Sample records for security andplanetary exploration

  1. The Secure-Base Hypothesis: Global Attachment, Attachment to Counselor, and Session Exploration in Psychotherapy

    ERIC Educational Resources Information Center

    Romano, Vera; Fitzpatrick, Marilyn; Janzen, Jennifer

    2008-01-01

    This study explored J. Bowlby's (1988) secure-base hypothesis, which predicts that a client's secure attachment to the therapist, as well as the client's and the therapist's global attachment security, will facilitate in-session exploration. Volunteer clients (N = 59) and trainee counselors (N = 59) in short-term therapy completed the Experiences…

  2. 50 CFR 37.14 - Bonding.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... WILDLIFE REFUGE SYSTEM GEOLOGICAL AND GEOPHYSICAL EXPLORATION OF THE COASTAL PLAIN, ARCTIC NATIONAL... a surety bond of not less than $100,000, or other security satisfactory to the Service, to secure... needed to secure performance of its exploration plan and plan(s) of operation and compliance with the...

  3. 77 FR 24381 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-24

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-1159] RIN 1625-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI AGENCY: Coast Guard, DHS. ACTION: Temporary interim rule; reopening of comment period. SUMMARY: The Coast...

  4. 77 FR 2019 - Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/Departure, Kaunakakai Harbor, Molokai, HI

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-13

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2011-1159] RIN 1625-AA87 Security Zone; Passenger Vessel SAFARI EXPLORER Arrival/ Departure, Kaunakakai Harbor, Molokai, HI AGENCY: Coast Guard, DHS. ACTION: Temporary interim rule with request for comments. SUMMARY: The Coast...

  5. The governance dimensions of water security: a review.

    PubMed

    Bakker, Karen; Morinville, Cynthia

    2013-11-13

    Water governance is critical to water security, and to the long-term sustainability of the Earth's freshwater systems. This review examines recent debates regarding the governance dimensions of water security, including adaptive governance, polycentric governance, social learning and multi-level governance. The analysis emphasizes the political and institutional dimensions of water governance, and explores the relevance of social power-an overlooked yet important aspect of the water security debate. In addition, the review explores the intersection and potential synergies between water governance perspectives and risk-based approaches to water security, and offers critiques and suggestions for further research questions and agendas.

  6. Explore with Us

    NASA Technical Reports Server (NTRS)

    Morales, Lester

    2012-01-01

    The fundamental goal of this vision is to advance U.S. scientific, security and economic interest through a robust space exploration program. Implement a sustained and affordable human and robotic program to explore the solar system and beyond. Extend human presence across the solar system, starting with a human return to the Moon by the year 2020, in preparation for human exploration of Mars and other destinations. Develop the innovative technologies, knowledge, and infrastructures both to explore and to support decisions about the destinations for human exploration. Promote international and commercial participation in exploration to further U.S. scientific, security, and economic interests.

  7. Guidelines for Network Security in the Learning Environment.

    ERIC Educational Resources Information Center

    Littman, Marlyn Kemper

    1996-01-01

    Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)

  8. Secure Base Script and Psychological Dysfunction in Japanese Young Adults in the 21st Century: Using the Attachment Script Assessment

    ERIC Educational Resources Information Center

    Umemura, Tomotaka; Watanabe, Manami; Tazuke, Kohei; Asada-Hirano, Shintaro; Kudo, Shimpei

    2018-01-01

    The universality of secure base construct, which suggests that one's use of an attachment figure as a secure base from which to explore the environment is an evolutionary outcome, is one of the core ideas of attachment theory. However, this universality idea has been critiqued because exploration is not as valued in Japanese culture as it is in…

  9. Homeland Security and Information.

    ERIC Educational Resources Information Center

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  10. Exploring Robust and Resilient Pathways to Water Security (Invited)

    NASA Astrophysics Data System (ADS)

    Brown, C. M.

    2013-12-01

    Lack of water security and the resultant cumulative effects of water-related hazards are understood to hinder economic growth throughout the world. Traditional methods for achieving water security as exemplified in the industrialized world have exerted negative externalities such as degradation of aquatic ecosystems. There is also growing concern that such methods may not be robust to climate variability change. It has been proposed that alternative pathways to water security must be followed in the developing world. However, it is not clear such pathways currently exist and there is an inherent moral hazard in such recommendations. This presentation will present a multidimensional definition of water security, explore the conflict in norms between engineering and ecologically oriented communities, and present a framework synthesizing those norms for assessing and innovating robust and resilient pathways to water security.

  11. Security Policy for a Generic Space Exploration Communication Network Architecture

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Sheehe, Charles J.; Vaden, Karl R.

    2016-01-01

    This document is one of three. It describes various security mechanisms and a security policy profile for a generic space-based communication architecture. Two other documents accompany this document- an Operations Concept (OpsCon) and a communication architecture document. The OpsCon should be read first followed by the security policy profile described by this document and then the architecture document. The overall goal is to design a generic space exploration communication network architecture that is affordable, deployable, maintainable, securable, evolvable, reliable, and adaptable. The architecture should also require limited reconfiguration throughout system development and deployment. System deployment includes subsystem development in a factory setting, system integration in a laboratory setting, launch preparation, launch, and deployment and operation in space.

  12. Eliciting Responsivity: Exploring Programming Interests of Federal Inmates as a Function of Security Classification.

    PubMed

    Neller, Daniel J; Vitacco, Michael J; Magaletta, Philip R; Phillips-Boyles, A Brooke

    2016-03-01

    Research supports the effectiveness of the Risk-Needs-Responsivity model for reducing criminal recidivism. Yet programming interests of inmates--one facet of responsivity--remain an understudied phenomenon. In the present study, we explored the programming interests of 753 federal inmates housed across three levels of security. Results suggest that inmates, as a group, prefer specific programs over others, and that some of their interests may differ by security level. We discuss possible implications of these findings. © The Author(s) 2014.

  13. Exploring the Educational Needs of the Homeland Security Community

    ERIC Educational Resources Information Center

    France, Paul

    2012-01-01

    This study involved an evaluation of the subjective perspectives held by a panel of 16 homeland security subject matter experts to determine what the needs of the homeland security professional community are for educational programs. The researcher examined the knowledge, skills, and abilities deemed important in homeland security to determine…

  14. From School Militarization to School Securitization: National Security Finds Its Place in Schools

    ERIC Educational Resources Information Center

    Nguyen, Nicole

    2017-01-01

    This ethnography explores daily life at Milton High School, a US public school with its own specialized Homeland Security program. From "military grunts" serving in distant theaters of war to Transportation Security Administration (TSA) agents defending the US borderlands to National Security Administration (NSA) technicians monitoring…

  15. Exploring Factors That Affect Adoption of Computer Security Practices among College Students

    ERIC Educational Resources Information Center

    Alqarni, Amani

    2017-01-01

    Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…

  16. Exploring the Future of Security in the Caribbean: a Regional Security Partnership?

    DTIC Science & Technology

    2007-12-14

    by these organizations and their members. 25 CHAPTER 2 LITERATURE REVIEW Psychologist Abraham Maslow posited that safety [read security] is one...addressing the security needs of the Caribbean Basin and the United States? Of necessity , there are several secondary questions which must be...development of models/ theories of security. These theories of security abound, and have evolved as the international arena has changed. Realists, idealists and

  17. Religion, Schooling, Community, and Security: Exploring Transitions and Transformations in England

    ERIC Educational Resources Information Center

    Lundie, David

    2017-01-01

    Education is a complex social practice. In the United Kingdom context, schooling is further nested within the complex social practices of community governance, quasi-market public choice, and religion. This essay explores the shifting definitions of community and education in the context of the Counter Terrorism and Security Act 2015, which places…

  18. 78 FR 66097 - In the Matter of Heritage Worldwide, Inc., Impala Mineral Exploration Corp., Klondike Star...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-04

    ... SECURITIES AND EXCHANGE COMMISSION [ File No. 500-1] In the Matter of Heritage Worldwide, Inc., Impala Mineral Exploration Corp., Klondike Star Mineral Corporation, MIV Therapeutics Inc., Most Home... concerning the securities of Klondike Star Mineral Corporation because it has not filed any periodic reports...

  19. Broadening the Study of Infant Security of Attachment: Maternal Autonomy-Support in the Context of Infant Exploration

    ERIC Educational Resources Information Center

    Whipple, Natasha; Bernier, Annie; Mageau, Genevieve A.

    2011-01-01

    Although security of attachment is conceptualised as a balance between infants' attachment and exploratory behaviours, parental behaviours pertaining to infant exploration have received relatively little empirical attention. Drawing from self-determination theory, this study seeks to improve the prediction of infant attachment by assessing…

  20. Newborn Irritability Moderates the Association between Infant Attachment Security and Toddler Exploration and Sociability

    ERIC Educational Resources Information Center

    Stupica, Brandi; Sherman, Laura J.; Cassidy, Jude

    2011-01-01

    This longitudinal investigation of 84 infants examined whether the effect of 12-month attachment on 18- and 24-month exploration and sociability with unfamiliar adults varied as a function of newborn irritability. As expected, results revealed an interaction between attachment (secure vs. insecure) and irritability (highly irritable vs. moderately…

  1. International Students' Emotional Security and Dignity in an Australian Context: An Aspect of Psychological Well-Being

    ERIC Educational Resources Information Center

    Tananuraksakul, Noparat; Hall, David

    2011-01-01

    This article explores non-native English-speaking students' emotional security and dignity responses to their English language proficiency in an Australian context. Confidence is a source of emotional security bolstering dignity. Without it, students lack emotional security, diminishing their dignity when communicating with culturally different…

  2. Exploring Factors that Influence Students' Behaviors in Information Security

    ERIC Educational Resources Information Center

    Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary

    2012-01-01

    Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…

  3. A License to Produce? Farmer Interpretations of the New Food Security Agenda

    ERIC Educational Resources Information Center

    Fish, Rob; Lobley, Matt; Winter, Michael

    2013-01-01

    Drawing on the findings of empirical research conducted in the South West of England, this paper explores how farmers make sense of re-emerging imperatives for "food security" in UK policy and political discourse. The analysis presented is based on two types of empirical inquiry. First, an extensive survey of 1543 farmers, exploring the…

  4. 75 FR 10331 - In the Matter of: Amalgamated Explorations, Inc., Areawide Cellular, Inc., Genomed, Inc., Global...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-05

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: Amalgamated Explorations, Inc., Areawide Cellular, Inc., Genomed, Inc., Global Maintech Corp., Military Resale Group, Inc., Verado Holdings, Inc., and World Transport Authority, Inc.; Order of Suspension of Trading It appears to the Securities and Exchange Commission that ther...

  5. Securitizing the Arctic indigenous peoples: A community security perspective with special reference to the Sámi of the European high north

    NASA Astrophysics Data System (ADS)

    Hossain, Kamrul

    2016-09-01

    The theory of securitization-the so-called Copenhagen school-centers the concept of security on various identified threats. Security based on the collective identity by which a society preserves its essential characteristics has been defined as community security, or societal security. The underlying principle of the Copenhagen school is that state-based, sovereignty-oriented security is ineffective unless the other components of security threats are addressed. The concept of human security, developed nearly simultaneously to that of securitization, identifies threat components at the sub-state level which are not traditionally understood as security concerns. Both schools of security thought are similar as they offer nontraditional approaches to understanding the concept of security. In this article, I explore securitization theory and the concept of human security to elaborate community perspectives in the understanding of security. In a case study, I investigate the security concerns of the indigenous peoples of the Arctic. The transformation of the Arctic by climate change and its impacts has resulted in new challenges and opportunities, so I explore how indigenous peoples in general and the Sámi in particular understand security which promotes their societal security. Although I show that this group of people deserves recognition and the ability to exercise greater authority, I conclude that diverse concepts of security do not by any means undermine the core traditional concept of security. These aspects of security remain subject to scrutiny by states and exist in a vertical structure. The Sámi, therefore, rely on affirmative actions by states to enjoy greater rights to maintain their community security.

  6. Information risk and security modeling

    NASA Astrophysics Data System (ADS)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  7. An evaluation of the construct of earned security in adolescents: evidence from an inpatient sample.

    PubMed

    Venta, Amanda; Sharp, Carla; Shmueli-Goetz, Yael; Newlin, Elizabeth

    2015-01-01

    In adult attachment research, a group of individuals who convey secure attachments despite recalling difficult early caregiver relationships has been identified. The term earned security refers to individuals in this group, whereas continuous security refers to individuals who convey secure attachments and describe caring early relationships. Evidence on the validity of earned security in adults is mixed--with one longitudinal study showing that earned secure adults, despite contrary recollections, are actually more likely to have experienced positive caregiving than continuous secure adults. There is currently no evidence of earned security in adolescence, and exploring it in this age group may help shed light on the overall problem of the validity of this construct. Therefore, the broad aim of this study was to examine the construct of earned security in a group of inpatient adolescents. First, the authors aimed to identify a group of adolescents with secure attachments and memories of difficult caregiver relationships (i.e., proposed earned secure group) in a sample of 240 inpatient adolescents. Next, to explore external validity, the authors examined whether this group differed from others with regard to internalizing distress and emotion regulation. Findings indicated that a subset of secure adolescents recall difficult caregiving, as has been noted in adults, and that they differ from others with regard to emotion regulation. Despite this preliminary evidence that earned security can be identified in adolescents, the authors conclude with a discussion of the caveats of applying this construct in adolescents as well as adults.

  8. Exploring the effectiveness of transit security awareness campaigns in the San Francisco Bay Area.

    DOT National Transportation Integrated Search

    2010-06-01

    Public involvement in alerting officials of suspicious and potentially harmful activity is critical to the overall security of a transit system. As part of an effort to get passengers and the public involved, many transit agencies have security aware...

  9. An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing.

    PubMed

    Kumar, Vinod; Jangirala, Srinivas; Ahmad, Musheer

    2018-06-28

    The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility for patients to explore medical treatment, accumulate and approach medical data through internet connectivity. Security and privacy preservation is necessary for medical data of the patient in TMIS because of the very perceptive purpose. Recently, Mohit et al.'s proposed a mutual authentication protocol for TMIS in the cloud computing environment. In this work, we reviewed their protocol and found that it is not secure against stolen verifier attack, many logged in patient attack, patient anonymity, impersonation attack, and fails to protect session key. For enhancement of security level, we proposed a new mutual authentication protocol for the similar environment. The presented framework is also more capable in terms of computation cost. In addition, the security evaluation of the protocol protects resilience of all possible security attributes, and we also explored formal security evaluation based on random oracle model. The performance of the proposed protocol is much better in comparison to the existing protocol.

  10. Explore Awareness of Information Security: Insights from Cognitive Neuromechanism.

    PubMed

    Han, Dongmei; Dai, Yonghui; Han, Tianlin; Dai, Xingyun

    2015-01-01

    With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people's awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people's awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG) signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people's cognition of potential risks in online financial payment.

  11. Explore Awareness of Information Security: Insights from Cognitive Neuromechanism

    PubMed Central

    Han, Dongmei; Han, Tianlin; Dai, Xingyun

    2015-01-01

    With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people's awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people's awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG) signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people's cognition of potential risks in online financial payment. PMID:26587017

  12. Operational Concepts for a Generic Space Exploration Communication Network Architecture

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Vaden, Karl R.; Jones, Robert E.; Roberts, Anthony M.

    2015-01-01

    This document is one of three. It describes the Operational Concept (OpsCon) for a generic space exploration communication architecture. The purpose of this particular document is to identify communication flows and data types. Two other documents accompany this document, a security policy profile and a communication architecture document. The operational concepts should be read first followed by the security policy profile and then the architecture document. The overall goal is to design a generic space exploration communication network architecture that is affordable, deployable, maintainable, securable, evolvable, reliable, and adaptable. The architecture should also require limited reconfiguration throughout system development and deployment. System deployment includes: subsystem development in a factory setting, system integration in a laboratory setting, launch preparation, launch, and deployment and operation in space.

  13. Information Security: A Scientometric Study of the Profile, Structure, and Dynamics of an Emerging Scholarly Specialty

    ERIC Educational Resources Information Center

    Olijnyk, Nicholas Victor

    2014-01-01

    The central aim of the current research is to explore and describe the profile, dynamics, and structure of the information security specialty. This study's objectives are guided by four research questions: 1. What are the salient features of information security as a specialty? 2. How has the information security specialty emerged and evolved from…

  14. Infusing Aging and Public Policy Content into Gerontology Courses: Collaborative Learning Methods To Teach about Social Security and Medicare.

    ERIC Educational Resources Information Center

    Cianciolo, Patricia K.; Henderson, Tammy L.

    2003-01-01

    Describes modules on Social Security and Medicare for gerontology policy courses. Discusses collaborative exercises in which students explore Internet resources on Social Security and health care finance, identity major concerns about reforms, and enact scenarios about retirees with varying degrees of income and health care security. (Contains 33…

  15. Using K-12 Lessons Learned about How to Balance Accessibility and Test Security to Inform Licensure, Credentialing, and Certification Exam Policies

    ERIC Educational Resources Information Center

    Lazarus, Sheryl S.; van den Heuvel, Jill R.; Thurlow, Martha L.

    2017-01-01

    This paper explores how to balance test security and accessibility on licensure, credentialing, and certification exams. It examines K-12 test security policies related to educational assessments across states to discover lessons learned about how to meet accessibility needs of individuals with disabilities while minimizing test security risks. It…

  16. Climate Change and Risks to National Security

    NASA Astrophysics Data System (ADS)

    Titley, D.

    2017-12-01

    Climate change impacts national security in three ways: through changes in the operating environments of the military; by increasing risks to security infrastructure, specifically bases and training ranges; and by exacerbating and accelerating the risks of state collapse and conflict in regions that are already fragile and unstable. Additionally there will be unique security challenges in the Arctic as sea-ice melts out and human activities increase across multiple dimensions. Military forces will also likely see increased demand for Humanitarian Assistance and Disaster Relief resulting from a combination of increased human population, rising sea-level, and potentially stronger and wetter storms. The talk will explore some of the lesser known aspects of these changes, examine selected climate-driven 'wild cards' that have the potential to disrupt regional and global security, and explore how migration in the face of a changing climate may heighten security issues. I will assess the positions U.S. executive and legislative branches with respect to climate & security, and how those positions have evolved since the November 2016 election, sometimes in counter-intuitive ways. The talk will close with some recommended courses of action the security enterprise can take to manage this climate risk.

  17. The Defender's Role in Cyber Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    The embodiment of this work is a table top game to explore cyber security and network defense concepts and cost. The game structure is such that it provides players an immersive environment to play a given role in cyber security to investigate the result of infrastructure and response decisions.

  18. Should the poor have no medicines to cure? A study on the association between social class and social security among the rural migrant workers in urban China.

    PubMed

    Guan, Ming

    2017-11-07

    The rampant urbanization and medical marketization in China have resulted in increased vulnerabilities to health and socioeconomic disparities among the rural migrant workers in urban China. In the Chinese context, the socioeconomic characteristics of rural migrant workers have attracted considerable research attention in the recent past years. However, to date, no previous studies have explored the association between the socioeconomic factors and social security among the rural migrant workers in urban China. This study aims to explore the association between socioeconomic inequity and social security inequity and the subsequent associations with medical inequity and reimbursement rejection. Data from a regionally representative sample of 2009 Survey of Migrant Workers in Pearl River Delta in China were used for analyses. Multiple logistic regressions were used to analyze the impacts of socioeconomic factors on the eight dimensions of social security (sick pay, paid leave, maternity pay, medical insurance, pension insurance, occupational injury insurance, unemployment insurance, and maternity insurance) and the impacts of social security on medical reimbursement rejection. The zero-inflated negative binomial regression model (ZINB regression) was adopted to explore the relationship between socioeconomic factors and hospital visits among the rural migrant workers with social security. The study population consisted of 848 rural migrant workers with high income who were young and middle-aged, low-educated, and covered by social security. Reimbursement rejection and abusive supervision for the rural migrant workers were observed. Logistic regression analysis showed that there were significant associations between socioeconomic factors and social security. ZINB regression showed that there were significant associations between socioeconomic factors and hospital visits among the rural migrant workers. Also, several dimensions of social security had significant associations with reimbursement rejections. This study showed that social security inequity, medical inequity, and reimbursement inequity happened to the rural migrant workers simultaneously. Future policy should strengthen health justice and enterprises' medical responsibilities to the employed rural migrant workers.

  19. 77 FR 45354 - Notification of Single Source Cooperative Agreement Award for Project Hope

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-31

    ... Support of National Health Security Strategy (2009) and Implementation Plan (2012) and Homeland Security... Directive-21 (2007) and the National Health Security Strategy (2009) and Implementation Plan (2012). In the... of a Health Affairs thematic issue that will identify, explore and propose policy options for...

  20. China’s Energy Security: The Grand Hedging Strategy

    DTIC Science & Technology

    2010-05-01

    spotlight. The key to sustaining this dynamic economic growth is access to petroleum resources. The central question of this monograph is as follows...Is China’s energy security strategy liberal-institutionalist or realist-mercantilist? Using a qualitative case study methodology that explores the...dependent variable -- energy security -- using three independent variables (cost of supply, reliability of supply, and security of supply), China’s

  1. World population, world health and security: 20th century trends.

    PubMed

    Bashford, A

    2008-03-01

    The connection between infectious disease control and national security is now firmly entrenched. This article takes a historical look at another security issue once prominent in debate on foreign policy and international relations, but now more or less absent: overpopulation. It explores the nature of the debate on population as a security question, and its complicated historical relation to the development of world health.

  2. The Feasibility of Wearables in an Enterprise Environment and Their Impact on IT Security

    NASA Technical Reports Server (NTRS)

    Scotti, Vincent, Jr.

    2015-01-01

    This paper is intended to explore the usability and feasibility of wearables in an enterprise environment and their impact on IT Security. In this day and age, with the advent of the Internet of Things, we must explore all the new technology emerging from the minds of the new inventors. This means exploring the use of wearables in regards to their benefits, limitations, and the new challenges they pose to securing computer networks in the Federal environment. We will explore the design of the wearables, the interfaces needed to connect them, and what it will take to connect personal devices in the Federal enterprise network environment. We will provide an overview of the wearable design, concerns of ensuring the confidentiality, integrity, and availability of information and the challenges faced by those doing so. We will also review the implications and limitations of the policies governing wearable technology and the physical efforts to enforce them.

  3. Reviewing Japanese Concepts of Amae and Ie to Deeper Understand the Relevance of Secure-Base Behavior in the Context of Japanese Caregiver-Child Interactions.

    PubMed

    Umemura, Tomo; Traphagan, John W

    2015-12-01

    Attachment theorists believe that children rely on their caregivers for protection and exploration. Due to this emphasis on independent exploration, however, the extent to which this notion of secure-base behavior is valid in societies emphasizing belongingness, such as Japan, has been questioned. By conducting an in-depth exploration of two Japanese collectivistic concepts, amae and ie, the present paper reexamines the relevance of secure-base behavior in Japan. Current discussions of amae have relied on psychoanalytic concepts that were developed in Western culture, and thus may not accurately represent Japanese parent-child relations. By examining another traditional concept of the family system, ie, this paper proposes that attachment theory is relevant in Japanese culture because children's individual competence is important to their families.

  4. Voices from the Field: Working Together for Safe and Secure Schools. Summary of Findings from Florida Education Commissioner Charlie Crist's School Safety and Security Summits.

    ERIC Educational Resources Information Center

    Florida State Dept. of Education, Tallahassee.

    During summer and fall 2001, the Florida Commissioner of Education conducted eight regional meetings, open to the public, on school safety and security. The purpose of the meetings was to explore safety issues faced by districts and schools, share best safety practices, and generate local discussion on matters of school safety and security. This…

  5. [The Explore of the Security Strategy Model in Hospital Mobile Clinic New Mode].

    PubMed

    Li, Ke; Xia, Yong; Wang, Wei

    2016-03-01

    The paper elaborates and analyzes the current status of mobile hospital information security, then puts forward a security new model of the mobile treatment, then its architecture and solutions is elaborated. The use of this model makes the overall security level of hospital information to be further improved and enhanced, it has a positive signifi cance to promote the overal hospital management level.

  6. The Impact of Regional Higher Education Spaces on the Security of International Students

    ERIC Educational Resources Information Center

    Forbes-Mewett, Helen

    2016-01-01

    The security of international students in regional higher education spaces in Australia has been overlooked. Contingency theory provides the framework for this case study to explore the organisational structure and support services relevant to a regional higher education space and how this impacts the security of international students. In-depth…

  7. Information Systems Security Job Advertisement Analysis: Skills Review and Implications for Information Systems Curriculum

    ERIC Educational Resources Information Center

    Brooks, Nita G.; Greer, Timothy H.; Morris, Steven A.

    2018-01-01

    The authors' focus was the assessment of skill requirements for information systems security positions to understand expectations for security jobs and to highlight issues relevant to curriculum management. The analysis of 798 job advertisements involved the exploration of domain-related and soft skills as well as degree and certification…

  8. The Training Deficiency in Corporate America: Training Security Professionals to Protect Sensitive Information

    ERIC Educational Resources Information Center

    Johnson, Kenneth T.

    2017-01-01

    Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…

  9. Securing Location Services Infrastructures: Practical Criteria for Application Developers and Solutions Architects

    ERIC Educational Resources Information Center

    Karamanian, Andre

    2013-01-01

    This qualitative, exploratory, normative study examined the security and privacy of location based services in mobile applications. This study explored risk, and controls to implement privacy and security. This study was addressed using components of the FIPS Risk Management Framework. This study found that risk to location information was…

  10. Meet EPA Engineer Steve Clark

    EPA Pesticide Factsheets

    Steve Clark is an environmental engineer in EPA’s National Homeland Security Research Center (NHSRC). His research focuses on water security, exploring ways to protect and decontaminate pipes and other water “infrastructure.”

  11. The role of seasonality on the diet and household food security of pregnant women living in rural Bangladesh: a cross-sectional study.

    PubMed

    Stevens, Briony; Watt, Kerrianne; Brimbecombe, Julie; Clough, Alan; Judd, Jenni; Lindsay, Daniel

    2017-01-01

    To investigate the association of seasonality with dietary diversity, household food security and nutritional status of pregnant women in a rural district of northern Bangladesh. A cross-sectional study was conducted from February 2013 to February 2015. Data were collected on demographics, household food security (using the Household Food Insecurity Access Scale), dietary diversity (using the women's dietary diversity questionnaire) and mid-upper arm circumference. Descriptive statistics were used to explore demographics, dietary diversity, household food security and nutritional status, and inferential statistics were applied to explore the role of seasonality on diversity, household food security and nutritional status. Twelve villages of Pirganj sub-district, Rangpur District, northern Bangladesh. Pregnant women (n 288). Seasonality was found to be associated with dietary diversity (P=0·026) and household food security (P=0·039). Dietary diversity was significantly lower in summer (P=0·029) and spring (P=0·038). Food security deteriorated significantly in spring (P=0·006) and late autumn (P=0·009). Seasons play a role in women's household food security status and dietary diversity, with food security deteriorating during the lean seasons and dietary diversity deteriorating during the second 'lesser' lean season and the season immediately after. Interventions that aim to improve the diet of pregnant women from low-income, subsistence-farming communities need to recognise the role of seasonality on diet and food security and to incorporate initiatives to prevent seasonal declines.

  12. The System Engineering Approach: Taiwan Navy Incorporation of Mobile Devices (Smartphone) into Its Force Structure

    DTIC Science & Technology

    2015-06-01

    words) Attempting different approaches to explore the best practice of optimizing mobile security and productivity is necessary to improve the...INTENTIONALLY LEFT BLANK iv ABSTRACT Attempting different approaches to explore the best practice of optimizing mobile security and productivity is...incredible kindness and unfathomable generosity. I am grateful to have watched Super Bowl XLIX in your living room, washed dirty clothes in your laundry room

  13. Decisional Information System for Safety (D.I.S.S.) Dedicated to the Human Space Exploration Mission

    NASA Astrophysics Data System (ADS)

    Grès, Stéphane; Guyonnet, Jean-François

    2006-06-01

    At the heart of the issue of reliable and dependable systems and networks, this paper presents the conception of a Decisional Information System for Security (D.I.S.S.) dedicated to the Human Space Exploration Mission. The objective is to conceive a decisional information system for human long duration space flight (> 1000 days) which is realised in entire autonomy in the solar system. This article describes the importance of the epistemological and ontological context for designing an open, self-learning and reliable system able for self-adapt in dangerous and unforeseen situations. We present in link with our research, the limits of the empirical analytical paradigm and several paths of research lead by the nascent paradigm of enaction. The strong presumption is that the centralised models of security could not be sufficient today to respond and challenge the security of a technical system, which will support human exploration missions.

  14. Predictors of Attachment Security in Preschool Children from Intact and Divorced Families

    ERIC Educational Resources Information Center

    Nair, Hira; Murray, Ann D.

    2005-01-01

    The authors selected 58 mother-child dyads from divorced and intact families to participate in a study on the impact of divorce on preschoolers' attachment security. The authors explored pathways that lead to security of attachment. They found that mothers from divorced families were younger, had lower income levels, and had lower levels of…

  15. National Security and U.S.-Soviet Relations. Occasional Paper 26.

    ERIC Educational Resources Information Center

    Clemens, Walter C., Jr.

    This paper provides an analytical look at the evolving relationship between the United States and the Soviet Union. The author explores the prospects for international security and advocates a number of policies which would benefit both societies. The first section in the booklet discusses how U.S. security cannot be assured even if the Congress…

  16. Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience

    ERIC Educational Resources Information Center

    Thompson, Eleanor Elizabeth

    2014-01-01

    That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…

  17. Perceptions of Accounting Practitioners and Educators on E-Business Curriculum and Web Security Issues

    ERIC Educational Resources Information Center

    Ragothaman, Srinivasan; Lavin, Angeline; Davies, Thomas

    2007-01-01

    This research examines, through survey administration, the perceptions of accounting practitioners and educators with respect to the multi-faceted security issues of e-commerce payment systems as well as e-business curriculum issues. Specific security issues explored include misuse/theft of personal and credit card information, spam e-mails,…

  18. Protecting intellectual property in space; Proceedings of the Aerospace Computer Security Conference, McLean, VA, March 20, 1985

    NASA Technical Reports Server (NTRS)

    1985-01-01

    The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.

  19. Impact of Export Control and Technology Transfer Regimes: International Perspectives

    DTIC Science & Technology

    2012-01-07

    major national security and public policy issue. Exploring the ITAR environment through a set of case studies was the central idea in a project...cover) was based on a survey of UK stakeholders. The results were unambiguous and striking. Our British partners conclude ITAR is a good idea gone...ITAR) regime is a major national security and public policy issue. Exploring the ITAR environment through a set of case studies was the central idea

  20. The Consequences to National Security of Jurisdictional Gray Areas Between Emergency Management and Homeland Security

    DTIC Science & Technology

    2014-09-01

    Security (DHS). This research explores how the determination, and more importantly, the urgency of the nation’s leaders to show resiliency , has created...2002 represented the blueprint for a nation of resiliency that unified the government and its community citizenry while deploying measures of...nation of pride and resiliency but also the owner of a complex inwardly focused, national security organization. To examine the JGAs between EM and HS

  1. Preventing Chaos.

    ERIC Educational Resources Information Center

    Pineda, Ernest M.

    1999-01-01

    Discusses ways to help resolve the Y2K problem and avoid disruptions in school security and safety. Discusses computer software testing and validation to determine its functionality after year's end, and explores system remediation of non-compliant fire and security systems. (GR)

  2. Exploring the impact of the 2008 global food crisis on food security among vulnerable households in rural South Africa

    PubMed Central

    Nawrotzki, Raphael J.; Robson, Kristin; Gutilla, Margaret J.; Hunter, Lori M.; Twine, Wayne; Norlund, Petra

    2015-01-01

    Recurring food crises endanger the livelihoods of millions of households in developing countries around the globe. Owing to the importance of this issue, we explore recent changes in food security between the years 2004 and 2010 in a rural district in Northeastern South Africa. Our study window spans the time of the 2008 global food crises and allows the investigation of its impacts on rural South African populations. Grounded in the sustainable livelihood framework, we examine differences in food security trajectories among vulnerable sub populations. A unique panel data set of 8,147 households, provided by the Agincourt Health and Demographic Surveillance System (Agincourt HDSS), allows us to employ a longitudinal multilevel modeling approach to estimate adjusted growth curves for the differential change in food security across time. We observe an overall improvement in food security that leveled off after 2008, most likely resulting from the global food crisis. In addition, we discover significant differences in food security trajectories for various sub populations. For example, female-headed households and those living in areas with better access to natural resources differentially improved their food security situation, compared to male-headed households and those households with lower levels of natural resource access. However, former Mozambican refugees witnessed a decline in food security. Therefore, poverty alleviation programs for the Agincourt region should work to improve the food security of vulnerable households, such as former Mozambican refugees. PMID:26594259

  3. 77 FR 4853 - In the Matter of Airbee Wireless, Inc., Axial Vector Engine Corp. (n/k/a Avec Corporation), and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-31

    ... Vector Engine Corp. (n/k/a Avec Corporation), and Exploration Drilling International, Inc.; Order of... securities of Axial Vector Engine Corp. (n/k/a Avec Corporation) because it has not filed any periodic...(k) of the Securities Exchange Act of 1934, that trading in the securities of the above-listed...

  4. Adolescents' True-Self Behavior and Adjustment: The Role of Family Security and Satisfaction of Basic Psychological Needs

    ERIC Educational Resources Information Center

    Goldner, Limor; Berenshtein-Dagan, Tal

    2016-01-01

    Associations between security within the family, satisfaction of basic psychological needs, true-self behavior, and knowledge of true self, as well as levels of adjustment, were explored in a sample of early adolescents and midadolescents in Israel (N = 302, mean age = 14.19 years). Both security within the family and needs satisfaction were found…

  5. National Security and Global Climate Change

    DTIC Science & Technology

    2008-01-01

    The uncertainty, confusion, and speculation about the causes, effects, and implications of global climate change (GCC) often paralyze serious...against scientific indications of global climate change , but to consider how it would pose challenges to national security, explore options for facing...generals and admirals, released a report concluding that projected climate change poses a serious threat to America’s national security. This article

  6. Exploring the Public Health Impacts of Private Security Guards on People Who Use Drugs: a Qualitative Study.

    PubMed

    Markwick, Nicole; McNeil, Ryan; Small, Will; Kerr, Thomas

    2015-12-01

    Private security guards occupy an increasingly prominent role in the policing of private and public spaces. There are growing concerns regarding security guards' potential to shape violence, discrimination, and adverse health outcomes among vulnerable populations, including people who use drugs (PWUD). This is relevant in Vancouver, Canada, where private security guards have increasingly been employed by private organizations to manage public and private spaces, including those within urban drug scenes. This qualitative study sought to understand interactions between PWUD and private security guards and explore their impacts on health care access, risks, and harms among PWUD. Semi-structured interviews were conducted with 30 PWUD recruited from two ongoing prospective cohort studies. Interviews were transcribed and analyzed using a coding framework comprised of a priori and emergent categories. Study data indicate that participants experience pervasive, discriminatory profiling and surveillance by security guards, which exacerbates existing social marginalization and structural vulnerability, particularly among PWUD of Aboriginal ancestry. Participants reported that security guards restrict PWUD's access to public and private spaces, including pharmacies and hospitals. PWUD also reported that their interactions with security guards often involved interpersonal violence and aggression, experiences that served to increase their vulnerability to subsequent risks and harms. Our findings highlight that private security forces contribute significantly to the everyday violence experienced by PWUD within drug scenes and elsewhere and do so in a manner very similar to that of traditional police forces. These findings point to the urgent need for greater oversight and training of private security guards in order to protect the health and safety of PWUD.

  7. Empirical Analysis and Automated Classification of Security Bug Reports

    NASA Technical Reports Server (NTRS)

    Tyo, Jacob P.

    2016-01-01

    With the ever expanding amount of sensitive data being placed into computer systems, the need for effective cybersecurity is of utmost importance. However, there is a shortage of detailed empirical studies of security vulnerabilities from which cybersecurity metrics and best practices could be determined. This thesis has two main research goals: (1) to explore the distribution and characteristics of security vulnerabilities based on the information provided in bug tracking systems and (2) to develop data analytics approaches for automatic classification of bug reports as security or non-security related. This work is based on using three NASA datasets as case studies. The empirical analysis showed that the majority of software vulnerabilities belong only to a small number of types. Addressing these types of vulnerabilities will consequently lead to cost efficient improvement of software security. Since this analysis requires labeling of each bug report in the bug tracking system, we explored using machine learning to automate the classification of each bug report as a security or non-security related (two-class classification), as well as each security related bug report as specific security type (multiclass classification). In addition to using supervised machine learning algorithms, a novel unsupervised machine learning approach is proposed. An ac- curacy of 92%, recall of 96%, precision of 92%, probability of false alarm of 4%, F-Score of 81% and G-Score of 90% were the best results achieved during two-class classification. Furthermore, an accuracy of 80%, recall of 80%, precision of 94%, and F-score of 85% were the best results achieved during multiclass classification.

  8. Texting "boosts" felt security.

    PubMed

    Otway, Lorna J; Carnelley, Katherine B; Rowe, Angela C

    2014-01-01

    Attachment security can be induced in laboratory settings (e.g., Rowe & Carnelley, 2003) and the beneficial effects of repeated security priming can last for a number of days (e.g., Carnelley & Rowe, 2007). The priming process, however, can be costly in terms of time. We explored the effectiveness of security priming via text message. Participants completed a visualisation task (a secure attachment experience or neutral experience) in the laboratory. On three consecutive days following the laboratory task, participants received (secure or neutral) text message visualisation tasks. Participants in the secure condition reported significantly higher felt security than those in the neutral condition, immediately after the laboratory prime, after the last text message prime and one day after the last text prime. These findings suggest that security priming via text messages is an innovative methodological advancement that effectively induces felt security, representing a potential direction forward for security priming research.

  9. Attachment Security Balances Perspectives: Effects of Security Priming on Highly Optimistic and Pessimistic Explanatory Styles.

    PubMed

    Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue

    2016-01-01

    Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.

  10. Sandia National Laboratories Strategic Context Workshop Series 2017: National Security Futures for Strategic Thinking.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keller, Elizabeth James Kistin; Roll, Elizabeth; Aamir, Munaf Syed

    In August 2017, Sandia convened five workshops to explore the future of advanced technologies and global peace and security through the lenses of deterrence, information, innovation, nonproliferation, and population and Earth systems.

  11. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    PubMed

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  12. To Legalize or not to Legalize? That is the Question

    DTIC Science & Technology

    2009-04-01

    and international community to improve security and promote development in Afghanistan. The negative effect on the nations overall security, the...the problem/solution methodology. The research explores the current illicit opium cultivation in Afghanistan and its effect on the current...negative effect on the current development efforts. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF

  13. Border Security: A Conceptual Model of Complexity

    DTIC Science & Technology

    2013-12-01

    maximum 200 words ) This research applies complexity and system dynamics theory to the idea of border security, culminating in the development of...alternative policy options. E. LIMITATIONS OF RESEARCH AND MODEL This research explores whether border security is a living system. In other words , whether...border inspections. Washington State, for example, experienced a 50% drop in tourism and lost over $100 million in local revenue because of the

  14. Safety and Security of Older Persons in Tehran, Iran: A Sociological Appraisal of Elder Abuse

    ERIC Educational Resources Information Center

    Sheykhi, Mohammad Taghi

    2010-01-01

    The article explores and evaluates the quality of life, safety, and security of elderly people in Tehran City in Iran. In that, different dimensions of material and social well-being, and abuse of people of the age 65 and above, are assessed. Besides the human rights, the dignity, and the gradual decline of the elderly's social security are…

  15. Petri net modeling of encrypted information flow in federated cloud

    NASA Astrophysics Data System (ADS)

    Khushk, Abdul Rauf; Li, Xiaozhong

    2017-08-01

    Solutions proposed and developed for the cost-effective cloud systems suffer from a combination of secure private clouds and less secure public clouds. Need to locate applications within different clouds poses a security risk to the information flow of the entire system. This study addresses this by assigning security levels of a given lattice to the entities of a federated cloud system. A dynamic flow sensitive security model featuring Bell-LaPadula procedures is explored that tracks and authenticates the secure information flow in federated clouds. Additionally, a Petri net model is considered as a case study to represent the proposed system and further validate the performance of the said system.

  16. Improving organisational resilience through enterprise security risk management.

    PubMed

    Petruzzi, John; Loyear, Rachelle

    Enterprise Security Risk Management (ESRM) is a new philosophy and method of managing security programmes through the use of traditional risk principles. As a philosophy and life cycle, ESRM is focused on creating a business partnership between security practitioners and business leaders to more effectively provide protection against security risks in line with acceptable risk tolerances as defined by business asset owners and stakeholders. This paper explores the basics of the ESRM philosophy and life cycle and also shows how embracing the ESRM philosophy and implementing a risk-based security management model in the business organisation can lead to higher levels of organisational resilience as desired by organisation leaders, executives and the board of directors.

  17. The availability and affordability of long-term care for disabled older people in China: The issues related to inequalities in social security benefits.

    PubMed

    Lei, Peng; Feng, Zhixin; Wu, Zhuochun

    2016-01-01

    China is experiencing increasing pressure from issues relating to an ageing population. The rationality of different eligibility criteria of the benefits within the social security system has been widely challenged; however, to date, no previous study has explored its association with the availability and affordability of long-term care (LTC). This study evaluates the availability and affordability of Long-Term Care (LTC) services for disabled older people (aged 65 and above) in China, with special attention to the differences among groups in receipt of specific social security benefits. The data of availability and affordability of LTC services for disabled older people is from a nationally representative sample Chinese Longitudinal Healthy Longevity Survey (CLHLS). Three different social security benefits were identified and their effects on the long-term care services for disabled older people were explored. The overall proportions of disabled older people who have only limited or no available or affordable LTC services were remarkably high, especially for those who have moderate or no social security benefits. Compared to those who are entitled to generous social security benefits, older people who have no social security benefits are 18.45 times more likely to be unable to afford health care expenses. The findings imply that policy makers in China could focus on the LTC needs for the social security and socioeconomically disadvantaged (who have limited or no social security benefits and in low household income) disabled older people which could reduce the gap between them and those who are entitled to generous social security benefits. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  18. Opium and Afghanistan: Reassessing U.S. Counternarcotics Strategy

    DTIC Science & Technology

    2007-10-01

    term security, development, and effective governance of Afghanistan.”3 This paper examines the nature of the opium problem in Afghanistan and...worldwide from opium for medical purposes.12 Opium is also refined for use in legal prescription painkillers such as OxyContin and Vicodin.13 However...will now be explored in detail. Lack of Security. The security situation in much of Afghanistan is simply inadequate to carry out an effective

  19. A Qualitative Meta-Analysis of the Diffusion of Mandated and Subsidized Technology: United States Energy Security and Independence

    ERIC Educational Resources Information Center

    Noah, Philip D., Jr.

    2013-01-01

    The purpose of this research project was to explore what the core factors are that play a role in the development of the smart-grid. This research study examined The Energy Independence and Security Act (EISA) of 2007 as it pertains to the smart-grid, the economic and security effects of the smart grid, and key factors for its success. The…

  20. Exploring Factors Influencing Self-Efficacy in Information Security an Empirical Analysis by Integrating Multiple Theoretical Perspectives in the Context of Using Protective Information Technologies

    ERIC Educational Resources Information Center

    Reddy, Dinesh Sampangirama

    2017-01-01

    Cybersecurity threats confront the United States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and…

  1. Conflict in Context: Understanding Local to Global Security.

    ERIC Educational Resources Information Center

    Mertz, Gayle; Lieber, Carol Miller

    This multidisciplinary guide provides middle and high school teachers and students with inquiry-based tools to support their exploration of emerging local, national, international, and transboundary security issues. Students are introduced to critical thinking, problem solving, and peacemaking strategies that will help them better understand…

  2. Application of the JDL data fusion process model for cyber security

    NASA Astrophysics Data System (ADS)

    Giacobe, Nicklaus A.

    2010-04-01

    A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.

  3. Flexible Energy Scheduling Tool for Integrating Variable Generation | Grid

    Science.gov Websites

    , security-constrained economic dispatch, and automatic generation control programs. DOWNLOAD PAPER Electric commitment, security-constrained economic dispatch, and automatic generation control sub-models. Each sub resolutions and operating strategies can be explored. FESTIV produces not only economic metrics but also

  4. Exploring the meaning of health security for disaster resilience through people's perspectives in Bangladesh.

    PubMed

    Ray-Bennett, Nibedita S; Collins, Andrew; Bhuiya, Abbas; Edgeworth, Ross; Nahar, Papreen; Alamgir, Fariba

    2010-05-01

    There has been significant interest in the rhetoric of health security in recent years from both global and local perspectives. Understanding health in the context of disaster vulnerability presents an opportunity to examine how improved health might reduce the effects of environmental disasters and other crises. To this end, a project was implemented in Bangladesh to establish the potential of a health security approach for disaster resilience amongst people living in high risk environments. This paper explores what we might mean by health security through engaging community level perspectives in the southeast coastal belt of Bangladesh, an area prone to cyclone and flood. This has been examined with respect to variation in gender and wealth of households. Household surveys, interviews and focus group discussions were some of the methods used to collect data. The findings show that health related coping strategies and agentive capabilities in the context of impending crises vary from one micro-context to the next. This suggests a dynamic and integrative resilience that could be built on further, but one which remains remote from wider discourses on health security. Copyright 2010 Elsevier Ltd. All rights reserved.

