DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
A video on computer security is described. Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education and Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1--3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices.
Conceptual Architecture for Obtaining Cyber Situational Awareness
2014-06-01
1-893723-17-8. [10] SKYBOX SECURITY. Developer´s Guide. Skybox View. Manual.Version 11. 2010. [11] SCALABLE Network. EXata communications...E. Understanding command and control. Washington, D.C.: CCRP Publication Series, 2006. 255 p. ISBN 1-893723-17-8. • [10] SKYBOX SECURITY. Developer...s Guide. Skybox View. Manual.Version 11. 2010. • [11] SCALABLE Network. EXata communications simulation platform. Available: <http://www.scalable
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education & Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1-3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices. Leaders may incorporate the Short Subjects into presentations. After talkingmore » about a subject area, one of the Short Subjects may be shown to highlight that subject matter. Another method for sharing them could be to show a Short Subject first and then lead a discussion about its topic. The cast of characters and a bit of information about their personalities in the LLNL Computer Security Short Subjects is included in this report.« less
Cybersecurity and medical devices: A practical guide for cardiac electrophysiologists
Kramer, Daniel B.; Foo Kune, Denis; Auto de Medeiros, Julio; Yan, Chen; Xu, Wenyuan; Crawford, Thomas; Fu, Kevin
2017-01-01
Abstract Medical devices increasingly depend on software. While this expands the ability of devices to perform key therapeutic and diagnostic functions, reliance on software inevitably causes exposure to hazards of security vulnerabilities. This article uses a recent high‐profile case example to outline a proactive approach to security awareness that incorporates a scientific, risk‐based analysis of security concerns that supports ongoing discussions with patients about their medical devices. PMID:28512774
Fuzzy assessment of health information system users' security awareness.
Aydın, Özlem Müge; Chouseinoglou, Oumout
2013-12-01
Health information systems (HIS) are a specific area of information systems (IS), where critical patient data is stored and quality health service is only realized with the correct use and efficient dissemination of this data to health workers. Therefore, a balance needs to be established between the levels of security and flow of information on HIS. Instead of implementing higher levels and further mechanisms of control to increase the security of HIS, it is preferable to deal with the arguably weakest link on HIS chain with respect to security: HIS users. In order to provide solutions and approaches for transforming users to the first line of defense in HIS but also to employ capable and appropriate candidates from the pool of newly graduated students, it is important to assess and evaluate the security awareness levels and characteristics of these existing and future users. This study aims to provide a new perspective to understand the phenomenon of security awareness of HIS users with the use of fuzzy analysis, and to assess the present situation of current and future HIS users of a leading medical and educational institution of Turkey, with respect to their security characteristics based on four different security scales. The results of the fuzzy analysis, the guide on how to implement this fuzzy analysis to any health institution and how to read and interpret these results, together with the possible implications of these results to the organization are provided.
Responding to Campus Rape: A Practical Guide for College Administrators.
ERIC Educational Resources Information Center
Fossey, Richard; Smith, Michael Clay
1996-01-01
In addressing rape on campus, colleges and universities should provide a rape awareness program, a campus sexual harassment policy, a campus security plan focusing on prevention, procedures for notifying the community about criminal activity, adequate disciplinary procedures, and protection for minor children with whom campus employees work. A…
Performance Analysis of Cyber Security Awareness Delivery Methods
NASA Astrophysics Data System (ADS)
Abawajy, Jemal; Kim, Tai-Hoon
In order to decrease information security threats caused by human-related vulnerabilities, an increased concentration on information security awareness and training is necessary. There are numerous information security awareness training delivery methods. The purpose of this study was to determine what delivery method is most successful in providing security awareness training. We conducted security awareness training using various delivery methods such as text based, game based and a short video presentation with the aim of determining user preference delivery methods. Our study suggests that a combined delvery methods are better than individual secrity awareness delivery method.
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2014 CFR
2014-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2011 CFR
2011-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2013 CFR
2013-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2012 CFR
2012-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
49 CFR 1552.23 - Security awareness training programs.
Code of Federal Regulations, 2010 CFR
2010-10-01
... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...
Developing Renewable Energy Projects Larger Than 10 MWs at Federal Facilities (Book)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
2013-03-01
To accomplish Federal goals for renewable energy, sustainability, and energy security, large-scale renewable energy projects must be developed and constructed on Federal sites at a significant scale with significant private investment. The U.S. Department of Energy's Federal Energy Management Program (FEMP) helps Federal agencies meet these goals and assists agency personnel navigate the complexities of developing such projects and attract the necessary private capital to complete them. This guide is intended to provide a general resource that will begin to develop the Federal employee's awareness and understanding of the project developer's operating environment and the private sector's awareness and understandingmore » of the Federal environment. Because the vast majority of the investment that is required to meet the goals for large-scale renewable energy projects will come from the private sector, this guide has been organized to match Federal processes with typical phases of commercial project development. The main purpose of this guide is to provide a project development framework to allow the Federal Government, private developers, and investors to work in a coordinated fashion on large-scale renewable energy projects. The framework includes key elements that describe a successful, financially attractive large-scale renewable energy project.« less
2014-04-24
other sensors … will deprive an opponent of initiative on the battlefield and [make it difficult] for them to bring their precision guided weapons...features include modern avionics and sensors that offer more timely situational awareness for operations in network-centric combat environments...JF12 hypersonic wind tunnel, reportedly the largest in the world, capable of replicating flying conditions at mach 5 to 9. This project was one of
Information Security Awareness On-Line Materials Design with Knowledge Maps
ERIC Educational Resources Information Center
Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan
2011-01-01
Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…
A Survey on Cyber Security awareness among college students in Tamil Nadu
NASA Astrophysics Data System (ADS)
Senthilkumar, K.; Easwaramoorthy, Sathishkumar
2017-11-01
The aim of the study is to analyse the awareness of cyber security on college students in Tamil Nadu by focusing various security threats in the internet. In recent years cybercrime is an enormous challenge in all areas including national security, public safety and personal privacy. To prevent from a victim of cybercrime everyone must know about their own security and safety measures to protect by themselves. A well-structured questionnaire survey method will be applied to analyse the college student’s awareness in the area of cyber security. This survey will be going to conducted in major cities of Tamil Nadu by focusing various security threats like email, virus, phishing, fake advertisement, popup windows and other attacks in the internet. This survey examines the college students’ awareness and the level of awareness about the security issues and some suggestions are set forth to overcome these issues.
