processors and software and used for high-risk applications. Common IT related threats may cause serious consequences for sensor system users. To improve their robustness, sensor systems should be developed in a restricted way that would provide them with assurance. One assurance creation methodology is Common Criteria (ISO/IEC 15408) used for IT products and systems. The paper begins with a primer on the Common Criteria, and then a general security model of the intelligent sensor as an IT product is discussed. The paper presents how the security problem of the intelligent sensor is defined and solved. The contribution of the paper is to provide Common Criteria (CC) related security design patterns and to improve the effectiveness of the sensor development process. PMID:22315571
17 CFR 12.315 - Consequences of overstating damages claims not in excess of $30,000.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Consequences of overstating damages claims not in excess of $30,000. 12.315 Section 12.315 Commodity and Securities Exchanges... Proceedings § 12.315 Consequences of overstating damages claims not in excess of $30,000. If a party, who has...
Health consequences of shift-work: the case of iranian hospital security personnel.
Abedini, Roghayeh; Soltanzadeh, Ahmad; Faghih, Mohammad Amin; Mohammadi, Heidar; Kamalinia, Mojtaba; Mohraz, Majid Habibi; Arassi, Maziyar; Veyseh, Peyman Piran; Aghaei, Hamed; Hosseini, Seyed Younes
2015-01-01
Shift-work, which is an ergonomics issue in workplaces, can negatively affect workers. The security personnel of medical centers in Iran have multiple responsibilities and consequently are exposed to such unwanted situations as observing patients, disputing with patient's attendants, unwanted shift schedules, and being away from family for long periods. This study assessed health problems of Iranian hospital security personnel (shift-worker personnel) using the Survey of Shift-workers (SOS) questionnaire (Persian version). This cross-sectional study was conducted in seven medical centers (4 hospitals and 3 clinics). A total of 416 workers were surveyed: shift-workers (exposed group) (n=209) and non-shift-workers (unexposed group) (n=207). The prevalence of adverse health effects was higher in shift-workers than day-workers. The level of education and mean Body Mass Index (BMI) in shift-workers were significantly higher compared with day-workers. The prevalence of gastrointestinal disorders, cardiovascular and psychological problems were also significantly higher in shift-workers compared with day-workers. Overall, the prevalence of health problems among the security personnel of medical centers was high. Hence, it is recommended that personnel be put under periodic monitoring and receive medical counseling and treatment if there is any disorder.
The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks
NASA Astrophysics Data System (ADS)
Turkanović, Muhamed; Hölbl, Marko
2014-10-01
Recently quantum computation and cryptography principles are exploited in the design of security systems for wireless sensor networks (WSNs), which are consequently named as quantum WSN. Quantum cryptography is presumably secure against any eavesdropper and thus labeled as providing unconditional security. This paper tries to analyze the aspect of the applicative use of quantum principles in WSN. The outcome of the analysis elaborates a summary about the inadequacy of applicative use of quantum cryptography in WSN and presents an overview of all possible applicative challenges and problems while designing quantum-based security systems for WSN. Since WSNs are highly complex frameworks, with many restrictions and constraints, every security system has to be fully compatible and worthwhile. The aim of the paper was to contribute a verdict about this topic, backed up by equitable facts.
Consequence-driven cyber-informed engineering (CCE)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Freeman, Sarah G.; St Michel, Curtis; Smith, Robert
The Idaho National Lab (INL) is leading a high-impact, national security-level initiative to reprioritize the way the nation looks at high-consequence risk within the industrial control systems (ICS) environment of the country’s most critical infrastructure and other national assets. The Consequence-driven Cyber-informed Engineering (CCE) effort provides both private and public organizations with the steps required to examine their own environments for high-impact events/risks; identify implementation of key devices and components that facilitate that risk; illuminate specific, plausible cyber attack paths to manipulate these devices; and develop concrete mitigations, protections, and tripwires to address the high-consequence risk. The ultimate goal ofmore » the CCE effort is to help organizations take the steps necessary to thwart cyber attacks from even top-tier, highly resourced adversaries that would result in a catastrophic physical effect. CCE participants are encouraged to work collaboratively with each other and with key U.S. Government (USG) contributors to establish a coalition, maximizing the positive effect of lessons-learned and further contributing to the protection of critical infrastructure and other national assets.« less
2003-09-01
infrastructure, and providing consequence management and mitigation of man-made and natural disasters. The United States Army, Pacifi c (USARPAC), the Offi...Terrorism, Disaster Response and Consequence Management , and Medical Aspects of Environmental Security. The conference brought together military and...consequence management in maintaining governmental legitimacy, and examine salient military roles in preventing, responding to, and mitigating natural
Threats to information security of real-time disease surveillance systems.
Henriksen, Eva; Johansen, Monika A; Baardsgaard, Anders; Bellika, Johan G
2009-01-01
This paper presents the main results from a qualitative risk assessment of information security aspects for a new real-time disease surveillance approach in general, and for the Snow surveillance system in particular. All possible security threats and acceptable solutions, and the implications these solutions had to the design of the system, were discussed. Approximately 30 threats were identified. None of these got an unacceptable high risk level originally, but two got medium risk level, of which one was concluded to be unacceptable after further investigation. Of the remaining low risk threats, some have severe consequence, thus requiring particular assessment. Since it is very important to identify and solve all security threats before real-time solutions can be used in a wide scale, additional investigations are needed.
Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies.
Paté-Cornell, M-Elisabeth; Kuypers, Marshall; Smith, Matthew; Keller, Philip
2018-02-01
Managing cyber security in an organization involves allocating the protection budget across a spectrum of possible options. This requires assessing the benefits and the costs of these options. The risk analyses presented here are statistical when relevant data are available, and system-based for high-consequence events that have not happened yet. This article presents, first, a general probabilistic risk analysis framework for cyber security in an organization to be specified. It then describes three examples of forward-looking analyses motivated by recent cyber attacks. The first one is the statistical analysis of an actual database, extended at the upper end of the loss distribution by a Bayesian analysis of possible, high-consequence attack scenarios that may happen in the future. The second is a systems analysis of cyber risks for a smart, connected electric grid, showing that there is an optimal level of connectivity. The third is an analysis of sequential decisions to upgrade the software of an existing cyber security system or to adopt a new one to stay ahead of adversaries trying to find their way in. The results are distributions of losses to cyber attacks, with and without some considered countermeasures in support of risk management decisions based both on past data and anticipated incidents. © 2017 Society for Risk Analysis.
Cooling off health security hot spots: getting on top of it down under.
Murray, Kris A; Skerratt, Lee F; Speare, Rick; Ritchie, Scott; Smout, Felicity; Hedlefs, Robert; Lee, Jonathan
2012-11-01
Australia is free of many diseases, pests and weeds found elsewhere in the world due to its geographical isolation and relatively good health security practices. However, its health security is under increasing pressure due to a number of ecological, climatic, demographic and behavioural changes occurring globally. North Queensland is a high risk area (a health security hot spot) for Australia, due in part to its connection to neighbouring countries via the Torres Strait and the Indo-Papuan conduit, its high diversity of wildlife reservoirs and its environmental characteristics. Major outbreaks of exotic diseases, pests and weeds in Australia can cost in excess of $1 billion; however, most expenditure on health security is reactive apart from preventive measures undertaken for a few high profile diseases, pests and weeds. Large gains in health security could therefore be made by spending more on pre-emptive approaches to reduce the risk of outbreaks, invasion/spread and establishment, despite these gains being difficult to quantify. Although biosecurity threats may initially have regional impacts (e.g. Hendra virus), a break down in security in health security hot spots can have national and international consequences, as has been seen recently in other regions with the emergence of SARS and pandemic avian influenza. Novel approaches should be driven by building research and management capacity, particularly in the regions where threats arise, a model that is applicable both in Australia and in other regions of the world that value and therefore aim to improve their strategies for maintaining health security. Copyright © 2012 Elsevier Ltd. All rights reserved.
The Use of Private Security by the United Kingdom and the Subsequent Impacts on Operational Planning
2014-05-22
2003 and 2008.4 The UK and US dominate the global market for private military companies.5 Therefore, scholarly research on the UK should help explain...provide a certain military skill applicable to the conduct of warfare. Deborah Avant, in her 2005 work The Market for Force : The Consequences of...International Security," International Security 26, no. 3 (Winter 2001-2002): 186. 14Deborah D. Avant, The Market for Force : The Consequences of Privatizing
Hu, Fei; Hao, Qi; Lukowiak, Marcin; Sun, Qingquan; Wilhelm, Kyle; Radziszowski, Stanisław; Wu, Yao
2010-11-01
Implantable medical devices (IMDs) have played an important role in many medical fields. Any failure in IMDs operations could cause serious consequences and it is important to protect the IMDs access from unauthenticated access. This study investigates secure IMD data collection within a telehealthcare [mobile health (m-health)] network. We use medical sensors carried by patients to securely access IMD data and perform secure sensor-to-sensor communications between patients to relay the IMD data to a remote doctor's server. To meet the requirements on low computational complexity, we choose N-th degree truncated polynomial ring (NTRU)-based encryption/decryption to secure IMD-sensor and sensor-sensor communications. An extended matryoshkas model is developed to estimate direct/indirect trust relationship among sensors. An NTRU hardware implementation in very large integrated circuit hardware description language is studied based on industry Standard IEEE 1363 to increase the speed of key generation. The performance analysis results demonstrate the security robustness of the proposed IMD data access trust model.
Security Shift in Future Network Architectures
2010-11-01
RTO-MP-IST-091 2 - 1 Security Shift in Future Network Architectures Tim Hartog, M.Sc Information Security Dept. TNO Information and...current practice military communication infrastructures are deployed as stand-alone networked information systems. Network -Enabled Capabilities (NEC) and...information architects and security specialists about the separation of network and information security, the consequences of this shift and our view
Secure it now or secure it later: the benefits of addressing cyber-security from the outset
NASA Astrophysics Data System (ADS)
Olama, Mohammed M.; Nutaro, James
2013-05-01
The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.
The Semiotic Function of Clothing and Gender Roles on Broadcast Business News
ERIC Educational Resources Information Center
Tan, Sabine; See, Monica Owyong Yuet
2009-01-01
In today's fast-paced, competitive society, attracting the attention of viewers has become increasingly challenging. Consequently, in broadcast business news, the communicative function of newscasters' and presenters' overall appearance may be highly significant in securing and sustaining viewership in more than one way. This article arose out of…
The Impact of Canine Assistance for Children with Autism and the Family Unit
ERIC Educational Resources Information Center
Wild, Diana L.
2012-01-01
Children with autism spectrum disorder (ASD) have difficulty with attention, impulsiveness, and safety issues; consequently, special measures must be taken to secure their safety. One such measure is canine intervention, which provides children with highly trained service dogs that can respond to their autism behaviors. Social support theory…
Information security for compliance with select agent regulations.
Lewis, Nick; Campbell, Mark J; Baskin, Carole R
2015-01-01
The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as "select agents." While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts--still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment.
Information Security for Compliance with Select Agent Regulations
Lewis, Nick; Campbell, Mark J.
2015-01-01
The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as “select agents.” While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts—still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment. PMID:26042864
Taking Up the Security Challenge of Climate Change
2009-05-26
Climate change , in which man-made global warming is a major factor, will likely have dramatic and long-lasting consequences with profound security...effects of climate change are greatest, particularly in weak states that are already vulnerable to environmental destabilization. Two things are vitally...important: stemming the tide of climate change and adapting to its far-reaching consequences. This project examines the destabilizing effects of climate
The African Peace and Security Architecture: Myth or Reality
2013-03-01
resolving the conflicts. Efforts by African leaders to create continental peace and security mechanisms failed miserably . Consequently, Africans depended...Framework Document, October 2001), 14. 6 Andre Le Sage, “Africa’s Irregular Security Threats: Challenges for U.S. Engagement,” (Strategic Forum
ERIC Educational Resources Information Center
National Crime Prevention Centre, Ottawa (Ontario).
This document presents a policy framework for improving the personal security of women and girls. The document includes: (1) "Introduction"; (2) "Policy Background" (the concept of personal security, the societal context of women's personal security, consequences of violence for women and girls, long-term policy concern, and…
The Impact of Migration Processes on the National Security of Kazakhstan
ERIC Educational Resources Information Center
Korganova, Saipzhamal S.; Taubayeva, Mirash Y.; Sultanov, Serik A.; Rysbayeva, Saule Zh.; Sultanova, Valida I.; Zhumabekov, Madiyr U.; Raximshikova, Mavluda K.
2016-01-01
The purpose of this study is to analyze the impact of migration processes on the national security of Kazakhstan. However, it should be noted that national security is an expression of national interests and it is provided by means of resources and efforts of a particular state. Consequently, social security is an expression of the public…
Long, Clive G; Banyard, Ellen; Fulton, Barbara; Hollin, Clive R
2014-09-01
Arson and fire-setting are highly prevalent among patients in secure psychiatric settings but there is an absence of valid and reliable assessment instruments and no evidence of a significant approach to intervention. To develop a semi-structured interview assessment specifically for fire-setting to augment structured assessments of risk and need. The extant literature was used to frame interview questions relating to the antecedents, behaviour and consequences necessary to formulate a functional analysis. Questions also covered readiness to change, fire-setting self-efficacy, the probability of future fire-setting, barriers to change, and understanding of fire-setting behaviour. The assessment concludes with indications for assessment and a treatment action plan. The inventory was piloted with a sample of women in secure care and was assessed for comprehensibility, reliability and validity. Staff rated the St Andrews Fire and Risk Instrument (SAFARI) as acceptable to patients and easy to administer. SAFARI was found to be comprehensible by over 95% of the general population, to have good acceptance, high internal reliability, substantial test-retest reliability and validity. SAFARI helps to provide a clear explanation of fire-setting in terms of the complex interplay of antecedents and consequences and facilitates the design of an individually tailored treatment programme in sympathy with a cognitive-behavioural approach. Further studies are needed to verify the reliability and validity of SAFARI with male populations and across settings.
Schukat, M; McCaldin, D; Wang, K; Schreier, G; Lovell, N H; Marschollek, M; Redmond, S J
2016-11-10
As wearable sensors take the consumer market by storm, and medical device manufacturers move to make their devices wireless and appropriate for ambulatory use, this revolution brings with it some unintended consequences, which we aim to discuss in this paper. We discuss some important unintended consequences, both beneficial and unwanted, which relate to: modifications of behavior; creation and use of big data sets; new security vulnerabilities; and unforeseen challenges faced by regulatory authorities, struggling to keep pace with recent innovations. Where possible, we proposed potential solutions to unwanted consequences. Intelligent and inclusive design processes may mitigate unintended modifications in behavior. For big data, legislating access to and use of these data will be a legal and political challenge in the years ahead, as we trade the health benefits of wearable sensors against the risk to our privacy. The wireless and personal nature of wearable sensors also exposes them to a number of unique security vulnerabilities. Regulation plays an important role in managing these security risks, but also has the dual responsibility of ensuring that wearable devices are fit for purpose. However, the burden of validating the function and security of medical devices is becoming infeasible for regulators, given the many software apps and wearable sensors entering the market each year, which are only a subset of an even larger 'internet of things'. Wearable sensors may serve to improve wellbeing, but we must be vigilant against the occurrence of unintended consequences. With collaboration between device manufacturers, regulators, and end-users, we balance the risk of unintended consequences occurring against the incredible benefit that wearable sensors promise to bring to the world.
Unintended Consequences of Wearable Sensor Use in Healthcare
McCaldin, D.; Wang, K.; Schreier, G.; Lovell, N. H.; Marschollek, M.; Redmond, S. J.
2016-01-01
Summary Objectives As wearable sensors take the consumer market by storm, and medical device manufacturers move to make their devices wireless and appropriate for ambulatory use, this revolution brings with it some unintended consequences, which we aim to discuss in this paper. Methods We discuss some important unintended consequences, both beneficial and unwanted, which relate to: modifications of behavior; creation and use of big data sets; new security vulnerabilities; and unforeseen challenges faced by regulatory authorities, struggling to keep pace with recent innovations. Where possible, we proposed potential solutions to unwanted consequences. Results Intelligent and inclusive design processes may mitigate unintended modifications in behavior. For big data, legislating access to and use of these data will be a legal and political challenge in the years ahead, as we trade the health benefits of wearable sensors against the risk to our privacy. The wireless and personal nature of wearable sensors also exposes them to a number of unique security vulnerabilities. Regulation plays an important role in managing these security risks, but also has the dual responsibility of ensuring that wearable devices are fit for purpose. However, the burden of validating the function and security of medical devices is becoming infeasible for regulators, given the many software apps and wearable sensors entering the market each year, which are only a subset of an even larger ‘internet of things’. Conclusion Wearable sensors may serve to improve wellbeing, but we must be vigilant against the occurrence of unintended consequences. With collaboration between device manufacturers, regulators, and end-users, we balance the risk of unintended consequences occurring against the incredible benefit that wearable sensors promise to bring to the world. PMID:27830234
1992-04-03
10. SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification) ASEAN...region is a consequence of the stability, coordination and team work of ASEAN. With a reduction of U.S. forces presence in the area, the key to securing...fastest-growing regions in the world today. The stability in the region is a consequence of the stability, coordination and team work of ASEAN. With a
A Secure Multicast Framework in Large and High-Mobility Network Groups
NASA Astrophysics Data System (ADS)
Lee, Jung-San; Chang, Chin-Chen
With the widespread use of Internet applications such as Teleconference, Pay-TV, Collaborate tasks, and Message services, how to construct and distribute the group session key to all group members securely is becoming and more important. Instead of adopting the point-to-point packet delivery, these emerging applications are based upon the mechanism of multicast communication, which allows the group member to communicate with multi-party efficiently. There are two main issues in the mechanism of multicast communication: Key Distribution and Scalability. The first issue is how to distribute the group session key to all group members securely. The second one is how to maintain the high performance in large network groups. Group members in conventional multicast systems have to keep numerous secret keys in databases, which makes it very inconvenient for them. Furthermore, in case that a member joins or leaves the communication group, many involved participants have to change their own secret keys to preserve the forward secrecy and the backward secrecy. We consequently propose a novel version for providing secure multicast communication in large network groups. Our proposed framework not only preserves the forward secrecy and the backward secrecy but also possesses better performance than existing alternatives. Specifically, simulation results demonstrate that our scheme is suitable for high-mobility environments.
An access control model with high security for distributed workflow and real-time application
NASA Astrophysics Data System (ADS)
Han, Ruo-Fei; Wang, Hou-Xiang
2007-11-01
The traditional mandatory access control policy (MAC) is regarded as a policy with strict regulation and poor flexibility. The security policy of MAC is so compelling that few information systems would adopt it at the cost of facility, except some particular cases with high security requirement as military or government application. However, with the increasing requirement for flexibility, even some access control systems in military application have switched to role-based access control (RBAC) which is well known as flexible. Though RBAC can meet the demands for flexibility but it is weak in dynamic authorization and consequently can not fit well in the workflow management systems. The task-role-based access control (T-RBAC) is then introduced to solve the problem. It combines both the advantages of RBAC and task-based access control (TBAC) which uses task to manage permissions dynamically. To satisfy the requirement of system which is distributed, well defined with workflow process and critically for time accuracy, this paper will analyze the spirit of MAC, introduce it into the improved T&RBAC model which is based on T-RBAC. At last, a conceptual task-role-based access control model with high security for distributed workflow and real-time application (A_T&RBAC) is built, and its performance is simply analyzed.
Market turbulence creates financing opportunity.
Cooper, James H
2012-03-01
The flight to high-quality assets resulting from Standard & Poor's downgrade of the U.S. government's credit rating has dropped the yield on U.S. Treasury securities as investors have sought refuge amid uncertain market conditions. Consequently, hospitals can now obtain mortgage insurance from the U.S. government to finance expansions and refinance their debt with GNMA securities at taxable interest rates that are often more favorable than tax-exempt bond fixed rates. Because GNMA certificates can be sold in a forward purchase transaction that locks in a fixed interest rate while avoiding payment of interest until construction funds are disbursed, they can help avoid the effects of negative arbitrage.
2007-05-10
objective is achieved through consequence management and fixed-site decontamination operations. The effectiveness of CBRN consequence management...decontamination operations. The effectiveness of CBRN consequence management and fixed-site decontamination executed in the Joint Security Area can be...when faced with Chemical, Biological, Radiological, or Nuclear (CBRN) contaminated ports of debarkation. The effectiveness of CBRN consequence
Divergence in Siblings' Adult Attachment Security: Potential Contributors and Consequences
ERIC Educational Resources Information Center
Fortuna, Keren
2009-01-01
Previous research has revealed only modest concordance in attachment security between siblings during childhood and adolescence. The first goal of this dissertation was to estimate sibling concordance in adult attachment security and identify factors contributing to divergence. The Adult Attachment Interview (AAI) was administered to young adult…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-11
.... ML111940200), which approved the RBS Cyber Security Plan and associated implementation milestone schedule. The Cyber Security Plan Implementation Schedule contained in the licensee's letter dated April 4, 2011... consequences of an accident previously evaluated? Response: No. The proposed change to the Cyber Security Plan...
75 FR 60133 - Detroit Area Maritime Security Committee (AMSC); Vacancies
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-29
... (threats, vulnerabilities, and consequences); Determining mitigation strategies and implementation methods... consequences and vulnerabilities, how they may change over time, and what additional mitigation strategies can...
29 CFR 2570.5 - Consequences of default.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 9 2010-07-01 2010-07-01 false Consequences of default. 2570.5 Section 2570.5 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... ERISA Section 502(i) § 2570.5 Consequences of default. For prohibited transaction penalty proceedings...
Risk assessment for physical and cyber attacks on critical infrastructures.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.
2005-08-01
Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results ofmore » a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.« less
33 CFR 103.310 - Responsibilities of the Area Maritime Security (AMS) Committee.
Code of Federal Regulations, 2010 CFR
2010-07-01
... (threats, vulnerabilities, and consequences); (3) Determine mitigation strategies and implementation... consequences and vulnerabilities, how they may change over time, and what additional mitigation strategies can...
Impact of climate change on crop yield and role of model for achieving food security.
Kumar, Manoj
2016-08-01
In recent times, several studies around the globe indicate that climatic changes are likely to impact the food production and poses serious challenge to food security. In the face of climate change, agricultural systems need to adapt measures for not only increasing food supply catering to the growing population worldwide with changing dietary patterns but also to negate the negative environmental impacts on the earth. Crop simulation models are the primary tools available to assess the potential consequences of climate change on crop production and informative adaptive strategies in agriculture risk management. In consideration with the important issue, this is an attempt to provide a review on the relationship between climate change impacts and crop production. It also emphasizes the role of crop simulation models in achieving food security. Significant progress has been made in understanding the potential consequences of environment-related temperature and precipitation effect on agricultural production during the last half century. Increased CO2 fertilization has enhanced the potential impacts of climate change, but its feasibility is still in doubt and debates among researchers. To assess the potential consequences of climate change on agriculture, different crop simulation models have been developed, to provide informative strategies to avoid risks and understand the physical and biological processes. Furthermore, they can help in crop improvement programmes by identifying appropriate future crop management practises and recognizing the traits having the greatest impact on yield. Nonetheless, climate change assessment through model is subjected to a range of uncertainties. The prediction uncertainty can be reduced by using multimodel, incorporating crop modelling with plant physiology, biochemistry and gene-based modelling. For devloping new model, there is a need to generate and compile high-quality field data for model testing. Therefore, assessment of agricultural productivity to sustain food security for generations is essential to maintain a collective knowledge and resources for preventing negative impact as well as managing crop practises.
29 CFR 2570.64 - Consequences of default.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 9 2010-07-01 2010-07-01 false Consequences of default. 2570.64 Section 2570.64 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... ERISA Section 502(c)(2) § 2570.64 Consequences of default. For 502(c)(2) civil penalty proceedings, this...
29 CFR 2570.114 - Consequences of default.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 9 2010-07-01 2010-07-01 false Consequences of default. 2570.114 Section 2570.114 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... ERISA Section 502(c)(6) § 2570.114 Consequences of default. For 502(c)(6) civil penalty proceedings...
29 CFR 2570.134 - Consequences of default.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 9 2010-07-01 2010-07-01 false Consequences of default. 2570.134 Section 2570.134 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... ERISA Section 502(c)(7) § 2570.134 Consequences of default. For 502(c)(7) civil penalty proceedings...
29 CFR 2570.94 - Consequences of default.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 9 2010-07-01 2010-07-01 false Consequences of default. 2570.94 Section 2570.94 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... ERISA Section 502(c)(5) § 2570.94 Consequences of default. For 502(c)(5) civil penalty proceedings, this...
29 CFR 2570.164 - Consequences of default.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 9 2010-07-01 2010-07-01 false Consequences of default. 2570.164 Section 2570.164 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... ERISA Section 502(c)(8) § 2570.164 Consequences of default. For 502(c)(8) civil penalty proceedings...
49 CFR 15.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2013 CFR
2013-10-01
... SECURITY INFORMATION § 15.17 Consequences of unauthorized disclosure of SSI. Violation of this part is... actions for Federal employees. Corrective action may include issuance of an order requiring retrieval of...
49 CFR 1520.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2014 CFR
2014-10-01
... TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.17 Consequences of unauthorized disclosure of... issuance of an order requiring retrieval of SSI to remedy unauthorized disclosure or an order to cease...
49 CFR 1520.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2012 CFR
2012-10-01
... TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.17 Consequences of unauthorized disclosure of... issuance of an order requiring retrieval of SSI to remedy unauthorized disclosure or an order to cease...
49 CFR 15.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2014 CFR
2014-10-01
... SECURITY INFORMATION § 15.17 Consequences of unauthorized disclosure of SSI. Violation of this part is... actions for Federal employees. Corrective action may include issuance of an order requiring retrieval of...
49 CFR 15.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2012 CFR
2012-10-01
... SECURITY INFORMATION § 15.17 Consequences of unauthorized disclosure of SSI. Violation of this part is... actions for Federal employees. Corrective action may include issuance of an order requiring retrieval of...
49 CFR 1520.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2013 CFR
2013-10-01
... TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.17 Consequences of unauthorized disclosure of... issuance of an order requiring retrieval of SSI to remedy unauthorized disclosure or an order to cease...
49 CFR 15.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2011 CFR
2011-10-01
... SECURITY INFORMATION § 15.17 Consequences of unauthorized disclosure of SSI. Violation of this part is... actions for Federal employees. Corrective action may include issuance of an order requiring retrieval of...
49 CFR 15.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY INFORMATION § 15.17 Consequences of unauthorized disclosure of SSI. Violation of this part is... actions for Federal employees. Corrective action may include issuance of an order requiring retrieval of...
49 CFR 1520.17 - Consequences of unauthorized disclosure of SSI.
Code of Federal Regulations, 2011 CFR
2011-10-01
... TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.17 Consequences of unauthorized disclosure of... issuance of an order requiring retrieval of SSI to remedy unauthorized disclosure or an order to cease...
Markets, Climate Change and Food Security in West Africa
NASA Technical Reports Server (NTRS)
Brown, Molly E.; Hintermann, Beat; Higgins, Nathaniel
2009-01-01
West Africa is one of the most food insecure regions of the world. Sharply increased food and energy prices in 2008 brought the role of markets in food access and availability around the world into the spotlight, particularly in urban areas. The period of high prices had the immediate consequence of sharply increasing the number of hungry people in the region without boosting farmer incomes significantly. In this article, the interaction between markets, food prices, agricultural technology and development is explored in the context of West Africa. To improve food security in West Africa, sustained commitment to investment in the agriculture sector will be needed to provide some protection against global swings in both production and world markets. Climate change mitigation programs are likely to force global energy and commodity price increases in the coming decades, putting pressure on regions like West Africa to produce more food locally to ensure stability in food security for the most vulnerable.
Critical theory as an approach to the ethics of information security.
Stahl, Bernd Carsten; Doherty, Neil F; Shaw, Mark; Janicke, Helge
2014-09-01
Information security can be of high moral value. It can equally be used for immoral purposes and have undesirable consequences. In this paper we suggest that critical theory can facilitate a better understanding of possible ethical issues and can provide support when finding ways of addressing them. The paper argues that critical theory has intrinsic links to ethics and that it is possible to identify concepts frequently used in critical theory to pinpoint ethical concerns. Using the example of UK electronic medical records the paper demonstrates that a critical lens can highlight issues that traditional ethical theories tend to overlook. These are often linked to collective issues such as social and organisational structures, which philosophical ethics with its typical focus on the individual does not tend to emphasise. The paper suggests that this insight can help in developing ways of researching and innovating responsibly in the area of information security.
Authentication Without Secrets
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pierson, Lyndon G.; Robertson, Perry J.
This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integritymore » of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.« less
M. A. Hughes; J.A. Smith; R. C. Ploetz; P. E. Kendra; Albert (Bud) Mayfield; James Hanula; J. Hulcr; L.L. Stelinski; S. Cameron; J. J. Riggins; D. Carrillo; R. Rabaglia; J. Eickwort
2015-01-01
This recovery plan is one of several disease-specific documents produced as part of the National Plant Disease Recovery System (NPDRS) called for in Homeland Security Presidential Directive Number 9 (HSPD-9). The purpose of the NPDRS is to insure that the tools, infrastructure, communication networks, and capacity required to mitigate the impact of high-consequence...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Punnoose, Ratish J.; Armstrong, Robert C.; Wong, Matthew H.
Formal methods have come into wide use because of their effectiveness in verifying "safety and security" requirements of digital systems; a set of requirements for which testing is mostly ineffective. Formal methods are routinely used in the design and verification of high-consequence digital systems in industry. This report outlines our work in assessing the capabilities of commercial and open source formal tools and the ways in which they can be leveraged in digital design workflows.
On the Design of Forgiving Biometric Security Systems
NASA Astrophysics Data System (ADS)
Phan, Raphael C.-W.; Whitley, John N.; Parish, David J.
This work aims to highlight the fundamental issue surrounding biometric security systems: it’s all very nice until a biometric is forged, but what do we do after that? Granted, biometric systems are by physical nature supposedly much harder to forge than other factors of authentication since biometrics on a human body are by right unique to the particular human person. Yet it is also due to this physical nature that makes it much more catastrophic when a forgery does occur, because it implies that this uniqueness has been forged as well, threatening the human individuality; and since crime has by convention relied on identifying suspects by biometric characteristics, loss of this biometric uniqueness has devastating consequences on the freedom and basic human rights of the victimized individual. This uniqueness forgery implication also raises the motivation on the adversary to forge since a successful forgery leads to much more impersonation situations when biometric systems are used i.e. physical presence at crime scenes, identification and access to security systems and premises, access to financial accounts and hence the ability to use the victim’s finances. Depending on the gains, a desperate highly motivated adversary may even resort to directly obtaining the victim’s biometric parts by force e.g. severing the parts from the victim’s body; this poses a risk and threat not just to the individual’s uniqueness claim but also to personal safety and well being. One may then wonder if it is worth putting one’s assets, property and safety into the hands of biometrics based systems when the consequences of biometric forgery far outweigh the consequences of system compromises when no biometrics are used.
A wireless electronic monitoring system for securing milk from farm to processor
NASA Astrophysics Data System (ADS)
Womble, Phillip; Hopper, Lindsay; Thompson, Chris; Alexander, Suraj M.; Crist, William; Payne, Fred; Stombaugh, Tim; Paschal, Jon; Moore, Ryan; Luck, Brian; Tabayehnejab, Nasrin
2008-04-01
The Department of Homeland Security and the Department of Health and Human Services have targeted bulk food contamination as a focus for attention. The contamination of bulk food poses a high consequence threat to our society. Milk transport falls into three of the 17 targeted NIPP (National Infrastructure Protection Plan) sectors including agriculture-food, public health, and commercial facilities. Minimal security safeguards have been developed for bulk milk transport. The current manual methods of securing milk are paper intensive and prone to errors. The bulk milk transportation sector requires a security enhancement that will both reduce recording errors and enable normal transport activities to occur while providing security against unauthorized access. Milk transportation companies currently use voluntary seal programs that utilize plastic, numbered seals on milk transport tank openings. Our group has developed a Milk Transport Security System which is an electromechanical access control and communication system that assures the secure transport of milk, milk samples, milk data, and security data between locations and specifically between dairy farms, transfer stations, receiving stations, and milk plants. It includes a security monitoring system installed on the milk transport tank, a hand held device, optional printers, data server, and security evaluation software. The system operates automatically and requires minimal or no attention by the bulk milk hauler/sampler. The system is compatible with existing milk transport infrastructure, and has the support of the milk producers, milk transportation companies, milk marketing agencies, and dairy processors. The security protocol developed is applicable for transport of other bulk foods both nationally and internationally. This system adds significantly to the national security infrastructure for bulk food transport. We are currently demonstrating the system in central Kentucky and will report on the results of the demonstration.
The cyber security threat stops in the boardroom.
Scully, Tim
The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.
2014-09-01
Security (DHS). This research explores how the determination, and more importantly, the urgency of the nation’s leaders to show resiliency , has created...2002 represented the blueprint for a nation of resiliency that unified the government and its community citizenry while deploying measures of...nation of pride and resiliency but also the owner of a complex inwardly focused, national security organization. To examine the JGAs between EM and HS
NASA Astrophysics Data System (ADS)
Rodriguez Lopez, Fernando; Diez, Javier; Veiga, Efren
2015-04-01
In recent years has observed an increase in atmospheric and marine events on the coast of Galicia (Spain) which have caused economic losses and human lives; and also an alarm in the population. This work analyse the consequences in order temporal and geographical; and the possible causes and influences which can motivate the presence of these events and their consequences. This work also proposes a strategy to prevent such events and to limit their effects. The generating criteria proposed is a rating system of security, in such way that the society by itself generates the trends for improvement. Keywords: Security, Civil engineering, Marine constructions, Realibility, Insurance, Prevention forensic engineering
Identity Dilemmas: The Consequence of Identity in Protracted Conflict
2011-03-24
prescribe method, or promote thought, the contributions of Thucydides, Plato , Aristotle, Hobbes, Locke, Kant and others offer penetrating insight into...Lebow, A Cultural Theory, 180. 28 Ibid., 180. For an exceptional examination of ontological security-seeking behavior and how rational security
Network Access Control List Situation Awareness
ERIC Educational Resources Information Center
Reifers, Andrew
2010-01-01
Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…
Holographic optical security systems
NASA Astrophysics Data System (ADS)
Fagan, William F.
1990-06-01
One of the most successful applications of Holography,in recent years,has been its use as an optical security technique.Indeed the general public's awareness of holograms has been greatly enhanced by the incorporation of holographic elements into the VISA and MASTERCHARGE credit cards.Optical techniques related to Holography,are also being used to protect the currencies of several countries against the counterfeiter. The mass production of high quality holographic images is by no means a trivial task as a considerable degree of expertise is required together with an optical laboratory and embossing machinery.This paper will present an overview of the principal holographic and related optical techniques used for security purposes.Worldwide, over thirty companies are involved in the production of security elements utilising holographic and related optical technologies.Counterfeiting of many products is a major criminal activity with severe consequences not only for the manufacturer but for the public in general as defective automobile parts,aircraft components,and pharmaceutical products, to cite only a few of the more prominent examples,have at one time or another been illegally copied.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 4 2010-01-01 2010-01-01 false Consequences of a refusal to complete a CI evaluation including a polygraph examination. 709.14 Section 709.14 Energy DEPARTMENT OF ENERGY COUNTERINTELLIGENCE EVALUATION PROGRAM CI Evaluation Protocols and Protection of National Security § 709.14 Consequences of a...
Cyber Security Assessment Report: Adventium Labs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2007-12-31
Major control system components often have life spans of 15-20 years. Many systems in our Nation's critical infrastructure were installed before the Internet became a reality and security was a concern. Consequently, control systems are generally insecure. Security is now being included in the development of new control system devices; however, legacy control systems remain vulnerable. Most efforts to secure control systems are aimed at protecting network borers, but if an intruder gets inside the network these systems are vulnerable to a cyber attack.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Birch, Gabriel Carisle; Griffin, John Clark
2015-01-01
The horizontal television lines (HTVL) metric has been the primary quantity used by division 6000 related to camera resolution for high consequence security systems. This document shows HTVL measurements are fundamen- tally insufficient as a metric to determine camera resolution, and propose a quantitative, standards based methodology by measuring the camera system modulation transfer function (MTF), the most common and accepted metric of res- olution in the optical science community. Because HTVL calculations are easily misinterpreted or poorly defined, we present several scenarios in which HTVL is frequently reported, and discuss their problems. The MTF metric is discussed, and scenariosmore » are presented with calculations showing the application of such a metric.« less
Sovereign cat bonds and infrastructure project financing.
Croson, David; Richter, Andreas
2003-06-01
We examine the opportunities for using catastrophe-linked securities (or equivalent forms of nondebt contingent capital) to reduce the total costs of funding infrastructure projects in emerging economies. Our objective is to elaborate on methods to reduce the necessity for unanticipated (emergency) project funding immediately after a natural disaster. We also place the existing explanations of sovereign-level contingent capital into a catastrophic risk management framework. In doing so, we address the following questions. (1) Why might catastrophe-linked securities be useful to a sovereign nation, over and above their usefulness for insurers and reinsurers? (2) Why are such financial instruments ideally suited for protecting infrastructure projects in emerging economies, under third-party sponsorship, from low-probability, high-consequence events that occur as a result of natural disasters? (3) How can the willingness to pay of a sovereign government in an emerging economy (or its external project sponsor), who values timely completion of infrastructure projects, for such instruments be calculated? To supplement our treatment of these questions, we use a multilayer spreadsheet-based model (in Microsoft Excel format) to calculate the overall cost reductions possible through the judicious use of catastrophe-based financial tools. We also report on numerical comparative statics on the value of contingent-capital financing to avoid project disruption based on varying costs of capital, probability and consequences of disasters, the feasibility of strategies for mid-stage project abandonment, and the timing of capital commitments to the infrastructure investment. We use these results to identify high-priority applications of catastrophe-linked securities so that maximal protection can be realized if the total number of catastrophe instruments is initially limited. The article concludes with potential extensions to our model and opportunities for future research.
Ghaderi, S; Engeland, A; Moster, D; Ruud, E; Syse, A; Wesenberg, F; Bjørge, T
2013-04-16
As the number of cancer survivors increases, their health and welfare have come into focus. Thus, long-term medical consequences of cancer at a young age (<25 years), obtained from social security benefit records, were studied. Standardised incidence ratios (SIRs) of long-term medical consequences for 5-year cancer survivors, born during 1965-1985, were explored by linking population-based registries in Norway. Among the 5-year cancer survivors (4031 individuals), 29.7% received social security benefits. The survivors had an overall 4.4 times (95% confidence interval (95% CI): 4.1-4.6) higher risk of social security benefit uptake than the cancer-free population. Survivors of malignancies of bone and connective tissues (SIR: 10.8; 95% CI: 9.1-12.9), CNS tumours (SIR: 7.7; 95% CI: 6.9-8.6) and malignancies of the haematopoietic system (SIR: 6.1; 95% CI: 5.3-7.0) had the highest risks of social security benefits uptake. The most notified causes of social security benefit uptake were diseases of the nervous system, and injury and poisoning. The uptake of social security benefits among 5-year cancer survivors increased substantially and it may represent a solid outcome measure for the burden of the most severe late effects, especially in countries with comparable social welfare systems.
The Role of Cultural Understanding and Language Training in Unconventional Warfare
2004-12-01
National Security Strategy (NSS), while acknowledging the dangers posed by non-military actions which can affect economic, financial, social and...security by causing direct or indirect consequences on the country’s economic and social life” (Security Strategy, 1999, Chapter 4). Among Romania’s...we rely on our allies help to defend our national integrity” (Iliescu, 2004, Pro memoria ). As a direct result of the progress in achieving its
Sea Piracy in Southeast Asia: Implications for Countering Maritime Terrorism in the United States
2006-06-01
least ten agencies that have some involvement in maritime security management with nine authorized to conduct law enforcement operations at sea...exercises, cooperating on consequence management , and sustaining capacity building operations .173 The United States has important bilateral security...Overview and Evaluation,” Journal of Homeland Security and Emergency Management 2, no. 4 (2005). 221 Frittelli, “Terminal Operators ,” 2006, 3
Literature Review on Modeling Cyber Networks and Evaluating Cyber Risks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kelic, Andjelka; Campbell, Philip L
The National Infrastructure Simulations and Analysis Center (NISAC) conducted a literature review on modeling cyber networks and evaluating cyber risks. The literature review explores where modeling is used in the cyber regime and ways that consequence and risk are evaluated. The relevant literature clusters in three different spaces: network security, cyber-physical, and mission assurance. In all approaches, some form of modeling is utilized at varying levels of detail, while the ability to understand consequence varies, as do interpretations of risk. This document summarizes the different literature viewpoints and explores their applicability to securing enterprise networks.
The enhancement of security in healthcare information systems.
Liu, Chia-Hui; Chung, Yu-Fang; Chen, Tzer-Shyong; Wang, Sheng-De
2012-06-01
With the progress and the development of information technology, the internal data in medical organizations have become computerized and are further established the medical information system. Moreover, the use of the Internet enhances the information communication as well as affects the development of the medical information system that a lot of medical information is transmitted with the Internet. Since there is a network within another network, when all networks are connected together, they will form the "Internet". For this reason, the Internet is considered as a high-risk and public environment which is easily destroyed and invaded so that a relevant protection is acquired. Besides, the data in the medical network system are confidential that it is necessary to protect the personal privacy, such as electronic patient records, medical confidential information, and authorization-controlled data in the hospital. As a consequence, a medical network system is considered as a network requiring high security that excellent protections and managerial strategies are inevitable to prevent illegal events and external attacks from happening. This study proposes secure medical managerial strategies being applied to the network environment of the medical organization information system so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. The objectives could be achieved by preventing from illegal invasion or medical information being stolen, protecting the completeness and security of medical information, avoiding the managerial mistakes of the internal information system in medical organizations, and providing the highly-reliable medical information system.
Collaborative Workshop on Handling, Management, and ...
Report The Water Environment Research Foundation (WERF), in partnership with the U.S. Environmental Protection Agency (EPA) National Homeland Security Research Center (NHSRC) and the National Science Foundation (NSF), hosted an expert workshop on November 17 and 18, 2015, in Alexandria, Virginia, to engage with subject matter experts and wastewater utility stakeholders on a number of topics surrounding high consequence pathogens in wastewater collection and treatment systems, should such pathogens enter the systems as a result of an emergency situation.
Things That Go "Bump": in the Virtual Night.
ERIC Educational Resources Information Center
Fore, Julie A.
1997-01-01
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Based on the Chemical Safety Information, Site Security and Fuels Regulatory Relief Act (CSISSFRRA), this notice states that while you may share with the public data from OCA sections, it is illegal to disclose/distribute the sections themselves.
Relationship between stakeholders' information value perception and information security behaviour
NASA Astrophysics Data System (ADS)
Tajuddin, Sharul; Olphert, Wendy; Doherty, Neil
2015-02-01
The study, reported in this paper, aims to explore the relationship between the stakeholders' perceptions about the value of information and their resultant information security behaviours. Moreover, this study seeks to explore the role of national and organisational culture in facilitating information value assignment. Information Security is a concept that formed from the recognition that information is valuable and that there is a need to protect it. The ISO 27002 defines information as an asset, which, like other important business assets, is essential to an organisation's business and consequently needs to be appropriately protected. By definition, an asset has a value to the organisation hence it requires protection. Information protection is typically accomplished through the implementation of countermeasures against the threats and vulnerabilities of information security, for example, implementation of technological processes and mechanisms such as firewall and authorization and authentication systems, set-up of deterrence procedures such as password control and enforcement of organisational policy on information handling procedures. However, evidence routinely shows that despite such measures, information security breaches and incidents are on the rise. These breaches lead to loss of information, personal records, or other data, with consequent implications for the value of the information asset. A number of studies have suggested that such problems are not related primarily to technology problems or procedural deficiencies, but rather to stakeholders' poor compliance with the security measures that are in place. Research indicates that compliance behaviour is affected by many variables including perceived costs and benefits, national and organisational culture and norms. However, there has been little research to understand the concept of information value from the perspective of those who interact with the data, and the consequences for information security behaviours. This study seeks to address this gap in the research. Data will be presented from a pilot study consisting of interviews with 6 participants from public organisations in Brunei Darussalam which illustrate the nature of the value assignment process, together with an initial model of the relationship between perceived information value and information security behaviours.
Rising food costs & global food security: key issues & relevance for India.
Gustafson, Daniel J
2013-09-01
Rising food costs can have major impact on vulnerable households, pushing those least able to cope further into poverty and hunger. On the other hand, provided appropriate policies and infrastructure are in place, higher agricultural prices can also raise farmers' incomes and rural wages, improve rural economies and stimulate investment for longer-term economic growth. High food prices since 2007 have had both short-term impacts and long-term consequences, both good and bad. This article reviews the evidence of how rising costs have affected global food security since the food price crisis of 2007-2008, and their impact on different categories of households and countries. In light of recent studies, we know more about how households, and countries, cope or not with food price shocks but a number of contentious issues remain. These include the adequacy of current estimates and the interpretation of national and household food and nutrition security indicators. India is a particularly important country in this regard, given the high number of food insecure, the relative weight of India in global estimates of food and nutrition insecurity, and the puzzles that remain concerning the country's reported declining per capita calorie consumption. Competing explanations for what is behind it are not in agreement, but these all point to the importance of policy and programme innovation and greater investment necessary to reach the achievable goal of food and nutrition security for all.
Rising food costs & global food security: Key issues & relevance for India
Gustafson, Daniel J.