  5. The Dynamic Community of Interest and Its Realization in ZODIAC

    DTIC Science & Technology

    2009-10-01

    the ZODIAC project. ZODIAC is a network architecture that puts security first and foremost, with security broken down into confidentiality, integrity...hosts, a unified solution for MANETs will work for hosts or routers as well. DYNAMIC COMMUNITIES OF INTEREST The basis of the ZODIAC design is a new dis...narrow scope of each DCoI limits attack propagation, and supports confidentiality ABSTRACT The ZODIAC project has been exploring a security first

  6. A Secure Base in Adolescence: Markers of Attachment Security in the Mother–Adolescent Relationship

    PubMed Central

    Allen, Joseph P.; McElhaney, Kathleen Boykin; Land, Deborah J.; Kuperminc, Gabriel P.; Moore, Cynthia W.; O’Beirne-Kelly, Heather; Kilmer, Sarah Liebman

    2017-01-01

    This study sought to identify ways in which adolescent attachment security, as assessed via the Adult Attachment Interview, is manifest in qualities of the secure base provided by the mother–adolescent relationship. Assessments included data coded from mother–adolescent interactions, test-based data, and adolescent self-reports obtained from an ethnically and socioeconomically diverse sample of moderately at-risk 9th and 10th graders. This study found several robust markers of adolescent attachment security in the mother–adolescent relationship. Each of these markers was found to contribute unique variance to explaining adolescent security, and in combination, they accounted for as much as 40% of the raw variance in adolescent security. These findings suggest that security is closely connected to the workings of the mother–adolescent relationship via a secure-base phenomenon, in which the teen can explore independence in thought and speech from the secure base of a maternal relationship characterized by maternal attunement to the adolescent and maternal supportiveness. PMID:12625451

  7. Exploring the youth experience about sense of social security: a qualitative study.

    PubMed

    Chinekesh, Ahdieh; Hosseini, Seyed Ali; Mohammadi, Farahnaz; Motlagh, Mohammad Esmael; Eftekhari, Monir Baradaran; Ardalan, Gelayol; Djalalinia, Shirin

    2017-12-01

    Undoubtedly, one of the vital needs of man is security. Determinants and related factors to sense of social security is one of the most important research priorities, especially in adolescents and young people. To identify the factors affecting the social security of the youth. In 2017, using conventional content analysis, and benefiting from semi-structured in-depth interviews, we conducted a qualitative study exploring the opinions of young people about their feelings regarding social security. First, a targeted sampling method was determined to collect the data. Participants were young volunteers aged 18 to 30 who were selected from Tehran, the capital of Iran. Inclusion criteria for participants were willingness to participate in the study and ability to express their experiences. Data was extracted from 21 participants. The participants consisted of 21 young people who met the study inclusion criteria, of whom 12 participants were male. Their mean age was 24.4±0.41 years and their education varied from primary school to master's degree. Under two main categories of the need for economic and financial security and the need for a safe society, we extracted 11 subcategories following 32 codes. According to the findings, most participants agreed on the important role that sense of social security has in their lives and their health. The important role of sense of social security in participant's lives and health was the main important point of our findings, emphasized by most of participants. Based on the results; the assessment of the specific needs of different target groups, the design, development and implementation of health programs led to more effective interventions.

  8. Measuring relational security in forensic mental health services

    PubMed Central

    Chester, Verity; Alexander, Regi T.; Morgan, Wendy

    2017-01-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515

  9. Measuring relational security in forensic mental health services.

    PubMed

    Chester, Verity; Alexander, Regi T; Morgan, Wendy

    2017-12-01

    Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.

  10. Health Security and Risk Aversion.

    PubMed

    Herington, Jonathan

    2016-09-01

    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (i) that security is intrinsically valuable, (ii) that it is necessary for social planning and (iii) that it is an appropriate response to decision-making in contexts of very limited information. Striking the right balance between securing and maximizing population health thus requires a substantive, and hitherto unrecognized, value judgment. Finally, I critically evaluate the current health security agenda in light of this new account of the concept and its relationship to the other aims of public health policy. © 2016 John Wiley & Sons Ltd.

  11. A Measured Approach to Microcomputer Lab Design.

    ERIC Educational Resources Information Center

    Duggan, Brian

    1994-01-01

    Explores design considerations for a functional microcomputer lab, including ergonomics and furnishings; access for the disabled; the use of other media; hardware security; and software security, including virus protection. A summary paragraph comments on the role of planning and forecasting. A bibliography of eight titles for further reading is…

  12. Attachment and Culture: Security in the United States and Japan.

    ERIC Educational Resources Information Center

    Rothman, Fred; Weisz, John; Pott, Martha; Morelli, Gilda; Miyake, Kazuo

    2000-01-01

    Highlights evidence of cultural variations in child attachment, noting how western values and meanings permeate attachment theory. Comparisons of the United States and Japan emphasize the cultural relativity of three core hypotheses of attachment theory related to: caregiver sensitivity, child social competence, and a secure base for exploring the…

  13. Identifying the Enemy: Social Categorization and National Security Policy

    ERIC Educational Resources Information Center

    Unsworth, Kristene

    2010-01-01

    This dissertation seeks to understand the interplay between informal articulations of social categories and formal instantiations of those categories in official language. Specifically, it explores the process of social categorization as it is used to identify threats to national security. The research employed a qualitative, document-based,…

  14. IT Security: Target: The Web

    ERIC Educational Resources Information Center

    Waters, John K.

    2009-01-01

    In December, Microsoft announced a major security flaw affecting its Internet Explorer web browser. The flaw allowed hackers to use hidden computer code they had already injected into legitimate websites to steal the passwords of visitors to those sites. Reportedly, more than 10,000 websites were infected with the destructive code by the time…

  15. Evaluating data distribution and drift vulnerabilities of machine learning algorithms in secure and adversarial environments

    NASA Astrophysics Data System (ADS)

    Nelson, Kevin; Corbin, George; Blowers, Misty

    2014-05-01

    Machine learning is continuing to gain popularity due to its ability to solve problems that are difficult to model using conventional computer programming logic. Much of the current and past work has focused on algorithm development, data processing, and optimization. Lately, a subset of research has emerged which explores issues related to security. This research is gaining traction as systems employing these methods are being applied to both secure and adversarial environments. One of machine learning's biggest benefits, its data-driven versus logic-driven approach, is also a weakness if the data on which the models rely are corrupted. Adversaries could maliciously influence systems which address drift and data distribution changes using re-training and online learning. Our work is focused on exploring the resilience of various machine learning algorithms to these data-driven attacks. In this paper, we present our initial findings using Monte Carlo simulations, and statistical analysis, to explore the maximal achievable shift to a classification model, as well as the required amount of control over the data.

  16. Contemporary women's secure psychiatric services in the United Kingdom: A qualitative analysis of staff views.

    PubMed

    Walker, T; Edge, D; Shaw, J; Wilson, H; McNair, L; Mitchell, H; Gutridge, K; Senior, J; Sutton, M; Meacock, R; Abel, K

    2017-11-01

    WHAT IS KNOWN ON THE SUBJECT?: Three pilot UK-only Women's Enhanced Medium Secure Services (WEMSS) was opened in 2007 to support women's movement from high secure care and provide a bespoke, women-only service. Evidence suggests that women's secure services are particularly challenging environments to work in and staffing issues (e.g., high turnover) can cause difficulties in establishing a therapeutic environment. Research in this area has focused on the experiences of service users. Studies which have examined staff views have focused on their feelings towards women in their care and the emotional burden of working in women's secure services. No papers have made a direct comparison between staff working in different services. WHAT DOES THIS STUDY ADD TO EXISTING KNOWLEDGE?: This is the first study to explore the views and experiences of staff in the three UK WEMSS pilot services and contrast them with staff from women's medium secure services. Drawing upon data from eighteen semi-structured interviews (nine WEMSS, nine non-WEMSS), key themes cover staff perceptions of factors important for women's recovery and their views on operational aspects of services. This study extends our understanding of the experiences of staff working with women in secure care and bears relevance for staff working internationally, as well as in UK services. WHAT ARE THE IMPLICATIONS FOR PRACTICE?: The study reveals the importance of induction and training for bank and agency staff working in women's secure services. Further, regular clinical supervision should be mandatory for all staff so they are adequately supported. Introduction Women's Enhanced Medium Secure Services (WEMSS) is bespoke, gender-sensitive services which opened in the UK in 2007 at three pilot sites. This study is the first of its kind to explore the experiences of WEMSS staff, directly comparing them to staff in a standard medium secure service for women. The literature to date has focused on the experiences of service users or staff views on working with women in secure care. Aim This qualitative study, embedded in a multimethod evaluation of WEMSS, aimed to explore the views and experiences of staff in WEMSS and comparator medium secure services. Methods Qualitative interviews took place with nine WEMSS staff and nine comparator medium secure staff. Interviews focused on factors important for recovery, barriers to facilitating recovery and operational aspects of the service. Discussion This study provides a rare insight into the perspectives of staff working in UK women's secure services, an under-researched area in the UK and internationally. Findings suggest that the success of services, including WEMSS, is compromised by operational factors such as the use of bank staff. Implications for practice Comprehensive training and supervision should be mandatory for all staff, so best practice is met and staff adequately supported. © 2017 John Wiley & Sons Ltd.

  17. Child rights, right to water and sanitation, and human security.

    PubMed

    Pink, Ross

    2012-06-15

    The article explores the intersection between child rights, water scarcity, sanitation, and the human security paradigm. The recognition of child rights has been advanced through the 1989 Convention on the Rights of the Child and other international legal instruments, while water rights are increasingly affirmed in international law and through the historic July 2010 United Nations General Assembly resolution that strengthened the legal foundation for water security and human rights. Yet there remains a development gap in terms of child access to clean and secure water sources for basic human development needs. The human security paradigm provides a legal and humanitarian foundation for the extension of child rights related to water and sanitation. Copyright © 2012 Pink.

  18. Analyzing the security of an existing computer system

    NASA Technical Reports Server (NTRS)

    Bishop, M.

    1986-01-01

    Most work concerning secure computer systems has dealt with the design, verification, and implementation of provably secure computer systems, or has explored ways of making existing computer systems more secure. The problem of locating security holes in existing systems has received considerably less attention; methods generally rely on thought experiments as a critical step in the procedure. The difficulty is that such experiments require that a large amount of information be available in a format that makes correlating the details of various programs straightforward. This paper describes a method of providing such a basis for the thought experiment by writing a special manual for parts of the operating system, system programs, and library subroutines.

  19. China’s Military Support Facility in Djibouti: The Economic and Security Dimensions of China’s First Overseas Base

    DTIC Science & Technology

    2017-07-01

    Cleared for Public Release China’s Military Support Facility in Djibouti: The Economic and Security Dimensions of China’s...paper provides a preliminary look at the origins of China’s military support facility in Djibouti. It explores the evolution of the economic and security...military facilities abroad. It also assesses the implications of the growing economic and military ties between the two countries for the United

  20. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists.

    PubMed

    Kraemer, Sara; Carayon, Pascale

    2007-03-01

    This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.

  1. Matching food security analysis to context: the experience of the Somalia food security assessment unit.

    PubMed

    Hemrich, Günter

    2005-06-01

    This case study reviews the experience of the Somalia Food Security Assessment Unit (FSAU) of operating a food security information system in the context of a complex emergency. In particular, it explores the linkages between selected features of the protracted crisis environment in Somalia and conceptual and operational aspects of food security information work. The paper specifically examines the implications of context characteristics for the establishment and operations of the FSAU field monitoring component and for the interface with information users and their diverse information needs. It also analyses the scope for linking food security and nutrition analysis and looks at the role of conflict and gender analysis in food security assessment work. Background data on the food security situation in Somalia and an overview of some key features of the FSAU set the scene for the case study. The paper is targeted at those involved in designing, operating and funding food security information activities.

  2. Literature Review on Modeling Cyber Networks and Evaluating Cyber Risks.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kelic, Andjelka; Campbell, Philip L

    The National Infrastructure Simulations and Analysis Center (NISAC) conducted a literature review on modeling cyber networks and evaluating cyber risks. The literature review explores where modeling is used in the cyber regime and ways that consequence and risk are evaluated. The relevant literature clusters in three different spaces: network security, cyber-physical, and mission assurance. In all approaches, some form of modeling is utilized at varying levels of detail, while the ability to understand consequence varies, as do interpretations of risk. This document summarizes the different literature viewpoints and explores their applicability to securing enterprise networks.

  3. Origins, Spectral Interpretation, Resource Identification, Security, Regolith Explorer Planning (OSIRIS-REx)

    NASA Technical Reports Server (NTRS)

    Nakamura-Messenger, Keiko; Messenger, Scott; Keller, Lindsay; Righter, Kevin

    2014-01-01

    Scientists at ARES are preparing to curate and analyze samples from the first U.S. mission to return samples from an asteroid. The Origins-Spectral Interpretation- Resource Identification-Security-Regolith Explorer, or OSIRIS-REx, was selected by NASA as the third mission in its New Frontiers Program. The robotic spacecraft will launch in 2016 and rendezvous with the near-Earth asteroid Bennu, in 2020. A robotic arm will collect at least 60 grams of material from the surface of the asteroid to be returned to Earth in 2023 for worldwide distribution by the NASA Astromaterials Curation Facility at ARES.

  4. Energy Systems Integration News | Energy Systems Integration Facility |

    Science.gov Websites

    laboratories to attend the workshop on best practices for distributed energy resource (DER) security. Exploring grid. The U.S. Department of Energy (DOE) H2@Scale initiative is exploring the potential for wide-scale

  5. Fuzzy Commitment

    NASA Astrophysics Data System (ADS)

    Juels, Ari

    The purpose of this chapter is to introduce fuzzy commitment, one of the earliest and simplest constructions geared toward cryptography over noisy data. The chapter also explores applications of fuzzy commitment to two problems in data security: (1) secure management of biometrics, with a focus on iriscodes, and (2) use of knowledge-based authentication (i.e., personal questions) for password recovery.

  6. Risk and Resilience: Girls' Experiences Navigating Space and Relationships in a Secure Residential Facility

    ERIC Educational Resources Information Center

    Simonsen, Amy E.

    2010-01-01

    The purpose of this qualitative study was to examine how adolescent girls with diagnosed learning and emotional disabilities described themselves as they negotiated various environments and relationships within a secure residential facility. The goal was to explore how conditions and interactions in these environments promoted both risk and…

  7. Evaluations and Orientations in Mother-Child Narratives as a Function of Attachment Security: A Longitudinal Investigation

    ERIC Educational Resources Information Center

    Newcombe, Rhiannon; Reese, Elaine

    2004-01-01

    The present study examined the socialisation of children's narrative ability across the preschool period, exploring the association between children's and mothers' narrative style and children's attachment security. Fifty-six children and their mothers engaged in past event memory conversations about everyday shared past experiences when the…

  8. Subtypes of Attachment Security in School-Age Children with Learning Disabilities

    ERIC Educational Resources Information Center

    Al-Yagon, Michal

    2012-01-01

    This study explored children's secure attachment with both parents versus one parent, as well as the unique role of children's patterns of close relationships with father and mother, for a deeper understanding of maladjustment problems among children with learning disabilities (LD). Specifically, this study identified subgroups of children with…

  9. From Charity to Security: The Emergence of the National School Lunch Program

    ERIC Educational Resources Information Center

    Rutledge, Jennifer Geist

    2015-01-01

    This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…

  10. Parental Representations and Attachment Security in Young Israeli Mothers' Bird's Nest Drawings

    ERIC Educational Resources Information Center

    Goldner, Limor; Golan, Yifat

    2016-01-01

    The Bird's Nest Drawing (BND; Kaiser, 1996) is an art-based technique developed to assess attachment security. In an attempt to expand the BND's validity, the authors explored the possible associations between parental representations and the BND's dimensions and attachment classifications in a sample of 80 young Israeli mothers. Positive…

  11. Unsafe Gods: Security, Secularism and Schooling

    ERIC Educational Resources Information Center

    Davies, Lynn

    2014-01-01

    This book makes the compelling argument that religion can be complicit in conflict and that a new secularism is vital to foster security. Using insights from complexity science, it shows how dynamic secularism can be used to accommodate diverse faiths and beliefs within worldly politics. Exploration of the interplay of religion and education in…

  12. Explorations in Knowing: Thinking Psychosocially about Legitimacy

    ERIC Educational Resources Information Center

    Chappell, Anne; Ernest, Paul; Ludhra, Geeta; Mendick, Heather

    2014-01-01

    In this paper, we look at what engaging with psychoanalysis, through psychosocial accounts of subjectivity, has contributed to our struggles for legitimacy and security within our ways of knowing. The psychosocial, with its insistence on the unconscious and the irrational, features as both a source of security and of insecurity. We use three…

  13. On the Relation between Maternal State of Mind and Sensitivity in the Prediction of Infant Attachment Security

    ERIC Educational Resources Information Center

    Atkinson, Leslie; Goldberg, Susan; Raval, Vaishali; Pederson, David; Benoit, Diane; Moran, Greg; Poulton, Lori; Myhal, Natalie; Zwiers, Michael; Leung, Eman

    2005-01-01

    Attachment theorists assume that maternal mental representations influence responsivity, which influences infant attachment security. However, primary studies do not support this mediation model. The authors tested mediation using 2 mother-infant samples and found no evidence of mediation. Therefore, the authors explored sensitivity as a…

  14. Another Look at Scared Straight

    ERIC Educational Resources Information Center

    Feinstein, Sheryl

    2005-01-01

    The purpose of this study was to explore the impact of adult prisoner presentations on juvenile delinquents. The study involved twenty-four students incarcerated in a low security facility for male adolescents. Two adult male prisoners and a guard from a minimum-security federal prison came to the juvenile correctional facility to talk with …

  15. Space Exploration Supply Chain Modeling, Simulation and Analysis Using the SCOR Model

    NASA Technical Reports Server (NTRS)

    Zapata, Edgar; Callinan, Mike; Fayez, Sam

    2006-01-01

    sustained and affordable human and robotic program to explore the solar system and beyond. Extend human presence across the solar system, starting with a human return to the Moon by the year 2020, in preparation for human exploration of Mars and other destinations. Develop the innovative technologies, knowledge, and infrastructure both to explore and to support decisions about the destinations for human exploration; and promote international and commercial participation in exploration to further U.S. scientific, security, and economic interests

  16. Challenges of information security incident learning: An industrial case study in a Chinese healthcare organization.

    PubMed

    He, Ying; Johnson, Chris

    2017-12-01

    Security incidents can have negative impacts on healthcare organizations, and the security of medical records has become a primary concern of the public. However, previous studies showed that organizations had not effectively learned lessons from security incidents. Incident learning as an essential activity in the "follow-up" phase of security incident response lifecycle has long been addressed but not given enough attention. This paper conducted a case study in a healthcare organization in China to explore their current obstacles in the practice of incident learning. We interviewed both IT professionals and healthcare professionals. The results showed that the organization did not have a structured way to gather and redistribute incident knowledge. Incident response was ineffective in cycling incident knowledge back to inform security management. Incident reporting to multiple stakeholders faced a great challenge. In response to this case study, we suggest the security assurance modeling framework to address those obstacles.

  17. Social security and mortality: the role of income support policies and population health in the United States.

    PubMed

    Arno, Peter S; House, James S; Viola, Deborah; Schechter, Clyde

    2011-05-01

    Social Security is the most important and effective income support program ever introduced in the United States, alleviating the burden of poverty for millions of elderly Americans. We explored the possible role of Social Security in reducing mortality among the elderly. In support of this hypothesis, we found that declines in mortality among the elderly exceeded those among younger age groups following the initial implementation of Social Security in 1940, and also in the periods following marked improvements in Social Security benefits via legislation and indexing of benefits that occurred between the mid-1960s and the early 1970s. A better understanding of the link between Social Security and health status among the elderly would add a significant and missing dimension to the public discourse over the future of Social Security, and the potential role of income support programs in reducing health-related socioeconomic disparities and improving population health.

  18. Exploring the youth experience about sense of social security: a qualitative study

    PubMed Central

    Chinekesh, Ahdieh; Mohammadi, Farahnaz; Motlagh, Mohammad Esmael; Eftekhari, Monir Baradaran; Ardalan, Gelayol; Djalalinia, Shirin

    2017-01-01

    Background Undoubtedly, one of the vital needs of man is security. Determinants and related factors to sense of social security is one of the most important research priorities, especially in adolescents and young people. Objective To identify the factors affecting the social security of the youth. Methods In 2017, using conventional content analysis, and benefiting from semi-structured in-depth interviews, we conducted a qualitative study exploring the opinions of young people about their feelings regarding social security. First, a targeted sampling method was determined to collect the data. Participants were young volunteers aged 18 to 30 who were selected from Tehran, the capital of Iran. Inclusion criteria for participants were willingness to participate in the study and ability to express their experiences. Data was extracted from 21 participants. Results The participants consisted of 21 young people who met the study inclusion criteria, of whom 12 participants were male. Their mean age was 24.4±0.41 years and their education varied from primary school to master’s degree. Under two main categories of the need for economic and financial security and the need for a safe society, we extracted 11 subcategories following 32 codes. According to the findings, most participants agreed on the important role that sense of social security has in their lives and their health. Conclusion The important role of sense of social security in participant’s lives and health was the main important point of our findings, emphasized by most of participants. Based on the results; the assessment of the specific needs of different target groups, the design, development and implementation of health programs led to more effective interventions. PMID:29560155

  19. Enhancing maternal sensitivity and infant attachment security with video feedback: an exploratory study in Italy.

    PubMed

    Cassibba, Rosalinda; Castoro, Germana; Costantino, Elisabetta; Sette, Giovanna; Van Ijzendoorn, Marinus H

    2015-01-01

    This study aims to explore whether a short-term and attachment-based video-feedback intervention, the Video-Feedback Intervention to Promote Positive Parenting With Discussions on the Representational Level (VIPP-R; F. Juffer, M.J. Bakermans-Kranenburg, & M.H. van IJzendoorn, 2008), might be effective in enhancing maternal sensitivity and in promoting infants' attachment security in an Italian sample of dyads with primiparous mothers. Moreover, we explore whether the effectiveness of VIPP-R might be different for parents with insecure attachment representations who might be most in need of preventive intervention, as compared to parents who already have a more balanced and secure state of mind. Thirty-two infants (40% female) and their mothers participated in the study. The sample was divided into an intervention group (n = 16) and a comparison group (n = 16). At 6 and 13 months of age, the Adult Attachment Interview (AAI; M. Main, N. Kaplan, & J. Cassidy, 1985) was administered. Moreover, a 30-min mother-infant play situation was videotaped and coded for maternal sensitivity with the Emotional Availability Scales (Z. Biringen, J. Robinson, & R.N. Emde, 2000). At 13 months of age, the Strange Situation Procedure (M.D.S. Ainsworth, M.D. Blehar, E. Waters, & S. Wall, 1978) was used to assess the security of mother-infant attachment. Results revealed a significant interaction effect between intervention and AAI security for infant attachment security; moreover, main effects of AAI security and intervention for maternal sensitivity were found. The VIPP-R appears effective in enhancing maternal sensitivity and infant attachment security, although only mothers with an insecure attachment representation may benefit from the intervention. © 2014 Michigan Association for Infant Mental Health.

  20. Exploring the opportunities and barriers to intermodal rail freight.

    DOT National Transportation Integrated Search

    2014-04-01

    Due to the effects of congestion and rising fuel costs, the need for green transportation and energy : security, and the increasing revenue gaps to finance highway infrastructure construction and renewal, : there is a critical need to explore the opp...

  1. 76 FR 10574 - Notice of Availability of the Draft Environmental Impact Statement for the Disposal of Greater...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-25

    ... power systems in support of space exploration and national security; and the environmental cleanup of... and industrial equipment and exploration of geologic formations for oil and gas. They are located in...

  2. A survey of pandemic influenza preparedness and response capabilities in Chicago area hospital security departments.

    PubMed

    Kimmerly, David P

    2009-01-01

    This article is a summary based on a December 2007 paper prepared by the author in partial fulfillment of the requirements for a master's degree in business and organizational security management at Webster University. The project described was intended to assess Chicago-area healthcare organization security departments' preparedness and response capabilities for a potential influenza pandemic. While the author says healthcare organizations are learning from the pandemics of the past, little research has been conducted on the requirements necessary within hospital security departments. The article explores staffing, planning, preparation and response capabilities within a healthcare security context to determine existing resources available to the healthcare security community. Eleven completed surveys were received from hospital security managers throughout the geographical Chicago area. They reveal that hospital security managers are conscious of the risks of a pandemic influenza outbreak. Yet, it was found that several gaps existed within hospital security department staffing and response capabilities, as hospital security departments may not have the available resources necessary to adequately maintain their operations during a pandemic incident.

  3. Measuring infant attachment security in rhesus macaques (Macaca mulatta): adaptation of the attachment Q-set.

    PubMed

    Warfield, James J; Kondo-Ikemura, Kiyomi; Waters, Everett

    2011-02-01

    John Bowlby defined offspring-parent attachment as a relationship in which an infant or child uses one or a few preferred adults as a secure base from which to explore and as a haven of safety. He defined attachment security in terms of confidence in the adult's availability and responsiveness and the smooth organization of exploration and proximity seeking. Developmental psychologists have found this perspective productive in both observational and laboratory research. At the same time, they emphasize that such a construct cannot be operationalized in terms of one or a few behaviors. Instead, naturalistic observations of human infant attachment typically employ the Q-sort method to develop the Attachment q-set (AQS), 90 behaviorally descriptive items sorted in terms of how characteristic each item is of the infant's typical behavior. Meta-analyses of research using the AQS attest to its reliability and validity. This article reports an adaptation of the AQS to the task of assessing infant attachment security in nonhuman primates and illustrates its use. The availability of comparable measures of attachment security will contribute to an expanded understanding of patterns of attachment behavior in nonhuman primate societies and will facilitate interaction between comparative and developmental psychologists. © 2010 Wiley-Liss, Inc.

  4. Exploring stories of occupational engagement in a regional secure unit

    PubMed Central

    Morris, Karen; Cox, Diane L.; Ward, Kath

    2016-01-01

    Abstract This paper focuses on the occupational experiences of five men living within a forensic mental health unit over a year. This study used a descriptive qualitative case study methodology to explore the meaning and value placed on daily life (activities, occupations and routines), and how this changed over time. The men’s stories showed a complex picture of their experiences of daily life. This study demonstrated the impact of the environment on the men and the ongoing challenge of the need to balance treatment/therapy with security demands and opportunities. Three interrelated themes were identified: (1) Power and Occupation; (2) Therapy or Punishment; (3) Occupational Opportunities within Restrictions. These findings serve as a reminder to clinical teams to reassess the value of occupations attributed by their patients and the impact of the secure environment, whilst also acknowledging the potential for occupations to have a negative impact on well-being. PMID:27695388

  5. The story of the social security number.

    PubMed

    Puckett, Carolyn

    2009-01-01

    The use of the Social Security number (SSN) has expanded significantly since its inception in 1936. Created merely to keep track of the earnings history of U.S. workers for Social Security entitlement and benefit computation purposes, it has come to be used as a nearly universal identifier. Assigned at birth, the SSN enables government agencies to identify individuals in their records and businesses to track an individual's financial information. This article explores the history and meaning of the SSN and the Social Security card, as well as the Social Security Administration's (SSA's) SSN master file, generally known as the Numident. The article also traces the historical expansion of SSN use and the steps SSA has taken to enhance SSN integrity.

  6. The existential cost of economic insecurity: Threatened financial security undercuts meaning.

    PubMed

    Abeyta, Andrew A; Routledge, Clay; Kersten, Michael; Cox, Cathy R

    2017-01-01

    Financial security (i.e., a person's sense that they can afford the things they need now and in the foreseeable future) contributes to psychological health and well-being. In the present research, we explored the implications of financial security for perceptions of meaning in life. In Study 1, we found that perceptions of financial insecurity predicted perceptions of meaning in life above and beyond income. Further, income only predicted perceptions of meaning to the extent that it was associated with reduced financial insecurity. In Studies 2 and 3, we found that financial security threats undermined perceptions of meaning in life. Taken together, these studies suggest that maintaining financial security is important for a sense of meaning in life.

  7. Knowledge of practice: A multi-sited event ethnography of border security fairs in Europe and North America.

    PubMed

    Baird, Theodore

    2017-06-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices.

  8. Predictors of attachment security in preschool children from intact and divorced families.

    PubMed

    Nair, Hira; Murray, Ann D

    2005-09-01

    The authors selected 58 mother-child dyads from divorced and intact families to participate in a study on the impact of divorce on preschoolers' attachment security. The authors explored pathways that lead to security of attachment. They found that mothers from divorced families were younger, had lower income levels, and had lower levels of education compared with their intact counterparts. Divorced mothers also reported significantly higher levels of stress, depression, need for social support, and conflict with their spouses. Mothers from intact families were more likely to use positive (authoritative) parenting styles compared with divorced mothers. Children in the divorced group had lower security scores on the Attachment Q-Set instrument (E. Waters, 1995). Regression analyses indicated that parenting style made a direct (independent) contribution to attachment security. In addition, temperament was related to attachment security, but temperament did not diminish the association of parenting style with attachment security. Furthermore, regression analyses indicated that the relationship of divorce to attachment security was mediated by parenting style.

  9. Knowledge of practice: A multi-sited event ethnography of border security fairs in Europe and North America

    PubMed Central

    Baird, Theodore

    2017-01-01

    This article takes the reader inside four border security fairs in Europe and North America to examine the knowledge practices of border security professionals. Building on the border security as practice research agenda, the analysis focuses on the production, circulation, and consumption of scarce forms of knowledge. To explore situated knowledge of border security practices, I develop an approach to multi-sited event ethnography to observe and interpret knowledge that may be hard to access at the security fairs. The analysis focuses on mechanisms for disseminating and distributing scarce forms of knowledge, technological materializations of situated knowledge, expressions of transversal knowledge of security problems, how masculinities structure knowledge in gendered ways, and how unease is expressed through imagined futures in order to anticipate emergent solutions to proposed security problems. The article concludes by reflecting on the contradictions at play at fairs and how to address such contradictions through alternative knowledges and practices. PMID:29046601

  10. FOILFEST :community enabled security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how themore » public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).« less

  11. Fact Sheet: National Space Policy. Appendix F-2

    NASA Technical Reports Server (NTRS)

    1996-01-01

    For over three decades, the United States has led the world in the exploration and use of outer space. Our achievements in space have inspired a generation of Americans and people throughout the world. We will maintain this leadership role by supporting a strong, stable, and balanced national space program that serves our goals in national security, foreign policy, economic growth, environmental stewardship, and scientific and technical excellence. Access to and use of space are central for preserving peace and protecting US national security as well as civil and commercial interests. The United States will pursue greater levels of partnership and cooperation in national and international space activities and work with other nations to ensure the continued exploration and use of outer space for peaceful purposes. The goals of the US space program are to: (a) Enhance knowledge of the Earth, the solar system, and the universe through human and robotic exploration; (b) Strengthen and maintain the national security of the United States; (c) Enhance the economic competitiveness and scientific and technical capabilities of the United States; (d) Encourage State, local, and private sector investment in, and use of, space technologies; (e) Promote international cooperation to further US domestic, national security, and foreign policies. The United States is committed to the exploration and use of outer space by all nations for peaceful purposes and for the benefit of all humanity. "Peaceful purposes" allow defense and intelligence-related activities in pursuit of national security and other goals. The United States rejects any claims to sovereignty by any nation over outer space or celestial bodies, or any portion thereof, and rejects any limitations on the fundamental right of sovereign nations to acquire data from space. The United States considers the space systems of any nation to be national property with the right of passage through and operations in space without interference. Purposeful interference with space systems shall be viewed as an infringement on sovereign rights. The US Government will maintain and coordinate separate national security and civil space systems where differing needs dictate. All actions undertaken by agencies and departments in implementing the national space policy shall be consistent with US law, regulations, national security requirements, foreign policy, international obligations, and nonproliferation policy. The National Science and Technology Council (NSTC) is the principal forum for resolving issues related to national space policy. As appropriate, the NSTC and NSC will co-chair policy process. This policy will be implemented within the overall resource and policy guidance provided by the President.

  12. Maternal Resolution of Grief After Preterm Birth: Implications for Infant Attachment Security

    PubMed Central

    Clements, Melissa; Poehlmann, Julie

    2011-01-01

    OBJECTIVE: This study explored the association between mothers' unresolved grief regarding their infant's preterm birth and infant-mother attachment security. We hypothesized that mothers with unresolved grief would be more likely to have insecurely attached infants at 16 months and that this association would be partially mediated by maternal interaction quality. METHODS: This longitudinal study focused on 74 preterm infants (age of <36 weeks) and their mothers who were part of a larger study of high-risk infants. The present analysis included assessment of neonatal and socioeconomic risks at NICU discharge; maternal depression, Reaction to Preterm Birth Interview findings, and quality of parenting at a postterm age of 9 months; and infant-mother attachment at postterm age of 16 months. Associations among findings of grief resolution with the Reaction to Preterm Birth Interview, quality of parenting interactions, and attachment security were explored by using relative risk ratios and logistic and multivariate regression models. RESULTS: The relative risk of developing insecure attachment when mothers had unresolved grief was 1.59 (95% confidence interval: 1.03–2.44). Controlling for covariates (adjusted odds ratio: 2.94), maternal feelings of resolved grief regarding the preterm birth experience were associated with secure infant-mother attachment at 16 months. Maternal grief resolution and interaction quality were independent predictors of attachment security. CONCLUSION: Maternal grief resolution regarding the experience of preterm birth and the quality of maternal interactions have important implications for emerging attachment security for infants born prematurely. PMID:21242223

  13. Diagnosing water security in the rural North with an environmental security framework.

    PubMed

    Penn, Henry J F; Loring, Philip A; Schnabel, William E

    2017-09-01

    This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. Maternal resolution of grief after preterm birth: implications for infant attachment security.

    PubMed

    Shah, Prachi E; Clements, Melissa; Poehlmann, Julie

    2011-02-01

    This study explored the association between mothers' unresolved grief regarding their infant's preterm birth and infant-mother attachment security. We hypothesized that mothers with unresolved grief would be more likely to have insecurely attached infants at 16 months and that this association would be partially mediated by maternal interaction quality. This longitudinal study focused on 74 preterm infants (age of <36 weeks) and their mothers who were part of a larger study of high-risk infants. The present analysis included assessment of neonatal and socioeconomic risks at NICU discharge; maternal depression, Reaction to Preterm Birth Interview findings, and quality of parenting at a postterm age of 9 months; and infant-mother attachment at postterm age of 16 months. Associations among findings of grief resolution with the Reaction to Preterm Birth Interview, quality of parenting interactions, and attachment security were explored by using relative risk ratios and logistic and multivariate regression models. The relative risk of developing insecure attachment when mothers had unresolved grief was 1.59 (95% confidence interval: 1.03-2.44). Controlling for covariates (adjusted odds ratio: 2.94), maternal feelings of resolved grief regarding the preterm birth experience were associated with secure infant-mother attachment at 16 months. Maternal grief resolution and interaction quality were independent predictors of attachment security. Maternal grief resolution regarding the experience of preterm birth and the quality of maternal interactions have important implications for emerging attachment security for infants born prematurely.

  15. 76 FR 52353 - Assumption Buster Workshop: “Current Implementations of Cloud Computing Indicate a New Approach...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-22

    ... explored in this series is cloud computing. The workshop on this topic will be held in Gaithersburg, MD on October 21, 2011. Assertion: ``Current implementations of cloud computing indicate a new approach to security'' Implementations of cloud computing have provided new ways of thinking about how to secure data...

  16. Whole Earth Security: A Geopolitics of Peace. Worldwatch Paper 55.

    ERIC Educational Resources Information Center

    Deudney, Daniel

    The current use and potential of technology for achieving security and peace are explored. Section 1 traces the use of technology for warfare through the mastery of ocean-going sailing, the maturation of the airplane, and the development of nuclear weapons. This section suggests that these developments have led to a loss rather than an increase in…

  17. 78 FR 13139 - In the Matter of Digital Video Systems, Inc., Geocom Resources, Inc., and GoldMountain...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-26

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Digital Video Systems, Inc., Geocom Resources, Inc., and GoldMountain Exploration Corp., and Real Data, Inc. (a/k/a Galtech... securities of Digital Video Systems, Inc. because it has not filed any periodic reports since the period...

  18. From the Weakest Link to the Best Defense: Exploring the Factors That Affect Employee Intention to Comply with Information Security Policies

    ERIC Educational Resources Information Center

    Aurigemma, Salvatore

    2013-01-01

    Information and information systems have become embedded in the fabric of contemporary organizations throughout the world. As the reliance on information technology has increased, so too have the threats and costs associated with protecting organizational information resources. To combat potential information security threats, organizations rely…

  19. Essential Strategies for School Security: A Practical Guide for Teachers and School Administrators.

    ERIC Educational Resources Information Center

    Haynes, Richard A.; Henderson, Catherine L.

    This self-help guide explores the many factors involved in implementing an effective program of protection for schools. It provides direction and answers to the many questions posed by crime and violence in schools by translating certain principles of security into applications for the campus setting. The guide explains the various protection…

  20. Maximum Security. The Culture of Violence in Inner-City Schools.

    ERIC Educational Resources Information Center

    Devine, John

    In an ethnographic reflection on 10 years experience working in the high schools of inner-city New York, issues of school safety, discipline, and violence are explored. The central proposition is that the mentality that relies on paramilitary security measures and technological devices, such as metal detectors, to achieve safe schools is only an…

  1. A Secure Behavior Modification Sensor System for Physical Activity Improvement

    ERIC Educational Resources Information Center

    Price, Alan

    2011-01-01

    Today, advances in wireless sensor networks are making it possible to capture large amounts of information about a person and their interaction within their home environment. However, what is missing is how to ensure the security of the collected data and its use to alter human behavior for positive benefit. In this research, exploration was…

  2. Securing the Human: The Journey Toward World Law and Justice. The Whole Earth Papers, No. 14.

    ERIC Educational Resources Information Center

    Mische, Patricia; And Others

    The document contains a variety of papers that examine the linkages between local concerns and global concerns and explore alternative world futures. An introductory article, "Securing the Human," discusses how the world community needs to develop adequate means to deal with crimes against humans. These means include sound analysis, spiritual…

  3. Exploration of cloud computing late start LDRD #149630 : Raincoat. v. 2.1.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Echeverria, Victor T.; Metral, Michael David; Leger, Michelle A.

    This report contains documentation from an interoperability study conducted under the Late Start LDRD 149630, Exploration of Cloud Computing. A small late-start LDRD from last year resulted in a study (Raincoat) on using Virtual Private Networks (VPNs) to enhance security in a hybrid cloud environment. Raincoat initially explored the use of OpenVPN on IPv4 and demonstrates that it is possible to secure the communication channel between two small 'test' clouds (a few nodes each) at New Mexico Tech and Sandia. We extended the Raincoat study to add IPSec support via Vyatta routers, to interface with a public cloud (Amazon Elasticmore » Compute Cloud (EC2)), and to be significantly more scalable than the previous iteration. The study contributed to our understanding of interoperability in a hybrid cloud.« less

  4. Secure Base Narrative Representations and Intimate Partner Violence: A Dyadic Perspective

    PubMed Central

    Karakurt, Gunnur; Silver, Kristin E.; Keiley, Margaret K.

    2015-01-01

    This study aimed to understand the relationship between secure base phenomena and dating violence among couples. Within a relationship, a secure base can be defined as a balancing act of proximity-seeking and exploration at various times and contexts with the assurance of a caregiver’s availability and responsiveness in emotionally distressing situations. Participants were 87 heterosexual couples. The Actor-Partner Interdependence Model was used to examine the relationship between each partner’s scores on secure base representational knowledge and intimate partner violence. Findings demonstrated that women’s secure base representational knowledge had a significant direct negative effect on the victimization of both men and women, while men’s secure base representational knowledge did not have any significant partner or actor effects. Therefore, findings suggest that women with insecure attachments may be more vulnerable to being both the victims and the perpetrators of PMID:27445432

  5. NorthAm Fest : fostering a North American continent approach to countering terrorism.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gerdes, Dick; Moore, Judy Hennessey; Whitley, John B.

    2004-12-01

    On September 14-16, 2004, the Advanced Concepts Group of Sandia National Laboratories in conjunction with the University of Texas at El Paso and the North American Institute hosted a workshop (fest) designed to explore the concept of a North American continental approach to countering terrorism. The fest began with the basic premise that the successful defense of North America against the threat of terrorism will require close collaboration among the North American allies--Canada, Mexico and the U.S.--as well as a powerful set of information collection and analysis tools and deterrence strategies. The NorthAm Fest recast the notion of ''homeland defense''more » as a tri-national effort to protect the North American continent against an evolving threat that respects no borders. This is a report of the event summarizing the ideas explored. The fest examined the uniqueness of dealing with terrorism from a tri-national North American viewpoint, the role and possible features of joint security systems, concepts for ideal continental security systems for North America, and the challenges and opportunities for such systems to become reality. The following issues were identified as most important for the advancement of this concept. (1) The three countries share a set of core values--democracy, prosperity and security--which form the basis for joint interactions and allow for the development of a culture of cooperation without affecting the sovereignty of the members. (2) The creation of a continental defensive strategy will require a set of strategic guidelines and that smart secure borders play a pivotal role. (3) Joint security systems will need to operate from a set of complementary but not identical policies and procedures. (4) There is a value in joint task forces for response and shared information systems for the prevention of attacks. (5) The private sector must play a critical role in cross-border interactions. Finally, participants envisioned a ''Tri-National Security Laboratory'' to develop and test new counter-terrorism technologies and processes. The fest was an important first step in developing a tri-national approach to continental security and very different approaches to countering terrorism were explored. Participants came to the conclusion that continental security would be easier to achieve if the focus were on broader security issues, such as transnational crime, with terrorism being only a part of the focus. A series of fledgling relationships were begun between individuals and organizations through which actions can occur. A first commitment is the publication by a set of participants representing the three countries of a joint paper outlining the elements of a Continental Security approach.« less

  6. Exploring Public Health's roles and limitations in advancing food security in British Columbia.

    PubMed

    Seed, Barbara A; Lang, Tim M; Caraher, Martin J; Ostry, Aleck S

    2014-07-22

    This research analyzes the roles and limitations of Public Health in British Columbia in advancing food security through the integration of food security initiatives into its policies and programs. It asks the question, can Public Health advance food security? If so, how, and what are its limitations? This policy analysis merges findings from 38 key informant interviews conducted with government and civil society stakeholders involved in the development of food security initiatives, along with an examination of relevant documents. The Population Health Template is used to delineate and analyze Public Health roles in food security. Public Health was able to advance food security in some ways, such as the adoption of food security as a core public health program. Public Health's leadership role in food security is constrained by a restricted mandate, limited ability to collaborate across a wide range of sectors and levels, as well as internal conflict within Public Health between Food Security and Food Protection programs. Public Health has a role in advancing food security, but it also faces limitations. As the limitations are primarily systemic and institutional, recommendations to overcome them are not simple but, rather, require movement toward embracing the determinants of health and regulatory pluralism. The results also suggest that the historic role of Public Health in food security remains salient today.

  7. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template.

    PubMed

    He, Ying; Johnson, Chris

    2015-11-01

    The recurrence of past security breaches in healthcare showed that lessons had not been effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning from incidents and to share security knowledge to prevent future attacks. Generic Security Templates (GSTs) have been proposed to facilitate this knowledge transfer. The objective of this paper is to evaluate whether potential users in healthcare organisations can exploit the GST technique to share lessons learned from security incidents. We conducted a series of case studies to evaluate GSTs. In particular, we used a GST for a security incident in the US Veterans' Affairs Administration to explore whether security lessons could be applied in a very different Chinese healthcare organisation. The results showed that Chinese security professional accepted the use of GSTs and that cyber security lessons could be transferred to a Chinese healthcare organisation using this approach. The users also identified the weaknesses and strengths of GSTs, providing suggestions for future improvements. Generic Security Templates can be used to redistribute lessons learned from security incidents. Sharing cyber security lessons helps organisations consider their own practices and assess whether applicable security standards address concerns raised in previous breaches in other countries. The experience gained from this study provides the basis for future work in conducting similar studies in other healthcare organisations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  8. Manufacturing Accomplices: ICT Use in Securing the Safety State at Airports

    NASA Astrophysics Data System (ADS)

    Østerlie, Thomas; Asak, Ole Martin; Pettersen, Ole Georg; Tronhus, Håvard

    Based on a study of ICT use at an airport security checkpoint, this paper explores a possible explanation to the paradox that travelers find existing airport security measures inadequate while at the same time believing air travel to be sufficiently secure. We pursue this explanation by showing that, for the security checkpoint to function properly in relation to the overall function of the airport, travelers have to be enrolled in a particular program of action. They are then locked into this program through sanctions. Travelers are forced into participating in a system many of them find ethically and morally objectionable. Yet, active participation makes it difficult for them to object to the moral and ethical issues of their actions without damning themselves. Our explanation of the security paradox is, therefore, that while travelers remain critical of airport security, they avoid damning themselves by criticizing the system in terms of its own logic. They have been made accomplices.

  9. Motivations for Providing a Secure Base: Links with Attachment Orientation and Secure Base Support Behavior

    PubMed Central

    Feeney, Brooke C.; Collins, Nancy L.; Van Vleet, Meredith; Tomlinson, Jennifer

    2015-01-01

    This investigation examined the importance of underlying motivations in predicting secure base support behavior, as well as the extent to which support motivations are predicted by individual differences in attachment orientation. Participants were 189 married couples who participated in two laboratory sessions: During a questionnaire session, couples completed assessments of their underlying motivations for providing, and for not providing, support for their partner's exploration (i.e., goal-strivings), as well as assessments of their typical secure base support behavior. In an observational session, couples engaged in a discussion of one member's personal goals, during which the partner's secure base support was assessed. Results revealed a variety of distinct motivations for providing, and for not providing, secure base support to one's partner, as well as theoretically expected links between these motivations and both secure base behavior and attachment orientation. This work establishes motivations as important mechanisms that underlie the effective or ineffective provision of relational support. PMID:23581972

  10. The relevance of security: A latent domain of attachment relationships.

    PubMed

    Mannarini, Stefania; Boffo, Marilisa

    2014-02-01

    In the present study an adult attachment dimension, latent to the constructs of security, anxiety, and avoidance, was hypothesized, wherein security was expected to occupy the most relevant position. Furthermore, the reciprocal functioning of attachment constructs and their interactions with self-esteem were explored. Four hundreds and thirty-four Italian university students responded to two adult attachment questionnaires (Attachment Style Questionnaire and Adult Attachment Questionnaire) and to the Rosenberg Self-esteem scale. A Many-Facet Rasch Measurement modeling approach was adopted. The main results can be summarized as follows: (a) security, anxiety, and avoidance are nested under one latent attachment dimension; (b) security occupies the most prominent position on the dimension; (c) security is positively associated with a moderate level of attachment anxiety and negatively related to avoidance; and (d) a positive interaction between self-esteem and security, and a negative relation between self-esteem and anxiety, were detected. Theoretical, clinical, and empirical implications of the results are further discussed. © 2013 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  11. Social security and mortality: The role of income support policies and population health in the United States

    PubMed Central

    Arno, Peter S.; House, James S.; Viola, Deborah; Schechter, Clyde

    2011-01-01

    Social Security is the most important and effective income support program ever introduced in the United States, alleviating the burden of poverty for millions of elderly Americans. We explored the possible role of Social Security in reducing mortality among the elderly. In support of this hypothesis, we found that declines in mortality among the elderly exceeded those among younger age groups following the initial implementation of Social Security in 1940, and also in the periods following marked improvements in Social Security benefits via legislation and indexing of benefits that occurred between the mid-1960s and the early 1970s. A better understanding of the link between Social Security and health status among the elderly would add a significant and missing dimension to the public discourse over the future of Social Security, and the potential role of income support programs in reducing health-related socioeconomic disparities and improving population health. PMID:21326333

  12. The Structural Relationships of Social Support, Mother's Psychological Status, and Maternal Sensitivity to Attachment Security in Children with Disabilities

    ERIC Educational Resources Information Center

    Kim, Eun Sil; Kim, Byeong Seok

    2009-01-01

    The purpose of this study was to explore how social support, mother's psychological status, and maternal sensitivity affected attachment security in children with disabilities by using the structural equation model (SEM). Subjects were 141 pairs of children with disabilities and theirs mothers. Empirical data was obtained through a series of…

  13. Coping With Their Lives Women, Learning Disabilities, Self-Harm And The Secure Unit: A Q-Methodological Study

    ERIC Educational Resources Information Center

    James, Melissa; Warner, Sam

    2005-01-01

    Deliberate self-harm represents a significant, yet it can be argued, a poorly theorized area of concern with respect to women who have learning disabilities particularly in the context of secure service provision. Utilizing ideas from social constructionism we explore how some ways of understanding dominate the professional literature and,…

  14. Gender Differences in the Field of Information Security Technology Management: A Qualitative, Phenomenological Study

    ERIC Educational Resources Information Center

    Johnson, Marcia L.

    2013-01-01

    This qualitative study explored why there are so few senior women in the information security technology management field and whether gender played a part in the achievement of women in the field. Extensive interviews were performed to capture the lived experiences of successful women in the field regarding the obstacles and common denominators of…

  15. The "Double-Bind of Dependency": Early Relationships in Men with Learning Disabilities in Secure Settings

    ERIC Educational Resources Information Center

    Rayner, Kelly; Wood, Harry; Beail, Nigel

    2015-01-01

    Although the development of secure attachments has been shown to be more problematic for people with learning disabilities, there is a shortage of research into the attachment experience of people with learning disabilities who have broken the law. The present study used thematic analysis to explore the attachment experiences of 10 men with…

  16. Qualitative Case Study Exploring Operational Barriers Impeding Small and Private, Nonprofit Higher Education Institutions from Implementing Information Security Controls

    ERIC Educational Resources Information Center

    Liesen, Joseph J.

    2017-01-01

    The higher education industry uses the very latest technologies to effectively prepare students for their careers, but these technologies often contain vulnerabilities that can be exploited via their connection to the Internet. The complex task of securing information and computing systems is made more difficult at institutions of higher education…

  17. Sport and Physical Activity in a High Security Spanish Prison: An Ethnographic Study of Multiple Meanings

    ERIC Educational Resources Information Center

    Martos-Garcia, Daniel; Devis-Devis, Jose; Sparkes, Andrew C.

    2009-01-01

    Drawing on data generated by a two-year ethnographic study in a high security Spanish prison, this article explores the multiple meanings given to the social practices of sport and physical activity. We provide details of the following key themes that emerged from the analysis: (a) escaping time; (b) perceived therapeutic benefits; (c) social…

  18. Global Security, Religion and Education Development: A Crisis for the Field of Comparative Education?

    ERIC Educational Resources Information Center

    Sayed, Yusuf; Davies, Lynn; Hardy, Mike; Arani, Abbas Madandar; Kakia, Lida; Bano, Masooda

    2011-01-01

    The above title was suggested by the editors of this journal as being an interesting topic for a forum. It is indeed a valuable one to explore, in that while there has been extensive writing on various connections between security, religion and education (e.g. Apple 2004; Griffin 2006; Merry 2007; Davies 2008), situating this within comparative…

  19. New Developments in Tax Exempt Institutions. Exempt Organizations Which Lend Securities Risk Imposition of Unrelated Business Tax

    ERIC Educational Resources Information Center

    Stern, Sue S.; Sullivan, Richard B.

    1976-01-01

    The practice by exempt organizations of lending securities to brokerage houses is becoming more common. The possibility is weighed that organizations may encounter unrelated business tax assessments if the practice is classified as a trade or business. The authors examine the concept of trade or business in other tax settings and explore the…

  20. High Data Rate Quantum Cryptography

    NASA Astrophysics Data System (ADS)

    Kwiat, Paul; Christensen, Bradley; McCusker, Kevin; Kumor, Daniel; Gauthier, Daniel

    2015-05-01

    While quantum key distribution (QKD) systems are now commercially available, the data rate is a limiting factor for some desired applications (e.g., secure video transmission). Most QKD systems receive at most a single random bit per detection event, causing the data rate to be limited by the saturation of the single-photon detectors. Recent experiments have begun to explore using larger degree of freedoms, i.e., temporal or spatial qubits, to optimize the data rate. Here, we continue this exploration using entanglement in multiple degrees of freedom. That is, we use simultaneous temporal and polarization entanglement to reach up to 8.3 bits of randomness per coincident detection. Due to current technology, we are unable to fully secure the temporal degree of freedom against all possible future attacks; however, by assuming a technologically-limited eavesdropper, we are able to obtain 23.4 MB/s secure key rate across an optical table, after error reconciliation and privacy amplification. In this talk, we will describe our high-rate QKD experiment, with a short discussion on our work towards extending this system to ship-to-ship and ship-to-shore communication, aiming to secure the temporal degree of freedom and to implement a 30-km free-space link over a marine environment.

  1. Security in Father-child Relationship and Behavior Problems in Sexually Abused Children.

    PubMed

    Parent-Boursier, Claudel; Hébert, Martine

    2015-01-01

    While the influence of mother-child relationships on children's recovery following sexual abuse has been documented, less is known about the possible contribution of father-child relationships on outcomes. The present study explored the contribution of children's perception of security in their relationship to the father on internalizing and externalizing behavior problems, while controlling for sociodemographic variables and variables associated with the mother-child relationship. Participants were 142 children who disclosed sexual abuse involving a perpetrator other than the biological father. Regression analyses indicated that children's perception of security to fathers contributed to the prediction of parental reports of children's behavior problems, even after controlling for maternal psychological distress and perception of security to mothers.

  2. Exploring Operational Safeguards, Safety, and Security by Design to Address Real Time Threats in Nuclear Facilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schanfein, Mark J.; Mladineo, Stephen V.

    2015-07-07

    Over the last few years, significant attention has been paid to both encourage application and provide domestic and international guidance for designing in safeguards and security in new facilities.1,2,3 However, once a facility is operational, safeguards, security, and safety often operate as separate entities that support facility operations. This separation is potentially a serious weakness should insider or outsider threats become a reality.Situations may arise where safeguards detects a possible loss of material in a facility. Will they notify security so they can, for example, check perimeter doors for tampering? Not doing so might give the advantage to an insidermore » who has already, or is about to, move nuclear material outside the facility building. If outsiders break into a facility, the availability of any information to coordinate the facility’s response through segregated alarm stations or a failure to include all available radiation sensors, such as safety’s criticality monitors can give the advantage to the adversary who might know to disable camera systems, but would most likely be unaware of other highly relevant sensors in a nuclear facility.This paper will briefly explore operational safeguards, safety, and security by design (3S) at a high level for domestic and State facilities, identify possible weaknesses, and propose future administrative and technical methods, to strengthen the facility system’s response to threats.« less

  3. A Performance Analysis of Public Expenditure on Maternal Health in Mexico.

    PubMed

    Servan-Mori, Edson; Avila-Burgos, Leticia; Nigenda, Gustavo; Lozano, Rafael

    2016-01-01

    We explore the relationship between public expenditure, coverage of adequate ANC (including timing, frequent and content), and the maternal mortality ratio--adjusted by coverage of adequate ANC--observed in Mexico in 2012 at the State level. Additionally, we examine the inequalities and concentration of public expenditure between populations with and without Social Security. Results suggest that in the 2003-2011 period, the public expenditure gap between women with and without Social Security decreased 74%, however, the distribution is less equitable among women without Social Security, across the States. Despite high levels of coverage on each dimension of ANC explored, coverage of adequate ANC was lower among Social Security than non-Social Security women. This variability results in differences up to 1.5 times in State-adjusted maternal mortality rate at the same level of expense and maternal mortality rate, respectively. The increase in the economic resources is only a necessary condition for achieving improved health outcomes. Providing adequate health services and achieving efficient, effective and transparent use of resources in health, are critical elements for health systems performance. The attainment of universal effective coverage of maternal health and reducing maternal mortality in Mexico, requires the adjustment of policy innovations including the rules of allocation and execution of health resources. Health policies should be designed on a more holistic view promoting a balance between accessibility, effective implementation and rigorous stewardship.

  4. A Performance Analysis of Public Expenditure on Maternal Health in Mexico

    PubMed Central

    Servan-Mori, Edson; Avila-Burgos, Leticia; Nigenda, Gustavo; Lozano, Rafael

    2016-01-01

    We explore the relationship between public expenditure, coverage of adequate ANC (including timing, frequent and content), and the maternal mortality ratio -adjusted by coverage of adequate ANC- observed in Mexico in 2012 at the State level. Additionally, we examine the inequalities and concentration of public expenditure between populations with and without Social Security. Results suggest that in the 2003–2011 period, the public expenditure gap between women with and without Social Security decreased 74%, however, the distribution is less equitable among women without Social Security, across the States. Despite high levels of coverage on each dimension of ANC explored, coverage of adequate ANC was lower among Social Security than non-Social Security women. This variability results in differences up to 1.5 times in State-adjusted maternal mortality rate at the same level of expense and maternal mortality rate, respectively. The increase in the economic resources is only a necessary condition for achieving improved health outcomes. Providing adequate health services and achieving efficient, effective and transparent use of resources in health, are critical elements for health systems performance. The attainment of universal effective coverage of maternal health and reducing maternal mortality in Mexico, requires the adjustment of policy innovations including the rules of allocation and execution of health resources. Health policies should be designed on a more holistic view promoting a balance between accessibility, effective implementation and rigorous stewardship. PMID:27043819

  5. Exploring the role of voluntary disease schemes on UK farmer bio-security behaviours: Findings from the Norfolk-Suffolk Bovine Viral Diarrhoea control scheme.

    PubMed

    Azbel-Jackson, Lena; Heffernan, Claire; Gunn, George; Brownlie, Joe

    2018-01-01

    The article describes the influence of a disease control scheme (the Norfolk-Suffolk Bovine Viral Diarrhoea Disease (BVD) Eradication scheme) on farmers' bio-security attitudes and behaviours. In 2010, a survey of 100 cattle farmers (53 scheme members vs. 47 out of scheme farmers) was undertaken among cattle farmers residing in Norfolk and Suffolk counties in the UK. A cross-sectional independent measures design was employed. The main analytical tool was content analysis. The following variables at the farmer-level were explored: the specific BVD control measures adopted, livestock disease priorities, motivation for scheme membership, wider knowledge acquisition, biosecurity behaviours employed and training course attendance. The findings suggest that participation in the BVD scheme improved farmers' perception of the scheme benefits and participation in training courses. However, no association was found between the taking part in the BVD scheme and livestock disease priorities or motivation for scheme participation, or knowledge about BVD bio-security measures employed. Equally importantly, scheme membership did appear to influence the importance accorded specific bio-security measures. Yet such ranking did not appear to reflect the actual behaviours undertaken. As such, disease control efforts alone while necessary, are insufficient. Rather, to enhance farmer bio-security behaviours significant effort must be made to address underlying attitudes to the specific disease threat involved.

  6. Exploring the role of voluntary disease schemes on UK farmer bio-security behaviours: Findings from the Norfolk-Suffolk Bovine Viral Diarrhoea control scheme

    PubMed Central

    Azbel-Jackson, Lena; Heffernan, Claire; Gunn, George; Brownlie, Joe

    2018-01-01

    The article describes the influence of a disease control scheme (the Norfolk-Suffolk Bovine Viral Diarrhoea Disease (BVD) Eradication scheme) on farmers' bio-security attitudes and behaviours. In 2010, a survey of 100 cattle farmers (53 scheme members vs. 47 out of scheme farmers) was undertaken among cattle farmers residing in Norfolk and Suffolk counties in the UK. A cross-sectional independent measures design was employed. The main analytical tool was content analysis. The following variables at the farmer-level were explored: the specific BVD control measures adopted, livestock disease priorities, motivation for scheme membership, wider knowledge acquisition, biosecurity behaviours employed and training course attendance. The findings suggest that participation in the BVD scheme improved farmers' perception of the scheme benefits and participation in training courses. However, no association was found between the taking part in the BVD scheme and livestock disease priorities or motivation for scheme participation, or knowledge about BVD bio-security measures employed. Equally importantly, scheme membership did appear to influence the importance accorded specific bio-security measures. Yet such ranking did not appear to reflect the actual behaviours undertaken. As such, disease control efforts alone while necessary, are insufficient. Rather, to enhance farmer bio-security behaviours significant effort must be made to address underlying attitudes to the specific disease threat involved. PMID:29432435

  7. Food security: who is being excluded? A case of older people with dementia in long-term care homes.

    PubMed

    Vahabi, M; Schindel Martin, L

    2014-07-01

    To explore the extent of food security among older people, particularly those with cognitive impairments residing in Canadian long-term care homes (LTCHs) through a focused review of literature. Databases including Medline, Nursing and Health Sciences (SAGE), Psych Info, Social Sciences Abstract, the Cumulative Index of Nursing and Allied Health Literature (CINAHL) and HealthSTAR were searched for peer-reviewed articles related to food experiences of older individuals in industrialized countries including Canada. Only articles that were published in English between 1997-2012 were included. Sixty two studies met the inclusion criteria. Of those 17 focused on older adults in LTCHs. The review found that food security has rarely been examined among older persons living in LTCHs, and has never been examined within the context of cognitive impairment. While a few studies have focused on residents' satisfaction with foods that are provided to them in LTCHs, none have explored the extent of food security in this population. Furthermore, food satisfaction surveys in the LTCH are limited to the assessment of foods that are served to residents, and do not capture residents' food accessibility beyond the food dispensing routines of the organization. Thus, food quality, food preferences, and the traditional meanings and rituals associated with food consumption are not purposefully evaluated. In addition, LTCHs are not required to monitor residents' food satisfaction using a consistent, regular, and standardized approach and there is no regulation in the LTCH Act that requires LTCHs to assess their residents' food security. The findings highlight the need for: 1) expansion of food security research to non-community-based settings including LTCHs; 2) re-conceptualization of food security and modification of measurement tools to assess the extent and determinants of food security among older adults in LTCHs; 3) mandatory monitoring of food security via standardized and regular surveys tailored to meet the unique preferences and needs of the older population, particularly those with dementia; and 4) education of healthcare professionals regarding food security and its assessment in LTCHs.

  8. Optimizing Secure Communication Standards for Disadvantaged Networks

    DTIC Science & Technology

    2009-09-01

    created using LATEX with the editor Kile [5]. 5.1.2 Libraries and APIs Several libraries were important to the successful completion of this study. The...Explorer. http://www.microsoft.com/windows/ internet-explorer/default.aspx. [5] Kile - An Integrated LaTeX Environment. http://kile.sourceforge.net/. [6

  9. Technologies to counter aviation security threats

    NASA Astrophysics Data System (ADS)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  10. Analysis of Vehicle-Based Security Operations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carter, Jason M; Paul, Nate R

    Vehicle-to-vehicle (V2V) communications promises to increase roadway safety by providing each vehicle with 360 degree situational awareness of other vehicles in proximity, and by complementing onboard sensors such as radar or camera in detecting imminent crash scenarios. In the United States, approximately three hundred million automobiles could participate in a fully deployed V2V system if Dedicated Short-Range Communication (DSRC) device use becomes mandatory. The system s reliance on continuous communication, however, provides a potential means for unscrupulous persons to transmit false data in an attempt to cause crashes, create traffic congestion, or simply render the system useless. V2V communications mustmore » be highly scalable while retaining robust security and privacy preserving features to meet the intra-vehicle and vehicle-to-infrastructure communication requirements for a growing vehicle population. Oakridge National Research Laboratory is investigating a Vehicle-Based Security System (VBSS) to provide security and privacy for a fully deployed V2V and V2I system. In the VBSS an On-board Unit (OBU) generates short-term certificates and signs Basic Safety Messages (BSM) to preserve privacy and enhance security. This work outlines a potential VBSS structure and its operational concepts; it examines how a vehicle-based system might feasibly provide security and privacy, highlights remaining challenges, and explores potential mitigations to address those challenges. Certificate management alternatives that attempt to meet V2V security and privacy requirements have been examined previously by the research community including privacy-preserving group certificates, shared certificates, and functional encryption. Due to real-world operational constraints, adopting one of these approaches for VBSS V2V communication is difficult. Timely misbehavior detection and revocation are still open problems for any V2V system. We explore the alternative approaches that may be applicable to a VBSS, and suggest some additional research directions in order to find a practical solution that appropriately addresses security and privacy.« less

  11. Correlates of child-father and child-mother attachment in the preschool years.

    PubMed

    Bureau, Jean-François; Martin, Jodi; Yurkowski, Kim; Schmiedel, Sabrina; Quan, Jeffry; Moss, Ellen; Deneault, Audrey-Ann; Pallanca, Dominique

    2017-04-01

    The increase in fathers' involvement in childrearing, particularly beyond infancy, warrants research exploring factors influencing the quality of child-father attachment relationships, and the impact of these relationships on children's social development. The current investigation explored various correlates of preschoolers' child-father attachment security to both parents, including contextual factors (i.e., socioeconomic status, child temperament, parenting stress), parental play sensitivity, and child social adaptation. Participants included 107 preschool-aged children (59 girls; M = 46.67 months, SD = 8.57) and their fathers and mothers. Results revealed that both mothers' and fathers' play sensitivity were associated with child attachment security after controlling for different contextual factors. Furthermore, the magnitude of the association between child conduct problems and child-father attachment insecurity was stronger than the corresponding association with child-mother attachment insecurity. Findings provide important information on caregiving factors associated with child-father attachment security in the preschool years and the importance of this bond to children's social adaptation.

  12. The transmission of trauma in refugee families: associations between intra-family trauma communication style, children's attachment security and psychosocial adjustment.

    PubMed

    Dalgaard, Nina Thorup; Todd, Brenda Kathryn; Daniel, Sarah I F; Montgomery, Edith

    2016-01-01

    This study explores the transmission of trauma in 30 Middle Eastern refugee families in Denmark, where one or both parents were referred for treatment of PTSD symptoms and had non-traumatized children aged 4-9 years. The aim of the study was to explore potential risk and protective factors by examining the association between intra-family communication style regarding the parents' traumatic experiences from the past, children's psychosocial adjustment and attachment security. A negative impact of parental trauma on children might be indicated, as children's Total Difficulties Scores on the Strengths and Difficulties Questionnaire (SDQ) were significantly higher than the Danish norms. A negative association between children's attachment security as measured by the Attachment and Traumatization Story Task and higher scores on the SDQ Total Difficulties Scale approached significance, suggesting that the transmission of trauma may be associated with disruptions in children's attachment representations. Furthermore a significant association between parental trauma communication and children's attachment style was found.

  13. Towards a policy for human security: psychosocial contributions.

    PubMed

    Tullio, Francesco

    2007-01-01

    Inspired by the correspondence between Einstein and Freud in 1936, this paper focuses on the multidimensional aspect of security, exploring its implications within the psychosocial approach. Reflections are therefore centred on the psychological aspects of conflict, on bio-psychic responses to violent solicitation and on ways in which individual emotions are managed and controlled by the State. Some social and economic mechanisms comprising the present global social scenario are explored: the intermesh between economic/industrial organisations and Security Institutions, and the consumerist economic model and its individual/collective consequences, ultimately environmental destruction. As suggested by Einstein, the creation of a supranational organisation would be an essential step towards an effective and economically sustainable international system. This can be achieved through a process that implies the evolution of cultural parameters and the transformation of national institutions. In this sense, the author suggests a decisive role for civil society organisations such as the International Physicians for the Prevention of Nuclear War (IPPNW).

  14. Investigating end-to-end security in the fifth generation wireless capabilities and IoT extensions

    NASA Astrophysics Data System (ADS)

    Uher, J.; Harper, J.; Mennecke, R. G.; Patton, P.; Farroha, B.

    2016-05-01

    The emerging 5th generation wireless network will be architected and specified to meet the vision of allowing the billions of devices and millions of human users to share spectrum to communicate and deliver services. The expansion of wireless networks from its current role to serve these diverse communities of interest introduces new paradigms that require multi-tiered approaches. The introduction of inherently low security components, like IoT devices, necessitates that critical data be better secured to protect the networks and users. Moreover high-speed communications that are meant to enable the autonomous vehicles require ultra reliable and low latency paths. This research explores security within the proposed new architectures and the cross interconnection of the highly protected assets with low cost/low security components forming the overarching 5th generation wireless infrastructure.

  15. Assessing the Relationships among Delinquent Male Students' Disruptive and Violent Behavior and Staff's Proactive and Reactive Behavior in a Secure Residential Treatment Center

    ERIC Educational Resources Information Center

    Rozalski, Michael; Drasgow, Erik; Drasgow, Fritz; Yell, Mitchell

    2009-01-01

    The purpose of this study was to examine the relationships among students' disruptive and violent behavior and staff's use of proactive and reactive strategies in a secure residential treatment center serving delinquent adolescent males. One hundred hours of observational data were collected, and linear regression models were used to explore the…

  16. Exploring Effects of Organizational Culture upon Implementation of Information Security Awareness and Training Programs within the Defense Industry Located in the Tennessee Valley Region

    ERIC Educational Resources Information Center

    Grant, Robert Luther

    2017-01-01

    Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…

  17. Security Vulnerability and Patch Management in Electric Utilities: A Data-Driven Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Li, Qinghua; Zhang, Fengli

    This paper explores a real security vulnerability and patch management dataset from an electric utility in order to shed light on characteristics of the vulnerabilities that electric utility assets have and how they are remediated in practice. Specifically, it first analyzes the distribution of vulnerabilities over software, assets, and other metric. Then it analyzes how vulnerability features affect remediate actions.

  18. Welfare Reform and Addiction: A Priori Hypotheses, Post Hoc Explorations, and Assisted Sensemaking in Evaluating the Effects of Terminating Benefits for Chronic Substance Abusers

    ERIC Educational Resources Information Center

    Orwin, Robert G.; Campbell, Bernadette; Campbell, Kevin; Krupski, Antoinette

    2004-01-01

    The passage of the Contract with America Advancement Act terminated the Social Security Administrations Disability Insurance and Supplemental Security Income benefits for persons diagnosed with drug or alcohol addiction (also known as DA&A recipients), effective January 1, 1997. From an evaluation standpoint, the law created the opportunity…

  19. Computer science security research and human subjects: emerging considerations for research ethics boards.

    PubMed

    Buchanan, Elizabeth; Aycock, John; Dexter, Scott; Dittrich, David; Hvizdak, Erin

    2011-06-01

    This paper explores the growing concerns with computer science research, and in particular, computer security research and its relationship with the committees that review human subjects research. It offers cases that review boards are likely to confront, and provides a context for appropriate consideration of such research, as issues of bots, clouds, and worms enter the discourse of human subjects review.

  20. An Exploration of the Legal and Regulatory Environment of Privacy and Security through Active Research, Guided Study, Blog Creation, and Discussion

    ERIC Educational Resources Information Center

    Peslak, Alan R.

    2010-01-01

    One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…

  1. Exploring the Lack of Interoperability of Databases within Department of Homeland Security Interagency Environment Concerning Maritime Port Security

    DTIC Science & Technology

    2009-03-01

    37 Figure 8 New Information Sharing Model from United States Intelligence Community Information Sharing...PRIDE while the Coast Guard has MISSLE and the newly constructed WATCHKEEPER. All these databases contain intelligence on incoming vessels...decisions making. Experts rely heavily on future projections as hallmarks of skilled performance." (Endsley et al. 2006) The SA model above

  2. Leveraging Knowledge Management Tools to Support Security Risk Management in the Department of Homeland Security

    DTIC Science & Technology

    2011-12-01

    34 Figure 7. NASA Knowledge Management Environment (From Holm, 2009, p. 5). ......36 x...sharing That are not able to show measurable benefits Loose management support without demonstrating effectiveness Because users do not perceive value...explore KM in one form or another. Both are large agencies with annual budgets in the billions and manage multi -billion dollar projects, whose

  3. Why We Explore: The Value of Space Exploration for Future Generations

    NASA Technical Reports Server (NTRS)

    Cook, Stephen A.; Armstrong, Robert C., Jr.

    2007-01-01

    The National Aeronautics and Space Administration (NASA) and its industry partners are making measurable progress toward delivering new human space transportation capabilities to serve as the catalyst for a new era of discovery, as directed by the U.S. Vision for Space Exploration. In the interest of ensuring prolonged support, the Agency encourages space advocates of all stripes to accurately portray both the tangible and intangible benefits of space exploration, especially its value for future generations. This may be done not only by emphasizing the nation's return on its aerospace investment, but also by highlighting enabling security features and by promoting the scientific and technological benefits that accrue from the human exploration of space. As America embarks on a new era of leadership and international partnership on the next frontier, we are poised to master space by living off-planet on the Moon to prepare astronauts for longer journeys to Mars. These and other relevant facts should be clearly in the view of influential decision-makers and the American taxpayers, and we must increasingly involve those on whom the long-term sustainability of space exploration ultimately depends: America's youth. This paper will examine three areas of concrete benefits for future generations: fundamental security, economic enterprise, and high-technology advancements spurred by the innovation that scientific discovery demands.

  4. Security in Father-child Relationship and Behavior Problems in Sexually Abused Children

    PubMed Central

    Parent-Boursier, Claudel; Hébert, Martine

    2017-01-01

    While the influence of mother-child relationships on children’s recovery following sexual abuse has been documented, less is known about the possible contribution of father-child relationships on outcomes. The present study explored the contribution of children’s perception of security in their relationship to the father on internalizing and externalizing behavior problems, while controlling for sociodemographic variables and variables associated with the mother-child relationship. Participants were 142 children who disclosed sexual abuse involving a perpetrator other than the biological father. Regression analyses indicated that children’s perception of security to fathers contributed to the prediction of parental reports of children’s behavior problems, even after controlling for maternal psychological distress and perception of security to mothers. PMID:29321696

  5. Design tools for complex dynamic security systems.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Byrne, Raymond Harry; Rigdon, James Brian; Rohrer, Brandon Robinson

    2007-01-01

    The development of tools for complex dynamic security systems is not a straight forward engineering task but, rather, a scientific task where discovery of new scientific principles and math is necessary. For years, scientists have observed complex behavior but have had difficulty understanding it. Prominent examples include: insect colony organization, the stock market, molecular interactions, fractals, and emergent behavior. Engineering such systems will be an even greater challenge. This report explores four tools for engineered complex dynamic security systems: Partially Observable Markov Decision Process, Percolation Theory, Graph Theory, and Exergy/Entropy Theory. Additionally, enabling hardware technology for next generation security systemsmore » are described: a 100 node wireless sensor network, unmanned ground vehicle and unmanned aerial vehicle.« less

  6. Bluetooth based chaos synchronization using particle swarm optimization and its applications to image encryption.

    PubMed

    Yau, Her-Terng; Hung, Tzu-Hsiang; Hsieh, Chia-Chun

    2012-01-01

    This study used the complex dynamic characteristics of chaotic systems and Bluetooth to explore the topic of wireless chaotic communication secrecy and develop a communication security system. The PID controller for chaos synchronization control was applied, and the optimum parameters of this PID controller were obtained using a Particle Swarm Optimization (PSO) algorithm. Bluetooth was used to realize wireless transmissions, and a chaotic wireless communication security system was developed in the design concept of a chaotic communication security system. The experimental results show that this scheme can be used successfully in image encryption.

  7. NASA Automatic Information Security Handbook

    NASA Technical Reports Server (NTRS)

    1993-01-01

    This handbook details the Automated Information Security (AIS) management process for NASA. Automated information system security is becoming an increasingly important issue for all NASA managers and with rapid advancements in computer and network technologies and the demanding nature of space exploration and space research have made NASA increasingly dependent on automated systems to store, process, and transmit vast amounts of mission support information, hence the need for AIS systems and management. This handbook provides the consistent policies, procedures, and guidance to assure that an aggressive and effective AIS programs is developed, implemented, and sustained at all NASA organizations and NASA support contractors.

  8. E-Commerce and Security Governance in Developing Countries

    NASA Astrophysics Data System (ADS)

    Sanayei, Ali.; Rajabion, Lila

    Security is very often mentioned as one of the preconditions for the faster growth of e-commerce. Without a secure and reliable internet, customer will continue to be reluctant to provide confidential information online, such as credit card number. Moreover, organizations of all types and sizes around the world rely heavily on technologies of electronic commerce (e-commerce) for conducting their day-to-day business transaction. Providing organizations with a secure e-commerce environment is a major issue and challenging one especially in Middle Eastern countries. Without secure e-commerce, it is almost impossible to take advantage of the opportunities offered by e-commerce technologies. E-commerce can create opportunities for small entrepreneurs in Middle Eastern countries. This requires removing infrastructure blockages in telecommunications and logistics alongside the governance of e-commerce with policies on consumer protection, security of transactions, privacy of records and intellectual property. In this paper, we will explore the legal implications of e-commerce security governance by establishing who is responsible for ensuring compliance with this discipline, demonstrating the value to be derived from information security governance, the methodology of applying information security governance, and liability for non-compliance with this discipline. Our main focus will be on analyzing the importance and implication of e-commerce security governance in developing countries.

  9. Security issues in healthcare applications using wireless medical sensor networks: a survey.

    PubMed

    Kumar, Pardeep; Lee, Hoon-Jae

    2012-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.

  10. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

    PubMed Central

    Kumar, Pardeep; Lee, Hoon-Jae

    2012-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs. PMID:22368458

  11. Social Support, Motivation, and the Process of Juvenile Reentry: An Exploratory Analysis of Desistance

    ERIC Educational Resources Information Center

    Panuccio, Elizabeth A.; Christian, Johnna; Martinez, Damian J.; Sullivan, Mercer L.

    2012-01-01

    Many scholarly works and studies have explored the experience of reentry and desistance for adult offenders, but fewer studies have focused on these processes among juvenile offenders. Using qualitative case studies of juveniles released from secure confinement, this study explores the desistance process during juvenile reentry by examining how…

  12. Controlling Item Exposure Conditional on Ability in Computerized Adaptive Testing.

    ERIC Educational Resources Information Center

    Stocking, Martha L.; Lewis, Charles

    1998-01-01

    Ensuring item and pool security in a continuous testing environment is explored through a new method of controlling exposure rate of items conditional on ability level in computerized testing. Properties of this conditional control on exposure rate, when used in conjunction with a particular adaptive testing algorithm, are explored using simulated…

  13. Hand Grasping Synergies As Biometrics.

    PubMed

    Patel, Vrajeshri; Thukral, Poojita; Burns, Martin K; Florescu, Ionut; Chandramouli, Rajarathnam; Vinjamuri, Ramana

    2017-01-01

    Recently, the need for more secure identity verification systems has driven researchers to explore other sources of biometrics. This includes iris patterns, palm print, hand geometry, facial recognition, and movement patterns (hand motion, gait, and eye movements). Identity verification systems may benefit from the complexity of human movement that integrates multiple levels of control (neural, muscular, and kinematic). Using principal component analysis, we extracted spatiotemporal hand synergies (movement synergies) from an object grasping dataset to explore their use as a potential biometric. These movement synergies are in the form of joint angular velocity profiles of 10 joints. We explored the effect of joint type, digit, number of objects, and grasp type. In its best configuration, movement synergies achieved an equal error rate of 8.19%. While movement synergies can be integrated into an identity verification system with motion capture ability, we also explored a camera-ready version of hand synergies-postural synergies. In this proof of concept system, postural synergies performed well, but only when specific postures were chosen. Based on these results, hand synergies show promise as a potential biometric that can be combined with other hand-based biometrics for improved security.

  14. Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses

    NASA Astrophysics Data System (ADS)

    Yoshino, Ken-ichiro; Fujiwara, Mikio; Nakata, Kensuke; Sumiya, Tatsuya; Sasaki, Toshihiko; Takeoka, Masahiro; Sasaki, Masahide; Tajima, Akio; Koashi, Masato; Tomita, Akihisa

    2018-03-01

    Quantum key distribution (QKD) allows two distant parties to share secret keys with the proven security even in the presence of an eavesdropper with unbounded computational power. Recently, GHz-clock decoy QKD systems have been realized by employing ultrafast optical communication devices. However, security loopholes of high-speed systems have not been fully explored yet. Here we point out a security loophole at the transmitter of the GHz-clock QKD, which is a common problem in high-speed QKD systems using practical band-width limited devices. We experimentally observe the inter-pulse intensity correlation and modulation pattern-dependent intensity deviation in a practical high-speed QKD system. Such correlation violates the assumption of most security theories. We also provide its countermeasure which does not require significant changes of hardware and can generate keys secure over 100 km fiber transmission. Our countermeasure is simple, effective and applicable to wide range of high-speed QKD systems, and thus paves the way to realize ultrafast and security-certified commercial QKD systems.

  15. Japanese children's family drawings and their link to attachment.

    PubMed

    Behrens, Kazuko Y; Kaplan, Nancy

    2011-09-01

    This study explored the applicability of family drawings as a tool to estimate attachment security in a sample of Japanese six-year-olds (N = 47), applying Kaplan and Main's ( 1986 ) Family Drawing system. Maternal secure/insecure attachment status judged by the Adult Attachment Interview predicted family drawings' secure/insecure distinction produced by Japanese six-year-olds. However, insecure Japanese drawings took forms not seen in the original Berkeley drawings, such as a lineup of faces alone. Further examination of the Japanese children's drawings using global rating scales (Fury, Carlson, & Sroufe, 1997 ) yielded significant gender differences, rarely reported in the attachment literature, with girls scoring higher in scales that predict attachment security and boys scoring higher in scales that predict attachment insecurity. However, attachment security, as captured in the drawings, was not related to attachment security, observed behaviorally using Main and Cassidy's ( 1988 ) sixth-year reunion system. Implications of the findings are discussed in light of measurements, gender, and culture.

  16. Complexity of food preparation and food security status in low-income young women.

    PubMed

    Engler-Stringer, Rachel; Stringer, Bernadette; Haines, Ted

    2011-01-01

    This study was conducted to explore whether preparing more complex meals was associated with higher food security status. This mixed-methods, community-based study involved the use of semistructured interviews to examine the cooking practices of a group of young, low-income women in Montreal. Fifty participants aged 18 to 35 were recruited at 10 locations in five low-income neighbourhoods. Food security status was the main outcome measure and the main exposure variable, "complex food preparation," combined the preparation of three specific food types (soups, sauces, and baked goods) using basic ingredients. Low-income women preparing a variety of meals using basic ingredients at least three times a week were more than twice as likely to be food secure as were women preparing more complex meals less frequently. Women who prepared more complex meals more frequently had higher food security. Whether this means that preparing more complex foods results in greater food security remains unclear, as this was an exploratory study.

  17. A feedback-based secure path approach for wireless sensor network data collection.

    PubMed

    Mao, Yuxin; Wei, Guiyi

    2010-01-01

    The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. Therefore, how to preserve secure data collection is an important issue to wireless sensor networks. In this paper, we propose a novel approach of secure data collection for wireless sensor networks. We explore secret sharing and multipath routing to achieve secure data collection in wireless sensor network with compromised nodes. We present a novel tracing-feedback mechanism, which makes full use of the routing functionality of wireless sensor networks, to improve the quality of data collection. The major advantage of the approach is that the secure paths are constructed as a by-product of data collection. The process of secure routing causes little overhead to the sensor nodes in the network. Compared with existing works, the algorithms of the proposed approach are easy to implement and execute in resource-constrained wireless sensor networks. According to the result of a simulation experiment, the performance of the approach is better than the recent approaches with a similar purpose.

  18. Infant nutrition in Saskatoon: barriers to infant food security.

    PubMed

    Partyka, Brendine; Whiting, Susan; Grunerud, Deanna; Archibald, Karen; Quennell, Kara

    2010-01-01

    We explored infant nutrition in Saskatoon by assessing current accessibility to all forms of infant nourishment, investigating challenges in terms of access to infant nutrition, and determining the use and effectiveness of infant nutrition programs and services. We also examined recommendations to improve infant food security in Saskatoon. Semi-structured community focus groups and stakeholder interviews were conducted between June 2006 and August 2006. Thematic analysis was used to identify themes related to infant feeding practices and barriers, as well as recommendations to improve infant food security in Saskatoon. Our study showed that infant food security is a concern among lower-income families in Saskatoon. Barriers that limited breastfeeding sustainability or nourishing infants through other means included knowledge of feeding practices, lack of breastfeeding support, access and affordability of infant formula, transportation, and poverty. Infant nutrition and food security should be improved by expanding education and programming opportunities, increasing breastfeeding support, and identifying acceptable ways to provide emergency formula. If infant food security is to be addressed successfully, discussion and change must occur in social policy and family food security contexts.

  19. Security of attachment and quality of mother-toddler social interaction in a high-risk sample.

    PubMed

    Haltigan, John D; Lambert, Brittany L; Seifer, Ronald; Ekas, Naomi V; Bauer, Charles R; Messinger, Daniel S

    2012-02-01

    The quality of children's social interactions and their attachment security with a primary caregiver are two widely studied indices of socioemotional functioning in early childhood. Although both Bowlby and Ainsworth suggested that the parent-child interactions underlying the development of attachment security could be distinguished from other aspects of parent-child interaction (e.g., play), relatively little empirical research has examined this proposition. The aim of the current study was to explore this issue by examining concurrent relations between toddler's attachment security in the Strange Situation Procedure and quality of mother-child social interaction in a high-risk sample of toddlers characterized by prenatal cocaine exposure and low levels of maternal education. Analyses of variance suggested limited relations between attachment security and quality of social interaction. Further research examining the interrelations among various components of the parent-child relationship is needed. Copyright © 2011 Elsevier Inc. All rights reserved.

  20. Towards a Bio-inspired Security Framework for Mission-Critical Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ren, Wei; Song, Jun; Ma, Zhao; Huang, Shiyong

    Mission-critical wireless sensor networks (WSNs) have been found in numerous promising applications in civil and military fields. However, the functionality of WSNs extensively relies on its security capability for detecting and defending sophisticated adversaries, such as Sybil, worm hole and mobile adversaries. In this paper, we propose a bio-inspired security framework to provide intelligence-enabled security mechanisms. This scheme is composed of a middleware, multiple agents and mobile agents. The agents monitor the network packets, host activities, make decisions and launch corresponding responses. Middleware performs an infrastructure for the communication between various agents and corresponding mobility. Certain cognitive models and intelligent algorithms such as Layered Reference Model of Brain and Self-Organizing Neural Network with Competitive Learning are explored in the context of sensor networks that have resource constraints. The security framework and implementation are also described in details.

  1. Welfare, Liberty, and Security for All? U.S. Sex Education Policy and the 1996 Title V Section 510 of the Social Security Act.

    PubMed

    Lerner, Justin E; Hawkins, Robert L

    2016-07-01

    When adolescents delay (meaning they wait until after middle school) engaging in sexual intercourse, they use condoms at higher rates and have fewer sexual partners than those who have sex earlier, thus resulting in a lower risk for unintended pregnancies and sexually transmitted infections. The 1996 Section 510 of Title V of the Social Security Act (often referred to as A-H) is a policy that promotes abstinence-only-until-marriage education (AOE) within public schools. Using Stone's (2012) policy analysis framework, this article explores how A-H limits welfare, liberty, and security among adolescents due to the poor empirical outcomes of AOE policy. We recommend incorporating theory-informed comprehensive sex education in addition to theory-informed abstinence education that utilizes Fishbein and Ajzen's (2010) reasoned action model within schools in order to begin to address adolescent welfare, liberty, and security.

  2. An Exploration of Cyberspace Security R&D Investment Strategies for DARPA: "The Day After. . . in Cyberspace II",

    DTIC Science & Technology

    1996-01-01

    Automated Teller Machine networks malfunction in Georgia 2000 May 20 CNN off air for 12 minutes; issues special report 2000 May 20 worm...password combinations, social security and credit card numbers, account information, health status, and innumerable other sensitive information...as follows: TW/AA Issues Recommended Technical Response Possible Implementation Obstacles 1. (re Tactical Warning) • Place automated software

  3. Inclusive Security and Peaceful Societies: Exploring the Evidence

    DTIC Science & Technology

    2016-03-01

    655 mothers to deradicalize 1,024 young men and boys , rehabilitating INCLUSIVE SECURITY AND PEACEFUL SOCIETIES PRISM 6, no. 1 FEATURES | 23 The...approaches to breaking impasses dur- ing a stalled peace process, from nonviolent sit-ins to unorthodox tactics like blocking doors or even withholding sex ...Processes,” (New York: International Peace Institute, 2015). 9 Valerie Hudson, Bonnie Ballif-Spanvill, Mary Caprioli, and Chad F. Emmett, Sex and

  4. The Security Education Concepts in the Textbooks of the National and Civic Education of the Primary Stage in Jordan--An Analytical Study

    ERIC Educational Resources Information Center

    Al-Edwan, Zaid Suleiman

    2016-01-01

    The present study aimed at exploring the concepts of the security education in the textbooks of the national and civic education of the higher primary stage in Jordan. It adopted the descriptive analytical method. The study sample consisted of the textbooks of the national and civic education for the basic eighth, ninth and tenth grades. To…

  5. Perceptions of self-drive tourists along the Alaska-Canada border toward the increased security requirements of the western hemisphere travel initiative

    Treesearch

    Nicholas Palso

    2009-01-01

    This study explores the attitudes and feelings of self-drive tourists who cross the Alaska-Canada border about the increased security requirements of the Western Hemisphere Travel Initiative (WHTI), and how such attitudes and feelings may impact the tourism industry in this region. Results of a 2007 survey suggest that implementation of passport requirements will have...