2013-01-01
Rising food costs can have major impact on vulnerable households, pushing those least able to cope further into poverty and hunger. On the other hand, provided appropriate policies and infrastructure are in place, higher agricultural prices can also raise farmers’ incomes and rural wages, improve rural economies and stimulate investment for longer-term economic growth. High food prices since 2007 have had both short-term impacts and long-term consequences, both good and bad. This article reviews the evidence of how rising costs have affected global food security since the food price crisis of 2007-2008, and their impact on different categories of households and countries. In light of recent studies, we know more about how households, and countries, cope or not with food price shocks but a number of contentious issues remain. These include the adequacy of current estimates and the interpretation of national and household food and nutrition security indicators. India is a particularly important country in this regard, given the high number of food insecure, the relative weight of India in global estimates of food and nutrition insecurity, and the puzzles that remain concerning the country's reported declining per capita calorie consumption. Competing explanations for what is behind it are not in agreement, but these all point to the importance of policy and programme innovation and greater investment necessary to reach the achievable goal of food and nutrition security for all. PMID:24135190
Kaiser, Michelle L; Cafer, Anne
2018-01-01
The United States is facing two interconnected social and public health crises of severe obesity and food insecurity within the social-ecological environment. Marginalized groups experience the highest rates and the greatest impacts in terms of morbidity, mortality, and financial burdens. Consequences include experiencing multimorbidities, mental health issues, and decreased quality of life. Food pantries have served as spaces to obtain food to meet household needs, but for some, food pantries have become long-term solutions. We surveyed 2,634 people who accessed pantries in 2005, 2010, and 2013 across 32 counties in a Midwest state. The authors sought to understand to what extent does length of time using a food pantry, food security status, income sources, use of federal food benefits, visiting a doctor, and demographic variables increase odds of severe obesity. More than 14% were severely obese; those who were long-term food pantry users and very low food secure were 1.732 times more likely to be severely obese. Receiving Disability/Supplemental Security Income, seeing a doctor in the last year, being female, and older age reduced the odds of severe obesity. Discussion includes implications for social workers who interact with groups likely to experience very low food security and severe obesity at different systems levels.
2007-12-01
Media Issues in Combating Terrorism • International Approaches • Ethics and Combating Terrorism • Restructuring the Security Sector for...Terrorism • Organized Crime and Terrorism • Civil-Military Cooperation and Terrorism • Ethics and Combating Terrorism • Border Control • Consequence...Simon. “Confl ict, Ecology and the Politics of Envrionmental Security.” Global Environmental Politics 2, No. 4 (November 2002): pp 25-130. 28
2006 Homeland Security Symposium and Exposition. Held in Arlington, VA on 29-31 March 2006
2006-03-31
Consequences , Vulnerabilities, and Threats) Prioritize Implement Protective Programs Measure Effectiveness 9March 2006 Major NIPP Theme: Sector Partnership... effect of exposure • Full understanding of the levels of exposure that mark the onset of miosis • Refined human operational exposure standard for GB...Untitled Document 2006 Homeland Security Symposium and Exposition.html[7/7/2016 11:38:26 AM] 2006 Homeland Security Symposium and Exposition
Ghaderi, S; Engeland, A; Moster, D; Ruud, E; Syse, A; Wesenberg, F; Bjørge, T
2013-01-01
Background: As the number of cancer survivors increases, their health and welfare have come into focus. Thus, long-term medical consequences of cancer at a young age (<25 years), obtained from social security benefit records, were studied. Methods: Standardised incidence ratios (SIRs) of long-term medical consequences for 5-year cancer survivors, born during 1965–1985, were explored by linking population-based registries in Norway. Results: Among the 5-year cancer survivors (4031 individuals), 29.7% received social security benefits. The survivors had an overall 4.4 times (95% confidence interval (95% CI): 4.1–4.6) higher risk of social security benefit uptake than the cancer-free population. Survivors of malignancies of bone and connective tissues (SIR: 10.8; 95% CI: 9.1–12.9), CNS tumours (SIR: 7.7; 95% CI: 6.9–8.6) and malignancies of the haematopoietic system (SIR: 6.1; 95% CI: 5.3–7.0) had the highest risks of social security benefits uptake. The most notified causes of social security benefit uptake were diseases of the nervous system, and injury and poisoning. Conclusion: The uptake of social security benefits among 5-year cancer survivors increased substantially and it may represent a solid outcome measure for the burden of the most severe late effects, especially in countries with comparable social welfare systems. PMID:23481179
POLICY VARIATION, LABOR SUPPLY ELASTICITIES, AND A STRUCTURAL MODEL OF RETIREMENT
MANOLI, DAY; MULLEN, KATHLEEN J.; WAGNER, MATHIS
2015-01-01
This paper exploits a combination of policy variation from multiple pension reforms in Austria and administrative data from the Austrian Social Security Database. Using the policy changes for identification, we estimate social security wealth and accrual elasticities in individuals’ retirement decisions. Next, we use these elasticities to estimate a dynamic programming model of retirement decisions. Finally, we use the estimated model to examine the labor supply and welfare consequences of potential social security reforms. PMID:26472916
2008-01-01
such organizational configurations are high so are the consequences for failure. From decades of research on teams and team or group problem solving...TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Office of Naval Research ,One Liberty Center,875 North Randolph...Naval Postgraduate School Ross Pigeau (CAN), Defence Research and Development Canada (DRDC) Mink Spaans (NED), TNO Defence, Security and Safety About
2003-03-01
1. The Kantian Perspective on Peace .....................................................7 2. A Neo- Kantian Perspective on Peace...10 a. The Empirical Evidence for a “Neo- Kantian Peace”............11 b. Potential Consequences of a Neo- Kantian Peace...
Dodo, Mahamat K
2014-01-01
Climate Change like many global problems nowadays is recognized as a threat to the international security and cooperation. In theoretical terms, it is being securitized and included in the traditional security studies. Climate change and its accompanying environmental degradation are perceived to be a threat that can have incalculable consequences on the international community. The consequences are said to have more effects in small island developing nations and Africa where many States are fragile and overwhelmed with mounting challenges. In recent years, the security implications of the climate change are being addressed from national, regional and multilateral level. Against this backdrop, this paper intends to contribute to the debate on climate change and international security and present a broader perspective on the discussion. The paper will draw from the EU-Africa partnership on climate change and is structured as follows: the first part introduces the background of the international climate change policy and its securitization, the second part covers the EU-Africa relations and EU-Africa partnership on climate change, and the third part discusses the Congo Basin Forest Partnership as a concrete example of EU-Africa Partnership on Climate Change. Lastly, the paper concludes by drawing some conclusions and offers some policy perspectives and recommendations. Q54; 055; 052; 01;
Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.
Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less
Tomographic quantum cryptography: equivalence of quantum and classical key distillation.
Bruss, Dagmar; Christandl, Matthias; Ekert, Artur; Englert, Berthold-Georg; Kaszlikowski, Dagomir; Macchiavello, Chiara
2003-08-29
The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. For an important class of protocols, which exploit tomographically complete measurements on entangled pairs of any dimension, we show that the noise threshold for classical advantage distillation is identical with the threshold for quantum entanglement distillation. As a consequence, the two distillation procedures are equivalent: neither offers a security advantage over the other.
Hospital security and patient elopement: protecting patients and your healthcare facility.
Smith, Thomas A
2012-01-01
Regulatory and financial consequences of adverse events associated with patient elopements are bringing new challenges to healthcare security to develop policies and procedures to prevent and respond to such incidents. This article provides an overview of the problem of elopement in healthcare and what it means to the security function; gives a working knowledge of healthcare related standards and guidelines aimed at reducing patient elopement; and reviews the elements of an elopement prevention and response plan for your organization.
Computer Assisted Exercise Environment for Terrorist Attack Consequence Management
2006-09-01
security and crisis management. Fig. 3. Third Generation SSR for Integrated Security Sector MoD MoI MoEM MoFA Special Services Integrated Security...Ministries: MoEM , MoI, MoD, MH, MoEW, MoE, MoAF National Media, NGOs, other agencies District EOC / LEMA MHS/IDS/WIS Field EOC MHS/IDS/WIS MHS IDS...SRA EDA DG Environment ... EU SR Fund MoD MoI MoE&S MoEM ... National USA Great Britain Netherlands Germany ... Bilateral BSEC Stab. Pact ... Regional
A rhythm-based authentication scheme for smart media devices.
Lee, Jae Dong; Jeong, Young-Sik; Park, Jong Hyuk
2014-01-01
In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience.
A Rhythm-Based Authentication Scheme for Smart Media Devices
Lee, Jae Dong; Park, Jong Hyuk
2014-01-01
In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience. PMID:25110743
DOE Office of Scientific and Technical Information (OSTI.GOV)
Taylor, Mark A.; Zak, Bernard Daniel; Backus, George A.
The Arctic region is rapidly changing in a way that will affect the rest of the world. Parts of Alaska, western Canada, and Siberia are currently warming at twice the global rate. This warming trend is accelerating permafrost deterioration, coastal erosion, snow and ice loss, and other changes that are a direct consequence of climate change. Climatologists have long understood that changes in the Arctic would be faster and more intense than elsewhere on the planet, but the degree and speed of the changes were underestimated compared to recent observations. Policy makers have not yet had time to examine themore » latest evidence or appreciate the nature of the consequences. Thus, the abruptness and severity of an unfolding Arctic climate crisis has not been incorporated into long-range planning. The purpose of this report is to briefly review the physical basis for global climate change and Arctic amplification, summarize the ongoing observations, discuss the potential consequences, explain the need for an objective risk assessment, develop scenarios for future change, review existing modeling capabilities and the need for better regional models, and finally to make recommendations for Sandia's future role in preparing our leaders to deal with impacts of Arctic climate change on national security. Accurate and credible regional-scale climate models are still several years in the future, and those models are essential for estimating climate impacts around the globe. This study demonstrates how a scenario-based method may be used to give insights into climate impacts on a regional scale and possible mitigation. Because of our experience in the Arctic and widespread recognition of the Arctic's importance in the Earth climate system we chose the Arctic as a test case for an assessment of climate impacts on national security. Sandia can make a swift and significant contribution by applying modeling and simulation tools with internal collaborations as well as with outside organizations. Because changes in the Arctic environment are happening so rapidly, a successful program will be one that can adapt very quickly to new information as it becomes available, and can provide decision makers with projections on the 1-5 year time scale over which the most disruptive, high-consequence changes are likely to occur. The greatest short-term impact would be to initiate exploratory simulations to discover new emergent and robust phenomena associated with one or more of the following changing systems: Arctic hydrological cycle, sea ice extent, ocean and atmospheric circulation, permafrost deterioration, carbon mobilization, Greenland ice sheet stability, and coastal erosion. Sandia can also contribute to new technology solutions for improved observations in the Arctic, which is currently a data-sparse region. Sensitivity analyses have the potential to identify thresholds which would enable the collaborative development of 'early warning' sensor systems to seek predicted phenomena that might be precursory to major, high-consequence changes. Much of this work will require improved regional climate models and advanced computing capabilities. Socio-economic modeling tools can help define human and national security consequences. Formal uncertainty quantification must be an integral part of any results that emerge from this work.« less
Mumtaz, Zubia; Shahid, Umber; Levay, Adrienne
2013-01-15
While infertility is a global challenge for millions of couples, low income countries have particularly high rates, of up to 30%. Infertility in these contexts is not limited to its clinical definition but is a socially constructed notion with varying definitions. In highly pronatalistic and patriarchal societies like Pakistan, women bear the brunt of the social, emotional and physical consequences of childlessness. While the often harsh consequences of childlessness for Pakistani women have been widely documented, there is a dearth of exploration into the ways in which prescribed gender roles inform the experiences of childlessness among Pakistani women and men. The aim of this study was to explore and compare how gender ideologies, values and expectations shape women's and men's experiences of infertility in Pakistan. Using an interpretive descriptive approach, in-depth interviews were conducted with 12 women and 8 men experiencing childlessness in Punjab, Pakistan from April to May 2008. Data analysis was thematic and inductive based on the principles of content analysis. The experience of infertility for men and women is largely determined by their prescribed gender roles. Childlessness weakened marital bonds with gendered consequences. For women, motherhood is not only a source of status and power, it is the only avenue for women to ensure their marital security. Weak marital ties did not affect men's social identity, security or power. Women also face harsher psychosocial, social, emotional and physical consequences of childlessness than men. They experienced abuse, exclusion and stigmatization at the couple, household and societal level, while men only experienced minor taunting from friends. Women unceasingly sought invasive infertility treatments, while most men assumed there was nothing wrong with themselves. This study highlights the ways in which gender roles and norms shape the experiences associated with involuntary childlessness for men and women in Punjab, Pakistan. The insight obtained into the range of experiences can potentially contribute to deeper understanding of the social construction of infertility and childlessness in pronatalistic and patriarchal societies as well as the ways in which gender ideologies operationalise to marginalise women.
2013-01-01
While infertility is a global challenge for millions of couples, low income countries have particularly high rates, of up to 30%. Infertility in these contexts is not limited to its clinical definition but is a socially constructed notion with varying definitions. In highly pronatalistic and patriarchal societies like Pakistan, women bear the brunt of the social, emotional and physical consequences of childlessness. While the often harsh consequences of childlessness for Pakistani women have been widely documented, there is a dearth of exploration into the ways in which prescribed gender roles inform the experiences of childlessness among Pakistani women and men. The aim of this study was to explore and compare how gender ideologies, values and expectations shape women’s and men’s experiences of infertility in Pakistan. Using an interpretive descriptive approach, in-depth interviews were conducted with 12 women and 8 men experiencing childlessness in Punjab, Pakistan from April to May 2008. Data analysis was thematic and inductive based on the principles of content analysis. The experience of infertility for men and women is largely determined by their prescribed gender roles. Childlessness weakened marital bonds with gendered consequences. For women, motherhood is not only a source of status and power, it is the only avenue for women to ensure their marital security. Weak marital ties did not affect men’s social identity, security or power. Women also face harsher psychosocial, social, emotional and physical consequences of childlessness than men. They experienced abuse, exclusion and stigmatization at the couple, household and societal level, while men only experienced minor taunting from friends. Women unceasingly sought invasive infertility treatments, while most men assumed there was nothing wrong with themselves. This study highlights the ways in which gender roles and norms shape the experiences associated with involuntary childlessness for men and women in Punjab, Pakistan. The insight obtained into the range of experiences can potentially contribute to deeper understanding of the social construction of infertility and childlessness in pronatalistic and patriarchal societies as well as the ways in which gender ideologies operationalise to marginalise women. PMID:23317173
2008-02-01
to the process to increase security may have economic consequences.7 Actions to improve security are undertaken with the knowledge that total ...inspections, and improve its facility compliance data. The Department of Homeland Security agreed with GAO’s recommendations. W r f e i o c r U p d w...A c U i s a c c g c r T p u w o a d c i T S To view the full product , including the scope and methodology, click on GAO-08-12. For more
Consequence Management: A Disconnect Between National Security Policy and Force Structure?
2001-03-15
effects or the consequences of a detonated and/or released weapon(s) has only recently been given much attention. Despite several warnings of the...with the exposure ? Second, the time required to establish and field a regional JTF would prevent the force from having a strong positive effect on the... outcome of the situation. One of the critical missions of a successful consequence management force is its ability to provide a strong deterrent
Social Security and the Retirement and Savings Behavior of Low Income Households1
van der Klaauw, Wilbert; Wolpin, Kenneth I.
2011-01-01
In this paper, we develop and estimate a model of retirement and savings incorporating limited borrowing, stochastic wage offers, health status and survival, social security benefits, Medicare and employer provided health insurance coverage, and intentional bequests. The model is estimated on sample of relatively poor households from the first three waves of the Health and Retirement Study (HRS), for whom we would expect social security income to be of particular importance. The estimated model is used to simulate the responses to changes in social security rules, including changes in benefit levels, in the payroll tax, in the social security earnings tax and in early and normal retirement ages. Welfare and budget consequences are estimated. PMID:21566719
Mackenzie, Geraldine; Carter, Hugh
2010-01-01
This chapter gives an educational overview of: * An awareness of the legal issues involved in health informatics * The need for the privacy and security of the patient record * The legal consequences of a breach of the security of the patient record * The concept of privacy law and what precautions ought to be taken to minimize legal liability for a breach of privacy and/or confidentiality.
Radiological Dispersal Devices: Select Issues in Consequence Management
2004-12-07
STATEMENT Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17...Surveying the Security Risks, Center for Nonproliferation Studies, Monterey Institute of International Studies, January 2003; Anthony H. Cordesman...the radiation-exposure-related damage itself. For example, the DOD uses granisetron , an anti-vomiting drug, to allow soldiers to complete mission
China’s Oil Security Pipe Dream: The Reality, and Strategic Consequences, of Seaborne Imports
2010-01-01
of Chi- na’s push for pipelines mirror the “Going Out” oil security strategy, in which the state oil companies cultivated fears of oil insecurity in...War College Review 61, no. 2 (Spring 2008), pp. 79–95. 71. See ibid. 72. For further analysis, see Vitaly Kozyrev , “China’s Continental Energy
Enduring Consequences of Right-Wing Extremism: Klan Mobilization and Homicides in Southern Counties
ERIC Educational Resources Information Center
McVeigh, Rory; Cunningham, David
2012-01-01
Research on the consequences of social movements typically aims to identify determinants of success or to draw attention to ways that social movements are able to secure new benefits for constituents by gaining concessions from political authorities. Yet social movements, even those that are ultimately defeated, may have an enduring impact on the…
Network systems security analysis
NASA Astrophysics Data System (ADS)
Yilmaz, Ä.°smail
2015-05-01
Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.
Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae
2012-01-01
A wireless medical sensor network (WMSN) can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs. PMID:22438729
Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae
2012-01-01
A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.
NASA Astrophysics Data System (ADS)
Burnett, M.
2010-12-01
One topic that is beginning to influence the systems that support these goals is that of Information Technology (IT) Security. Unsecure systems are vulnerable to increasing attacks and other negative consequences; sponsoring agencies are correspondingly responding with more refined policies and more stringent security requirements. These affect how EO systems can meet the goals of data and service interoperability and harmonization through open access, transformation and visualization services. Contemporary systems, including the vision of a system-of-systems (such as GEOSS, the Global Earth Observation System of Systems), utilize technologies that support a distributed, global, net-centric environment. These types of systems have a high reliance on the open systems, web services, shared infrastructure and data standards. The broader IT industry has developed and used these technologies in their business and mission critical systems for many years. Unfortunately, the IT industry, and their customers have learned the importance of protecting their assets and resources (computing and information) as they have been forced to respond to an ever increasing number and more complex illegitimate “attackers”. This presentation will offer an overview of work done by the CEOS WGISS organization in summarizing security threats, the challenges to responding to them and capturing the current state of the practice within the EO community.
Federal funding for health security in FY2015.
Boddie, Crystal; Sell, Tara Kirk; Watson, Matthew
2014-01-01
Previous articles in this series have provided funding information for federal civilian biodefense programs and programs focused on radiological and nuclear preparedness and consequence management. This year the authors have expanded the focus of the analysis to US federal funding for health security. This article provides proposed funding amounts for FY2015, estimated amounts for FY2014, and actual amounts for FY2010 through FY2013 in 5 domains critical to health security: biodefense programs, radiological and nuclear programs, chemical programs, pandemic influenza and emerging infectious disease programs, and multiple-hazard and preparedness programs.
FMDP reactor alternative summary report. Volume 1 - existing LWR alternative
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greene, S.R.; Bevard, B.B.
1996-10-07
Significant quantities of weapons-usable fissile materials [primarily plutonium and highly enriched uranium (HEU)] are becoming surplus to national defense needs in both the United States and Russia. These stocks of fissile materials pose significant dangers to national and international security. The dangers exist not only in the potential proliferation of nuclear weapons but also in the potential for environmental, safety, and health (ES&H) consequences if surplus fissile materials are not properly managed. This document summarizes the results of analysis concerned with existing light water reactor plutonium disposition alternatives.
Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO
Celesti, Antonio; Fazio, Maria; Villari, Massimo
2017-01-01
Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy. PMID:28178214
Enabling Secure XMPP Communications in Federated IoT Clouds Through XEP 0027 and SAML/SASL SSO.
Celesti, Antonio; Fazio, Maria; Villari, Massimo
2017-02-07
Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.
The vulnerable do-gooders: security strategies of German aid agencies.
Schneiker, Andrea
2013-04-01
Humanitarian and development agencies have confronted growing insecurity in some of the regions in which they work over the course of the past decade. Consequently, aid agencies are changing their approach to security issues. Compared to aid agencies from other countries, especially the United Kingdom and the United States, German aid agencies have been relatively slow to adopt security measures. In addition, the security measures they have selected differ from one agency to another, even in comparable security contexts. The literature on organisational learning helps to explain these differences. The findings show that external and internal organisational factors influence an aid agency's choice of a particular security measure. The different responses of German aid agencies to the changing security environment demonstrate that security measures are not only influenced by an organisation's identity but also can be a way for them to demonstrate their identity and thereby distinguish themselves from other actors that deliver aid. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.
Loafmann, B
2001-01-01
An analysis of how consequences impact your company from inside or outside will enable you to prevent the situations that can build up until they explode into violence. Specific skill enhancement on the use of feedback and consequences will broaden the base of involvement and foster early intervention opportunities before things get out of control. Understanding how consequences influence behavior also can improve self-management efforts. When these strategies are coupled with security hardware and appropriate policies, we can once again help our managers and employees work without fear of violence.
Ecosystem and Food Security in a Changing Climate
NASA Astrophysics Data System (ADS)
Field, C. B.
2011-12-01
Observed and projected impacts of climate change for ecosystem and food security tend to appear as changes in the risk of both desirable and undesirable outcomes. As a consequence, it is useful to frame the challenge of adaptation to a changing climate as a problem in risk management. For some kinds of impacts, the risks are relatively well characterized. For others, they are poorly known. Especially for the cases where the risks are poorly known, effective adaptation will need to consider approaches that build dynamic portfolios of options, based on learning from experience. Effective adaptation approaches also need to consider the risks of threshold-type responses, where opportunities for gradual adaptation based on learning may be limited. Finally, effective adaptation should build on the understanding that negative impacts on ecosystems and food security often result from extreme events, where a link to climate change may be unclear now and far into the future. Ecosystem and food security impacts that potentially require adaptation to a changing climate vary from region to region and interact strongly with actions not related to climate. In many ecosystems, climate change shifts the risk profile to increase risks of wildfire and biological invasions. Higher order risks from factors like pests and pathogens remain difficult to quantify. For food security, observational evidence highlights threshold-like behavior to high temperature in yields of a number of crops. But the risks to food security may be much broader, encompassing risks to availability of irrigation, degradation of topsoil, and challenges of storage and distribution. A risk management approach facilitates consideration of all these challenges with a unified framework.
Extending the Thin Blue Line: Constabulary Police Development in Phase Zero Operations
2015-05-16
procure intelligence and support from local nationals. This participatory community approach to policing promotes a lasting sense of security and safety...conflict by posturing the Germans to establish law and order and internal and border security.92 The participatory police partnership also resulted in...host nation police forces supported the expansion of democracy and promoted safe overseas economic transactions. Consequently, government officials
Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits
NASA Astrophysics Data System (ADS)
Bußmeyer, Daniel; Gröbert, Felix; Schwenk, Jörg; Wegener, Christoph
Due to recent attacks on online banking systems and consequent soaring losses through fraud, different methods have been developed to ensure a secure connection between a bank and its customers. One method is the inclusion of smart card readers into these schemes, which come along with different benefits, e.g., convenience and costs, and endangerments, especially on the security side.
Self-locking threaded fasteners
Glovan, Ronald J.; Tierney, John C.; McLean, Leroy L.; Johnson, Lawrence L.
1996-01-01
A threaded fastener with a shape memory alloy (SMA) coatings on its threads is disclosed. The fastener has special usefulness in high temperature applications where high reliability is important. The SMA coated fastener is threaded into or onto a mating threaded part at room temperature to produce a fastened object. The SMA coating is distorted during the assembly. At elevated temperatures the coating tries to recover its original shape and thereby exerts locking forces on the threads. When the fastened object is returned to room temperature the locking forces dissipate. Consequently the threaded fasteners can be readily disassembled at room temperature but remains securely fastened at high temperatures. A spray technique is disclosed as a particularly useful method of coating of threads of a fastener with a shape memory alloy.
Method for secure electronic voting system: face recognition based approach
NASA Astrophysics Data System (ADS)
Alim, M. Affan; Baig, Misbah M.; Mehboob, Shahzain; Naseem, Imran
2017-06-01
In this paper, we propose a framework for low cost secure electronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.
Invisible Security Printing on Photoresist Polymer Readable by Terahertz Spectroscopy.
Shin, Hee Jun; Lim, Min-Cheol; Park, Kisang; Kim, Sae-Hyung; Choi, Sung-Wook; Ok, Gyeongsik
2017-12-06
We experimentally modulate the refractive index and the absorption coefficient of an SU-8 dry film in the terahertz region by UV light (362 nm) exposure with time dependency. Consequently, the refractive index of SU-8 film is increased by approximately 6% after UV light exposure. Moreover, the absorption coefficient also changes significantly. Using the reflective terahertz imaging technique, in addition, we can read security information printed by UV treatment on an SU-8 film that is transparent in the visible spectrum. From these results, we successfully demonstrate security printing and reading by using photoresist materials and the terahertz technique. This investigation would provide a new insight into anti-counterfeiting applications in fields that need security.
Climate Change, Human Rights, and Social Justice.
Levy, Barry S; Patz, Jonathan A
2015-01-01
The environmental and health consequences of climate change, which disproportionately affect low-income countries and poor people in high-income countries, profoundly affect human rights and social justice. Environmental consequences include increased temperature, excess precipitation in some areas and droughts in others, extreme weather events, and increased sea level. These consequences adversely affect agricultural production, access to safe water, and worker productivity, and, by inundating land or making land uninhabitable and uncultivatable, will force many people to become environmental refugees. Adverse health effects caused by climate change include heat-related disorders, vector-borne diseases, foodborne and waterborne diseases, respiratory and allergic disorders, malnutrition, collective violence, and mental health problems. These environmental and health consequences threaten civil and political rights and economic, social, and cultural rights, including rights to life, access to safe food and water, health, security, shelter, and culture. On a national or local level, those people who are most vulnerable to the adverse environmental and health consequences of climate change include poor people, members of minority groups, women, children, older people, people with chronic diseases and disabilities, those residing in areas with a high prevalence of climate-related diseases, and workers exposed to extreme heat or increased weather variability. On a global level, there is much inequity, with low-income countries, which produce the least greenhouse gases (GHGs), being more adversely affected by climate change than high-income countries, which produce substantially higher amounts of GHGs yet are less immediately affected. In addition, low-income countries have far less capability to adapt to climate change than high-income countries. Adaptation and mitigation measures to address climate change needed to protect human society must also be planned to protect human rights, promote social justice, and avoid creating new problems or exacerbating existing problems for vulnerable populations. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.
Safe teleradiology: information assurance as project planning methodology.
Collmann, Jeff; Alaoui, Adil; Nguyen, Dan; Lindisch, David
2005-01-01
The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's critical assets, described threats to the assurance of those assets, developed and ran vulnerability scans of a system pilot, evaluated the consequences of security breaches, and developed a risk management plan to mitigate threats to program assets, thereby implementing good information assurance practices. This case study illustrates the basic point that prospective, comprehensive planning to protect the privacy and security of an information system strategically benefits program management as well as system security.
75 FR 71721 - Pittsburgh Area Maritime Security Committee; Vacancies
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-24
...: Identifying critical port infrastructure and operations; Identifying risks (threats, vulnerabilities, and... considering consequences and vulnerabilities, how they may change over time, and what additional mitigation...
Hydrocomplexity: Addressing water security and emergent environmental risks
NASA Astrophysics Data System (ADS)
Kumar, Praveen
2015-07-01
Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.
Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods
Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman
2017-01-01
Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users’ security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users’ behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals’ awareness of the consequences of security threats. By comparing participants’ behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users’ security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones. PMID:28297719
Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods.
Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman
2017-01-01
Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users' security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users' behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals' awareness of the consequences of security threats. By comparing participants' behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users' security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones.
75 FR 24961 - Pittsburgh Area Maritime Security Committee; Vacancies
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-06
... critical port infrastructure and operations; Identifying risks (threats, vulnerabilities, and consequences... and vulnerabilities, how they may change over time, and what additional mitigation strategies can be...
Krahmann, Elke
2017-12-01
Discussions about the legitimacy of private security companies (PSCs) in multilateral military interventions abound. This article looks at how the United States has sought to legitimize the outsourcing of security services to PSCs through performance-based contracting and performance assessments. Both mechanisms aim to demonstrate the effective provision of publicly desirable outcomes. However, the immaterial and socially constructed nature of security presents major problems for performance assessments in terms of observable and measurable outcomes. Performance has therefore given way to performativity - that is, the repetitive enactment of particular forms of behaviour and capabilities that are simply equated with security as an outcome. The implications of this development for the ways in which security has been conceptualized, implemented and experienced within US interventions have been profound. Ironically, the concern with performance has not encouraged PSCs to pay increased attention to their impacts on security environments and civilian populations, but has fostered a preoccupation with activities and measurable capabilities that can be easily assessed by government auditors.
Perceptions of randomized security schedules.
Scurich, Nicholas; John, Richard S
2014-04-01
Security of infrastructure is a major concern. Traditional security schedules are unable to provide omnipresent coverage; consequently, adversaries can exploit predictable vulnerabilities to their advantage. Randomized security schedules, which randomly deploy security measures, overcome these limitations, but public perceptions of such schedules have not been examined. In this experiment, participants were asked to make a choice between attending a venue that employed a traditional (i.e., search everyone) or a random (i.e., a probability of being searched) security schedule. The absolute probability of detecting contraband was manipulated (i.e., 1/10, 1/4, 1/2) but equivalent between the two schedule types. In general, participants were indifferent to either security schedule, regardless of the probability of detection. The randomized schedule was deemed more convenient, but the traditional schedule was considered fairer and safer. There were no differences between traditional and random schedule in terms of perceived effectiveness or deterrence. Policy implications for the implementation and utilization of randomized schedules are discussed. © 2013 Society for Risk Analysis.
Krahmann, Elke
2017-01-01
Discussions about the legitimacy of private security companies (PSCs) in multilateral military interventions abound. This article looks at how the United States has sought to legitimize the outsourcing of security services to PSCs through performance-based contracting and performance assessments. Both mechanisms aim to demonstrate the effective provision of publicly desirable outcomes. However, the immaterial and socially constructed nature of security presents major problems for performance assessments in terms of observable and measurable outcomes. Performance has therefore given way to performativity – that is, the repetitive enactment of particular forms of behaviour and capabilities that are simply equated with security as an outcome. The implications of this development for the ways in which security has been conceptualized, implemented and experienced within US interventions have been profound. Ironically, the concern with performance has not encouraged PSCs to pay increased attention to their impacts on security environments and civilian populations, but has fostered a preoccupation with activities and measurable capabilities that can be easily assessed by government auditors. PMID:29276346
Rideout, Karen; Seed, Barbara; Ostry, Aleck
2006-01-01
Food security is emerging as an increasingly important public health issue. The purpose of this paper is to describe a conceptual model and five classes of food security indicators for regional health authorities (RHAs): direct, indirect, consequence, process, and supra-regional. The model was developed after a review of the food security literature and interviews with British Columbia community nutritionists and public health officials. We offer this conceptual model as a practical tool to help RHAs develop a comprehensive framework and use specific indicators, in conjunction with public health nutritionists and other community stakeholders. We recommend using all five classes of indicator together to ensure a complete assessment of the full breadth of food security. This model will be useful for Canadian health authorities wishing to take a holistic community-based approach to public health nutrition to develop more effective policies and programs to maximize food security. The model and indicators offer a rational process that could be useful for collaborative multi-stakeholder initiatives to improve food security.
Littoral Combat Ship Manpower, an Overview of Officer Characteristics and Placement
2013-03-01
15. NUMBER OF PAGES 103 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS PAGE...maritime force: 1.) Networks should be the central organizing principle of the fleet, and its sensing and fighting power should be distributed across...assured access” force; and 4.) Numbers of hulls count (quantity had its own quality) and consequently the fleet’s combat power should be
An Alliance Built Upon Necessity: AQIM, Boko Haram, and the African Arch of Instability
2013-06-01
of globalization and connectivity along with the advent of free trade, instant communication , internet usage, social media, and mass transportation...kidnappings, and mass suicide bombing attacks, Nigerian government security forces consequently use disproportionate large-scale security sweeps in those...Management and Budget, Paperwork Reduction Project (0704-0188) Washington DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT DATE June 2013 3
Housing preferences of young adults in Indonesia: housing attributes and consequences
NASA Astrophysics Data System (ADS)
Farasa, N.; Kusuma, H. E.
2018-03-01
Nowadays, the housing demand of young adults in Indonesia is important issues for the sustainable development of the market. Facing differences of life phases, such as marriage, leaving home after graduation, and new job positioning, young adults become the main segment facing constant housing choice decisions in the housing market. In their particular phase of life, young adults have distinct preferences for housing attributes which bring a great influence on their lives in the future. Data was gathered from a survey questionnaire that was answered by 180 young adults in Indonesia, ranging from age 22-33 years. The findings suggest that the green area and view, location, simplicity, home design, and accessibility are the significant parts as housing attributes for young adults’ housing preferences in Indonesia. The effect of these attributes has many consequences such as security, personalization, mood/ambiance, maintenance, interaction, image, flexibility, environmental, economy, durability, convenience, comfort, and circulation. The biggest group of young adults who prefer comfort as their wanted consequences tend to have high preferences on housing attributes of the green area and view, and simplicity.
Federal Funding for Health Security in FY2015
Sell, Tara Kirk; Watson, Matthew
2014-01-01
Previous articles in this series have provided funding information for federal civilian biodefense programs and programs focused on radiological and nuclear preparedness and consequence management. This year the authors have expanded the focus of the analysis to US federal funding for health security. This article provides proposed funding amounts for FY2015, estimated amounts for FY2014, and actual amounts for FY2010 through FY2013 in 5 domains critical to health security: biodefense programs, radiological and nuclear programs, chemical programs, pandemic influenza and emerging infectious disease programs, and multiple-hazard and preparedness programs. PMID:24988432
Isenhardt, Anna; Hostettler, Ueli
2016-12-01
Violence in the workplace has serious consequences for employees and organizations. Based on a survey in early 2012 among employees from all work areas of 89 of the total 112 correctional facilities in Switzerland resulting in a sample of 2,045 employees (response rate 48.5%), this study (a) analyzed whether victimization has an impact on correctional staff burnout, (b) tested the hypothetical mediating role of sense of security in the relationship between victimization and burnout, and (c) included gender and job characteristics because work experiences and exposure to violence of staff differ strongly with gender and work tasks. Two different forms of violence were considered: (a) experienced violence (inmates-on-staff) and (b) observed violence (inmate-on-inmate). Analysis was carried out using structural equation modeling. Results show that victimization and witnessing violence between inmates negatively affect the personal sense of security and increase correctional staff burnout. In addition, the sense of security mediated the effect from experienced and observed violence on burnout. Gender and job characteristics also proved to be important. This is especially true for staff working as correctional officers and for employees working with young inmates and with inmates awaiting trial who reported a greater exposure to violence and a lower sense of security. The study adds to the knowledge on violence and its outcomes in corrections and contributes to the literature on the consequences of workplace violence in general and, specifically, in social service occupations.
Critical asset and portfolio risk analysis: an all-hazards framework.
Ayyub, Bilal M; McGill, William L; Kaminskiy, Mark
2007-08-01
This article develops a quantitative all-hazards framework for critical asset and portfolio risk analysis (CAPRA) that considers both natural and human-caused hazards. Following a discussion on the nature of security threats, the need for actionable risk assessments, and the distinction between asset and portfolio-level analysis, a general formula for all-hazards risk analysis is obtained that resembles the traditional model based on the notional product of consequence, vulnerability, and threat, though with clear meanings assigned to each parameter. Furthermore, a simple portfolio consequence model is presented that yields first-order estimates of interdependency effects following a successful attack on an asset. Moreover, depending on the needs of the decisions being made and available analytical resources, values for the parameters in this model can be obtained at a high level or through detailed systems analysis. Several illustrative examples of the CAPRA methodology are provided.
NASA Astrophysics Data System (ADS)
Malekian, Atefe; Hayati, Dariush; Aarts, Noelle
2017-01-01
Conceptions of agricultural water security are conditioned by larger understandings of being and reality. It is still unclear what such understandings mean for perspectives on water security in general and on causes and solutions related to perceived water security risks and problems in agricultural sector in particular. Based on a systematic literature review, three conceptualizations of water security, related to different paradigms, are presented. Also the consequences of such conceptualizations for determining research objectives, research activities, and research outcomes on agricultural water security are discussed. The results showed that agricultural water security from a positivist paradigm referred to tangible and measurable water-related hazards and threats, such as floods and droughts, pollution, and so forth. A constructivist approach to agricultural water security, constituted by a process of interaction and negotiation, pointed at perceptions of water security of farmers and other stakeholders involved in agricultural sector. A critical approach to agricultural water security focused on the processes of securing vulnerable farmers and others from wider political, social, and natural impediments to sufficient water supplies. The conclusions of the study suggest that paradigms, underlying approaches should be expressed, clarified, and related to one another in order to find optimal and complementary ways to study water security issues in agricultural sector.
Game theoretic analysis of physical protection system design
DOE Office of Scientific and Technical Information (OSTI.GOV)
Canion, B.; Schneider, E.; Bickel, E.
The physical protection system (PPS) of a fictional small modular reactor (SMR) facility have been modeled as a platform for a game theoretic approach to security decision analysis. To demonstrate the game theoretic approach, a rational adversary with complete knowledge of the facility has been modeled attempting a sabotage attack. The adversary adjusts his decisions in response to investments made by the defender to enhance the security measures. This can lead to a conservative physical protection system design. Since defender upgrades were limited by a budget, cost benefit analysis may be conducted upon security upgrades. One approach to cost benefitmore » analysis is the efficient frontier, which depicts the reduction in expected consequence per incremental increase in the security budget.« less
An automated approach for tone mapping operator parameter adjustment in security applications
NASA Astrophysics Data System (ADS)
Krasula, LukáÅ.¡; Narwaria, Manish; Le Callet, Patrick
2014-05-01
High Dynamic Range (HDR) imaging has been gaining popularity in recent years. Different from the traditional low dynamic range (LDR), HDR content tends to be visually more appealing and realistic as it can represent the dynamic range of the visual stimuli present in the real world. As a result, more scene details can be faithfully reproduced. As a direct consequence, the visual quality tends to improve. HDR can be also directly exploited for new applications such as video surveillance and other security tasks. Since more scene details are available in HDR, it can help in identifying/tracking visual information which otherwise might be difficult with typical LDR content due to factors such as lack/excess of illumination, extreme contrast in the scene, etc. On the other hand, with HDR, there might be issues related to increased privacy intrusion. To display the HDR content on the regular screen, tone-mapping operators (TMO) are used. In this paper, we present the universal method for TMO parameters tuning, in order to maintain as many details as possible, which is desirable in security applications. The method's performance is verified on several TMOs by comparing the outcomes from tone-mapping with default and optimized parameters. The results suggest that the proposed approach preserves more information which could be of advantage for security surveillance but, on the other hand, makes us consider possible increase in privacy intrusion.
Older Women Doing Home Care: Exploitation or Ideal Job?
Butler, Sandra S.
2013-01-01
The increased need for both personal assistance workers and meaningful employment opportunities for older workers results in growing numbers of older home care aides. This study examined lifetime financial security and perceived advantages of older age in this field through interviews with 31 older home care aides. Study participants experienced high levels of financial insecurity and perceived older workers as particularly well suited to the home care job. The consequences of this low-wage, low-status work are explored along with implications for social workers to advocate for improved conditions for these workers providing essential care to frail elders. PMID:23600600
The Arab Spring and health: two years on.
Coutts, Adam; Stuckler, David; Batniji, Rajaie; Ismail, Sharif; Maziak, Wasim; McKee, Martin
2013-01-01
The "Arab Spring" has touched almost all countries in the Middle East and North Africa. While most attention has focused on security and political developments, there are significant consequences for population health. These include immediate problems, such as violent deaths and injuries, population displacement, and damage to essential infrastructure, but also longer term vulnerabilities not yet addressed by the political changes, including high unemployment, the low status of women, erosion of already weak welfare systems, and rising food prices. It will be important to tackle these underlying issues while not repeating the mistakes made in other countries that have undergone rapid political transition.
Nuclear Security: Target Analysis-rev
DOE Office of Scientific and Technical Information (OSTI.GOV)
Singh, Surinder Paul; Gibbs, Philip W.; Bultz, Garl A.
2014-03-01
The objectives of this presentation are to understand target identification, including roll-up and protracted theft; evaluate target identification in the SNRI; recognize the target characteristics and consequence levels; and understand graded safeguards.
Self-locking threaded fasteners
Glovan, R.J.; Tierney, J.C.; McLean, L.L.; Johnson, L.L.
1996-01-16
A threaded fastener with a shape memory alloy (SMA) coatings on its threads is disclosed. The fastener has special usefulness in high temperature applications where high reliability is important. The SMA coated fastener is threaded into or onto a mating threaded part at room temperature to produce a fastened object. The SMA coating is distorted during the assembly. At elevated temperatures the coating tries to recover its original shape and thereby exerts locking forces on the threads. When the fastened object is returned to room temperature the locking forces dissipate. Consequently the threaded fasteners can be readily disassembled at room temperature but remains securely fastened at high temperatures. A spray technique is disclosed as a particularly useful method of coating of threads of a fastener with a shape memory alloy. 13 figs.
Change We Can Fight Over: The Relationship between Arable Land Supply and Substate Conflict
2010-01-01
environmental impact of global warming has spurred a parallel discussion among national security academics and policymakers about the security...consequences of climate change. Roughly speaking, there are two camps in this discussion -one that ominously predicts the potential for global warming to spark...future climate change, but the stark reality is that global warming is already upon us. Thus, policymakers need to know -both now and in the coming
2013-06-01
Executive Branch report on research , development, and acquisition (RDA) programs to Combat Weapons of Mass Destruction (WMD). Other interagency committees...characterize, secure, disable , and/or destroy a state or non-state actor’s WMD programs and related capabilities in hostile or uncertain environments. Threat...special operations, and security operations to defend against conventionally and unconventionally delivered WMD. WMD Consequence Management. Actions
McFarlane, Elizabeth; Burrell, Lori; Crowne, Sarah; Cluxton-Keller, Fallon; Fuddy, Loretta; Leaf, Philip J; Duggan, Anne
2013-02-01
There is variability in home visiting program impacts on the outcomes achieved by high risk families. An understanding of how effects vary among families is important for refining service targeting and content. The current study assessed whether and how maternal attributes, including relationship security, moderate short- and long-term home visiting impacts on maternal psychosocial functioning. In this multisite RCT of home visiting in a population-based, ethnically-diverse sample of families at risk for maltreatment of their newborns (n = 643), families were randomly assigned to home visited (HV) and control groups. HV families were to receive intensive services by trained paraprofessionals from birth-3 years. Outcome data were collected when children were 1, 2, and 3 years old and 7, 8, and 9 years old. Overall, short- and long-term outcomes for HV and control mothers did not differ significantly. Demographic attributes, a general measure of overall maternal risk, and partner violence did not moderate program impact on psychosocial functioning outcomes. Maternal relationship security did moderate program impact. Mothers who scored high on relationship anxiety but not on relationship avoidance showed the greatest benefits, particularly at the long-term follow-up. Mothers scoring high for both relationship anxiety and avoidance experienced some adverse consequences of home visiting. Further research is needed to determine mediating pathways and to inform and test ways to improve the targeting of home visiting and the tailoring of home visit service models to extend positive home visiting impacts to targeted families not benefiting from current models.
A mapping of information security in health Information Systems in Latin America and Brazil.
Pereira, Samáris Ramiro; Fernandes, João Carlos Lopes; Labrada, Luis; Bandiera-Paiva, Paulo
2013-01-01
In health, Information Systems are patient records, hospital administration or other, have advantages such as cost, availability and integration. However, for these benefits to be fully met, it is necessary to guarantee the security of information maintained and provided by the systems. The lack of security can lead to serious consequences such as lawsuits and induction to medical errors. The management of information security is complex and is used in various fields of knowledge. Often, it is left in the background for not being the ultimate goal of a computer system, causing huge financial losses to corporations. This paper by systematic review methodologies, presented a mapping in the literature, in order to identify the most relevant aspects that are addressed by security researchers of health information, as to the development of computerized systems. They conclude through the results, some important aspects, for which the managers of computerized health systems should remain alert.
Security of electronic mental health communication and record-keeping in the digital age.
Elhai, Jon D; Frueh, B Christopher
2016-02-01
The mental health field has seen a trend in recent years of the increased use of information technology, including mobile phones, tablets, and laptop computers, to facilitate clinical treatment delivery to individual patients and for record keeping. However, little attention has been paid to ensuring that electronic communication with patients is private and secure. This is despite potentially deleterious consequences of a data breach, which are reported in the news media very frequently in modern times. In this article, we present typical security concerns associated with using technology in clinical services or research. We also discuss enhancing the privacy and security of electronic communication with clinical patients and research participants. We offer practical, easy-to-use software application solutions for clinicians and researchers to secure patient communication and records. We discuss such issues as using encrypted wireless networks, secure e-mail, encrypted messaging and videoconferencing, privacy on social networks, and others. © Copyright 2015 Physicians Postgraduate Press, Inc.
Introduction: Cybersecurity and Software Assurance Minitrack
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burns, Luanne; George, Richard; Linger, Richard C
Modern society is dependent on software systems of remarkable scope and complexity. Yet methods for assuring their security and functionality have not kept pace. The result is persistent compromises and failures despite best efforts. Cybersecurity methods must work together for situational awareness, attack prevention and detection, threat attribution, minimization of consequences, and attack recovery. Because defective software cannot be secure, assurance technologies must play a central role in cybersecurity approaches. There is increasing recognition of the need for rigorous methods for cybersecurity and software assurance. The goal of this minitrack is to develop science foundations, technologies, and practices that canmore » improve the security and dependability of complex systems.« less
Analyzing Predictors of Bullying Victimization With Routine Activity and Social Bond Perspectives.
Cecen-Celik, Hatice; Keith, Shelley
2016-10-01
Bullying victimization in school settings is a serious problem in many countries including the United States. It has been associated with serious incidents of school violence as well as detrimental physical, psychological, emotional, and social consequences for its victims. Given its consequences, it is crucial to understand who is more likely to be targeted for bullying victimization. This study examines whether a number of important factors such as gender, physical and interactionist school security measures, and involvement in extracurricular activities influence an individual's risk of bullying victimization from social bond and routine activity perspectives. The study employs the 2011 School Crime Supplement of the National Crime Victimization Survey to investigate the causes of bullying victimization. The results show that gender, interactionist school security measures, and extracurricular activities affect an individual's likelihood of bullying victimization.
Space-Derived Transparency: Players, Policies, Implications, and Synergies
NASA Astrophysics Data System (ADS)
Kinnan, C. J.
2001-06-01
Space-derived transparency will become a common means of monitoring, preventing, and mitigating crises, verifying compliance with treaties and law, and enabling confidence and security building measures. Democratization and globalization, the proliferation of information technologies, the availability of commercial space high-resolution imagery, and the growing influence of NGOs invite this question: What is (space-derived) transparency and what effect does it have on US security policy? Three camps have emerged in the debate -Horaeists who seek to build a transnational society through complete transparency; Preservationists, mostly military, who fear the threat to national security, want to deny most space-derived information to non-traditional/non-state actors; and Synergists who seek to capitalize on the best of both camps. There is evidence suggesting that space-derived transparency is an inevitable trend and will resist even the best means of preservationist control. Space-derived transparency may change the dynamic of the security environment by introducing new players into the policy fomentation and implementation process. These players, if not properly schooled in imagery analysis or the potential effects of their use of misinterpreted space-derived imagery, could force policy makers to make fast, ill-considered decisions in order to respond to incidents. In some cases this fast response will defuse potential crises and in other situations these rushed decisions might result in policies without considering the potential consequences, which could turn incidents into crises. Space-derived transparency is a step forward into the future for each camp . . . the challenge for the United States lies in forging synergies in an increasingly transparent world while maintaining the balance between openness and security.
Peak Oil, Food Systems, and Public Health
Parker, Cindy L.; Kirschenmann, Frederick L.; Tinch, Jennifer; Lawrence, Robert S.
2011-01-01
Peak oil is the phenomenon whereby global oil supplies will peak, then decline, with extraction growing increasingly costly. Today's globalized industrial food system depends on oil for fueling farm machinery, producing pesticides, and transporting goods. Biofuels production links oil prices to food prices. We examined food system vulnerability to rising oil prices and the public health consequences. In the short term, high food prices harm food security and equity. Over time, high prices will force the entire food system to adapt. Strong preparation and advance investment may mitigate the extent of dislocation and hunger. Certain social and policy changes could smooth adaptation; public health has an essential role in promoting a proactive, smart, and equitable transition that increases resilience and enables adequate food for all. PMID:21778492
Deconstructing Afghanistan: How Does America’s Past Inform Afghanistan’s Future?
2015-01-01
Security Assistance In 1865 and 2002 the US government sought a minimalist role for its mili- tary, but in each case, military responsibilities...October 2012. Consequently, the ANSF assumed security responsibilities for 87 percent of the Afghan population by the start of 2013, though the...cluded a paltry $9 million in cash, provided by the UN start -up fund.2 The physical destruction and psychological exhaustion of war proved far more
The Proliferation Security Initiative as a New Paradigm for Peace and Security
2006-04-01
sense of the term, in the UN system... That is to say, there 31 exists no corporate organ formally empowered to enact laws directly binding on...as entirely legitimate. If the PSI is to succeed, it means rethinking certain elemental components of the international legal regime. It means...consequence, there is a real need for some nongovernmental organization, philanthropy or pro bono practice to help the poor countries report on their efforts
2007-11-01
Climate skeptics The climate change-conflict nexus has its fair share of skeptics. Many observers remain unconvinced that climate change, whether due...implications of climate change remain specula- tive. In addition, they observe that none of the consequences forecast in the authoritative reports of the...modern practices and relocate to the few remaining habitable regions at the extreme north- ern and southern hemispheres.33 Essam El Hinnawi first
Code of Federal Regulations, 2011 CFR
2011-10-01
... subsystem, system, or vessel to determine the least critical consequence. (b) All automatic control, remote control, safety control, and alarm systems must be failsafe. ..., DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING VITAL SYSTEM AUTOMATION Reliability and Safety...
Nuclear Terrorism: The Possibilities, Probable Consequences, and Preventive Strategies.
ERIC Educational Resources Information Center
Totten, Michael
1986-01-01
This article explores the possibility of terrorist acts against nuclear power stations. It includes information on reactor security, public policy, and alternative courses of action deemed to increase public safety and cost efficiency. (JDH)
Code of Federal Regulations, 2012 CFR
2012-01-01
... the record when the respondent receives the biometrics notice and instructions and the consequences... any biometric and other information necessary, DHS shall prepare such documents in keeping with...
Code of Federal Regulations, 2013 CFR
2013-01-01
... the record when the respondent receives the biometrics notice and instructions and the consequences... any biometric and other information necessary, DHS shall prepare such documents in keeping with...
Code of Federal Regulations, 2011 CFR
2011-01-01
... the record when the respondent receives the biometrics notice and instructions and the consequences... any biometric and other information necessary, DHS shall prepare such documents in keeping with...
Code of Federal Regulations, 2014 CFR
2014-01-01
... the record when the respondent receives the biometrics notice and instructions and the consequences... any biometric and other information necessary, DHS shall prepare such documents in keeping with...
Communicating Uncertainty about Climate Change for Application to Security Risk Management
NASA Astrophysics Data System (ADS)
Gulledge, J. M.
2011-12-01
The science of climate change has convincingly demonstrated that human activities, including the release of greenhouse gases, land-surface changes, particle emissions, and redistribution of water, are changing global and regional climates. Consequently, key institutions are now concerned about the potential social impacts of climate change. For example, the 2010 Quadrennial Defense Review Report from the U.S. Department of Defense states that "climate change, energy security, and economic stability are inextricably linked." Meanwhile, insured losses from climate and weather-related natural disasters have risen dramatically over the past thirty years. Although these losses stem largely from socioeconomic trends, insurers are concerned that climate change could exacerbate this trend and render certain types of climate risk non-diversifiable. Meanwhile, the climate science community-broadly defined as physical, biological, and social scientists focused on some aspect of climate change-remains largely focused scholarly activities that are valued in the academy but not especially useful to decision makers. On the other hand, climate scientists who engage in policy discussions have generally permitted vested interests who support or oppose climate policies to frame the discussion of climate science within the policy arena. Such discussions focus on whether scientific uncertainties are sufficiently resolved to justify policy and the vested interests overstate or understate key uncertainties to support their own agendas. Consequently, the scientific community has become absorbed defending scientific findings to the near exclusion of developing novel tools to aid in risk-based decision-making. For example, the Intergovernmental Panel on Climate Change (IPCC), established expressly for the purpose of informing governments, has largely been engaged in attempts to reduce unavoidable uncertainties rather than helping the world's governments define a science-based risk-management framework for climate security. The IPCC's Fourth Assessment Report concluded that "Responding to climate change involves an iterative risk management process that includes both adaptation and mitigation and takes into account climate change damages, co-benefits, sustainability, equity and attitudes to risk." In risk management, key uncertainties guide action aimed at reducing risk and cannot be ignored or used to justify inaction. Security policies such as arms control and counter-terrorism demonstrate that high-impact outcomes matter to decision makers even if they are likely to be rare events. In spite of this fact, the long tail on the probability distribution of climate sensitivity was largely ignored by the climate science community until recently and its implications for decision making are still not receiving adequate attention. Informing risk management requires scientists to shift from a singular aversion to type I statistical error (i.e. false positive) to a balanced presentation of both type I error and type II error (i.e. false negative) when the latter may have serious consequences. Examples from national security, extreme weather, and economics illustrate these concepts.
Development of a security vulnerability assessment process for the RAMCAP chemical sector.
Moore, David A; Fuller, Brad; Hazzan, Michael; Jones, J William
2007-04-11
The Department of Homeland Security (DHS), Directorate of Information Analysis & Infrastructure Protection (IAIP), Protective Services Division (PSD), contracted the American Society of Mechanical Engineers Innovative Technologies Institute, LLC (ASME ITI, LLC) to develop guidance on Risk Analysis and Management for Critical Asset Protection (RAMCAP). AcuTech Consulting Group (AcuTech) has been contracted by ASME ITI, LLC, to provide assistance by facilitating the development of sector-specific guidance on vulnerability analysis and management for critical asset protection for the chemical manufacturing, petroleum refining, and liquefied natural gas (LNG) sectors. This activity involves two key tasks for these three sectors: Development of a screening to supplement DHS understanding of the assets that are important to protect against terrorist attack and to prioritize the activities. Development of a standard security vulnerability analysis (SVA) framework for the analysis of consequences, vulnerabilities, and threats. This project involves the cooperative effort of numerous leading industrial companies, industry trade associations, professional societies, and security and safety consultants representative of those sectors. Since RAMCAP is a voluntary program for ongoing risk management for homeland security, sector coordinating councils are being asked to assist in communicating the goals of the program and in encouraging participation. The RAMCAP project will have a profound and positive impact on all sectors as it is fully developed, rolled-out and implemented. It will help define the facilities and operations of national and regional interest for the threat of terrorism, define standardized methods for analyzing consequences, vulnerabilities, and threats, and describe best security practices of the industry. This paper will describe the results of the security vulnerability analysis process that was developed and field tested for the chemical manufacturing sector. This method was developed through the cooperation of the many organizations and the individuals involved from the chemical sector RAMCAP development activities. The RAMCAP SVA method is intended to provide a common basis for making vulnerability assessments and risk-based decisions for homeland security. Mr. Moore serves as the coordinator for the chemical manufacturing, petroleum refining, and LNG sectors for the RAMCAP project and Dr. Jones is the chief technology officer for ASME-ITI, LLC for RAMCAP.
2016-04-24
the Cybersecurity in the United States – Brief Overview 13 2.1. Data Breaches in the United States 14 2.2. Security and...Capacity to Defend 15 2.2.1. Cybersecurity Capabilities in the United States 18 2.3. Internationalization of Cybersecurity ...The Department of Homeland Security (DHS) Org Chart 43 2.2.1.2 National Cybersecurity and Communications Integration Center (NCCIC) Org
Continuous-variable quantum cryptography is secure against non-Gaussian attacks.
Grosshans, Frédéric; Cerf, Nicolas J
2004-01-30
A general study of arbitrary finite-size coherent attacks against continuous-variable quantum cryptographic schemes is presented. It is shown that, if the size of the blocks that can be coherently attacked by an eavesdropper is fixed and much smaller than the key size, then the optimal attack for a given signal-to-noise ratio in the transmission line is an individual Gaussian attack. Consequently, non-Gaussian coherent attacks do not need to be considered in the security analysis of such quantum cryptosystems.
2015-04-01
of the state. Such threats may come into existence when 9 the organizing principles of two states contradict each other in a context where the...security is that the normal condition of actors in a market econ - omy is one of risk, competition, and uncertainty.12 In other words, the actors in the...liberal principles , federative states have no natural unifying principle and, consequently, are more vulnerable to dismemberment, separatism, and
In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security
NASA Astrophysics Data System (ADS)
Danidou, Yianna; Schafer, Burkhard
This paper analyses potential legal responses and consequences to the anticipated roll out of Trusted Computing (TC). It is argued that TC constitutes such a dramatic shift in power away from users to the software providers, that it is necessary for the legal system to respond. A possible response is to mirror the shift in power by a shift in legal responsibility, creating new legal liabilities and duties for software companies as the new guardians of internet security.
2015-03-24
5b. GRANT NUMBER: 5c. PROGRAM ELEMENT NUMBER: 6. AUTHOR(S): Jonathan Shedler, Eric L. Lang 5d. PROJECT NUMBER: 5e. TASK NUMBER: 5f...national security interests and represents an example of the law of unintended consequences. Inclusion of the question likely serves to undermine...certain positions. For example , a person who suffers from epilepsy and experiences uncontrolled seizures is not suited to be a pilot. He or she may
American Policy in the Persian Gulf Region: Peace, Security, and the Spread of Democracy
2008-05-01
Iran has the resource welfare to delay a regime collapse almost Fox 20 indefinitely. That being said, it the United States wants long- tenn security in...near and the far tenn as it continues to shape and mold its policies in the Gulf region. The region’s geographic, ideological, and economic significance...means that decisions and actions taken today by America’s leaders will have major consequences around the globe for decades to come. In the near tenn
Meet EPA Engineer Shawn Ryan, Ph.D.
Shawn Ryan, Ph.D. is a chemical engineer at EPA's National Homeland Security Research Center. He has worked at EPA for 12 years, nine of which have been devoted to leading research to support decontamination and consequence management.
Andrijcic, Eva; Horowitz, Barry
2006-08-01
The article is based on the premise that, from a macro-economic viewpoint, cyber attacks with long-lasting effects are the most economically significant, and as a result require more attention than attacks with short-lasting effects that have historically been more represented in literature. In particular, the article deals with evaluation of cyber security risks related to one type of attack with long-lasting effects, namely, theft of intellectual property (IP) by foreign perpetrators. An International Consequence Analysis Framework is presented to determine (1) the potential macro-economic consequences of cyber attacks that result in stolen IP from companies in the United States, and (2) the likely sources of such attacks. The framework presented focuses on IP theft that enables foreign companies to make economic gains that would have otherwise benefited the U.S. economy. Initial results are presented.
Efficient entanglement distribution over 200 kilometers.
Dynes, J F; Takesue, H; Yuan, Z L; Sharpe, A W; Harada, K; Honjo, T; Kamada, H; Tadanaga, O; Nishida, Y; Asobe, M; Shields, A J
2009-07-06
Here we report the first demonstration of entanglement distribution over a record distance of 200 km which is of sufficient fidelity to realize secure communication. In contrast to previous entanglement distribution schemes, we use detection elements based on practical avalanche photodiodes (APDs) operating in a self-differencing mode. These APDs are low-cost, compact and easy to operate requiring only electrical cooling to achieve high single photon detection efficiency. The self-differencing APDs in combination with a reliable parametric down-conversion source demonstrate that entanglement distribution over ultra-long distances has become both possible and practical. Consequently the outlook is extremely promising for real world entanglement-based communication between distantly separated parties.
HIV/AIDS Securitization: Outcomes and Current Challenges.
Shadyab, Aladdin H; Hale, Braden R; Shaffer, Richard A
2017-01-01
The securitization (i.e., framing of a health issue as a security threat) of HIV/AIDS by the United Nations Security Council in 2000 changed the belief that HIV/AIDS is only a health issue. Although now accepted that HIV/AIDS represents a security threat, the consequences of securitization are still not widely established. The purpose of this paper was to present an evidence-based review of the outcomes and current challenges associated with HIV/AIDS securitization in the context of national security. We provided an overview of HIV/AIDS securitization, followed by a discussion of the impact of securitization on peacekeeping personnel and uniformed services. We also reviewed the United States Government's response to securitization and potential risks and benefits of securitization. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.
2005-02-04
Consequences 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7...OSLGCP). The OSLGCP now administers the grants programs. 37 According to the guidance, threat assessment determines the relative likelihood of a...Preparedness (OSLGCP) administers two grant programs that give states the opportunity to identify critical infrastructure assets: the State Homeland Security
Will Climate Change the Future of Homeland Security
2016-09-01
coming decades.”6 The global consequences of this finding “could produce drastic effects , such as the collapse of ice sheets, a rapid rise in sea...events that “occur over time and slowly deteriorate a society’s and a population’s capacity to withstand the effects of the hazard or threat.”9 The...legislation, strategies, policies, and practice in disaster consequence management becomes evident. This cause and effect model is primarily based on fast
Experiences of restrictiveness in forensic psychiatric care: Systematic review and concept analysis.
Tomlin, Jack; Bartlett, Peter; Völlm, Birgit
Mentally disordered offenders may be sent to secure psychiatric hospitals. These settings can resemble carceral spaces, employing high levels of security restricting resident autonomy, expression and social interaction. However, research exploring the restrictiveness of forensic settings is sparse. A systematic review was therefore undertaken to conceptualize this restrictiveness. Eight databases were searched for papers that address restrictive elements of secure forensic care in a non-cursory way. Fifty sources (empirical articles and policy documents) were included and subject to thematic analysis to identify 1) antecedent conditions to, 2) characteristic attributes, 3) consequences and 4) 'deviant' cases of the developing concept. The restrictiveness of forensic care was experienced across three levels: individual, institutional and systemic. Restrictiveness was subjective and included such disparate elements as limited leave and grounds access, ownership of personal belongings and staff attitudes. The manner and extent to which these are experienced as restrictive was influenced by two antecedent conditions; whether the purpose of forensic care was to be more caring or custodial and the extent to which residents were perceived to be risky. We argue that there must be a reflexivity from stakeholders between the level of restrictiveness needed to safely provide care in a therapeutic milieu and enable the maximum amount of resident autonomy. Copyright © 2018 Elsevier Ltd. All rights reserved.
Porous TiO₂-Based Gas Sensors for Cyber Chemical Systems to Provide Security and Medical Diagnosis.
Galstyan, Vardan
2017-12-19
Gas sensors play an important role in our life, providing control and security of technical processes, environment, transportation and healthcare. Consequently, the development of high performance gas sensor devices is the subject of intense research. TiO₂, with its excellent physical and chemical properties, is a very attractive material for the fabrication of chemical sensors. Meanwhile, the emerging technologies are focused on the fabrication of more flexible and smart systems for precise monitoring and diagnosis in real-time. The proposed cyber chemical systems in this paper are based on the integration of cyber elements with the chemical sensor devices. These systems may have a crucial effect on the environmental and industrial safety, control of carriage of dangerous goods and medicine. This review highlights the recent developments on fabrication of porous TiO₂-based chemical gas sensors for their application in cyber chemical system showing the convenience and feasibility of such a model to provide the security and to perform the diagnostics. The most of reports have demonstrated that the fabrication of doped, mixed and composite structures based on porous TiO₂ may drastically improve its sensing performance. In addition, each component has its unique effect on the sensing properties of material.
Porous TiO2-Based Gas Sensors for Cyber Chemical Systems to Provide Security and Medical Diagnosis
2017-01-01
Gas sensors play an important role in our life, providing control and security of technical processes, environment, transportation and healthcare. Consequently, the development of high performance gas sensor devices is the subject of intense research. TiO2, with its excellent physical and chemical properties, is a very attractive material for the fabrication of chemical sensors. Meanwhile, the emerging technologies are focused on the fabrication of more flexible and smart systems for precise monitoring and diagnosis in real-time. The proposed cyber chemical systems in this paper are based on the integration of cyber elements with the chemical sensor devices. These systems may have a crucial effect on the environmental and industrial safety, control of carriage of dangerous goods and medicine. This review highlights the recent developments on fabrication of porous TiO2-based chemical gas sensors for their application in cyber chemical system showing the convenience and feasibility of such a model to provide the security and to perform the diagnostics. The most of reports have demonstrated that the fabrication of doped, mixed and composite structures based on porous TiO2 may drastically improve its sensing performance. In addition, each component has its unique effect on the sensing properties of material. PMID:29257076
Public Health in Serbia through the Lens of Security: A Review Article
ROKVIĆ, Vanja; JEFTIĆ, Zoran; AJZENHAMER, Vladimir
2016-01-01
Background: In recent years, the concept of health security has received an international dimension. However, despite evident links between health and security the concept of health security is not used in either academic or political discourse in Serbia. It comes as no surprise then that even though the issue of security challenges is present in Serbian legislation, it has not been incorporated into the National Security Strategy, by which health threats would be recognized as one of contemporary security priorities. Methods: The method applied is descriptive and analytical, in keeping with social studies research methodology and the aims of this study. Results: The 20th and the 21st century in Serbia have both been marked by events indicating a clear link between health and security. The most telling example of this connection is the events of the 1990s, namely civil wars, sanctions and the NATO bombing. The results of our research show that poor health conditions, an increasing number of reemerging diseases and pandemics of new diseases can have serious implications for the functioning of the state and devastating consequences for its population. What is most at risk are people’s lives, capability for work, the entire economy and the capacities of the army and overall national security. Conclusion: The results of this study indicate an inextricable link between health and security and the necessity of viewing health through the lens of health security and incorporating it as such into the National Security Strategy. PMID:27957458
Public Health in Serbia through the Lens of Security: A Review Article.
Rokvić, Vanja; Jeftić, Zoran; Ajzenhamer, Vladimir
2016-09-01
In recent years, the concept of health security has received an international dimension. However, despite evident links between health and security the concept of health security is not used in either academic or political discourse in Serbia. It comes as no surprise then that even though the issue of security challenges is present in Serbian legislation, it has not been incorporated into the National Security Strategy, by which health threats would be recognized as one of contemporary security priorities. The method applied is descriptive and analytical, in keeping with social studies research methodology and the aims of this study. The 20 th and the 21 st century in Serbia have both been marked by events indicating a clear link between health and security. The most telling example of this connection is the events of the 1990s, namely civil wars, sanctions and the NATO bombing. The results of our research show that poor health conditions, an increasing number of reemerging diseases and pandemics of new diseases can have serious implications for the functioning of the state and devastating consequences for its population. What is most at risk are people's lives, capability for work, the entire economy and the capacities of the army and overall national security. The results of this study indicate an inextricable link between health and security and the necessity of viewing health through the lens of health security and incorporating it as such into the National Security Strategy.
Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo
2006-01-01
The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglectedmore » or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .« less
Biomedical devices and systems security.
Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup
2011-01-01
Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.
Bernat, Debra H; Lenk, Kathleen M; Nelson, Toben F; Winters, Ken C; Toomey, Traci L
2014-08-01
Campus police and security personnel are often the first to respond to alcohol-related incidents on campus. The purpose of this study is to examine how campus law enforcement and security respond to alcohol-related incidents, and how consequences and communication differ based on characteristics of the incident. Directors of campus police/security from 343 colleges across the United States completed a survey regarding usual practice following serious, underage, and less serious alcohol incidents on and off campus. Campus law enforcement and security most commonly reported contacting campus officials. A minority reported issuing citations and referring students to the health center. Enforcement actions were more commonly reported for serious and underage incidents than for less serious incidents. Large (vs. small) colleges, public (vs. private) colleges, and those located in small (vs. large) towns more consistently reported taking actions against drinkers. Understanding how campus police and security respond to alcohol-related incidents is essential for reducing alcohol-related problems on college campuses. Copyright © 2014 by the Research Society on Alcoholism.
SecureMA: protecting participant privacy in genetic association meta-analysis.
Xie, Wei; Kantarcioglu, Murat; Bush, William S; Crawford, Dana; Denny, Joshua C; Heatherly, Raymond; Malin, Bradley A
2014-12-01
Sharing genomic data is crucial to support scientific investigation such as genome-wide association studies. However, recent investigations suggest the privacy of the individual participants in these studies can be compromised, leading to serious concerns and consequences, such as overly restricted access to data. We introduce a novel cryptographic strategy to securely perform meta-analysis for genetic association studies in large consortia. Our methodology is useful for supporting joint studies among disparate data sites, where privacy or confidentiality is of concern. We validate our method using three multisite association studies. Our research shows that genetic associations can be analyzed efficiently and accurately across substudy sites, without leaking information on individual participants and site-level association summaries. Our software for secure meta-analysis of genetic association studies, SecureMA, is publicly available at http://github.com/XieConnect/SecureMA. Our customized secure computation framework is also publicly available at http://github.com/XieConnect/CircuitService. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
Securing Mitigation as Injunctive Relief in Certain Civil Enforcement Settlements (2nd edition)
To ensure that EPA's environmental enforcement efforts not only correct and deter illegal conduct but maximize the redress of its consequences, this memorandum is intended to strongly encourage case teams to seek mitigation.
Food supply depends on seagrass meadows in the coral triangle
NASA Astrophysics Data System (ADS)
Unsworth, Richard K. F.; Hinder, Stephanie L.; Bodger, Owen G.; Cullen-Unsworth, Leanne C.
2014-09-01
The tropical seascape provides food and livelihoods to hundreds of millions of people, but the support of key habitats to this supply remains ill appreciated. For fisheries and conservation management actions to help promote resilient ecosystems, sustainable livelihoods, and food supply, knowledge is required about the habitats that help support fisheries productivity and the consequences of this for food security. This paper provides an interdisciplinary case study from the coral triangle of how seagrass meadows provide support for fisheries and local food security. We apply a triangulated approach that utilizes ecological, fisheries and market data combined with over 250 household interviews. Our research demonstrates that seagrass associated fauna in a coral triangle marine protected area support local food supply contributing at least 50% of the fish based food. This formed between 54% and 99% of daily protein intake in the area. Fishery catch was found to significantly vary with respect to village (p < 0.01) with habitat configuration a probable driver. Juvenile fish comprised 26% of the fishery catch and gear type significantly influenced this proportion (<0.05). Limited sustainability of fishery practices (high juvenile catch and a 51% decline in CPUE for the biggest fishery) and poor habitat management mean the security of this food supply has the potential to be undermined in the long-term. Findings of this study have implications for the management and assessment of fisheries throughout the tropical seascape. Our study provides an exemplar for why natural resource management should move beyond biodiversity and consider how conservation and local food security are interlinked processes that are not mutually exclusive. Seagrass meadows are under sustained threat worldwide, this study provides evidence of the need to conserve these not just to protect biodiversity but to protect food security.
McAllister, Ryan R J; McNeill, Desmond; Gordon, Iain J
2009-01-01
Vicuña provide an excellent case study for examining the sustainable use of wildlife outside protected areas: the community-based conservation approach. Vicuña populations in the high Andes of Argentina, Bolivia, Chile, Ecuador and Perú fell to a critically low level, but a Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) ban on trade in their fiber has seen numbers recover dramatically, and now live shearing of vicuña for a high-value international market is being promoted as a mechanism to secure both sustainable vicuña populations and local livelihoods. We used a dynamic optimization model to explore the consequences of legalizing markets, including the consequences for poaching which is critical in vicuña dynamics. Using parameters obtained from the literature and expert knowledge, we explored different scenarios for the Argentine region of Cieneguillas. Our results showed that the role of the international market is ambiguous; live shearing for an international market can provide the very best of outcomes for both vicuña and local people, with large herds generating high revenues. But an international market also creates a market for poached vicuña fiber; as a result, vicuña numbers risk once again falling to critically low levels, resulting also in minimal revenues from sale of fiber. The message for the international community is that if community-based conservation is not implemented carefully then its impact can easily be perverse.
Chemical facility vulnerability assessment project.
Jaeger, Calvin D
2003-11-14
Sandia National Laboratories, under the direction of the Office of Science and Technology, National Institute of Justice, conducted the chemical facility vulnerability assessment (CFVA) project. The primary objective of this project was to develop, test and validate a vulnerability assessment methodology (VAM) for determining the security of chemical facilities against terrorist or criminal attacks (VAM-CF). The project also included a report to the Department of Justice for Congress that in addition to describing the VAM-CF also addressed general observations related to security practices, threats and risks at chemical facilities and chemical transport. In the development of the VAM-CF Sandia leveraged the experience gained from the use and development of VAs in other areas and the input from the chemical industry and Federal agencies. The VAM-CF is a systematic, risk-based approach where risk is a function of the severity of consequences of an undesired event, the attack potential, and the likelihood of adversary success in causing the undesired event. For the purpose of the VAM-CF analyses Risk is a function of S, L(A), and L(AS), where S is the severity of consequence of an event, L(A) is the attack potential and L(AS) likelihood of adversary success in causing a catastrophic event. The VAM-CF consists of 13 basic steps. It involves an initial screening step, which helps to identify and prioritize facilities for further analysis. This step is similar to the prioritization approach developed by the American Chemistry Council (ACC). Other steps help to determine the components of the risk equation and ultimately the risk. The VAM-CF process involves identifying the hazardous chemicals and processes at a chemical facility. It helps chemical facilities to focus their attention on the most critical areas. The VAM-CF is not a quantitative analysis but, rather, compares relative security risks. If the risks are deemed too high, recommendations are developed for measures to reduce the risk. This paper will briefly discuss the CFVA project and VAM-CF process.
Status of VESAS: a fully-electronic microwave imaging radiometer system
NASA Astrophysics Data System (ADS)
Schreiber, Eric; Peichl, Markus; Suess, Helmut
2010-04-01
Present applications of microwave remote sensing systems cover a large variety. One utilisation of the frequency range from 1 - 300 GHz is the domain of security and reconnaissance. Examples are the observation of critical infrastructures or the performance of security checks on people in order to detect concealed weapons or explosives, both being frequent threats in our world of growing international terrorism. The imaging capability of concealed objects is one of the main advantages of microwave remote sensing, because of the penetration performance of electromagnetic waves through dielectric materials in this frequency domain. The main physical effects used in passive microwave sensing rely on the naturally generated thermal radiation and the physical properties of matter, the latter being surface characteristics, chemical and physical composition, and the temperature of the material. As a consequence it is possible to discriminate objects having different material characteristics like ceramic weapons or plastic explosives with respect to the human body. Considering the use of microwave imaging with respect to people scanning systems in airports, railway stations, or stadiums, it is advantageous that passively operating devices generate no exposure on the scanned objects like actively operating devices do. For frequently used security gateways it is additionally important to have a high through-put rate in order to minimize the queue time. Consequently fast imaging systems are necessary. In this regard the conceptual idea of a fully-electronic microwave imaging radiometer system is introduced. The two-dimensional scanning mechanism is divided into a frequency scan in one direction and the method of aperture synthesis in the other. The overall goal here is to design a low-cost, fully-electronic imaging system with a frame rate of around one second at Ka band. This frequency domain around a center frequency of 37 GHz offers a well-balanced compromise between the achievable spatial resolution for a given size, and the penetration depth of the electromagnetic wave, which are conflictive requirements.
Veerasamy, Anitha; Madane, Srinivasa Rao; Sivakumar, K; Sivaraman, Audithan
2016-01-01
Growing attractiveness of Mobile Ad Hoc Networks (MANETs), its features, and usage has led to the launching of threats and attacks to bring negative consequences in the society. The typical features of MANETs, especially with dynamic topology and open wireless medium, may leave MANETs vulnerable. Trust management using uncertain reasoning scheme has previously attempted to solve this problem. However, it produces additional overhead while securing the network. Hence, a Location and Trust-based secure communication scheme (L&TS) is proposed to overcome this limitation. Since the design securing requires more than two data algorithms, the cost of the system goes up. Another mechanism proposed in this paper, Angle and Context Free Grammar (ACFG) based precarious node elimination and secure communication in MANETs, intends to secure data transmission and detect precarious nodes in a MANET at a comparatively lower cost. The Elliptic Curve function is used to isolate a malicious node, thereby incorporating secure data transfer. Simulation results show that the dynamic estimation of the metrics improves throughput by 26% in L&TS when compared to the TMUR. ACFG achieves 33% and 51% throughput increase when compared to L&TS and TMUR mechanisms, respectively.
Shahidi, Faraz Vahid; De Moortel, Deborah; Muntaner, Carles; Davis, Owen; Siddiqi, Arjumand
2016-12-01
Flexicurity policies comprise a relatively novel approach to the regulation of work and welfare that aims to combine labour market flexibility with social security. Advocates of this approach argue that, by striking the right balance between flexibility and security, flexicurity policies allow firms to take advantage of loose contractual arrangements in an increasingly competitive economic environment while simultaneously protecting workers from the adverse health and social consequences of flexible forms of employment. In this study, we use multilevel Poisson regression models to test the theoretical claim of the flexicurity approach using data for 23 countries across three waves of the European Social Survey. We construct an institutional typology of labour market regulation and social security to evaluate whether inequalities in self-reported health and limiting longstanding illness between temporary workers and their permanent counterparts are smaller in countries that most closely approximate the ideal type described by advocates of the flexicurity approach. Our results indicate that, while the association between temporary employment and health varies across countries, institutional configurations of labour market regulation and social security do not provide a meaningful explanation for this cross-national variation. Contrary to the expectations of the flexicurity hypothesis, our data do not indicate that employment-related inequalities are smaller in countries that approximate the flexicurity approach. We discuss potential explanations for these findings and conclude that there remains a relative lack of evidence in support of the theoretical claims of the flexicurity approach.
Romanian Experience for Enhancing Safety and Security in Transport of Radioactive Material - 12223
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vieru, Gheorghe
2012-07-01
The transport of Dangerous Goods-Class no.7 Radioactive Material (RAM), is an important part of the Romanian Radioactive Material Management. The overall aim of this activity is for enhancing operational safety and security measures during the transport of the radioactive materials, in order to ensure the protection of the people and the environment. The paper will present an overall of the safety and security measures recommended and implemented during transportation of RAM in Romania. Some aspects on the potential threat environment will be also approached with special referring to the low level radioactive material (waste) and NORM transportation either by roadmore » or by rail. A special attention is given to the assessment and evaluation of the possible radiological consequences due to RAM transportation. The paper is a part of the IAEA's Vienna Scientific Research Contract on the State Management of Nuclear Security Regime (Framework) concluded with the Institute for Nuclear Research, Romania, where the author is the CSI (Chief Scientific Investigator). The transport of RAM in Romania is a very sensible and complex problem taking into consideration the importance and the need of the security and safety for such activities. The Romanian Nuclear Regulatory Body set up strictly regulation and procedures according to the Recommendation of the IAEA Vienna and other international organizations. There were implemented the adequate regulation and procedures in order to keep the environmental impacts and the radiological consequences at the lower possible level and to assure the effectiveness of state nuclear security regime due to possible malicious acts in carrying out these activities including transport and the disposal site at the acceptable international levels. The levels of the estimated doses and risk expectation values for transport and disposal are within the acceptable limits provided by national and international regulations and recommendations but can increase, significantly during potential malicious acts. (authors)« less
Høgelund, Jan
2002-01-01
The Scandinavian welfare states are known for their universal social security coverage and high labor-market participation rates for all groups in society. The institutional setup in continental European welfare states, on the other hand, is said to foster a divide between employed persons and persons outside the labor market. In the area of disability policies, The Netherlands and Denmark illustrate this distinction. In The Netherlands, strong ties exist between the employer and the sick-listed worker, both because of solid job-protection legislation and because the financing of sickness and disability benefits is closely linked to the individual employer. In contrast, employer responsibility is limited in Denmark, where an extensive responsibility rests with public authorities. The author investigates the consequences of these differences using panel data on Dutch and Danish long-term sick-listed workers. The findings show that the strong ties in The Netherlands between employers and sick-listed workers enhance labor-market reintegration of long-term sick-listed workers. A significant drawback of the Dutch policy, however, is that employers refrain from employing persons with a high risk of falling ill. As a result, Dutch disability policy leads to a bigger insider-outsider divide than Danish policy.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.
2009-10-14
The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators ofmore » the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The NIPP framework incorporates consequence, threat, and vulnerability components and addresses all hazards. The analysis of the vulnerability data needs to be reproducible, support risk analysis, and go beyond protection. It also needs to address important security/vulnerability topics, such as physical security, cyber security, systems analysis, and dependencies and interdependencies. This report provides an overview of the approach being developed to estimate vulnerability and provide vulnerability comparisons for sectors and subsectors. the information will be used to assist DHS in analyzing existing protective measures and vulnerability at facilities, to identify potential ways to reduce vulnerabilities, and to assist in preparing sector risk estimates. The owner/operator receives an analysis of the data collected for a specific asset, showing a comparison between the facility's protection posture/vulnerability index and those of DHS sector/subsector sites visited. This comparison gives the owner/operator an indication of the asset's security strengths and weaknesses that may be contributing factors to its vulnerability and protection posture. The information provided to the owner/operator shows how the asset compares to other similar assets within the asset's sector or subsector. A 'dashboard' display is used to illustrate the results in a convenient format. The dashboard allows the owner/operator to analyze the implementation of additional protective measures and to illustrate how such actions would impact the asset's Protective Measures Index (PMI) or Vulnerability Index (VI).« less
Code of Federal Regulations, 2012 CFR
2012-07-01
....3 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND General § 135.3...) Sustains an economic loss as a consequence of oil pollution arising from Outer Continental Shelf activities...
Code of Federal Regulations, 2010 CFR
2010-07-01
....3 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND General § 135.3...) Sustains an economic loss as a consequence of oil pollution arising from Outer Continental Shelf activities...
Code of Federal Regulations, 2014 CFR
2014-07-01
....3 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND General § 135.3...) Sustains an economic loss as a consequence of oil pollution arising from Outer Continental Shelf activities...
Code of Federal Regulations, 2013 CFR
2013-07-01
....3 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND General § 135.3...) Sustains an economic loss as a consequence of oil pollution arising from Outer Continental Shelf activities...
77 FR 72673 - Critical Infrastructure Protection and Resilience Month, 2012
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-05
.... Cyber incidents can have devastating consequences on both physical and virtual infrastructure, which is... work within existing authorities to fortify our country against cyber risks, comprehensive legislation remains essential to improving infrastructure security, enhancing cyber information sharing between...
NASA Astrophysics Data System (ADS)
Hedjazi, Babak
2007-12-01
This dissertation is fundamentally about the formation of new regional spaces in Central Eurasia viewed from a dynamic, comparative and historical approach. Analyzing the global-local economic and political interactions and their consequences on resource rich countries of the Caspian Sea enable us to reframe security as a central element of the new global order. In this respect, the dissertation examines how two particular states, Azerbaijan and Iran, respond to the changing global security environment and optimize their capacity to absorb or control change. Here, security as I conceive is multidimensional and engages various social, political and economic domains. My research is articulated along three hypotheses regarding the formation of a new regional space and its consequences on territorial polarization and interstate rivalry. These hypotheses, respectively and cumulatively, elucidate global and domestic contexts of regional space formation, regional strategic and discursive trajectories, and regional tensions of global/local interactions. In order to empirically test these hypotheses, a series of thirty interviews were conducted by the author with local and foreign business representatives, civilian and government representatives, and corroborated by economic data collected from the International Energy Agency. The findings of the research validate the primary assumption of the dissertation that Azerbaijan and Iran have chosen the regional scale to address discrepancies between their aspired place in the new world order and the reality of their power and international status. Extending the argument for structural scarcity of oil towards contenders, this dissertation concludes that the Caspian oil has become a fundamental element of the regional discourse. The mismatch between the rhetoric of sovereign rights and energy security on one side and the reality of regional countries' powerlessness and their need to reach international markets on the other side are fundamental focal points of divergent regional trajectories of Azerbaijan and Iran. Divergent readings of energy security and its provision by Azerbaijan and Iran on the one hand, and how energy security is interpreted and incorporated in institutionalized regulation and new regimes of governance by consumer countries on the other hand, shape the new configuration of the Caspian Sea regionalism.
THE ROLE OF THE CONSEQUENCE MANAGEMENT HOME TEAM IN THE FUKUSHIMA DAIICHI RESPONSE
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pemberton, Wendy; Mena, RaJah; Beal, William
The Consequence Management Home Team is a U.S. Department of Energy/National Nuclear Security Administration asset. It assists a variety of response organizations with modeling; radiological operations planning; field monitoring techniques; and the analysis, interpretation, and distribution of radiological data. These reach-back capabilities are activated quickly to support public safety and minimize the social and economic impact of a nuclear or radiological incident. In the Fukushima Daiichi response, the Consequence Management Home Team grew to include a more broad range of support than was historically planned. From the early days of the response to the continuing involvement in supporting late phasemore » efforts, each stage of the Consequence Management Home Team support had distinct characteristics in terms of management of incoming data streams as well as creation of products. Regardless of stage, the Consequence Management Home Team played a critical role in the Fukushima Daiichi response effort.« less
Consequences of client-initiated workplace violence: the role of fear and perceived prevention.
Mueller, Sonja; Tschan, Franziska
2011-04-01
The authors suggested and tested a model of the consequences of client-initiated workplace violence, introducing perceived prevention of violence and perceived coping ability as factors that reduce fear of future violence and mitigate negative personal and organizational consequences. Survey data from 330 frontline staff from job centers and social security offices were analyzed using structural equation modeling. The data supported the model and confirmed the central role of the fear of violence with regard to outcomes such as psychological and physical well-being or irritability. Results point further to perceived prevention of violence as an important factor that influences fear levels in different ways, predicts turnover intentions, and should therefore be considered when managers aim to address the consequences of client-initiated violence and threats.
Assessing security technology's impact: old tools for new problems.
Kreissl, Reinhard
2014-09-01
The general idea developed in this paper from a sociological perspective is that some of the foundational categories on which the debate about privacy, security and technology rests are blurring. This process is a consequence of a blurring of physical and digital worlds. In order to define limits for legitimate use of intrusive digital technologies, one has to refer to binary distinctions such as private versus public, human versus technical, security versus insecurity to draw differences determining limits for the use of surveillance technologies. These distinctions developed in the physical world and are rooted in a cultural understanding of pre-digital culture. Attempts to capture the problems emerging with the implementation of security technologies using legal reasoning encounter a number of problems since law is by definition oriented backwards, adapting new developments to existing traditions, whereas the intrusion of new technologies in the physical world produces changes and creates fundamentally new problems.
Chemical plants remain vulnerable to terrorists: a call to action.
Lippin, Tobi Mae; McQuiston, Thomas H; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L; Howard, Donna; Seymour, Thomas A; Stephens, Doug; Williams, Brian K
2006-09-01
U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation's security are as follows: a) specify detailed requirements for chemical site assessment and security ; b) mandate audit inspections supported by significant penalties for cases of noncompliance ; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals ; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation ; e) mandate and fund the upgrading of emergency communication systems ; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident.
Chemical Plants Remain Vulnerable to Terrorists: A Call to Action
Lippin, Tobi Mae; McQuiston, Thomas H.; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L.; Howard, Donna; Seymour, Thomas A.; Stephens, Doug; Williams, Brian K.
2006-01-01
U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation’s security are as follows: a) specify detailed requirements for chemical site assessment and security; b) mandate audit inspections supported by significant penalties for cases of noncompliance; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation; e) mandate and fund the upgrading of emergency communication systems; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident. PMID:16966080
A Hybrid Analysis for Security Protocols with State
2014-07-16
Approved for Public Release; Distribution Unlimited. 14-1013. A Hybrid Analysis for Security Protocols with State∗ John D. Ramsdell Daniel J ...their consequences in the anno - tated protocol theory Tannot(Π, ) use only the limited vocabulary of Tbnd(Π); we call them bridge lemmas. Lemma 3 is a...and we proved it using pvs. Lemma 1 (Prefix Boot Extend). ∀π ∈ path, t :>, i, k ∈ N. i ≤ k ∧ π(k) has t ⊃ subterm(π(i), π(k)) ∨ ∃ j ∈ N. i ≤ j < k ∧ π
A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms
NASA Astrophysics Data System (ADS)
Hassan, Ahmed A.; Bahgat, Waleed M.
2010-01-01
Security policies have different components; firewall, active directory, and IDS are some examples of these components. Enforcement of network security policies to low level security mechanisms faces some essential difficulties. Consistency, verification, and maintenance are the major ones of these difficulties. One approach to overcome these difficulties is to automate the process of translation of high level security policy into low level security mechanisms. This paper introduces a framework of an automation process that translates a high level security policy into low level security mechanisms. The framework is described in terms of three phases; in the first phase all network assets are categorized according to their roles in the network security and relations between them are identified to constitute the network security model. This proposed model is based on organization based access control (OrBAC). However, the proposed model extend the OrBAC model to include not only access control policy but also some other administrative security policies like auditing policy. Besides, the proposed model enables matching of each rule of the high level security policy with the corresponding ones of the low level security policy. Through the second phase of the proposed framework, the high level security policy is mapped into the network security model. The second phase could be considered as a translation of the high level security policy into an intermediate model level. Finally, the intermediate model level is translated automatically into low level security mechanism. The paper illustrates the applicability of proposed approach through an application example.
Hazardous alcohol levels in adolescents are underestimated by barkeepers and security personnel.
Wurdak, Mara; Dörfler, Tobias; Mentz, Julia; Schmidt, Anika; Wolstein, Jörg
2012-12-01
Drunkenness among adolescents represents a significant problem and is associated with adverse consequences. A Licensing Act, which prohibits the dispensing of alcoholic beverages to visibly intoxicated individuals, was introduced in Germany to curb excessive drinking. The objective of the study was to explore whether it is possible for barkeepers and security personnel to correctly estimate the alcohol level (AL) of adolescents merely based on their outer appearance and self-report. In a commercial dance club, 89 adolescents reported their past and current alcohol consumption and estimated their own AL. Their breath alcohol level was measured with a breathalyzer. The sample was divided into "moderate drinkers" and "binge drinkers." Barkeepers and security personnel spoke to and examined the adolescents in order to estimate the adolescents' AL. Professional staff underestimated the ALs of adolescents in 60.7 % of all cases. Estimates of the personnel showed greater deviations from the measured AL of the adolescents as compared to estimates of the adolescents themselves, especially in the group of binge drinkers (t = 2.764; p = 0.009). It seems that adolescents suffer less from observable effects of alcohol, such as sedation or impairment of motor function. Consequently, we do not recommend the application of the Licensing Act to adolescents, but suggest its replacement by other restrictions and prevention measures.