  6. Orion EM-1 Crew Module Structural Test Article loaded onto Guppy

    NASA Image and Video Library

    2017-04-25

    NASA's Super Guppy aircraft has been closed and secured at the Shuttle Landing Facility at NASA's Kennedy Space Center in Florida. The Orion Exploration Mission-1 (EM-1) structural test article is secured inside the Super Guppy and will be transported to Lockheed Martin's Denver facility for testing. The Orion spacecraft will launch atop NASA’s Space Launch System rocket on EM-1, its first deep space mission.

  7. A process model of the implications of spillover from coparenting conflicts into the parent–child attachment relationship in adolescence

    PubMed Central

    Martin, Meredith J.; Sturge-Apple, Melissa L.; Davies, Patrick T.; Romero, Christine V.; Buckholz, Abigail

    2017-01-01

    Drawing on a two-wave, multimethod, multi-informant design, this study provides the first test of a process model of spillover specifying why and how disruptions in the coparenting relationship influence the parent–adolescent attachment relationship. One hundred ninety-four families with an adolescent aged 12–14 (M age = 12.4) were followed for 1 year. Mothers and adolescents participated in two experimental tasks designed to elicit behavioral expressions of parent and adolescent functioning within the attachment relationship. Using a novel observational approach, maternal safe haven, secure base, and harshness (i.e., hostility and control) were compared as potential unique mediators of the association between conflict in the coparenting relationship and adolescent problems. Path models indicated that, although coparenting conflicts were broadly associated with maternal parenting difficulties, only secure base explained the link to adolescent adjustment. Adding further specificity to the process model, maternal secure base support was uniquely associated with adolescent adjustment through deficits in adolescents’ secure exploration. Results support the hypothesis that coparenting disagreements undermine adolescent adjustment in multiple domains specifically by disrupting mothers’ ability to provide a caregiving environment that supports adolescent exploration during a developmental period in which developing autonomy is a crucial stage-salient task. PMID:28401834

  8. The Neutral Mass Spectrometer on the Lunar Atmosphere and Dust Environment Explorer Mission

    NASA Technical Reports Server (NTRS)

    Mahaffy, Paul R.; Hodges, R. Richard; Benna, Mehdi; King, Todd; Arvey, Robert; Barciniak, Michael; Bendt, Mirl; Carigan, Daniel; Errigo, Therese; Harpold, Daniel N.; hide

    2014-01-01

    The Neutral Mass Spectrometer (NMS) of the Lunar Atmosphere and Dust Environment Explorer (LADEE) Mission is designed to measure the composition and variability of the tenuous lunar atmosphere. The NMS complements two other instruments on the LADEE spacecraft designed to secure spectroscopic measurements of lunar composition and in situ measurement of lunar dust over the course of a 100-day mission in order to sample multiple lunation periods. The NMS utilizes a dual ion source designed to measure both surface reactive and inert species and a quadrupole analyzer. The NMS is expected to secure time resolved measurements of helium and argon and determine abundance or upper limits for many other species either sputtered or thermally evolved from the lunar surface.

  9. Mobile Device Security: Perspectives of Future Healthcare Workers

    PubMed Central

    Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander

    2017-01-01

    Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients’ protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students’ perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants’ perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority. PMID:28566992

  10. Mobile Device Security: Perspectives of Future Healthcare Workers.

    PubMed

    Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander

    2017-01-01

    Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients' protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students' perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants' perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority.

  11. Post-Cold War Science and Technology at Los Alamos

    NASA Astrophysics Data System (ADS)

    Browne, John C.

    2002-04-01

    Los Alamos National Laboratory serves the nation through the development and application of leading-edge science and technology in support of national security. Our mission supports national security by: ensuring the safety, security, and reliability of the U.S. nuclear stockpile; reducing the threat of weapons of mass destruction in support of counter terrorism and homeland defense; and solving national energy, environment, infrastructure, and health security problems. We require crosscutting fundamental and advanced science and technology research to accomplish our mission. The Stockpile Stewardship Program develops and applies, advanced experimental science, computational simulation, and technology to ensure the safety and reliability of U.S. nuclear weapons in the absence of nuclear testing. This effort in itself is a grand challenge. However, the terrorist attack of September 11, 2001, reminded us of the importance of robust and vibrant research and development capabilities to meet new and evolving threats to our national security. Today through rapid prototyping we are applying new, innovative, science and technology for homeland defense, to address the threats of nuclear, chemical, and biological weapons globally. Synergistically, with the capabilities that we require for our core mission, we contribute in many other areas of scientific endeavor. For example, our Laboratory has been part of the NASA effort on mapping water on the moon and NSF/DOE projects studying high-energy astrophysical phenomena, understanding fundamental scaling phenomena of life, exploring high-temperature superconductors, investigating quantum information systems, applying neutrons to condensed-matter and nuclear physics research, developing large-scale modeling and simulations to understand complex phenomena, and exploring nanoscience that bridges the atomic to macroscopic scales. In this presentation, I will highlight some of these post-cold war science and technology advances including our national security contributions, and discuss some of challenges for Los Alamos in the future.

  12. Engineering Ultimate Self-Protection in Autonomic Agents for Space Exploration Missions

    NASA Technical Reports Server (NTRS)

    Sterritt, Roy; Hinchey, Mike

    2005-01-01

    NASA's Exploration Initiative (EI) will push space exploration missions to the limit. Future missions will be required to be self-managing as well as self-directed, in order to meet the challenges of human and robotic space exploration. We discuss security and self protection in autonomic agent based-systems, and propose the ultimate self-protection mechanism for such systems-self-destruction. Like other metaphors in Autonomic Computing, this is inspired by biological systems, and is the analog of biological apoptosis. Finally, we discus the role it might play in future NASA space exploration missions.

  13. Advances in Protection.

    ERIC Educational Resources Information Center

    Szczerba, Peter

    2000-01-01

    Explains how integrating information technology can extend the capabilities of school security systems far beyond traditional card access. Use of biometric identification technologies and digitized event recording are explored. (GR)

  14. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglectedmore » or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .« less

  15. Urban Ecological Security Simulation and Prediction Using an Improved Cellular Automata (CA) Approach-A Case Study for the City of Wuhan in China.

    PubMed

    Gao, Yuan; Zhang, Chuanrong; He, Qingsong; Liu, Yaolin

    2017-06-15

    Ecological security is an important research topic, especially urban ecological security. As highly populated eco-systems, cities always have more fragile ecological environments. However, most of the research on urban ecological security in literature has focused on evaluating current or past status of the ecological environment. Very little literature has carried out simulation or prediction of future ecological security. In addition, there is even less literature exploring the urban ecological environment at a fine scale. To fill-in the literature gap, in this study we simulated and predicted urban ecological security at a fine scale (district level) using an improved Cellular Automata (CA) approach. First we used the pressure-state-response (PSR) method based on grid-scale data to evaluate urban ecological security. Then, based on the evaluation results, we imported the geographically weighted regression (GWR) concept into the CA model to simulate and predict urban ecological security. We applied the improved CA approach in a case study-simulating and predicting urban ecological security for the city of Wuhan in Central China. By comparing the simulated ecological security values from 2010 using the improved CA model to the actual ecological security values of 2010, we got a relatively high value of the kappa coefficient, which indicates that this CA model can simulate or predict well future development of ecological security in Wuhan. Based on the prediction results for 2020, we made some policy recommendations for each district in Wuhan.

  16. 30 CFR 550.182 - When may the Secretary cancel a lease at the exploration stage?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 30 Mineral Resources 2 2013-07-01 2013-07-01 false When may the Secretary cancel a lease at the exploration stage? 550.182 Section 550.182 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT, DEPARTMENT OF..., the National security or defense, or to the marine, coastal, or human environment, and that the...

  17. 30 CFR 550.182 - When may the Secretary cancel a lease at the exploration stage?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 30 Mineral Resources 2 2014-07-01 2014-07-01 false When may the Secretary cancel a lease at the exploration stage? 550.182 Section 550.182 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT, DEPARTMENT OF..., the National security or defense, or to the marine, coastal, or human environment, and that the...

  18. 30 CFR 250.182 - When may the Secretary cancel a lease at the exploration stage?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 30 Mineral Resources 2 2011-07-01 2011-07-01 false When may the Secretary cancel a lease at the exploration stage? 250.182 Section 250.182 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT, REGULATION... mineral deposits, the national security or defense, or to the marine, coastal, or human environment, and...

  19. 30 CFR 550.182 - When may the Secretary cancel a lease at the exploration stage?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 30 Mineral Resources 2 2012-07-01 2012-07-01 false When may the Secretary cancel a lease at the exploration stage? 550.182 Section 550.182 Mineral Resources BUREAU OF OCEAN ENERGY MANAGEMENT, DEPARTMENT OF..., the National security or defense, or to the marine, coastal, or human environment, and that the...

  20. 78 FR 40541 - GDT Tek, Inc., Gemini Explorations, Inc., Genetic Vectors, Inc., and Global Gate Property Corp...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-05

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] GDT Tek, Inc., Gemini Explorations, Inc., Genetic Vectors, Inc., and Global Gate Property Corp.; Order of Suspension of Trading July 2, 2013. It... Genetic Vectors, Inc. because it has not filed any periodic reports since the period ended September 30...

  1. How Secure Is Your Radiology Department? Mapping Digital Radiology Adoption and Security Worldwide.

    PubMed

    Stites, Mark; Pianykh, Oleg S

    2016-04-01

    Despite the long history of digital radiology, one of its most critical aspects--information security--still remains extremely underdeveloped and poorly standardized. To study the current state of radiology security, we explored the worldwide security of medical image archives. Using the DICOM data-transmitting standard, we implemented a highly parallel application to scan the entire World Wide Web of networked computers and devices, locating open and unprotected radiology servers. We used only legal and radiology-compliant tools. Our security-probing application initiated a standard DICOM handshake to remote computer or device addresses, and then assessed their security posture on the basis of handshake replies. The scan discovered a total of 2774 unprotected radiology or DICOM servers worldwide. Of those, 719 were fully open to patient data communications. Geolocation was used to analyze and rank our findings according to country utilization. As a result, we built maps and world ranking of clinical security, suggesting that even the most radiology-advanced countries have hospitals with serious security gaps. Despite more than two decades of active development and implementation, our radiology data still remains insecure. The results provided should be applied to raise awareness and begin an earnest dialogue toward elimination of the problem. The application we designed and the novel scanning approach we developed can be used to identify security breaches and to eliminate them before they are compromised.

  2. Continued Development of the AF/SGR Tricorder Program for Homeland Security, Military, Public Health, and Medical Operations

    DTIC Science & Technology

    2012-05-15

    Method for Ubiquitous Robots Based on Wireless Sensor Networks , in 1st European Conference on Smart Sensing and Context2006, Springer: Enschede, The...SUBJECT TERMS Directed Energy, Lasers, Networking , Wireless , Threat, Remote, Sensors , Database, Targets, Security, Transmit, Mobile, Unmanned...the researchers explore the potential for a network that could transport any type of sensor data now or in the future. 29 3. Methods , Assumptions

  3. Exploring Hardware-Based Primitives to Enhance Parallel Security Monitoring in a Novel Computing Architecture

    DTIC Science & Technology

    2007-03-01

    software level retrieve state information that can inherently contain more contextual information . As a result, such mechanisms can be applied in more...ease by which state information can be gathered for monitoring purposes. For example, we consider soft security to allow for easier state retrieval ...files are to be checked and what parameters are to be verified. The independent auditor periodically retrieves information pertaining to the files in

  4. Securing the High Ground: Dominant Combat Air Force for America. 2008 Combat Air Force Strategic Plan

    DTIC Science & Technology

    2008-07-28

    continue to be beyond our technical ability to realize aggresively pursue advanced technical solutions to stay at the leading edge of technological...inherent to each caf Way and to seek continual improvement through exploration of innovative concepts, advanced capabilities, game -changing...available online at the air force portal: https://wwwd.my.af.mil/afknprod/strat_plan COMBAT AIR FORCE STRATEGIC PLAN Points of Contact securing the high

  5. KSC-2014-2246

    NASA Image and Video Library

    2014-04-16

    CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels is secured on a storage stand at the other end of the facility. Technicians monitor the progress as the second panel is being moved to join the first panel on the storage stand. To the right is the Launch Abort system secured on a work stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper

  6. Food insecurity and family structure in Nigeria.

    PubMed

    Owoo, Nkechi S

    2018-04-01

    The article explores a series of questions and hypotheses related to polygynous family structures and both household and individual-level food security outcomes, using the World Bank Living Standards Measurement Survey data from Nigeria, collected in 2011, 2013 and 2015. A Correlated Random Effects (CRE) model is used to examine the relationship between polygyny and household-level food security, and the degree to which it is mediated by household wealth, size, and livelihood. A Household Fixed Effect model is employed to explore whether a mother's status as monogamous versus polygynous relates systematically to her child's health, and also whether child outcomes of senior wives are better than outcomes of junior wives within polygynous households. At the household level, polygynous households are found to have better food security outcomes than monogamous households with differences in household composition and agricultural livelihood as potential explanatory mechanisms. At the individual level, however, children of polygynous mothers have worse nutrition outcomes than children of monogamous mothers in the long run. Within polygynous households, children of junior wives appear to have better nutritional outcomes in the long run, compared to children of more senior wives.

  7. About Us | Argonne National Laboratory

    Science.gov Websites

    and technology - advanced technologies for detection of chemical and biological species of interest for environmental protection, national security and disease detection Explore this website to learn

  8. Transportation statistics annual report 2008

    DOT National Transportation Integrated Search

    2008-01-01

    Chapter 1 highlights environmental stewardship and transportation security, and : contains a summary of the 2007 Commodity Flow Survey. Chapter 2 explores : transportation infrastructure, safety, congestion, and global connectivity. These : groupings...

  9. Relationship between stakeholders' information value perception and information security behaviour

    NASA Astrophysics Data System (ADS)

    Tajuddin, Sharul; Olphert, Wendy; Doherty, Neil

    2015-02-01

    The study, reported in this paper, aims to explore the relationship between the stakeholders' perceptions about the value of information and their resultant information security behaviours. Moreover, this study seeks to explore the role of national and organisational culture in facilitating information value assignment. Information Security is a concept that formed from the recognition that information is valuable and that there is a need to protect it. The ISO 27002 defines information as an asset, which, like other important business assets, is essential to an organisation's business and consequently needs to be appropriately protected. By definition, an asset has a value to the organisation hence it requires protection. Information protection is typically accomplished through the implementation of countermeasures against the threats and vulnerabilities of information security, for example, implementation of technological processes and mechanisms such as firewall and authorization and authentication systems, set-up of deterrence procedures such as password control and enforcement of organisational policy on information handling procedures. However, evidence routinely shows that despite such measures, information security breaches and incidents are on the rise. These breaches lead to loss of information, personal records, or other data, with consequent implications for the value of the information asset. A number of studies have suggested that such problems are not related primarily to technology problems or procedural deficiencies, but rather to stakeholders' poor compliance with the security measures that are in place. Research indicates that compliance behaviour is affected by many variables including perceived costs and benefits, national and organisational culture and norms. However, there has been little research to understand the concept of information value from the perspective of those who interact with the data, and the consequences for information security behaviours. This study seeks to address this gap in the research. Data will be presented from a pilot study consisting of interviews with 6 participants from public organisations in Brunei Darussalam which illustrate the nature of the value assignment process, together with an initial model of the relationship between perceived information value and information security behaviours.

  10. Closing the Gates.

    ERIC Educational Resources Information Center

    Chronicle of Higher Education, 2003

    2003-01-01

    In several sections, explores how the quest for homeland security is changing academe. Discusses the FBI on campus, visa delays, government funding for antiterrorism research, educational programs in counterterrorism, and civil liberties. (EV)

  11. Attachment-security prime effect on skin-conductance synchronization in psychotherapists: An empirical study.

    PubMed

    Palmieri, Arianna; Kleinbub, Johann R; Calvo, Vincenzo; Benelli, Enrico; Messina, Irene; Sambin, Marco; Voci, Alberto

    2018-03-01

    Physiological synchronization (PS) is a phenomenon of simultaneous activity between two persons' physiological signals. It has been associated with empathy, shared affectivity, and efficacious therapeutic relationships. The aim of the present study was to explore the possible connections between PS and the attachment system, seeking preliminary evidence of this link by means of an experimental manipulation of the sense of attachment security in psychotherapists according to a protocol by Mikulincer and Shaver (2001), which has been proven to elicit empathetic behavior. We compared the synchronization of skin-conductance signals in brief psychological interviews between 18 psychodynamic therapists and 18 healthy volunteers. A sense of attachment-security priming was administered to half of the therapists, whereas the other half received a positive-affect control prime. Lag analysis was performed to investigate the "leading" or "following" attitudes of the participants in the two conditions. Mixed-model regressions and evidence-ratio model comparisons were used to investigate the effects of the manipulation on PS. Therapist attachment anxiety and avoidance traits were considered covariates. The attachment-security prime showed a significant effect on PS lag dynamics, but not on overall PS amount. Lag analysis showed that the therapists in the attachment-security condition were significantly more prone to assume a leading attitude in the physiological coupling than the therapists in the control condition. Therapist attachment anxiety and avoidance had no apparent effect. Our result paves the way for further exploration of the clinical relationship from a physiological standpoint. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  12. Seasonality, household food security, and nutritional status in Dinajpur, Bangladesh.

    PubMed

    Hillbruner, Chris; Egan, Rebecca

    2008-09-01

    The influence of seasonality on food security and nutritional status is widely accepted. However, research has typically focused on rural households and has not explored the specific mechanisms underlying seasonal effects. To investigate the role of seasonality in determining the food security and nutritional status of low-income urban households and to isolate specific pathways through which seasonality has its impact. Secondary panel data from CARE/IFPRI were utilized. Three rounds of data were collected from approximately 600 households in low-income areas of Dinajpur, Bangladesh, from 2002 through 2003, twice during the monsoon season and once in the dry season. Household-level surveys collected data on income and expenditure, employment, urban agriculture, health, and assets. Height and weight measurements were taken from children between the ages of 6 and 72 months. Paired t-tests and logistic fixed-effects modeling were then used to explore the role of seasonality. The prevalence rates of food insecurity, wasting, and inadequate growth were all significantly higher during the monsoon season as compared with the dry season. Dietary diversity and lost work due to the weather were identified as specific pathways through which season affected household food security. However, mechanisms hypothesized to contribute to seasonal declines in nutritional status, such as child illness, were not found to be significant. Season had a significant effect on both food security and nutritional status in Dinajpur, with households consistently worse off during the monsoon season. Initiatives to promote food market development, support employment during the hunger season, and prevent seasonal declines in nutritional status should be implemented.

  13. A data-management system using sensor technology and wireless devices for port security

    NASA Astrophysics Data System (ADS)

    Saldaña, Manuel; Rivera, Javier; Oyola, Jose; Manian, Vidya

    2014-05-01

    Sensor technologies such as infrared sensors and hyperspectral imaging, video camera surveillance are proven to be viable in port security. Drawing from sources such as infrared sensor data, digital camera images and processed hyperspectral images, this article explores the implementation of a real-time data delivery system. In an effort to improve the manner in which anomaly detection data is delivered to interested parties in port security, this system explores how a client-server architecture can provide protected access to data, reports, and device status. Sensor data and hyperspectral image data will be kept in a monitored directory, where the system will link it to existing users in the database. Since this system will render processed hyperspectral images that are dynamically added to the server - which often occupy a large amount of space - the resolution of these images is trimmed down to around 1024×768 pixels. Changes that occur in any image or data modification that originates from any sensor will trigger a message to all users that have a relation with the aforementioned. These messages will be sent to the corresponding users through automatic email generation and through a push notification using Google Cloud Messaging for Android. Moreover, this paper presents the complete architecture for data reception from the sensors, processing, storage and discusses how users of this system such as port security personnel can use benefit from the use of this service to receive secure real-time notifications if their designated sensors have detected anomalies and/or have remote access to results from processed hyperspectral imagery relevant to their assigned posts.

  14. A Feedback-Based Secure Path Approach for Wireless Sensor Network Data Collection

    PubMed Central

    Mao, Yuxin; Wei, Guiyi

    2010-01-01

    The unattended nature of wireless sensor networks makes them very vulnerable to malicious attacks. Therefore, how to preserve secure data collection is an important issue to wireless sensor networks. In this paper, we propose a novel approach of secure data collection for wireless sensor networks. We explore secret sharing and multipath routing to achieve secure data collection in wireless sensor network with compromised nodes. We present a novel tracing-feedback mechanism, which makes full use of the routing functionality of wireless sensor networks, to improve the quality of data collection. The major advantage of the approach is that the secure paths are constructed as a by-product of data collection. The process of secure routing causes little overhead to the sensor nodes in the network. Compared with existing works, the algorithms of the proposed approach are easy to implement and execute in resource-constrained wireless sensor networks. According to the result of a simulation experiment, the performance of the approach is better than the recent approaches with a similar purpose. PMID:22163424

  15. Hand Grasping Synergies As Biometrics

    PubMed Central

    Patel, Vrajeshri; Thukral, Poojita; Burns, Martin K.; Florescu, Ionut; Chandramouli, Rajarathnam; Vinjamuri, Ramana

    2017-01-01

    Recently, the need for more secure identity verification systems has driven researchers to explore other sources of biometrics. This includes iris patterns, palm print, hand geometry, facial recognition, and movement patterns (hand motion, gait, and eye movements). Identity verification systems may benefit from the complexity of human movement that integrates multiple levels of control (neural, muscular, and kinematic). Using principal component analysis, we extracted spatiotemporal hand synergies (movement synergies) from an object grasping dataset to explore their use as a potential biometric. These movement synergies are in the form of joint angular velocity profiles of 10 joints. We explored the effect of joint type, digit, number of objects, and grasp type. In its best configuration, movement synergies achieved an equal error rate of 8.19%. While movement synergies can be integrated into an identity verification system with motion capture ability, we also explored a camera-ready version of hand synergies—postural synergies. In this proof of concept system, postural synergies performed well, but only when specific postures were chosen. Based on these results, hand synergies show promise as a potential biometric that can be combined with other hand-based biometrics for improved security. PMID:28512630

  16. 75 FR 40852 - NASA Advisory Council; Exploration Committee; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-14

    ... Cooperation and Other Partnerships. Joint Session with NASA Advisory Council Technology & Innovation Committee... expiration date, U.S. Social Security Number (if applicable), Permanent Resident Alien card number and...

  17. Urban Ecological Security Simulation and Prediction Using an Improved Cellular Automata (CA) Approach—A Case Study for the City of Wuhan in China

    PubMed Central

    Gao, Yuan; Zhang, Chuanrong; He, Qingsong; Liu, Yaolin

    2017-01-01

    Ecological security is an important research topic, especially urban ecological security. As highly populated eco-systems, cities always have more fragile ecological environments. However, most of the research on urban ecological security in literature has focused on evaluating current or past status of the ecological environment. Very little literature has carried out simulation or prediction of future ecological security. In addition, there is even less literature exploring the urban ecological environment at a fine scale. To fill-in the literature gap, in this study we simulated and predicted urban ecological security at a fine scale (district level) using an improved Cellular Automata (CA) approach. First we used the pressure-state-response (PSR) method based on grid-scale data to evaluate urban ecological security. Then, based on the evaluation results, we imported the geographically weighted regression (GWR) concept into the CA model to simulate and predict urban ecological security. We applied the improved CA approach in a case study—simulating and predicting urban ecological security for the city of Wuhan in Central China. By comparing the simulated ecological security values from 2010 using the improved CA model to the actual ecological security values of 2010, we got a relatively high value of the kappa coefficient, which indicates that this CA model can simulate or predict well future development of ecological security in Wuhan. Based on the prediction results for 2020, we made some policy recommendations for each district in Wuhan. PMID:28617348

  18. Community Football Teams for People with Intellectual Disabilities in Secure Settings: "They Take You off the Ward, It Was Like a Nice Day, and Then You Get Like Medals at the End"

    ERIC Educational Resources Information Center

    Hudson, Nicholas Andrew; Mrozik, Jennifer Hella; White, Rose; Northend, Kristian; Moore, Steve; Lister, Katherine; Rayner, Kelly

    2018-01-01

    Background: People with learning disabilities (LD) are particularly vulnerable to mental health and behavioural difficulties, and it has been shown that regular exercise can improve psychosocial well-being as well as physical fitness. This research aims to explore the experiences of men with LD detained in secure settings who have engaged in…

  19. Attachment and exploration in adulthood: the mediating effect of social support.

    PubMed

    Wu, Chia-huei; Yang, Cheng-Ta

    2012-01-01

    Research examining the relationship between adult attachment styles and exploratory behavior has shown that anxious and avoidant attachment styles are negatively related to exploration. However, little research has been conducted on the mediation process between adult attachment styles and exploration. Given that perceived social support has been shown to be the basis for secure attachment and may be related to exploration behavior, the current study examines whether perceived social support mediates the relationship between adult attachment and exploration. University students in Taiwan (N = 168) completed questionnaires that assessed attachment styles; perceived social support from their father, mother, and best friend; and their intellectual, social, and environmental exploration. Our results revealed that perceived social support mediates the relationship between avoidant attachment and exploration behavior.

  20. A lightweight security scheme for wireless body area networks: design, energy evaluation and proposed microprocessor design.

    PubMed

    Selimis, Georgios; Huang, Li; Massé, Fabien; Tsekoura, Ioanna; Ashouei, Maryam; Catthoor, Francky; Huisken, Jos; Stuyt, Jan; Dolmans, Guido; Penders, Julien; De Groot, Harmke

    2011-10-01

    In order for wireless body area networks to meet widespread adoption, a number of security implications must be explored to promote and maintain fundamental medical ethical principles and social expectations. As a result, integration of security functionality to sensor nodes is required. Integrating security functionality to a wireless sensor node increases the size of the stored software program in program memory, the required time that the sensor's microprocessor needs to process the data and the wireless network traffic which is exchanged among sensors. This security overhead has dominant impact on the energy dissipation which is strongly related to the lifetime of the sensor, a critical aspect in wireless sensor network (WSN) technology. Strict definition of the security functionality, complete hardware model (microprocessor and radio), WBAN topology and the structure of the medium access control (MAC) frame are required for an accurate estimation of the energy that security introduces into the WBAN. In this work, we define a lightweight security scheme for WBAN, we estimate the additional energy consumption that the security scheme introduces to WBAN based on commercial available off-the-shelf hardware components (microprocessor and radio), the network topology and the MAC frame. Furthermore, we propose a new microcontroller design in order to reduce the energy consumption of the system. Experimental results and comparisons with other works are given.

  1. Reflective Functioning in Parents of School-Aged Children

    PubMed Central

    Borelli, Jessica L.; St. John, H. Kate; Cho, Evelyn; Suchman, Nancy E.

    2016-01-01

    Parental reflective functioning (RF) has garnered tremendous support as a predictor of secure attachment in infancy, though little work has examined RF among parents of older children. In this study, we used a high-risk community sample of parent–child dyads (N = 117) to explore whether parental RF comprises self- and child-focused factors, whether parental RF is associated with parent and child attachment security, and whether parental RF mediates the association between parent and child attachment security. Results suggested that parental RF can be characterized as having both self- and child-focused components, and that child-focused parental RF is associated with child but not parent attachment security. Further, child-focused parental RF indirectly mediates the association between parent attachment avoidance and child attachment security. These findings extend previous work on parental RF to parents of school-age children and, in so doing, inform developmental models of attachment relationships in middle childhood. Discussion focuses on the importance of these findings in informing theory, prevention, clinical practice, and policy. PMID:26618938

  2. Securing your Site in Development and Beyond

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Akopov, Mikhail S.

    Why wait until production deployment, or even staging and testing deployment to identify security vulnerabilities? Using tools like Burp Suite, you can find security vulnerabilities before they creep up on you. Prevent cross-site scripting attacks, and establish a firmer trust between your website and your client. Verify that Apache/Nginx have the correct SSL Ciphers set. We explore using these tools and more to validate proper Apache/Nginx configurations, and to be compliant with modern configuration standards as part of the development cycle. Your clients can use tools like https://securityheaders.io and https://ssllabs.com to get a graded report on your level of compliancemore » with OWASP Secure Headers Project and SSLLabs recommendations. Likewise, you should always use the same sites to validate your configurations. Burp Suite will find common misconfigurations and will also perform more thorough security testing of your applications. In this session you will see examples of vulnerabilities that were detected early on, as well has how to integrate these practices into your daily workflow.« less

  3. In acceptance we trust? Conceptualising acceptance as a viable approach to NGO security management.

    PubMed

    Fast, Larissa A; Freeman, C Faith; O'Neill, Michael; Rowley, Elizabeth

    2013-04-01

    This paper documents current understanding of acceptance as a security management approach and explores issues and challenges non-governmental organisations (NGOs) confront when implementing an acceptance approach to security management. It argues that the failure of organisations to systematise and clearly articulate acceptance as a distinct security management approach and a lack of organisational policies and procedures concerning acceptance hinder its efficacy as a security management approach. The paper identifies key and cross-cutting components of acceptance that are critical to its effective implementation in order to advance a comprehensive and systematic concept of acceptance. The key components of acceptance illustrate how organisational and staff functions affect positively or negatively an organisation's acceptance, and include: an organisation's principles and mission, communications, negotiation, programming, relationships and networks, stakeholder and context analysis, staffing, and image. The paper contends that acceptance is linked not only to good programming, but also to overall organisational management and structures. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.

  4. Metaphors for cyber security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a varietymore » of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).« less

  5. Participatory research, people with intellectual disabilities and ethical approval: making reasonable adjustments to enable participation.

    PubMed

    Northway, Ruth; Howarth, Joyce; Evans, Lynne

    2015-02-01

    The aim of this paper is to explore how making reasonable adjustments to the process of securing ethical approval for research can facilitate the meaningful involvement of people with intellectual disabilities as members of a research team. This is achieved through critical reflection upon the approach taken within one participatory research study whose objective was to explore how people with intellectual disabilities understand abuse. Internationally participatory research studies (in which active involvement of community members in all stages of the research process is sought) are becoming increasingly common in the context of health care and, more specifically, within research involving people with intellectual disabilities. However, whilst it is acknowledged that participatory research gives rise to specific ethical challenges, how (or if) involvement in securing ethical approval is facilitated, is not discussed in most research reports. The significance of this paper is that it seeks to address this gap by exploring how meaningful participation can be promoted by making reasonable adjustments. Within the study, the research team worked in collaboration with the ethics committee to identify potential barriers that could prevent the participation of members of the research team who had intellectual disabilities. Reasonable adjustments (such as redesigning forms) were made to the processes involved in securing ethical approval. This study demonstrated that it is possible to ensure that ethical standards are upheld and the requirements of ethics committees met whilst also facilitating the meaningful involvement of people with intellectual disabilities. The reasonable adjustments approach explored within this paper can be translated into the context of clinical practice: making changes to the way that services are delivered can promote greater involvement of people with intellectual disabilities in their own health care. © 2014 John Wiley & Sons Ltd.

  6. The contemporary dynamics of Sino-Indian relations: Examining maritime security, economics, energy and elite dialogue

    NASA Astrophysics Data System (ADS)

    Athwal, Amardeep

    This dissertation examines the modern-day dynamics of the Sino-Indian relationship---with a particular focus on issues relating to maritime security, economics, energy and elite bilateral dialogue. In exploring the contemporary nature of the Sino-Indian relationship, the dissertation also seeks to assess the accuracy of predominant neorealist accounts of the Sino-Indian relationship. Since the 1962 Sino-Indian War, most analysts have continued to emphasize the conflictual and competitive elements within the Sino-Indian relationship. The dissertation first explores the crucial post-independence history of Sino-Indian relations to provide the appropriate contextual background (chapter one). Thereafter, the dissertation explores the geopolitical significance of the Indian Ocean in light of soaring (global) energy demands. This then leads into an analysis of China and India's naval modernization and China's strategic partnership with Pakistan and Myanmar (chapter two). While acknowledging the credibility of neorealist insights in the realm of maritime security by detailing China and India's naval buildup and naval strategy, overall, it is found that the security dilemma argument is overstated. There is both a lack of threat perception and the existence of alternate explanations for both Chinese and Indian activities in Southern Asia. The dissertation then moves on to explore the positive elements within the Sino-Indian relationship---growing economic interdependence, energy convergence and elite consensus. In the economic realm (chapter three) it is found that Sino-Indian bilateral trade is increasingly being framed institutionally and rapidly expanding every year. The areas where the Sino-Indian economic relationship could be fruitfully expanded are traced and the great potential of bilateral trade is discussed. Thereafter, the dissertation highlights how China and India are beginning to coordinate energy policy (chapter four) as well as the growing political will (chapter five) to transform the Sino-Indian relationship from a framework of conflict and competition to cooperation. The dissertation concludes that there are serious mitigating factors in the Sino-Indian relationship and that an exclusively neorealist outlook is impoverished. Theoretical insights from neoliberal institutionalism and constructivism point to how emerging economic interdependence in tandem with the (elite) creation of dependable expectations of peaceful change point towards stability in the Sino-Indian relationship.

  7. Infectious diseases and securitization: WHO's dilemma.

    PubMed

    Jin, Jiyong; Karackattu, Joe Thomas

    2011-06-01

    The threat posed by infectious diseases has been increasingly framed as a security issue. The UN Security Council's Resolution 1308, which designated HIV/AIDS as a threat to international security, evidenced the securitization process. Using securitization theory as a theoretical tool, this article explores the securitization of infectious diseases in the World Health Organization (WHO). While WHO has tended to securitize infectious diseases since 2000, it has encountered a dilemma in the process because of the inherent asymmetry of interest between developed and developing countries. The act of securitization in WHO currently remains mostly a rhetorical device, since WHO's norms emblematic of securitization have not been backed by operational measures for verification or enforcement due to these asymmetric interests.

  8. State Cancer Profiles

    MedlinePlus

    ... the site again. The following web browsers and operating systems are sufficiently secure and advanced. These version numbers ... also acceptable. Microsoft Internet Explorer 7, if your operating system is Windows Vista or later. No version of ...

  9. The OSIRIS-REx Asteroid Sample Return Mission

    NASA Technical Reports Server (NTRS)

    Beshore, Edward; Lauretta, Dante; Boynton, William; Shinohara, Chriss; Sutter, Brian; Everett, David; Gal-Edd, Jonathan S.; Mink, Ronald G.; Moreau, Michael; Dworkin, Jason

    2015-01-01

    Interpretation, Resource Identification, Security, Regolith EXplorer) spacecraft will depart for asteroid (101955) Bennu, and when it does, humanity will turn an important corner in the exploration of the Solar System. After arriving at the asteroid in the Fall of 2018, it will undertake a program of observations designed to select a site suitable for retrieving a sample that will be returned to the Earth in 2023..

  10. Strengthening DoD Cyber Security with the Vulnerability Market

    DTIC Science & Technology

    2014-01-01

    50,000 – $100,000 Windows $60,000 – $120,000 Firefox or Safari $60,000 – $150,000 Chrome or Internet Explorer $80,000 – $200,000 iOS $100,000...the CTB metric for the Google Chrome OS at $110,000. Accordingly, this metric could be used by Google to compare its security to other operating...Mozilla Foundation. (n.d.). Mozilla. Retrieved from https://www.mozilla. org/en-US/foundation/ Thomson, I. (2013, March 8). Pwn2Own: IE10, Firefox

  11. How does India’s Energy Security Affect her National Security?

    DTIC Science & Technology

    2008-12-01

    these are referred to as biogases . Sources of biogas include swamps, marshes, and landfills  as well as sewage sludge and manure by way of anaerobic...along with the acquisition of equity shares in oil and gas reserves overseas.6 The two most attractive sources of energy for India are Iran and the...jointly bidding for oil exploration rights in some regions like Africa and Siberia. On the other hand, the same two companies have bid against each

  12. Removing the Rose Colored Glasses: Exploring Modern Security Environment’s Effect on the Army Assignment Policy for Women

    DTIC Science & Technology

    2009-06-12

    OF MILITARY ART AND SCIENCE General Studies by KAREN J. DILL, MAJ, USA M.A.E.D., University of Phoenix , Hampton, Virginia, 2005 B.A...policy areas or gaps that require clarification or revision in light of the 21st century security environment and the changes in Army structure, doctrine...researcher identified policy gaps by determining how verbiage is understood in light of the modern OE and Army organization and tactics changes. The

  13. USAF Security Police Officer Leadership: Effectiveness, Agreement, and the Effects of Education and Experience

    DTIC Science & Technology

    1984-01-01

    of the leadership styles and effectiveness of the security police officers studied. General Research Questions In exploring the relationship between...to do a task; B. Psycholo&c Maturity is the willins- 26 ness or motivation to do the job. 16. Four Specific Leadership Styles : A. A-Telling Style is...background, (1973) knowledge, and experience fac- tors. Vroom25 Leaders can be taught to en- • (1976) large their leadership styles and to match the

  14. Research on Influence of Cloud Environment on Traditional Network Security

    NASA Astrophysics Data System (ADS)

    Ming, Xiaobo; Guo, Jinhua

    2018-02-01

    Cloud computing is a symbol of the progress of modern information network, cloud computing provides a lot of convenience to the Internet users, but it also brings a lot of risk to the Internet users. Second, one of the main reasons for Internet users to choose cloud computing is that the network security performance is great, it also is the cornerstone of cloud computing applications. This paper briefly explores the impact on cloud environment on traditional cybersecurity, and puts forward corresponding solutions.

  15. The search for effective alternatives to conservatorship: lessons from a daily money management diversion study.

    PubMed

    Wilber, K H

    1995-01-01

    This article explores outcomes of daily money management (DMM) services for older persons. It is based on research that examined the ability of DMM to provide an alternative to court-appointed conservatorship that is less restrictive. Results indicate that although the DMM programs studied did not divert older persons from conservatorship, they appeared to offer several important advantages. These included helping older persons secure benefits and services, enhancing their financial security, and reducing financial exploitation.

  16. Colombia to Nigeria: Exploring the Possibilities of a Security Cooperation Strategy for Nigeria Based on the Successes Realized Through Plan Colombia

    DTIC Science & Technology

    2016-06-10

    region of Bolivia, Ecuador , Panama, Peru, Venezuela, and the far western remote areas of Brazil. Many in rural areas felt that the government was...picked these states because in both cases they are US priority states and regional hegemonic powers that anchor the security situation in their region...except in a few by case exceptions used to establish background and context. 12 Chapter Summary On the surface, there appears to be significant

  17. Monitor and Control of the Deep-Space network via Secure Web

    NASA Technical Reports Server (NTRS)

    Lamarra, N.

    1997-01-01

    (view graph) NASA lead center for robotic space exploration. Operating division of Caltech/Jet Propulsion Laboratory. Current missions, Voyagers, Galileo, Pathfinder, Global Surveyor. Upcoming missions, Cassini, Mars and New Millennium.

  18. Web Helpdesk - PHE

    Science.gov Websites

    You may be trying to access this site from a secured browser on the server. Please enable scripts supports this element, such as Internet Explorer 7.0 or later. Home | Contact Us | Accessibility | Privacy

  19. Security implications and governance of cognitive neuroscience.

    PubMed

    Kosal, Margaret E; Huang, Jonathan Y

    2015-01-01

    In recent years, significant efforts have been made toward elucidating the potential of the human brain. Spanning fields as disparate as psychology, biomedicine, computer science, mathematics, electrical engineering, and chemistry, research venturing into the growing domains of cognitive neuroscience and brain research has become fundamentally interdisciplinary. Among the most interesting and consequential applications to international security are the military and defense community's interests in the potential of cognitive neuroscience findings and technologies. In the United States, multiple governmental agencies are actively pursuing such endeavors, including the Department of Defense, which has invested over $3 billion in the last decade to conduct research on defense-related innovations. This study explores governance and security issues surrounding cognitive neuroscience research with regard to potential security-related applications and reports scientists' views on the role of researchers in these areas through a survey of over 200 active cognitive neuroscientists.

  20. Beyond the usual suspects: a multidimensional genetic exploration of infant attachment disorganization and security.

    PubMed

    Pappa, Irene; Szekely, Eszter; Mileva-Seitz, Viara R; Luijk, Maartje P C M; Bakermans-Kranenburg, Marian J; van IJzendoorn, Marinus H; Tiemeier, Henning

    2015-01-01

    Although the environmental influences on infant attachment disorganization and security are well-studied, little is known about their heritability. Candidate gene studies have shown small, often non-replicable effects. In this study, we gathered the largest sample (N = 657) of ethnically homogenous, 14-month-old children with both observed attachment and genome-wide data. First, we used a Genome-Wide Association Study (GWAS) approach to identify single nucleotide polymorphisms (SNPs) associated with attachment disorganization and security. Second, we annotated them into genes (Versatile Gene-based Association Study) and functional pathways. Our analyses provide evidence of novel genes (HDAC1, ZNF675, BSCD1) and pathways (synaptic transmission, cation transport) associated with attachment disorganization. Similar analyses identified a novel gene (BECN1) but no distinct pathways associated with attachment security. The results of this first extensive, exploratory study on the molecular-genetic basis of infant attachment await replication in large, independent samples.

  1. Questionnaire about psychology/disease correlation–I

    PubMed Central

    Ojog, DG; Pănescu, OM; Rusu, EC; Tănăsescu, MD

    2011-01-01

    Rationale: The existing personality inventories are exploring too general psychological features so that the possible psychology/disease associations might be leveled out. Objective: We attempt to build a tool to explore the possible correlation between certain psychological features and the most common internal disorders. Method: We have used two questionnaires containing many pairs of synonymous items (necessary for assessing the consistency of the answers). The items are divided into four main domains: preoccupation for the basal conditions of existence (health/ disease/ death, fear, money, lodging); interaction with other people; action, will/ volition, self-assertion; and preoccupation with the exterior. In this first article we are presenting the correlations between items of the first domain, based on the answers from our first 3138 respondents. Results and discussion: The concern about health is best reflected by general formulations. The desire for security is best expressed by items combining the worry about money and dwelling, and worst by items reflecting the eagerness to gain, keep or judiciously spend money. Among the various fears, those of future, darkness, and loneliness are better indicators of security concern. In assessing the anxiety about safety/ security, specific worries are more revelatory than the general ones. Precaution and inclination for order are the best indicators for the aspiration to stability. Poorer ones are the desire for cleanliness and the tendency to attachment. Health and security concerns seem to be consistently linked. The consistency evaluating system will be based upon pairs of synonymous items correlated with a10–200 or less error probability Abbreviations: PP = psychological profile; PF = personality feature; Q1/ Q2/ Q3 = first/ second/ third questionnaire; HeSD = health subdomain; SeSD = security subdomain; StSD = stability subdomain; ChiSq = chi square; ErrProb = error probability (probability of error). PMID:21505574

  2. "I want to be 100 years old, but I smoke too much": Exploring the gap between positive aging goals and reported preparatory actions in different social circumstances.

    PubMed

    Craciun, Catrinel; Flick, Uwe

    2015-12-01

    Preparing for positive aging is shaped by the social context a person lives in. The present qualitative study explores and compares representations about preparatory actions in precarious workers (i.e., with temporary job contracts and insecure pension plans) and individuals with secure pension plans living in Germany. It also examines, the discrepancy between what middle-aged persons think they should be doing in preparation and what they report doing for aging well. Findings from the analysis of the semi-structured interviews conducted here show that people who have insecure pension plans tend to see themselves as social networkers and optimists, while those with secure pension plans see themselves as social activists and careful planners of old age. All participants value an active, healthy body but manage to do little in order to attain it due to lacking time and discipline. In accordance with the socioemotional selectivity theory, perceiving a short-time perspective makes precarious individuals focus on emotional goals, while financially secure individuals value social goals. Implications for practice and policy change are discussed. Copyright © 2015 Elsevier Inc. All rights reserved.

  3. Exploring the Application of Shared Ledger Technology to Safeguards and other National Security Topics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Frazar, Sarah L.; Winters, Samuel T.; Kreyling, Sean J.