Impact of High Seas Closure on Food Security in Low Income Fish Dependent Countries
Teh, Louise S. L.; Lam, Vicky W. Y.; Cheung, William W. L.; Miller, Dana; Teh, Lydia C. L.; Sumaila, U. Rashid
2016-01-01
We investigate how high seas closure will affect the availability of commonly consumed food fish in 46 fish reliant, and/or low income countries. Domestic consumption of straddling fish species (fish that would be affected by high seas closure) occurred in 54% of the assessed countries. The majority (70%) of countries were projected to experience net catch gains following high seas closure. However, countries with projected catch gains and that also consumed the straddling fish species domestically made up only 37% of the assessed countries. In contrast, much fewer countries (25%) were projected to incur net losses from high seas closure, and of these, straddling species were used domestically in less than half (45%) of the countries. Our findings suggest that, given the current consumption patterns of straddling species, high seas closure may only directly benefit the supply of domestically consumed food fish in a small number of fish reliant and/or low income countries. In particular, it may not have a substantial impact on improving domestic fish supply in countries with the greatest need for improved access to affordable fish, as only one third of this group used straddling fish species domestically. Also, food security in countries with projected net catch gains but where straddling fish species are not consumed domestically may still benefit indirectly via economic activities arising from the increased availability of non-domestically consumed straddling fish species following high seas closure. Consequently, this study suggests that high seas closure can potentially improve marine resource sustainability as well as contribute to human well-being in some of the poorest and most fish dependent countries worldwide. However, caution is required because high seas closure may also negatively affect fish availability in countries that are already impoverished and fish insecure. PMID:28033359
Impact of High Seas Closure on Food Security in Low Income Fish Dependent Countries.
Teh, Louise S L; Lam, Vicky W Y; Cheung, William W L; Miller, Dana; Teh, Lydia C L; Sumaila, U Rashid
2016-01-01
We investigate how high seas closure will affect the availability of commonly consumed food fish in 46 fish reliant, and/or low income countries. Domestic consumption of straddling fish species (fish that would be affected by high seas closure) occurred in 54% of the assessed countries. The majority (70%) of countries were projected to experience net catch gains following high seas closure. However, countries with projected catch gains and that also consumed the straddling fish species domestically made up only 37% of the assessed countries. In contrast, much fewer countries (25%) were projected to incur net losses from high seas closure, and of these, straddling species were used domestically in less than half (45%) of the countries. Our findings suggest that, given the current consumption patterns of straddling species, high seas closure may only directly benefit the supply of domestically consumed food fish in a small number of fish reliant and/or low income countries. In particular, it may not have a substantial impact on improving domestic fish supply in countries with the greatest need for improved access to affordable fish, as only one third of this group used straddling fish species domestically. Also, food security in countries with projected net catch gains but where straddling fish species are not consumed domestically may still benefit indirectly via economic activities arising from the increased availability of non-domestically consumed straddling fish species following high seas closure. Consequently, this study suggests that high seas closure can potentially improve marine resource sustainability as well as contribute to human well-being in some of the poorest and most fish dependent countries worldwide. However, caution is required because high seas closure may also negatively affect fish availability in countries that are already impoverished and fish insecure.
6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”
Code of Federal Regulations, 2011 CFR
2011-01-01
... a high level of security risk.â 27.205 Section 27.205 Domestic Security DEPARTMENT OF HOMELAND... Program § 27.205 Determination that a chemical facility “presents a high level of security risk.” (a... a high level of security risk based on any information available (including any information...
[Smallpox preparedness in Denmark].
Heegaard, Erik Deichmann; Fomsgaard, Anders
2005-09-05
Although the likelihood of a deliberate release is considered to be minor, smallpox virus poses a worldwide terrorism security risk because it (1) can easily be disseminated and transmitted from person to person; (2) results in high mortality rates and has the potential to create a major public health impact; (3) might cause public panic and social disruption; and (4) requires special action for public health preparedness. Consequently, Statens Serum Institute and the National Board of Health have developed a Danish smallpox preparedness plan. This article discusses critical aspects of the plan, including risk analysis and a multi-tiered action plan, vaccination, analysis of clinical specimens, the establishment of active surveillance teams and generic contingency elements.
A Simplified Model for Multiphase Leakage through Faults with Applications for CO2 Storage
NASA Astrophysics Data System (ADS)
Watson, F. E.; Doster, F.
2017-12-01
In the context of geological CO2 storage, faults in the subsurface could affect storage security by acting as high permeability pathways which allow CO2 to flow upwards and away from the storage formation. To assess the likelihood of leakage through faults and the impacts faults might have on storage security numerical models are required. However, faults are complex geological features, usually consisting of a fault core surrounded by a highly fractured damage zone. A direct representation of these in a numerical model would require very fine grid resolution and would be computationally expensive. Here, we present the development of a reduced complexity model for fault flow using the vertically integrated formulation. This model captures the main features of the flow but does not require us to resolve the vertical dimension, nor the fault in the horizontal dimension, explicitly. It is thus less computationally expensive than full resolution models. Consequently, we can quickly model many realisations for parameter uncertainty studies of CO2 injection into faulted reservoirs. We develop the model based on explicitly simulating local 3D representations of faults for characteristic scenarios using the Matlab Reservoir Simulation Toolbox (MRST). We have assessed the impact of variables such as fault geometry, porosity and permeability on multiphase leakage rates.
SLIGHTLY IRRADIATED FUEL (SIF) INTERIM DISPOSITION PROJECT
DOE Office of Scientific and Technical Information (OSTI.GOV)
NORTON SH
2010-02-23
CH2M HILL Plateau Remediation Company (CH2M HILL PRC) is proud to submit the Slightly Irradiated Fuel (SIF) Interim Disposition Project for consideration by the Project Management Institute as Project of the Year for 2010. The SIF Project was a set of six interrelated sub-projects that delivered unique stand-alone outcomes, which, when integrated, provided a comprehensive and compliant system for storing high risk special nuclear materials. The scope of the six sub-projects included the design, construction, testing, and turnover of the facilities and equipment, which would provide safe, secure, and compliant Special Nuclear Material (SNM) storage capabilities for the SIF material.more » The project encompassed a broad range of activities, including the following: Five buildings/structures removed, relocated, or built; Two buildings renovated; Structural barriers, fencing, and heavy gates installed; New roadways and parking lots built; Multiple detection and assessment systems installed; New and expanded communication systems developed; Multimedia recording devices added; and A new control room to monitor all materials and systems built. Project challenges were numerous and included the following: An aggressive 17-month schedule to support the high-profile Plutonium Finishing Plant (PFP) decommissioning; Company/contractor changeovers that affected each and every project team member; Project requirements that continually evolved during design and construction due to the performance- and outcome-based nature ofthe security objectives; and Restrictions imposed on all communications due to the sensitive nature of the projects In spite of the significant challenges, the project was delivered on schedule and $2 million under budget, which became a special source of pride that bonded the team. For years, the SIF had been stored at the central Hanford PFP. Because of the weapons-grade piutonium produced and stored there, the PFP had some of the tightest security on the Hanford nuclear reservation. Workers had to pass through metal detectors when they arrived at the plant and materials leaving the plant had to be scanned for security reasons. Whereas other high-security nuclear materials were shipped from the PFP to Savannah River, S.C. as part ofa Department of Energy (DOE) program to consolidate weapons-grade plutonium, it was determined that the SIF should remain onsite pending disposition to a national repository. Nevertheless, the SIF still requires a high level of security that the PFP complex has always provided. With the 60-year PFP mission of producing and storing plutonium concluded, the environmental cleanup plans for Hanford call for the demolition of the 63-building PFP complex. Consequently, if the SIF remained at PFP it not only would have interfered with the environmental cleanup plans, but would have required $100 million in facility upgrades to meet increased national security requirements imposed after the 9/11 terrorist attacks. A new smaller and more cost-effective area was needed to store this material, which led to the SIF Project. Once the SIF project was successfully completed and the SIF was safely removed from PFP, the existing Protected Area at PFP could be removed, and demolition could proceed more quickly without being encumbered by restrictive security requirements that an active Protected Area requires. The lightened PFP security level brought by safely removing and storing the SIF would also yield lowered costs for deactivation and demolition, as well as reduce overall life-cycle costs.« less
Hyder, Adnan A; Maman, Suzanne; Nyoni, Joyce E; Khasiani, Shaniysa A; Teoh, Noreen; Premji, Zul; Sohani, Salim
2005-12-01
This study was designed to explore the interactions between food securing activities, health and gender equity from the perspective of rural east African women. The specific objectives were to document the critical interaction among these three issues-food security, gender inequity, women's health within the context of sub-Saharan Africa; to describe the nature of this triad from the perspective of women farmers in Africa; and to propose a framework for linking available interventions to the vicious nature of this triad. In-depth interviews and focus group discussions were conducted with rural women farmers in Kwale District, Kenya and Bagamoyo District, Tanzania. A total of 12 in-depth interviews and 4 focus group discussions have been included in this analysis. Transcribed text from interviews and focus group discussions were coded and thematic conceptual matrices were developed to compare dimensions of common themes across interviews and settings. A thematic analysis was then performed and a framework developed to understand the nature of the triad and explore the potential for interventions within the interactions. The vicious cycle of increasing work, lack of time, and lack of independent decision making for women who are responsible for food production and health of their families, has health and social consequences. Food securing activities have negative health consequences for women, which are further augmented by issues of gender inequity. The African development community must respond by thinking of creative solutions and appropriate interventions for the empowerment of women farmers in the region to ensure their health.
78 FR 3923 - Sunshine Act Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-17
... impact of tick sizes on small and middle capitalization companies, the economic consequences (including the costs and benefits) of increasing or decreasing minimum tick sizes, and whether other policy... the second panel will address the impact of tick sizes on the securities market in general, including...
6 CFR 27.215 - Security vulnerability assessments.
Code of Federal Regulations, 2013 CFR
2013-01-01
... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...
6 CFR 27.215 - Security vulnerability assessments.
Code of Federal Regulations, 2012 CFR
2012-01-01
... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...
6 CFR 27.215 - Security vulnerability assessments.
Code of Federal Regulations, 2014 CFR
2014-01-01
... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...
6 CFR 27.215 - Security vulnerability assessments.
Code of Federal Regulations, 2011 CFR
2011-01-01
... of potential critical assets; identification of hazards and consequences of concern for the facility, its surroundings, its identified critical asset(s), and its supporting infrastructure; and... determination of the relative degree of risk to the facility in terms of the expected effect on each critical...
77 FR 76572 - Decimalization Roundtable
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-28
... discuss the impact of tick sizes on small and mid-sized companies, market professionals, investors, and U...) of the Securities and Exchange Commission headquarters at 100 F Street NE., in Washington, DC. The... sizes on small and middle capitalization companies, the economic consequences (including the costs and...
Privacy Issues of a National Research and Education Network.
ERIC Educational Resources Information Center
Katz, James E.; Graveman, Richard F.
1991-01-01
Discussion of the right to privacy of communications focuses on privacy expectations within a National Research and Education Network (NREN). Highlights include privacy needs in scientific and education communications; academic and research networks; network security and privacy concerns; protection strategies; and consequences of privacy…
Means-End Theory: Getting the Service Customer's Attention.
ERIC Educational Resources Information Center
Rosen, Deborah E.; Greenlee, Timothy B.
2001-01-01
Examined the usefulness of Means-End Theory in developing effective college recruitment brochures. Found evidence that brochures that emphasize attributes (e.g., cost, location) over consequences (e.g., getting a job) or values (e.g., security) will generate greater interest in an educational institution. (EV)
The law of unintended (financial) consequences: the expansion of HIPAA business associate liability.
Tomes, Jonathan P
2013-01-01
The recent Omnibus Rule published by the Department of Health and Human Services greatly expanded liability for breaches of health information privacy and security under the HIPAA statute and regulations. This expansion could have dire financial consequences for the health care industry. The Rule expanded the definition of business associates to include subcontractors of business associates and made covered entities and business associates liable for breaches of the entities who perform a service for them involving the use of individually identifiable health information under the federal common law of agency. Thus, if a covered entity or its "do wnstream" business associate breaches security or privacy, the covered entity or "upstream" business associate may face HIPAA's civil money penalties or a lawsuit. Financial managers need to be aware of these changes both to protect against the greater liability and to plan for the compliance costs inherent in effectively, if not legally, making business associates into covered entities.
Adeshina, A M; Hashim, R
2017-03-01
Diagnostic radiology is a core and integral part of modern medicine, paving ways for the primary care physicians in the disease diagnoses, treatments and therapy managements. Obviously, all recent standard healthcare procedures have immensely benefitted from the contemporary information technology revolutions, apparently revolutionizing those approaches to acquiring, storing and sharing of diagnostic data for efficient and timely diagnosis of diseases. Connected health network was introduced as an alternative to the ageing traditional concept in healthcare system, improving hospital-physician connectivity and clinical collaborations. Undoubtedly, the modern medicinal approach has drastically improved healthcare but at the expense of high computational cost and possible breach of diagnosis privacy. Consequently, a number of cryptographical techniques are recently being applied to clinical applications, but the challenges of not being able to successfully encrypt both the image and the textual data persist. Furthermore, processing time of encryption-decryption of medical datasets, within a considerable lower computational cost without jeopardizing the required security strength of the encryption algorithm, still remains as an outstanding issue. This study proposes a secured radiology-diagnostic data framework for connected health network using high-performance GPU-accelerated Advanced Encryption Standard. The study was evaluated with radiology image datasets consisting of brain MR and CT datasets obtained from the department of Surgery, University of North Carolina, USA, and the Swedish National Infrastructure for Computing. Sample patients' notes from the University of North Carolina, School of medicine at Chapel Hill were also used to evaluate the framework for its strength in encrypting-decrypting textual data in the form of medical report. Significantly, the framework is not only able to accurately encrypt and decrypt medical image datasets, but it also successfully encrypts and decrypts textual data in Microsoft Word document, Microsoft Excel and Portable Document Formats which are the conventional format of documenting medical records. Interestingly, the entire encryption and decryption procedures were achieved at a lower computational cost using regular hardware and software resources without compromising neither the quality of the decrypted data nor the security level of the algorithms.
eRegistries: governance for electronic maternal and child health registries.
Myhre, Sonja L; Kaye, Jane; Bygrave, Lee A; Aanestad, Margunn; Ghanem, Buthaina; Mechael, Patricia; Frøen, J Frederik
2016-09-23
The limited availability of maternal and child health data has limited progress in reducing mortality and morbidity among pregnant women and children. Global health agencies, leaders, and funders are prioritizing strategies that focus on acquiring high quality health data. Electronic maternal and child health registries (eRegistries) offer a systematic data collection and management approach that can serve as an entry point for preventive, curative and promotive health services. Due to the highly sensitive nature of reproductive health information, careful consideration must be accorded to privacy, access, and data security. In the third paper of the eRegistries Series, we report on the current landscape of ethical and legal governance for maternal and child health registries in developing countries. This research utilizes findings from two web-based surveys, completed in 2015 that targeted public health officials and health care providers in 76 countries with high global maternal and child mortality burden. A sample of 298 public health officials from 64 countries and 490 health care providers from 59 countries completed the online survey. Based on formative research in the development of the eRegistries Governance Guidance Toolkit, the surveys were designed to investigate topics related to maternal and child health registries including ethical and legal issues. According to survey respondents, the prevailing legal landscape is characterized by inadequate data security safeguards and weak support for core privacy principles. Respondents from the majority of countries indicated that health information from medical records is typically protected by legislation although legislation dealing specifically or comprehensively with data privacy may not be in place. Health care provider trust in the privacy of health data at their own facilities is associated with the presence of security safeguards. Addressing legal requirements and ensuring that privacy and data security of women's and children's health information is protected is an ethical responsibility that must not be ignored or postponed, particularly where the need is greatest. Not only are the potential harm and unintended consequences of inaction serious for individuals, but they could impact public trust in health registries leading to decreased participation and compromised data integrity.
Guraya, Salman Y.; Norman, Robert I.; Khoshhal, Khalid I.; Guraya, Shaista Salman; Forgione, Antonello
2016-01-01
Objectives: Generally, academic promotions, job retention, job mobility, and professional development of a medical faculty members are judged primarily by the growth in publication outputs. Universities and research institutions are more likely to recruit and promote those academics carrying voluminous résumés with larger number of published articles. This review elaborates the causes and consequences of the pressure to publish and the ways and means to cope with this paradigm. Methods: In 2015, database of Abstracts of Reviews of Effects, LISTA (EBSCO), Medline and Oxford University Library were searched for the English language full-text articles published during 2000-2015, by using MeSH terms “pressure to publish”, “urge to publish”, “research ethics”, “plagiarism”, “article retraction”, “medical field”. This search was further refined by selecting the articles in terms of relevancy and contents. Results: This research showed that some universities offer generous grants to researchers with a high h-index and with more publications in elite journals, which promise an enhanced prospect of citations and elevation in the scientific rankings of the funding institutions. This generates an involuntary obsession to publish with the primary intention to obtain promotions, high scientific rankings, and improved job security. This compelling pressure to publish results in widespread publication of non-significant research with a high index of plagiarism that eventually leads to an increased frequency of retractions. Conclusion: Research centers and academic institutions have an obligation to train their academics in sound scientific writing and to apprise them of the publication ethics and the grave consequences of plagiarism and research misconduct. PMID:28083065
Guo, Xiamei
2018-01-01
The crude divorce rate has been increasing steadily for over a decade in China. Consequently, more and more children have to face the challenge of growing up in single parent families. The current study investigated the mediating effects of problem-oriented and emotion-oriented coping on the relationship between parental attachment and psychological resilience among a sample of Chinese adolescents from single parent families and intact families. Participants were 975 high school students (44.30% males; aged 15-19 years, M = 16.32 years, SD = 0.74), 871 from intact families and 104 from single parent families. Structural equation modeling showed that security in maternal attachment was positively associated with resilience through the indirect effect of reduced emotion-oriented coping among adolescents from single parent families. Among adolescents from intact families, security in maternal attachment was both directly associated with resilience and indirectly through enhanced problem-oriented and reduced emotion-oriented coping. Security in paternal attachment was associated with resilience both directly and indirectly through enhanced problem-oriented coping as well among those from intact families. Female adolescents exhibited significantly lower levels of resilience than male adolescents did regardless of the marital status of their parents. Limitations and suggestions for future research are discussed.
[The role of environmental factors in managing labour stress].
Rados, Melinda; Mészáros, Judit
2017-07-01
Emotional, cognitive and behavioural aspects of birth and labour stress are strongly associated with the underlying physiological processes. To study the factors of physical security and social support, the administration of synthetic oxytocin, and how they relate to perceived stress during childbirth. Women's experienced physical security, social support and oxytocin administration was measured with targeted questions, and their perceived stress with the short and modified version of the Perceived Stress Scale. A strong negative association was found between perceived stress and physical and social security. The group of women experiencing low physical and social security perceived significantly higher stress, while those given synthetic oxytocin perceived higher stress, and lower physical and social security. Since physiological, psychological processes and behaviours are strongly intertwined, the support of natural physiological birth without interventions is recommended, which considers not only short-term but long-term health consequences for mother and child. The contribution of calming physical surroundings, minimal interventions and empowering support of caregivers to safe and satisfying birth is demonstrated in a model. Orv Hetil. 2017; 158(29): 1149-1156.
Fast, Parallel and Secure Cryptography Algorithm Using Lorenz's Attractor
NASA Astrophysics Data System (ADS)
Marco, Anderson Gonçalves; Martinez, Alexandre Souto; Bruno, Odemir Martinez
A novel cryptography method based on the Lorenz's attractor chaotic system is presented. The proposed algorithm is secure and fast, making it practical for general use. We introduce the chaotic operation mode, which provides an interaction among the password, message and a chaotic system. It ensures that the algorithm yields a secure codification, even if the nature of the chaotic system is known. The algorithm has been implemented in two versions: one sequential and slow and the other, parallel and fast. Our algorithm assures the integrity of the ciphertext (we know if it has been altered, which is not assured by traditional algorithms) and consequently its authenticity. Numerical experiments are presented, discussed and show the behavior of the method in terms of security and performance. The fast version of the algorithm has a performance comparable to AES, a popular cryptography program used commercially nowadays, but it is more secure, which makes it immediately suitable for general purpose cryptography applications. An internet page has been set up, which enables the readers to test the algorithm and also to try to break into the cipher.
Nuclear Arms Control, Nonproliferation, and Counterterrorism: Impacts on Public Health
Pregenzer, Arian
2014-01-01
Reducing the risks of nuclear war, limiting the spread of nuclear weapons, and reducing global nuclear weapons stockpiles are key national and international security goals. They are pursued through a variety of international arms control, nonproliferation, and counterterrorism treaties and agreements. These legally binding and political commitments, together with the institutional infrastructure that supports them, work to establish global norms of behavior and have limited the spread of weapons of mass destruction. Beyond the primary security objectives, reducing the likelihood of the use of nuclear weapons, preventing environmental releases of radioactive material, increasing the availability of safe and secure nuclear technology for peaceful purposes, and providing scientific data relevant to predicting and managing the consequences of natural or human-caused disasters worldwide provide significant benefits to global public health. PMID:24524501
Golabek-Goldman, Michele
2016-01-01
Due to Israel's threat environment, Israeli hospitals have developed effective and innovative security preparations for responding to all-hazards incidents. Although Israeli hospital preparedness has been the subject of international praise and attention, there has been a dearth of research focused specifically on applying Israeli hospital security measures to the US hospital setting to augment emergency planning. This study examined practical and cost-effective lessons from the Israeli experience for improving US hospital security preparedness for a wide range of mass casualty incidents, both natural and man-made. Sixty semi-structured interviews were conducted with officials throughout Israel's and America's health, defense, and emergency response communities. Hospital preparedness was examined and disaster drills were evaluated in both countries, with San Francisco hospitals analyzed as a case study. Qualitative analysis was conducted and recommendations were made on the basis of an all-hazards approach to emergency preparedness. US hospitals examined in this study had not undertaken crucial preparations for managing the security consequences of a large-scale disaster. Recommendations from Israel included installing permanent emergency signage, improving security perimeter protocols and training, increasing defense against primary and secondary attacks, enhancing coordination with law enforcement, the National Guard, and other outside security agencies, and conducting more frequent and realistic lockdown exercises. A number of US hospitals have overlooked the important role of security in emergency preparedness. This study analyzed practical and cost-effective security recommendations from Israel to remedy this dangerous deficiency in some US hospitals' disaster planning.
Asynchronous threat awareness by observer trials using crowd simulation
NASA Astrophysics Data System (ADS)
Dunau, Patrick; Huber, Samuel; Stein, Karin U.; Wellig, Peter
2016-10-01
The last few years showed that a high risk of asynchronous threats is given in every day life. Especially in large crowds a high probability of asynchronous attacks is evident. High observational abilities to detect threats are desirable. Consequently highly trained security and observation personal is needed. This paper evaluates the effectiveness of a training methodology to enhance performance of observation personnel engaging in a specific target identification task. For this purpose a crowd simulation video is utilized. The study first provides a measurement of the base performance before the training sessions. Furthermore a training procedure will be performed. Base performance will then be compared to the after training performance in order to look for a training effect. A thorough evaluation of both the training sessions as well as the overall performance will be done in this paper. A specific hypotheses based metric is used. Results will be discussed in order to provide guidelines for the design of training for observational tasks.
Poverty, Inequality, and Discrimination as Sources of Depression among U.S. Women.
ERIC Educational Resources Information Center
Belle, Deborah; Doucet, Joanne
2003-01-01
Poverty, inequality, and discrimination endanger women's well-being. Poverty is a consistent predictor of depression in women. Economic inequalities relate to reduced life expectancy and various negative physical health consequences. Discrimination maintains inequalities, lessens economic security, and exposes women to unmerited contempt.…
Code of Federal Regulations, 2013 CFR
2013-01-01
... also its vulnerabilities to emerging threats. Cyber incidents can have devastating consequences on both... against cyber risks, comprehensive legislation remains essential to improving infrastructure security, enhancing cyber information sharing between government and the private sector, and protecting the privacy...
Improving ground cover monitoring for wind erosion assessment using MODIS BRDF parameters
USDA-ARS?s Scientific Manuscript database
Measuring and monitoring controls on wind erosion can facilitate detection and prediction of soil degradation important for food security. Ground cover is widely recognised as an important factor for controlling soil erosion by wind and water. Consequently, maintaining ground cover (e.g., vegetation...
Empirical Analysis and Automated Classification of Security Bug Reports
NASA Technical Reports Server (NTRS)
Tyo, Jacob P.
2016-01-01
With the ever expanding amount of sensitive data being placed into computer systems, the need for effective cybersecurity is of utmost importance. However, there is a shortage of detailed empirical studies of security vulnerabilities from which cybersecurity metrics and best practices could be determined. This thesis has two main research goals: (1) to explore the distribution and characteristics of security vulnerabilities based on the information provided in bug tracking systems and (2) to develop data analytics approaches for automatic classification of bug reports as security or non-security related. This work is based on using three NASA datasets as case studies. The empirical analysis showed that the majority of software vulnerabilities belong only to a small number of types. Addressing these types of vulnerabilities will consequently lead to cost efficient improvement of software security. Since this analysis requires labeling of each bug report in the bug tracking system, we explored using machine learning to automate the classification of each bug report as a security or non-security related (two-class classification), as well as each security related bug report as specific security type (multiclass classification). In addition to using supervised machine learning algorithms, a novel unsupervised machine learning approach is proposed. An ac- curacy of 92%, recall of 96%, precision of 92%, probability of false alarm of 4%, F-Score of 81% and G-Score of 90% were the best results achieved during two-class classification. Furthermore, an accuracy of 80%, recall of 80%, precision of 94%, and F-score of 85% were the best results achieved during multiclass classification.
Revolution in nuclear detection affairs
NASA Astrophysics Data System (ADS)
Stern, Warren M.
2014-05-01
The detection of nuclear or radioactive materials for homeland or national security purposes is inherently difficult. This is one reason detection efforts must be seen as just one part of an overall nuclear defense strategy which includes, inter alia, material security, detection, interdiction, consequence management and recovery. Nevertheless, one could argue that there has been a revolution in detection affairs in the past several decades as the innovative application of new technology has changed the character and conduct of detection operations. This revolution will likely be most effectively reinforced in the coming decades with the networking of detectors and innovative application of anomaly detection algorithms.
Consequences of infertility in developing countries.
Rouchou, Brittany
2013-05-01
Infertility affects more than 10% of the world's population. In developing countries, there are severe social, psychological and economic consequences for infertile men and women. All of the cited references are compiled from primary peer-reviewed research articles that were conducted through one-to-one interviews or focus groups in countries of developing regions, such as Africa, Asia and the Middle East. The following paper seeks to raise awareness of the consequences of infertility in developing nations and identify infertility as an under-observed, but significant public health issue. It is proposed that education programmes tailored to each society's specific religious beliefs and grounded traditions must be implemented in order to reverse the social stigma, detrimental psychological effects, and loss of economic security that results from infertility.
Consequence and Resilience Modeling for Chemical Supply Chains
NASA Technical Reports Server (NTRS)
Stamber, Kevin L.; Vugrin, Eric D.; Ehlen, Mark A.; Sun, Amy C.; Warren, Drake E.; Welk, Margaret E.
2011-01-01
The U.S. chemical sector produces more than 70,000 chemicals that are essential material inputs to critical infrastructure systems, such as the energy, public health, and food and agriculture sectors. Disruptions to the chemical sector can potentially cascade to other dependent sectors, resulting in serious national consequences. To address this concern, the U.S. Department of Homeland Security (DHS) tasked Sandia National Laboratories to develop a predictive consequence modeling and simulation capability for global chemical supply chains. This paper describes that capability , which includes a dynamic supply chain simulation platform called N_ABLE(tm). The paper also presents results from a case study that simulates the consequences of a Gulf Coast hurricane on selected segments of the U.S. chemical sector. The case study identified consequences that include impacted chemical facilities, cascading impacts to other parts of the chemical sector. and estimates of the lengths of chemical shortages and recovery . Overall. these simulation results can DHS prepare for and respond to actual disruptions.
Nuttman-Shwartz, Orit
2017-07-01
There is extensive research evidence indicating that children and youth are the most vulnerable population for developing psychological symptoms relating to war and terror. Although studies have documented a wide range of detrimental emotional and behavioral effects of such exposure, much less is known about the effects of exposure to a continuous security threat for children and adolescents. Against this background, the current article examined the implications of continuous exposure to missile attacks among 1096 children and adolescents enrolled in public schools near the Israeli border with Gaza. Participants filled out quantitative questionnaires, which relate to the pathological consequences of continuous exposure to security threats, and to the role of the school and the community as a protective environment against disruptive behavior resulting from such exposure. The findings revealed that PTSS responses were mainly related to the security threat, whereas interpersonal aggression resulted from other types of traumatic events. Significant differences were found between aggression and posttraumatic symptoms, by age and gender. PTSS was found to be lower for older participants and higher for girls, whereas aggression was higher for boys and higher for older participants. Furthermore, the sense of belonging to the place of residence was negatively associated with PTSS as well as with aggressive behavior: the higher the participants' sense of belonging, the lower their levels of PTSS and aggressive responses. In contrast, the sense of belonging to the school was negatively associated only with aggressive behavior: the higher the participants' sense of belonging to the school, the lower their aggressive responses. The findings are discussed in the light of trauma theories and in light of the results of previous research. The study contributed to knowledge about the differential consequences of exposure to a security threat, and highlighted the importance of differential interventions with children who show post-traumatic symptoms versus those who show aggressive behavior. Accordingly, the security situation should not overshadow social issues that need to be addressed, such as family violence and aggression among school children. Copyright © 2017 Elsevier Ltd. All rights reserved.
Application distribution model and related security attacks in VANET
NASA Astrophysics Data System (ADS)
Nikaein, Navid; Kanti Datta, Soumya; Marecar, Irshad; Bonnet, Christian
2013-03-01
In this paper, we present a model for application distribution and related security attacks in dense vehicular ad hoc networks (VANET) and sparse VANET which forms a delay tolerant network (DTN). We study the vulnerabilities of VANET to evaluate the attack scenarios and introduce a new attacker`s model as an extension to the work done in [6]. Then a VANET model has been proposed that supports the application distribution through proxy app stores on top of mobile platforms installed in vehicles. The steps of application distribution have been studied in detail. We have identified key attacks (e.g. malware, spamming and phishing, software attack and threat to location privacy) for dense VANET and two attack scenarios for sparse VANET. It has been shown that attacks can be launched by distributing malicious applications and injecting malicious codes to On Board Unit (OBU) by exploiting OBU software security holes. Consequences of such security attacks have been described. Finally, countermeasures including the concepts of sandbox have also been presented in depth.
6 CFR 27.205 - Determination that a chemical facility “presents a high level of security risk.”
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Determination that a chemical facility âpresents a high level of security risk.â 27.205 Section 27.205 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security...
Psychological entitlement and abusive supervision: political skill as a self-regulatory mechanism.
Whitman, Marilyn V; Halbesleben, Jonathon R B; Shanine, Kristen K
2013-01-01
Abusive supervision in the workplace is steadily increasing. Such behavior has been linked to a host of negative individual and organizational consequences. In a health care environment particularly, such behavior can have detrimental effects. This study advances self-regulation theory by framing the entitlement-abusive supervision relationship in terms of a motive to obtain resources via a behavior that is not socially sanctioned. Furthermore, we argue that political skill serves as a self-regulating mechanism that reduces the motivation to secure personal resources through abusive behavior. Our hypotheses were tested using a sample of nurses and their supervisors who were asked to complete a survey. A final sample of 132 supervisor-subordinate dyads was obtained. Analysis suggests that supervisors high in psychological entitlement are more likely to be perceived by their subordinates as abusive. Political skill, however, moderated this relationship by serving as a regulatory mechanism that thwarts entitled supervisors from engaging in abusive behaviors. Our findings underscore the common concern that entitlement and abuse can be harmful for organizations. Entitled supervisors who are high in political skill may recognize that engaging in less aggressive influence behaviors may be more effective in achieving self-serving motives. Consequently, health care organizations need to be proactive in order to reduce entitlement and prevent abusive behaviors in the workplace.
NATO’s Future Role in the Arctic
2016-05-01
iv Global Climate Change and Arctic Geopolitics............................. Error! Bookmark not defined. Russian Claims to the Arctic...13 1 Global Climate Change and Arctic Geopolitics Global climate change has a profound...explaining the effect of climate change in the Arctic and the consequences on regional security. Issues regarding territorial sovereignty will be
Based on assessments of increased risk of terrorist/criminal activity, EPA and DOJ have issued a rule that allows public access to OCA information in ways that are designed to minimize likelihood of chemical accidents and public harm.
Gender and Age in Media Education
ERIC Educational Resources Information Center
Gajek, Elzbieta
2009-01-01
Nowadays mass media shape the perception of social values and roles. Thus, aspects of media education that deal with various kinds of inequalities influence general sensitivity to diversity and its consequences. In this respect media and intercultural competences interrelate. Not only minorities' rights have to be secured, but also majorities…
The Canadian Forces Use of Private Security in Afghanistan: A Consequence of National Decisions
2013-12-10
Swiss Peace (November 2007): 10-12. 5Paul Krugman, Robin Wells, and Martha Olney, Essentials of Economics (Macmillan, 2007), 56-84. 3...Paul, Robin Wells, and Martha Olney. Essentials of Economics . Macmillan, 2007. Kuhn, Thomas, S. The Structure of Scientific Revolutions. Chicago
ERIC Educational Resources Information Center
Fleming, Antoine
2017-01-01
Advances in technological uses within public schools provide increased methods to collect and store non-public personal information (NPI) or personally identifiable information (PII) from both students and employees. Consequently, the sensitive information collected is susceptible to unauthorized disclosure, as various public school employees are…
School Securitization and Latina/o Educational Progress
ERIC Educational Resources Information Center
Peguero, Anthony A.; Portillos, Edwardo L.; González, Juan Carlos
2015-01-01
Increasing control and security has become a common strategy to address school violence. Some argue, however, that increasing social control has detrimental consequences for racial and ethnic minorities, especially Latinas/os. This study utilizes mixed methods to research the influence of school justice, fairness, order, and discipline may have on…
War in the Atlantic: A Historical Case of Homeland Security
2015-09-01
RMS Lusitania , which, in addition to 1,957 passengers, was transporting field artillery, ammunition, and percussion fuses from New York to Liverpool...10 The destruction of the Lusitania , accompanied by the loss of 124 American lives, aroused the ire of the United States, a consequence ultimately
Job Insecurity and Employee Well-Being.
ERIC Educational Resources Information Center
Vance, Robert J.; Kuhnert, Karl W.
This study explored the consequences of perceived job security and insecurity on the psychological and physical health of employees. Data were gathered from employees of a large midwestern manufacturing organization that produced products for material removal applications. Surveys were sent through company mail to a stratified random sample of 442…
Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue
2016-01-01
Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.
Elderly poverty and Supplemental Security Income.
Nicholas, Joyce; Wiseman, Michael
2009-01-01
In the United States, poverty is generally assessed on the basis of income, as reported in the Current Population Survey's (CPS's) Annual Social and Economic Supplement (ASEC), using an official poverty standard established in the 1960s. The prevalence of receipt of means-tested transfers is underreported in the CPS, with uncertain consequences for the measurement of poverty rates by both the official standard and by using alternative "relative" measures linked to the contemporaneous income distribution. The article reports results estimating the prevalence of poverty in 2002. We complete this effort by using a version of the 2003 CPS/ASEC for which a substantial majority (76 percent) of respondents have individual records matching administrative data from the Social Security Administration on earnings and receipt of income from the Old-Age, Survivors, and Disability Insurance and Supplemental Security Income (SSI) programs. Adjustment of the CPS income data with administrative data substantially improves coverage of SSI receipt. The consequence for general poverty is sensitive to the merge procedures employed, but under both sets of merge procedures considered, the estimated poverty rate among all elderly persons and among elderly SSI recipients is substantially less than rates estimated using the unadjusted CPS. The effect of the administrative adjustment is less significant for perception of relative poverty than for absolute poverty. We emphasize the effect of these adjustments on perception of poverty among the elderly in general and elderly SSI recipients in particular.
The Just War Theory and the ethical governance of research.
Malsch, Ineke
2013-06-01
This article analyses current trends in and future expectations of nanotechnology and other key enabling technologies for security as well as dual use nanotechnology from the perspective of the ethical Just War Theory (JWT), interpreted as an instrument to increase the threshold for using armed force for solving conflicts. The aim is to investigate the relevance of the JWT to the ethical governance of research. The analysis gives rise to the following results. From the perspective of the JWT, military research should be evaluated with different criteria than research for civil or civil security applications. From a technological perspective, the boundaries between technologies for civil and military applications are fuzzy. Therefore the JWT offers theoretical grounds for making clear distinctions between research for military, civil security and other applications that are not obvious from a purely technological perspective. Different actors bear responsibility for development of the technology than for resorting to armed force for solving conflicts or for use of weapons and military technologies in combat. Different criteria should be used for moral judgment of decisions made by each type of actor in each context. In addition to evaluation of potential consequences of future use of the weapons or military technologies under development, the JWT also prescribes ethical evaluation of the inherent intent and other foreseeable consequences of the development itself of new military technologies.
Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheldon, Frederick T; Abercrombie, Robert K; Mili, Ali
2008-01-01
Good security metrics are required to make good decisions about how to design security countermeasures, to choose between alternative security architectures, and to improve security during operations. Therefore, in essence, measurement can be viewed as a decision aid. The lack of sound practical security metrics is severely hampering progress in the development of secure systems. The Cyberspace Security Econometrics System (CSES) offers the following advantages over traditional measurement systems: (1) CSES reflects the variances that exist amongst different stakeholders of the same system. Different stakeholders will typically attach different stakes to the same requirement or service (e.g., a service maymore » be provided by an information technology system or process control system, etc.). (2) For a given stakeholder, CSES reflects the variance that may exist among the stakes she/he attaches to meeting each requirement. The same stakeholder may attach different stakes to satisfying different requirements within the overall system specification. (3) For a given compound specification (e.g., combination(s) of commercial off the shelf software and/or hardware), CSES reflects the variance that may exist amongst the levels of verification and validation (i.e., certification) performed on components of the specification. The certification activity may produce higher levels of assurance across different components of the specification than others. Consequently, this paper introduces the basis, objectives and capabilities for the CSES including inputs/outputs and the basic structural and mathematical underpinnings.« less
Nuclear Arms Control, Nonproliferation, and Counterterrorism: Impacts on Public Health
Dreicer, Mona; Pregenzer, Arian
2014-04-01
Reducing the risks of nuclear war, limiting the spread of nuclear weapons and reducing global nuclear weapons stockpiles are key national and international security goals. They are pursued through a variety of international arms control, nonproliferation and counter-terrorism treaties and agreements. These legally binding and political commitments, together with the institutional infrastructure that supports them, work to establish global norms of behavior and have limited the spread of weapons of mass destruction. Beyond the primary security objectives, reducing the likelihood of the use of nuclear weapons, preventing environmental releases of radioactive material, increasing the availability of safe and secure nuclearmore » technology for peaceful purposes, and providing scientific data relevant to predicting and managing the consequences of natural or human-caused disasters world-wide provide significant benefits to global public health.« less
Companion, Michèle
2008-09-01
Famine Early Warning Systems (EWS) are reliant on data aggregated from multiple sources. Consequently, they are often insensitive to localized changes in food security status, leading to delayed response or interventions. While price and infrastructural data are often gathered, this case study suggests that local street markets and vendor knowledge are underutilized. Few efforts have been made to monitor systematically the street markets as an indicator of local stressors. Findings from Ethiopia show that knowledge generated by expanding food security indicators in this sector can be used in combination with EWS to facilitate earlier intervention in, or to monitor more effectively, on-going humanitarian crises. Indicators developed from this study are accurate, cost effective, and sensitive to local climatic and food stressors.
Tan, Chun Kiat; Ng, Jason Changwei; Xu, Xiaotian; Poh, Chueh Loo; Guan, Yong Liang; Sheah, Kenneth
2011-06-01
Teleradiology applications and universal availability of patient records using web-based technology are rapidly gaining importance. Consequently, digital medical image security has become an important issue when images and their pertinent patient information are transmitted across public networks, such as the Internet. Health mandates such as the Health Insurance Portability and Accountability Act require healthcare providers to adhere to security measures in order to protect sensitive patient information. This paper presents a fully reversible, dual-layer watermarking scheme with tamper detection capability for medical images. The scheme utilizes concepts of public-key cryptography and reversible data-hiding technique. The scheme was tested using medical images in DICOM format. The results show that the scheme is able to ensure image authenticity and integrity, and to locate tampered regions in the images.
Stephens, Susie M; Chen, Jake Y; Davidson, Marcel G; Thomas, Shiby; Trute, Barry M
2005-01-01
As database management systems expand their array of analytical functionality, they become powerful research engines for biomedical data analysis and drug discovery. Databases can hold most of the data types commonly required in life sciences and consequently can be used as flexible platforms for the implementation of knowledgebases. Performing data analysis in the database simplifies data management by minimizing the movement of data from disks to memory, allowing pre-filtering and post-processing of datasets, and enabling data to remain in a secure, highly available environment. This article describes the Oracle Database 10g implementation of BLAST and Regular Expression Searches and provides case studies of their usage in bioinformatics. http://www.oracle.com/technology/software/index.html.
Facility Will Help Transition Models Into Operations
NASA Astrophysics Data System (ADS)
Kumar, Mohi
2009-02-01
The U.S. National Oceanic and Atmospheric Administration's Space Weather Prediction Center (NOAA SWPC), in partnership with the U.S. Air Force Weather Agency (AFWA), is establishing a center to promote and facilitate the transition of space weather models to operations. The new facility, called the Developmental Testbed Center (DTC), will take models used by researchers and rigorously test them to see if they can withstand continued use as viable warning systems. If a model used in a space weather warning system crashes or fails to perform well, severe consequences can result. These include increased radiation risks to astronauts and people traveling on high-altitude flights, national security vulnerabilities from the loss of military satellite communications, and the cost of replacing damaged military and commercial spacecraft.
Brock, Rebecca L.; Kochanska, Grazyna
2015-01-01
Although the negative impact of marital conflict on children has been amply documented, few studies have examined the process of risk in a long-term, longitudinal design. We examined parent–child attachment security as a mechanism that may account for the impact of interparental conflict on children’s long-term risk of internalizing problems. Sixty-two community mothers, fathers, and children were followed from ages 2 to 10. Parents reported on their conflicts when their children were 2. Trained observers produced parent–child attachment security scores (Attachment Q-Set, Waters, 1987), based on lengthy naturalistic observations of the child with each parent. Parents rated children’s internalizing problems at age 10. A conditional process model and bootstrap approach were implemented to examine conditional indirect effects of conflict on child internalizing problems through attachment security for girls versus boys. Maladaptive marital conflict (destructive strategies, severity of arguments) increased internalizing problems 8 years later due to the undermined security for girls, whereas negative emotional aftermath of conflict (unresolved, lingering tension) increased internalizing problems for both boys and girls. The emotional aftermath of conflict is often overlooked, yet it appears to be a key dimension influencing emotional security in the family system, with significant consequences for children’s development. PMID:25797703
Brock, Rebecca L; Kochanska, Grazyna
2016-02-01
Although the negative impact of marital conflict on children has been amply documented, few studies have examined the process of risk in a long-term, longitudinal design. We examined parent-child attachment security as a mechanism that may account for the impact of interparental conflict on children's long-term risk of internalizing problems. Sixty-two community mothers, fathers, and children were followed from ages 2 to 10. Parents reported on their conflicts when their children were 2. Trained observers produced parent-child attachment security scores (Attachment Q-Set, Waters, 1987), based on lengthy naturalistic observations of the child with each parent. Parents rated children's internalizing problems at age 10. A conditional process model and bootstrap approach were implemented to examine conditional indirect effects of conflict on child internalizing problems through attachment security for girls versus boys. Maladaptive marital conflict (destructive strategies, severity of arguments) increased internalizing problems 8 years later due to the undermined security for girls, whereas negative emotional aftermath of conflict (unresolved, lingering tension) increased internalizing problems for both boys and girls. The emotional aftermath of conflict is often overlooked, yet it appears to be a key dimension influencing emotional security in the family system, with significant consequences for children's development.
When nightclub security agents assault clients more insight through a qualitative approach.
Romain-Glassey, Nathalie; Gut, Melody; De Puy, Jacqueline; Mangin, Patrice
2014-08-01
Between 2007 and 2009, aggressions by security agents of nightclubs on clients increased from 6% to 10% among community violence situations encountered at the Violence Medical Unit (VMU) at the Lausanne University Hospital in Switzerland. Most victims were young men who had been drinking alcohol before the assault. About one quarter (25.7%) presented with one or several fractures, all of them in the head area. (For more details, refer to the previous article "When nightclub security agents assault clients" published in 2012(1).) Following this first study, we performed a second qualitative study in order to bring more information about the context and highlight victims' behaviors and experiences. Four themes emerged: how the assault began; the assault itself; third-party involvement; and the psychological state of victims when they consulted the VMU. The findings of this second study complemented the statistical results of the first study by showing under what circumstances security agents of nightclubs respond with physical violence to situations they consider a threat to security. Furthermore, the study described consequences for the victims that could be quite serious. Our findings support the need for nightclubs to improve selection and training of security staff. Copyright © 2014 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.
Rotation stability of a toric intraocular lens with a second capsular tension ring.
Sagiv, Oded; Sachs, Dan
2015-05-01
An Acrysof toric intraocular lens (IOL) and a capsular tension ring (CTR) were implanted in the highly myopic eye of a 74-year-old white man during cataract surgery. On the first postoperative day, the IOL was found 90 degrees from the required position, with a consequent high amount of astigmatism. A second procedure was performed and because it was not possible to secure the toric IOL in the correct position, an additional in-the-bag CTR was inserted, with an immediate optimal outcome. The IOL remained stable up to the final follow-up examination. Co-implantation of a toric IOL and a single CTR has been reported. In our case, 2 CTRs were required to fixate the toric IOL in the correct position. This procedure is simple and safe and should be considered in cases of postoperatively misaligned toric IOLs. Copyright © 2015 ASCRS and ESCRS. Published by Elsevier Inc. All rights reserved.
A Food in Health Security (FIHS) platform in the Asia-Pacific Region: the way forward.
Wahlqvist, Mark L; Keatinge, John Donough H; Butler, Colin D; Friel, Sharon; McKay, John; Easdown, Warwick; Kuo, Ken N; Huang, Ching-jang; Pan, Wen-Harn; Yang, Ray-Yu; Lee, Meei-Shyuan; Chang, Hsing-Yi; Chiu, Ya-Wen; Jaron, Dov; Krawinkel, Michael; Barlow, Snow; Walsh, Greg; Chiang, Tung-liang; Huang, Po-Chao; Li, Duo
2009-01-01
The advent of multiple global crises, especially those of climate change, economics, energy, water, food and health evident in 2008, is of considerable moment to those who are suffering their consequences and for those with responsibility and interest in the systems affected. A coalition of parties in the Asia Pacific Region who work in the food and health systems met in August, 2009 in Taiwan and instigated a Food in Health Security (FIHS) Network which might join with other like-minded networks in and beyond the region. Sustainable health has many dimensions, among which food and nutrition is often neglected; there is a wide spectrum of nutritionally-related disorders. Malnutrition remains the global concern for agricultural research and development scientists and linkage with the health sector is key to progress. The disconnect between agricultural and health sectors negatively impacts consumer nutrition and health. Ethical and equity affect food and health systems. Food and health security is attainable only when the underlying social inequities are addressed; it is an ethical issue as reflected in the UN Universal declaration of Human Rights which includes the right to food for health and well-being. Food and health security are part of the larger security agenda and merit corresponding attention. Policy recommendations with immediacy are greater investment in combined food and health research; an Asia Pacific security agenda which emphasizes planetary, human, health and food security as relevant to traditional defence security; and community and household security measures which include maternal literacy, communication technology and entrepreneurial opportunity.
DOE Office of Scientific and Technical Information (OSTI.GOV)
MATALUCCI,RUDOLPH V.; O'CONNOR,SHARON
The mission of the Architectural Surety{trademark} program at Sandia National Laboratories is to assure the performance of buildings, facilities, and other infrastructure systems under normal, abnormal, and malevolent threat conditions. Through educational outreach efforts in the classroom, at conferences, and presentations such as this one, public and professional awareness of the need to defuse and mitigate such threats is increased. Buildings, airports, utilities, and other kinds of infrastructure deteriorate over time, as evidenced most dramatically by the crumbling cities and aging buildings, bridges, and other facility systems. Natural disasters such as tornadoes, earthquakes, hurricanes, and flooding also stress the materialsmore » and structural elements of the built environment. In addition, criminals, vandals, and terrorists attack federal buildings, dams, bridges, tunnels, and other public and private facilities. Engineers and architects are beginning to systematically consider these threats during the design, construction, and retrofit phases of buildings and infrastructures and are recommending advanced research in new materials and techniques. Existing building codes and standards do not adequately address nor protect the infrastructure or the public from many of these emerging threats. The activities in Sandia National Laboratories' Architectural Surety{trademark} efforts take a risk management approach to enhancing the safety, security, and reliability of the constructed environment. The technologies and techniques developed during Sandia's 50 years as the nation's lead laboratory for nuclear weapons surety are now being applied to assessing and reducing the vulnerability of dams, to enhancing the safety and security of staff in foreign embassies, and assuring the reliability of other federal facilities. High consequence surety engineering and design brings together technological advancements, new material requirements, systems integration, and risk management to improve the safety, security, and reliability of the as-built environment. The thrust of this paper is the role that new materials can play in protecting the infrastructure. Retrofits of existing buildings, innovative approaches to the design and construction of new facilities, and the mitigation of consequences in the event of an unpreventable disaster are some of the areas that new construction materials can benefit the Architectural Surety{trademark} of the constructed environment.« less
Brown, Alicia L; Cavagnaro, Timothy R; Gleadow, Ros; Miller, Rebecca E
2016-10-01
Cassava is an important dietary component for over 1 billion people, and its ability to yield under drought has led to it being promoted as an important crop for food security under climate change. Despite its known photosynthetic plasticity in response to temperature, little is known about how temperature affects plant toxicity or about interactions between temperature and drought, which is important because cassava tissues contain high levels of toxic cyanogenic glucosides, a major health and food safety concern. In a controlled glasshouse experiment, plants were grown at 2 daytime temperatures (23 °C and 34 °C), and either well-watered or subject to a 1 month drought prior to harvest at 6 months. The objective was to determine the separate and interactive effects of temperature and drought on growth and toxicity. Both temperature and drought affected cassava physiology and chemistry. While temperature alone drove differences in plant height and above-ground biomass, drought and temperature × drought interactions most affected tuber yield, as well as foliar and tuber chemistry, including C : N, nitrogen and cyanide potential (CNp; total cyanide released from cyanogenic glucosides). Conditions that most stimulated growth and yield (well-watered × high temperature) effected a reduction in tuber toxicity, whereas drought inhibited growth and yield, and was associated with increased foliar and tuber toxicity. The magnitude of drought effects on tuber yield and toxicity were greater at high temperature; thus, increases in tuber CNp were not merely a consequence of reduced tuber biomass. Findings confirm that cassava is adaptable to forecast temperature increases, particularly in areas of adequate or increasing rainfall; however, in regions forecast for increased incidence of drought, the effects of drought on both food quality (tuber toxicity) and yield are a greater threat to future food security and indicate an increasing necessity for processing of cassava to reduce toxicity. © 2016 John Wiley & Sons Ltd.
Guidelines for computer security in general practice.
Schattner, Peter; Pleteshner, Catherine; Bhend, Heinz; Brouns, Johan
2007-01-01
As general practice becomes increasingly computerised, data security becomes increasingly important for both patient health and the efficient operation of the practice. To develop guidelines for computer security in general practice based on a literature review, an analysis of available information on current practice and a series of key stakeholder interviews. While the guideline was produced in the context of Australian general practice, we have developed a template that is also relevant for other countries. Current data on computer security measures was sought from Australian divisions of general practice. Semi-structured interviews were conducted with general practitioners (GPs), the medical software industry, senior managers within government responsible for health IT (information technology) initiatives, technical IT experts, divisions of general practice and a member of a health information consumer group. The respondents were asked to assess both the likelihood and the consequences of potential risks in computer security being breached. The study suggested that the most important computer security issues in general practice were: the need for a nominated IT security coordinator; having written IT policies, including a practice disaster recovery plan; controlling access to different levels of electronic data; doing and testing backups; protecting against viruses and other malicious codes; installing firewalls; undertaking routine maintenance of hardware and software; and securing electronic communication, for example via encryption. This information led to the production of computer security guidelines, including a one-page summary checklist, which were subsequently distributed to all GPs in Australia. This paper maps out a process for developing computer security guidelines for general practice. The specific content will vary in different countries according to their levels of adoption of IT, and cultural, technical and other health service factors. Making these guidelines relevant to local contexts should help maximise their uptake.
The plague under Commodus as an unintended consequence of Roman grain market regulation.
Silver, Morris
2012-01-01
This paper begins with a review of Roman grain market policies. It is argued that policies such as forced sales and maximum prices made urban consumers hesitant to rely on the market for secure access to grain. Consequently, consumers hoarded grain in their homes. The hoarded grain formed a volatile fuel ready to be ignited by the arrival of the bubonic plague bacillus. This scenario fits events in the city of Rome under Commodus. Attested grain market interventions were followed by a severe epidemic, arguably bubonic plague, which decimated the city's population.
How can land-use modelling tools inform bioenergy policies?
Davis, Sarah C.; House, Joanna I.; Diaz-Chavez, Rocio A.; Molnar, Andras; Valin, Hugo; DeLucia, Evan H.
2011-01-01
Targets for bioenergy have been set worldwide to mitigate climate change. Although feedstock sources are often ambiguous, pledges in European nations, the United States and Brazil amount to more than 100 Mtoe of biorenewable fuel production by 2020. As a consequence, the biofuel sector is developing rapidly, and it is increasingly important to distinguish bioenergy options that can address energy security and greenhouse gas mitigation from those that cannot. This paper evaluates how bioenergy production affects land-use change (LUC), and to what extent land-use modelling can inform sound decision-making. We identified local and global internalities and externalities of biofuel development scenarios, reviewed relevant data sources and modelling approaches, identified sources of controversy about indirect LUC (iLUC) and then suggested a framework for comprehensive assessments of bioenergy. Ultimately, plant biomass must be managed to produce energy in a way that is consistent with the management of food, feed, fibre, timber and environmental services. Bioenergy production provides opportunities for improved energy security, climate mitigation and rural development, but the environmental and social consequences depend on feedstock choices and geographical location. The most desirable solutions for bioenergy production will include policies that incentivize regionally integrated management of diverse resources with low inputs, high yields, co-products, multiple benefits and minimal risks of iLUC. Many integrated assessment models include energy resources, trade, technological development and regional environmental conditions, but do not account for biodiversity and lack detailed data on the location of degraded and underproductive lands that would be ideal for bioenergy production. Specific practices that would maximize the benefits of bioenergy production regionally need to be identified before a global analysis of bioenergy-related LUC can be accomplished. PMID:22482028
Unconditionally verifiable blind quantum computation
NASA Astrophysics Data System (ADS)
Fitzsimons, Joseph F.; Kashefi, Elham
2017-07-01
Blind quantum computing (BQC) allows a client to have a server carry out a quantum computation for them such that the client's input, output, and computation remain private. A desirable property for any BQC protocol is verification, whereby the client can verify with high probability whether the server has followed the instructions of the protocol or if there has been some deviation resulting in a corrupted output state. A verifiable BQC protocol can be viewed as an interactive proof system leading to consequences for complexity theory. We previously proposed [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual Symposium on Foundations of Computer Science, Atlanta, 2009 (IEEE, Piscataway, 2009), p. 517] a universal and unconditionally secure BQC scheme where the client only needs to be able to prepare single qubits in separable states randomly chosen from a finite set and send them to the server, who has the balance of the required quantum computational resources. In this paper we extend that protocol with additional functionality allowing blind computational basis measurements, which we use to construct another verifiable BQC protocol based on a different class of resource states. We rigorously prove that the probability of failing to detect an incorrect output is exponentially small in a security parameter, while resource overhead remains polynomial in this parameter. This resource state allows entangling gates to be performed between arbitrary pairs of logical qubits with only constant overhead. This is a significant improvement on the original scheme, which required that all computations to be performed must first be put into a nearest-neighbor form, incurring linear overhead in the number of qubits. Such an improvement has important consequences for efficiency and fault-tolerance thresholds.
A provably-secure ECC-based authentication scheme for wireless sensor networks.
Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho
2014-11-06
A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.
[Goals in the discussion of old age insurance - a sketch].
Schmähl, W
1980-01-01
In the Federal Republic of Germany often the discussion on social policy deals with instruments, yet seldom with goals to be realised. Scientific work on goals for old-age security policy is just starting. In this article the importance of distinctly defined goals is shown for rational economic and social policy, for an assessment of the existing situation, for a goal oriented selection and formation of measures and for success control. With reference to distributive goals in old-age security policy it is exemplified in which way scientific work can be helpful in defining goals in an operationalised form. For this it is important to deal with several distributive aspects, which are often mixed in discussions. As measures in one area of economic and social policy cannot be taken isolated, in order to avoid unwanted consequences, it is necessary for old-age security policies too, to take into consideration a general system of economic and social policy goals. As an example, it must be stated that e.g. aspects of business cycle and growth policy have to be considered while constructing a system of old-age security. Finally, some other criteria for old-age security policies, such as transparence, political feasibility and practicability are mentioned.
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho
2014-01-01
A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009
Emotion Understanding in Clinically Anxious Children: A Preliminary Investigation
Bender, Patrick K.; Pons, Francisco; Harris, Paul L.; Esbjørn, Barbara H.; Reinholdt-Dunne, Marie L.
2015-01-01
Children’s understanding of the nature, origins and consequences of emotions has been intensively investigated over the last 30–40 years. However, few empirical studies have looked at the relation between emotion understanding and anxiety in children and their results are mixed. The aim of the present study was to perform a preliminary investigation of the relationships between emotion understanding, anxiety, emotion dysregulation, and attachment security in clinically anxious children. A sample of 16 clinically anxious children (age 8–12, eight girls/boys) was assessed for emotion understanding (Test of Emotion Comprehension), anxiety (Screening for Child Anxiety Related Emotional Disorders-Revised and Anxiety Disorder Interview Schedule), emotion dysregulation (Difficulties in Emotion Regulation Scale) and attachment security (Security Scale). Children who reported more overall anxiety also reported greater difficulties in regulating their emotions, and were less securely attached to their parents. The results also showed that more specific symptoms of anxiety (i.e., OCD and PTSD) correlated not only with emotion dysregulation and attachment insecurity but also with emotion understanding. Finally, there were interrelations among emotion understanding, attachment security, and emotion dysregulation. The present results provide the first comprehensive evidence for a socio-emotional framework and its relevance to childhood anxiety. PMID:26733909
Park, Lora E
2007-04-01
Appearance-Based Rejection Sensitivity (Appearance-RS) is a personality-processing system characterized by anxious concerns and expectations about being rejected based on one's physical attractiveness. People differ in their sensitivity to rejection based on appearance, with consequences for mental and physical health, self-esteem, affect, and feelings of belonging. Study 1 describes the development and validation of the Appearance-RS scale, its relation to personality variables and to health-related outcomes. Study 2 provides experimental evidence that high Appearance-RS people feel more alone and rejected when asked to think about negative aspects of their appearance. Finally, Study 3 tests ways to reduce the negative effects of receiving an appearance threat among high Appearance-RS participants. Specifically, high Appearance-RS participants who engaged in self-affirmation (thought of their personal strengths) or received a secure attachment prime (thought of a close, caring relationship) were buffered from the negative effects of an appearance threat on subsequent state self-esteem and mood.
Effertz, Tobias; Engel, Susanne; Verheyen, Frank; Linder, Roland
2016-12-01
With the steadily growing health burden of obesity in Germany, the measuring and quantification of its costs and relevant economic consequences have become increasingly important. The usual quantifications via previous cost-of-illness approaches mostly have several weaknesses, e.g., applying "indirect methods" by using "population-attributable fractions" to identify parts of costs that can be accrued to obesity, second using highly aggregated data and third often only displaying part of the costs. This article presents a new approach and a new estimation of the cost and consequences of obesity in Germany using claims data from a German health insurance company. A sample of 146,000 individuals was analyzed with both a prevalence and a life-cycle focus on the cost and consequences of obesity. With additional data sets, we calculate the deaths per year due to obesity, the excess costs per year and several intangible consequences usually referred to as "pain and suffering". Our results show that the cost estimations of obesity in Germany so far have been largely underestimated. The annual direct costs of obesity in Germany amount to approximately €29.39 billion and the indirect costs to an additional €33.65 billion. A total of 102,000 subjects die prematurely each year because of obesity, and there is a significant excess of unemployment, long-term nursing care, and pain and suffering due to obesity. From a lifetime perspective, every obese man is equal to an additional burden of €166,911 and each woman of €206,526 for the social security system in Germany. Obesity due to unhealthy eating is thus about to replace tobacco consumption in terms of costs and consequences as the main hazardous lifestyle factor and thus should be more intensively focussed by public health policy.
Nuclear war in the Middle East: where is the voice of medicine and public health.
Dallas, Cham E; Burkle, Frederick M
2011-10-01
Once again, the politically volatile Middle East and accompanying rhetoric has escalated the risk of a major nuclear exchange. Diplomatic efforts have failed to make the medical consequences of such an exchange a leading element in negotiations. The medical and academic communities share this denial. Without exaggeration, the harsh reality of the enormous consequences of an imminently conceivable nuclear war between Iran and Israel will encompass an unprecedented millions of dead and an unavoidable decline in public health and environmental devastation that would impact major populations in the Middle East for decades to come. Nuclear deterrence and the uncomfortable but real medical and public health consequences must become an integral part of a broader global health diplomacy that emphasizes health security along with poverty reduction and good governance.
A Case Study in Securities Law: SEC v. Baker
ERIC Educational Resources Information Center
Schoen, Edward J.; Hughes, Diane Y.; Kowalsky, Michelle A.
2017-01-01
There are two overarching goals to this case study. First, the authors want to introduce students as early as possible in their study of business to the perils of deliberate misstatements of income in financial statement and the significant consequences that await those who do. Given the recent business scandals involving mortgage-backed…
The State of the Trade: Global Arms Transfer Patterns in the 1980s
1986-01-01
and advertising , and the pressure to secure new orders is reported to be intense. There has been an increase in the number and frequency of military...obvious consequences is a sharp increase in the intensity of supply-side competition. The major producers are placing far more emphasis on marketing
Red Lake Forestry Greenhouse Program
Gloria Whitefeather-Spears
2002-01-01
In 1916, The Red Lake Indian Forest Act was created. The Red Lake Band of Chippewa in Minnesota stood alone and refused to consent to allotment. Consequently, The Red Lake Band is the only tribe in Minnesota for which a congressional act was passed to secure a permanent economic foundation for the band and its future.
2006-06-01
nuclear disaster warning systems,” and “preparedness and planning to reduce the consequences of major terrorist incidents.” In addition, the order...assistance functions,” in addition to dam safety, “natural and nuclear disaster warning systems,” and “the coordination of preparedness and planning to
The long darkness: Psychological and moral perspectives on nuclear winter
DOE Office of Scientific and Technical Information (OSTI.GOV)
Grinspoon, L.
1986-01-01
This book presents papers on the risks of nuclear weapons. Topics considered include nuclear war and climatic catastrophe, evolutionary and developmental considerations, a biological comment on Erikson's notion of pseudospeciation, national security, unexamined assumptions and inescapable consequences, opposing the nuclear threat (the convergence of moral analysis and empirical data), and nuclear winter.
Communicating Love or Fear: The Role of Attachment Styles in Pathways to Giftedness
ERIC Educational Resources Information Center
Wellisch, Mimi
2010-01-01
Although both giftedness and secure attachment are associated with advanced language and good socioemotional adjustment, not all gifted children are well adjusted. This article explores the consequences of attachment style on gifted development and examines whether early trauma can be rectified. The dearth of research on giftedness and attachment…
Photoenhanced Attachment for Optical Control of Diffuse Discharges.
1987-12-31
17 14 . MONTORING AGNC 14AM & OdRSSii I h e en Controlling Office) IS. SECURITY CLASS. (at Chi* report) Unclassified 15m. OECL ASSI F1CATION... 14 References................................................... 15 Publications................................................. 16...substantial translational energy of the fragments. *: This disposition of energy has important consequences in the 14 4 I . * photochemistry and
Job Satisfaction in the Coastal Pelagic Fisheries of Senegal
ERIC Educational Resources Information Center
Sall, Aliou
2012-01-01
The marine fishery in Senegal, West Africa, is a major source of employment and food security. It currently faces the consequences of ecological degradation. This paper examines job satisfaction among small-scale purse seine fishers, who constitute one of the dominant fishing metiers in Senegal. The research sample consists of 80 purse seine…
Anticipating the unintended consequences of security dynamics.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Backus, George A.; Overfelt, James Robert; Malczynski, Leonard A.
2010-01-01
In a globalized world, dramatic changes within any one nation causes ripple or even tsunamic effects within neighbor nations and nations geographically far removed. Multinational interventions to prevent or mitigate detrimental changes can easily cause secondary unintended consequences more detrimental and enduring than the feared change instigating the intervention. This LDRD research developed the foundations for a flexible geopolitical and socioeconomic simulation capability that focuses on the dynamic national security implications of natural and man-made trauma for a nation-state and the states linked to it through trade or treaty. The model developed contains a database for simulating all 229 recognizedmore » nation-states and sovereignties with the detail of 30 economic sectors including consumers and natural resources. The model explicitly simulates the interactions among the countries and their governments. Decisions among governments and populations is based on expectation formation. In the simulation model, failed expectations are used as a key metric for tension across states, among ethnic groups, and between population factions. This document provides the foundational documentation for the model.« less
Schmitt, J; Arthuis, M; Huriet, C; Joubert, F R; Rebillon, M
1994-11-01
The deprivation of numerous possibilities suffered by the severely-handicapped on account of their somato-psychic deficiency extends to many areas: mobility, relationships, autonomy in their everyday life, dependency, psychological or even mental consequences. The most elementary ethics would require to take all these deprivations into account, not just in the choice of accommodation structures but also in the behaviour of relatives and friends, or of qualified members of staff, in their approach to the handicapped. The range of application of these ethical rules must therefore extend from the quality of life and assistance, and the concern for efficiency of interventions, to the problems of security and securization, the assessment and the prevention of risks deriving from the handicap or its consequences, through the information of the patients regarding their elementary or specific rights, the introduction of the most favourable basis in order to make sure that they enjoy the dignity due to any human being, whatever his condition. Such a vast program requires a great many means of action, which all imply the recourse to the appropriate material and human assistance.
Cyber Deterrence and Stability
DOE Office of Scientific and Technical Information (OSTI.GOV)
Goychayev, Rustam; Carr, Geoffrey A.; Weise, Rachel A.
Throughout the 20th and early 21st centuries, deterrence and arms control have been cornerstones of strategic stability between the superpowers. However, the weaponization of the cyber realm by State actors and the multipolar nature of cyber conflict now undermines that stability. Strategic stability is the state in which nations believe that if they act aggressively to undermine U.S. national interests and the post-World War II liberal democratic order, the consequences will outweigh the benefits. The sense of lawlessness and lack of consequences in the cyber realm embolden States to be more aggressive in taking actions that undermine stability. Accordingly, thismore » paper examines 1) the role of deterrence and arms control in securing cyber stability, and 2) the limitations and challenges associated with these traditional national security paradigms as applied to this emerging threat domain. This paper demonstrates that many 20th-century deterrence and arms control concepts are not particularly applicable in the cyber realm. However, they are not entirely irrelevant. The United States can distill lessons learned from this rich deterrence and arms control experience to develop and deploy a strategy to advance cyber stability.« less
Revolution in Detection Affairs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stern W.
The detection of nuclear or radioactive materials for homeland or national security purposes is inherently difficult. This is one reason detection efforts must be seen as just one part of an overall nuclear defense strategy which includes, inter alia, material security, detection, interdiction, consequence management and recovery. Nevertheless, one could argue that there has been a revolution in detection affairs in the past several decades as the innovative application of new technology has changed the character and conduct of detection operations. This revolution will likely be most effectively reinforced in the coming decades with the networking of detectors and innovativemore » application of anomaly detection algorithms.« less
Revolution in nuclear detection affairs
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stern, Warren M.
The detection of nuclear or radioactive materials for homeland or national security purposes is inherently difficult. This is one reason detection efforts must be seen as just one part of an overall nuclear defense strategy which includes, inter alia, material security, detection, interdiction, consequence management and recovery. Nevertheless, one could argue that there has been a revolution in detection affairs in the past several decades as the innovative application of new technology has changed the character and conduct of detection operations. This revolution will likely be most effectively reinforced in the coming decades with the networking of detectors and innovativemore » application of anomaly detection algorithms.« less
Collaborative Access Control For Critical Infrastructures
NASA Astrophysics Data System (ADS)
Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed
A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.
Continuous variable quantum cryptography using coherent states.
Grosshans, Frédéric; Grangier, Philippe
2002-02-04
We propose several methods for quantum key distribution (QKD) based on the generation and transmission of random distributions of coherent or squeezed states, and we show that they are secure against individual eavesdropping attacks. These protocols require that the transmission of the optical line between Alice and Bob is larger than 50%, but they do not rely on "sub-shot-noise" features such as squeezing. Their security is a direct consequence of the no-cloning theorem, which limits the signal-to-noise ratio of possible quantum measurements on the transmission line. Our approach can also be used for evaluating various QKD protocols using light with Gaussian statistics.
Analysis of security of optical encryption with spatially incoherent illumination technique
NASA Astrophysics Data System (ADS)
Cheremkhin, Pavel A.; Evtikhiev, Nikolay N.; Krasnov, Vitaly V.; Rodin, Vladislav G.; Shifrina, Anna V.
2017-03-01
Applications of optical methods for encryption purposes have been attracting interest of researchers for decades. The first and the most popular is double random phase encoding (DRPE) technique. There are many optical encryption techniques based on DRPE. Main advantage of DRPE based techniques is high security due to transformation of spectrum of image to be encrypted into white spectrum via use of first phase random mask which allows for encrypted images with white spectra. Downsides are necessity of using holographic registration scheme in order to register not only light intensity distribution but also its phase distribution, and speckle noise occurring due to coherent illumination. Elimination of these disadvantages is possible via usage of incoherent illumination instead of coherent one. In this case, phase registration no longer matters, which means that there is no need for holographic setup, and speckle noise is gone. This technique does not have drawbacks inherent to coherent methods, however, as only light intensity distribution is considered, mean value of image to be encrypted is always above zero which leads to intensive zero spatial frequency peak in image spectrum. Consequently, in case of spatially incoherent illumination, image spectrum, as well as encryption key spectrum, cannot be white. This might be used to crack encryption system. If encryption key is very sparse, encrypted image might contain parts or even whole unhidden original image. Therefore, in this paper analysis of security of optical encryption with spatially incoherent illumination depending on encryption key size and density is conducted.
Environmental security: a geographic information system analysis approach--the case of Kenya.
Bocchi, Stefano; Disperati, Stefano Peppino; Rossi, Simone
2006-02-01
Studies into the relationships between environmental factors and violence or conflicts constitute a very debated research field called environmental security. Several authors think that environmental scarcity, which is scarcity of renewable resources, can contribute to generate violence or social unrest, particularly within states scarcely endowed with technical know-how and social structures, such as developing countries. In this work, we referred to the theoretical model developed by the Environmental Change and Acute Conflict Project. Our goal was to use easily available spatial databases to map the various sources of environmental scarcity through geographic information systems, in order to locate the areas apparently most at risk of suffering negative social effects and their consequences in terms of internal security. The analysis was carried out at a subnational level and applied to the case of Kenya. A first phase of the work included a careful selection of databases relative to renewable resources. Spatial operations among these data allowed us to obtain new information on the availability of renewable resources (cropland, forests, water), on the present and foreseen demographic pressure, as well as on the social and technical ingenuity. The results made it possible to identify areas suffering from scarcity of one or more renewable resources, indicating different levels of gravity. Accounts from Kenya seem to confirm our results, reporting clashes between tribal groups over the access to scarce resources in areas that our work showed to be at high risk.
Maternal secure-base scripts and children's attachment security in an adopted sample.
Veríssimo, Manuela; Salvaterra, Fernanda
2006-09-01
Studies of families with adopted children are of special interest to attachment theorists because they afford opportunities to probe assumptions of attachment theory with regard to the developmental timing of interactions necessary to form primary attachments and also with regard to effects of shared genes on child attachment quality. In Bowlby's model, attachment-relevant behaviors and interactions are observable from the moment of birth, but for adoptive families, these interactions cannot begin until the child enters the family, sometimes several months or even years post-partum. Furthermore, because adoptive parents and adopted children do not usually share genes by common descent, any correspondence between attachment representations of the parent and secure base behavior of the child must arise as a consequence of dyadic interaction histories. The objectives of this study were to evaluate whether the child's age at the time of adoption or at the time of attachment assessment predicted child attachment security in adoptive families and also whether the adoptive mother's internal attachment representation predicted the child's attachment security. The participants were 106 mother - child dyads selected from the 406 adoptions carried out through the Lisbon Department of Adoption Services over a period of 3 years. The Attachment Behavior Q-Set (AQS; Waters, 1995) was used to assess secure base behavior and an attachment script representation task was used to assess the maternal attachment representations. Neither child's age at the time of adoption, nor age of the child at assessment significantly predicted the AQS security score; however, scores reflecting the presence and quality of maternal secure base scripts did predict AQS security. These findings support the notion that the transmission of attachment security across generations involves mutual exchanges and learning by the child and that the exchanges leading to secure attachment need not begin at birth. These results complement the findings and conceptual arguments offered by Bowlby and Ainsworth concerning the critical influence of maternal representations of attachment to the quality of attachment security in children.
Technosocial Predictive Analytics for Security Informatics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sanfilippo, Antonio P.; Gilbert, Nigel; Greaves, Mark
2012-08-22
Challenges to the security, health, and sustainable growth of our society keep escalating asymmetrically due to the growing pace of globalization and global change. The increasing velocity of information sharing, social networking, economic forces, and environmental change has resulted in a rapid increase in the number and frequency of “game-changing moments” that a community can face. Social movements that once took a decade to build now take a year; shifts in public opinion that once took a year to take root now take a couple of months. More and more frequently, these critical moments occur too suddenly for the affectedmore » communities to succeed in countering the consequent adversities or seizing the emerging opportunities. Now more than ever, we need anticipatory reasoning technologies to forecast and manage change in order to secure and improve our way of life and the environment we inhabit.« less
Establishment of CDC Global Rapid Response Team to Ensure Global Health Security.
Stehling-Ariza, Tasha; Lefevre, Adrienne; Calles, Dinorah; Djawe, Kpandja; Garfield, Richard; Gerber, Michael; Ghiselli, Margherita; Giese, Coralie; Greiner, Ashley L; Hoffman, Adela; Miller, Leigh Ann; Moorhouse, Lisa; Navarro-Colorado, Carlos; Walsh, James; Bugli, Dante; Shahpar, Cyrus
2017-12-01
The 2014-2016 Ebola virus disease epidemic in West Africa highlighted challenges faced by the global response to a large public health emergency. Consequently, the US Centers for Disease Control and Prevention established the Global Rapid Response Team (GRRT) to strengthen emergency response capacity to global health threats, thereby ensuring global health security. Dedicated GRRT staff can be rapidly mobilized for extended missions, improving partner coordination and the continuity of response operations. A large, agencywide roster of surge staff enables rapid mobilization of qualified responders with wide-ranging experience and expertise. Team members are offered emergency response training, technical training, foreign language training, and responder readiness support. Recent response missions illustrate the breadth of support the team provides. GRRT serves as a model for other countries and is committed to strengthening emergency response capacity to respond to outbreaks and emergencies worldwide, thereby enhancing global health security.
NASA Astrophysics Data System (ADS)
Wang, Tao; Huang, Peng; Zhou, Yingming; Liu, Weiqi; Zeng, Guihua
2018-01-01
In a practical continuous-variable quantum key distribution (CVQKD) system, real-time shot-noise measurement (RTSNM) is an essential procedure for preventing the eavesdropper exploiting the practical security loopholes. However, the performance of this procedure itself is not analyzed under the real-world condition. Therefore, we indicate the RTSNM practical performance and investigate its effects on the CVQKD system. In particular, due to the finite-size effect, the shot-noise measurement at the receiver's side may decrease the precision of parameter estimation and consequently result in a tight security bound. To mitigate that, we optimize the block size for RTSNM under the ensemble size limitation to maximize the secure key rate. Moreover, the effect of finite dynamics of amplitude modulator in this scheme is studied and its mitigation method is also proposed. Our work indicates the practical performance of RTSNM and provides the real secret key rate under it.
A Policy Language for Modelling Recommendations
NASA Astrophysics Data System (ADS)
Abou El Kalam, Anas; Balbiani, Philippe
While current and emergent applications become more and more complex, most of existing security policies and models only consider a yes/no response to the access requests. Consequently, modelling, formalizing and implementing permissions, obligations and prohibitions do not cover the richness of all the possible scenarios. In fact, several applications have access rules with the recommendation access modality. In this paper we focus on the problem of formalizing security policies with recommendation needs. The aim is to provide a generic domain-independent formal system for modelling not only permissions, prohibitions and obligations, but also recommendations. In this respect, we present our logic-based language, the semantics, the truth conditions, our axiomatic as well as inference rules. We also give a representative use case with our specification of recommendation requirements. Finally, we explain how our logical framework could be used to query the security policy and to check its consistency.
A secure EHR system based on hybrid clouds.
Chen, Yu-Yi; Lu, Jun-Chao; Jan, Jinn-Ke
2012-10-01
Consequently, application services rendering remote medical services and electronic health record (EHR) have become a hot topic and stimulating increased interest in studying this subject in recent years. Information and communication technologies have been applied to the medical services and healthcare area for a number of years to resolve problems in medical management. Sharing EHR information can provide professional medical programs with consultancy, evaluation, and tracing services can certainly improve accessibility to the public receiving medical services or medical information at remote sites. With the widespread use of EHR, building a secure EHR sharing environment has attracted a lot of attention in both healthcare industry and academic community. Cloud computing paradigm is one of the popular healthIT infrastructures for facilitating EHR sharing and EHR integration. In this paper, we propose an EHR sharing and integration system in healthcare clouds and analyze the arising security and privacy issues in access and management of EHRs.
NASA Astrophysics Data System (ADS)
Brown, Willie L., Jr.
Global terrorism continues to persist despite the great efforts of various countries to protect and safely secure their citizens. As airports form the entry and exit ports of a country, they are one of the most vulnerable locations to terror attacks. Managers of international airports constantly face similar challenges in developing and implementing airport security protocols. Consequently, the technological advances of today have brought both positive and negative impacts on security and terrorism of airports, which are mostly managed by the airport managers. The roles of the managers have greatly increased over the years due to technological advances. The developments in technology have had different roles in security, both in countering terrorism and, at the same time, increasing the communication methods of the terrorists. The purpose of this qualitative multiple case study was to investigate the perspectives of airport managers with regard to societal security and social interactions in the socio-technical systems of the National Terrorism Advisory System (NTAS). Through the data gained regarding managers' perception and experiences, the researcher hoped to enable the development of security measures and policies that are appropriate for airports as socio-technical systems. The researcher conducted interviews with airport managers to gather relevant data to fulfill the rationale of the study. Ten to twelve airport managers based in three commercial aviation airports in Maryland, United States participated in the study. The researcher used a qualitative thematic analysis procedure to analyze the data responses of participants in the interview sessions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miller, A.J.
The author concludes that it is probable that unconventional weapons and their associated delivery systems will form a permanent part of future political and strategic calculations in the Middle East. Some possible consequences of this situation can be divided into three classes: intra-regional, inter-regional and extra-regional. There is no doubt that Israel, driven by the need for security,precipitated the proliferation of unconventional weapons and of surface-to-surface missiles in the Middle East. It will now be driven to secure itself from the new threat to its security posed by its regional opponents. The most significant extra-regional consequence of developments in themore » Middle East may be further complication of great power arms control negotiations. To the re-discovery by the United States and the Soviet Union of their obligations under the Non-Proliferation Treaty to reduce the level of their nuclear weapons must now be added the desire to reduce, if not entirely eliminate, their chemical weapons stockpiles in advance of a global ban. It is possible that lesser powers will learn from the evidence of the great powers behavior, although that contradicts much of what we know of the psychology of decision making in international politics. What is necessary, though not necessarily sufficient, is that the U.S. and the USSR as the two external powers with potentially the greatest leverage, work together toward the resolution of the underlying causes of conflict in a region marked by more than a generation of competition between them.« less
Carlos-Rivera, Fernando; Aguilar-Madrid, Guadalupe; Gómez-Montenegro, Pablo Anaya; Juárez-Pérez, Cuauhtémoc A; Sánchez-Román, Francisco Raúl; Durcudoy Montandon, Jaqueline E A; Borja-Aburto, Víctor Hugo
2009-03-01
Data on the economic consequences of occupational injuries is scarce in developing countries which prevents the recognition of their economic and social consequences. This study assess the direct heath care costs of work-related accidents in the Mexican Institute of Social Security, the largest health care institution in Latin America, which covered 12,735,856 workers and their families in 2005. We estimated the cost of treatment for 295,594 officially reported occupational injuries nation wide. A group of medical experts devised treatment algorithms to quantify resource utilization for occupational injuries to which unit costs were applied. Total costs were estimated as the product of the cost per illness and the severity weighted incidence of occupational accidents. Occupational injury rate was 2.9 per 100 workers. Average medical care cost per case was $2,059 USD. The total cost of the health care of officially recognized injured workers was $753,420,222 USD. If injury rate is corrected for underreporting, the cost for formal injured workers is 791,216,460. If the same costs are applied for informal workers, approximately half of the working population in Mexico, the cost of healthcare for occupational injuries is about 1% of the gross domestic product. Health care costs of occupational accidents are similar to the economic direct expenditures to compensate death and disability in the social security system in Mexico. However, indirect costs might be as important as direct costs.
Roha, T A
1985-04-01
A federal appeals court recently ruled that a member of a Catholic religious institute assigned by her superiors to serve with a county hospital was subject to Social Security withholding on earnings from that service. Consequently, Catholic institute members will have Social Security taxes withheld whenever they serve with an entity not associated with the Church, that is, any entity not listed in the Official Catholic Directory. The ruling hinges on the contention that the sister could not have been "required" by her superiors to serve with the county hospital, since the hospital had final authority to determine who its employees would be, and that she thereby failed to qualify for the exception to Social Security withholding in Internal Revenue Code section 3121(b)(8)(A) for members of religious institutes performing service "'required" by their superiors. Because virtually all employers have this final authority, however, the appeals court's ruling leaves in doubt the perimeters of the exception to Social Security withholding in section 3121(b)(8)(A).
Security policy speculation of user uploaded images on content sharing sites
NASA Astrophysics Data System (ADS)
Iyapparaja, M.; Tiwari, Maneesh
2017-11-01
Innovation is developing step by step tremendously. As there are numerous social locales where information likes pictures, sound, video and so forth are shared by the client to each other. In concentrate to all exercises on social locales, there is need of protection to pictures. Because of this reason, I utilized Adaptive protection strategy forecast instrument to give security to the pictures. Issue identified with pictures is the huge issue in social locales like Facebook, twitter and so on. So here the part of a social thought, security to pictures, metadata and so on is produced. To conquer this issue we produced an answer which is 2 systems which understanding to a background marked by the pictures gives appropriated answer for them. Here we give an arrangement to the specific sort of pictures by characterizing them and in addition giving protection to pictures which are transferred agreement to a calculation that we utilized. Consequently as indicated by this arrangement expectation pictures take after a similar approach on up and coming pictures and give successful security to them.
High-Octane Mid-Level Ethanol Blend Market Assessment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Johnson, Caley; Newes, Emily; Brooker, Aaron
2015-12-01
The United States government has been promoting increased use of biofuels, including ethanol from non-food feedstocks, through policies contained in the Energy Independence and Security Act of 2007. The objective is to enhance energy security, reduce greenhouse gas (GHG) emissions, and provide economic benefits. However, the United States has reached the ethanol blend wall, where more ethanol is produced domestically than can be blended into standard gasoline. Nearly all ethanol is blended at 10 volume percent (vol%) in gasoline. At the same time, the introduction of more stringent standards for fuel economy and GHG tailpipe emissions is driving research tomore » increase the efficiency of spark ignition (SI) engines. Advanced strategies for increasing SI engine efficiency are enabled by higher octane number (more highly knock-resistant) fuels. Ethanol has a research octane number (RON) of 109, compared to typical U.S. regular gasoline at 91-93. Accordingly, high RON ethanol blends containing 20 vol% to 40 vol% ethanol are being extensively studied as fuels that enable design of more efficient engines. These blends are referred to as high-octane fuel (HOF) in this report. HOF could enable dramatic growth in the U.S. ethanol industry, with consequent energy security and GHG emission benefits, while also supporting introduction of more efficient vehicles. HOF could provide the additional ethanol demand necessary for more widespread deployment of cellulosic ethanol. However, the potential of HOF can be realized only if it is adopted by the motor fuel marketplace. This study assesses the feasibility, economics, and logistics of this adoption by the four required participants--drivers, vehicle manufacturers, fuel retailers, and fuel producers. It first assesses the benefits that could motivate these participants to adopt HOF. Then it focuses on the drawbacks and barriers that these participants could face when adopting HOF and proposes strategies--including incentives and policies--to curtail these barriers. These curtailment strategies are grouped into scenarios that are then modeled to investigate their feasibility and explore the dynamics involved in HOF deployment. This report does not advocate for or against incentives or policies, but presents simulations of their effects.« less
A Cyber Security Self-Assessment Method for Nuclear Power Plants
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.
2004-11-01
A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is amore » digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process.« less
USDA-ARS?s Scientific Manuscript database
The human population is projected to grow to 9-10 billion by the year 2050. As a consequence of the population explosion, food animal production must confront a new array of challenges including global food security, regulatory ban of antimicrobials, climate change, emerging infectious diseases, hi...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-30
.... Rights and warrants entitle owners to purchase shares of stock at predetermined prices subject to various timing and other conditions. Like options, the price of rights and warrants are affected by the price of... consequence, the prices of rights and warrants may move more dramatically than the prices of the underlying...
ERIC Educational Resources Information Center
Stephens, James H.; Parrillo, Anthony V.
2011-01-01
The confidentiality of a patient's information has been sacred since the days of Hippocrates, the Father of Medicine. Today, however, merely taking an oath to respect a patient's privacy has been overshadowed by regulations governing how certain healthcare establishments handle an individual's health information on the web. Consequently, if a…
ERIC Educational Resources Information Center
Long, Bridget A.
2012-01-01
As of 2012, 35,064 Missourians have filed for unemployment benefits and technical institutes are providing training that is becoming vitally important to secure employment in the 21st century. Marketing as a way of attracting prospective students to attend a vocational college is dependent on recruitment incentives. Consequently, the purpose of…
ERIC Educational Resources Information Center
Hirschland, Matthew J.; Steinmo, Sven
2003-01-01
Asserts that the debate over the appropriate federal role in education began with the founding of America. Argues that successive waves of educational reform are the products of the compromise between localism and national progressive goals. Consequently, a type of schizophrenia rather than a coherent and stable public policy characterizes…
76 FR 65061 - Manual for Courts-Martial; Proposed Evidence Amendments
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-19
... truth and securing a just determination. Rule 103. Rulings on Evidence (a) Preserving a Claim of Error... domestic law. If a domestic law is a fact that is of consequence to the determination of the action, the... with Mil. R. Evid. 104. Such a determination is a ruling on a question of law. Rule 301. Privilege...
This course focuses on water system adaptation to short-term and long-term climate and hydrologic stressors that affect water availability, water quality, security, and resilience. The course is organized into 15 sequential modules. The lectures will be augmented by weekly assign...
ERIC Educational Resources Information Center
Kutina, Kenneth L.; And Others
The effect of reduced reimbursements by the federal government for indirect research costs was analyzed for the typical academic medical center. The effects of simply cutting indirect cost reimbursement were contrasted with the impact of securing compensating levels of increased direct project support. To determine if the consequences differed as…
Analysis of Foreign Military Sales (FMS) in U.S. Army Acquisition Programs
2016-03-01
Consequently, the Army developed deeper relationships with partner security forces, such as those of Colombia , to help curtail drug production and buttress...organizations around the globe. Figure 5, M1A2 Unloading from C17, shows the massive M1A2 tank being offloaded on foreign soil . Figure 5. M1A2
The Intersectionality of Educational Inequalities and Child Poverty in Africa: A Deconstruction
ERIC Educational Resources Information Center
Tshabangu, Icarbord
2018-01-01
The developing world has continually faced tremendous challenges in providing social security and safety nets for its vast populations culminating in wider educational inequalities and extreme poverty. It is not uncommon in Sub-Saharan Africa to find rapacious wealth in the hands of a few co-existing with mass poverty. As a consequence, the…
From Kobe Bryant to Campus Rape
ERIC Educational Resources Information Center
Malveaux, Julianne
2004-01-01
Even though laws have been passed to protect young women--who are most at risk for rape--from sexual assault on campus, many young men think they can rape without consequence. Thus, the Campus Security Act of 1990 (now known as the Jerome Clery Act), which requires campuses to report serious crimes on campus, and the Campus Sexual Assault Victim's…
48 CFR 1352.237-70 - Security processing requirements-high or moderate risk contracts.
Code of Federal Regulations, 2011 CFR
2011-10-01
... requirements-high or moderate risk contracts. 1352.237-70 Section 1352.237-70 Federal Acquisition Regulations... Provisions and Clauses 1352.237-70 Security processing requirements—high or moderate risk contracts. As prescribed in 48 CFR 1337.110-70 (b), insert the following clause: Security Processing Requirements—High or...
Stephens, Susie M.; Chen, Jake Y.; Davidson, Marcel G.; Thomas, Shiby; Trute, Barry M.
2005-01-01
As database management systems expand their array of analytical functionality, they become powerful research engines for biomedical data analysis and drug discovery. Databases can hold most of the data types commonly required in life sciences and consequently can be used as flexible platforms for the implementation of knowledgebases. Performing data analysis in the database simplifies data management by minimizing the movement of data from disks to memory, allowing pre-filtering and post-processing of datasets, and enabling data to remain in a secure, highly available environment. This article describes the Oracle Database 10g implementation of BLAST and Regular Expression Searches and provides case studies of their usage in bioinformatics. http://www.oracle.com/technology/software/index.html PMID:15608287
NASA Astrophysics Data System (ADS)
Anema, P. C.; de Graaf, C. N.; Wilmink, J. B.; Hall, David R.; Hoekstra, A. G.; van Rijk, P. P.; Van Isselt, J. W.; Viergever, Max A.
1991-07-01
At the department of nuclear medicine of the University Hospital Utrecht a single-modality PACS has been operational since mid-1990. After one year of operation the functionality, the organizational and economical consequences, and the acceptability of the PACS were evaluated. The functional aspects reviewed were: viewing facilities, patient data management, connectivity, reporting facilities, archiving, privacy, and security. It was concluded that the improved quality of diagnostic viewing and the potential integration with diagnosis, reporting, and archiving are highly appreciated. The many problems that have occurred during the transition period, however, greatly influence the appreciation and acceptability of the PACS. Overall, it is felt that in the long term there will be a positive effect on the quality and efficiency of the work.
Health and Human Rights in Karen State, Eastern Myanmar.