    In 2016, the Office of International Nuclear Safeguards at the National Nuclear Security Administration (NNSA) within the Department of Energy (DOE) commissioned the Pacific Northwest National Laboratory (PNNL) to explore the potential implications of the digital currency bitcoin and its underlying technologies on the safeguards system. The authors found that one category of technologies referred to as Shared Ledger Technology (SLT) offers a spectrum of benefits to the safeguards system. While further research is needed to validate assumptions and findings in the paper, preliminary analysis suggests that both the International Atomic Energy Agency (IAEA) and Member States can use SLTmore » to promote efficient, effective, accurate, and timely reporting, and increase transparency in the safeguards system without sacrificing confidentiality of safeguards data. This increased transparency and involvement of Member States in certain safeguards transactions could lead to increased trust and cooperation among States and the public, which generates a number of benefits. This paper describes these benefits and the analytical framework for assessing SLT applications for specific safeguards problems. The paper will also describe other national security areas where SLT could provide benefits.« less

  4. Occupational injuries: is job security a factor?

    PubMed

    Saha, Asim; Kulkarni, P K; Chaudhuri, R; Saiyed, H

    2005-09-01

    Although a large number of contributing factors of occupational injury causation are explored meticulously to explain the phenomenon of higher occupational injury occurrence in some subjects, it has remained a matter of controversy. In this study, an effort is made to explore whether job security has any contribution in explaining higher susceptibility of some workers. This was a retrospective occupational injury record study conducted in an industry of eastern India. Along with the study of injury records of 5 years, an interview was also conducted involving 726 workers (including permanent and temporary workers both) of the factory. Comparison was made between permanent and temporary workers by using the Mann-Whitney U-test and the chi-square test. A theoretical model of Poisson's distribution was used to compare between expected and real occurrence. Although two worker groups were very similar in relation to age, level of education, habits, and nature of work, accident frequency and severity rates were found to be significantly higher in temporary workers. This study concluded that the higher accident risk of the temporary workers might have been due to the less effective experience as well as due to lack of job security inherent in such workers.

  5. Secure attachment and eudaimonic well-being in late adulthood: The mediating role of self-compassion.

    PubMed

    Homan, Kristin J

    2018-03-01

    Attachment style refers to a systematic pattern of emotions, behaviors, and expectations that people have for how others will respond in relationships. Extensive evidence has documented the importance of attachment security in infants, children, adolescents, and adults, but the effects of attachment among exclusively older adult populations have received less attention. The present study explored the relationships between attachment style in late adulthood and eudaimonic well-being, which refers to a life replete with meaning, productive activity, and striving to reach one's potential. It also explored the mediating role of self-compassion, which can be described as a kind and forgiving attitude toward the self. A sample of 126 community-dwelling older adults (mean age = 70.40 years) completed measures tapping adult attachment, self-compassion, and six theoretically derived markers of eudaimonic well-being. Attachment anxiety and avoidance were inversely related to self-acceptance, personal growth, interpersonal relationship quality, purpose in life, and environmental mastery. Mediation analyses showed that self-compassion mediated each of these relationships. Results support the importance of attachment orientation for psychological well-being in late life and indicate that secure attachment facilitates an attitude of kindness and acceptance toward the self.

  6. Occurrence of post traumatic stress symptoms and their relationship to professional quality of life (ProQoL) in nursing staff at a forensic psychiatric security unit: a cross-sectional study.

    PubMed

    Lauvrud, Christian; Nonstad, Kåre; Palmstierna, Tom

    2009-04-16

    Violence is frequent towards nurses in forensic mental health hospitals. Implications of this high risk environment have not been systematically explored. This paper explores occurrence of symptoms on post traumatic stress and their relationship to professional quality of life. Self report questionnaires assessing symptoms of post traumatic stress and professional quality of life were distributed among psychiatric nurses in a high security forensic psychiatric unit with high frequency of violent behaviour. Relationships between post traumatic stress symptoms, forensic nursing experience, type of ward and compassion satisfaction, burnout and compassion fatigue were explored. The prevalence of post traumatic stress symptoms was low. Low scores were found on compassion satisfaction. Length of psychiatric nursing experience and low scores on compassion satisfaction were correlated to increased post traumatic stress symptoms. Although high violence frequency, low rate of post traumatic stress symptoms and low compassion satisfaction scores was found. High staff/patient ratio and emotional distance between staff and patients are discussed as protective factors.

  7. Occurrence of post traumatic stress symptoms and their relationship to professional quality of life (ProQoL) in nursing staff at a forensic psychiatric security unit: a cross-sectional study

    PubMed Central

    Lauvrud, Christian; Nonstad, Kåre; Palmstierna, Tom

    2009-01-01

    Background Violence is frequent towards nurses in forensic mental health hospitals. Implications of this high risk environment have not been systematically explored. This paper explores occurrence of symptoms on post traumatic stress and their relationship to professional quality of life. Methods Self report questionnaires assessing symptoms of post traumatic stress and professional quality of life were distributed among psychiatric nurses in a high security forensic psychiatric unit with high frequency of violent behaviour. Relationships between post traumatic stress symptoms, forensic nursing experience, type of ward and compassion satisfaction, burnout and compassion fatigue were explored. Results The prevalence of post traumatic stress symptoms was low. Low scores were found on compassion satisfaction. Length of psychiatric nursing experience and low scores on compassion satisfaction were correlated to increased post traumatic stress symptoms. Conclusion Although high violence frequency, low rate of post traumatic stress symptoms and low compassion satisfaction scores was found. High staff/patient ratio and emotional distance between staff and patients are discussed as protective factors. PMID:19371413

  8. Research Infrastructure and Scientific Collections: The Supply and Demand of Scientific Research

    NASA Astrophysics Data System (ADS)

    Graham, E.; Schindel, D. E.

    2016-12-01

    Research infrastructure is essential in both experimental and observational sciences and is commonly thought of as single-sited facilities. In contrast, object-based scientific collections are distributed in nearly every way, including by location, taxonomy, geologic epoch, discipline, collecting processes, benefits sharing rules, and many others. These diffused collections may have been amassed for a particular discipline, but their potential for use and impact in other fields needs to be explored. Through a series of cross-disciplinary activities, Scientific Collections International (SciColl) has explored and developed new ways in which the supply of scientific collections can meet the demand of researchers in unanticipated ways. From cross-cutting workshops on emerging infectious diseases and food security, to an online portal of collections, SciColl aims to illustrate the scope and value of object-based scientific research infrastructure. As distributed infrastructure, the full impact of scientific collections to the research community is a result of discovering, utilizing, and networking these resources. Examples and case studies from infectious disease research, food security topics, and digital connectivity will be explored.

  9. Eating when there is not enough to eat: eating behaviors and perceptions of food among food-insecure youths.

    PubMed

    Widome, Rachel; Neumark-Sztainer, Dianne; Hannan, Peter J; Haines, Jess; Story, Mary

    2009-05-01

    We explored differences in adolescents' eating habits, perceptions, and dietary intakes by food security status. As part of Project EAT (Eating Among Teens), we surveyed 4746 multiethnic middle and high school students in 31 primarily urban schools in the Minneapolis-St. Paul, Minnesota, area during the 1998-1999 academic year. Participants completed in-class surveys. We used multiple regression analysis to characterize associations between behaviors, perceptions, nutritional intake, and food security status. Compared with food-secure youths, food-insecure youths were more likely to perceive that eating healthfully was inconvenient and that healthy food did not taste good. Additionally, food-insecure youths reported eating more fast food but fewer family meals and breakfasts per week than did youths who were food secure. Food-insecure and food-secure youths perceived similar benefits from eating healthfully (P = .75). Compared with those who were food secure, food-insecure youths had higher fat intakes (P < .01). Food-insecure youths were more likely to have a body mass index above the 95th percentile. The eating patterns of food-insecure adolescents differ in important ways from the eating patterns of those who are food secure. Policies and interventions focusing on improving the foods that these youths eat deserve further examination.

  10. Children's Representations of Attachment and Positive Teacher-Child Relationships.

    PubMed

    Veríssimo, Manuela; Torres, Nuno; Silva, Filipa; Fernandes, Carla; Vaughn, Brian E; Santos, António J

    2017-01-01

    This study was designed to explore whether children's representations of attachment contribute to the co-construction of positive teacher-child relationships. An assessment of verbal intelligence was included as a predictor on the assumption that teachers might perceive themselves as having better relationships with more verbally competent children. Participants were 52 children from two pre-schools, in the district of Lisbon. The Attachment Story Completion Task (ASCT) was used to assess children's attachment security. The PCV-P (a scale developed in portuguese language) was used to describe teacher-child relationships through teachers' ratings of child secure base behavior and emotion regulation and the Wechsler Preschool and Primary Scale of Intelligence (WPPSI-R) was used to access verbal skills. Bivariate correlations showed that the teachers' rating of child secure base behavior was significantly associated with both child attachment security and verbal IQ. In a multiple regression analysis, the overall model R 2 was significant, as was the interaction term showing a moderating effect of attachment security on the relation between verbal IQ and teachers' ratings of secure base. The results suggest that co-construction of a close attachment-relevant relationship with teachers in early childhood is, in part, a function of the security in the context of parent-child attachment, but also of child verbal development.

  11. Children's Representations of Attachment and Positive Teacher–Child Relationships

    PubMed Central

    Veríssimo, Manuela; Torres, Nuno; Silva, Filipa; Fernandes, Carla; Vaughn, Brian E.; Santos, António J.

    2017-01-01

    This study was designed to explore whether children's representations of attachment contribute to the co-construction of positive teacher–child relationships. An assessment of verbal intelligence was included as a predictor on the assumption that teachers might perceive themselves as having better relationships with more verbally competent children. Participants were 52 children from two pre-schools, in the district of Lisbon. The Attachment Story Completion Task (ASCT) was used to assess children's attachment security. The PCV-P (a scale developed in portuguese language) was used to describe teacher–child relationships through teachers' ratings of child secure base behavior and emotion regulation and the Wechsler Preschool and Primary Scale of Intelligence (WPPSI-R) was used to access verbal skills. Bivariate correlations showed that the teachers' rating of child secure base behavior was significantly associated with both child attachment security and verbal IQ. In a multiple regression analysis, the overall model R2 was significant, as was the interaction term showing a moderating effect of attachment security on the relation between verbal IQ and teachers' ratings of secure base. The results suggest that co-construction of a close attachment-relevant relationship with teachers in early childhood is, in part, a function of the security in the context of parent-child attachment, but also of child verbal development. PMID:29312099

  12. Reconsidering non-traditional export agriculture and household food security: A case study in rural Guatemala

    PubMed Central

    Bennett, Elena M.

    2018-01-01

    As the production of non-traditional export (NTX) crops by smallholder households in developing countries expands, there is a compelling need to understand the potential effects of this type of agricultural production on household food security and nutrition. We use two household surveys with a sample of 52 households, interviews, and focus groups to examine whether smallholder farmers who produce broccoli for export in a rural Guatemalan community have different household food security than farmers in the same community who are still growing traditional maize and bean crops. We explore and compare the food security status of broccoli farmers (adopters) and traditional farmers (non-adopters) across four dimensions of food security: availability, access, utilization, and stability. Adopters earned significantly more income (40%) than non-adopters, but higher incomes did not coincide with improvements in food availability, food access, or food utilization. Results indicate that adopters and non-adopters alike struggle with access to food, while the intensity of broccoli production may be undermining the ability of local agricultural systems to naturally control pests and regulate nutrients. More systematic approaches to food security assessment, especially those that consider all four dimensions of food security, are needed to better target interventions designed to alleviate food insecurity among rural smallholders. PMID:29795691

  13. Reconsidering non-traditional export agriculture and household food security: A case study in rural Guatemala.

    PubMed

    Méthot, Josée; Bennett, Elena M

    2018-01-01

    As the production of non-traditional export (NTX) crops by smallholder households in developing countries expands, there is a compelling need to understand the potential effects of this type of agricultural production on household food security and nutrition. We use two household surveys with a sample of 52 households, interviews, and focus groups to examine whether smallholder farmers who produce broccoli for export in a rural Guatemalan community have different household food security than farmers in the same community who are still growing traditional maize and bean crops. We explore and compare the food security status of broccoli farmers (adopters) and traditional farmers (non-adopters) across four dimensions of food security: availability, access, utilization, and stability. Adopters earned significantly more income (40%) than non-adopters, but higher incomes did not coincide with improvements in food availability, food access, or food utilization. Results indicate that adopters and non-adopters alike struggle with access to food, while the intensity of broccoli production may be undermining the ability of local agricultural systems to naturally control pests and regulate nutrients. More systematic approaches to food security assessment, especially those that consider all four dimensions of food security, are needed to better target interventions designed to alleviate food insecurity among rural smallholders.

  14. Coordinating UAV information for executing national security-oriented collaboration

    NASA Astrophysics Data System (ADS)

    Isenor, Anthony W.; Allard, Yannick; Lapinski, Anna-Liesa S.; Demers, Hugues; Radulescu, Dan

    2014-10-01

    Unmanned Aerial Vehicles (UAVs) are being used by numerous nations for defence-related missions. In some cases, the UAV is considered a cost-effective means to acquire data such as imagery over a location or object. Considering Canada's geographic expanse, UAVs are also being suggested as a potential platform for use in surveillance of remote areas, such as northern Canada. However, such activities are typically associated with security as opposed to defence. The use of a defence platform for security activities introduces the issue of information exchange between the defence and security communities and their software applications. This paper explores the flow of information from the system used by the UAVs employed by the Royal Canadian Navy. Multiple computers are setup, each with the information system used by the UAVs, including appropriate communication between the systems. Simulated data that may be expected from a typical maritime UAV mission is then fed into the information system. The information structures common to the Canadian security community are then used to store and transfer the simulated data. The resulting data flow from the defence-oriented UAV system to the security-oriented information structure is then displayed using an open source geospatial application. Use of the information structures and applications relevant to the security community avoids the distribution restrictions often associated with defence-specific applications.

  15. Utilising a multi-item questionnaire to assess household food security in Australia.

    PubMed

    Butcher, Lucy M; O'Sullivan, Therese A; Ryan, Maria M; Lo, Johnny; Devine, Amanda

    2018-03-15

    Currently, two food sufficiency questions are utilised as a proxy measure of national food security status in Australia. These questions do not capture all dimensions of food security and have been attributed to underreporting of the problem. The purpose of this study was to investigate food security using the short form of the US Household Food Security Survey Module (HFSSM) within an Australian context; and explore the relationship between food security status and multiple socio-demographic variables. Two online surveys were completed by 2334 Australian participants from November 2014 to February 2015. Surveys contained the short form of the HFSSM and twelve socio-demographic questions. Cross-tabulations chi-square tests and a multinomial logistic regression model were employed to analyse the survey data. Food security status of the respondents was classified accordingly: High or Marginal (64%, n = 1495), Low (20%, n = 460) or Very Low (16%, n = 379). Significant independent predictors of food security were age (P < .001), marital status (P = .005), household income (P < .001) and education (P < .001). Findings suggest food insecurity is an important issue across Australia and that certain groups, regardless of income, are particularly vulnerable. Government policy and health promotion interventions that specifically target "at risk" groups may assist to more effectively address the problem. Additionally, the use of a multi-item measure is worth considering as a national indicator of food security in Australia. © 2018 Australian Health Promotion Association.

  16. Nuclear Terrorism: The Possibilities, Probable Consequences, and Preventive Strategies.

    ERIC Educational Resources Information Center

    Totten, Michael

    1986-01-01

    This article explores the possibility of terrorist acts against nuclear power stations. It includes information on reactor security, public policy, and alternative courses of action deemed to increase public safety and cost efficiency. (JDH)

  17. The Social Side of Information Networking.

    ERIC Educational Resources Information Center

    Katz, James E.

    1997-01-01

    Explores the social issues, including manners, security, crime (fraud), and social control associated with information networking, with emphasis on the Internet. Also addresses the influence of cellular phones, the Internet and other information technologies on society. (GR)

  18. Women and Work in Appalachia: The Waging War.

    ERIC Educational Resources Information Center

    Lilly, Leslie

    1979-01-01

    Discusses the low wages and dead-end jobs most Appalachian women workers face and explores nontraditional employment options which offer higher wages, benefits, security, and a chance for truly meeting a family's needs. (DS)

  19. Views of the Purse-String Holders

    ERIC Educational Resources Information Center

    Boyles, Billy O.

    1977-01-01

    Explores the attitudes of legislators towards the college public relations function through interviews with Florida senators and representatives, and cites the need to establish a clearer identity with them in order to secure necessary funding. (RT)

  20. Global nonfuel mineral exploration trends 2001-2015

    USGS Publications Warehouse

    Karl, Nick; Wilburn, David R.

    2017-01-01

    The mission of the U.S. Geological Survey (USGS) National Minerals Information Center (NMIC) is to collect, analyze and disseminate information on the domestic and international supply of and demand for minerals and mineral materials essential to the U.S. economy and national security. Understanding mineral exploration activities and trends assists government policy makers, minerals industry decision makers and research entities in identifying where future sources of mineral supply are likely to be discovered, the amount and type of these resources and factors that may affect exploration and development.

  1. The cyber security threat stops in the boardroom.

    PubMed

    Scully, Tim

    The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.

  2. Security practices and regulatory compliance in the healthcare industry.

    PubMed

    Kwon, Juhee; Johnson, M Eric

    2013-01-01

    Securing protected health information is a critical responsibility of every healthcare organization. We explore information security practices and identify practice patterns that are associated with improved regulatory compliance. We employed Ward's cluster analysis using minimum variance based on the adoption of security practices. Variance between organizations was measured using dichotomous data indicating the presence or absence of each security practice. Using t tests, we identified the relationships between the clusters of security practices and their regulatory compliance. We utilized the results from the Kroll/Healthcare Information and Management Systems Society telephone-based survey of 250 US healthcare organizations including adoption status of security practices, breach incidents, and perceived compliance levels on Health Information Technology for Economic and Clinical Health, Health Insurance Portability and Accountability Act, Red Flags rules, Centers for Medicare and Medicaid Services, and state laws governing patient information security. Our analysis identified three clusters (which we call leaders, followers, and laggers) based on the variance of security practice patterns. The clusters have significant differences among non-technical practices rather than technical practices, and the highest level of compliance was associated with hospitals that employed a balanced approach between technical and non-technical practices (or between one-off and cultural practices). Hospitals in the highest level of compliance were significantly managing third parties' breaches and training. Audit practices were important to those who scored in the middle of the pack on compliance. Our results provide security practice benchmarks for healthcare administrators and can help policy makers in developing strategic and practical guidelines for practice adoption.

  3. Security practices and regulatory compliance in the healthcare industry

    PubMed Central

    Kwon, Juhee; Johnson, M Eric

    2013-01-01

    Objective Securing protected health information is a critical responsibility of every healthcare organization. We explore information security practices and identify practice patterns that are associated with improved regulatory compliance. Design We employed Ward's cluster analysis using minimum variance based on the adoption of security practices. Variance between organizations was measured using dichotomous data indicating the presence or absence of each security practice. Using t tests, we identified the relationships between the clusters of security practices and their regulatory compliance. Measurement We utilized the results from the Kroll/Healthcare Information and Management Systems Society telephone-based survey of 250 US healthcare organizations including adoption status of security practices, breach incidents, and perceived compliance levels on Health Information Technology for Economic and Clinical Health, Health Insurance Portability and Accountability Act, Red Flags rules, Centers for Medicare and Medicaid Services, and state laws governing patient information security. Results Our analysis identified three clusters (which we call leaders, followers, and laggers) based on the variance of security practice patterns. The clusters have significant differences among non-technical practices rather than technical practices, and the highest level of compliance was associated with hospitals that employed a balanced approach between technical and non-technical practices (or between one-off and cultural practices). Conclusions Hospitals in the highest level of compliance were significantly managing third parties’ breaches and training. Audit practices were important to those who scored in the middle of the pack on compliance. Our results provide security practice benchmarks for healthcare administrators and can help policy makers in developing strategic and practical guidelines for practice adoption. PMID:22955497

  4. Interactive analysis of geographically distributed population imaging data collections over light-path data networks

    NASA Astrophysics Data System (ADS)

    van Lew, Baldur; Botha, Charl P.; Milles, Julien R.; Vrooman, Henri A.; van de Giessen, Martijn; Lelieveldt, Boudewijn P. F.

    2015-03-01

    The cohort size required in epidemiological imaging genetics studies often mandates the pooling of data from multiple hospitals. Patient data, however, is subject to strict privacy protection regimes, and physical data storage may be legally restricted to a hospital network. To enable biomarker discovery, fast data access and interactive data exploration must be combined with high-performance computing resources, while respecting privacy regulations. We present a system using fast and inherently secure light-paths to access distributed data, thereby obviating the need for a central data repository. A secure private cloud computing framework facilitates interactive, computationally intensive exploration of this geographically distributed, privacy sensitive data. As a proof of concept, MRI brain imaging data hosted at two remote sites were processed in response to a user command at a third site. The system was able to automatically start virtual machines, run a selected processing pipeline and write results to a user accessible database, while keeping data locally stored in the hospitals. Individual tasks took approximately 50% longer compared to a locally hosted blade server but the cloud infrastructure reduced the total elapsed time by a factor of 40 using 70 virtual machines in the cloud. We demonstrated that the combination light-path and private cloud is a viable means of building an analysis infrastructure for secure data analysis. The system requires further work in the areas of error handling, load balancing and secure support of multiple users.

  5. Data fusion in cyber security: first order entity extraction from common cyber data

    NASA Astrophysics Data System (ADS)

    Giacobe, Nicklaus A.

    2012-06-01

    The Joint Directors of Labs Data Fusion Process Model (JDL Model) provides a framework for how to handle sensor data to develop higher levels of inference in a complex environment. Beginning from a call to leverage data fusion techniques in intrusion detection, there have been a number of advances in the use of data fusion algorithms in this subdomain of cyber security. While it is tempting to jump directly to situation-level or threat-level refinement (levels 2 and 3) for more exciting inferences, a proper fusion process starts with lower levels of fusion in order to provide a basis for the higher fusion levels. The process begins with first order entity extraction, or the identification of important entities represented in the sensor data stream. Current cyber security operational tools and their associated data are explored for potential exploitation, identifying the first order entities that exist in the data and the properties of these entities that are described by the data. Cyber events that are represented in the data stream are added to the first order entities as their properties. This work explores typical cyber security data and the inferences that can be made at the lower fusion levels (0 and 1) with simple metrics. Depending on the types of events that are expected by the analyst, these relatively simple metrics can provide insight on their own, or could be used in fusion algorithms as a basis for higher levels of inference.

  6. Using exercise to treat patients with severe mental illness: how and why?

    PubMed

    Tetlie, Trine; Heimsnes, Maria Charlotte; Almvik, Roger

    2009-02-01

    In this study, one focus group and five individual semi-structured interviews were conducted to investigate nursing staff's ways of using exercise as part of the routine treatment for patients with severe mental illness (SMI). The study also explored the patients' experiences and views of the exercise program given in this secure hospital. The organization and delivery of the exercise program are also discussed. The findings indicate that successful outcomes and adherence to exercise programs for patients with SMI in a secure setting rely on therapeutic relationships, having exercise as a mandatory part of the treatment, positive reinforcement, and experienced instructors. More research is needed to identify effective exercise interventions and feasible delivery models for individuals with SMI in secure settings.

  7. Environmental security control of resource utilization of shale gas' drilling cuttings containing heavy metals.

    PubMed

    Wang, Chao-Qiang; Lin, Xiao-Yan; Zhang, Chun; Mei, Xu-Dong

    2017-09-01

    The overall objective of this research project was to investigate the heavy metals environmental security control of resource utilization of shale gas' drilling cuttings. To achieve this objective, we got through theoretical calculation and testing, ultimately and preliminarily determine the content of heavy metals pollutants, and compared with related standards at domestically and abroad. The results indicated that using the second Fike's law, the theoretical model of the release amount of heavy metal can be made, and the groundwater environmental risk as main point compared with soil. This study can play a role of standard guidance on environmental security control of drilling cuttings resource utilization by the exploration and development of shale gas in our country.

  8. Psychotherapy process and relationship in the context of a brief attachment-based mother-infant intervention.

    PubMed

    Woodhouse, Susan S; Lauer, Maria; Beeney, Julie R S; Cassidy, Jude

    2015-03-01

    The present study investigated links between the observer-rated process of psychotherapy and 2 key psychotherapy relationship constructs (i.e., working alliance and attachment to the therapist) in the context of a brief, attachment-based, home-visiting, mother-infant intervention that aimed to promote later secure infant attachment. Additionally, links between observer ratings of intervener and mother contributions to process were examined. Participants included 85 economically stressed mothers of first-born, 5.5-month-old, temperamentally irritable infants. Therapists included 2 doctoral-level and 4 master's-level home visitors. Observer-rated therapist psychotherapy process variables (i.e., warmth, exploration, and negative attitude) were not linked to maternal ratings of working alliance. Therapist warmth, however, was positively associated with maternal ratings of security of attachment to the therapist, and therapist negative attitude was positively related to maternal ratings of preoccupied-merger attachment to the therapist. As expected, both therapist warmth and exploration were positively associated with both maternal participation and exploration. Therapist negative attitude was inversely related to maternal exploration, but not to maternal participation. Results support the idea that attention to the psychotherapy process and relationship may be important in the context of a brief home-visiting parenting intervention with a nonclinical sample. (PsycINFO Database Record (c) 2015 APA, all rights reserved).

  9. SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly

    NASA Astrophysics Data System (ADS)

    Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.

    2006-05-01

    This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).

  10. Association of food security status with overweight and dietary intake: exploration of White British and Pakistani-origin families in the Born in Bradford cohort.

    PubMed

    Yang, T C; Sahota, P; Pickett, K E; Bryant, M

    2018-04-24

    Food insecurity has been associated with dietary intake and weight status in UK adults and children although results have been mixed and ethnicity has not been explored. We aimed to compare prevalence and trajectories of weight and dietary intakes among food secure and insecure White British and Pakistani-origin families. At 12 months postpartum, mothers in the Born in Bradford cohort completed a questionnaire on food security status and a food frequency questionnaire (FFQ) assessing their child's intake in the previous month; at 18 months postpartum, mothers completed a short-form FFQ assessing dietary intake in the previous 12 months. Weights and heights of mothers and infants were assessed at 12-, 24-, and 36-months postpartum, with an additional measurement of children taken at 4-5 years. Associations between food security status and dietary intakes were assessed using Wilcoxon-Mann-Whitney for continuous variables and χ 2 or Fisher's exact tests for categorical variables. Quantile and logistic regression were used to determine dietary intakes adjusting for mother's age. Linear mixed effects models were used to assess longitudinal changes in body mass index (BMI) in mothers and BMI z-scores in children. At 12 months postpartum, White British mothers reported more food insecurity than Pakistani-origin mothers (11% vs 7%; p < 0.01) and more food insecure mothers were overweight. Between 12 and 36 months postpartum, BMI increased more among food insecure Pakistani-origin mothers (β = 0.77 units, [95% Confidence Interval [CI]: 0.40, 1.10]) than food secure (β = 0.44 units, 95% CI: 0.33, 0.55). This was also found in Pakistani-origin children (BMI z-score: food insecure β = 0.40 units, 95% CI: 0.22, 0.59; food secure β = 0.25 units, 95% CI: 0.20, 0.29). No significant increases in BMI were observed for food secure or insecure White British mothers while BMI z-score increased by 0.17 (95% CI: 0.13, 0.21) for food secure White British children. Food insecure mothers and children had dietary intakes of poorer quality, with fewer vegetables and higher consumption of sugar-sweetened drinks. Food security status is associated with body weight and dietary intakes differentially by ethnicity. These are important considerations for developing targeted interventions.

  11. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Solis, John Hector

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a securemore » program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.« less

  12. Planning for Retirement with a Tax-Sheltered Mutual Fund.

    ERIC Educational Resources Information Center

    Schnee, Edward J.; And Others

    1983-01-01

    Greater attention has been focused on the role that employer-sponsored retirement plans and individual savings must play in ensuring retirement income security. Alternative tax retirement planning opportunities currently available to college personnel are explored. (MLW)

  13. Reforming America's Schools: The High Risks of Failure.

    ERIC Educational Resources Information Center

    Best, John Hardin

    1984-01-01

    The decline of America's schools risks the country's leadership in technology and production, economic well-being, military security, and social and civil order. The role that the educational system plays in this society is explored. (DF)

  14. Middleware and Web Services for the Collaborative Information Portal of NASA's Mars Exploration Rovers Mission

    NASA Technical Reports Server (NTRS)

    Sinderson, Elias; Magapu, Vish; Mak, Ronald

    2004-01-01

    We describe the design and deployment of the middleware for the Collaborative Information Portal (CIP), a mission critical J2EE application developed for NASA's 2003 Mars Exploration Rover mission. CIP enabled mission personnel to access data and images sent back from Mars, staff and event schedules, broadcast messages and clocks displaying various Earth and Mars time zones. We developed the CIP middleware in less than two years time usins cutting-edge technologies, including EJBs, servlets, JDBC, JNDI and JMS. The middleware was designed as a collection of independent, hot-deployable web services, providing secure access to back end file systems and databases. Throughout the middleware we enabled crosscutting capabilities such as runtime service configuration, security, logging and remote monitoring. This paper presents our approach to mitigating the challenges we faced, concluding with a review of the lessons we learned from this project and noting what we'd do differently and why.

  15. KSC-2014-2248

    NASA Image and Video Library

    2014-04-16

    CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. The first panel is secured on a storage stand while the second panel is being lowered by crane onto the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper

  16. Examining the Multi-level Fit between Work and Technology in a Secure Messaging Implementation.

    PubMed

    Ozkaynak, Mustafa; Johnson, Sharon; Shimada, Stephanie; Petrakis, Beth Ann; Tulu, Bengisu; Archambeault, Cliona; Fix, Gemmae; Schwartz, Erin; Woods, Susan

    2014-01-01

    Secure messaging (SM) allows patients to communicate with their providers for non-urgent health issues. Like other health information technologies, the design and implementation of SM should account for workflow to avoid suboptimal outcomes. SM may present unique workflow challenges because patients add a layer of complexity, as they are also direct users of the system. This study explores SM implementation at two Veterans Health Administration facilities. We interviewed twenty-nine members of eight primary care teams using semi-structured interviews. Questions addressed staff opinions about the integration of SM with daily practice, and team members' attitudes and experiences with SM. We describe the clinical workflow for SM, examining complexity and variability. We identified eight workflow issues directly related to efficiency and patient satisfaction, based on an exploration of the technology fit with multilevel factors. These findings inform organizational interventions that will accommodate SM implementation and lead to more patient-centered care.

  17. Data Protection-Aware Design for Cloud Services

    NASA Astrophysics Data System (ADS)

    Creese, Sadie; Hopkins, Paul; Pearson, Siani; Shen, Yun

    The Cloud is a relatively new concept and so it is unsurprising that the information assurance, data protection, network security and privacy concerns have yet to be fully addressed. This paper seeks to begin the process of designing data protection controls into clouds from the outset so as to avoid the costs associated with bolting on security as an afterthought. Our approach is firstly to consider cloud maturity from an enterprise level perspective, describing a novel capability maturity model. We use this model to explore privacy controls within an enterprise cloud deployment, and explore where there may be opportunities to design in data protection controls as exploitation of the Cloud matures. We demonstrate how we might enable such controls via the use of design patterns. Finally, we consider how Service Level Agreements (SLAs) might be used to ensure that third party suppliers act in support of such controls.

  18. NASA Advanced Computing Environment for Science and Engineering

    NASA Technical Reports Server (NTRS)

    Biswas, Rupak

    2017-01-01

    Vision: To reach for new heights and reveal the unknown so that what we do and learn will benefit all humankind. Mission: To pioneer the future in space exploration, scientific discovery, and aeronautics research. Aeronautics Research (ARMD): Pioneer and prove new flight technologies for safer, more secure, efficient, and environmental friendly air transportation. Human Exploration and Operations (HEOMD): Focus on ISS operations; and develop new spacecraft and other capabilities for affordable, sustainable exploration beyond low Earth orbit. Science (SCMD): Explore the Earth, solar system, and universe beyond; chart best route for discovery; and reap the benefits of Earth and space exploration for society. Space Technology (STMD): Rapidly develop, demonstrate, and infuse revolutionary, high-payoff technologies through collaborative partnerships, expanding the boundaries of aerospace enterprise.

  19. Privacy vs usability: a qualitative exploration of patients' experiences with secure Internet communication with their general practitioner.

    PubMed

    Tjora, Aksel; Tran, Trung; Faxvaag, Arild

    2005-05-31

    Direct electronic communication between patients and physicians has the potential to empower patients and improve health care services. Communication by regular email is, however, considered a security threat in many countries and is not recommended. Systems which offer secure communication have now emerged. Unlike regular email, secure systems require that users authenticate themselves. However, the authentication steps per se may become barriers that reduce use. The objective was to study the experiences of patients who were using a secure electronic communication system. The focus of the study was the users' privacy versus the usability of the system. Qualitative interviews were conducted with 15 patients who used a secure communication system (MedAxess) to exchange personal health information with their primary care physician. Six main themes were identified from the interviews: (1) supporting simple questions, (2) security issues, (3) aspects of written communication, (4) trust in the physician, (5) simplicity of MedAxess, and (6) trouble using the system. By using the system, about half of the patients (8/15) experienced easier access to their physician, with whom they tended to solve minor health problems and elaborate on more complex illness experiences. Two thirds of the respondents (10/15) found that their physician quickly responded to their MedAxess requests. As a result of the security barriers, the users felt that the system was secure. However, due to the same barriers, the patients considered the log-in procedure cumbersome, which had considerable negative impact on the actual use of the system. Despite a perceived need for secure electronic patient-physician communication systems, security barriers may diminish their overall usefulness. A dual approach is necessary to improve this situation: patients need to be better informed about security issues, and, at the same time, their experiences of using secure systems must be studied and used to improve user interfaces.

  20. Privacy vs Usability: A Qualitative Exploration of Patients' Experiences With Secure Internet Communication With Their General Practitioner

    PubMed Central

    Tran, Trung; Faxvaag, Arild

    2005-01-01

    Background Direct electronic communication between patients and physicians has the potential to empower patients and improve health care services. Communication by regular email is, however, considered a security threat in many countries and is not recommended. Systems which offer secure communication have now emerged. Unlike regular email, secure systems require that users authenticate themselves. However, the authentication steps per se may become barriers that reduce use. Objectives The objective was to study the experiences of patients who were using a secure electronic communication system. The focus of the study was the users' privacy versus the usability of the system. Methods Qualitative interviews were conducted with 15 patients who used a secure communication system (MedAxess) to exchange personal health information with their primary care physician. Results Six main themes were identified from the interviews: (1) supporting simple questions, (2) security issues, (3) aspects of written communication, (4) trust in the physician, (5) simplicity of MedAxess, and (6) trouble using the system. By using the system, about half of the patients (8/15) experienced easier access to their physician, with whom they tended to solve minor health problems and elaborate on more complex illness experiences. Two thirds of the respondents (10/15) found that their physician quickly responded to their MedAxess requests. As a result of the security barriers, the users felt that the system was secure. However, due to the same barriers, the patients considered the log-in procedure cumbersome, which had considerable negative impact on the actual use of the system. Conclusions Despite a perceived need for secure electronic patient-physician communication systems, security barriers may diminish their overall usefulness. A dual approach is necessary to improve this situation: patients need to be better informed about security issues, and, at the same time, their experiences of using secure systems must be studied and used to improve user interfaces. PMID:15998606

  1. State Regulatory Authority (SRA) Coordination of Safety, Security, and Safeguards of Nuclear Facilities: A Framework for Analysis

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mladineo, Stephen V.; Frazar, Sarah L.; Kurzrok, Andrew J.

    This paper will explore the development of a framework for conducting an assessment of safety-security-safeguards integration within a State. The goal is to examine State regulatory structures to identify conflicts and gaps that hinder management of the three disciplines at nuclear facilities. Such an analysis could be performed by a State Regulatory Authority (SRA) to provide a self-assessment or as part of technical cooperation with either a newcomer State, or to a State with a fully developed SRA.

  2. European Service Module-Structural Test Article Load onto Transp

    NASA Image and Video Library

    2017-06-21

    The Orion service module structural test article for Exploration Mission-1 (EM-1), built by the European Space Agency, is prepared for shipment to Lockheed Martin's Denver facility to undergo testing. Inside the Neil Armstrong Operations and Checkout Building high bay at NASA's Kennedy Space Center in Florida, workers secure the protective covering around the module and a crane lifts the module, secured on stand, for the move to the transport truck. The Orion spacecraft will launch atop the agency's Space Launch System rocket on EM-1 in 2019.

  3. Russian policy and the Korean crisis. Final report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Blank, S.J.

    1994-09-30

    The author relates Russian policy to the broader struggle for power and coherence in Russian security policy generally, and in Russian policy towards Asia. He also explores the ambivalence of Russia's position, trying to maintain a foot in all camps on the Korean issue even as it asserts its opposition to nuclear proliferation and to any settlement from which it is excluded. The author concludes by expanding his frame of reference to use the Russian case as an example illustrating the difficulties inherent in moving to a new, broader Northeast Asian security system.

  4. Orion EM-1 Crew Module Move from Clean Room to Work Station

    NASA Image and Video Library

    2017-05-11

    The Orion crew module for NASA’s Exploration Mission 1 (EM-1) is secured in a work station in the Neil Armstrong Operations and Checkout Building high bay at NASA’s Kennedy Space Center in Florida. Orion will undergo additional processing to prepare it for launch in 2019. The spacecraft is being prepared for its first integrated flight atop the Space Launch System rocket on Exploration Mission-1.

  5. Orion EM-1 Crew Module Move from Clean Room to Work Station

    NASA Image and Video Library

    2017-05-11

    The Orion crew module for NASA’s Exploration Mission 1 (EM-1) is being secured in a work station in the Neil Armstrong Operations and Checkout Building high bay at NASA’s Kennedy Space Center in Florida. Orion will undergo additional processing to prepare it for launch in 2019. The spacecraft is being prepared for its first integrated flight atop the Space Launch System rocket on Exploration Mission-1.

  6. NASA Electronic Library System (NELS): The system impact of security

    NASA Technical Reports Server (NTRS)

    Mcgregor, Terry L.

    1993-01-01

    This paper discusses security issues as they relate to the NASA Electronic Library System which is currently in use as the repository system for AdaNET System Version 3 (ASV3) being operated by MountainNET, Inc. NELS was originally designed to provide for public, development, and secure collections and objects. The secure feature for collections and objects was deferred in the initial system for implementation at a later date. The NELS system is now 9 months old and many lessons have been learned about the use and maintenance of library systems. MountainNET has 9 months of experience in operating the system and gathering feedback from the ASV3 user community. The user community has expressed an interest in seeing security features implemented in the current system. The time has come to take another look at the whole issue of security for the NELS system. Two requirements involving security have been put forth by MountainNET for the ASV3 system. The first is to incorporate at the collection level a security scheme to allow restricted access to collections. This should be invisible to end users and be controlled by librarians. The second is to allow inclusion of applications which can be executed only by a controlled group of users; for example, an application which can be executed by librarians only. The requirements provide a broad framework in which to work. These requirements raise more questions than answers. To explore the impact of these requirements a top down approach will be used.

  7. [Welfare and health in the century of social security].

    PubMed

    Westin, S

    1999-12-10

    Great achievements for public health in this century include penicillin, oral contraception, vaccination and transplantation, but the greatest contribution to the health of Norwegians may have been made by social security and the welfare state policies. The beneficial effects of social security include: less social inequality, a factor which in itself makes for better health, some degree of financial security for people who are ill and unable to support themselves or their families, universal availability of medical and health services. This paper explores the ideas and sources from which present-day social security legislation stems. The emergence of state based welfare legislation was inspired by developments in Germany under Bismarck; accident insurance for industrial workers was the first to be introduced in 1894. Several periods of active social security legislation followed at times when labour unions and socialist ideas were strong, supported, to some degree, by radical clergy and public health doctors. Social democratic governments, inspired by the British Beveridge plan towards the end of World War II, took the lead during the long post-war period until the mid 1970s. The Scandinavian model of social security is based on universal coverage and a single payer system. However, since the 1980s, as in other countries of Northern Europe, the social security system has come under pressure from market liberalism. Now at the turn of the century, increasing social inequalities cause some concern for the future of the welfare state.

  8. Indoor Athletic Facilities.

    ERIC Educational Resources Information Center

    Fleming, E. Scott

    2000-01-01

    Examines the concept of shared-use facilities to help financially support and meet the demand for athletic facilities. Shared-use considerations are explored including cost sharing of ongoing operations, aesthetics, locker rooms, support facilities, parking and site access, and building access and security. (GR)

  9. 75 FR 35104 - In the Matter of Aphton Corp., Apollo International of Delaware, Inc., Applewoods, Inc., Applied...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-21

    ...., Asian Star Development, Inc., Associated Golf Management, Inc. (n/k/a Delta Mining & Exploration Corp... of current and accurate information concerning the securities of Asian Star Development, Inc. because...

  10. Plant Operations. OSHA on Campus: Campus Safety Officers Discuss Problems and Potentials

    ERIC Educational Resources Information Center

    Kuchta, Joseph F.; And Others

    1973-01-01

    The Occupation Safety and Health Act (OSHA) has presented campus safety officers with new problems, but it is also offering them new potentials, which were explored at the recent national conference on Campus Security. (Editor)

  11. Twenty Seven Years of Quantum Cryptography!

    NASA Astrophysics Data System (ADS)

    Hughes, Richard

    2011-03-01

    One of the fundamental goals of cryptographic research is to minimize the assumptions underlying the protocols that enable secure communications between pairs or groups of users. In 1984, building on earlier research by Stephen Wiesner, Charles Bennett and Gilles Brassard showed how quantum physics could be harnessed to provide information-theoretic security for protocols such as the distribution of cryptographic keys, which enables two parties to secure their conventional communications. Bennett and Brassard and colleagues performed a proof-of-principle quantum key distribution (QKD) experiment with single-photon quantum state transmission over a 32-cm air path in 1991. This seminal experiment led other researchers to explore QKD in optical fibers and over line-of-sight outdoor atmospheric paths (``free-space''), resulting in dramatic increases in range, bit rate and security. These advances have been enabled by improvements in sources and single-photon detectors. Also in 1991 Artur Ekert showed how the security of QKD could be related to quantum entanglement. This insight led to a deeper understanding and proof of QKD security with practical sources and detectors in the presence of transmission loss and channel noise. Today, QKD has been implemented over ranges much greater than 100km in both fiber and free-space, multi-node network testbeds have been demonstrated, and satellite-based QKD is under study in several countries. ``Quantum hacking'' researchers have shown the importance of extending security considerations to the classical devices that produce and detect the photon quantum states. New quantum cryptographic protocols such as secure identification have been proposed, and others such as quantum secret splitting have been demonstrated. It is now possible to envision quantum cryptography providing a more secure alternative to present-day cryptographic methods for many secure communications functions. My talk will survey these remarkable developments.

  12. Increased uptake of social security benefits among long-term survivors of cancer in childhood, adolescence and young adulthood: a Norwegian population-based cohort study.

    PubMed

    Ghaderi, S; Engeland, A; Moster, D; Ruud, E; Syse, A; Wesenberg, F; Bjørge, T

    2013-04-16

    As the number of cancer survivors increases, their health and welfare have come into focus. Thus, long-term medical consequences of cancer at a young age (<25 years), obtained from social security benefit records, were studied. Standardised incidence ratios (SIRs) of long-term medical consequences for 5-year cancer survivors, born during 1965-1985, were explored by linking population-based registries in Norway. Among the 5-year cancer survivors (4031 individuals), 29.7% received social security benefits. The survivors had an overall 4.4 times (95% confidence interval (95% CI): 4.1-4.6) higher risk of social security benefit uptake than the cancer-free population. Survivors of malignancies of bone and connective tissues (SIR: 10.8; 95% CI: 9.1-12.9), CNS tumours (SIR: 7.7; 95% CI: 6.9-8.6) and malignancies of the haematopoietic system (SIR: 6.1; 95% CI: 5.3-7.0) had the highest risks of social security benefits uptake. The most notified causes of social security benefit uptake were diseases of the nervous system, and injury and poisoning. The uptake of social security benefits among 5-year cancer survivors increased substantially and it may represent a solid outcome measure for the burden of the most severe late effects, especially in countries with comparable social welfare systems.

  13. Location Privacy in RFID Applications

    NASA Astrophysics Data System (ADS)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  14. Full-field implementation of a perfect eavesdropper on a quantum cryptography system.

    PubMed

    Gerhardt, Ilja; Liu, Qin; Lamas-Linares, Antía; Skaar, Johannes; Kurtsiefer, Christian; Makarov, Vadim

    2011-06-14

    Quantum key distribution (QKD) allows two remote parties to grow a shared secret key. Its security is founded on the principles of quantum mechanics, but in reality it significantly relies on the physical implementation. Technological imperfections of QKD systems have been previously explored, but no attack on an established QKD connection has been realized so far. Here we show the first full-field implementation of a complete attack on a running QKD connection. An installed eavesdropper obtains the entire 'secret' key, while none of the parameters monitored by the legitimate parties indicate a security breach. This confirms that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.