Davis, William W; Mullany, Luke C; Shwe Oo, Eh Kalu; Richards, Adam K; Iacopino, Vincent; Beyrer, Chris
2015-01-01
Decades of conflict in eastern Myanmar have resulted in high prevalence of human rights violations and poor health outcomes. While recent ceasefire agreements have reduced conflict in this area, it is unknown whether this has resulted in concomitant reductions in human rights violations. We conducted a two-stage cluster survey of 686 households in eastern Myanmar to assess health status, access to healthcare, food security, exposure to human rights violations and identification of alleged perpetrators over the 12 months prior to January 2012, a period of near-absence of conflict in this region. Household hunger (FANTA-2 scale) was moderate/high in 91 (13.2%) households, while the proportion of households reporting food shortages in each month of 2011 ranged from 19.9% in December to 47.0% in September, with food insecurity peaking just prior to the harvest. Diarrhea prevalence in children was 14.2% and in everyone it was 5.8%. Forced labor was the most common human rights violation (185 households, 24.9%), and 210 households (30.6%) reported experiencing one or more human rights violations in 2011. Multiple logistic regression analysis identified associations between human rights violations and poor health outcomes. Human rights violations and their health consequences persist despite reduced intensity of conflict in eastern Myanmar. Ceasefire agreements should include language that protects human rights, and reconciliation efforts should address the health consequences of decades of human rights violations.
O'Campo, Patricia; Hwang, Stephen W; Gozdzik, Agnes; Schuler, Andrée; Kaufman-Shriqui, Vered; Poremski, Daniel; Lazgare, Luis Ivan Palma; Distasio, Jino; Belbraouet, Slimane; Addorisio, Sindi
2017-08-01
Individuals experiencing homelessness are particularly vulnerable to food insecurity. The At Home/Chez Soi study provides a unique opportunity to first examine baseline levels of food security among homeless individuals with mental illness and second to evaluate the effect of a Housing First (HF) intervention on food security in this population. At Home/Chez Soi was a 2-year randomized controlled trial comparing the effectiveness of HF compared with usual care among homeless adults with mental illness, stratified by level of need for mental health services (high or moderate). Logistic regressions tested baseline associations between food security (US Food Security Survey Module), study site, sociodemographic variables, duration of homelessness, alcohol/substance use, physical health and service utilization. Negative binomial regression determined the impact of the HF intervention on achieving levels of high or marginal food security over an 18-month follow-up period (6 to 24 months). Community settings at five Canadian sites (Moncton, Montreal, Toronto, Winnipeg and Vancouver). Homeless adults with mental illness (n 2148). Approximately 41 % of our sample reported high or marginal food security at baseline, but this figure varied with gender, age, mental health issues and substance use problems. High need participants who received HF were more likely to achieve marginal or high food security than those receiving usual care, but only at the Toronto and Moncton sites. Our large multi-site study demonstrated low levels of food security among homeless experiencing mental illness. HF showed promise for improving food security among participants with high levels of need for mental health services, with notable site differences.
From Secure Memories to Smart Card Security
NASA Astrophysics Data System (ADS)
Handschuh, Helena; Trichina, Elena
Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.
Energy Conversion in Natural and Artificial Photosynthesis
McConnell, Iain; Li, Gonghu; Brudvig, Gary W.
2010-01-01
Summary Modern civilization is dependent upon fossil fuels, a nonrenewable energy source originally provided by the storage of solar energy. Fossil fuel dependence has severe consequences including energy security issues and greenhouse gas emissions. The consequences of fossil fuel dependence could be avoided by fuel-producing artificial systems that mimic natural photosynthesis, directly converting solar energy to fuel. This review describes the three key components of solar energy conversion in photosynthesis: light harvesting, charge separation, and catalysis. These processes are compared in natural and artificial systems. Such a comparison can assist in understanding the general principles of photosynthesis and in developing working devices including photoelectrochemical cells for solar energy conversion. PMID:20534342
Milsom, Sophia A; Freestone, Mark; Duller, Rachel; Bouman, Marisa; Taylor, Celia
2014-04-01
Social climate has an influence on a number of treatment-related factors, including service users' behaviour, staff morale and treatment outcomes. Reliable assessment of social climate is, therefore, beneficial within forensic mental health settings. The Essen Climate Evaluation Schema (EssenCES) has been validated in forensic mental health services in the UK and Germany. Preliminary normative data have been produced for UK high-security national health services and German medium-security and high-security services. We aim to validate the use of the EssenCES scale (English version) and provide preliminary normative data in UK medium-security hospital settings. The EssenCES scale was completed in a medium-security mental health service as part of a service-wide audit. A total of 89 patients and 112 staff completed the EssenCES. The three-factor structure of the EssenCES and its internal construct validity were maintained within the sample. Scores from this medium-security hospital sample were significantly higher than those from earlier high-security hospital data, with three exceptions--'patient cohesion' according to the patients and 'therapeutic hold' according to staff and patients. Our data support the use of the EssenCES scale as a valid measure for assessing social climate within medium-security hospital settings. Significant differences between the means of high-security and medium-security service samples imply that degree of security is a relevant factor affecting the ward climate and that in monitoring quality of secure services, it is likely to be important to apply different scores to reflect standards. Copyright © 2013 John Wiley & Sons, Ltd.
ERIC Educational Resources Information Center
Bracy, Nicole L.
2009-01-01
Public schools have transformed significantly over the past several decades in response to broad concerns about rising school violence. Today's public schools are high security environments employing tactics commonly found in jails and prisons such as police officers, security cameras, identification systems, and secure building strategies.…
Spanish validation of the Domain-Specific Risk-Taking (DOSPERT-30) Scale.
Lozano, Luis M; Megías, Alberto; Catena, Andrés; Perales, José C; Baltruschat, Sabina; Cándido, Antonio
2017-02-01
The aim of the present study was to develop and validate a Spanish version of the short Domain-Specific Risk-Taking (DOSPERT-30) scale, measuring risk-taking behavior, risk perception, and expected beneficial consequences (from taking risks) in five life domains: ethics, finance, health/security, recreational, and social decisions. The scale was back-translated, and administered online to 826 participants. Validity evidence was tested using correlations with construct-related instruments (UPPS-P and SSS-V), as well as using factor analysis. Internal consistency reliability was calculated with the ordinal Alpha coefficient, and gender differences were considered. Internal consistency was good, and factor analysis confirmed the five factors proposed by the authors. With respect to the external validity, high correlations with the positive urgency and the sensation seeking subscales of the UPPS-P, as well as with the thrill and adventure seeking and disinhibition subscales of the SSS-V were found. Finally, gender differences were found in all subscales and domains, with men tending to take more risks, perceive less risk and expect more beneficial consequences, except for the social domain where an inverse pattern was found. As these findings are in line with the original version, they indicate the scale was successfully adapted.
Web Server Security on Open Source Environments
NASA Astrophysics Data System (ADS)
Gkoutzelis, Dimitrios X.; Sardis, Manolis S.
Administering critical resources has never been more difficult that it is today. In a changing world of software innovation where major changes occur on a daily basis, it is crucial for the webmasters and server administrators to shield their data against an unknown arsenal of attacks in the hands of their attackers. Up until now this kind of defense was a privilege of the few, out-budgeted and low cost solutions let the defender vulnerable to the uprising of innovating attacking methods. Luckily, the digital revolution of the past decade left its mark, changing the way we face security forever: open source infrastructure today covers all the prerequisites for a secure web environment in a way we could never imagine fifteen years ago. Online security of large corporations, military and government bodies is more and more handled by open source application thus driving the technological trend of the 21st century in adopting open solutions to E-Commerce and privacy issues. This paper describes substantial security precautions in facing privacy and authentication issues in a totally open source web environment. Our goal is to state and face the most known problems in data handling and consequently propose the most appealing techniques to face these challenges through an open solution.
The policy of import substitution as the basis for economic security and well-being of society
NASA Astrophysics Data System (ADS)
Makasheva, Yu S.; Makasheva, N. P.; Gromova, A. S.; Andreeva, N. V.; Ishtunov, S. A.
2016-09-01
The study presents the analysis of import substitution opportunities on separate branches of economic activity, preceding the realization of import substitution policy with the aim to support national economic security, which is essential for the contemporary society welfare insurance. Currently, social well-being is considered to be the reflection of economic activity, the instrument of state influence on the society, as well as an indicator of the social security system. Due to the fact that Russia is integrated into the world economy, the foreign-economic policy currently is playing an important role in the development of national security and the state's interest to the spheres of economy considering external and internal threats. Decline in external economic conditions may result in serious consequences for the functioning and development of the country as well as for the trade and investment activities, which will further lead to the decline in export, withdrawal of capital, recession of industrial production, trade and investment sphere, fall of GDP and living standards. Thus, considering the current state of instability in the world economy and the growing political tension in relation to Russian Federation, the measures to increase economic security in the country should be taken. The policy of import substitution is considered to be one of the major solutions nowadays.
The Potential Effects of Obesity on Social Security Claiming Behavior and Retirement Benefits.
Knoll, Melissa A Z; Shoffner, Dave; O'Leary, Samantha
2018-04-16
Obesity prevalence among Americans has increased for nearly three decades. We explore the relationship between the rise in obesity and Social Security retirement benefit claiming, a decision impacting nearly all aging Americans. Specifically, we investigate whether obesity can affect individuals' decision to claim benefits early, a choice that has important implications for financial security in retirement, particularly for those with lower socioeconomic status (SES). We use a microsimulation model called MINT6 (Modeling Income in the Near Term, version 6) to demonstrate the potential effects of obesity on subjective life expectancy and claiming behavior. We impute obesity status using data from the National Health and Nutrition Examination Survey (NHANES), which describes the distribution of obesity prevalence within the United States by gender, poverty status, and race/ethnicity. We find that the rise in obesity and the consequent incidence of obesity-related diseases may lead some individuals to make claiming decisions that lead to lower monthly and lifetime Social Security retirement benefits. Further, we find that the potential economic impact of this decision is larger for those with lower SES. We present a behavioral perspective by addressing the potential effects that obesity can have on individuals' retirement decisions and their resulting Social Security retirement benefits.
Protection of data carriers using secure optical codes
NASA Astrophysics Data System (ADS)
Peters, John A.; Schilling, Andreas; Staub, René; Tompkin, Wayne R.
2006-02-01
Smartcard technologies, combined with biometric-enabled access control systems, are required for many high-security government ID card programs. However, recent field trials with some of the most secure biometric systems have indicated that smartcards are still vulnerable to well equipped and highly motivated counterfeiters. In this paper, we present the Kinegram Secure Memory Technology which not only provides a first-level visual verification procedure, but also reinforces the existing chip-based security measures. This security concept involves the use of securely-coded data (stored in an optically variable device) which communicates with the encoded hashed information stored in the chip memory via a smartcard reader device.
ERIC Educational Resources Information Center
De Patta, Joe
2003-01-01
Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badwan, Faris M.; Demuth, Scott Francis; Miller, Michael Conrad
Small Modular Reactors (SMR) with power levels significantly less than the currently standard 1000 to 1600-MWe reactors have been proposed as a potential game changer for future nuclear power. SMRs may offer a simpler, more standardized, and safer modular design by using factory built and easily transportable components. Additionally, SMRs may be more easily built and operated in isolated locations, and may require smaller initial capital investment and shorter construction times. Because many SMRs designs are still conceptual and consequently not yet fixed, designers have a unique opportunity to incorporate updated design basis threats, emergency preparedness requirements, and then fullymore » integrate safety, physical security, and safeguards/material control and accounting (MC&A) designs. Integrating safety, physical security, and safeguards is often referred to as integrating the 3Ss, and early consideration of safeguards and security in the design is often referred to as safeguards and security by design (SSBD). This paper describes U.S./Russian collaborative efforts toward developing an internationally accepted common approach for implementing SSBD/3Ss for SMRs based upon domestic requirements, and international guidance and requirements. These collaborative efforts originated with the Nuclear Energy and Nuclear Security working group established under the U.S.-Russia Bilateral Presidential Commission during the 2009 Presidential Summit. Initial efforts have focused on review of U.S. and Russian domestic requirements for Security and MC&A, IAEA guidance for security and MC&A, and IAEA requirements for international safeguards. Additionally, example SMR design features that can enhance proliferation resistance and physical security have been collected from past work and reported here. The development of a U.S./Russian common approach for SSBD/3Ss should aid the designer of SMRs located anywhere in the world. More specifically, the application of this approach may lead to more proliferation resistant and physically secure design features for SMRs.« less
Murray, P K
1998-08-01
The unique structure, role and operations of government high-security (HS) laboratories which work on animal diseases are described, with particular reference to the laboratories of nine countries. High-security laboratories provide cost-effective insurance against catastrophic losses which could occur following exotic disease outbreaks. The importance of these laboratories is reflected in the fact that several new laboratories have recently been constructed at considerable expense and older facilities have undergone major renovations. Biosecurity is fundamental to the operation of high-security laboratories, so good facility design and microbiological security practices are very important. High-security laboratories conduct exotic disease diagnosis, certification and surveillance, and also perform research into virology, disease pathogenesis and improvements to diagnostic tests and vaccines. The mandate of these laboratories includes the training of veterinarians in the recognition of exotic diseases. One extremely important role is the provision of expert advice on exotic diseases and participation (both nationally and internationally) in policy decisions regarding animal disease issues.
ERIC Educational Resources Information Center
Nazi, Kim M.
2012-01-01
Personal Health Records (PHRs) and PHR systems have been designed as consumer-oriented tools to empower patients and improve health care. Despite significant consumer interest and anticipated benefits, adoption remains low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications…
2007-03-01
result , the Army, with these additional resources, will expand the rotational force pool to include 76 BCTs (48 AC BCTs and 28 ARNG BCTs) 4 • 2007...continue full-spectrum operations in persistent confl ict. ARFORGEN is the structured progression of increased unit readiness over time, resulting in...to civil authorities including Homeland Security, Humanitarian Assistance, Disaster Relief, and Consequence Management Operations. Units in the
ERIC Educational Resources Information Center
Davies, Patrick T.; Martin, Meredith J.; Sturge-Apple, Melissa L.; Ripple, Michael T.; Cicchetti, Dante
2016-01-01
Two studies tested hypotheses about the distinctive psychological consequences of children's patterns of responding to interparental conflict. In Study 1, 174 preschool children (M = 4.0 years) and their mothers participated in a cross-sectional design. In Study 2, 243 preschool children (M = 4.6 years) and their parents participated in 2 annual…
USDA-ARS?s Scientific Manuscript database
The human population is projected to grow to 9-10 billion by the year 2050. As a consequence of the population explosion, food animal production must confront a new array of challenges. Among these are global food security, climate change, emerging infectious diseases, regulatory ban of antimicrobi...
ERIC Educational Resources Information Center
Lin, Zeng; Sweet, Robert; Anisef, Paul
2003-01-01
Analyses suggest that the Canadian labor market favors vocational over liberal graduates with regard to employment status, income, job security, and job satisfaction. However, findings also indicate a surprising lack of difference between liberal and vocational graduates in their employability skills. Employers were nevertheless more likely to…
SPECIAL PURPOSE IT DERAILED: UNINTENDED CONSEQUENCES OF UNIVERSAL IT LAWS AND POLICIES
2017-10-26
Information Services Division ........................ 3 Figure 2: iNET Instrumentation Telemetry Ground Station...consolidate local Information Technology (IT) networks into an enterprise architecture to reduce costs and to increase security. Leadership coined this...IT network was established to link Air Force and contractor sites to seamlessly share program information . So when Air Force IT leadership tried to
Charging of Space Debris and Their Dynamical Consequences
2016-01-08
field of plasmas and space physics . 15. SUBJECT TERMS Space Plasma Physics , Space Debris 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT...opens up potential new areas of fundamental and applied research in the field of plasmas and space physics ...object in a plasma”, accepted for publication in Physics of Plasmas. (attached as Annexure III) For details on (iv) please refer to the
A Review of the Extent, Nature, Characteristics and Effects of Bullying Behaviour in Schools
ERIC Educational Resources Information Center
Aluede, Oyaziwo; Adeleke, Fajoju; Omoike, Don; Afen-Akpaida, Justina
2008-01-01
Bullying behaviour no doubt is becoming a common feature, and a nightmare in schools all over the world. It is a worrisome practice in schools because it infringes on the child's right to human dignity, privacy, freedom and security. The physical, emotional and educational consequences of bullying behaviour can never be underestimated. Therefore,…
Regionalism, Security and Cooperation in Oceania
2015-06-01
storm damage). Potential second-order consequences include economic loss from these events, declining revenues from tourism , and emigration to escape... gover - nance, and political and economic structural reforms. Such confidence is boosted by China’s own developmental experiences and the positive...Cooperation in Oceania Introduction Australia, by dint of geography, trade and investment links, tourism , aid, defense assets and sport, has exercised a
1990-09-01
consequences contributed to the plan of universal service. Although the Communication Act of 1934 embraced the idea of regulation that provided market security...electronic communication device in use today. Because of this, the military is heavily reliant on the telephone system and considers it the primary voice... communications medium. Furthermore, % recent technological advances will dramatically change the telephone as we know it today. This thesis will take
Afghanistan: Another American Tragedy of Strategic Miscalculations
2014-04-09
relationships, defines security objectives, processes information, organizes force structures, develops new theories , and creates doctrine.9...Afghanistan’s political and strategic culture, the United States will need to profoundly change the American view of time, combat, success, and victory as...operations in 2001, but in the aftermath of 9-11, the emotional need for retaliation overrode rational thoughts of long-term consequences.31 Advisors
ERIC Educational Resources Information Center
Jeria Caceres, Maria Mercedes
2002-01-01
Conditional multiple correspondence analysis of data from workers in Argentina, Brazil, and Chile found that training was a consequence rather than a cause of promotion. More job training resulted in increased salary and benefits as well as in greater costs such as hours of work and work-related insecurity. (Contains 21 references.) (JOW)
A Strategy for American Power: Energy, Climate and National Security
2008-06-01
principle applies to the suppliers of energy, particularly oil, since the United States gets...outlined four principles : • Human-induced climate change is real; • The consequences of climate change will be significant and will hit the poor...savings, in terms of higher macroeconomic output in times of energy price volatility, associated with the development of nuclear capacity in Japan.
DoD Nuclear Weapons Personnel Reliability Assurance
2016-04-27
destructive power, and the potential consequences of an accident or unauthorized act. Assured nuclear weapons safety, security, and control remain of...DOD INSTRUCTION 5210.42 DOD NUCLEAR WEAPONS PERSONNEL RELIABILITY ASSURANCE Originating Component: Office of the Under Secretary of...from the DoD Issuances Website at http://www.dtic.mil/whs/directives. Reissues and renames: DoD Instruction 5210.42, “ Nuclear Weapons Personnel
Regime shift in fertilizer commodities indicates more turbulence ahead for food security.
Elser, James J; Elser, Timothy J; Carpenter, Stephen R; Brock, William A
2014-01-01
Recent human population increase has been enabled by a massive expansion of global agricultural production. A key component of this "Green Revolution" has been application of inorganic fertilizers to produce and maintain high crop yields. However, the long-term sustainability of these practices is unclear given the eutrophying effects of fertilizer runoff as well as the reliance of fertilizer production on finite non-renewable resources such as mined phosphate- and potassium-bearing rocks. Indeed, recent volatility in food and agricultural commodity prices, especially phosphate fertilizer, has raised concerns about emerging constraints on fertilizer production with consequences for its affordability in the developing world. We examined 30 years of monthly prices of fertilizer commodities (phosphate rock, urea, and potassium) for comparison with three food commodities (maize, wheat, and rice) and three non-agricultural commodities (gold, nickel, and petroleum). Here we show that all commodity prices, except gold, had significant change points between 2007-2009, but the fertilizer commodities, and especially phosphate rock, showed multiple symptoms of nonlinear critical transitions. In contrast to fertilizers and to rice, maize and wheat prices did not show significant signs of nonlinear dynamics. From these results we infer a recent emergence of a scarcity price in global fertilizer markets, a result signaling a new high price regime for these essential agricultural inputs. Such a regime will challenge on-going efforts to establish global food security but may also prompt fertilizer use practices and nutrient recovery strategies that reduce eutrophication.
Regime Shift in Fertilizer Commodities Indicates More Turbulence Ahead for Food Security
Elser, James J.; Elser, Timothy J.; Carpenter, Stephen R.; Brock, William A.
2014-01-01
Recent human population increase has been enabled by a massive expansion of global agricultural production. A key component of this “Green Revolution” has been application of inorganic fertilizers to produce and maintain high crop yields. However, the long-term sustainability of these practices is unclear given the eutrophying effects of fertilizer runoff as well as the reliance of fertilizer production on finite non-renewable resources such as mined phosphate- and potassium-bearing rocks. Indeed, recent volatility in food and agricultural commodity prices, especially phosphate fertilizer, has raised concerns about emerging constraints on fertilizer production with consequences for its affordability in the developing world. We examined 30 years of monthly prices of fertilizer commodities (phosphate rock, urea, and potassium) for comparison with three food commodities (maize, wheat, and rice) and three non-agricultural commodities (gold, nickel, and petroleum). Here we show that all commodity prices, except gold, had significant change points between 2007–2009, but the fertilizer commodities, and especially phosphate rock, showed multiple symptoms of nonlinear critical transitions. In contrast to fertilizers and to rice, maize and wheat prices did not show significant signs of nonlinear dynamics. From these results we infer a recent emergence of a scarcity price in global fertilizer markets, a result signaling a new high price regime for these essential agricultural inputs. Such a regime will challenge on-going efforts to establish global food security but may also prompt fertilizer use practices and nutrient recovery strategies that reduce eutrophication. PMID:24787624
Arundel, Rowan; Doling, John
2017-01-01
With continued economic growth and expanding mortgage markets, until recently the pattern across advanced economies was of growing homeownership sectors. The Great Financial Crisis (GFC) has however, undercut this growth resulting in the contraction of homeownership access in many countries and the revival of private renting. This paper argues that these tenure changes are not solely a consequence of the GFC, and therefore, reversible once long-term growth returns. Rather, they are the consequences of more fundamental changes especially in labour markets. The very financialisation that fuelled the growth of homeownership has also led to a hollowing out of well-paid, secure jobs-exactly those that fit best with the taking of housing loans. We examine longer-term declines in labour market security across Europe from before the GFC, identifying an underlying correlation between deteriorated labour market conditions and homeownership access for young adults. While variations exist across European countries, there is evidence of common trends. We argue that the GFC both accelerated pre-existing labour insecurity dynamics and brought an end to offsetting such dynamics through the expansion of credit access with the likelihood of a return to an era of widespread homeownership growth starkly decreased.
[A health system's neoliberal reform: evidence from the Mexican case].
López-Arellano, Oliva; Jarillo-Soto, Edgar C
2017-07-27
This study addressed the shaping of Mexico's health system in recent years, with an analysis of the social determination conditioning the system's current formulation, the consequences for the population's living and working conditions, and the technical and legal reform measures that shaped the system's transformation. The article then analyzes the survival of social security institutions and the introduction of an individual insurance model and its current implications and consequences. From the perspective of the right to health, the article compares the measures, resources, and interventions in both health care models and highlights the relevance of the social security system for Popular Insurance. The article concludes that the measures implemented to reform the Mexican health system have failed to achieve the intended results; on the contrary, they have led to a reduction in interventions, rising costs, and a decrease in the installed capacity and professional personnel for the system's operation, thus falling far short of solving the problem, rather aggravating the inequities without solving the system's structural contradictions. Health systems face new challenges, inevitably requiring that the analyses be situated in a broader framework rather than merely focusing on the functional, administrative, and financial operation of the systems in the respective countries.
Quantum protocols within Spekkens' toy model
NASA Astrophysics Data System (ADS)
Disilvestro, Leonardo; Markham, Damian
2017-05-01
Quantum mechanics is known to provide significant improvements in information processing tasks when compared to classical models. These advantages range from computational speedups to security improvements. A key question is where these advantages come from. The toy model developed by Spekkens [R. W. Spekkens, Phys. Rev. A 75, 032110 (2007), 10.1103/PhysRevA.75.032110] mimics many of the features of quantum mechanics, such as entanglement and no cloning, regarded as being important in this regard, despite being a local hidden variable theory. In this work, we study several protocols within Spekkens' toy model where we see it can also mimic the advantages and limitations shown in the quantum case. We first provide explicit proofs for the impossibility of toy bit commitment and the existence of a toy error correction protocol and consequent k -threshold secret sharing. Then, defining a toy computational model based on the quantum one-way computer, we prove the existence of blind and verified protocols. Importantly, these two last quantum protocols are known to achieve a better-than-classical security. Our results suggest that such quantum improvements need not arise from any Bell-type nonlocality or contextuality, but rather as a consequence of steering correlations.
Impacts of climate change on marine organisms and ecosystems.
Brierley, Andrew S; Kingsford, Michael J
2009-07-28
Human activities are releasing gigatonnes of carbon to the Earth's atmosphere annually. Direct consequences of cumulative post-industrial emissions include increasing global temperature, perturbed regional weather patterns, rising sea levels, acidifying oceans, changed nutrient loads and altered ocean circulation. These and other physical consequences are affecting marine biological processes from genes to ecosystems, over scales from rock pools to ocean basins, impacting ecosystem services and threatening human food security. The rates of physical change are unprecedented in some cases. Biological change is likely to be commensurately quick, although the resistance and resilience of organisms and ecosystems is highly variable. Biological changes founded in physiological response manifest as species range-changes, invasions and extinctions, and ecosystem regime shifts. Given the essential roles that oceans play in planetary function and provision of human sustenance, the grand challenge is to intervene before more tipping points are passed and marine ecosystems follow less-buffered terrestrial systems further down a spiral of decline. Although ocean bioengineering may alleviate change, this is not without risk. The principal brake to climate change remains reduced CO(2) emissions that marine scientists and custodians of the marine environment can lobby for and contribute to. This review describes present-day climate change, setting it in context with historical change, considers consequences of climate change for marine biological processes now and in to the future, and discusses contributions that marine systems could play in mitigating the impacts of global climate change.
Continued Endemic Wild Poliovirus Transmission in Security-Compromised Areas - Nigeria, 2016.
Nnadi, Chimeremma; Damisa, Eunice; Esapa, Lisa; Braka, Fiona; Waziri, Ndadilnasiya; Siddique, Anisur; Jorba, Jaume; Nganda, Gatei Wa; Ohuabunwo, Chima; Bolu, Omotayo; Wiesen, Eric; Adamu, Usman
2017-02-24
On August 10, 2016, 2 years after the most recent wild poliovirus (WPV) case was reported in Nigeria (in July 2014) (1), two WPV cases were reported in the northeastern state of Borno, which has been severely affected by insurgency-related insecurity since 2013. On September 9 and 26, 2016, two additional WPV cases were reported in Borno in children whose families migrated from security-compromised, inaccessible areas of the state. All four cases were WPV serotype 1 (WPV1), with genetic differences indicating prolonged undetected transmission. A large-scale emergency response plan was developed and implemented. The plan initially called for vaccination of 815,791 children during August 15-18 in five local government areas (LGAs) in the immediate vicinity of the first two WPV cases. Subsequently, the plan was expanded to regionally synchronized supplementary immunization activities (SIAs), conducted during August 27-December 6 in five Lake Chad basin countries at increased risk for national and regional WPV1 transmission (Cameroon, Central African Republic, Chad, Niger, and Nigeria). In addition, retrospective searches for missed cases of acute flaccid paralysis (AFP), enhanced environmental surveillance for polioviruses, and polio surveillance system reviews were conducted. Prolonged undetected WPV1 transmission in Borno State is a consequence of low population immunity and severe surveillance limitations associated with insurgency-related insecurity and highlights the risk for local and international WPV spread (2). Increasing polio vaccination coverage and implementing high-quality polio surveillance, especially among populations in newly secured and difficult-to-access areas in Borno and other Lake Chad basin areas are urgently needed.
Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar
NASA Astrophysics Data System (ADS)
Botel, Gabriel
This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive literature in human security rarely applied in this context. This includes a brief review of human security and Sino-Myanmar relations, and is grounded in an empirical analysis of Chinese investment in Myanmar's hydropower and oil and gas sectors. Ultimately, this thesis argues that, while insightful, many traditional interpretations of Sino-Myanmar energy cooperation overlook the security interests of those worst affected. Furthermore, that the worst excesses of Chinese companies in Myanmar are not unique to China, but common across all investors in the regime, Western or otherwise.
Völlm, Birgit A; Edworthy, Rachel; Huband, Nick; Talbot, Emily; Majid, Shazmin; Holley, Jessica; Furtado, Vivek; Weaver, Tim; McDonald, Ruth; Duggan, Conor
2018-01-01
Background: Many patients experience extended stays within forensic care, but the characteristics of long-stay patients are poorly understood. Aims: To describe the characteristics of long-stay patients in high and medium secure settings in England. Method: Detailed file reviews provided clinical, offending and risk data for a large representative sample of 401 forensic patients from 2 of the 3 high secure settings and from 23 of the 57 medium secure settings in England on 1 April 2013. The threshold for long-stay status was defined as 5 years in medium secure care or 10 years in high secure care, or 15 years in a combination of high and medium secure settings. Results: 22% of patients in high security and 18% in medium security met the definition for "long-stay," with 20% staying longer than 20 years. Of the long-stay sample, 58% were violent offenders (22% both sexual and violent), 27% had been convicted for violent or sexual offences whilst in an institutional setting, and 26% had committed a serious assault on staff in the last 5 years. The most prevalent diagnosis was schizophrenia (60%) followed by personality disorder (47%, predominantly antisocial and borderline types); 16% were categorised as having an intellectual disability. Overall, 7% of the long-stay sample had never been convicted of any offence, and 16.5% had no index offence prompting admission. Although some significant differences were found between the high and medium secure samples, there were more similarities than contrasts between these two levels of security. The treatment pathways of these long-stay patients involved multiple moves between settings. An unsuccessful referral to a setting of lower security was recorded over the last 5 years for 33% of the sample. Conclusions: Long-stay patients accounted for one fifth of the forensic inpatient population in England in this representative sample. A significant proportion of this group remain unsettled. High levels of personality pathology and the risk of assaults on staff and others within the care setting are likely to impact on treatment and management. Further research into the treatment pathways of longer stay patients is warranted to understand the complex trajectories of this group.
Völlm, Birgit A.; Edworthy, Rachel; Huband, Nick; Talbot, Emily; Majid, Shazmin; Holley, Jessica; Furtado, Vivek; Weaver, Tim; McDonald, Ruth; Duggan, Conor
2018-01-01
Background: Many patients experience extended stays within forensic care, but the characteristics of long-stay patients are poorly understood. Aims: To describe the characteristics of long-stay patients in high and medium secure settings in England. Method: Detailed file reviews provided clinical, offending and risk data for a large representative sample of 401 forensic patients from 2 of the 3 high secure settings and from 23 of the 57 medium secure settings in England on 1 April 2013. The threshold for long-stay status was defined as 5 years in medium secure care or 10 years in high secure care, or 15 years in a combination of high and medium secure settings. Results: 22% of patients in high security and 18% in medium security met the definition for “long-stay,” with 20% staying longer than 20 years. Of the long-stay sample, 58% were violent offenders (22% both sexual and violent), 27% had been convicted for violent or sexual offences whilst in an institutional setting, and 26% had committed a serious assault on staff in the last 5 years. The most prevalent diagnosis was schizophrenia (60%) followed by personality disorder (47%, predominantly antisocial and borderline types); 16% were categorised as having an intellectual disability. Overall, 7% of the long-stay sample had never been convicted of any offence, and 16.5% had no index offence prompting admission. Although some significant differences were found between the high and medium secure samples, there were more similarities than contrasts between these two levels of security. The treatment pathways of these long-stay patients involved multiple moves between settings. An unsuccessful referral to a setting of lower security was recorded over the last 5 years for 33% of the sample. Conclusions: Long-stay patients accounted for one fifth of the forensic inpatient population in England in this representative sample. A significant proportion of this group remain unsettled. High levels of personality pathology and the risk of assaults on staff and others within the care setting are likely to impact on treatment and management. Further research into the treatment pathways of longer stay patients is warranted to understand the complex trajectories of this group. PMID:29713294
The research of computer network security and protection strategy
NASA Astrophysics Data System (ADS)
He, Jian
2017-05-01
With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.
Secrecy vs. the need for ecological information: challenges to environmental activism in Russia.
Jandl, T
1998-01-01
This article identifies the lessons learned from the Nikitin case study in Russia. The Nikitin case involves the analysis of sources of radioactive contamination in several Russian counties and in the Russian Northern Fleet. Norway was interested in the issue due to proximity to the storage sites. The issue involved national security and environmental protection. It was learned that mixing national security issues with environmental issues offers dangerous and multiple challenges. Environmental groups must build relationships with a wide audience. International security policy must include the issues of globalization of trade and the spread of environmental problems into the global commons (oceans and atmosphere). The risk of an environmentally dangerous accident as a consequence of Cold War activities is greater than the risk of nuclear war. Secrecy in military affairs is not justified when there is inadequate storage of nuclear weapons and contaminated materials. In Russia, the concern is great due to their economic transition and shortages of funds for even the most basic needs, which excludes nuclear waste clean up. The Bellona Foundation studied the extent of nuclear pollution from military nuclear reactors in the Kola peninsula of northwest Russia, in 1994 and 1996. Russian security police arrested one of the report authors for alleged national security violations. A valuable lesson learned was that local Russian environmental groups needed international support. The military nuclear complex poses an enormous hazard. Limiting inspections is an unacceptable national security risk. The new Russian law on state secrets is too broad.
Patient characteristics and outcome measurement in a low secure forensic hospital.
Longdon, Laura; Edworthy, Rachel; Resnick, Jeremy; Byrne, Adrian; Clarke, Martin; Cheung, Natalie; Khalifa, Najat
2018-06-01
Health services are increasingly required to measure outcomes after treatment, which can be reported to the funding body and may be scrutinised by the public. Extensive high-quality measurements are time consuming. Routinely collected clinical data might, if anonymised, provide good enough evidence of useful change consequent on service received. Do the Health of the Nation Scale and the 20-item Historical, Clinical, Risk structured professional judgement tool scores provide evidence of clinical and risk change among low security hospital patients at 6 and 12 months after admission? One hundred and eight men were either resident on the unit on 1 January 2011 or new admissions to the census date of 31 May 2013. Their routinely collected data were added to an outcome register following each patient's Care Programme Approach clinical review meeting and analysed using repeated measures t-tests with Bonferroni corrections. Most of the men, mean age 34.3 years, were single (93%), White British (71%) and with a primary diagnosis of schizophrenia (62%). There were significant reductions in the 11-item Health of the Nation Scale (excluding the community living condition scale) scores between baseline and 6 months and between 6 and 12 months, but no change on its additional 7-item secure subscale. Individual effect sizes indicated that 39% of the men had better social function, although 18% had deteriorated at 6 months. There was little overall change in the 20-item Historical, Clinical, Risk; individual effect sizes indicated that 11 men (15%) were rated as being at lower risk level and 10 (14%) at higher after 6 months in the study. Standard clinical measures are promising as indicators of change in low security hospital patients. Risk ratings may be conservative, but at this stage of a secure hospital admission, higher scores may be as likely to indicate progress in identifying and quantifying risks as apparent increase in risk. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.
The AI Bus architecture for distributed knowledge-based systems
NASA Technical Reports Server (NTRS)
Schultz, Roger D.; Stobie, Iain
1991-01-01
The AI Bus architecture is layered, distributed object oriented framework developed to support the requirements of advanced technology programs for an order of magnitude improvement in software costs. The consequent need for highly autonomous computer systems, adaptable to new technology advances over a long lifespan, led to the design of an open architecture and toolbox for building large scale, robust, production quality systems. The AI Bus accommodates a mix of knowledge based and conventional components, running on heterogeneous, distributed real world and testbed environment. The concepts and design is described of the AI Bus architecture and its current implementation status as a Unix C++ library or reusable objects. Each high level semiautonomous agent process consists of a number of knowledge sources together with interagent communication mechanisms based on shared blackboards and message passing acquaintances. Standard interfaces and protocols are followed for combining and validating subsystems. Dynamic probes or demons provide an event driven means for providing active objects with shared access to resources, and each other, while not violating their security.
ERIC Educational Resources Information Center
Thomas, S. D.; Dolan, M.; Johnston, S.; Middleton, H.; Harty, M. A.; Carlisle, J.; Thornicroft, G.; Appleby, L.; Jones, P.
2004-01-01
Previous studies have suggested that a substantial proportion of the patients with intellectual disabilities (ID) in the high security psychiatric hospitals (HSPHs) should be transferred to more appropriate services to cater for their specific needs in the longer term. The individual and placement needs of high secure psychiatric patients detained…
Determinants of Child Attachment in the Years Postpartum in a High-Risk Sample of Immigrant Women.
Lecompte, Vanessa; Rousseau, Cécile
2017-10-07
Our goal was to examine maternal mental health and associated stresses in a sample of high-risk immigrant mothers, and its association with child insecure attachment in the years following childbirth. Mothers and their child (Mage = 37 months) were recruited through a Health and Social Service organization in the Parc-Extension neighborhood in Montreal, Quebec. Mothers completed the Hopkins Symptoms Checklist (HSCL-25), the Multidimensional Scale of Perceived Social Support (MPSS) and a sociodemographic questionnaire that included questions on premature delivery and birth weight. Attachment behaviors were coded out of a videotaped free play sequence using the Preschool and Early School-Age Attachment Rating Scales (PARS). Analysis revealed high levels of clinical anxiety and depression, low social support and low attachment security. Significant mean differences and associations were found between anxiety, depression, social support, preterm delivery and child attachment. These results underscore the importance of screening for anxiety and depression early in the postnatal years, in order to prevent associated consequences such as child insecure attachment. Results also highlight the importance of building positive social networks, especially with immigrant populations.
The effects of malicious nodes on performance of mobile ad hoc networks
NASA Astrophysics Data System (ADS)
Li, Fanzhi; Shi, Xiyu; Jassim, Sabah; Adams, Christopher
2006-05-01
Wireless ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, their topology is dynamically changing, and every mobile node can receive messages from its neighbors and can be contacted by all other nodes in its neighborhood. This poses a great danger to network security if some nodes behave in a malicious manner. The immediate concern about the security in this type of networks is how to protect the network and the individual mobile nodes against malicious act of rogue nodes from within the network. This paper is concerned with security aspects of wireless ad hoc networks. We shall present results of simulation experiments on ad hoc network's performance in the presence of malicious nodes. We shall investigate two types of attacks and the consequences will be simulated and quantified in terms of loss of packets and other factors. The results show that network performance, in terms of successful packet delivery ratios, significantly deteriorates when malicious nodes act according to the defined misbehaving characteristics.
Kim, Sanghag; Kochanska, Grazyna
2017-09-01
Despite emotion researchers' strong interest in empathy and its implications for prosocial functioning, surprisingly few studies have examined parent-child attachment as a context for early origins of empathy in young children. Consequently, empirical evidence on links among children's attachment, empathy, and prosociality is thin and inconsistent. We examined such links in 2 longitudinal studies of community families (Family Study, N = 101 mothers, fathers, and children, 14 to 80 months; Parent-Child Study, mothers and children, N = 108, 15 to 45 months) and a study of low-income, diverse mothers and toddlers (Play Study, N = 186, 30 months). Children's security was assessed in Strange Situation in infancy and rated by observers and mothers using Attachment Q-Set at toddler age. Children's empathy was observed in scripted probes that involved parental simulated distress. Children's prosociality was rated by parents (Family Study, Play Study). Security with mothers related to higher empathy. For mother- and father-child dyads, security moderated the path from empathy to prosociality. For insecure children, but not secure ones, variations in empathy related to prosociality. Insecure and unempathic children were particularly low in prosociality. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
NASA Astrophysics Data System (ADS)
Riesmeier, Joerg; Eichelberg, Marco; Kleber, Klaus; Groenemeyer, Dietrich H.; Oosterwijk, Herman J.; Jensch, Peter F.
2002-05-01
With the release of 'DICOM Structured Reporting' (SR) as an official extension of the standard about two years ago, DICOM has entered a new domain that is only indirectly related to medical imaging. Basically, DICOM SR is a general model allowing to encode medical reports in a structured manner in DICOM's tag-based format. Therefore, the existing DICOM infrastructure can be used to archive and communicate structured reports, with only relatively small changes to existing systems. As a consequence of the introduction of medical reports in a digital form, the relevance of security measures increases significantly. We have developed a prototype implementation of DICOM structured reporting together with the new security extensions for secure transport connections and digital signatures. The application allows to create, read and modify any SR document, to digitally sign an SR document in whole or part and to transmit such documents over a network. While the secure transport connection protects data from modifications or unauthorized access only during transmission, digital signatures provide a lifetime integrity check and, therefore, maintain the legal document status of structured reports. The application has been successfully demonstrated at RSNA 2000 and ECR 2001, and is freely available on the Internet.
Wilson, Kumanan; Fidler, David P; McDougall, Christopher W; Lazar, Harvey
2009-06-01
The public health consequences of the conflict in Iraq will likely continue after the violence has subsided. Reestablishing public health security will require large investments in infrastructure and the creation of effective systems of governance. On the question of governance, the allocation of powers in the new constitution of Iraq is critical. Given the ease with which public health threats cross borders, the constitution needs to grant to the federal government the legal authority to manage such threats and simultaneously meet international requirements. Unfortunately, the draft constitution does not accomplish this objective. If politically possible, the constitution should be amended to provide the federal government with this authority. If not possible, the Iraqi federal government would have two options. It could attempt to use alternative constitutional powers, such as national security powers. This option would be contentious and the results uncertain. Alternatively, the federal government could attempt to establish collaborative relationships with regional governments. Residual sectarian tensions create potential problems for this option, however. Reflecting on the Iraqi situation, we conclude that other federalizing countries emerging from conflict should ensure that their constitutions provide the federal government with the necessary authority to manage threats to public health security effectively.
Energy conversion in natural and artificial photosynthesis.
McConnell, Iain; Li, Gonghu; Brudvig, Gary W
2010-05-28
Modern civilization is dependent upon fossil fuels, a nonrenewable energy source originally provided by the storage of solar energy. Fossil-fuel dependence has severe consequences, including energy security issues and greenhouse gas emissions. The consequences of fossil-fuel dependence could be avoided by fuel-producing artificial systems that mimic natural photosynthesis, directly converting solar energy to fuel. This review describes the three key components of solar energy conversion in photosynthesis: light harvesting, charge separation, and catalysis. These processes are compared in natural and in artificial systems. Such a comparison can assist in understanding the general principles of photosynthesis and in developing working devices, including photoelectrochemical cells, for solar energy conversion. 2010 Elsevier Ltd. All rights reserved.
Barrett, Damon
2010-03-01
This commentary addresses some of the challenges posed by the broader normative, legal and policy framework of the United Nations for the international drug control system. The 'purposes and principles' of the United Nations are presented and set against the threat based rhetoric of the drug control system and the negative consequences of that system. Some of the challenges posed by human rights law and norms to the international drug control system are also described, and the need for an impact assessment of the current system alongside alternative policy options is highlighted as a necessary consequence of these analyses. Copyright (c) 2010 Elsevier B.V. All rights reserved.
Sabotage at Nuclear Power Plants
DOE Office of Scientific and Technical Information (OSTI.GOV)
Purvis, James W.
1999-07-21
Recently there has been a noted worldwide increase in violent actions including attempted sabotage at nuclear power plants. Several organizations, such as the International Atomic Energy Agency and the US Nuclear Regulatory Commission, have guidelines, recommendations, and formal threat- and risk-assessment processes for the protection of nuclear assets. Other examples are the former Defense Special Weapons Agency, which used a risk-assessment model to evaluate force-protection security requirements for terrorist incidents at DOD military bases. The US DOE uses a graded approach to protect its assets based on risk and vulnerability assessments. The Federal Aviation Administration and Federal Bureau of Investigationmore » conduct joint threat and vulnerability assessments on high-risk US airports. Several private companies under contract to government agencies use formal risk-assessment models and methods to identify security requirements. The purpose of this paper is to survey these methods and present an overview of all potential types of sabotage at nuclear power plants. The paper discusses emerging threats and current methods of choice for sabotage--especially vehicle bombs and chemical attacks. Potential consequences of sabotage acts, including economic and political; not just those that may result in unacceptable radiological exposure to the public, are also discussed. Applicability of risk-assessment methods and mitigation techniques are also presented.« less
Technological challenges for boosting coal production with environmental sustainability.
Ghose, Mrinal K
2009-07-01
The global energy requirement has grown at a phenomenon rate and the consumption of primary energy sources has been a very high positive growth. This paper focuses on the consumption of different primary energy sources and it identifies that coal will continue to remain as the prime energy source in foreseeable future. It examines the energy requirement perspective for India and demand of coal as the prime energy source. Economic development and poverty alleviation depend on securing affordable energy sources and Indian coal mining industry offers a bright future for the country's energy security, provided the industry is allowed to develop by supportive government policies and adopts latest technologies for mining. It is an irony that in-spite of having a plentiful reserves, India is not able to jack up coal production to meet its current and future demand. It discusses the strategies to be adopted for growth and meeting the coal demand. But such energy are very much concerned with environmental degradation and must be driven by contemporary managerial acumen addressing environmental and social challenges effectively The paper highlights the emissions of greenhouse gases due to burning of fossil fuels and environmental consequences of global warming and sea-level rise. Technological solutions for environment friendly coal mining and environmental laws for the abatement of environmental degradation are discussed in this paper.
Importing food damages domestic environment: Evidence from global soybean trade.
Sun, Jing; Mooney, Harold; Wu, Wenbin; Tang, Huajun; Tong, Yuxin; Xu, Zhenci; Huang, Baorong; Cheng, Yeqing; Yang, Xinjun; Wei, Dan; Zhang, Fusuo; Liu, Jianguo
2018-05-22
Protecting the environment and enhancing food security are among the world's Sustainable Development Goals and greatest challenges. International food trade is an important mechanism to enhance food security worldwide. Nonetheless, it is widely concluded that in international food trade importing countries gain environmental benefits, while exporting countries suffer environmental problems by using land and other resources to produce food for exports. Our study shows that international food trade can also lead to environmental pollution in importing countries. At the global level, our metaanalysis indicates that there was increased nitrogen (N) pollution after much farmland for domestically cultivated N-fixing soybeans in importing countries was converted to grow high N-demanding crops (wheat, corn, rice, and vegetables). The findings were further verified by an intensive study at the regional level in China, the largest soybean-importing country, where the conversion of soybean lands to corn fields and rice paddies has also led to N pollution. Our study provides a sharp contrast to the conventional wisdom that only exports contribute substantially to environmental woes. Our results suggest the need to evaluate environmental consequences of international trade of all other major goods and products in all importing countries, which have significant implications for fundamental rethinking in global policy-making and debates on environmental responsibilities among consumers, producers, and traders across the world.
NASA Astrophysics Data System (ADS)
Kish, Laszlo B.; Gingl, Zoltan; Mingesz, Robert; Vadai, Gergely; Smulko, Janusz; Granqvist, Claes-Göran
2015-12-01
A recent paper by Gunn-Allison-Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA's arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an incorrect operation since the single loop is essential for the security in the KLJN system, and hence GAA's asserted information leak is trivial. Another consequence is that a fully defended KLJN system would not be able to function due to its built-in current-comparison defense against active (invasive) attacks. In this paper we crack GAA's scheme via an elementary current-comparison attack which yields negligible error probability for Eve even without averaging over the correlation time of the noise.
Effects of the 2008 flood on economic performance and food security in Yemen: a simulation analysis.
Breisinger, Clemens; Ecker, Olivier; Thiele, Rainer; Wiebelt, Manfred
2016-04-01
Extreme weather events such as floods and droughts can have devastating consequences for individual well being and economic development, in particular in poor societies with limited availability of coping mechanisms. Combining a dynamic computable general equilibrium model of the Yemeni economy with a household-level calorie consumption simulation model, this paper assesses the economy-wide, agricultural and food security effects of the 2008 tropical storm and flash flood that hit the Hadramout and Al-Mahrah governorates. The estimation results suggest that agricultural value added, farm household incomes and rural food security deteriorated long term in the flood-affected areas. Due to economic spillover effects, significant income losses and increases in food insecurity also occurred in areas that were unaffected by flooding. This finding suggests that while most relief efforts are typically concentrated in directly affected areas, future efforts should also consider surrounding areas and indirectly affected people. © 2016 The Author(s). Disasters © Overseas Development Institute, 2016.
Towards a policy for human security: psychosocial contributions.
Tullio, Francesco
2007-01-01
Inspired by the correspondence between Einstein and Freud in 1936, this paper focuses on the multidimensional aspect of security, exploring its implications within the psychosocial approach. Reflections are therefore centred on the psychological aspects of conflict, on bio-psychic responses to violent solicitation and on ways in which individual emotions are managed and controlled by the State. Some social and economic mechanisms comprising the present global social scenario are explored: the intermesh between economic/industrial organisations and Security Institutions, and the consumerist economic model and its individual/collective consequences, ultimately environmental destruction. As suggested by Einstein, the creation of a supranational organisation would be an essential step towards an effective and economically sustainable international system. This can be achieved through a process that implies the evolution of cultural parameters and the transformation of national institutions. In this sense, the author suggests a decisive role for civil society organisations such as the International Physicians for the Prevention of Nuclear War (IPPNW).
NASA Astrophysics Data System (ADS)
Varlataya, S. K.; Evdokimov, V. E.; Urzov, A. Y.
2017-11-01
This article describes a process of calculating a certain complex information security system (CISS) reliability using the example of the technospheric security management model as well as ability to determine the frequency of its maintenance using the system reliability parameter which allows one to assess man-made risks and to forecast natural and man-made emergencies. The relevance of this article is explained by the fact the CISS reliability is closely related to information security (IS) risks. Since reliability (or resiliency) is a probabilistic characteristic of the system showing the possibility of its failure (and as a consequence - threats to the protected information assets emergence), it is seen as a component of the overall IS risk in the system. As it is known, there is a certain acceptable level of IS risk assigned by experts for a particular information system; in case of reliability being a risk-forming factor maintaining an acceptable risk level should be carried out by the routine analysis of the condition of CISS and its elements and their timely service. The article presents a reliability parameter calculation for the CISS with a mixed type of element connection, a formula of the dynamics of such system reliability is written. The chart of CISS reliability change is a S-shaped curve which can be divided into 3 periods: almost invariable high level of reliability, uniform reliability reduction, almost invariable low level of reliability. Setting the minimum acceptable level of reliability, the graph (or formula) can be used to determine the period of time during which the system would meet requirements. Ideally, this period should not be longer than the first period of the graph. Thus, the proposed method of calculating the CISS maintenance frequency helps to solve a voluminous and critical task of the information assets risk management.
Harker Burnhams, Nadine; Parry, Charles; Laubscher, Ria; London, Leslie
2014-03-04
Harmful alcohol use can compromise worker health and productivity. Persons employed in safety-sensitive occupations are particularly vulnerable to hazardous alcohol use and its associated risks. This study describes the patterns of harmful alcohol use, related HIV risks and risk factors for the harmful use of alcohol among a sample of employees in South Africa working in the safety and security sector. A cross-sectional study that formed the baseline for a clustered randomized control trial was undertaken in 2011. A random sample of 325 employees employed within a safety and security sector of a local municipality in the Western Cape Province of South Africa participated in the study. Data were collected by means of an 18-page self-administered structured questionnaire and analyzed using SAS/STAT software version 9.2. For all significance testing, the F-statistic and p-values are reported. Three hundred and twenty-five employees were surveyed. Findings suggest that more than half (76.1%) of the 78.9% of participants who consumed alcohol engaged in binge drinking, with close to a quarter reporting a CAGE score greater than the cut-off of 2, indicating potentially hazardous drinking patterns. The study further found that employees who use alcohol are more likely to engage in risky sexual practices when under the influence. A favorable drinking climate (p < 0.001) and poor levels of group cohesion (p = 0.009) were significantly correlated to binge drinking. This study identifies alcohol-related behaviors and associated risks in the context of safety-sensitive occupations at the workplace. It suggests that persons employed within such positions are at high risk for developing alcohol-related disorders and for contracting HIV. This study highlights the need for testing a comprehensive package of services designed to prevent hazardous alcohol use among safety and security employees.
Farming Approaches for Greater Biodiversity, Livelihoods, and Food Security.
Garibaldi, Lucas A; Gemmill-Herren, Barbara; D'Annolfo, Raffaele; Graeub, Benjamin E; Cunningham, Saul A; Breeze, Tom D
2017-01-01
Scientists and policy-makers globally are calling for alternative approaches to conventional intensification of agriculture that enhance ecosystem services provided by biodiversity. The evidence reviewed here suggests that alternative approaches can achieve high crop yields and profits, but the performance of other socioeconomic indicators (as well as long-term trends) is surprisingly poorly documented. Consequently, the implementation of conventional intensification and the discussion of alternative approaches are not based on quantitative evidence of their simultaneous ecological and socioeconomic impacts across the globe. To close this knowledge gap, we propose a participatory assessment framework. Given the impacts of conventional intensification on biodiversity loss and greenhouse gas emissions, such evidence is urgently needed to direct science-policy initiatives, such as the United Nations (UN) 2030 Agenda for Sustainable Development. Copyright © 2016 Elsevier Ltd. All rights reserved.
Fungal model systems and the elucidation of pathogenicity determinants
Perez-Nadales, Elena; Almeida Nogueira, Maria Filomena; Baldin, Clara; Castanheira, Sónia; El Ghalid, Mennat; Grund, Elisabeth; Lengeler, Klaus; Marchegiani, Elisabetta; Mehrotra, Pankaj Vinod; Moretti, Marino; Naik, Vikram; Oses-Ruiz, Miriam; Oskarsson, Therese; Schäfer, Katja; Wasserstrom, Lisa; Brakhage, Axel A.; Gow, Neil A.R.; Kahmann, Regine; Lebrun, Marc-Henri; Perez-Martin, José; Di Pietro, Antonio; Talbot, Nicholas J.; Toquin, Valerie; Walther, Andrea; Wendland, Jürgen
2014-01-01
Fungi have the capacity to cause devastating diseases of both plants and animals, causing significant harvest losses that threaten food security and human mycoses with high mortality rates. As a consequence, there is a critical need to promote development of new antifungal drugs, which requires a comprehensive molecular knowledge of fungal pathogenesis. In this review, we critically evaluate current knowledge of seven fungal organisms used as major research models for fungal pathogenesis. These include pathogens of both animals and plants; Ashbya gossypii, Aspergillus fumigatus, Candida albicans, Fusarium oxysporum, Magnaporthe oryzae, Ustilago maydis and Zymoseptoria tritici. We present key insights into the virulence mechanisms deployed by each species and a comparative overview of key insights obtained from genomic analysis. We then consider current trends and future challenges associated with the study of fungal pathogenicity. PMID:25011008
Using Cryptography to Improve Conjunction Analysis
NASA Astrophysics Data System (ADS)
Hemenway, B.; Welser, B.; Baiocchi, D.
2012-09-01
Coordination of operations between satellite operators is becoming increasingly important to prevent collisions. Unfortunately, this coordination is often handicapped by a lack of trust. Coordination and cooperation between satellite operators can take many forms, however, one specific area where cooperation between operators would yield significant benefits is in the computation of conjunction analyses. Passively collected orbital are of generally of too low fidelity to be of use in conjunction analyses. Each operator, however, maintains high fidelity data about their own satellites. These high fidelity data are significantly more valuable in calculating conjunction analyses than the lower-fidelity data. If operators were to share their high fidelity data overall space situational awareness could be improved. At present, many operators do not share data and as a consequence space situational awareness suffers. Restrictive data sharing policies are primarily motivated by privacy concerns on the part of the satellite operators, as each operator is reluctant or unwilling to share data that might compromise its political or commercial interests. In order to perform the necessary conjunction analyses while still maintaining the privacy of their own data, a few operators have entered data sharing agreements. These operators provide their private data to a trusted outside party, who then performs the conjunction analyses and reports the results to the operators. These types of agreements are not an ideal solution as they require a degree of trust between the parties, and the cost of employing the trusted party can be large. In this work, we present and analyze cryptographic tools that would allow satellite operators to securely calculate conjunction analyses without the help of a trusted outside party, while provably maintaining the privacy of their own orbital information. For example, recent advances in cryptographic protocols, specifically in the area of secure Multiparty Computation (MPC) have the potential to allow satellite operators to perform the necessary conjunction analyses without the need to reveal their orbital information to anyone. This talk will describe how MPC works, and how we propose to use it to facilitate secure information sharing between satellite operators.
Ocean sciences after September 11
NASA Astrophysics Data System (ADS)
McPhaden, Michael J.
The terrorist attacks in New York City and Washington D.C. on September 11, 2001 shocked the world with their audacity and destruction. Shortly thereafter, bioterrorists struck through the U.S. postal system. Virtually overnight, major policy shifts took place in the United States that catapulted national security and homeland defense to the top of the political agenda. The consequences were unimaginable just a few months before: an international coalition at war against the Taliban in Afghanistan, major increases in U.S. defense spending, tightened security measures at airports, government facilities, and research laboratories, and a new sense of vulnerability in the post-cold war era. AGU itself was directly affected: three of its members perished in the hijacked planes, or on the ground in New York City.
Rose, Adam; Avetisyan, Misak; Chatterjee, Samrat
2014-08-01
This article presents a framework for economic consequence analysis of terrorism countermeasures. It specifies major categories of direct and indirect costs, benefits, spillover effects, and transfer payments that must be estimated in a comprehensive assessment. It develops a spreadsheet tool for data collection, storage, and refinement, as well as estimation of the various components of the necessary economic accounts. It also illustrates the usefulness of the framework in the first assessment of the tradeoffs between enhanced security and changes in commercial activity in an urban area, with explicit attention to the role of spillover effects. The article also contributes a practical user interface to the model for emergency managers. © 2014 Society for Risk Analysis.
[The general practitioner and the unemployed].
Ruud, J
1992-02-20
Unemployment has increased in Norway during the last years. In order to study the impact of unemployment on primary health care in Hedmark county, a questionnaire was sent to 132 general practitioners. 70% replied. Some of the questions dealt with the doctors' requests for social security benefits for patients whose problems were related to loss of job. During one week 30% of the doctors had written this kind of sickness certificate. Further, during one month, 35% had recommended rehabilitation or disability pension. During the last year, 26% of the doctors had received requests activity proposing sickness certification for some of their employees from companies that were forced to reduce activity. The author discusses these results, and outlines the possible consequences for patient, doctor and the social security system.
Trafford, Zara; Swartz, Alison; Colvin, Christopher J
2018-02-01
In this paper, we explore the increasing activity around labor rights for South African community health workers (CHWs). Contextualizing this activity within broader policy and legal developments, we track the emergence of sporadic mobilizations for decent work (supported by local health activist organizations) and subsequently, the formation of a CHW union. The National Union of Care Workers of South Africa (NUCWOSA) was inaugurated in 2016, hoping to secure formal and secure employment through government and the consequent labor and occupational health protections. Various tensions were observed during fieldwork in the run up to NUCWOSA's formation and raise important questions about representation, legitimacy, and hierarchies of power. We close by offering suggestions for future research in this developing space.
Physical contact and financial risk taking.
Levav, Jonathan; Argo, Jennifer J
2010-06-01
We show that minimal physical contact can increase people's sense of security and consequently lead them to increased risk-taking behavior. In three experiments, with both hypothetical and real payoffs, a female experimenter's light, comforting pat on the shoulder led participants to greater financial risk taking. Further, this effect was both mediated and moderated by feelings of security in both male and female participants. Finally, we established the boundary conditions for the impact of physical contact on risk-taking behaviors by demonstrating that the effect does not occur when the touching is performed by a male and is attenuated when the touch consists of a handshake. The results suggest that subtle physical contact can be strongly influential in decision making and the willingness to accept risk.
Ryzhman, N N; Maksimov, A G; Tyrenko, V V; Karamullin, M A; Yurkin, A K; Golota, A S; Lisovets, D G; Sarana, A M; Barsevich, O V
2015-03-01
The article covers organizational aspects of development of innovative technologies in the field of regenerative medicine. It is shown that for the effective design and implementation into medical practice of regenerative medicine requires a united complex of military health care, military medical research and education. The main goal is to formate a biological insurance of personnel to treat different consequences of radiological incidents, burn disease, identification of the remains of the victims; the maximum returning to action after disturbed as a result of health services. Proposes the creation of "Interdepartmental Clinical Research and Education Center for Regenerative Medicine", combining research, clinical, industrial and educational potential of the leading institutions of various departments that will enhance the national security of the Russian Federation.
Tanner-Smith, Emily E; Fisher, Benjamin W
2016-01-01
Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance, and postsecondary educational aspirations. The data for this study came from two large national surveys--the School Crime Supplement to the National Crime Victimization Survey (N = 38,707 students; 51% male, 77% White, MAge = 14.72) and the School Survey on Crime and Safety (N = 10,340 schools; average student composition of 50% male, 57% White). The results provided no evidence that visible security measures had consistent beneficial effects on adolescents' academic outcomes; some security utilization patterns had modest detrimental effects on adolescents' academic outcomes, particularly the heavy surveillance patterns observed in a small subset of high schools serving predominantly low socioeconomic students. The findings of this study provide no evidence that visible security measures have any sizeable effects on academic performance, attendance, or postsecondary aspirations among U.S. middle and high school students.
Zhang, Zheshen; Mower, Jacob; Englund, Dirk; Wong, Franco N C; Shapiro, Jeffrey H
2014-03-28
High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data-obtained from Franson and conjugate-Franson interferometers-that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit/sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency.
Optical security features for plastic card documents
NASA Astrophysics Data System (ADS)
Hossick Schott, Joachim
1998-04-01
Print-on-demand is currently a major trend in the production of paper based documents. This fully digital production philosophy will likely have ramifications also for the secure identification document market. Here, plastic cards increasingly replace traditionally paper based security sensitive documents such as drivers licenses and passports. The information content of plastic cards can be made highly secure by using chip cards. However, printed and other optical security features will continue to play an important role, both for machine readable and visual inspection. Therefore, on-demand high resolution print technologies, laser engraving, luminescent pigments and laminated features such as holograms, kinegrams or phase gratings will have to be considered for the production of secure identification documents. Very important are also basic optical, surface and material durability properties of the laminates as well as the strength and nature of the adhesion between the layers. This presentation will address some of the specific problems encountered when optical security features such as high resolution printing and laser engraving are to be integrated in the on-demand production of secure plastic card identification documents.
NASA Astrophysics Data System (ADS)
Yoshino, Ken-ichiro; Fujiwara, Mikio; Nakata, Kensuke; Sumiya, Tatsuya; Sasaki, Toshihiko; Takeoka, Masahiro; Sasaki, Masahide; Tajima, Akio; Koashi, Masato; Tomita, Akihisa
2018-03-01
Quantum key distribution (QKD) allows two distant parties to share secret keys with the proven security even in the presence of an eavesdropper with unbounded computational power. Recently, GHz-clock decoy QKD systems have been realized by employing ultrafast optical communication devices. However, security loopholes of high-speed systems have not been fully explored yet. Here we point out a security loophole at the transmitter of the GHz-clock QKD, which is a common problem in high-speed QKD systems using practical band-width limited devices. We experimentally observe the inter-pulse intensity correlation and modulation pattern-dependent intensity deviation in a practical high-speed QKD system. Such correlation violates the assumption of most security theories. We also provide its countermeasure which does not require significant changes of hardware and can generate keys secure over 100 km fiber transmission. Our countermeasure is simple, effective and applicable to wide range of high-speed QKD systems, and thus paves the way to realize ultrafast and security-certified commercial QKD systems.
JPRS Report, Soviet Union, World Economy & International Relations, No. 1, January 1989.
1989-05-12
stock companies, at least. And the final consideration concerning the limited nature and negative effects of nationalization. There is nothing...was most likely the sole possible effective method of socialization. At the present time, however, under the conditions of the developed status of...hardly strengthen international security. And, finally, one further possible negative consequence of the development of nuclear power engineering—the
ERIC Educational Resources Information Center
Molnar, Joseph J.; And Others
Rwanda, a small country in Africa, has experienced declines in per capita food production. Fish culture is one part of a many-stranded effort to increase food production and food security by intensifying the use of land resources to produce a much-needed protein crop. Beginning in 1983, the Rwanda National Fish Culture Project has assisted farmers…
In the Tracks of Tamerlane: Central Asia’s Path to the 21st Century
2004-01-01
prospects of the five states—Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan, and Uzbekistan—reflect little of the millennial history of the region...National Security, Governor of Chu oblast and Mayor of Bishkek. Another contender was entrepreneur and independent parliamentarian Danyar Usenov, who...and entrepreneurs , perhaps fearing the political consequences of a restructured economy they could not control. This restrictive environment
ERIC Educational Resources Information Center
Neumann, Dieter
1999-01-01
Shows how evolution-theoretical behavioral research may serve to influence the theory production of pedagogics. Questions which truths and securities are required by educational practice and which consequences can be drawn for the level of theoretical cognition of the respective discipline. An analysis of the relation between religion in its…
Turkish Influence in the South Caucasus and Levant: The Consequences for NATO and the EU
2013-09-01
and Contemporary Context: “Frozen Conflicts” And Caspian Energy ..........................................................................22 2...by the waning fortunes of the western allies in their variety and complexity. Washington is shifting strategic resources and political energy to the...East energy .2 In both NATO and EU strategic documents energy is defined as an important element in European security. NATO’s Strategic Concept 2010
Climate Change, National Security, and the Quadrennial Defense Review. Avoiding the Perfect Storm
2008-01-01
consequently, higher ocean water temperatures are increasing the occurrence of coral bleaching and coral reef die-offs.57 The IPCC concludes that...unprecedented combination of climate change, associated disturbances (e.g., flooding, drought, wildfire, in- sects, ocean acidification ), and other global...instance, the disintegration of saltwater fishing indus- tries due to ocean acidification could spark inter- and intrastate conflict as numerous
Worldwide Emerging Environmental Issues Affecting the U.S. Military. January 2009
2009-01-01
islands as a consequence of climate change effects. Coastal residents of Fiji were instructed to move to higher ground to avoid storms and flooding...environmental matters from energy security to international cooperation for addressing climate change . [See Appendix for more detail]. Military...military environmental programs could receive higher profiles. Since climate change is a new top priority, the military should identify all its resources
Group Key Agreement Efficient in Communication
2003-10-14
Selected Areas in Communications, 17(9), September 1999. [13] David Chaum . Zero-knowledge undeniable signatures . In I.B. Damgard, editor, Advances in...sender with some sufficiently strong public key signature method such as DSA or RSA (and using a long-term private key).1 All receivers are required...to verify signatures on all received messages and check the aforementioned fields. Consequently, our security model is different from some recent
Beeghly, Marjorie; Partridge, Ty; Tronick, Ed; Muzik, Maria; Rahimian Mashhadi, Mahya; Boeve, Jordan L; Irwin, Jessica L
2017-01-01
The goal of this study was to evaluate whether there are sex differences in children's vulnerability to caregiving risk, as indexed by trajectories of maternal depressive symptoms assessed from 2 to 18 months' postpartum, and children's rated attachment security in toddlerhood, adjusting for maternal social support and demographic risk. Analyses utilized longitudinal data collected for 182 African American mother-child dyads from economically diverse backgrounds. Participants were recruited at the time of the child's birth and followed to 18 months' postpartum. Results of conditional latent growth models indicated that an increasing rate of change in level of maternal depressive symptoms over time negatively predicted toddlers' felt attachment security. Higher social support was associated with decreasing levels of maternal depressive symptoms over time whereas higher demographic risk was associated with increasing levels of maternal depressive symptoms. A subsequent multigroup conditional latent growth model revealed that child sex moderated these associations. For male (but not female) children, a rapid increase in maternal depressive symptoms was associated with lower felt attachment security at 18 months. These findings suggest that boys, as compared to girls, may be more vulnerable to early caregiving risks such as maternal depression, with negative consequences for mother-child attachment security in toddlerhood. © 2017 Michigan Association for Infant Mental Health.
Gulf Cooperation Council: search for security in the Persian Gulf
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kechichian, J.A.
1985-01-01
This study purports to analyze the conservative Arab monarchies' search for regional security in the Persian Gulf. It speculates on the GCC's future prospects as a vehicle of cooperation in the field of security. Threats to the member states of the GCC stem from the policies pursued by revolutionary Iran, Israel, the Soviet Union and its proxies, and a regime in Iraq. The proposition is developed that these sources of threat present an overwhelming challenge to the security and stability of GCC states. Second, it examines the capabilities of the GCC member states for coping with threats. Conceived broadly, bothmore » military and non-military capabilities are examined. Security relations of the GCC states with external powers as a means of enhancing their abilities to cope more effectively with both internal and external threats are examined. Particular attention is devoted to the domestic consequences of these special relations. Third, it discusses the GCC's reactions to perceived regional threats. These include the Iran-Iraq War, the Arab-Israeli conflict, the Soviet threat, and potential political sources of dissidence in member states. It is argued that although GCC states have adopted a number of joint policies, they did not respond to or initiate action on either the Iranian Revolution, the Palestine conflict, the Soviet occupation of Afghanistan, the Gulf war or the recent Israeli invasion of Lebanon.« less
NASA Astrophysics Data System (ADS)
Fernandez, Valerie; Martimort, Philippe; Spoto, Francois; Sy, Omar; Laberinti, Paolo
2013-10-01
GMES is a joint initiative of the European Commission (EC) and the European Space Agency (ESA), designed to establish a European capacity for the provision and use of operational monitoring information for environment and security applications. ESA's role in GMES is to provide the definition and the development of the space- and ground-related system elements. GMES Sentinel-2 mission provides continuity to services relying on multi-spectral highresolution optical observations over global terrestrial surfaces. The key mission objectives for Sentinel-2 are: (1) to provide systematic global acquisitions of high-resolution multi-spectral imagery with a high revisit frequency, (2) to provide enhanced continuity of multi-spectral imagery provided by the SPOT series of satellites, and (3) to provide observations for the next generation of operational products such as landcover maps, land change detection maps, and geophysical variables. Consequently, Sentinel-2 will directly contribute to the Land Monitoring, Emergency Response, and Security services. The corresponding user requirements have driven the design towards a dependable multi-spectral Earthobservation system featuring the MSI with 13 spectral bands spanning from the visible and the near infrared to the short wave infrared. The spatial resolution varies from 10 m to 60 m depending on the spectral band with a 290 km field of view. This unique combination of high spatial resolution, wide field of view and large spectral coverage will represent a major step forward compared to current multi-spectral missions. The mission foresees a series of satellites, each having a 7.25-year lifetime (extendable to 12 years) over a 20-year period starting with the launch of Sentinel-2A foreseen by mid-2014. During full operations two identical satellites will be maintained in the same sun synchronous orbit with a phase delay of 180° providing a revisit time of five days at the equator.
Analyzing Cyber-Physical Threats on Robotic Platforms.
Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J
2018-05-21
Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.
Analyzing Cyber-Physical Threats on Robotic Platforms †
2018-01-01
Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403
Health and Human Rights in Karen State, Eastern Myanmar
Davis, William W.; Mullany, Luke C.; Shwe Oo, Eh Kalu; Richards, Adam K.; Iacopino, Vincent; Beyrer, Chris
2015-01-01
Background Decades of conflict in eastern Myanmar have resulted in high prevalence of human rights violations and poor health outcomes. While recent ceasefire agreements have reduced conflict in this area, it is unknown whether this has resulted in concomitant reductions in human rights violations. Methods and Findings We conducted a two-stage cluster survey of 686 households in eastern Myanmar to assess health status, access to healthcare, food security, exposure to human rights violations and identification of alleged perpetrators over the 12 months prior to January 2012, a period of near-absence of conflict in this region. Household hunger (FANTA-2 scale) was moderate/high in 91 (13.2%) households, while the proportion of households reporting food shortages in each month of 2011 ranged from 19.9% in December to 47.0% in September, with food insecurity peaking just prior to the harvest. Diarrhea prevalence in children was 14.2% and in everyone it was 5.8%. Forced labor was the most common human rights violation (185 households, 24.9%), and 210 households (30.6%) reported experiencing one or more human rights violations in 2011. Multiple logistic regression analysis identified associations between human rights violations and poor health outcomes. Conclusion Human rights violations and their health consequences persist despite reduced intensity of conflict in eastern Myanmar. Ceasefire agreements should include language that protects human rights, and reconciliation efforts should address the health consequences of decades of human rights violations. PMID:26308850
Feeling safe during an inpatient hospitalization: a concept analysis.
Mollon, Deene
2014-08-01
This paper aims to explore the critical attributes of the concept feeling safe. The safe delivery of care is a high priority; however; it is not really known what it means to the patient to 'feel safe' during an inpatient hospitalization. This analysis explores the topic of safety from the patient's perspective. Concept analysis. The data bases of CINAHL, Medline, PsychInfo and Google Scholar for the years 1995-2012 were searched using the terms safe and feeling safe. The eight-step concept analysis method of Walker and Avant was used to analyse the concept of feeling safe. Uses and defining attributes, as well as identified antecedents, consequences and empirical referents, are presented. Case examples are provided to assist in the understanding of defining attributes. Feeling safe is defined as an emotional state where perceptions of care contribute to a sense of security and freedom from harm. Four attributes were identified: trust, cared for, presence and knowledge. Relationship, environment and suffering are the antecedents of feeling safe, while control, hope and relaxed or calm are the consequences. Empirical referents and early development of a theory of feeling safe are explored. This analysis begins the work of synthesizing qualitative research already completed around the concept of feeling safe by defining the key attributes of the concept. Support for the importance of developing patient-centred models of care and creating positive environments where patients receive high-quality care and feel safe is provided. © 2014 John Wiley & Sons Ltd.
ERIC Educational Resources Information Center
Lafo, Joseph; Robillard, Marc
2001-01-01
Explains how high-rise residence halls can provide high-level safety and security at colleges and universities. Boston University is used to illustrate high-rise security and fire protection issues. (GR)
2009-04-21
6 Intercity Passenger Rail Program (Amtrak) .....................................................................6... Intercity Bus Security Grant Program..............................................................................7 Trucking Security Program...continue security enhancements for its intercity rail services between high-risk urban areas. 20 U.S. Department of Homeland Security, Federal Emergency
Securing the High Seas: America’s Global Maritime Constabulatory Power
2008-03-12
at www.heritage.org/ Research/HomelandSecurity/bg1950.cfm. 29. Construcciones Aeronáuticas, SA. 16 Securing the High Seas: America’s Global Maritime...Coast Guard ships (National Security Cutter, Off-Shore Patrol Cutter, and Fast Response Cutter) and many Navy ships currently in design or construction ...forge complementary maritime strategies. Only by developing common doctrine, creating greater synergy in the construction of core assets, and forging a
Student Perceptions of High-Security School Environments
ERIC Educational Resources Information Center
Bracy, Nicole L.
2011-01-01
Public schools have transformed significantly over the past several decades in response to concerns about rising school violence. Today, most public schools are high-security environments employing police officers, security cameras, and metal detectors, as well as strict discipline policies to keep students in line and maintain safe campuses.…
Implementing a High-Assurance Smart-Card OS
NASA Astrophysics Data System (ADS)
Karger, Paul A.; Toll, David C.; Palmer, Elaine R.; McIntosh, Suzanne K.; Weber, Samuel; Edwards, Jonathan W.
Building a high-assurance, secure operating system for memory constrained systems, such as smart cards, introduces many challenges. The increasing power of smart cards has made their use feasible in applications such as electronic passports, military and public sector identification cards, and cell-phone based financial and entertainment applications. Such applications require a secure environment, which can only be provided with sufficient hardware and a secure operating system. We argue that smart cards pose additional security challenges when compared to traditional computer platforms. We discuss our design for a secure smart card operating system, named Caernarvon, and show that it addresses these challenges, which include secure application download, protection of cryptographic functions from malicious applications, resolution of covert channels, and assurance of both security and data integrity in the face of arbitrary power losses.
Understanding Food Insecurity in the USA and Canada: Potential Insights for Europe.
Gundersen, Craig
2016-01-01
Food insecurity is a leading nutrition-related health care issue in the USA due to the magnitude of the problem (almost 50 million Americans are food insecure) and its association with a wide array of negative health and other outcomes. Alongside this interest in the USA, there has also been growing interest in Canada. In contrast, food insecurity has received less attention in Europe. Nevertheless, there is both direct and indirect evidence that food insecurity and its attendant consequences are present in Europe. Given the similarities between the USA, Canada, and Europe, previous research can offer numerous insights into the causes and consequences of food insecurity in Europe and possible directions to address these through measurement and public policies. I first cover the methods used to measure food insecurity in the USA and Canada. In both countries, a series of 18 questions in the Core Food Security Module are used to identify whether a household is food insecure. I then briefly cover the current extent of food insecurity in each country along with some discussion of the recent history of food insecurity. A central advantage to using the Core Food Security Module in Europe is that the measure has been proven useful in other high-income countries, and using a standardized measure would allow for cross-country comparisons. I next cover two large-scale food assistance programs from the USA, the Supplemental Nutrition Assistance Program (formerly known as the Food Stamp Program) and the National School Lunch Program. For each, I summarize how the program is structured, how eligibility is established, and how participation proceeds. Europe has generally used income-based assistance programs to improve the well-being of low-income households; I consider a couple of reasons for why food assistance programs may also be worth considering. © 2016 S. Karger AG, Basel.
High-dimensional quantum cloning and applications to quantum hacking
Bouchard, Frédéric; Fickler, Robert; Boyd, Robert W.; Karimi, Ebrahim
2017-01-01
Attempts at cloning a quantum system result in the introduction of imperfections in the state of the copies. This is a consequence of the no-cloning theorem, which is a fundamental law of quantum physics and the backbone of security for quantum communications. Although perfect copies are prohibited, a quantum state may be copied with maximal accuracy via various optimal cloning schemes. Optimal quantum cloning, which lies at the border of the physical limit imposed by the no-signaling theorem and the Heisenberg uncertainty principle, has been experimentally realized for low-dimensional photonic states. However, an increase in the dimensionality of quantum systems is greatly beneficial to quantum computation and communication protocols. Nonetheless, no experimental demonstration of optimal cloning machines has hitherto been shown for high-dimensional quantum systems. We perform optimal cloning of high-dimensional photonic states by means of the symmetrization method. We show the universality of our technique by conducting cloning of numerous arbitrary input states and fully characterize our cloning machine by performing quantum state tomography on cloned photons. In addition, a cloning attack on a Bennett and Brassard (BB84) quantum key distribution protocol is experimentally demonstrated to reveal the robustness of high-dimensional states in quantum cryptography. PMID:28168219
High-dimensional quantum cloning and applications to quantum hacking.
Bouchard, Frédéric; Fickler, Robert; Boyd, Robert W; Karimi, Ebrahim
2017-02-01
Attempts at cloning a quantum system result in the introduction of imperfections in the state of the copies. This is a consequence of the no-cloning theorem, which is a fundamental law of quantum physics and the backbone of security for quantum communications. Although perfect copies are prohibited, a quantum state may be copied with maximal accuracy via various optimal cloning schemes. Optimal quantum cloning, which lies at the border of the physical limit imposed by the no-signaling theorem and the Heisenberg uncertainty principle, has been experimentally realized for low-dimensional photonic states. However, an increase in the dimensionality of quantum systems is greatly beneficial to quantum computation and communication protocols. Nonetheless, no experimental demonstration of optimal cloning machines has hitherto been shown for high-dimensional quantum systems. We perform optimal cloning of high-dimensional photonic states by means of the symmetrization method. We show the universality of our technique by conducting cloning of numerous arbitrary input states and fully characterize our cloning machine by performing quantum state tomography on cloned photons. In addition, a cloning attack on a Bennett and Brassard (BB84) quantum key distribution protocol is experimentally demonstrated to reveal the robustness of high-dimensional states in quantum cryptography.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sandoval, D. M.; Strittmatter, R. B.; Abeyta, J. D.
2004-01-01
The initial objectives of this effort were to provide a hardware and software platform that can address the requirements for the accountability of classified removable electronic media and vault access logging. The Media Tracker system software assists classified media custodian in managing vault access logging and Media Tracking to prevent the inadvertent violation of rules or policies for the access to a restricted area and the movement and use of tracked items. The MediaTracker system includes the software tools to track and account for high consequence security assets and high value items. The overall benefits include: (1) real-time access tomore » the disposition of all Classified Removable Electronic Media (CREM), (2) streamlined security procedures and requirements, (3) removal of ambiguity and managerial inconsistencies, (4) prevention of incidents that can and should be prevented, (5) alignment with the DOE's initiative to achieve improvements in security and facility operations through technology deployment, and (6) enhanced individual responsibility by providing a consistent method of dealing with daily responsibilities. In response to initiatives to enhance the control of classified removable electronic media (CREM), the Media Tracker software suite was developed, piloted and implemented at the Los Alamos National Laboratory beginning in July 2000. The Media Tracker software suite assists in the accountability and tracking of CREM and other high-value assets. One component of the MediaTracker software suite provides a Laboratory-approved media tracking system. Using commercial touch screen and bar code technology, the MediaTracker (MT) component of the MediaTracker software suite provides an efficient and effective means to meet current Laboratory requirements and provides new-engineered controls to help assure compliance with those requirements. It also establishes a computer infrastructure at vault entrances for vault access logging, and can accommodate several methods of positive identification including smart cards and biometrics. Currently, we have three mechanisms that provide added security for accountability and tracking purposes. One mechanism consists of a portable, hand-held inventory scanner, which allows the custodian to physically track the items that are not accessible within a particular area. The second mechanism is a radio frequency identification (RFID) consisting of a monitoring portal, which tracks and logs in a database all activity tagged of items that pass through the portals. The third mechanism consists of an electronic tagging of a flash memory device for automated inventory of CREM in storage. By modifying this USB device the user is provided with added assurance, limiting the data from being obtained from any other computer.« less
Marital Biography, Social Security Receipt, and Poverty.
Lin, I-Fen; Brown, Susan L; Hammersmith, Anna M
2017-01-01
Increasingly, older adults are unmarried, which could mean a larger share is at risk of economic disadvantage. Using data from the 2010 Health and Retirement Study, we chart the diverse range of marital biographies, capturing marital sequences and timing, of adults who are age eligible for Social Security and examine three indicators of economic well-being: Social Security receipt, Social Security benefit levels, and poverty status. Partnereds are disproportionately likely to receive Social Security and they enjoy relatively high Social Security benefits and very low poverty levels. Among singles, economic well-being varies by marital biography and gender. Gray divorced and never-married women face considerable economic insecurity. Their Social Security benefits are relatively low, and their poverty rates are quite high (over 25%), indicating Social Security alone is not sufficient to prevent these women from falling into poverty. By comparison, gray widoweds are the most advantaged singles.
Marital Biography, Social Security Receipt, and Poverty
Lin, I-Fen; Brown, Susan L.; Hammersmith, Anna M.
2017-01-01
Increasingly, older adults are unmarried, which could mean a larger share is at risk of economic disadvantage. Using data from the 2010 Health and Retirement Study, we chart the diverse range of marital biographies, capturing marital sequences and timing, of adults who are age eligible for Social Security and examine three indicators of economic well-being: Social Security receipt, Social Security benefit levels, and poverty status. Partnereds are disproportionately likely to receive Social Security and they enjoy relatively high Social Security benefits and very low poverty levels. Among singles, economic well-being varies by marital biography and gender. Gray divorced and never-married women face considerable economic insecurity. Their Social Security benefits are relatively low, and their poverty rates are quite high (over 25%), indicating Social Security alone is not sufficient to prevent these women from falling into poverty. By comparison, gray widoweds are the most advantaged singles. PMID:28181867
NUCLEAR INCIDENT CAPABILITIES, KNOWLEDGE & ENABLER LEVERAGING
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kinney, J.; Newman, J.; Goodwyn, A.
2011-04-18
The detonation of a 10 Kiloton Improvised Nuclear Device (IND) is a serious scenario that the United States must be prepared to address. The likelihood of a single nuclear bomb exploding in a single city is greater today than at the height of the Cold War. Layered defenses against domestic nuclear terrorism indicate that our government continues to view the threat as credible. The risk of such an event is further evidenced by terrorists desire to acquire nuclear weapons. The act of nuclear terrorism, particularly an act directed against a large population center in the United States, will overwhelm themore » capabilities of many local and state governments to respond, and will seriously challenge existing federal response capabilities. A 10 Kiloton IND detonation would cause total infrastructure damage in a 3-mile radius and levels of radiation spanning out 3,000 square miles. In a densely populated urban area, the anticipated casualties would be in excess of several hundred thousand. Although there would be enormous loss of life, housing and infrastructure, an IND detonation is a recoverable event. We can reduce the risk of these high-consequence, nontraditional threats by enhancing our nuclear detection architecture and establishing well planned and rehearsed plans for coordinated response. It is also important for us to identify new and improved ways to foster collaboration regarding the response to the IND threat to ensure the demand and density of expertise required for such an event is postured and prepared to mobilize, integrate, and support a myriad of anticipated challenges. We must be prepared to manage the consequences of such an event in a deliberate manner and get beyond notions of total devastation by adopting planning assumptions around survivability and resiliency. Planning for such a scenario needs to be decisive in determining a response based on competencies and desired outcomes. It is time to synthesize known threats and plausible consequences into action. Much work needs to be accomplished to enhance nuclear preparedness and to substantially bolster and clarify the capacity to deploy competent resources. Until detailed plans are scripted, and personnel and other resources are postured, and exercised, IND specific planning remains an urgent need requiring attention and action. Although strategic guidance, policies, concepts of operations, roles, responsibilities, and plans governing the response and consequence management for the IND scenario exist, an ongoing integration challenge prevails regarding how best to get capable and competent surge capacity personnel (disaster reservists) and other resources engaged and readied in an up-front manner with pre-scripted assignments to augment the magnitude of anticipated demands of expertise. With the above in mind, Savannah River National Laboratory (SRNL) puts science to work to create and deploy practical, high-value, cost-effective nuclear solutions. As the Department of Energy's (DOE) applied research and development laboratory, SRNL supports Savannah River Site (SRS) operations, DOE, national initiatives, and other federal agencies, across the country and around the world. SRNL's parent at SRS also employs more than 8,000 personnel. The team is a great asset that seeks to continue their service in the interest of national security and stands ready to accomplish new missions. Overall, an integral part of the vision for SRNL's National and Homeland Security Directorate is the establishment of a National Security Center at SRNL, and development of state of the science capabilities (technologies and trained technical personnel) for responding to emergency events on local, regional, or national scales. This entails leveraging and posturing the skills, knowledge and experience base of SRS personnel to deliver an integrated capability to support local, state, and federal authorities through the development of pre-scripted requests for assistance, agreements, and plans. It also includes developing plans, training, exercises, recruitment strategies, and processes to establish a 1,000 plus person nuclear disaster workforce capable of providing surge capacity support that can be deployed in part or in all.« less
Military veterans and Social Security.
Olsen, Anya
There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.
ERIC Educational Resources Information Center
Tanner-Smith, Emily E.; Fisher, Benjamin W.
2015-01-01
Many U.S. schools use visible security measures (security cameras, metal detectors, security personnel) in an effort to keep schools safe and promote adolescents' academic success. This study examined how different patterns of visible security utilization were associated with U.S. middle and high school students' academic performance, attendance,…
Continuous Security Metrics for Prevalent Network Threats: Introduction and First Four Metrics
2012-05-22
cyber at- tack. Recently, high -prole successful attacks have been detected against the International Mon- etary Fund, Citibank, Lockheed Martin, Google...RSA Security, Sony, and Oak Ridge National Laboratory[13]. These and other attacks have heightened securing networks as a high priority for many...of high -severity vulnerabilities found by network vulnerability scanners (e.g., [40]) and the numbers or percentages of hosts that are are not
Greenberg, Michael; Lioy, Paul; Ozbas, Birnur; Mantell, Nancy; Isukapalli, Sastry; Lahr, Michael; Altiok, Tayfur; Bober, Joseph; Lacy, Clifton; Lowrie, Karen; Mayer, Henry; Rovito, Jennifer
2013-11-01
We built three simulation models that can assist rail transit planners and operators to evaluate high and low probability rail-centered hazard events that could lead to serious consequences for rail-centered networks and their surrounding regions. Our key objective is to provide these models to users who, through planning with these models, can prevent events or more effectively react to them. The first of the three models is an industrial systems simulation tool that closely replicates rail passenger traffic flows between New York Penn Station and Trenton, New Jersey. Second, we built and used a line source plume model to trace chemical plumes released by a slow-moving freight train that could impact rail passengers, as well as people in surrounding areas. Third, we crafted an economic simulation model that estimates the regional economic consequences of a variety of rail-related hazard events through the year 2020. Each model can work independently of the others. However, used together they help provide a coherent story about what could happen and set the stage for planning that should make rail-centered transport systems more resistant and resilient to hazard events. We highlight the limitations and opportunities presented by using these models individually or in sequence. © 2013 Society for Risk Analysis.
Greenberg, Michael; Lioy, Paul; Ozbas, Birnur; Mantell, Nancy; Isukapalli, Sastry; Lahr, Michael; Altiok, Tayfur; Bober, Joseph; Lacy, Clifton; Lowrie, Karen; Mayer, Henry; Rovito, Jennifer
2014-01-01
We built three simulation models that can assist rail transit planners and operators to evaluate high and low probability rail-centered hazard events that could lead to serious consequences for rail-centered networks and their surrounding regions. Our key objective is to provide these models to users who, through planning with these models, can prevent events or more effectively react to them. The first of the three models is an industrial systems simulation tool that closely replicates rail passenger traffic flows between New York Penn Station and Trenton, New Jersey. Second, we built and used a line source plume model to trace chemical plumes released by a slow-moving freight train that could impact rail passengers, as well as people in surrounding areas. Third, we crafted an economic simulation model that estimates the regional economic consequences of a variety of rail-related hazard events through the year 2020. Each model can work independently of the others. However, used together they help provide a coherent story about what could happen and set the stage for planning that should make rail-centered transport systems more resistant and resilient to hazard events. We highlight the limitations and opportunities presented by using these models individually or in sequence. PMID:23718133
Usuzawa, Motoki; O Telan, Elizabeth; Kawano, Razel; S Dizon, Carmela; Alisjahbana, Bachti; Ashino, Yugo; Egawa, Shinichi; Fukumoto, Manabu; Izumi, Takako; Ono, Yuichi; Hattori, Toshio
2014-05-01
As the impacts of natural disasters have grown more severe, the importance of education for disaster medicine gains greater recognition. We launched a project to establish an international educational program for disaster medicine. In the present study, we surveyed medical personnel and medical/public health students in the Philippines (n = 45) and Indonesia (n = 67) for their awareness of the international frameworks related to disaster medicine: the Human Security (securing individual life and health), the Sphere Project (international humanitarian response), and the Hyogo Framework for Action 2005-2015 (international strategy for disaster reduction). In both countries, more than 50% responders were aware of human security, but only 2 to 12% were aware of the latter two. The survey also contained questions about the preferred subjects in prospective educational program, and risk perception on disaster and disaster-related infections. In the Philippines, significant disasters were geophysical (31.0%), hydrological (33.3%), or meteorological (24.8%), whereas in Indonesia, geophysical (63.0%) and hydrological (25.3%) were significant. Moreover, in the Philippines, leptospirosis (27.1%), dengue (18.6%), diarrhea (15.3%), and cholera (10.2%) were recognized common disaster-related infections. In Indonesia, diarrhea (22.0%) and respiratory infection (20.3%) are major disaster-related infections. Water-related infections were the major ones in both countries, but the profiles of risk perception were different (Pearson's chi-square test, p = 1.469e-05). The responders tended to overestimate the risk of low probability and high consequence such as geophysical disaster. These results are helpful for the development of a postgraduate course for disaster medicine in Asia Pacific countries.