  15. The Sustainable Development Goals and the Global Health Security Agenda: exploring synergies for a sustainable and resilient world.

    PubMed

    Bali, Sulzhan; Taaffe, Jessica

    2017-05-01

    Both the Sustainable Development Goals (SDGs) and the Global Health Security Agenda (GHSA) represent bold initiatives to address systematically gaps in previous efforts to assure that societies can be resilient when confronted with potentially overwhelming threats to health. Despite their obvious differences, and differing criticisms of both, they shift away from vertical (problem- or disease-specific) to horizontal (comprehensive) solutions. Despite the comprehensiveness of the SDGs, they lack a specific target for global health security. The GHSA focuses primarily on infectious diseases and neglects non-communicable diseases and socioeconomic drivers of health. Even though each agenda has limitations and unique challenges, they are complementary. We discuss ways to understand and implement the two agendas synergistically to hasten progress toward a more sustainable and resilient world.

  16. The experiences of security industry contractors working in Iraq: an interpretative phenomenological analysis.

    PubMed

    Messenger, Katy; Farquharson, Lorna; Stallworthy, Pippa; Cawkill, Paul; Greenberg, Neil

    2012-07-01

    To explore the occupational experiences of private security contractors working in a war zone and how it impacts on their mental health. Semistructured interviews were conducted with seven contractors employed by a large UK-based private security company. Interpretative phenomenological analysis was used to analyze the interview transcripts. Participants also completed the 12-item General Health Questionnaire and the Posttraumatic Stress Disorder Checklist. Four overarching themes emerged: the appeal of the job; vulnerability; keep going; and seeking help for stress in the workplace. No clinically significant levels of distress were reported. Contractors are frequently exposed to stressors known to increase risk of psychiatric difficulty in military personnel. A number of potential protective factors were identified. Only a minority of participants were open to seeking help for mental health difficulties.

  17. Texture Analysis of Chaotic Coupled Map Lattices Based Image Encryption Algorithm

    NASA Astrophysics Data System (ADS)

    Khan, Majid; Shah, Tariq; Batool, Syeda Iram

    2014-09-01

    As of late, data security is key in different enclosures like web correspondence, media frameworks, therapeutic imaging, telemedicine and military correspondence. In any case, a large portion of them confronted with a few issues, for example, the absence of heartiness and security. In this letter, in the wake of exploring the fundamental purposes of the chaotic trigonometric maps and the coupled map lattices, we have presented the algorithm of chaos-based image encryption based on coupled map lattices. The proposed mechanism diminishes intermittent impact of the ergodic dynamical systems in the chaos-based image encryption. To assess the security of the encoded image of this scheme, the association of two nearby pixels and composition peculiarities were performed. This algorithm tries to minimize the problems arises in image encryption.

  18. Adult Attachment and Transgender Identity in the Italian Context: Clinical Implications and Suggestions for Further Research

    PubMed Central

    Amodeo, Anna Lisa; Vitelli, Roberto; Scandurra, Cristiano; Picariello, Simona; Valerio, Paolo

    2016-01-01

    Introduction Although attachment theory has been recognized as one of the main reference for the study of the general wellbeing, little research has been focused on the attachment styles of transgender people. Attachment styles are deeply influenced by the earliest relationships with caregivers, which, for gender nonconforming children, are often characterized by parental rejection. Consequently, transgender children and adults likely internalize societal stigma, developing internalized transphobia. The current research was aimed to explore the link between adult attachment and internalized transphobia. Method 25 male-to-female (MtF) and 23 female-to-male (FtM) transgender people participated in the survey filling in two self-report questionnaires: the Attachment Style Questionnaire and the Transgender Identity Survey. A cluster analysis, T-Test and multiple regression analysis were conducted to explore the link between attachment styles and internalized transphobia. Results A greater prevalence of secure attachment styles was detected. Participants with secure attachment styles reported higher levels of positive transgender identity than those with insecure attachment styles. Secure attachment styles significantly affect positive transgender identity, while insecure attachment styles influence internalized transphobia. Conclusions A clinical focus on the redefinition of the Internal Working Models of transgender people can inform psychologically-focused interventions, which transgender people can benefit from. PMID:26937224

  19. "I will never be the granny with rosy cheeks": perceptions of aging in precarious and financially secure middle-aged Germans.

    PubMed

    Craciun, Catrinel; Flick, Uwe

    2014-04-01

    Nowadays people are growing old in a context where youth culture is the norm and where self-initiative is required in order to prepare for a good old age. However, planning old age may be more difficult for certain social groups with insecure work and living conditions. Precariousness, defined as bad financial conditions but also as having an insecure, unpredictable existence, has been little studied in the context of aging. This study brings its contribution by exploring how middle-aged adults with different social security backgrounds (insurance versus no insurance) think about aging. Episodic interviews were conducted to explore their concepts of aging, contexts of thinking about aging and perceptions of aging. These were compared between groups who have a secure old age ahead of them (N=10) versus those who have to struggle with an uncertain present and future (N=10). Also, differences between men (N=11) and women (N=9) were addressed. Results of the thematic analysis showed the predominance of fears related to aging as well as an emerging meaninglessness attached to old age. Starting from the different images of aging found in the two studied groups, the need for tailored interventions and policy are discussed. Copyright © 2014 Elsevier Inc. All rights reserved.

  20. Firewall systems: the next generation

    NASA Astrophysics Data System (ADS)

    McGhie, Lynda L.

    1996-01-01

    To be competitive in today's globally connected marketplace, a company must ensure that their internal network security methodologies and supporting policies are current and reflect an overall understanding of today's technology and its resultant threats. Further, an integrated approach to information security should ensure that new ways of sharing information and doing business are accommodated; such as electronic commerce, high speed public broadband network services, and the federally sponsored National Information Infrastructure. There are many challenges, and success is determined by the establishment of a solid and firm baseline security architecture that accommodate today's external connectivity requirements, provides transitional solutions that integrate with evolving and dynamic technologies, and ultimately acknowledges both the strategic and tactical goals of an evolving network security architecture and firewall system. This paper explores the evolution of external network connectivity requirements, the associated challenges and the subsequent development and evolution of firewall security systems. It makes the assumption that a firewall is a set of integrated and interoperable components, coming together to form a `SYSTEM' and must be designed, implement and managed as such. A progressive firewall model will be utilized to illustrates the evolution of firewall systems from earlier models utilizing separate physical networks, to today's multi-component firewall systems enabling secure heterogeneous and multi-protocol interfaces.

  1. A review of attachment theory in the context of adolescent parenting.

    PubMed

    Flaherty, Serena Cherry; Sadler, Lois S

    2011-01-01

    The purpose of this article is to review attachment theory and relate the attachment perspective to adolescent mothers and their children. Attachment theory explains positive maternal-infant attachment as a dyadic relationship between the infant and mother that provides the infant with a secure base from which to explore the world. With respect to cognitive, social, and behavioral domains, securely attached infants tend to have more favorable long-term outcomes, while insecurely attached infants are more likely to have adverse outcomes. Adolescent parenthood can disrupt normal adolescent development, and this disruption influences development of the emotional and cognitive capacities necessary for maternal behaviors that foster secure attachment. However, it appears that if specialized supports are in place to facilitate the process of developing attachment, infants of adolescent mothers can obtain higher rates of secure attachment than normative samples in this population. Copyright © 2011 National Association of Pediatric Nurse Practitioners. Published by Mosby, Inc. All rights reserved.

  2. Using Instant Messaging Systems as a Platform for Electronic Voting

    NASA Astrophysics Data System (ADS)

    Meletiadou, Anastasia; Grimm, Rüdiger

    Many Instant Messaging (IM) systems like Skype or Spark offer ex tended services such as file sharing, VoIP, or a shared whiteboard. As the name suggests, IM applications are predominantly used for spontaneous text-based communication for private or business purposes. In this paper we explore their potential to serve as platforms for secure collaborative applications like electronic contract negotiation, e-payment or electronic voting. Such applications have to deal with challenges like time constraints (“instant” com munication is desired), integration of media channels and the absence of one uni fying “sphere of control” covering all participants. In this paper, we address these challenges by discussing one particular secure collaborative application: secure decision processes for small groups. We provide the following contribu tions: (1) we define three varying scenarios and corresponding security require ments (2) we present an IM-based architecture implementing these scenarios, in cluding a Video-based authentication mechanism, and (3) we discuss poten tial attack patterns.

  3. Social security status and mortality in Belgian and Spanish male workers.

    PubMed

    Duran, Xavier; Vanroelen, Christophe; Deboosere, Patrick; Benavides, Fernando G

    2016-01-01

    To assess differences in mortality rates between social security statuses in two independent samples of Belgian and Spanish male workers. Study of two retrospective cohorts (Belgium, n=23,607; Spain, n=44,385) of 50-60 year old male employees with 4 years of follow-up. Mortality rate ratios (MRR) were estimated using Poisson regression models. Mortality for subjects with permanent disability was higher than for the employed, for both Belgium [MRR=4.56 (95% CI: 2.88-7.21)] and Spain [MRR=7.15 (95% CI: 5.37-9.51)]. For the unemployed/early retirees, mortality was higher in Spain [MRR=1.64 (95% CI: 1.24-2.17)] than in Belgium [MRR=0.88 (95% CI: 0.46-1.71)]. MRR differences between Belgium and Spain for unemployed workers could be partly explained because of differences between the two social security systems. Future studies should further explore mortality differences between countries with different social security systems. Copyright © 2016 SESPAS. Published by Elsevier Espana. All rights reserved.

  4. Smart Secure Homes: A Survey of Smart Home Technologies that Sense, Assess, and Respond to Security Threats.

    PubMed

    Dahmen, Jessamyn; Cook, Diane J; Wang, Xiaobo; Honglei, Wang

    2017-08-01

    Smart home design has undergone a metamorphosis in recent years. The field has evolved from designing theoretical smart home frameworks and performing scripted tasks in laboratories. Instead, we now find robust smart home technologies that are commonly used by large segments of the population in a variety of settings. Recent smart home applications are focused on activity recognition, health monitoring, and automation. In this paper, we take a look at another important role for smart homes: security. We first explore the numerous ways smart homes can and do provide protection for their residents. Next, we provide a comparative analysis of the alternative tools and research that has been developed for this purpose. We investigate not only existing commercial products that have been introduced but also discuss the numerous research that has been focused on detecting and identifying potential threats. Finally, we close with open challenges and ideas for future research that will keep individuals secure and healthy while in their own homes.

  5. Unresolved trauma in mothers: intergenerational effects and the role of reorganization

    PubMed Central

    Iyengar, Udita; Kim, Sohye; Martinez, Sheila; Fonagy, Peter; Strathearn, Lane

    2014-01-01

    A mother's unresolved trauma may interfere with her ability to sensitively respond to her infant, thus affecting the development of attachment in her own child, and potentially contributing to the intergenerational transmission of trauma. One novel construct within the Dynamic Maturational Model of Attachment and Adaptation (DMM) coding of the Adult Attachment Interview (AAI) is “reorganization,” a process whereby speakers are actively changing their understanding of past and present experiences and moving toward attachment security. We conducted a study of mothers with unresolved trauma, exploring their own attachment classification, attachment outcomes of their children, and the potential effects of reorganization on child attachment. Forty-seven first-time mothers participated in the AAI during pregnancy, and returned with their child at 11 months to assess child attachment using the Strange Situation Procedure. Mothers with and without unresolved trauma were compared. We found that mothers with unresolved trauma had insecure attachment themselves and were more likely to have infants with insecure attachment. However, the one exception was that all of the mothers with unresolved trauma who were reorganizing toward secure attachment had infants with secure attachment. These preliminary findings suggest that mothers who are reorganizing may be able to more sensitively respond to their child's cues, contributing to the development of secure attachment. While our results need to be replicated in a larger cohort, this study is the first to explore the construct of reorganization and its potential relationship with child attachment. If confirmed in future studies, it may provide clinical insight into the intergenerational transmission of insecure attachment within the context of unresolved trauma. PMID:25225490

  6. The pervasive triad of food security, gender inequity and women's health: exploratory research from sub-Saharan Africa.

    PubMed

    Hyder, Adnan A; Maman, Suzanne; Nyoni, Joyce E; Khasiani, Shaniysa A; Teoh, Noreen; Premji, Zul; Sohani, Salim

    2005-12-01

    This study was designed to explore the interactions between food securing activities, health and gender equity from the perspective of rural east African women. The specific objectives were to document the critical interaction among these three issues-food security, gender inequity, women's health within the context of sub-Saharan Africa; to describe the nature of this triad from the perspective of women farmers in Africa; and to propose a framework for linking available interventions to the vicious nature of this triad. In-depth interviews and focus group discussions were conducted with rural women farmers in Kwale District, Kenya and Bagamoyo District, Tanzania. A total of 12 in-depth interviews and 4 focus group discussions have been included in this analysis. Transcribed text from interviews and focus group discussions were coded and thematic conceptual matrices were developed to compare dimensions of common themes across interviews and settings. A thematic analysis was then performed and a framework developed to understand the nature of the triad and explore the potential for interventions within the interactions. The vicious cycle of increasing work, lack of time, and lack of independent decision making for women who are responsible for food production and health of their families, has health and social consequences. Food securing activities have negative health consequences for women, which are further augmented by issues of gender inequity. The African development community must respond by thinking of creative solutions and appropriate interventions for the empowerment of women farmers in the region to ensure their health.

  7. Exploring transportation, employment, housing, and location issues for New Jersey veterans with disability.

    DOT National Transportation Integrated Search

    2014-11-01

    Working-age veterans with disability face myriad responsibilities when they seek to rejoin civilian life. They must secure housing : and employment while coping with health care concerns and one or more disabilities. Access to transportation part...

  8. Exploring Resource Security Policy and Green Science and Technology in Asia

    DTIC Science & Technology

    2014-04-01

    consumption patterns, diets and resource use of its population that will only increase 1...Indonesia, Vietnam, Thailand and Malaysia - have started to put, if not ramped up existing, green policies in place. 9 In India, the government’s

  9. HBCU/MI: 3D Formable RF Materials and Devices

    DTIC Science & Technology

    2016-08-01

    SECURITY CLASSIFICATION OF: The aim of this project was to explore 3D printing for RF/microwave circuits and devices. The research produced several... 3D printed microwave filters, a 3D wifi radio circuit, and new materials for 3D printed electromagnetic devices. The research demonstrates that 3D ...journals: Final Report: HBCU/MI: 3D Formable RF Materials and Devices Report Title The aim of this project was to explore 3D printing for RF/microwave

  10. Iraq: Oil and Gas Legislation, Revenue Sharing, and U.S. Policy

    DTIC Science & Technology

    2009-07-17

    Measuring Stability and Security in Iraq - June 2007, pp. 9, 11-12. 23 Some of the presumptive contracts for oil exploration in Iraq, signed with the...production,” Annex 3 listed 27 fields not near production and open to international oil companies or the INOC , and Annex 4 delineated 65 exploration...legislative package are proposed laws that will reorganize Iraq’s Ministry of Oil and establish an Iraqi National Oil Company ( INOC ). Under the hydrocarbon

  11. Relevance of Clean Coal Technology for India’s Energy Security: A Policy Perspective

    NASA Astrophysics Data System (ADS)

    Garg, Amit; Tiwari, Vineet; Vishwanathan, Saritha

    2017-07-01

    Climate change mitigation regimes are expected to impose constraints on the future use of fossil fuels in order to reduce greenhouse gas (GHG) emissions. In 2015, 41% of total final energy consumption and 64% of power generation in India came from coal. Although almost a sixth of the total coal based thermal power generation is now super critical pulverized coal technology, the average CO2 emissions from the Indian power sector are 0.82 kg-CO2/kWh, mainly driven by coal. India has large domestic coal reserves which give it adequate energy security. There is a need to find options that allow the continued use of coal while considering the need for GHG mitigation. This paper explores options of linking GHG emission mitigation and energy security from 2000 to 2050 using the AIM/Enduse model under Business-as-Usual scenario. Our simulation analysis suggests that advanced clean coal technologies options could provide promising solutions for reducing CO2 emissions by improving energy efficiencies. This paper concludes that integrating climate change security and energy security for India is possible with a large scale deployment of advanced coal combustion technologies in Indian energy systems along with other measures.

  12. Advanced verification methods for OVI security ink

    NASA Astrophysics Data System (ADS)

    Coombs, Paul G.; McCaffery, Shaun F.; Markantes, Tom

    2006-02-01

    OVI security ink +, incorporating OVP security pigment* microflakes, enjoys a history of effective document protection. This security feature provides not only first-line recognition by the person on the street, but also facilitates machine-readability. This paper explores the evolution of OVI reader technology from proof-of-concept to miniaturization. Three different instruments have been built to advance the technology of OVI machine verification. A bench-top unit has been constructed which allows users to automatically verify a multitude of different banknotes and OVI images. In addition, high speed modules were fabricated and tested in a state of the art banknote sorting machine. Both units demonstrate the ability of modern optical components to illuminate and collect light reflected from the interference platelets within OVI ink. Electronic hardware and software convert and process the optical information in milliseconds to accurately determine the authenticity of the security feature. Most recently, OVI ink verification hardware has been miniaturized and simplified providing yet another platform for counterfeit protection. These latest devices provide a tool for store clerks and bank tellers to unambiguously determine the validity of banknotes in the time period it takes the cash drawer to be opened.

  13. Systematic implementation of spectral CT with a photon counting detector for liquid security inspection

    NASA Astrophysics Data System (ADS)

    Xu, Xiaofei; Xing, Yuxiang; Wang, Sen; Zhang, Li

    2018-06-01

    X-ray liquid security inspection system plays an important role in homeland security, while the conventional dual-energy CT (DECT) system may have a big deviation in extracting the atomic number and the electron density of materials in various conditions. Photon counting detectors (PCDs) have the capability of discriminating the incident photons of different energy. The technique becomes more and more mature in nowadays. In this work, we explore the performance of a multi-energy CT imaging system with a PCD for liquid security inspection in material discrimination. We used a maximum-likelihood (ML) decomposition method with scatter correction based on a cross-energy response model (CERM) for PCDs so that to improve the accuracy of atomic number and electronic density imaging. Experimental study was carried to examine the effectiveness and robustness of the proposed system. Our results show that the concentration of different solutions in physical phantoms can be reconstructed accurately, which could improve the material identification compared to current available dual-energy liquid security inspection systems. The CERM-base decomposition and reconstruction method can be easily used to different applications such as medical diagnosis.

  14. Perceived Safety at Work in the Wake of Terror: The Importance of Security Measures and Emergency Preparedness.

    PubMed

    Nissen, Alexander; Heir, Trond

    2016-12-01

    We aimed to explore how perceived safety after terrorism is connected to views on security measures and emergency preparedness in a workplace setting. Using a questionnaire-based, cross-sectional study of ministerial employees in Norway who were targeted in a terrorist attack in 2011 (n=3344), we investigated how employees' perceived safety at work 9 to 10 months after the attack was associated with their perceptions of whether security measures were sufficiently prioritized at work, whether there had been sufficient escape and evacuation training, and whether they were confident with evacuation procedures. We found strong evidence of increasing perceived safety at work the more employees believed security measures were sufficiently prioritized at work (partially confounded by post-traumatic stress disorder), and the better their knowledge of evacuation procedures (modified by gender and education). The present study suggests that employers may enhance perceived safety at work for terror-exposed employees by showing a commitment to security measures and by ensuring employees know evacuation procedures well. More research is needed to investigate causality patterns behind the associations found in this cross-sectional study. (Disaster Med Public Health Preparedness. 2016;10:805-811).

  15. Information Uncertainty to Compare Qualitative Reasoning Security Risk Assessment Results

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chavez, Gregory M; Key, Brian P; Zerkle, David K

    2009-01-01

    The security risk associated with malevolent acts such as those of terrorism are often void of the historical data required for a traditional PRA. Most information available to conduct security risk assessments for these malevolent acts is obtained from subject matter experts as subjective judgements. Qualitative reasoning approaches such as approximate reasoning and evidential reasoning are useful for modeling the predicted risk from information provided by subject matter experts. Absent from these approaches is a consistent means to compare the security risk assessment results. Associated with each predicted risk reasoning result is a quantifiable amount of information uncertainty which canmore » be measured and used to compare the results. This paper explores using entropy measures to quantify the information uncertainty associated with conflict and non-specificity in the predicted reasoning results. The measured quantities of conflict and non-specificity can ultimately be used to compare qualitative reasoning results which are important in triage studies and ultimately resource allocation. Straight forward extensions of previous entropy measures are presented here to quantify the non-specificity and conflict associated with security risk assessment results obtained from qualitative reasoning models.« less

  16. Compassionate Parenting.

    ERIC Educational Resources Information Center

    Stosny, Steven

    Noting that parents' response to their children is essentially emotional and keyed almost exclusively to inferences about their children's emotions, this program for parents teaches compassionate parenting, an approach that provides a secure emotional base from which children explore and interact with their environment as parents develop the…

  17. Paradigm Paralysis and the Plight of the PC in Education.

    ERIC Educational Resources Information Center

    O'Neil, Mick

    1998-01-01

    Examines the varied factors involved in providing Internet access in K-12 education, including expense, computer installation and maintenance, and security, and explores how the network computer could be useful in this context. Operating systems and servers are discussed. (MSE)

  18. Driving Force.

    ERIC Educational Resources Information Center

    Rich, Richard A.

    1998-01-01

    Discusses campus parking assessment and planning to meet the increasing demands of colleges and universities while controlling costs and reducing student and staff discontent. Explores advice for expanding parking-lot space and maintaining security. Provides a chart that shows general parking requirements for various groups based on students…

  19. 14 CFR § 1203.1001 - Membership.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 5 2014-01-01 2014-01-01 false Membership. § 1203.1001 Section § 1203.1001 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM...) Science Missions Directorate. (3) Human Explorations and Operations. (4) International and Interagency...

  20. Homeland Security and Information Control: A Model of Asymmetric Information Flows.

    ERIC Educational Resources Information Center

    Maxwell, Terrence A.

    2003-01-01

    Summarizes some of the activities the United States government has undertaken to control the dissemination of information since 2001. It also explores, through a conceptual model of information flows, potential impacts and discontinuities between policy purposes and outcomes. (AEF)

  1. Measuring Global Water Security Towards Sustainable Development Goals

    NASA Technical Reports Server (NTRS)

    Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide

    2016-01-01

    Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.

  2. Can GPs working in secure environments in England re-license using the Royal College of General Practitioners revalidation proposals?

    PubMed Central

    2012-01-01

    Background Revalidation for UK doctors is expected to be introduced from late 2012. For general practitioners (GPs), this entails collecting supporting information to be submitted and assessed in a revalidation portfolio every five years. The aim of this study was to explore the feasibility of GPs working in secure environments to collect supporting information for the Royal College of General Practitioners’ (RCGP) proposed revalidation portfolio. Methods We invited GPs working in secure environments in England to submit items of supporting information collected during the previous 12 months using criteria and standards required for the proposed RCGP revalidation portfolio and complete a GP issues log. Initial focus groups and initial and follow-up semi-structured face-to-face and telephone interviews were held to explore GPs’ views of this process. Quantitative and qualitative data were analysed using descriptive statistics and identifying themes respectively. Results Of the 50 GPs who consented to participate in the study, 20 submitted a portfolio. Thirty-eight GPs participated in an initial interview, nine took part in a follow-up interview and 17 completed a GP issues log. GPs reported difficulty in collecting supporting information for valid patient feedback, full-cycle clinical audits and evidence for their extended practice role(s) as sessional practitioners in the high population turnover custodial environment. Peripatetic practitioners experienced more difficulty than their institution based counterparts collating this evidence. Conclusions GPs working in secure environments may experience difficulties in collecting the newer types of supporting information for the proposed RCGP revalidation portfolio primarily due to their employment status within a non-medical environment and characteristics of the detainee population. Increased support from secure environment service commissioners and employers will be a prerequisite for these practitioners to enable them to re-license using the RCGP revalidation proposals. PMID:23253694

  3. Redefining the U.S. Agenda for Nuclear Disarmament, Analysis and Reflections

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dunn, Lewis A.

    With Lewis Dunn’s paper on nuclear disarmament diplomacy, we are inaugurating a new monograph series under the auspices of the Center for Global Security Research at Lawrence Livermore National Laboratory. The series will explore complex emerging challenges in the emerging security environment as they bear on issues of deterrence, assurance, and strategic stability. Our goal is to explore these issues deeply enough to provide significant new understanding that is technically informed and policy relevant. Our premise is that thoughtful students of international security affairs continue to value such in-depth analysis as a way to help make sense of the largemore » flow of data and opinion that reaches all of us on a daily basis. Our ambition is to generate four to six such papers per year on especially salient topics. The views expressed in these papers are those of the author and should not be attributed to the Center, the Laboratory, or the U.S. government. This inaugural paper addresses one of the key questions facing national leadership seven to eight years after President Obama’s April 2009 remarks in Prague and his commitment to take practical steps towards the long-term goal of the elimination of nuclear weapons. In the interim, some important steps have been taken. But there have also been many disappointments. The new presidential administration will face a security landscape quite different from that of eight years ago and must reassess U.S. priorities and approaches. As Lewis Dunn argues, some will be tempted to walk away entirely from the disarmament agenda, while others will advocate even more forcefully for unilateral U.S. steps to further reduce the role and number of nuclear weapons in its posture. Dr. Dunn sets out his own vision of how to adapt and carry forward the disarmament agenda, in a manner informed by developments in the security environment that point to a continuing role for nuclear deterrence. The result is both fresh and compelling.« less

  4. What is a 'secure base' when death is approaching? A study applying attachment theory to adult patients' and family members' experiences of palliative home care.

    PubMed

    Milberg, A; Wåhlberg, R; Jakobsson, M; Olsson, E-C; Olsson, M; Friedrichsen, M

    2012-08-01

    Attachment theory has received much interest lately in relation to how adults cope with stress and severe illness. The aim of this study was using the experiences of patients and family members to explore palliative home care as a 'secure base' (a central concept within the theory). Twelve patients and 14 family members were interviewed during ongoing palliative home care. The interviews were analysed with deductive qualitative content analysis. Informants expressed the relevance of sensing security during palliative home care because death and dying were threats that contributed to vulnerability. Palliative home care could foster a feeling of security and provide a secure base. This was facilitated when informants had trust in staff (e.g. due to availability and competence in providing symptom relief), felt recognised as individuals and welcomed to contact the team in times of needs. Being comfortable, informed and having an everyday life also contributed to a perception of palliative home care as a secure base. Family members stressed the importance of being relieved from responsibilities that were too heavy. The underlying meanings of experiencing palliative home care as a secure base involved gaining a sense of control and of inner peace, perceiving that despite a demanding and changed life situation, one could continue partially being oneself and having something to hope for, even if this no longer concerned cure for the ill person. Important aspects of palliative home care as providing a secure base were identified and these have implications for clinical practice. Copyright © 2011 John Wiley & Sons, Ltd.

  5. Priming the Secure Attachment Schema Affects the Emotional Face Processing Bias in Attachment Anxiety: An fMRI Research

    PubMed Central

    Tang, Qingting; Chen, Xu; Hu, Jia; Liu, Ying

    2017-01-01

    Our study explored how priming with a secure base schema affects the processing of emotional facial stimuli in individuals with attachment anxiety. We enrolled 42 undergraduate students between 18 and 27 years of age, and divided them into two groups: attachment anxiety and attachment secure. All participants were primed under two conditions, the secure priming using references to the partner, and neutral priming using neutral references. We performed repeated attachment security priming combined with a dual-task paradigm and functional magnetic resonance imaging. Participants’ reaction times in terms of responding to the facial stimuli were also measured. Attachment security priming can facilitate an individual’s processing of positive emotional faces; for instance, the presentation of the partner’s name was associated with stronger activities in a wide range of brain regions and faster reaction times for positive facial expressions in the subjects. The current finding of higher activity in the left-hemisphere regions for secure priming rather than neutral priming is consistent with the prediction that attachment security priming triggers the spread of the activation of a positive emotional state. However, the difference in brain activity during processing of both, positive and negative emotional facial stimuli between the two priming conditions appeared in the attachment anxiety group alone. This study indicates that the effect of attachment secure priming on the processing of emotional facial stimuli could be mediated by chronic attachment anxiety. In addition, it highlights the association between higher-order processes of the attachment system (secure attachment schema priming) and early-stage information processing system (attention), given the increased attention toward the effects of secure base schema on the processing of emotion- and attachment-related information among the insecure population. Thus, the following study has applications in providing directions for clinical treatment of mood disorders in attachment anxiety. PMID:28473796

  6. [General practitioners' commitment to treating excessive alcohol consumption: A question of role security in treating affected patients?].

    PubMed

    Fankhänel, Thomas; Rascher, Anja; Thiel, Carolin; Schulz, Katrin; Klement, Andreas

    2016-01-01

    Only a few general practitioners (GPs) are committed to screen their patients for alcohol consumption and, in case of excessive alcohol consumption conduct by a brief intervention according to WHO recommendations. Apart from inadequate compensation and work load, another barrier identified by the GPs was their uncertainty about how to deal with affected patients. Most German universities presently spend no more than 90minutes lecture time on addiction medicine teaching. Our research aims to investigate the question whether medical studies and advanced medical education increases the role security of medical students and physicians and their commitment to implementing alcohol screening and brief intervention. Moreover, we will explore whether lack of therapeutic commitment can be related to lack of role security. Questionnaires were administered to pre-clinical and clinical medical students as well as senior house officers. Role security and therapeutic commitment of students and senior house officers were assessed using the Alcohol and Alcohol Problems Questionnaire (SAAPPQ) subscales "Role Security" and "Therapeutic Commitment". Analysis was based on 367 questionnaires. As expected, senior house officers reported more Role Security than clinical medical students who showed a higher level of Role Security than pre-clinical medical students. No differences could be found for Therapeutic Commitment. An association between Role Security and Therapeutic Commitment was only revealed for clinical medical students. Medical studies and advanced medical education can increase students' and senior house officers' Role Security to treat patients with excessive alcohol consumption, but not Therapeutic Commitment. Moreover, no association between Role Security and Therapeutic Commitment could be found for senior house officers. Hence, it may be assumed that educational activities aiming to increase Role Security do not promote the development of motivational aspects such as Therapeutic Commitment to the management of patients with excessive alcohol intake. Copyright © 2016. Published by Elsevier GmbH.

  7. Priming the Secure Attachment Schema Affects the Emotional Face Processing Bias in Attachment Anxiety: An fMRI Research.

    PubMed

    Tang, Qingting; Chen, Xu; Hu, Jia; Liu, Ying

    2017-01-01

    Our study explored how priming with a secure base schema affects the processing of emotional facial stimuli in individuals with attachment anxiety. We enrolled 42 undergraduate students between 18 and 27 years of age, and divided them into two groups: attachment anxiety and attachment secure. All participants were primed under two conditions, the secure priming using references to the partner, and neutral priming using neutral references. We performed repeated attachment security priming combined with a dual-task paradigm and functional magnetic resonance imaging. Participants' reaction times in terms of responding to the facial stimuli were also measured. Attachment security priming can facilitate an individual's processing of positive emotional faces; for instance, the presentation of the partner's name was associated with stronger activities in a wide range of brain regions and faster reaction times for positive facial expressions in the subjects. The current finding of higher activity in the left-hemisphere regions for secure priming rather than neutral priming is consistent with the prediction that attachment security priming triggers the spread of the activation of a positive emotional state. However, the difference in brain activity during processing of both, positive and negative emotional facial stimuli between the two priming conditions appeared in the attachment anxiety group alone. This study indicates that the effect of attachment secure priming on the processing of emotional facial stimuli could be mediated by chronic attachment anxiety. In addition, it highlights the association between higher-order processes of the attachment system (secure attachment schema priming) and early-stage information processing system (attention), given the increased attention toward the effects of secure base schema on the processing of emotion- and attachment-related information among the insecure population. Thus, the following study has applications in providing directions for clinical treatment of mood disorders in attachment anxiety.

  8. The Department of Defense and Homeland Security relationship: Hurricane Katrina through Hurricane Irene.

    PubMed

    Weaver, John Michael

    2015-01-01

    This research explored federal intervention with the particular emphasis on examining how a collaborative relationship between Department of Defense (DOD) and Homeland Security (DHS) led to greater effectiveness between these two federal departments and their subordinates (United States Northern Command and Federal Emergency Management Agency, respectively) during the preparation and response phases of the disaster cycle regarding US continental-based hurricanes. Through the application of a two-phased, sequential mixed methods approach, this study determined how their relationship has led to longitudinal improvements in the years following Hurricane Katrina, focusing on hurricanes as the primary unit of analysis.

  9. Exploring machine-learning-based control plane intrusion detection techniques in software defined optical networks

    NASA Astrophysics Data System (ADS)

    Zhang, Huibin; Wang, Yuqiao; Chen, Haoran; Zhao, Yongli; Zhang, Jie

    2017-12-01

    In software defined optical networks (SDON), the centralized control plane may encounter numerous intrusion threatens which compromise the security level of provisioned services. In this paper, the issue of control plane security is studied and two machine-learning-based control plane intrusion detection techniques are proposed for SDON with properly selected features such as bandwidth, route length, etc. We validate the feasibility and efficiency of the proposed techniques by simulations. Results show an accuracy of 83% for intrusion detection can be achieved with the proposed machine-learning-based control plane intrusion detection techniques.

  10. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    PubMed

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  11. Quantum key distribution protocol based on contextuality monogamy

    NASA Astrophysics Data System (ADS)

    Singh, Jaskaran; Bharti, Kishor; Arvind

    2017-06-01

    The security of quantum key distribution (QKD) protocols hinges upon features of physical systems that are uniquely quantum in nature. We explore the role of quantumness, as qualified by quantum contextuality, in a QKD scheme. A QKD protocol based on the Klyachko-Can-Binicioğlu-Shumovsky (KCBS) contextuality scenario using a three-level quantum system is presented. We explicitly show the unconditional security of the protocol by a generalized contextuality monogamy relationship based on the no-disturbance principle. This protocol provides a new framework for QKD which has conceptual and practical advantages over other protocols.

  12. Visualizing Alternative Phosphorus Scenarios for Future Food Security

    PubMed Central

    Neset, Tina-Simone; Cordell, Dana; Mohr, Steve; VanRiper, Froggi; White, Stuart

    2016-01-01

    The impact of global phosphorus scarcity on food security has increasingly been the focus of scientific studies over the past decade. However, systematic analyses of alternative futures for phosphorus supply and demand throughout the food system are still rare and provide limited inclusion of key stakeholders. Addressing global phosphorus scarcity requires an integrated approach exploring potential demand reduction as well as recycling opportunities. This implies recovering phosphorus from multiple sources, such as food waste, manure, and excreta, as well as exploring novel opportunities to reduce the long-term demand for phosphorus in food production such as changing diets. Presently, there is a lack of stakeholder and scientific consensus around priority measures. To therefore enable exploration of multiple pathways and facilitate a stakeholder dialog on the technical, behavioral, and institutional changes required to meet long-term future phosphorus demand, this paper introduces an interactive web-based tool, designed for visualizing global phosphorus scenarios in real time. The interactive global phosphorus scenario tool builds on several demand and supply side measures that can be selected and manipulated interactively by the user. It provides a platform to facilitate stakeholder dialog to plan for a soft landing and identify a suite of concrete priority options, such as investing in agricultural phosphorus use efficiency, or renewable fertilizers derived from phosphorus recovered from wastewater and food waste, to determine how phosphorus demand to meet future food security could be attained on a global scale in 2040 and 2070. This paper presents four example scenarios, including (1) the potential of full recovery of human excreta, (2) the challenge of a potential increase in non-food phosphorus demand, (3) the potential of decreased animal product consumption, and (4) the potential decrease in phosphorus demand from increased efficiency and yield gains in crop and livestock systems. PMID:27840814

  13. Visualizing Alternative Phosphorus Scenarios for Future Food Security.

    PubMed

    Neset, Tina-Simone; Cordell, Dana; Mohr, Steve; VanRiper, Froggi; White, Stuart

    2016-01-01

    The impact of global phosphorus scarcity on food security has increasingly been the focus of scientific studies over the past decade. However, systematic analyses of alternative futures for phosphorus supply and demand throughout the food system are still rare and provide limited inclusion of key stakeholders. Addressing global phosphorus scarcity requires an integrated approach exploring potential demand reduction as well as recycling opportunities. This implies recovering phosphorus from multiple sources, such as food waste, manure, and excreta, as well as exploring novel opportunities to reduce the long-term demand for phosphorus in food production such as changing diets. Presently, there is a lack of stakeholder and scientific consensus around priority measures. To therefore enable exploration of multiple pathways and facilitate a stakeholder dialog on the technical, behavioral, and institutional changes required to meet long-term future phosphorus demand, this paper introduces an interactive web-based tool, designed for visualizing global phosphorus scenarios in real time. The interactive global phosphorus scenario tool builds on several demand and supply side measures that can be selected and manipulated interactively by the user. It provides a platform to facilitate stakeholder dialog to plan for a soft landing and identify a suite of concrete priority options, such as investing in agricultural phosphorus use efficiency, or renewable fertilizers derived from phosphorus recovered from wastewater and food waste, to determine how phosphorus demand to meet future food security could be attained on a global scale in 2040 and 2070. This paper presents four example scenarios, including (1) the potential of full recovery of human excreta, (2) the challenge of a potential increase in non-food phosphorus demand, (3) the potential of decreased animal product consumption, and (4) the potential decrease in phosphorus demand from increased efficiency and yield gains in crop and livestock systems.

  14. IS Security in a world of lightpaths

    NASA Astrophysics Data System (ADS)

    Tasker, R.

    Security is a cornerstone for the delivery of consistent and reliable services in every aspect of the business of an organisation. The traditional IP network service provided to Institutes is carefully managed and controlled to limit illegal and/or antisocial use to protect the business processes of that Institute. SuperJANET5 has the capability for additional bandwidth circuits lightpaths - to be provided between specific endpoints across the network to meet specific need. Because these are end-to-end circuits they reach right into the heart of an organisation, typically providing a high bandwidth interconnection, and often at rates that are difficult to police. This paper explores this problem space and provides a strategy to minimise any associated risk through the development of an appropriate Security Policy that can sit alongside an Institute's overall approach in this area. .

  15. Women and firesetting: a qualitative analysis of context, meaning, and development.

    PubMed

    Cunningham, Eimear M; Timms, Jo; Holloway, Gerrie; Radford, Shirley A

    2011-06-01

    To explore subjective experiences of women in secure services of their firesetting behaviour, its personal meaning and the factors that contributed to its development. An interview-based study using Interpretative Phenomenological Analysis. Interviews were carried out with nine women, in medium secure services, with histories of firesetting. Three overarching but interlinked themes emerged, reflecting a narrative progression from the context of life experiences that preceded firesetting (including subthemes: distressing experiences and isolation from support), through the experience and meaning of the firesetting act (influencing others and getting help, achievement and control, and not thought through), to the individual's current position regarding past actions. The clinical implications of the findings are considered in the context of the existing male-orientated firesetting knowledge base and emerging models of service delivery to women in secure settings. ©2010 The British Psychological Society.

  16. Optimal resource allocation for defense of targets based on differing measures of attractiveness.

    PubMed

    Bier, Vicki M; Haphuriwat, Naraphorn; Menoyo, Jaime; Zimmerman, Rae; Culpen, Alison M

    2008-06-01

    This article describes the results of applying a rigorous computational model to the problem of the optimal defensive resource allocation among potential terrorist targets. In particular, our study explores how the optimal budget allocation depends on the cost effectiveness of security investments, the defender's valuations of the various targets, and the extent of the defender's uncertainty about the attacker's target valuations. We use expected property damage, expected fatalities, and two metrics of critical infrastructure (airports and bridges) as our measures of target attractiveness. Our results show that the cost effectiveness of security investment has a large impact on the optimal budget allocation. Also, different measures of target attractiveness yield different optimal budget allocations, emphasizing the importance of developing more realistic terrorist objective functions for use in budget allocation decisions for homeland security.

  17. Global renewable energy-based electricity generation and smart grid system for energy security.

    PubMed

    Islam, M A; Hasanuzzaman, M; Rahim, N A; Nahar, A; Hosenuzzaman, M

    2014-01-01

    Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration.

  18. Failing States as Epidemiologic Risk Zones: Implications for Global Health Security.

    PubMed

    Hirschfeld, Katherine

    Failed states commonly experience health and mortality crises that include outbreaks of infectious disease, violent conflict, reductions in life expectancy, and increased infant and maternal mortality. This article draws from recent research in political science, security studies, and international relations to explore how the process of state failure generates health declines and outbreaks of infectious disease. The key innovation of this model is a revised definition of "the state" as a geographically dynamic rather than static political space. This makes it easier to understand how phases of territorial contraction, collapse, and regeneration interrupt public health programs, destabilize the natural environment, reduce human security, and increase risks of epidemic infectious disease and other humanitarian crises. Better understanding of these dynamics will help international health agencies predict and prepare for future health and mortality crises created by failing states.

  19. Global Renewable Energy-Based Electricity Generation and Smart Grid System for Energy Security

    PubMed Central

    Islam, M. A.; Hasanuzzaman, M.; Rahim, N. A.; Nahar, A.; Hosenuzzaman, M.

    2014-01-01

    Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration. PMID:25243201

  20. A Geant4 model of backscatter security imaging systems

    NASA Astrophysics Data System (ADS)

    Leboffe, Eric Matthew

    The operating characteristics of x ray security scanner systems that utilize backscatter signal in order to distinguish person borne threats have never been made fully available to the general public. By designing a model using Geant4, studies can be performed which will shed light on systems such as security scanners and allow for analysis of the performance and safety of the system without access to any system data. Despite the fact that the systems are no longer in use at airports in the United States, the ability to design and validate detector models and phenomena is an important capability that can be applied to many current real world applications. The model presented provides estimates for absorbed dose, effective dose and dose depth distribution that are comparable to previously published work and explores imaging capabilities for the system embodiment modeled.

  1. Increased uptake of social security benefits among long-term survivors of cancer in childhood, adolescence and young adulthood: a Norwegian population-based cohort study

    PubMed Central

    Ghaderi, S; Engeland, A; Moster, D; Ruud, E; Syse, A; Wesenberg, F; Bjørge, T

    2013-01-01

    Background: As the number of cancer survivors increases, their health and welfare have come into focus. Thus, long-term medical consequences of cancer at a young age (<25 years), obtained from social security benefit records, were studied. Methods: Standardised incidence ratios (SIRs) of long-term medical consequences for 5-year cancer survivors, born during 1965–1985, were explored by linking population-based registries in Norway. Results: Among the 5-year cancer survivors (4031 individuals), 29.7% received social security benefits. The survivors had an overall 4.4 times (95% confidence interval (95% CI): 4.1–4.6) higher risk of social security benefit uptake than the cancer-free population. Survivors of malignancies of bone and connective tissues (SIR: 10.8; 95% CI: 9.1–12.9), CNS tumours (SIR: 7.7; 95% CI: 6.9–8.6) and malignancies of the haematopoietic system (SIR: 6.1; 95% CI: 5.3–7.0) had the highest risks of social security benefits uptake. The most notified causes of social security benefit uptake were diseases of the nervous system, and injury and poisoning. Conclusion: The uptake of social security benefits among 5-year cancer survivors increased substantially and it may represent a solid outcome measure for the burden of the most severe late effects, especially in countries with comparable social welfare systems. PMID:23481179

  2. Use of concept mapping to explore the influence of food security on food buying practices.

    PubMed

    Walker, Renee E; Kawachi, Ichiro

    2012-05-01

    Paradoxically, individuals with food insecurity have been observed to have higher rates of obesity compared with their counterparts with food security. The factors influencing food purchasing behaviors in households with food security vs food insecurity are poorly understood. Using the mixed methods approach of concept mapping, we examined the perceptions and preferences driving the food purchasing behaviors of households with food security vs food insecurity. Twenty-six men and women with food security and 41 men and women with food insecurity from four neighborhoods in Boston, MA, completed the concept mapping process during 2010. Prevalence of overweight and obesity was greater among participants with food insecurity (80.5%) compared with those with food security (61.5%). Participants identified 163 unique factors that influenced their food purchasing behavior. Using multivariate analyses, these factors were grouped into eight unique concepts or clusters that reflected their perceptions of factors hindering healthy eating. Average cluster ratings were similar between participants with food security and food insecurity, suggesting that similar food purchasing behaviors are employed and are perceived similarly in how they hinder or promote healthy eating. The use of emergency food assistance programs may play a role in minimizing the burden of food insecurity while providing access to foods with varying degrees of nutritional quality that may be associated with increased risk of overweight and obesity observed in individuals and households with food insecurity. Copyright © 2012 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.

  3. The Impact of Visibility on Teamwork, Collaborative Communication, and Security in Emergency Departments: An Exploratory Study.

    PubMed

    Gharaveis, Arsalan; Hamilton, D Kirk; Pati, Debajyoti; Shepley, Mardelle

    2017-01-01

    The aim of this study was to examine the influence of visibility on teamwork, collaborative communication, and security issues in emergency departments (EDs). This research explored whether with high visibility in EDs, teamwork and collaborative communication can be improved while the security issues will be reduced. Visibility has been regarded as a critical design consideration and can be directly and considerably impacted by ED's physical design. Teamwork is one of the major related operational outcomes of visibility and involves nurses, support staff, and physicians. The collaborative communication in an ED is another important factor in the process of care delivery and affects efficiency and safety. Furthermore, security is a behavioral factor in ED designs, which includes all types of safety including staff safety, patient safety, and the safety of visitors and family members. This qualitative study investigated the impact of visibility on teamwork, collaborative communication, and security issues in the ED. One-on-one interviews and on-site observation sessions were conducted in a community hospital. Corresponding data analysis was implemented by using computer plan analysis, observation and interview content, and theme analyses. The findings of this exploratory study provided a framework to identify visibility as an influential factor in ED design. High levels of visibility impact productivity and efficiency of teamwork and communication and improve the chance of lowering security issues. The findings of this study also contribute to the general body of knowledge about the effect of physical design on teamwork, collaborative communication, and security.

  4. Smart Buildings: An Introduction to the Library of the Future.

    PubMed

    Hoy, Matthew B

    2016-01-01

    Advances in building technologies are combining energy efficiency, networked sensors, and data recording in exciting ways. Modern facilities can adjust lighting, heating, and cooling outputs to maximize efficiency, provide better physical security, improve wayfinding for occupants, and provide detailed reports of building use. This column will briefly explore the idea of "smart buildings," describe some of the technologies that are being developed for these buildings, and explore their implications for libraries. A brief listing of selected smart building technologies is also provided.

  5. Disks for the Laboratory Part II.

    ERIC Educational Resources Information Center

    Dessy, Raymond E., Ed.

    1985-01-01

    Part 1 presents the chemistry, physics, and engineering technology associated with magnetic and optical disks. This part explores the subjects of archiving, security, validation and certification, and protection. Questions and issues are raised in each of the areas that both users and vendors should be aware. (JN)

  6. Science, Technology, and National Security.

    ERIC Educational Resources Information Center

    DeSieno, Robert P.

    1997-01-01

    Describes a course that grafts discussion of scientific ideas onto students' natural enthusiasm for public policy issues. Includes a group of topics that afford substantive discussion of important scientific ideas. Helps students explore vivid connections between scientific knowledge and public policy, including building the atomic bomb and public…

  7. Exploring Service Logic in ESL

    ERIC Educational Resources Information Center

    Walker, John

    2013-01-01

    ESL is both a professional educational service and, particularly in post-compulsory contexts, a commercial activity. The effective management of ESL programs can secure quality outcomes for practitioners and students. Nevertheless, writings on ESL management do not figure prominently in the literature. In particular, the association between…

  8. Using a market basket to explore regional food systems

    USDA-ARS?s Scientific Manuscript database

    Food market baskets are research concepts that consist of representative food items produced and/or consumed in a geographic region. They are frequently used instruments in food environment and cost studies. An interdisciplinary systems project entitled the Enhancing Food Security in the Northeast (...

  9. The Changing Shape of Technology on Campus from Ermergence to Convergence.

    ERIC Educational Resources Information Center

    Cunningham, Kevin; Rainey, Sylvia

    2001-01-01

    Explores the basics in technology convergence in making today's college and university campuses more "intelligent." Two key components required for effective technology convergence are described as are the benefits of convergence on campus safety and security and utility cost management. (GR)

  10. The Subjective Experiences of Firesetting by Men With Mild Intellectual Disabilities Detained in a Secure Hospital.

    PubMed

    Rose, John; Lees-Warley, Gemma; Thrift, Su

    2016-08-01

    This article explores the lived experiences of men with mild intellectual disabilities who have deliberately set a fire and are detained in a secure hospital. Semi-structured interviews were used to explore the subjective experiential claims of seven male firesetters with mild intellectual disabilities residing in a forensic intellectual disability hospital. Interpretative Phenomenological Analysis was used to interpret participants' meaning making of their firesetting. Five super-ordinate themes emerged from the analysis: (a) "the importance of the first fire," (b) "firesetting to escape distress," (c) "firesetting to enable positive emotional experiences," (d) "firesetting to communicate with services," and (e) "Fire Setters Treatment Programme." The analysis provides an understanding of why some firesetting behaviours emerge and highlights factors that contribute to the maintenance and desistence of repeat firesetting acts. The findings are considered in relation to evolving risk assessment measures and risk reduction strategies for facilitating rehabilitation into community settings. © The Author(s) 2015.

  11. KSC-2014-2241

    NASA Image and Video Library

    2014-04-16

    CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels has been secured on a stand at the far end of the facility. Technicians monitor the progress as a crane lifts the second panel to move it to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper

  12. KSC-2014-2245

    NASA Image and Video Library

    2014-04-16

    CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels is secured on a storage stand at the other end of the facility. The second panel is being lifted by crane and technicians are monitoring the progress as it is being moved to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper

  13. KSC-2014-2239

    NASA Image and Video Library

    2014-04-16

    CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels has been secured on a stand at the far end of the facility. Technicians assist as a crane is attached to the second panel for lifting and moving to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper

  14. KSC-2014-2240

    NASA Image and Video Library

    2014-04-16

    CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels has been secured on a stand at the far end of the facility. Technicians assist as a crane is attached to the second panel for lifting and moving to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper

  15. KSC-2014-2238

    NASA Image and Video Library

    2014-04-16

    CAPE CANAVERAL, Fla. - The first set of two Ogive panels for the Orion Launch Abort System was uncrated inside the Launch Abort System Facility, or LASF, at NASA’s Kennedy Space Center in Florida. One of the panels has been secured on a stand at the far end of the facility while technicians prepare to lift the second panel to move it to the storage stand. During processing, the panels will be secured around the Orion crew module and attached to the Launch Abort System. Orion is the exploration spacecraft designed to carry astronauts to destinations not yet explored by humans, including an asteroid and Mars. It will have emergency abort capability, sustain the crew during space travel and provide safe re-entry from deep space return velocities. The first unpiloted test flight of Orion is scheduled to launch in 2014 atop a Delta IV rocket and in 2017 on NASA’s Space Launch System rocket. For more information, visit www.nasa.gov/orion. Photo credit: Dan Casper

  16. Attachment Security in Infancy: A Preliminary Study of Prospective Links to Brain Morphometry in Late Childhood

    PubMed Central

    Leblanc, Élizabel; Dégeilh, Fanny; Daneault, Véronique; Beauchamp, Miriam H.; Bernier, Annie

    2017-01-01

    A large body of longitudinal research provides compelling evidence for the critical role of early attachment relationships in children’s social, emotional, and cognitive development. It is expected that parent–child attachment relationships may also impact children’s brain development, however, studies linking normative caregiving experiences and brain structure are scarce. To our knowledge, no study has yet examined the associations between the quality of parent–infant attachment relationships and brain morphology during childhood. The aim of this preliminary study was to investigate the prospective links between mother–infant attachment security and whole-brain gray matter (GM) volume and thickness in late childhood. Attachment security toward the mother was assessed in 33 children when they were 15 months old. These children were then invited to undergo structural magnetic resonance imaging at 10–11 years of age. Results indicated that children more securely attached to their mother in infancy had larger GM volumes in the superior temporal sulcus and gyrus, temporo-parietal junction, and precentral gyrus in late childhood. No associations between attachment security and cortical thickness were found. If replicated, these results would suggest that a secure attachment relationship and its main features (e.g., adequate dyadic emotion regulation, competent exploration) may influence GM volume in brain regions involved in social, cognitive, and emotional functioning through experience-dependent processes. PMID:29312029

  17. Secure access to patient's health records using SpeechXRays a mutli-channel biometrics platform for user authentication.

    PubMed

    Spanakis, Emmanouil G; Spanakis, Marios; Karantanas, Apostolos; Marias, Kostas

    2016-08-01

    The most commonly used method for user authentication in ICT services or systems is the application of identification tools such as passwords or personal identification numbers (PINs). The rapid development in ICT technology regarding smart devices (laptops, tablets and smartphones) has allowed also the advance of hardware components that capture several biometric traits such as fingerprints and voice. These components are aiming among others to overcome weaknesses and flaws of password usage under the prism of improved user authentication with higher level of security, privacy and usability. To this respect, the potential application of biometrics for secure user authentication regarding access in systems with sensitive data (i.e. patient's data from electronic health records) shows great potentials. SpeechXRays aims to provide a user recognition platform based on biometrics of voice acoustics analysis and audio-visual identity verification. Among others, the platform aims to be applied as an authentication tool for medical personnel in order to gain specific access to patient's electronic health records. In this work a short description of SpeechXrays implementation tool regarding eHealth is provided and analyzed. This study explores security and privacy issues, and offers a comprehensive overview of biometrics technology applications in addressing the e-Health security challenges. We present and describe the necessary requirement for an eHealth platform concerning biometric security.

  18. The Interface of Safety and Security in Transport: A Regional Perspective

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Welch, Tim; Duhamel, David A; Nandakumar, A. N.

    Security of nuclear and other radioactive material in transport continues to be a challenge for States that are working on strengthening their nuclear security regime. One reason for this is that State regulatory agencies and other organizations lack the resources and trained personnel to dedicate to this field. For over 50 years safety has been a major focus in the use, storage and transport of radioactive material. Only recently, since the late 1990s, has dedicated focus been given to the field of security. One way to assist States to advance nuclear security is to reach out to safety workers (regulators,more » inspectors, and safety compliance personnel) and showcase the need to better integrate safety and security practices. A recent IAEA regional workshop in Bangkok, Thailand (June 2015) yielded profound results when subject matter experts lectured on both the safety and the security of radioactive material in transport. These experts presented and discussed experiences and best practices for: 1) developing and implementing safety requirements and security recommendations for radioactive material in transport; 2) national and international cooperation; and 3) preventing shipment delays/denials of radioactive material. The workshop participants, who were predominantly from safety organizations, shared that they received the following from this event: 1. A clear understanding of the objectives of the IAEA safety requirements and security recommendations for radioactive material in transport. 2. A general understanding of and appreciation for the similarities and differences between safety requirements and security recommendations for radioactive material in transport. 3. A greater appreciation of the interface between transport safety and security and potential impacts of this interface on the efforts to strengthen the compliance assurance regime for the safe transport of radioactive material. 4. A general understanding of assessing the transport security scenarios and developing transport security plans. Many participants also reported their appreciation of the workshop exercises that specifically focused on practical aspects of safety and security of transport of radioactive material. These workshop outcomes highlight the important role professionals can offer when they receive additional safety training and education for radioactive material in transport. Moreover, these professionals can help to increase capacity in countries with developing nuclear security regimes. This paper explores workshop outcomes and transportation regulations and guidelines for radioactive material.« less

  19. “Highly processed, highly packaged, very unhealthy. But they are low risk”: exploring intersections between community food security and food safety

    PubMed Central

    Kelsey A., Speed; Samantha B., Meyer; Rhona M., Hanning; Shannon E., Majowicz

    2017-01-01

    Abstract Introduction: Food insecurity and foodborne disease are important issues in Canada, and the public health actions taken to address them can be conceptualized as factors shaping the food environment. Given emerging evidence that these two areas may interrelate, the objective of this study was to explore ways in which community food security efforts and food safety practices (and the population health issues they aim to address) may intersect in British Columbia, Canada, and interpret what this might mean for conceptualizing and attaining healthier food environments. Methods: We conducted 14 key informant interviews with practitioners working in community food security and food safety in British Columbia, and used qualitative descriptive analysis to identify examples of intersections between the sectors. Results: Participants identified four key ways that the two sectors intersect. They identified (1) how their daily practices to promote safe or healthy food could be helped or hindered by the activities of the other sector; (2) that historically disjointed policies that do not consider multiple health outcomes related to food may complicate the interrelationship; (3) that the relationship of these sectors is also affected by the fact that specific types of food products, such as fresh produce, can be considered both risky and beneficial; and (4) that both sectors are working towards the same goal of improved population health, albeit viewing it through slightly different lenses. Conclusion: Food security and food safety connect in several ways, with implications for characterizing and improving Canadian food environments. Collaboration across separated public health areas related to food is needed when designing new programs or policies aimed at changing the way Canadians eat. PMID:29043759

  20. "Highly processed, highly packaged, very unhealthy. But they are low risk": exploring intersections between community food security and food safety.

    PubMed

    Speed, Kelsey A; Meyer, Samantha B; Hanning, Rhona M; Majowicz, Shannon E

    2017-10-01

    Food insecurity and foodborne disease are important issues in Canada, and the public health actions taken to address them can be conceptualized as factors shaping the food environment. Given emerging evidence that these two areas may interrelate, the objective of this study was to explore ways in which community food security efforts and food safety practices (and the population health issues they aim to address) may intersect in British Columbia, Canada, and interpret what this might mean for conceptualizing and attaining healthier food environments. We conducted 14 key informant interviews with practitioners working in community food security and food safety in British Columbia, and used qualitative descriptive analysis to identify examples of intersections between the sectors. Participants identified four key ways that the two sectors intersect. They identified (1) how their daily practices to promote safe or healthy food could be helped or hindered by the activities of the other sector; (2) that historically disjointed policies that do not consider multiple health outcomes related to food may complicate the interrelationship; (3) that the relationship of these sectors is also affected by the fact that specific types of food products, such as fresh produce, can be considered both risky and beneficial; and (4) that both sectors are working towards the same goal of improved population health, albeit viewing it through slightly different lenses. Food security and food safety connect in several ways, with implications for characterizing and improving Canadian food environments. Collaboration across separated public health areas related to food is needed when designing new programs or policies aimed at changing the way Canadians eat.

  1. Overview of Space Transportation and Propulsion at NASA

    NASA Technical Reports Server (NTRS)

    Sackheim, Robert L.

    2003-01-01

    Topics considered include: 1. Scientific discovery: The search for the life beyond Earth. Understanding our Planet. Understanding our Universe. Exploration of the Planets and beyond. 2. The ultimate high ground for national security: Intelligence, communications, rapid response, GPS. 3. Space-based commerce: Communications and Earth observing.

  2. Critical Issues of Web-Enabled Technologies in Modern Organizations.

    ERIC Educational Resources Information Center

    Khosrow-Pour, Mehdi; Herman, Nancy

    2001-01-01

    Discusses results of a Delphi study that explored issues related to the utilization and management of Web-enabled technologies by modern organizations. Topics include bandwidth restrictions; security; data integrity; inadequate search facilities; system incompatibilities; failure to adhere to standards; email; use of metadata; privacy and…

  3. Models for Information Assurance Education and Outreach: Year 3 and Summative Report

    ERIC Educational Resources Information Center

    Wang, Jianjun

    2015-01-01

    Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…

  4. Models for Information Assurance Education and Outreach: A Report on Year 2 Implementation

    ERIC Educational Resources Information Center

    Wang, Jianjun

    2014-01-01

    "Models for Information Assurance Education and Outreach" (MIAEO) is an NSF-funded, three-year project to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP) at California State University, Bakersfield. In addition, the…

  5. 26 CFR 1.46-5 - Qualified progress expenditures.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 26 Internal Revenue 1 2011-04-01 2009-04-01 true Qualified progress expenditures. 1.46-5 Section 1... planning, designing, preparing blueprints, exploring, or securing financing. (ii) The determination of the... construction also does not include research and development activities in a laboratory or experimental setting...

  6. 26 CFR 1.46-5 - Qualified progress expenditures.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 26 Internal Revenue 1 2010-04-01 2010-04-01 true Qualified progress expenditures. 1.46-5 Section 1... planning, designing, preparing blueprints, exploring, or securing financing. (ii) The determination of the... construction also does not include research and development activities in a laboratory or experimental setting...

  7. 26 CFR 1.46-5 - Qualified progress expenditures.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 26 Internal Revenue 1 2014-04-01 2013-04-01 true Qualified progress expenditures. 1.46-5 Section 1... planning, designing, preparing blueprints, exploring, or securing financing. (ii) The determination of the... construction also does not include research and development activities in a laboratory or experimental setting...

  8. Early Attachment Relationships and the Early Childhood Curriculum

    ERIC Educational Resources Information Center

    Cortazar, Alejandra; Herreros, Francisca

    2010-01-01

    This article explores the relationship between attachment theory and the early childhood curriculum. During the first years of life children develop early attachment relationships with their primary caregivers. These attachment relationships, either secure or insecure, will shape children's socio-emotional development. In the USA, the predominant…

  9. Test and Evaluation of Architecture-Aware Compiler Environment

    DTIC Science & Technology

    2011-11-01

    biology, medicine, social sciences , and security applications. Challenges include extremely large graphs (the Facebook friend network has over...Operations with Temporal Binning ....................................................................... 32 4.12 Memory behavior and Energy per...five challenge problems empirically, exploring their scaling properties, computation and datatype needs, memory behavior , and temporal behavior

  10. Peacekeeping. Perspectives in World Order.

    ERIC Educational Resources Information Center

    Fraenkel, Jack R., Ed.; And Others

    This pamphlet, intended for senior high classroom use, defines war, peace, and peacekeeping systems; discusses the destructiveness of war; and proposes the case study method for studying world order. The major portion of the booklet explores ways of peacekeeping through analysis of four different models: collective security, collective force,…

  11. Community Shared Solar: Policy and Regulatory Considerations (Brochure)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Not Available

    2014-09-01

    This brochure explores the ways in which the shared solar business model interacts with existing policy and regulations, including net metering, tax credits, and securities regulation. It presents some of the barriers that shared solar projects may face, and provides options for creating a supportive policy environment.

  12. 43 CFR 3931.20 - Reclamation.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., must be closed to the BLM's satisfaction. For in situ operations, all drilled holes must be plugged and...) The operator or lessee must substantially fill in, fence, protect, or close all surface openings... areas must be maintained in a secure condition during the term of the lease or exploration license...

  13. 43 CFR 3931.20 - Reclamation.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., must be closed to the BLM's satisfaction. For in situ operations, all drilled holes must be plugged and...) The operator or lessee must substantially fill in, fence, protect, or close all surface openings... areas must be maintained in a secure condition during the term of the lease or exploration license...

  14. 43 CFR 3931.20 - Reclamation.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., must be closed to the BLM's satisfaction. For in situ operations, all drilled holes must be plugged and...) The operator or lessee must substantially fill in, fence, protect, or close all surface openings... areas must be maintained in a secure condition during the term of the lease or exploration license...

  15. 43 CFR 3931.20 - Reclamation.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., must be closed to the BLM's satisfaction. For in situ operations, all drilled holes must be plugged and...) The operator or lessee must substantially fill in, fence, protect, or close all surface openings... areas must be maintained in a secure condition during the term of the lease or exploration license...

  16. 78 FR 35808 - Proposed priority-Rehabilitation Training: Rehabilitation Long-Term Training Program-Vocational...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-14

    ..., Labor, and the Social Security Administration. The goal of this conference was to explore several..., research report, 1-15. Proposed Priority The Assistant Secretary for Special Education and Rehabilitative... practicable--the costs of cumulative regulations; (3) In choosing among alternative regulatory approaches...

  17. Undergraduates, Technology, and Social Connections

    ERIC Educational Resources Information Center

    Palmer, Betsy; Boniek, Susan; Turner, Elena; Lovell, Elyse D'nn

    2014-01-01

    The purpose of this study was to examine the spectrum of undergraduate students' social interactions and related technological tools. Qualitative methods were used for this phenomenological study exploring 35 in-person interviews, with horizonalization in an open coding system secured by in-depth analysis which revealed nuanced themes and…

  18. Operation of remote mobile sensors for security of drinking water distribution systems.

    PubMed

    Perelman, By Lina; Ostfeld, Avi

    2013-09-01

    The deployment of fixed online water quality sensors in water distribution systems has been recognized as one of the key components of contamination warning systems for securing public health. This study proposes to explore how the inclusion of mobile sensors for inline monitoring of various water quality parameters (e.g., residual chlorine, pH) can enhance water distribution system security. Mobile sensors equipped with sampling, sensing, data acquisition, wireless transmission and power generation systems are being designed, fabricated, and tested, and prototypes are expected to be released in the very near future. This study initiates the development of a theoretical framework for modeling mobile sensor movement in water distribution systems and integrating the sensory data collected from stationary and non-stationary sensor nodes to increase system security. The methodology is applied and demonstrated on two benchmark networks. Performance of different sensor network designs are compared for fixed and combined fixed and mobile sensor networks. Results indicate that complementing online sensor networks with inline monitoring can increase detection likelihood and decrease mean time to detection. Copyright © 2013 Elsevier Ltd. All rights reserved.

  19. Maternal Religiosity, Family Resources and Stressors, and Parent-Child Attachment Security in Northern Ireland.

    PubMed

    Goeke-Morey, Marcie C; Cairns, Ed; Merrilees, Christine E; Schermerhorn, Alice C; Shirlow, Peter; Cummings, E Mark

    2013-02-01

    This study explores the associations between mothers' religiosity, and families' and children's functioning in a stratified random sample of 695 Catholic and Protestant mother-child dyads in socially deprived areas in Belfast, Northern Ireland, a region which has experienced centuries of sectarian conflict between Protestant Unionists and Catholics Nationalists. Findings based on mother and child surveys indicated that even in this context of historical political violence associated with religious affiliation, mothers' religiosity played a consistently positive role, including associations with multiple indicators of better family functioning (i.e., more cohesion and behavioral control and less conflict, psychological distress, and adjustment problems) and greater parent-child attachment security. Mothers' religiosity also moderated the association between parent-child attachment security and family resources and family stressors, enhancing positive effects of cohesion and mother behavioral control on mother-child attachment security, and providing protection against risks associated with mothers' psychological distress. Findings are discussed in terms of implications for understanding the role of religiosity in serving as a protective or risk factor for children and families.

  20. Implementing HIPAA security in a membership organization.

    PubMed

    Hillabrant, L P; Gaignard, K E

    2000-01-01

    The upcoming HIPAA security regulations are forcing a change in business and operating procedures that many, if not most, healthcare organizations are ill-prepared to tackle. Of all healthcare organizational structures, membership organizations will most likely face the greatest number of obstacles in preparing for and implementing the HIPAA security regulations. This is because the membership organization as a whole must find a way to accommodate the disparate technologies, business and operating methodologies and processes, and available, limited resources of its individual member organizations, and integrate these into a uniform implementation plan. Compounding these obvious difficulties is the unique challenge of enforcement authority. The individual member organizations are autonomous business entities, whereas the membership organization as a whole merely acts as an advisor or consultant, and has only limited enforcement authority over any individual member organization. This article explores this unique situation in depth. We focus on PROMINA Health System, a nonprofit healthcare membership organization that consists of five disparate member healthcare organizations. We examine the challenges PROMINA has encountered in its quest to institute an organization-wide HIPAA security program and its methodology for accomplishing program implementation.

  1. Cyber Safety and Security for Reduced Crew Operations (RCO)

    NASA Technical Reports Server (NTRS)

    Driscoll, Kevin R.; Roy, Aloke; Ponchak, Denise S.; Downey, Alan N.

    2017-01-01

    NASA and the Aviation Industry is looking into reduced crew operations (RCO) that would cut today's required two-person flight crews down to a single pilot with support from ground-based crews. Shared responsibility across air and ground personnel will require highly reliable and secure data communication and supporting automation, which will be safety-critical for passenger and cargo aircraft. This paper looks at the different types and degrees of authority delegation given from the air to the ground and the ramifications of each, including the safety and security hazards introduced, the mitigation mechanisms for these hazards, and other demands on an RCO system architecture which would be highly invasive into (almost) all safety-critical avionics. The adjacent fields of unmanned aerial systems and autonomous ground vehicles are viewed to find problems that RCO may face and related aviation accident scenarios are described. The paper explores possible data communication architectures to meet stringent performance and information security (INFOSEC) requirements of RCO. Subsequently, potential challenges for RCO data communication authentication, encryption and non-repudiation are identified.

  2. Security of social network credentials for accessing course portal: Users' experience

    NASA Astrophysics Data System (ADS)

    Katuk, Norliza; Fong, Choo Sok; Chun, Koo Lee

    2015-12-01

    Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications' database. Although it has been used by many web application providers, its' applicability in accessing learning materials is not yet fully investigated. Hence, this research aims to explore users' (i.e., instructors' and students') perception and experience on the security of SL for accessing learning contents. A course portal was developed for students at a higher learning institution and it provides two types of user authentications (i) traditional user authentication, and (ii) SL facility. Users comprised instructors and students evaluated the login facility of the course portal through a controlled lab experimental study following the within-subject design. The participants provided their feedback in terms of the security of SL for accessing learning contents. The study revealed that users preferred to use SL over the traditional authentication, however, they concerned on the security of SL and their privacy.

  3. Exploration Requirements Development Utilizing the Strategy-to-Task-to-Technology Development Approach

    NASA Technical Reports Server (NTRS)

    Drake, Bret G.; Josten, B. Kent; Monell, Donald W.

    2004-01-01

    The Vision for Space Exploration provides direction for the National Aeronautics and Space Administration to embark on a robust space exploration program that will advance the Nation s scientific, security, and economic interests. This plan calls for a progressive expansion of human capabilities beyond low earth orbit seeking to answer profound scientific and philosophical questions while responding to discoveries along the way. In addition, the Vision articulates the strategy for developing the revolutionary new technologies and capabilities required for the future exploration of the solar system. The National Aeronautics and Space Administration faces new challenges in successfully implementing the Vision. In order to implement a sustained and affordable exploration endeavor it is vital for NASA to do business differently. This paper provides an overview of the strategy-to-task-to-technology process being used by NASA s Exploration Systems Mission Directorate to develop the requirements and system acquisition details necessary for implementing a sustainable exploration vision.

  4. Nutrition-sensitive agriculture and the promotion of food and nutrition sovereignty and security in Brazil.

    PubMed

    Maluf, Renato Sergio; Burlandy, Luciene; Santarelli, Mariana; Schottz, Vanessa; Speranza, Juliana Simões

    2015-08-01

    This paper explores the possibilities of the nutrition-sensitive agriculture approach in the context of the programs and actions towards promoting food and nutrition sovereignty and security in Brazil. To analyze the links between nutrition and agriculture, this paper presents the conceptual framework related to food and nutrition security, and stresses the correlations among concepts, institutional structures and program design in Brazil. Dominant models of food production and consumption are scrutinized in the light of these relationships. This paper also highlights differences amongst different ways to promote nutrition-sensitive agriculture through food-acquisition programs from family farmers, experiences in agro-ecology and bio-fortification programs. In the closing remarks, the paper draws some lessons learned from the Brazilian experience that highlight the advantages of family farming and rapid food production, distribution and consumption cycles in order to promote access to an affordable, diversified and more adequate diet in nutritional terms.

  5. Intentional cargo disruption by nefarious means: Examining threats, systemic vulnerabilities and securitisation measures in complex global supply chains.

    PubMed

    McGreevy, Conor; Harrop, Wayne

    2015-01-01

    Global trade and commerce requires products to be securely contained and transferred in a timely way across great distances and between national boundaries. Throughout the process, cargo and containers are stored, handled and checked by a range of authorities and authorised agents. Intermodal transportation involves the use of container ships, planes, railway systems, land bridges, road networks and barges. This paper examines the the nefarious nature of intentional disruption and nefarious risks associated with the movement of cargo and container freight. The paper explores main threats, vulnerabilities and security measures relevant to significant intermodal transit risk issues such as theft, piracy, terrorism, contamination, counterfeiting and product tampering. Three risk and vulnerability models are examined and basic standards and regulations that are relevant to safe and secure transit of container goods across international supply networks are outlined.

  6. Climate change, resource use and food security in midcentury under a range of plausible scenarios

    NASA Astrophysics Data System (ADS)

    Wiebe, K.

    2016-12-01

    Achieving and maintaining food security at local, national and global scales is challenged by changes in population, income and climate, among other socioeconomic and biophysical drivers. Assessing these challenges and possible solutions over the coming decades requires a systematic and multidisciplinary approach. The Global Futures and Strategic Foresight program, a CGIAR initiative led by the International Food Policy Research Institute in collaboration with the 14 other CGIAR research centers, is working to improve tools and conduct ex ante assessments of promising technologies, investments and policies under alternative global futures to inform decision making in the CGIAR and its partners. Alternative socioeconomic and climate scenarios are explored using an integrated system of climate, water, crop and economic models. This presentation will share findings from recent projections of food production and prices to 2050 at global and regional scales, together with their potential implications for land and water use, food security, nutrition and health.

  7. Information Security Analysis Using Game Theory and Simulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schlicher, Bob G; Abercrombie, Robert K

    Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions aremore » always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.« less

  8. ID201202961, DOE S-124,539, Information Security Analysis Using Game Theory and Simulation

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Schlicher, Bob G

    Information security analysis can be performed using game theory implemented in dynamic simulations of Agent Based Models (ABMs). Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. Our approach addresses imperfect information and scalability that allows us to also address previous limitations of current stochastic game models. Such models only consider perfect information assuming that the defender is always able to detect attacks; assuming that the state transition probabilities are fixed before the game assuming that the players actions aremore » always synchronous; and that most models are not scalable with the size and complexity of systems under consideration. Our use of ABMs yields results of selected experiments that demonstrate our proposed approach and provides a quantitative measure for realistic information systems and their related security scenarios.« less

  9. Security analysis for biometric data in ID documents

    NASA Astrophysics Data System (ADS)

    Schimke, Sascha; Kiltz, Stefan; Vielhauer, Claus; Kalker, Ton

    2005-03-01

    In this paper we analyze chances and challenges with respect to the security of using biometrics in ID documents. We identify goals for ID documents, set by national and international authorities, and discuss the degree of security, which is obtainable with the inclusion of biometric into documents like passports. Starting from classical techniques for manual authentication of ID card holders, we expand our view towards automatic methods based on biometrics. We do so by reviewing different human biometric attributes by modality, as well as by discussing possible techniques for storing and handling the particular biometric data on the document. Further, we explore possible vulnerabilities of potential biometric passport systems. Based on the findings of that discussion we will expand upon two exemplary approaches for including digital biometric data in the context of ID documents and present potential risks attack scenarios along with technical aspects such as capacity and robustness.

  10. Securitization, alterity, and the state Human (in)security on an Amazonian frontier

    PubMed Central

    Brightman, Marc; Grotti, Vanessa

    2016-01-01

    Focusing on the region surrounding the Maroni River, which forms the border between Suriname and French Guiana, we examine how relations between different state and non-state social groups are articulated in terms of security. The region is characterised by multiple “borders” and frontiers of various kinds, the state boundary having the features of an interface or contact zone. Several key collectivities meet in this border zone: native Amazonians, tribal Maroon peoples, migrant Brazilian gold prospectors, and metropolitan French state functionaries. We explore the relationships between these different sets of actors and describe how their mutual encounters center on discourses of human and state security, thus challenging the commonly held view of the region as a stateless zone and showing that the “human security” of citizens from the perspective of the state may compete with locally salient ideas or experiences of well-being. PMID:27996063

  11. Radio frequency identification (RFID) in health care: privacy and security concerns limiting adoption.

    PubMed

    Rosenbaum, Benjamin P

    2014-03-01

    Radio frequency identification (RFID) technology has been implemented in a wide variety of industries. Health care is no exception. This article explores implementations and limitations of RFID in several health care domains: authentication, medication safety, patient tracking, and blood transfusion medicine. Each domain has seen increasing utilization of unique applications of RFID technology. Given the importance of protecting patient and data privacy, potential privacy and security concerns in each domain are discussed. Such concerns, some of which are inherent to existing RFID hardware and software technology, may limit ubiquitous adoption. In addition, an apparent lack of security standards within the RFID domain and specifically health care may also hinder the growth and utility of RFID within health care for the foreseeable future. Safeguarding the privacy of patient data may be the most important obstacle to overcome to allow the health care industry to take advantage of the numerous benefits RFID technology affords.

  12. Security and privacy issues with health care information technology.

    PubMed

    Meingast, Marci; Roosta, Tanya; Sastry, Shankar

    2006-01-01

    The face of health care is changing as new technologies are being incorporated into the existing infrastructure. Electronic patient records and sensor networks for in-home patient monitoring are at the current forefront of new technologies. Paper-based patient records are being put in electronic format enabling patients to access their records via the Internet. Remote patient monitoring is becoming more feasible as specialized sensors can be placed inside homes. The combination of these technologies will improve the quality of health care by making it more personalized and reducing costs and medical errors. While there are benefits to technologies, associated privacy and security issues need to be analyzed to make these systems socially acceptable. In this paper we explore the privacy and security implications of these next-generation health care technologies. We describe existing methods for handling issues as well as discussing which issues need further consideration.

  13. Markets, Climate Change and Food Security in West Africa

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.; Hintermann, Beat; Higgins, Nathaniel

    2009-01-01

    West Africa is one of the most food insecure regions of the world. Sharply increased food and energy prices in 2008 brought the role of markets in food access and availability around the world into the spotlight, particularly in urban areas. The period of high prices had the immediate consequence of sharply increasing the number of hungry people in the region without boosting farmer incomes significantly. In this article, the interaction between markets, food prices, agricultural technology and development is explored in the context of West Africa. To improve food security in West Africa, sustained commitment to investment in the agriculture sector will be needed to provide some protection against global swings in both production and world markets. Climate change mitigation programs are likely to force global energy and commodity price increases in the coming decades, putting pressure on regions like West Africa to produce more food locally to ensure stability in food security for the most vulnerable.

  14. Can Cyberloafing and Internet Addiction Affect Organizational Information Security?

    PubMed

    Hadlington, Lee; Parsons, Kathryn

    2017-09-01

    Researchers have noted potential links between Internet addiction, the use of work computers for nonwork purposes and an increased risk of threat to the organization from breaches in cybersecurity. However, much of this research appears conjectural in nature and lacks clear empirical evidence to support such claims. To fill this knowledge gap, a questionnaire-based study explored the link between cyberloafing, Internet addiction, and information security awareness (ISA). A total of 338 participants completed an online questionnaire, which comprised of the Online Cognition Scale, Cyberloafing Scale, and the Human Aspects of Information Security Questionnaire. Participants who reported higher Internet addiction and cyberloafing tendencies had lower ISA, and Internet addiction and cyberloafing predicted a significant 45 percent of the variance in ISA. Serious cyberloafing, such as the propensity to visit adult websites and online gambling, was shown to be the significant predictor for poorer ISA. Implications for organizations and recommendations to reduce or manage inappropriate Internet use are discussed.

  15. Social capital, social support, and food insecurity in food pantry users.

    PubMed

    Chhabra, Surbhi; Falciglia, Grace A; Lee, Seung-Yeon

    2014-01-01

    The purpose of this study was to examine the relationship between food security, social capital, and social support among urban food pantry users in Cincinnati. In-person interviews with 53 participants were completed using the U.S. Household Food Security Survey Module, Social Capital questionnaire, and Social Support questionnaire. Social capital was assessed through four subscales using a Likert scale, with a response range 1 to 4, and social support was measured by rating significant others' emotional, informational, and instrumental support as well as companionship (ranged from 0 to 4). The findings suggested that there were no significant associations among them. This may be due to a small sample size. Thus, the associations need to be examined with a larger sample. Further, a qualitative approach may be necessary to explore the contextual nature of social capital and social support related to food security.

  16. Mobile health in emerging countries: a survey of research initiatives in Brazil.

    PubMed

    Iwaya, L H; Gomes, M A L; Simplício, M A; Carvalho, T C M B; Dominicini, C K; Sakuragui, R R M; Rebelo, M S; Gutierrez, M A; Näslund, M; Håkansson, P

    2013-05-01

    To conduct a comprehensive survey of mobile health (mHealth) research initiatives in Brazil, discussing current challenges, gaps, opportunities and tendencies. Systematic review of publicly available electronic documents related to mHealth, including scientific publications, technical reports and descriptions of commercial products. Specifically, 42 projects are analyzed and classified according to their goals. This analysis considers aspects such as security features provided (if any), the health condition that are focus of attention, the main providers involved in the projects development and deployment, types of devices used, target users, where the projects are tested and/or deployed, among others. The study shows a large number (86%) of mHealth solutions focused on the following categories: health surveys, surveillance, patient records and monitoring. Meanwhile, treatment compliance, awareness raising and decision support systems are less explored. The main providers of solutions are the universities (56%) and health units (32%), with considerable cooperation between such entities. Most applications have physicians (55%) and Community Health Agents (CHAs) (33%) as targeted users, the latter being important elements in nation-wide governmental health programs. Projects focused on health managers, however, are a minority (5%). The majority of projects do not focus on specific diseases but rather general health (57%), although solutions for hearth conditions are reasonably numerous (21%). Finally, the lack of security mechanisms in the majority of the surveyed solutions (52%) may hinder their deployment in the field due to the lack of compliance with general regulations for medical data handling. There are currently many mHealth initiatives in Brazil, but some areas have not been much explored, such as solutions for treatment compliance and awareness raising, as well as decision support systems. Another research trend worth exploring refers to creating interoperable security mechanisms, especially for widely explored mHealth categories such as health surveys, patient records and monitoring. Challenges for the expansion of mHealth solutions, both in number and coverage, include the further involvement of health managers in the deployment of such solutions and in coordinating efforts among health and research institutions interested in the mHealth trend, possibly exploring the widespread presence of CHAs around the country as users of such technology. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  17. Fostering secure attachment: experiences of animal companions in the foster home.

    PubMed

    Carr, Sam; Rockett, Ben

    2017-06-01

    This study sought to use attachment theory as a lens through which to explore children's relationships with animal companions in the context of long-term foster care. Inductive and deductive thematic analyses of longitudinal case study data from eight children and their foster families suggested (a) that children's relationships with animal companions satisfied attachment-related functions in their own right and (b) that animal companions also helped to soften perceptions of foster caregivers, facilitating opportunities for the development of closeness. Animals in the foster home may therefore play an important part in helping children to find and develop secure, warm, and loving relationships.

  18. Food security: the challenge of feeding 9 billion people.

    PubMed

    Godfray, H Charles J; Beddington, John R; Crute, Ian R; Haddad, Lawrence; Lawrence, David; Muir, James F; Pretty, Jules; Robinson, Sherman; Thomas, Sandy M; Toulmin, Camilla

    2010-02-12

    Continuing population and consumption growth will mean that the global demand for food will increase for at least another 40 years. Growing competition for land, water, and energy, in addition to the overexploitation of fisheries, will affect our ability to produce food, as will the urgent requirement to reduce the impact of the food system on the environment. The effects of climate change are a further threat. But the world can produce more food and can ensure that it is used more efficiently and equitably. A multifaceted and linked global strategy is needed to ensure sustainable and equitable food security, different components of which are explored here.

  19. Orion Stage Adapter (OSA) Offload

    NASA Image and Video Library

    2018-04-04

    NASA Kennedy Space Center security officers prepare to escort the Orion Stage Adapter (OSA), secured on a flatbed transporter, along State Road 3 to the Space Station Processing Facility (SSPF) at NASA's Kennedy Space Center in Florida. The OSA is the second flight-hardware section of the agency's Space Launch System (SLS) rocket to arrive at Kennedy. The OSA will connect the Orion spacecraft to the upper part of the SLS, the interim cryogenic propulsion stage (ICPS). Both the OSA and ICPS are being stored for processing in the SSPF in preparation for Exploration Mission-1, the first uncrewed, integrated launch of the SLS rocket and Orion spacecraft.

  20. Heavy Lift for National Security: The Ares V

    NASA Technical Reports Server (NTRS)

    Sumrall, Phil

    2009-01-01

    The NASA Ares Projects Office is developing the launch vehicles to move the United States and humanity beyond low earth orbit. Ares I is a crewed vehicle, and Ares V is a heavy lift vehicle being designed to launch cargo into LEO and transfer cargo and crews to the Moon. This is a snapshot of development and capabilities. Ares V is early in the requirements formulation stage of development pending the outcome of the Review of U.S. Human Space Flight Plans Committee and White House action. The Ares V vehicle will be considered a national asset, creating unmatched opportunities for human exploration, science, national security, and space business.

  1. Information Assurance and Forensic Readiness

    NASA Astrophysics Data System (ADS)

    Pangalos, Georgios; Katos, Vasilios

    Egalitarianism and justice are amongst the core attributes of a democratic regime and should be also secured in an e-democratic setting. As such, the rise of computer related offenses pose a threat to the fundamental aspects of e-democracy and e-governance. Digital forensics are a key component for protecting and enabling the underlying (e-)democratic values and therefore forensic readiness should be considered in an e-democratic setting. This position paper commences from the observation that the density of compliance and potential litigation activities is monotonically increasing in modern organizations, as rules, legislative regulations and policies are being constantly added to the corporate environment. Forensic practices seem to be departing from the niche of law enforcement and are becoming a business function and infrastructural component, posing new challenges to the security professionals. Having no a priori knowledge on whether a security related event or corporate policy violation will lead to litigation, we advocate that computer forensics need to be applied to all investigatory, monitoring and auditing activities. This would result into an inflation of the responsibilities of the Information Security Officer. After exploring some commonalities and differences between IS audit and computer forensics, we present a list of strategic challenges the organization and, in effect, the IS security and audit practitioner will face.

  2. Food Insecurity and Rural Adolescent Personal Health, Home, and Academic Environments.

    PubMed

    Shanafelt, Amy; Hearst, Mary O; Wang, Qi; Nanney, Marilyn S

    2016-06-01

    Food-insecure (FIS) adolescents struggle in school and with health and mental health more often than food-secure (FS) adolescents. Rural communities experience important disparities in health, but little is known about rural FIS adolescents. This study aims to describe select characteristics of rural adolescents by food-security status. Baseline analysis using data from a randomized trial to increase school breakfast participation (SBP) in rural Minnesota high schools. Students completed a survey regarding food security, characteristics, and home and school environments. Schools provided academic data and staff measured height and weight. Food security was dichotomized as FS vs FIS. Bivariate analysis, multivariate linear/logistic regression, and testing for interaction of food security and sex were performed. Food-insecure adolescents reported poorer health, less exercise, had lower grades, and higher SBP (p < .01). Food-insecure adolescents reported marginally fewer barriers (p = .06) and more benefits of breakfast (p = .05). All associations except reported benefits remained significant after adjustment. Interactions were identified with girls' grade point average and with boys' caloric and added sugar intake. Negative associations among food insecurity and positive youth development are identified in our sample. Policy and environmental strategies should address the complexities of these associations, including exploration of the role of school meals. © 2016, American School Health Association.

  3. The Potential Effects of Obesity on Social Security Claiming Behavior and Retirement Benefits.

    PubMed

    Knoll, Melissa A Z; Shoffner, Dave; O'Leary, Samantha

    2018-04-16

    Obesity prevalence among Americans has increased for nearly three decades. We explore the relationship between the rise in obesity and Social Security retirement benefit claiming, a decision impacting nearly all aging Americans. Specifically, we investigate whether obesity can affect individuals' decision to claim benefits early, a choice that has important implications for financial security in retirement, particularly for those with lower socioeconomic status (SES). We use a microsimulation model called MINT6 (Modeling Income in the Near Term, version 6) to demonstrate the potential effects of obesity on subjective life expectancy and claiming behavior. We impute obesity status using data from the National Health and Nutrition Examination Survey (NHANES), which describes the distribution of obesity prevalence within the United States by gender, poverty status, and race/ethnicity. We find that the rise in obesity and the consequent incidence of obesity-related diseases may lead some individuals to make claiming decisions that lead to lower monthly and lifetime Social Security retirement benefits. Further, we find that the potential economic impact of this decision is larger for those with lower SES. We present a behavioral perspective by addressing the potential effects that obesity can have on individuals' retirement decisions and their resulting Social Security retirement benefits.

  4. On the security of consumer wearable devices in the Internet of Things.

    PubMed

    Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus

    2018-01-01

    Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands.

  5. On the security of consumer wearable devices in the Internet of Things

    PubMed Central

    Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus

    2018-01-01

    Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands. PMID:29668756

  6. Survey of Cyber Crime in Big Data

    NASA Astrophysics Data System (ADS)

    Rajeswari, C.; Soni, Krishna; Tandon, Rajat

    2017-11-01

    Big data is like performing computation operations and database operations for large amounts of data, automatically from the data possessor’s business. Since a critical strategic offer of big data access to information from numerous and various areas, security and protection will assume an imperative part in big data research and innovation. The limits of standard IT security practices are notable, with the goal that they can utilize programming sending to utilize programming designers to incorporate pernicious programming in a genuine and developing risk in applications and working frameworks, which are troublesome. The impact gets speedier than big data. In this way, one central issue is that security and protection innovation are sufficient to share controlled affirmation for countless direct get to. For powerful utilization of extensive information, it should be approved to get to the information of that space or whatever other area from a space. For a long time, dependable framework improvement has arranged a rich arrangement of demonstrated ideas of demonstrated security to bargain to a great extent with the decided adversaries, however this procedure has been to a great extent underestimated as “needless excess” and sellers In this discourse, essential talks will be examined for substantial information to exploit this develop security and protection innovation, while the rest of the exploration difficulties will be investigated.