Sharif, Z M; Ang, M
2001-03-01
Food insecurity exists whenever people are not able to access sufficient food at all times for an active and healthy life. This study used the Radimer/Cornell hunger and food insecurity instrument to assess food insecurity and to determine the risk factors and consequences of food insecurity among low-income households in Kuala Lumpur. One hundred and thirty-seven Malay pre-school children (4-6 years old) from Taman Sang Kancil were measured for their weights and heights. Questionnaires were used to collect food security and socioeconomic information on the households. The findings indicated that 34.3% of the households were food secure, while 65.7% experienced some kind of food insecurity, (27.7% households were food insecure, 10.9% individuals were food insecure and 27.0% fell into the child hunger category). The prevalence of underweight, stunting and wasting were 44.5%, 36.5% and 30.7% respectively. The prevalence of high weight-for-height (overweight) was 13.1%. Based on multinomial logistic regression, larger household size (OR=1.418; p<0.01) and lower educational level of mothers (OR=0.749; p<0.01) and fathers (OR=0.802; p<0.05) were found to be significant risk factors for food insecurity. The study, however, did not find any significant difference in children's nutritional status according to household food security levels. It is recommended that for the Malaysian population, the Radimer/Cornell hunger and food insecurity instrument should be modified and further validated with various ethnic groups in a variety of settings. The validation should include the appropriateness of the statements to the target grounds and their different risk factors and outcomes of food insecurity.
Non-Kinetic Capabilities for Irregular Warfare: Four Case Studies
2009-03-01
on the job, absenteeism , receiving free “perks”) 2. “Conventional” Corruption—Something is done or not done for some reward (bribery, kickbacks...occupational deviance that breaks departmental rules and regulations, such as sleeping on the job, absenteeism , and receiving free “perks.” “Conventional...African Security Review, Vol. 7, No. 1, 1998. Tanzi, Vito, “Corruption Around the World: Causes, Consequences, Scope, and Cures ,” IMF Staff Papers
ERIC Educational Resources Information Center
Tenbergen, Klaus-Georg
2010-01-01
A seismic economic shift has changed the rules by which Americans strive to get ahead in society. Hard work, once the bedrock of opportunity, is no longer sufficient in and of itself to ensure individual prosperity and security for either individuals or the larger community. The consequence of this new economy is the need to educate students in…
ADVANCED SURVEILLANCE OF ENVIROMENTAL RADIATION IN AUTOMATIC NETWORKS.
Benito, G; Sáez, J C; Blázquez, J B; Quiñones, J
2018-06-01
The objective of this study is the verification of the operation of a radiation monitoring network conformed by several sensors. The malfunction of a surveillance network has security and economic consequences, which derive from its maintenance and could be avoided with an early detection. The proposed method is based on a kind of multivariate distance, and the verification for the methodology has been tested at CIEMAT's local radiological early warning network.
ERIC Educational Resources Information Center
Park, Insu
2010-01-01
The purpose of this study is to explore systems users' behavior on IS under the various circumstances (e.g., email usage and malware threats, online communication at the individual level, and IS usage in organizations). Specifically, the first essay develops a method for analyzing and predicting the impact category of malicious code, particularly…
Angiogenic Signaling in Living Breast Tumor Models
2006-06-01
SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF RESPONSIBLE PERSON USAMRMC a. REPORT U b. ABSTRACT U c ...convection versus diffusion in transport out of a tumor vessel during steady state conditions. C . Determine relative contribution of convection...on the results of the diffusion/convection measurements. Consequently, implicit in Tasks 1b and c (the use of MPFRAP in vivo) is the establishment
The Economic Consequences of Hospital Admissions
Dobkin, Carlos; Finkelstein, Amy; Kluender, Raymond; Notowidigdo, Matthew J.
2017-01-01
We use an event study approach to examine the economic consequences of hospital admissions for adults in two datasets: survey data from the Health and Retirement Study, and hospitalization data linked to credit reports. For non-elderly adults with health insurance, hospital admissions increase out-of-pocket medical spending, unpaid medical bills and bankruptcy, and reduce earnings, income, access to credit and consumer borrowing. The earnings decline is substantial compared to the out-of-pocket spending increase, and is minimally insured prior to age-eligibility for Social Security Retirement Income. Relative to the insured non-elderly, the uninsured non-elderly experience much larger increases in unpaid medical bills and bankruptcy rates following a hospital admission. Hospital admissions trigger less than 5 percent of all bankruptcies. PMID:29445246
A scoping review of traditional food security in Alaska.
Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa
2018-12-01
Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: "traditional foods", "food security", "access", "availability", "utilisation", "Alaska", "Alaska Native" and "indigenous". Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska.
Security and Privacy Grand Challenges for the Internet of Things
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, Glenn A.; Zarzhitsky, Dimitri V.; Carroll, Thomas E.
Abstract— The growth of the Internet of Things (IoT) is driven by market pressures, and while security is being considered, the relationship between the unintended consequences of billions of such devices connecting to the Internet cannot be described with existing mathematical methods. The possibilities for illicit surveillance through lifestyle analysis, unauthorized access to information, and new attack vectors will continue to increase by 2020, when up-to 50 billion devices may be connected. This paper discusses various kinds of vulnerabilities that can be expected to arise, and presents a research agenda for mitigating the worst of the impacts. We hope tomore » draw research attention to the potential dangers of IoT so that many of these problems can be avoided.« less
Introduction: gendering socio cultural alcohol and drug research.
Hensing, G; Spak, F
2009-01-01
The gender gap in alcohol consumption and alcohol-related harm still is considerable and largely unexplained. This paper introduces four studies performed in Sweden that explore factors influencing gender differences in levels of consumption, adverse consequences and treatment. We summarize and discuss these four studies performed within the same cultural setting, which each analyse interaction with the gender. Two studies focus on the individual level addressing criminal behaviour, alcohol problems and mortality, and gender identity and alcohol problems in women taking psychiatric co-morbidity into account. Two studies focus on the institutional and cultural levels addressing the handling of alcohol-related problems in primary healthcare and the effectiveness of using cultural analysis in identifying gender concerns for women. Future studies need to focus more on these complex associations to secure that treatment settings provide both genders with fair and adequate treatment of high quality and that prevention activities will start to test measures that take gender into consideration.
Data Hemorrhages in the Health-Care Sector
NASA Astrophysics Data System (ADS)
Johnson, M. Eric
Confidential data hemorrhaging from health-care providers pose financial risks to firms and medical risks to patients. We examine the consequences of data hemorrhages including privacy violations, medical fraud, financial identity theft, and medical identity theft. We also examine the types and sources of data hemorrhages, focusing on inadvertent disclosures. Through an analysis of leaked files, we examine data hemorrhages stemming from inadvertent disclosures on internet-based file sharing networks. We characterize the security risk for a group of health-care organizations using a direct analysis of leaked files. These files contained highly sensitive medical and personal information that could be maliciously exploited by criminals seeking to commit medical and financial identity theft. We also present evidence of the threat by examining user-issued searches. Our analysis demonstrates both the substantial threat and vulnerability for the health-care sector and the unique complexity exhibited by the US health-care system.
The role of agriculture in the nutrition of children.
Blackie, Malcolm
2014-11-01
Data from across the developing world show consistently that a fundamental cause of poor nutrition is low agricultural productivity and consequent low incomes, especially amongst poor rural households. Conventionally, technical solutions have been sought to contribute to greater household food security, and thus better childhood nutrition. A more holistic approach is required. This paper draws from field examples, mainly in southern and east Africa, to illustrate the implementation and effectiveness of what is termed a 'green evolution' approach which emphasizes the efficient use of available resources of land, labour and inputs, thus allowing food to be sold profitably at low prices. With low food prices, the poor can use their limited funds to invest in better housing, education and health care. This is achieved through building thoughtful, farmer demand-led initiatives, backed by high quality science to deliver widespread improvements in nutrition for the poor.
Li, Xiangping; Lan, Tzu-Hsiang; Tien, Chung-Hao; Gu, Min
2012-01-01
The interplay between light polarization and matter is the basis of many fundamental physical processes and applications. However, the electromagnetic wave nature of light in free space sets a fundamental limit on the three-dimensional polarization orientation of a light beam. Although a high numerical aperture objective can be used to bend the wavefront of a radially polarized beam to generate the longitudinal polarization state in the focal volume, the arbitrary three-dimensional polarization orientation of a beam has not been achieved yet. Here we present a novel technique for generating arbitrary three-dimensional polarization orientation by a single optically configured vectorial beam. As a consequence, by applying this technique to gold nanorods, orientation-unlimited polarization encryption with ultra-security is demonstrated. These results represent a new landmark of the orientation-unlimited three-dimensional polarization control of the light-matter interaction.
Long-term effects of adolescent obesity: time to act.
Reinehr, Thomas
2018-03-01
Obesity in adolescence will probably have major implications not only for the affected adolescents but also for society. Those who have obesity during adolescence usually have obesity into adulthood, which causes many medical and psychological issues that can result in premature death. Furthermore, obesity in adolescents is associated with a range of social problems, including difficulties securing an apprenticeship or a job or finding a partner. Adolescents with obesity are also at increased risk of having children with obesity later in life. All these consequences lead to high costs for the health-care system. Although efficient treatment options are available that have been proven in randomized controlled trials, such as lifestyle interventions for adolescents with obesity and bariatric surgery for adolescents with severe obesity, these interventions frequently fail in clinical practice as treatment adherence is low in adolescents and most adolescents with obesity do not seek medical care. Therefore, improving treatment adherence and identifying treatment barriers are necessary.
Clark-Kazak, Christina R
2010-01-01
This paper explores the conceptualisation and application of 'protection' by the United Nations High Commissioner (UNHCR), Ugandan government, and Congolese refugees in Kyaka II refugee settlement, Uganda. Analysing the origins and consequences of a demonstration against school fees, and drawing on other ethnographic data, it explores how different interpretations of this incident reflect different conceptions of, and approaches to, protection. Ugandan government officials viewed the demonstration as a security incident; Congolese and Ugandan adults responded with increased monitoring and 'sheltering' of children and young people; students justified the demonstration as a legitimate manifestation of their rights; while UNHCR promoted assistance and resettlement. The paper argues that prevailing protection responses, including 'sensitisation', sheltering, and resettlement, are de-contextualised from daily realities and fail to address the underlying power relations that undermine protection. It concludes with recommendations on how international refugee agencies can reorient assistance to address protection concerns in refugee contexts.
Zhang, Liping; Zhu, Shaohui
2015-05-01
To protect the transmission of the sensitive medical data, a secure and efficient authenticated key agreement scheme should be deployed when the healthcare delivery session is established via Telecare Medicine Information Systems (TMIS) over the unsecure public network. Recently, Islam and Khan proposed an authenticated key agreement scheme using elliptic curve cryptography for TMIS. They claimed that their proposed scheme is provably secure against various attacks in random oracle model and enjoys some good properties such as user anonymity. In this paper, however, we point out that any legal but malicious patient can reveal other user's identity. Consequently, their scheme suffers from server spoofing attack and off-line password guessing attack. Moreover, if the malicious patient performs the same time of the registration as other users, she can further launch the impersonation attack, man-in-the-middle attack, modification attack, replay attack, and strong replay attack successfully. To eliminate these weaknesses, we propose an improved ECC-based authenticated key agreement scheme. Security analysis demonstrates that the proposed scheme can resist various attacks and enables the patient to enjoy the remote healthcare services with privacy protection. Through the performance evaluation, we show that the proposed scheme achieves a desired balance between security and performance in comparisons with other related schemes.
Davies, Patrick T; Martin, Meredith J; Sturge-Apple, Melissa L; Ripple, Michael T; Cicchetti, Dante
2016-10-01
Two studies tested hypotheses about the distinctive psychological consequences of children's patterns of responding to interparental conflict. In Study 1, 174 preschool children (M = 4.0 years) and their mothers participated in a cross-sectional design. In Study 2, 243 preschool children (M = 4.6 years) and their parents participated in 2 annual measurement occasions. Across both studies, multiple informants assessed children's psychological functioning. Guided by the reformulated version of emotional security theory, behavioral observations of children's coping with interparental conflict assessed their tendencies to exhibit 4 patterns based on their function in defusing threat: secure (i.e., efficiently address direct instances of threat), mobilizing (i.e., react to potential threat and social opportunities), dominant (i.e., directly defeat threat), and demobilizing (i.e., reduce salience as a target of hostility). As hypothesized, each profile predicted unique patterns of adjustment. Greater security was associated with lower levels of internalizing and externalizing symptoms and greater social competence, whereas higher dominance was associated with externalizing problems and extraversion. In contrast, mobilizing patterns of reactivity predicted more problems with self-regulation, internalizing symptoms, externalizing difficulties, but also greater extraversion. Finally, higher levels of demobilizing reactivity were linked with greater internalizing problems and lower extraversion but also better self-regulation. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
NASA Astrophysics Data System (ADS)
Cai, J.; Yin, H.; Varis, O.
2016-12-01
China faces a complicated puzzle in balancing the country's trade-offs among water and energy security, economic competitiveness, and environmental sustainability. It is therefore of prime importance to comprehend China's water and energy security under the effect of its economic structural changes. Analyses on this entity still remain few and far between though, and a comprehensive picture has not been available that would help understand China's recent development in economic structure as well as its spatial features and links to water and energy security, and policy-making. Consequently, we addressed this information gap by performing an integrated and quantitative spatio-temporal analysis of the impacts of China's industrial transition on water use intensity (WUI) and energy-related carbon intensity (ERCI). Those two factors serve as the national targets of its water and energy security. Our results for the first time quantitatively demonstrated the following significant and novel information: 1) the primary industry (PI) appeared to dominate the WUI although its relative share decreased, and PI's WUI continued to be far higher than that of secondary and tertiary industries (SI and TI); 2) SI dominated in affecting the total ERCI at both national and provincial scales; 3) the total WUI and ERCI had a significant positive correlation.
NASA Astrophysics Data System (ADS)
Jin, Wei; Zhang, Chongfu; Yuan, Weicheng
2016-02-01
We propose a physically enhanced secure scheme for direct detection-orthogonal frequency division multiplexing-passive optical network (DD-OFDM-PON) and long reach coherent detection-orthogonal frequency division multiplexing-passive optical network (LRCO-OFDM-PON), by employing noise-based encryption and channel/phase estimation. The noise data generated by chaos mapping are used to substitute training sequences in preamble to realize channel estimation and frame synchronization, and also to be embedded on variable number of key-selected randomly spaced pilot subcarriers to implement phase estimation. Consequently, the information used for signal recovery is totally hidden as unpredictable noise information in OFDM frames to mask useful information and to prevent illegal users from correctly realizing OFDM demodulation, and thereby enhancing resistance to attackers. The levels of illegal-decryption complexity and implementation complexity are theoretically discussed. Through extensive simulations, the performances of the proposed channel/phase estimation and the security introduced by encrypted pilot carriers have been investigated in both DD-OFDM and LRCO-OFDM systems. In addition, in the proposed secure DD-OFDM/LRCO-OFDM PON models, both legal and illegal receiving scenarios have been considered. These results show that, by utilizing the proposed scheme, the resistance to attackers can be significantly enhanced in DD-OFDM-PON and LRCO-OFDM-PON systems without performance degradations.
Mediated definite delegation - Certified Grid jobs in ALICE and beyond
NASA Astrophysics Data System (ADS)
Schreiner, Steffen; Grigoras, Costin; Litmaath, Maarten; Betev, Latchezar; Buchmann, Johannes
2012-12-01
Grid computing infrastructures need to provide traceability and accounting of their users’ activity and protection against misuse and privilege escalation, where the delegation of privileges in the course of a job submission is a key concern. This work describes an improved handling of Multi-user Grid Jobs in the ALICE Grid Services. A security analysis of the ALICE Grid job model is presented with derived security objectives, followed by a discussion of existing approaches of unrestricted delegation based on X.509 proxy certificates and the Grid middleware gLExec. Unrestricted delegation has severe security consequences and limitations, most importantly allowing for identity theft and forgery of jobs and data. These limitations are discussed and formulated, both in general and with respect to an adoption in line with Multi-user Grid Jobs. A new general model of mediated definite delegation is developed, allowing a broker to dynamically process and assign Grid jobs to agents while providing strong accountability and long-term traceability. A prototype implementation allowing for fully certified Grid jobs is presented as well as a potential interaction with gLExec. The achieved improvements regarding system security, malicious job exploitation, identity protection, and accountability are emphasized, including a discussion of non-repudiation in the face of malicious Grid jobs.
Achieving sustainable irrigation water withdrawals: global impacts on food security and land use
NASA Astrophysics Data System (ADS)
Liu, Jing; Hertel, Thomas W.; Lammers, Richard B.; Prusevich, Alexander; Baldos, Uris Lantz C.; Grogan, Danielle S.; Frolking, Steve
2017-10-01
Unsustainable water use challenges the capacity of water resources to ensure food security and continued growth of the economy. Adaptation policies targeting future water security can easily overlook its interaction with other sustainability metrics and unanticipated local responses to the larger-scale policy interventions. Using a global partial equilibrium grid-resolving model SIMPLE-G, and coupling it with the global Water Balance Model, we simulate the consequences of reducing unsustainable irrigation for food security, land use change, and terrestrial carbon. A variety of future (2050) scenarios are considered that interact irrigation productivity with two policy interventions— inter-basin water transfers and international commodity market integration. We find that pursuing sustainable irrigation may erode other development and environmental goals due to higher food prices and cropland expansion. This results in over 800 000 more undernourished people and 0.87 GtC additional emissions. Faster total factor productivity growth in irrigated sectors will encourage more aggressive irrigation water use in the basins where irrigation vulnerability is expected to be reduced by inter-basin water transfer. By allowing for a systematic comparison of these alternative adaptations to future irrigation vulnerability, the global gridded modeling approach offers unique insights into the multiscale nature of the water scarcity challenge.
Population waves and fertility fluctuations: social security implications.
Boyle, P P; Freedman, R
1985-01-01
Based on Canadian data, this study discusses some of the methods which incorporate fertility variations into population forecasts. In particular, the relative shifts in the age structure which can have profound social and economic consequences on the context of a pay as you go national security system are analyzed. In terms of long range economic and social planning, oscillating growth projections are much more difficult to handle and plan for than the constant growth rates predicted by stable population theories. The impact of different types of fertility fluctuations are analyzed in terms of evolution of the dependency ration over time; the dependency ratio corresponds to the ratio of the retired lives of a population to those of the working age population. From the viewpoint of a social security system, the evolution of the dependency ratio over time is of particular importance. Other areas explored are: 1) cohort fertility variations; 2) periodic fertility fluctuations; and 3) limit cycle behaviors. In the context of a national social security plan, one possible response to the population projections would be to maintain the year by year level of the RA ratio (ratio of the population aged 65 and over to the population aged between 20 and 65) at its equilibrium value of 27.6% by adjusting the retirement age appropriately.
Davies, Patrick T.; Martin, Meredith J.; Sturge-Apple, Melissa L.; Ripple, Michael T.; Cicchetti, Dante
2016-01-01
Two studies tested hypotheses about the distinctive psychological consequences of children’s patterns of responding to interparental conflict. In Study 1, 174 preschool children (M = 4.0 years) and their mothers participated in a cross-sectional design. In Study 2, 243 preschool children (M = 4.6 years) and their parents participated in two annual measurement occasions. Across both studies, multiple informants assessed children’s psychological functioning. Guided by the reformulated version of emotional security theory, behavioral observations of children’s coping with interparental conflict assessed their tendencies to exhibit four patterns based on their function in defusing threat: secure (i.e., efficiently address direct instances of threat), mobilizing (i.e., react to potential threat and social opportunities), dominant (i.e., directly defeat threat), and demobilizing (i.e., reduce salience as a target of hostility). As hypothesized, each profile predicted unique patterns of adjustment. Greater security was associated with lower levels of internalizing and externalizing symptoms and greater social competence, whereas higher dominance was associated with externalizing problems and extraversion. In contrast, mobilizing patterns of reactivity predicted more problems with self-regulation, internalizing symptoms, externalizing difficulties, but also greater extraversion. Finally, higher levels of demobilizing reactivity were linked with greater internalizing problems and lower extraversion but also better self-regulation. PMID:27598256
Rotting from Within: American Education and National Security
2011-03-04
Service, Training, Obesity, Health, Physical Fitness, Economic, Security, Training Education, High School, Pre-School, Teachers, Leaders, Military...Accessions, Citizenship, Quality, Selfless Service, Training, Obesity, Health, Physical Fitness, Economic, Security, Training Education, High School...subject areas 4 such as the arts and physical fitness. This emphasis on core-courses was mostly adhered to by America‘s diverse school systems
Environmental influences on food security in high-income countries.
Gorton, Delvina; Bullen, Chris R; Mhurchu, Cliona Ni
2010-01-01
Food security is a fundamental human right yet many people are food insecure, even in high-income countries. Reviewed here is the evidence for the physical, economic, sociocultural, and political environmental influences on household food security in high-income countries. The literature was evaluated using the ANGELO framework, which is a lens developed for understanding the environmental factors underpinning the obesity pandemic. A review of the literature identified 78 articles, which mostly reported on cross-sectional or qualitative studies. These studies identified a wide range of factors associated with food security. Foremost among them was household financial resources, but many other factors were identified and the complexity of the issue was highlighted. Few studies were prospective and even fewer tested the use of interventions other than the supplemental nutrition assistance program to address food security. This indicates a solution-oriented research paradigm is required to identify effective interventions and policies to enhance food security. In addition, comprehensive top-down and bottom-up interventions at the community and national levels are urgently needed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aderholdt, Ferrol; Caldwell, Blake A.; Hicks, Susan Elaine
High performance computing environments are often used for a wide variety of workloads ranging from simulation, data transformation and analysis, and complex workflows to name just a few. These systems may process data at various security levels but in so doing are often enclaved at the highest security posture. This approach places significant restrictions on the users of the system even when processing data at a lower security level and exposes data at higher levels of confidentiality to a much broader population than otherwise necessary. The traditional approach of isolation, while effective in establishing security enclaves poses significant challenges formore » the use of shared infrastructure in HPC environments. This report details current state-of-the-art in virtualization, reconfigurable network enclaving via Software Defined Networking (SDN), and storage architectures and bridging techniques for creating secure enclaves in HPC environments.« less
Experts advise hospitals to heed warning signs, leverage security to prepare against shootings.
2014-09-01
While hospital shootings are not commonplace, studies suggest they are happening with increasing frequency, and that EDs are particularly vulnerable to this type of violence. Researchers report that roughly a third of all hospital shootings occur in the emergency setting. Experts say such incidents are typically targeted events, not random acts. Consequently, effective security programs should emphasize preventive steps to defuse potentially volatile situations and prevent weapons from entering the facility. Hospital security departments should be equipped to provide training to employees throughout the facility so that employees know how to respond if an active shooter is identified. Researchers report that between 2000 and 2012 there were 154 shootings in American hospitals, and that the frequency of these events increased markedly in the later years of the study. Experts say hospital shootings may involve disgruntled patients, dementia patients, or psychiatric patients, but the most common perpetrators are prisoners who are brought into the hospital for treatment under guard. Security experts say effective safety plans should focus on identifying threatening language or other signs of agitation early on so that interventions can be employed. They also advise hospitals to install gun lockers at every entrance point so that lawful weapons can be stored before owners enter the facility. Liberalized gun laws in some regions are making security more difficult at public hospitals. Also, hospitals need to be careful with surveillance activities that could raise privacy concerns.
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks †
Hayajneh, Thaier; Mohd, Bassam J; Imran, Muhammad; Almashaqbeh, Ghada; Vasilakos, Athanasios V.
2016-01-01
There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and that it has the potential to save billions of dollars. Among the major concerns that are preventing the patients from widely adopting this technology are data privacy and security. Wireless Medical Sensor Networks (MSNs) are the building blocks for remote health monitoring systems. This paper helps to identify the most challenging security issues in the existing authentication protocols for remote patient monitoring and presents a lightweight public-key-based authentication protocol for MSNs. In MSNs, the nodes are classified into sensors that report measurements about the human body and actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue, as any alteration may lead to serious consequences. The proposed protocol is based on the Rabin authentication algorithm, which is modified in this paper to improve its signature signing process, making it suitable for delay-sensitive MSN applications. To prove the efficiency of the Rabin algorithm, we implemented the algorithm with different hardware settings using Tmote Sky motes and also programmed the algorithm on an FPGA to evaluate its design and performance. Furthermore, the proposed protocol is implemented and tested using the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++) library. The results show that secure, direct, instant and authenticated commands can be delivered from the medical staff to the MSN nodes. PMID:27023540
Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks.
Hayajneh, Thaier; Mohd, Bassam J; Imran, Muhammad; Almashaqbeh, Ghada; Vasilakos, Athanasios V
2016-03-24
There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and that it has the potential to save billions of dollars. Among the major concerns that are preventing the patients from widely adopting this technology are data privacy and security. Wireless Medical Sensor Networks (MSNs) are the building blocks for remote health monitoring systems. This paper helps to identify the most challenging security issues in the existing authentication protocols for remote patient monitoring and presents a lightweight public-key-based authentication protocol for MSNs. In MSNs, the nodes are classified into sensors that report measurements about the human body and actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue, as any alteration may lead to serious consequences. The proposed protocol is based on the Rabin authentication algorithm, which is modified in this paper to improve its signature signing process, making it suitable for delay-sensitive MSN applications. To prove the efficiency of the Rabin algorithm, we implemented the algorithm with different hardware settings using Tmote Sky motes and also programmed the algorithm on an FPGA to evaluate its design and performance. Furthermore, the proposed protocol is implemented and tested using the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++) library. The results show that secure, direct, instant and authenticated commands can be delivered from the medical staff to the MSN nodes.
Dolan, Mairead; Blattner, Regine
2010-09-29
Structured Professional Judgment (SPJ) approaches to violence risk assessment are increasingly being adopted into clinical practice in international forensic settings. The aim of this study was to examine the predictive validity of the Historical Clinical Risk -20 (HCR-20) violence risk assessment scale for outcome following transfers from high to medium security in a United Kingdom setting. The sample was predominately male and mentally ill and the majority of cases were detained under the criminal section of the Mental Health Act (1986). The HCR-20 was rated based on detailed case file information on 72 cases transferred from high to medium security. Outcomes were examined, independent of risk score, and cases were classed as "success or failure" based on established criteria. The mean length of follow up was 6 years. The total HCR-20 score was a robust predictor of failure at lower levels of security and return to high security. The Clinical and Risk management items contributed most to predictive accuracy. Although the HCR-20 was designed as a violence risk prediction tool our findings suggest it has potential utility in decisions to transfer patients from high to lower levels of security.
McCue, M J; Thompson, J M; Dodd-McCue, D
Using a resource dependency framework and financial theory, this study assessed the market, mission, operational, and financial factors associated with the level of cash and security investments in hospitals. We ranked hospitals in the study sample based on their cash and security investments as a percentage of total assets: hospitals in the high cash/security investment category were in the top 25th percentile of all hospitals; those in the low cash/security investment group were in the bottom 25th percentile. Findings indicate that high cash/security investment hospitals are under either public or private nonprofit ownership and have greater market share. They also serve more complex cases, offer more technology services, generate greater profits, incur a more stable patient revenue base, and maintain less debt.
Future climate impacts on maize farming and food security in Malawi
NASA Astrophysics Data System (ADS)
Stevens, Tilele; Madani, Kaveh
2016-11-01
Agriculture is the mainstay of Malawi’s economy and maize is the most important crop for food security. As a Least Developed Country (LDC), adverse effects of climate change (CC) on agriculture in Malawi are expected to be significant. We examined the impacts of CC on maize production and food security in Malawi’s dominant cereal producing region, Lilongwe District. We used five Global Circulation Models (GCMs) to make future (2011 to 2100) rainfall and temperature projections and simulated maize yields under these projections. Our future rainfall projections did not reveal a strong increasing or decreasing trend, but temperatures are expected to increase. Our crop modelling results, for the short-term future, suggest that maize farming might benefit from CC. However, faster crop growth could worsen Malawi’s soil fertility problem. Increasing temperature could drive lower maize yields in the medium to long-term future. Consequently, up to 12% of the population in Lilongwe District might be vulnerable to food insecurity by the end of the century. Measures to increase soil fertility and moisture must be developed to build resilience into Malawi’s agriculture sector.
Ultra Safe And Secure Blasting System
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hart, M M
2009-07-27
The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tappingmore » into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.« less
Working with a child's envy in the transference.
Gericke, Renate
2006-10-01
In literature, envy has long been written of as one of the seven cardinal sins. In biblical mythology, envy as a consequence of vanity can be understood to be the reason for archangel Lucifer's fall from a state of heavenly grace and unionship. Freud was the first psychoanalytic theorist to introduce the idea of envy, albeit through his controversial concept of penis envy. Karl Abrahams and Melanie Klein later placed envy at the crucial developing stages of the relationship between primary caregiver and infant. Klein boldly identified envy as a primary constitutional emotion. However, the presence and difficulties of envy in clinical work remain largely underreported, more so in work with children. This paper asks whether an attachment base can be secure if envy is dominant. The analysis of a nine-year-old girl ('Kirsten') and her envious transference with her therapist will be examined, to explore the relationship between envy and attachment security. While contemporary research focuses on developing attachment theory in relation to specific psychiatric conditions, this paper will discuss affect as the binding link or disruptive force between self and object representations, that then determine attachment security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Althouse, Paris
In the fast-paced field of biotechnology where innovation has such far-reaching impacts on human health and the environment, dealing with the implications of possible illicit activities, accidents or unintended research consequences with potential detrimental societal impacts tends to remain in the background. While controls may be inevitable for the biotech industry, workshop attendees agreed that the way in which controls are implemented will play a major role in the agility and innovation of the biotechnology industry. There is little desire to slow down the pace of the gains while dealing with the security issues that arise. As was seen frommore » the brief examinations of the Nuclear, Chemical, and Information Technology sectors explored in this workshop, establishing a regulatory regime needs to be a partnership between the public, corporate interests, scientists, and the government. Regulation is often written to combat perceived risk rather than actual risk—the public’s perceptions (occasionally even fictional portrayals) can spur regulatory efforts. This leads to the need for a thorough and continuing assessment of the risks posed by modern biotechnology. Inadequate or minimal risk assessment might expedite development in the short term but has potential negative long-term security and economic consequences. Industry and the technical community also often have a large role in setting regulatory policy, especially when well-crafted incentives are incorporated into the regulations. Such incentives might actually lead to enhanced innovation while poorly designed incentives can actually reduce safety and security. Any regulations should be as agile and flexible as the technology they regulate and when applied to biotechnologies they will need a new framework for thinking and implementing. The new framework should consider biotechnology as a technology and not simply a science since it is an extremely complex and adaptive system. This suggests the need to invest in social and political systems, rather than exclusively in technology, as a part of maintaining not only robust, but agile regulation. Modeling and simulations to illustrate how the biotech ecosystem might respond to new policies may be a promising approach to crafting regulations.« less
ERIC Educational Resources Information Center
Daneman, Kathy
1998-01-01
Describes the integration of security systems to provide enhanced security that is both effective and long lasting. Examines combining card-access systems with camera surveillance, and highly visible emergency phones and security officers. as one of many possible combinations. Some systems most capable of being integrated are listed. (GR)
High-security communication by coherence modulation at the photon-counting level.
Rhodes, William T; Boughanmi, Abdellatif; Moreno, Yezid Torres
2016-05-20
We show that key-specified interferometer path-length difference modulation (often referred to as coherence modulation), operating in the photon-counting regime with a broadband source, can provide a quantifiably high level of physics-guaranteed security for binary signal transmission. Each signal bit is associated with many photocounts, perhaps numbering in the thousands. Of great importance, the presence of an eavesdropper can be quickly detected. We first review the operation of key-specified coherence modulation at high light levels, illustrating by means of an example its lack of security against attack. We then show, using the same example, that, through the reduction of light intensities to photon-counting levels, a high level of security can be attained. A particular attack on the system is analyzed to demonstrate the quantifiability of the scheme's security, and various remaining research issues are discussed. A potential weakness of the scheme lies in a possible vulnerability to light amplification by an attacker.
Chandler, Felicity; Dissanayake, Cheryl
2014-07-01
Previous research has investigated caregiver attachment relationships in children with autism during early childhood, with few differences found from matched control groups. However, little is known of this relationship during middle childhood (ages 8-12 years). In this study, the aim was to establish whether there are differences in the security of attachment in children with high-functioning autism compared to typically developing children. A secondary aim was to establish whether caregivers' perceptions of their child's attachment to them accorded with the children's own reports. Twenty-one children with high-functioning autism and 17 typically developing children were administered the Kerns Security Scale and the Inventory of Parent and Peer Attachment-Revised, and caregivers completed the same questionnaires from the viewpoint of their child. There were no differences between the groups in the children's and parents' reports of attachment security. Parents' and children's reports were moderately correlated on the Kerns Security Scale but were not correlated on the Inventory of Parent and Peer Attachment-Revised. The results indicate that levels of attachment security in children with high-functioning autism are not different from those in typically developing children. © The Author(s) 2013.
NASA Astrophysics Data System (ADS)
Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng
2016-06-01
Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.
NASA Astrophysics Data System (ADS)
Smith, P.; Scheelbeek, P.; Bird, F.; Green, R.; Dangour, A.
2017-12-01
Background - Environmental changes—including climatic change, water scarcity, and biodiversity loss—threaten agricultural production and pose challenges to global food security. In this study, we review the evidence of the effects of environmental change on the yield and quality of fruits and vegetables - a food group that plays a highly important role in our diets - and assess possible implications for nutrition and health outcomes. Methods - We undertook two systematic reviews of the published literature on the effect of 8 different environmental stressors on yields and nutritional quality of (1) fruits and (2) vegetables, measured in greenhouse and field studies. We combined the review outcomes with Food Balance Sheet data to assess the potential consequences of changed availability and quality of fruits and vegetables for global nutrient deficiencies and related chronic diseases. Findings - Overall, fruits were affected more prominently by changing environmental patterns than vegetables. In tropical countries, there were largely adverse effects on yield of increased temperature and changing precipitation patterns, although in more temperate zones some beneficial effects were reported. In contrast, the effects on nutritional quality were mostly positive, especially in fruit crops, with higher vitamin and mineral content measured in most crops. Increased atmospheric CO2 concentrations had a predominantly positive effect on yield, especially in legumes, but a negative effect on nutritional quality of both fruits and vegetables. Adverse nutritional implications were estimated to be largest in areas characterised by high vulnerability to environmental change, high dependency on local markets, and high rates of food insecurity. Interpretation - Our study identified effects of environmental change on yields and quality of fruits and vegetables that might pose threats to population health, especially in areas vulnerable to climate-change and food insecurity. To obtain more precise estimates of the burden of disease attributable to these effects, further research is needed on farmers' and consumers' adaptation/substitution strategies, which would allow development of future food security scenarios.
NASA Astrophysics Data System (ADS)
Xiao, Dengpan; Qi, Yongqing; Shen, Yanjun; Tao, Fulu; Moiwo, Juana P.; Liu, Jianfeng; Wang, Rede; Zhang, He; Liu, Fengshan
2016-05-01
As climate change could significantly influence crop phenology and subsequent crop yield, adaptation is a critical mitigation process of the vulnerability of crop growth and production to climate change. Thus, to ensure crop production and food security, there is the need for research on the natural (shifts in crop growth periods) and artificial (shifts in crop cultivars) modes of crop adaptation to climate change. In this study, field observations in 18 stations in North China Plain (NCP) are used in combination with Agricultural Production Systems Simulator (APSIM)-Maize model to analyze the trends in summer maize phenology in relation to climate change and cultivar shift in 1981-2008. Apparent warming in most of the investigated stations causes early flowering and maturity and consequently shortens reproductive growth stage. However, APSIM-Maize model run for four representative stations suggests that cultivar shift delays maturity and thereby prolongs reproductive growth (flowering to maturity) stage by 2.4-3.7 day per decade (d 10a-1). The study suggests a gradual adaptation of maize production process to ongoing climate change in NCP via shifts in high thermal cultivars and phenological processes. It is concluded that cultivation of maize cultivars with longer growth periods and higher thermal requirements could mitigate the negative effects of warming climate on crop production and food security in the NCP study area and beyond.
How to Prepare the National Guard’s Leadership for Successful Venture in Homeland Security
2009-09-01
Posse Comitatus Act and other support approved by the Sec Def. (DoD JP 3-26, 2005, p. vi) Military Assistance to Civil Authorities ( MACA ) (as per...mission of MACA . MACA mission consist of three mission subsets. These mission subsets consist of: military support to civil authorities (MSCA...Terms) explanation a. Military Assistance to Civil Authorities ( MACA ) include Consequence management, DODD 3025.15 b. Military Support for Civil
Illegal Immigration: Causes, Consequences, and National Security Implications
2010-03-01
have already occurred: “In the wake of 9/11, Mara Salvatrucha [a criminal gang that originated in Los Angeles and has spread to Central America ...for the farmer in Bangladesh or the herder in Africa or the family being battered by hurricanes in Central America . Without that accord, there won’t...immigrants. For example, Malaria, Dengue , Tuberculosis, and other dangerous infections which were eradicated by the 1950s in Undocumented immigrants, who
Unintended Consequences of the Goldwater-Nichols Act (Joint Force Quarterly, Spring 1998)
1998-01-01
Armed Forces to achieve mili- tary success, the unified direction of DOD neces- sary for budgetary efficiency, and the separation of powers demanded by...its actions. The Constitution has stood for two centuries precisely because it flexibly applies simple concepts such as the separation of powers and...replaced, it has created a national military command structure that ignores the separation of powers . The amended National Security Act has consolidated
No Security Without Us: Tribes and Tribalism in Al Anbar Province, Iraq
2014-06-01
generosity, hospitality, self - esteem , honesty, integrity, safeguarding of women, and protection of the weak (see Figure 3). To...and prosper, and it can do so only if it preserves and reinforces the corporate pattern. As a consequence, Iraqi Arabs are subjected to strong family...of vengeance, it further serves as a measure of deterrence and self -protection. Since retribution for an injury could be directed at any lineage
2013-04-01
of contractors which may impact mission and security. Organic DOD subject matter experts can assure their IT-dependent missions. Utilizing in...involved typically conduct a ritualistic liability-focused finger-pointing that detracts from solving the mission- impacting problem. Resolving these...that if things go wrong, sufficient risk management actions have been taken to minimize the impact of failure. The military bears the consequences
2016-11-01
in national security policy formulation. iii v Strategic Studies Institute and U.S. Army War College Press SHOULD WE LET THE BOMB SPREAD? Henry D...the Bomb Don’t Think “More Is Better”..............25 W. Seth Carus 3. “At All Costs”: The Destructive Consequences of Anti-Proliferation Policy...In 1966, Leonard Beaton, a journalist and strategic scholar, published a short book that asked: Must the bomb spread?1 Mr. Beaton’s query
PHALANX, The Bulletin of Military Operations Research. Volume 43, Number 4, December 2010
2010-12-01
important contributions to national security. The Wayne P. hughes Junior analyst award is a relatively new award, first awarded in 2007 . This... 2007 ) provide a thorough critique of Social Bond Theory, includ- ing its possible limitations. 6. This quote is generally attributed to George E.P...J. Robert, Francis T. Cullen, and Richard A. Ball. Criminological Theory: Context and Consequences. Thousand Oaks: Sage Publications, 2007 . U.S
U.S. Policy and Strategy Toward Afghanistan After 2014
2014-10-01
Strategic Studies Institute (SSI) is part of the U.S. Army War College and is the strategic-level study agent for issues related to national security and...attainment accomplish the effect desired ( relates to objective)? • Feasibility—can the action be accomplished by the means available ( relates to concept...Acceptability—are the consequences of cost justified by the importance of the effect desired ( relates to resources/concept)?4 The challenge posed
People Crossing Borders: An Analysis of U.S. Border Protection Policies
2010-05-13
evaluate the policies that have been pursued in providing border protection, especially as these policies might impact other elements of the U.S. border...evaluate the impact of the current framework. Lastly, this report offers some policy options—both short-term and long-term—for addressing the...to account for the commercial consequences of ever-climbing levels of security at the U.S. border. In the end, balancing the economic impact of
The Common Risk Model for Dams: A Portfolio Approach to Security Risk Assessments
2013-06-01
and threat estimates in a way that accounts for the relationships among these variables. The CRM -D can effectively quantify the benefits of...consequence, vulnerability, and threat estimates in a way that properly accounts for the relationships among these variables. The CRM -D can effectively...Common RiskModel ( CRM ) for evaluating and comparing risks associated with the nation’s critical infrastructure. This model incorporates commonly used risk
Energy Policies for Resilience and National Security.
1981-10-01
consequences: cancer , sterility, and gross birth defects...for many years after...release." [Joint Committee on Defense Production 1977:1:29] Since many of these...emergency generators, and thirteen other establishments, mainly medical , needed emergency generators repaired. Con Ed dispatched 18 of its 50 portable...scrap metal were il- licitly dug up and sold from a waste dump in Beatty, Nevada [NRC 1976a]. "Vast quantities of cannabis resin were smuggled into
National Security Consequences of U.S. Oil Dependency
2006-11-09
J. DiBona Sentient Council Jessica P. Einhorn Paul H. Nitze School of Advanced International Studies Martin S. Feldstein National Bureau of Economic...Croft James R. Schlesinger John Deutch Peter Schwartz Charles J. DiBona Philip R. Sharp Jessica P. Einhorn James B. Steinberg Martin S. Feldstein Linda G...Director of Central Intelligence. Charles J. DiBona is the current Chairman of the Sentient Council and retired Chairman of the Board of Logistics
How to assess and counsel the older driver.
Messinger-Rapport, Barbara J
2002-03-01
Suggesting that a patient stop driving is never easy, yet taking no action may result in deadly consequences. Open communication with the patient and the family in the office setting can help physicians assess risk for a driving accident. The physician can then decide if further assessment and perhaps rehabilitation will benefit the patient. Working with the family and involving community resources to secure alternative forms of transportation may also be needed.
United States Armed Forces Celebrating 60 Years of Integration: 1948-2008
2008-01-01
Native Americans and believed that a removal policy would benefit the Indians. Consequently, in 1830, just a year after taking office, Jackson...military leaders refused to pay her for her services. Eventually, Dr. Walker gained experience in military medicine and went back to school where...sell, hold, and convey real and personal property, and to full and equal benefit of all laws and proceedings for the security of person and property
Epstein, Gerald L
2009-12-01
Over his entire career, Gerald Epstein has toiled at the nexus of science, technology, and security. From 2003 to 2009, he was Senior Fellow for Science and Security at the Center for Strategic and International Studies Homeland Security Program, where he worked on reducing biological weapons threats, improving national preparedness, and easing potential tensions between the scientific research and national security communities. Epstein came to CSIS from the Institute for Defense Analyses. From 1996 to 2001, he served in the White House Office of Science and Technology Policy. And from 1983 to 1989, and again from 1991 until its demise in 1995, Epstein worked at the Congressional Office of Technology Assessment, where he directed a study on the proliferation of weapons of mass destruction, alongside research on other global security topics. A recognized expert in biological risk reduction, Epstein was actually trained as a physicist, having received SB degrees in physics and electrical engineering from MIT, and a PhD in physics from the University of California at Berkeley. How, then, did he come to study the evolving threat from bioterrorism? "What compelled me about bioterrorism was that it was a stellar example of a topic that would lead to a train wreck between the scientific community and the security community unless they figured out how to work together," he said. "The distance between a laboratory and a very large consequence event is a lot shorter in biology than in any other field. I got into bioterrorism to help make sure that the security community doesn't get so scared of the science that it shuts it down, and that the science community isn't so oblivious of security concerns that it pays no attention to them." Epstein spoke on November 6, 2009, with contributing writer Madeline Drexler, author of Emerging Epidemics: The Menace of New Infections (Penguin, 2009), an updated version of an earlier volume. Drexler holds a visiting appointment at the Harvard School of Public Health and is a senior fellow at Brandeis University's Schuster Institute for Investigative Journalism.
Jackson, Bianca D; Walker, Neff; Heidkamp, Rebecca
2017-11-01
Background: The Lives Saved Tool (LiST) uses the poverty head-count ratio at $1.90/d as a proxy for food security to identify the percentage of the population with the potential to benefit from balanced energy supplementation and complementary feeding (CF) interventions, following the approach used for the Lancet 's 2008 series on Maternal and Child Undernutrition. Because much work has been done in the development of food security indicators, a re-evaluation of the use of this indicator was warranted. Objective: The aim was to re-evaluate the use of the poverty head-count ratio at $1.90/d as the food security proxy indicator in LiST. Methods: We carried out a desk review to identify available indicators of food security. We identified 3 indicators and compared them by using scatterplots, Spearman's correlations, and Bland-Altman plot analysis. We generated LiST projections to compare the modeled impact results with the use of the different indicators. Results: There are many food security indicators available, but only 3 additional indicators were identified with the data availability requirements to be used as the food security indicator in LiST. As expected, analyzed food security indicators were significantly positively correlated ( P < 0.001), but there was generally poor agreement between them. The disparity between the indicators also increases as the values of the indicators increase. Consequently, the choice of indicator can have a considerable effect on the impact of interventions modeled in LiST, especially in food-insecure contexts. Conclusions: There was no single indicator identified that is ideal for measuring the percentage of the population who is food insecure for LiST. Thus, LiST will use the food security indicators that were used in the meta-analyses that produced the effect estimates. These are the poverty head-count ratio at $1.90/d for CF interventions and the prevalence of a low body mass index in women of reproductive age for balanced energy supplementation interventions. © 2017 American Society for Nutrition.
2009-06-08
Security Grant Program ...............................................................................6 Intercity Passenger Rail Program (Amtrak...6 Intercity Bus Security Grant Program...fy2009.pdf. 19 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services between high-risk