  7. The neoliberal political economy and erosion of retirement security.

    PubMed

    Polivka, Larry; Luo, Baozhen

    2015-04-01

    The origins and trajectory of the crisis in the United States retirement security system have slowly become part of the discussion about the social, political, and economic impacts of population aging. Private sources of retirement security have weakened significantly since 1980 as employers have converted defined benefits precisions to defined contribution plans. The Center for Retirement Research (CRR) now estimates that over half of boomer generation retirees will not receive 70-80% of their wages while working. This erosion of the private retirement security system will likely increase reliance on the public system, mainly Social Security and Medicare. These programs, however, have increasingly become the targets of critics who claim that they are not financially sustainable in their current form and must be significantly modified. This article will focus on an analysis of these trends in the erosion of the United States retirement security system and their connection to changes in the United States political economy as neoliberal, promarket ideology, and policies (low taxes, reduced spending, and deregulation) have become dominant in the private and public sectors. The neoliberal priority on reducing labor costs and achieving maximum shareholder value has created an environment inimical to maintain the traditional system of pension and health care benefits in both the private and public sectors. This article explores the implications of these neoliberal trends in the United States economy for the future of retirement security. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  8. The exploration of the exhibition informatization

    NASA Astrophysics Data System (ADS)

    Zhang, Jiankang

    2017-06-01

    The construction and management of exhibition informatization is the main task and choke point during the process of Chinese exhibition industry’s transformation and promotion. There are three key points expected to realize a breakthrough during the construction of Chinese exhibition informatization, and the three aspects respectively are adopting service outsourcing to construct and maintain the database, adopting advanced chest card technology to collect various kinds of information, developing statistics analysis to maintain good cutomer relations. The success of Chinese exhibition informatization mainly calls for mature suppliers who can provide construction and maintenance of database, the proven technology, a sense of data security, advanced chest card technology, the ability of data mining and analysis and the ability to improve the exhibition service basing on the commercial information got from the data analysis. Several data security measures are expected to apply during the process of system developing, including the measures of the terminal data security, the internet data security, the media data security, the storage data security and the application data security. The informatization of this process is based on the chest card designing. At present, there are several types of chest card technology: bar code chest card; two-dimension code card; magnetic stripe chest card; smart-chip chest card. The information got from the exhibition data will help the organizers to make relevant service strategies, quantify the accumulated indexes of the customers, and improve the level of the customer’s satisfaction and loyalty, what’s more, the information can also provide more additional services like the commercial trips, VIP ceremonial reception.

  9. Exploring the association of urban or rural county status and environmental, nutrition- and lifestyle-related resources with the efficacy of SNAP-Ed (Supplemental Nutrition Assistance Program-Education) to improve food security.

    PubMed

    Rivera, Rebecca L; Dunne, Jennifer; Maulding, Melissa K; Wang, Qi; Savaiano, Dennis A; Nickols-Richardson, Sharon M; Eicher-Miller, Heather A

    2018-04-01

    To investigate the association of policy, systems and environmental factors with improvement in household food security among low-income Indiana households with children after a Supplemental Nutrition Assistance Program-Education (SNAP-Ed) direct nutrition education intervention. Household food security scores measured by the eighteen-item US Household Food Security Survey Module in a longitudinal randomized and controlled SNAP-Ed intervention study conducted from August 2013 to April 2015 were the response variable. Metrics to quantify environmental factors including classification of urban or rural county status; the number of SNAP-authorized stores, food pantries and recreational facilities; average fair market housing rental price; and natural amenity rank were collected from government websites and data sets covering the years 2012-2016 and used as covariates in mixed multiple linear regression modelling. Thirty-seven Indiana counties, USA, 2012-2016. SNAP-Ed eligible adults from households with children (n 328). None of the environmental factors investigated were significantly associated with changes in household food security in this exploratory study. SNAP-Ed improves food security regardless of urban or rural location or the environmental factors investigated. Expansion of SNAP-Ed in rural areas may support food access among the low-income population and reduce the prevalence of food insecurity in rural compared with urban areas. Further investigation into policy, systems and environmental factors of the Social Ecological Model are warranted to better understand their relationship with direct SNAP-Ed and their impact on diet-related behaviours and food security.

  10. Food insecurity, a determinant of obesity? - an analysis from a population-based survey in the Paris metropolitan area, 2010.

    PubMed

    Martin-Fernandez, Judith; Caillavet, France; Lhuissier, Anne; Chauvin, Pierre

    2014-01-01

    The relationship between food insecurity and obesity is discussed in the literature. The objective of this study was to determine whether food insecurity and obesity were associated in the Paris metropolitan area. We used data from third wave of the Health, Inequalities and Social Ruptures (SIRS) cohort study, a longitudinal population-based, representative health and socioepidemiological survey of the general population in the Paris metropolitan area. The participants' BMI (calculated using self-reported height and weight) was analyzed as a continuous variable, and a dichotomous variable (BMI < 30 kg/m(2)/BMI ≥ 30 kg/m(2)) was constructed. Food insecurity was estimated using the Household Food Security Scale Module (HFSSM) and was treated as a trichotomous variable (food security / low food security / very low food security). Multilevel models were estimated for men and women separately. Obesity (BMI ≥ 30 kg/m(2)) prevalence was 10.2%. The determinant of obesity differs according to gender. After adjustment for age, income and the sociooccupational group, very low food security was associated with obesity in women (OR = 2.01, 95%CI 1.05-3.82), and women with very low food security had a higher BMI (Coef. = 1.78, 95% CI 0.24-3.31). This association, however, was not significant for men (OR = 1.84, 95%CI 0.64-5.30). In times of economic crisis, it is increasingly essential to explore and understand the pathway through which very low food security is linked to obesity.

  11. Defense Threat Reduction Agency > Research

    Science.gov Websites

    Sciences Protection Sciences Science to Defeat WMD Science to Secure WMD Chemical/Biological Technologies unconventional means to answer some of the most difficult questions about chemical, biological, radiological and partnering with us, explore our pages. Chemical/Biological Technologies Chemical and biological threats are

  12. Evaluating Online Dialogue on "Security" Using a Novel Instructional Design

    ERIC Educational Resources Information Center

    Arora, Payal

    2008-01-01

    This paper explores evaluation strategies to gauge the impact of a novel instructional design on international community participation online. This is done by conceptualizing and devising indicators for measuring "engagement" online amongst marginalized adult communities worldwide. In doing so, a review of online evaluation literature is…

  13. The Two Solitudes of Educational Policy and the Challenge of Development

    ERIC Educational Resources Information Center

    Murgatroyd, Stephen; Sahlberg, Pasi

    2016-01-01

    Policy makers are challenged to improve educational outcomes, manage scarce resources and secure public acceptance of their initiatives to provide quality, relevant and effective education. In making decisions they are pulled between competing ideologies about the process and purposes of schooling. This paper explores these ideologies and suggests…

  14. The Benefits of Volunteering for Psychology Students

    ERIC Educational Resources Information Center

    Bromnick, Rachel; Horowitz, Ava; Shepherd, Daniel

    2012-01-01

    Within the current economic climate students are seen as needing more than a degree to succeed in securing graduate employment. One way that students chose to enhance their employability is through engaging in voluntary work. In this empirical study, undergraduate psychology students' reasons for volunteering are explored within the context of…

  15. Integrating Critical Thinking about Values into an Introductory Geoscience Course

    ERIC Educational Resources Information Center

    Yacobucci, Margaret M.

    2013-01-01

    This paper presents an instructional strategy for engaging students with the critical exploration of values in introductory geoscience courses. It is argued that the consideration of values (i.e., abstract expressions of desirable qualities such as cooperation, security, curiosity, and honesty) is an integral part of scientific practice and…

  16. NSF Director Bloch Stresses Effectiveness and Efficiency.

    ERIC Educational Resources Information Center

    Lepkowski, Wil

    1985-01-01

    The text of an interview with Erich Bloch, National Science Foundation (NSF) director, is provided. Among the topics/issues explored are NSF's role in policy research, mission and goals of NSF, establishment of NSF Engineering Research Centers, and national security issues involving access to supercomputers in universities that NSF is funding. (JN)

  17. An Exploratory Study of Young Persons' Attachment Styles and Perceived Reasons for Parental Divorce.

    ERIC Educational Resources Information Center

    Walker, Tavi R.; Ehrenberg, Marion F.

    1998-01-01

    Explored relationship between undergraduate students' perceptions of the reasons for their parents' divorces and their own feelings of security in romantic relationships. Found that 73% described insecure attachment styles. Perceived reasons for divorce involving expressions of overt anger, involvement of children, and extramarital affairs were…

  18. Determinants of Happiness in Undergraduate University Students

    ERIC Educational Resources Information Center

    Flynn, Deborah M.; MacLeod, Stephanie

    2015-01-01

    This study explored the relationship between happiness, and six other life domains: Academic Success, Financial Security, Familial Support, Living Environment, Self-Image and Social Relations. Participants were one hundred and ninety- two students from a small undergraduate university. The purpose of the study was to determine which life domain…

  19. A Study of Teachers, Principals, and Tenure.

    ERIC Educational Resources Information Center

    Kersten, Thomas; Brandfon, Frances

    1988-01-01

    A survey of teachers and principals in North Cook County, Illinois, explored tenure issues related to teacher performance, professional image, job security, and teacher welfare. Although a majority of teachers and principals agreed that tenure inhibits dismissal of below-average teachers, 54 percent of teachers favored keeping tenure, and 69…

  20. - Domestic Ports « Coast Guard Maritime Commons

    Science.gov Websites

    explore other contributing factors, it uncovered evidence of an ineffective safety management system Guard itself to provide effective oversight of the vessel's compliance with safety regulations. 9/1/2017 Marine Safety and Security Council magazine will transition to three printed editions annually. 8/5/2016

  1. Beyond Health and Wealth: Predictors of Women's Retirement Satisfaction

    ERIC Educational Resources Information Center

    Price, Christine A.; Balaswamy, Shantha

    2009-01-01

    Despite empirical support for the positive effects of health and wealth on retirement satisfaction, alternative variables also play a key role in helping to shape women's assessment of retirement. In the present study, we explore personal and psychosocial predictors of women's retirement satisfaction while controlling for financial security and…

  2. Flexibility "and" Security? "Flexicurity" and its Implications for Lifelong Guidance

    ERIC Educational Resources Information Center

    Sultana, Ronald G.

    2013-01-01

    This article sets out to trigger research and policy attention among the career guidance community to the increasingly important notion of "flexicurity". It first explores the different meanings of the term, particularly as these have evolved in discussions across the European Union. It then goes on to consider why…

  3. Building Community.

    ERIC Educational Resources Information Center

    Schwartz, Edward

    The purpose of this eight-unit course is to explore the values and issues of modern urban neighborhoods. It focuses on how community leaders can apply the broad principle of justice to problems of security, reciprocity, and fellowship that face most neighborhoods today. The course is intended for use by community leaders in building community…

  4. Collection of wild Helianthus anomalus and deserticola sunflower from the desert southwest USA

    USDA-ARS?s Scientific Manuscript database

    Genetic resources are the biological basis of global food security. Collection and preservation of wild relatives of important crop species such as sunflower provide the basic foundation to improve and sustain the crop. Acquisition through exploration is the initial step in the germplasm conservatio...

  5. Extractable resources

    NASA Technical Reports Server (NTRS)

    1975-01-01

    The use of information from space systems in the operation of extractive industries, particularly in exploration for mineral and fuel resources was reviewed. Conclusions and recommendations reported are based on the fundamental premise that survival of modern industrial society requires a continuing secure flow of resources for energy, construction and manufacturing, and for use as plant foods.

  6. Mullahs, Guards, and Bonyads: An Exploration of Iranian Leadership Dynamics

    DTIC Science & Technology

    2009-01-01

    Rafsanjani, the foundation became a huge con- glomerate of multiple businesses and industries, including tourism , real estate, agriculture, petrochemicals...facility at Natanz in particular, were made public, there was a clear risk that the IAEA Board of Gover - nors would refer the matter to the UN Security

  7. Fruit metabolite networks in engineered and non-engineered tomato genotypes reveal fluidity in a hormone and agroecosystem specific manner

    USDA-ARS?s Scientific Manuscript database

    Multiple strategies have been explored throughout the world to meet food security. These include molecular breeding, transgenic genotype development, reduced-tillage crop production, modification of the soil environment with cover crops or polyethylene mulches and tunnels, and organic farming. Unde...

  8. Status of the World's Soil Resources Report, Intergovernmental Technical Panel on Soils

    EPA Science Inventory

    The scope of main objectives of the report are: (a) to provide a global scientific assessment of current and projected soil conditions built on regional data analysis and expertise (b) to explore the implications of these soil conditions for food security, climate change, water q...

  9. Global Custody of Endowment Funds

    ERIC Educational Resources Information Center

    Palfreyman, David

    2007-01-01

    This article explores the law relating to the global custodianship of funds, notably as managed for endowed charities such as universities and independent schools. Is global custody based on the legal concept of bailment or of trusts? Just how secure are the legal underpinnings of this financial mechanism? The conclusions are that the legal…

  10. 75 FR 21597 - Business Development Trade Mission to Baghdad, Iraq

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-26

    ... total in Iraq), it is the largest city in Iraq and the second largest in the region. Iraq's gross... by participating in Embassy briefings, and explore additional opportunities at networking receptions...--Participants arrive in pre-arranged departure city and assemble on the preferred flight. Day 2--Security...

  11. Gardening as a therapeutic intervention in mental health.

    PubMed

    Page, Mathew

    This article describes why one low-secure unit chose to initiate a horticultural therapy project and organise it as a 'workers' cooperative'. The therapeutic benefits of gardening are explored, particularly focusing on the social benefits. The article also discusses the issue of hope, which is an intrinsic requirement in gardening.

  12. Students Explore a Complex Landscape of Fear

    ERIC Educational Resources Information Center

    Monaghan, Peter

    2007-01-01

    National security demands that "illegals" must be kept out of the country. Terrorists may be entering alongside Mexicans jumping immigration queues. So explain members of the self-appointed Minuteman Civil Defense Corps as they and 25 Vassar College students trudge a migrant trail across a parched, cactus-punctuated desert near Douglas,…

  13. Alternative Fuels Data Center: Electricity

    Science.gov Websites

    efficiency. Using electricity to power vehicles can have significant energy security and emissions benefits . Icon of an information sign. Basics Find information about using electricity as a vehicle fuel Considerations Explore the benefits and considerations of using electricity as a vehicle fuel. Icon of a fueling

  14. Rudolph Diesel Meets the Soybean: "Greasing" the Wheels of Chemical Education

    ERIC Educational Resources Information Center

    King, Angela G.; Wright, Marcus W.

    2007-01-01

    The impact of biodiesel on classrooms and teaching laboratories has potential similar to country's energy security and could help introduce environmental concepts, thermodynamics, titrations, combustion and chemical reactions. While researchers are exploring new methods and approaches to alternative fuels and renewable energy, the educators could…

  15. English for Airport Ground Staff

    ERIC Educational Resources Information Center

    Cutting, Joan

    2012-01-01

    This article describes part of a European Commission Leonardo project that aimed to design a multimedia course for English language learners seeking work as ground staff in European airports. The structural-functional analysis of the dialogues written from the course showed that, across the four trades explored (security guards, ground handlers,…

  16. Teachers' Perceptions of Financial Literacy and the Implications for Professional Learning

    ERIC Educational Resources Information Center

    Sawatzki, Carly M.; Sullivan, Peter A.

    2017-01-01

    Consumer, economic and financial literacy education at school is central to active and informed citizenship. Over the past decade, the Australian Securities and Investments Commission has led various policy initiatives and influenced curriculum and resource development in this area. However, there remains a paucity of research exploring how…

  17. 77 FR 58203 - AER Energy Resources, Inc.; Alto Group Holdings, Inc.; Bizrocket.Com Inc.; Fox Petroleum, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-19

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] AER Energy Resources, Inc.; Alto Group Holdings, Inc.; Bizrocket.Com Inc.; Fox Petroleum, Inc.; Geopulse Explorations Inc.; Global Technologies... accuracy of press releases concerning the company's revenues. 4. Fox Petroleum, Inc. is a Nevada...

  18. Exploring Information Security Awareness Training to Reduce Unauthorized Disclosure of Information in Public Schools

    ERIC Educational Resources Information Center

    Fleming, Antoine

    2017-01-01

    Advances in technological uses within public schools provide increased methods to collect and store non-public personal information (NPI) or personally identifiable information (PII) from both students and employees. Consequently, the sensitive information collected is susceptible to unauthorized disclosure, as various public school employees are…

  19. Children's Attentional Exploration of Threatening Information as Related to Trust in Maternal Support

    ERIC Educational Resources Information Center

    Dujardin, Adinda; Bosmans, Guy; De Raedt, Rudi; Braet, Caroline

    2015-01-01

    There is increasing interest in attachment-related social information processing, including children's attentional processing of information regarding the attachment figure. Previous research in middle childhood revealed evidence for a stronger attentional focus toward mother in children with less secure attachment expectations. However, the…

  20. 24-Hour Academic Libraries: Adjusting to Change

    ERIC Educational Resources Information Center

    Bowman, Adam C.

    2013-01-01

    The purpose of this study was to explore the adaptive measures that academic libraries perform when implementing and operating a 24-hour schedule. Five in-depth interviews were conducted with current managerial-level librarians at 24-hour academic libraries. The exploratory interviews revealed similar measures for security, budgeting, employee…

  1. Poverty and the Older Woman: Reflections of a Social Worker.

    ERIC Educational Resources Information Center

    Baldwin, Doris

    1978-01-01

    This paper explores the older woman's place in our nation's economy, with special emphasis on the impact of employment levels, pension plans, and Social Security benefits. It concludes that preservation of the family as an institution depends on making marriage and divorce more equitable relationships. (Author)

  2. Job Insecurity and Employee Well-Being.

    ERIC Educational Resources Information Center

    Vance, Robert J.; Kuhnert, Karl W.

    This study explored the consequences of perceived job security and insecurity on the psychological and physical health of employees. Data were gathered from employees of a large midwestern manufacturing organization that produced products for material removal applications. Surveys were sent through company mail to a stratified random sample of 442…

  3. Agent of opportunity risk mitigation: people, engineering, and security efficacy.

    PubMed

    Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R

    2010-12-01

    Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access controls; security personnel play dual roles of security and customer service, creating the negative perception that neither role is done well; and budget was described as an important factor in explaining the state of security controls. We determined that AMCs seeking to reduce AO risk should assess their institutionally unique AO risks, understand staff security perceptions, and install access controls that are responsive to the staff's tendency to defeat them. The development of AO attribute fact sheets is desirable for AO risk assessment; new funding and administrative or legislative tools to improve AMC security are required; and security practices and methods that are convenient and effective should be engineered.

  4. Pegasus ICON Spacecraft Mate to Separation System

    NASA Image and Video Library

    2018-05-09

    Technicians secure NASA's Ionospheric Connection Explorer (ICON) on the spacecraft separation system May 9, 2018, in a clean room inside Building 1555 at Vandenberg Air Force Base in California. The explorer will launch on June 15, 2018, from Kwajalein Atoll in the Marshall Islands (June 14 in the continental United States) on Orbital ATK's Pegasus XL rocket, which is attached to the company's L-1011 Stargazer aircraft. ICON will study the frontier of space - the dynamic zone high in Earth's atmosphere where terrestrial weather from below meets space weather above. The explorer will help determine the physics of Earth's space environment and pave the way for mitigating its effects on our technology, communications systems and society.

  5. Security Vulnerability Profiles of NASA Mission Software: Empirical Analysis of Security Related Bug Reports

    NASA Technical Reports Server (NTRS)

    Goseva-Popstojanova, Katerina; Tyo, Jacob P.; Sizemore, Brian

    2017-01-01

    NASA develops, runs, and maintains software systems for which security is of vital importance. Therefore, it is becoming an imperative to develop secure systems and extend the current software assurance capabilities to cover information assurance and cybersecurity concerns of NASA missions. The results presented in this report are based on the information provided in the issue tracking systems of one ground mission and one flight mission. The extracted data were used to create three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified the software bugs that are security related and classified them in specific security classes. This information was then used to create the security vulnerability profiles (i.e., to determine how, why, where, and when the security vulnerabilities were introduced) and explore the existence of common trends. The main findings of our work include:- Code related security issues dominated both the Ground and Flight mission IVV security issues, with 95 and 92, respectively. Therefore, enforcing secure coding practices and verification and validation focused on coding errors would be cost effective ways to improve mission's security. (Flight mission Developers issues dataset did not contain data in the Issue Category.)- In both the Ground and Flight mission IVV issues datasets, the majority of security issues (i.e., 91 and 85, respectively) were introduced in the Implementation phase. In most cases, the phase in which the issues were found was the same as the phase in which they were introduced. The most security related issues of the Flight mission Developers issues dataset were found during Code Implementation, Build Integration, and Build Verification; the data on the phase in which these issues were introduced were not available for this dataset.- The location of security related issues, as the location of software issues in general, followed the Pareto principle. Specifically, for all three datasets, from 86 to 88 the security related issues were located in two to four subsystems.- The severity levels of most security issues were moderate, in all three datasets.- Out of 21 primary security classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, these classes contributed from around 80 to 90 of all security issues in each dataset. This again proves the Pareto principle of uneven distribution of security issues, in this case across CWE classes, and supports the fact that addressing these dominant security classes provides the most cost efficient way to improve missions' security. The findings presented in this report uncovered the security vulnerability profiles and identified the common trends and dominant classes of security issues, which in turn can be used to select the most efficient secure design and coding best practices compiled by the part of the SARP project team associated with the NASA's Johnson Space Center. In addition, these findings provide valuable input to the NASA IVV initiative aimed at identification of the two 25 CWEs of ground and flight missions.

  6. The Multimodal Assessment of Adult Attachment Security: Developing the Biometric Attachment Test.

    PubMed

    Parra, Federico; Miljkovitch, Raphaële; Persiaux, Gwenaelle; Morales, Michelle; Scherer, Stefan

    2017-04-06

    Attachment theory has been proven essential for mental health, including psychopathology, development, and interpersonal relationships. Validated psychometric instruments to measure attachment abound but suffer from shortcomings common to traditional psychometrics. Recent developments in multimodal fusion and machine learning pave the way for new automated and objective psychometric instruments for adult attachment that combine psychophysiological, linguistic, and behavioral analyses in the assessment of the construct. The aim of this study was to present a new exposure-based, automatic, and objective adult-attachment assessment, the Biometric Attachment Test (BAT), which exposes participants to a short standardized set of visual and music stimuli, whereas their immediate reactions and verbal responses, captured by several computer sense modalities, are automatically analyzed for scoring and classification. We also aimed to empirically validate two of its assumptions: its capacity to measure attachment security and the viability of using themes as placeholders for rotating stimuli. A total of 59 French participants from the general population were assessed using the Adult Attachment Questionnaire (AAQ), the Adult Attachment Projective Picture System (AAP), and the Attachment Multiple Model Interview (AMMI) as ground truth for attachment security. They were then exposed to three different BAT stimuli sets, whereas their faces, voices, heart rate (HR), and electrodermal activity (EDA) were recorded. Psychophysiological features, such as skin-conductance response (SCR) and Bayevsky stress index; behavioral features, such as gaze and facial expressions; as well as linguistic and paralinguistic features, were automatically extracted. An exploratory analysis was conducted using correlation matrices to uncover the features that are most associated with attachment security. A confirmatory analysis was conducted by creating a single composite effects index and by testing it for correlations with attachment security. The stability of the theory-consistent features across three different stimuli sets was explored using repeated measures analysis of variances (ANOVAs). In total, 46 theory-consistent correlations were found during the exploration (out of 65 total significant correlations). For example, attachment security as measured by the AAP was correlated with positive facial expressions (r=.36, P=.01). AMMI's security with the father was inversely correlated with the low frequency (LF) of HRV (r=-.87, P=.03). Attachment security to partners as measured by the AAQ was inversely correlated with anger facial expression (r=-.43, P=.001). The confirmatory analysis showed that the composite effects index was significantly correlated to security in the AAP (r=.26, P=.05) and the AAQ (r=.30, P=.04) but not in the AMMI. Repeated measures ANOVAs conducted individually on each of the theory-consistent features revealed that only 7 of the 46 (15%) features had significantly different values among responses to three different stimuli sets. We were able to validate two of the instrument's core assumptions: its capacity to measure attachment security and the viability of using themes as placeholders for rotating stimuli. Future validation of other of its dimensions, as well as the ongoing development of its scoring and classification algorithms is discussed. ©Federico Parra, Raphaële Miljkovitch, Gwenaelle Persiaux, Michelle Morales, Stefan Scherer. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 06.04.2017.

  7. The Multimodal Assessment of Adult Attachment Security: Developing the Biometric Attachment Test

    PubMed Central

    Miljkovitch, Raphaële; Persiaux, Gwenaelle; Morales, Michelle; Scherer, Stefan

    2017-01-01

    Background Attachment theory has been proven essential for mental health, including psychopathology, development, and interpersonal relationships. Validated psychometric instruments to measure attachment abound but suffer from shortcomings common to traditional psychometrics. Recent developments in multimodal fusion and machine learning pave the way for new automated and objective psychometric instruments for adult attachment that combine psychophysiological, linguistic, and behavioral analyses in the assessment of the construct. Objective The aim of this study was to present a new exposure-based, automatic, and objective adult-attachment assessment, the Biometric Attachment Test (BAT), which exposes participants to a short standardized set of visual and music stimuli, whereas their immediate reactions and verbal responses, captured by several computer sense modalities, are automatically analyzed for scoring and classification. We also aimed to empirically validate two of its assumptions: its capacity to measure attachment security and the viability of using themes as placeholders for rotating stimuli. Methods A total of 59 French participants from the general population were assessed using the Adult Attachment Questionnaire (AAQ), the Adult Attachment Projective Picture System (AAP), and the Attachment Multiple Model Interview (AMMI) as ground truth for attachment security. They were then exposed to three different BAT stimuli sets, whereas their faces, voices, heart rate (HR), and electrodermal activity (EDA) were recorded. Psychophysiological features, such as skin-conductance response (SCR) and Bayevsky stress index; behavioral features, such as gaze and facial expressions; as well as linguistic and paralinguistic features, were automatically extracted. An exploratory analysis was conducted using correlation matrices to uncover the features that are most associated with attachment security. A confirmatory analysis was conducted by creating a single composite effects index and by testing it for correlations with attachment security. The stability of the theory-consistent features across three different stimuli sets was explored using repeated measures analysis of variances (ANOVAs). Results In total, 46 theory-consistent correlations were found during the exploration (out of 65 total significant correlations). For example, attachment security as measured by the AAP was correlated with positive facial expressions (r=.36, P=.01). AMMI’s security with the father was inversely correlated with the low frequency (LF) of HRV (r=−.87, P=.03). Attachment security to partners as measured by the AAQ was inversely correlated with anger facial expression (r=−.43, P=.001). The confirmatory analysis showed that the composite effects index was significantly correlated to security in the AAP (r=.26, P=.05) and the AAQ (r=.30, P=.04) but not in the AMMI. Repeated measures ANOVAs conducted individually on each of the theory-consistent features revealed that only 7 of the 46 (15%) features had significantly different values among responses to three different stimuli sets. Conclusions We were able to validate two of the instrument’s core assumptions: its capacity to measure attachment security and the viability of using themes as placeholders for rotating stimuli. Future validation of other of its dimensions, as well as the ongoing development of its scoring and classification algorithms is discussed. PMID:28385683

  8. Exploring the Unknown: Selected Documents in the History of the U.S. Civilian Space Program. Volume 2; External Relationships

    NASA Technical Reports Server (NTRS)

    Logsdon, John M. (Editor); Day, Dwayne A. (Editor); Launius, Roger D. (Editor)

    1996-01-01

    The documents selected for inclusion in this volume are presented in three chapters, each covering a particular aspect of the evolution of U.S. space exploration. These chapters address (1) the relations between the civilian space program of the United States and the space activities of other countries, (2) the relations between the U.S. civilian space program and the space efforts of national security organizations and the military, and (3) NASA's relations with industry and academic institutions.

  9. Long-term energy security in a national scale using LEAP. Application to de-carbonization scenarios in Andorra

    NASA Astrophysics Data System (ADS)

    Travesset-Baro, Oriol; Jover, Eric; Rosas-Casals, Marti

    2016-04-01

    This paper analyses the long-term energy security in a national scale using Long-range Energy Alternatives Planning System (LEAP) modelling tool. It builds the LEAP Andorra model, which forecasts energy demand and supply for the Principality of Andorra by 2050. It has a general bottom-up structure, where energy demand is driven by the technological composition of the sectors of the economy. The technological model is combined with a top-down econometric model to take into account macroeconomic trends. The model presented in this paper provides an initial estimate of energy demand in Andorra segregated into all sectors (residential, transport, secondary, tertiary and public administration) and charts a baseline scenario based on historical trends. Additional scenarios representing different policy strategies are built to explore the country's potential energy savings and the feasibility to achieve the Intended Nationally Determined Contribution (INDC) submitted in April 2015 to UN. In this climatic agreement Andorra intends to reduce net greenhouse gas emissions (GHG) by 37% as compared to a business-as-usual scenario by 2030. In addition, current and future energy security is analysed in this paper under baseline and de-carbonization scenarios. Energy security issues are assessed in LEAP with an integrated vision, going beyond the classic perspective of security of supply, and being closer to the sustainability's integrative vision. Results of scenarios show the benefits of climate policies in terms of national energy security and the difficulties for Andorra to achieving the de-carbonization target by 2030.

  10. Factors associated with household food security of participants of the MANA food supplement program in Colombia.

    PubMed

    Hackett, Michelle; Melgar-Quiñonez, Hugo; Taylor, Christopher A; Alvarez Uribe, Martha Cecilia

    2010-03-01

    The objective of this study was to explore demographic and economic characteristics associated with household food security of 2,784 low-income households with pre-school aged children receiving food supplements from the Colombian Plan for Improving Food and Nutrition in Antioquia - MANA (Mejoramiento Alimentario y Nutricional de Antioquia) in the Department of Antioquia, Colombia. Included in the study was a 12-item household food security survey was collected from a cross-sectional, stratified random sample of MANA participants in which households were characterized as food secure, mildly food insecure, moderately food insecure, and severely food insecure. It was hypothesized that household food security status would be strongly associated with demographic characteristics, food expenditure variables, and food supplement consumption by children in MANA. Food insecure households were characterized by more members, older parents, and lower income (p < 0.0001). Rural residence and female head of households had higher rates of food insecurity (p < 0.01). Food insecure households had the lowest monthly expenditures food (p < 0.0001). Severely food insecure households saved the highest percentage of per capita food expenditure from consuming MANA supplements (p < 0.0001), similarly, MANA food supplement intakes were greatest in households reporting the most food insecurity (p < 0.001). The results of this study are important to describe characteristics of the population benefiting from the MANA nutrition intervention by their unique level of household food security status.

  11. Promoting exercise behaviour in a secure mental health setting: Healthcare assistant perspectives.

    PubMed

    Kinnafick, Florence-Emilie; Papathomas, Anthony; Regoczi, Dora

    2018-05-30

    Individuals with severe mental illness engage in significantly less amounts of physical activity than the general population. A secure mental health setting can exacerbate barriers to exercise, and facilitate physical inactivity and sedentary behaviour. Healthcare assistants are intimately involved in the daily lives of patients and, therefore, should be considered integral to exercise promotion in secure mental health settings. Our aim was to explore healthcare assistants' perceptions of exercise and their attitudes to exercise promotion for adult patients in a secure mental health hospital. Qualitative semi-structured interviews were conducted with 11 healthcare assistants from a large UK-based secure mental health hospital. Topics included healthcare assistants' personal experiences of exercise within a secure facility, their perceptions of exercise as an effective treatment tool for mental health, and their perceived roles and responsibilities for exercise promotion. Thematic analysis was used to analyse the data. Three main themes were identified: (i) exercise is multi-beneficial to patients, (ii) perceived barriers to effective exercise promotion, and (iii) strategies for effectives exercise promotion. Healthcare assistants considered exercise to hold patient benefits. However, core organizational and individual barriers limited healthcare assistants' exercise promotion efforts. An informal approach to exercise promotion was deemed most effective to some, whereas others committed to more formal strategies including compulsory sessions. With education and organizational support, we propose healthcare assistants are well placed to identify individual needs for exercise promotion. Their consultation could lead to more efficacious, person-sensitive interventions. © 2018 Australian College of Mental Health Nurses Inc.

  12. "BioONT": Improving Knowledge Organization and Representation in the Domain of Biometric Authentication

    ERIC Educational Resources Information Center

    Buerle, Stephen

    2017-01-01

    This dissertation explores some of the fundamental challenges facing the information assurance community as it relates to knowledge categorization, organization and representation within the field of information security and more specifically within the domain of biometric authentication. A primary objective of this research is the development of…

  13. Affective and Behavioral Features of Jealousy Protest: Associations with Child Temperament, Maternal Interaction Style, and Attachment

    ERIC Educational Resources Information Center

    Hart, Sybil L.; Behrens, Kazuko Y.

    2013-01-01

    This study explored variation in affective and behavioral components of infants' jealousy protests during an eliciting condition in which mother and an experimenter directed differential attention exclusively toward a rival. Variation was examined in relation to child temperamental emotionality, maternal interaction style, and attachment security.…

  14. The New Jersey Cooperative Home Economics Education Handbook. Part B: The Curriculum.

    ERIC Educational Resources Information Center

    Spencer, Dorothy

    This guide is intended for use with students enrolled in cooperative occupational home economics programs. The following topics are covered in the individual modules: the basic principles of cooperative home economics; preparation for the world of work (choosing, finding, applying for, and exploring a job); safety, security, and sanitation (on and…

  15. The Impact of Wireless Phone Technology on Users in Nigeria

    ERIC Educational Resources Information Center

    Ezenezi, Robins E.

    2010-01-01

    Studies have shown that with the increasing diffusion of cell phones in Nigeria have come with problems such as network congestion, service inefficiencies, rising costs, and increased taxes. The purpose of this study was to examine and explore which, if any, sociopersonal variables (theft of handsets, educational levels, security risk) and…

  16. A Qualitative Study of Alumni Non-Donors of Historically Black Colleges and Universities

    ERIC Educational Resources Information Center

    Foxx, Laura R.

    2013-01-01

    This qualitative research study was designed as an exploration of the phenomena of alumni non-donors of Historically Black Colleges and Universities (HBCUs). Successfully securing private voluntary support is one of the most critical challenges for higher education institutions as traditional sources of financial support diminish, and alumni…

  17. Threats without Threateners? Exploring Intersections of Threats to the Global Commons and National Security

    DTIC Science & Technology

    2012-01-01

    used for public services, or for sale outside the community. Notice that this alternative approach to policy is worth considering whether or not the...function like an iTunes app store, except that they would be for physical products. Consumers looking for new products would connect with designers sell

  18. Disability and Rehabilitation in Rural Costa Rica. Occasional Paper 3.

    ERIC Educational Resources Information Center

    de Mezerville, Gaston

    To assist the Costa Rican Social Security Systems in designing a Rural Community Comprehensive Health Model, a study identified functional limitations among 1253 persons over age 7; assessed functional development of 293 children, ages 0-6; identified possible preventive factors of disability; and explored practices and resources in the districts…

  19. Gender Equity in Australian Universities: The Many Paradoxes of Securing Senior Leadership Positions

    ERIC Educational Resources Information Center

    Noble, Carolyn

    2014-01-01

    To date western feminist scholarship on gender and work has primarily focused on women providing valuable information as to their discrimination and invisibility, especially in the echelons of power and in senior decision-making positions. Feminist scholars have needed to explore women's under representation in senior leadership positions because…

  20. Modeling Item-Position Effects within an IRT Framework

    ERIC Educational Resources Information Center

    Debeer, Dries; Janssen, Rianne

    2013-01-01

    Changing the order of items between alternate test forms to prevent copying and to enhance test security is a common practice in achievement testing. However, these changes in item order may affect item and test characteristics. Several procedures have been proposed for studying these item-order effects. The present study explores the use of…

  1. A Pilot Study Using an Online, Experimental, Two-Asset Market.

    ERIC Educational Resources Information Center

    Lypny, Gregory

    2003-01-01

    Describes an online, securities market, research tool, called Borsa, to engage students in the exploration of asset pricing in microeconomics courses. Defines Borsa as related database files served on the Internet using a dedicated IP address. Discusses practical considerations in running the market. Offers questions that arise from using the…

  2. A Dynamic Capabilities View of Employability: Exploring the Drivers of Competitive Advantage for University Graduates

    ERIC Educational Resources Information Center

    Finch, David J.; Peacock, Melanie; Levallet, Nadege; Foster, William

    2016-01-01

    Purpose: The increasing demand for post-secondary education, and the ongoing difficulty students' face in securing appropriate work upon program completion, highlight the importance of an enhanced understanding of employability resources for university graduates. Just as organizations achieve a strategic advantage from resources and dynamic…

  3. Ethnicizing Poverty through Social Security Provision in Rural Hungary

    ERIC Educational Resources Information Center

    Schwarcz, Gyongyi

    2012-01-01

    Rural poverty has become an increasingly ethnicised category for the majority society in contemporary Hungary. The article aims to explore the process and practice of social exclusion and ethnicisation in relation to mutual effects of post-socialist welfare restructuring and changing discourse on poverty in the post-socialist rural reality. The…

  4. Teaching the Passive through Semantically Enhanced Input

    ERIC Educational Resources Information Center

    Little, Andrea; Fieldsend, Terry

    2018-01-01

    This article reports on a small, classroom-based study exploring the use of a task to teach the passive in an English for specific purposes context. The participants were 34 adult Japanese male learners, all security professionals, ranging in proficiency level from elementary to advanced. The task was designed to highlight the form--meaning…

  5. Students' Perception of International Business Curriculum: An Explorative Study--Case of Lebanon

    ERIC Educational Resources Information Center

    Bahhouth, Victor; Spillan, John E.; Bahhouth, Jocelyne; Khoueiri, Roy

    2012-01-01

    Economic development depends on business education for a thriving and secure society. A skilled workforce that can create, innovate, and increase business opportunities fosters an environment of prosperity that provides jobs and enhances the quality of life among its citizens. This article examines the environment, content, and delivery of…

  6. Storytelling Dramas as a Community Building Activity in an Early Childhood Classroom

    ERIC Educational Resources Information Center

    Wright, Cheryl; Diener, Marissa L.; Kemp, Jacqueline Lindsay

    2013-01-01

    Healthy social-emotional development is promoted by building a safe, secure and respectful environment in an early childhood setting with positive and consistent relationships among adults, children, and their peers. This study explored storytelling dramas as an opportunity to build community within the context of one early childhood classroom.…

  7. Grief Counseling Groups in a Medium-Security Prison

    ERIC Educational Resources Information Center

    Olson, Margaret J.; McEwen, Margaret A.

    2004-01-01

    The authors discuss their facilitation of four grief counseling groups with male inmates in a state prison over a two-year period. Worden's Tasks of Mourning were used as a guide for the group process. Disenfranchised grief and gender and cultural issues in grieving are explored. Catalytic exercises are described, and written feedback from inmates…

  8. AIDS, Empire and the US Politics of Giving

    ERIC Educational Resources Information Center

    Hill, Robert J.

    2004-01-01

    This essay explores the intersection of US Empire on HIV/AIDS policies and the politics of "gifting." It does so from an analysis of several key US initiatives: the Project for a New American Century, the US National Security Strategy, and the President's Emergency Plan for AIDS Relief. History provides numerous examples where US…

  9. Communicating Love or Fear: The Role of Attachment Styles in Pathways to Giftedness

    ERIC Educational Resources Information Center

    Wellisch, Mimi

    2010-01-01

    Although both giftedness and secure attachment are associated with advanced language and good socioemotional adjustment, not all gifted children are well adjusted. This article explores the consequences of attachment style on gifted development and examines whether early trauma can be rectified. The dearth of research on giftedness and attachment…

  10. Advanced Polymer Network Structures

    DTIC Science & Technology

    2016-02-01

    double networks in a single step was identified from coarse-grained molecular dynamics simulations of polymer solvents bearing rigid side chains dissolved...in a polymer network. Coarse-grained molecular dynamics simulations also explored the mechanical behavior of traditional double networks and...DRI), polymer networks, polymer gels, molecular dynamics simulations , double networks 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF

  11. Public Welfare and Work Incentives: Theory and Practice. Studies in Public Welfare. Paper No. 14.

    ERIC Educational Resources Information Center

    Burke, Vee; Townsend, Alair A.

    This chart book summarizes two volumes in the subcommittee's series, "Studies in Public Welfare." Paper No. 4 (Dec. 22, 1972) explored work incentive and disincentive features in existing and proposed public welfare programs (cash welfare, unemployment insurance, social security, veterans' benefits, food stamps, public housing, and medicaid).…

  12. An Attachment Theory Approach to Narrating the Faith Journey of Children of Parental Divorce

    ERIC Educational Resources Information Center

    Kiesling, Chris

    2011-01-01

    This study explores the effects of parental divorce on a child's faith. Drawing from attachment theory, Granqvist and Kirkpatrick proposed two probable developmental pathways to religion. For those with secure attachment, whose cumulative experiences of sensitive, religious caregivers enhance the development of a God image as loving; belief…

  13. Disabled Children: The Right to Feel Safe

    ERIC Educational Resources Information Center

    Mepham, Sarah

    2010-01-01

    This article explores the fundamental right of disabled children to feel safe and be free from bullying, harassment and abuse. The article proposes that, 20 years since the United Nations Convention on the Rights of the Child, disabled children are still facing barriers to securing this right. The article focuses on recent Mencap research that…

  14. Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java

    DTIC Science & Technology

    2000-04-01

    separation of garbage collection costs is not possible. Balfanz and Gong [2] describe a multi- processing JVM developed to explore the secu- rity...line in Java. In Proc. of the 7th HotOS, Rio Rico, AZ, Mar. 1999. IEEE Computer Society. [2] D. Balfanz and L. Gong. Experience with secure multi

  15. Senior Year Inviting More Math Choices

    ERIC Educational Resources Information Center

    Cavanagh, Sean

    2008-01-01

    When students at Prescott High School sign up to take math as seniors, not all of them will be wading into precalculus or calculus, with in-depth explorations of derivatives and trigonometric functions. Some will instead end up using mathematics to study the Electoral College, or the security of Internet passwords, or how delivery companies ship…

  16. Social Capital, Organic Agriculture, and Sustainable Livelihood Security: Rethinking Agrarian Change in Mexico

    ERIC Educational Resources Information Center

    Getz, Christy

    2008-01-01

    This paper explores the relevance of extra local market linkages and local-level social capital to sustainable livelihood outcomes in two agrarian communities on Mexico's Baja Peninsula. Contextualized by the specificity of Mexico's transition from state-directed rural development to neoliberally-guided rural development in the 1990s, findings…

  17. Maintaining the Critical Balance: The United States, NATO, and the European Security Equilibrium in the Post-Cold War Operating Environment

    DTIC Science & Technology

    2012-06-08

    His Majesty The King of Great Britain, Ireland and the British Dominions beyond the Seas, Resolved: To reaffirm their faith in fundamental human ...intellectual ferment, global exploration , scientific and technological advances—not to mention economic and political revolutions—European states have

  18. At Periscope Depth: Exploring Submarine Proliferation In Southeast Asia

    DTIC Science & Technology

    2015-09-01

    Regional Security Organization,” Contemporary Southeast Asia 27, no. 1 (2005): 5. 74 Mohd Nizam Basiron and Lim Chee Kia , “The Modernisation of the...2C11059%2C8 411&secondRedirectIndicator=true. Basiron, Mohd Nizam, and Lim Chee Kia . “The Modernisation of the Royal Malaysian Navy: Challenges, Trends

  19. Collective Approach to Complex Food System Issues, the Case of the Ohio State University

    ERIC Educational Resources Information Center

    Fox, Julie

    2017-01-01

    Urban universities are uniquely positioned to make powerful and lasting contributions to the grand challenge of food security. To better understand the various dimensions related to the university's role in food systems, this case study explores intentional linkages, significant developments, natural tensions, and emerging impacts at the Ohio…

  20. Just Imaginary: Delimiting Social Inclusion in Higher Education

    ERIC Educational Resources Information Center

    Gale, Trevor; Hodge, Steven

    2014-01-01

    This paper explores the notion of a "just imaginary" for social inclusion in higher education. It responds to the current strategy of OECD nations to expand higher education and increase graduate numbers, as a way of securing a competitive advantage in the global knowledge economy. The Australian higher education system provides the case…

Top