1986-08-01
aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if...SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF PAGES 168 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT...States, nor the Maritime Administration, nor any person acting on behalf of the Maritime Administration (A) makes any warranty or representation, expressed
The Impact of Information Richness on Information Security Awareness Training Effectiveness
ERIC Educational Resources Information Center
Shaw, R. S.; Chen, Charlie C.; Harris, Albert L.; Huang, Hui-Jou
2009-01-01
In recent years, rapid progress in the use of the internet has resulted in huge losses in many organizations due to lax security. As a result, information security awareness is becoming an important issue to anyone using the Internet. To reduce losses, organizations have made information security awareness a top priority. The three main barriers…
Ask not what nature can do for you: A critique of ecosystem services as a communication strategy
Bekessy, Sarah A.; Runge, Michael C.; Kusmanoff, Alex; Keith, David A.; Wintle, Brendan A.
2018-01-01
Given the urgent need to raise public awareness on biodiversity issues, we review the effectiveness of “ecosystem services” as a frame for promoting biodiversity conservation. Since its inception as a communications tool in the 1970s, the concept of ecosystem services has become pervasive in biodiversity policy. While the goal of securing ecosystem services is absolutely legitimate, we argue that it has had limited success as a vehicle for securing public interest and support for nature, which is crucial to securing long-term social mandates for protection. Emerging evidence suggests that focusing on ecosystem services rather than the intrinsic value of nature is unlikely to be effective in bolstering public support for nature conservation. Theory to guide effective communication about nature is urgently needed. In the mean-time, communicators should reflect on their objectives and intended audience and revisit the way nature is framed to ensure maximum resonance.
ERIC Educational Resources Information Center
Edwards, Keith
2015-01-01
Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the…
Takaizumi, Kanae; Harada, Kazuhiro; Nakamura, Yoshio
2011-11-01
The purpose of this study was to examine the sociodemographic and health-related characteristics of those who are unaware of the Japanese Food Guide Spinning Top (Food Guide). A longitudinal study was conducted using an Internet-based questionnaire with 1,012 Japanese adults (40.2 +/- 10.0 years, mean +/- SD) recruited from registrants of a Japanese social research company. Conducted between November 2007 (T1) and December 2008 (T2), the survey included items on awareness level ("I know the contents." "I have heard of this Guide." or "I have not heard of this Guide.") of the Food Guide as the dependent variable, and demographics factors (e.g., age, education status, marital status, household income, and employment status) and health-related characteristics (obesity, abdominal obesity, and insufficient physical activity) as the independent variables. Multivariate logistic regression analysis was used to analyze the relation between awareness level and each variable. The relation between change of awareness level (T1-T2) and each variable was analyzed using a chi-square test. All the analyses were stratified by gender. In the multivariate logistic regression analysis adjusted for all variables, men with a household income of 5,000,000-10,000,000 yen (OR=1.78; 95% CI=1.10-2.88) were positively associated with awareness level ("I have heard of this Guide."). In contrast, unmarried women were negatively associated with awareness level in T1 ("I know the contents"; OR=0.35; 95% CI=0.17-0.70. "I have heard of this Guide"; OR=0.50; 95% CI=0.27-0.92). In men, the awareness level of the Food Guide increased from T1 to T2, change of awareness level (T1; "I have not heard of this Guide") and education status being related (P=0.023). In women, the awareness levels overall did not improve from T1 to T2, but change of awareness level (T1; "I have heard of this Guide") was associated with household income (P<0.001). In both men and women, change of awareness level was not associated with health-related characteristics. The results of this study suggest that awareness of the Food Guide has increased among those with health risk factors, such as obesity and low levels of physical activity. The promotion strategy of the Food Guide might need to target males with low-level education, unmarried women, and women with a high household income.
ERIC Educational Resources Information Center
Smith, Gwendolynn T.
2012-01-01
The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2013 CFR
2013-01-01
....g., system and network administrators, and system/application security officers) must receive... 5 Administrative Personnel 2 2013-01-01 2013-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems...
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2014 CFR
2014-01-01
....g., system and network administrators, and system/application security officers) must receive... 5 Administrative Personnel 2 2014-01-01 2014-01-01 false Information systems security awareness... (MISCELLANEOUS) Information Security Responsibilities for Employees who Manage or Use Federal Information Systems...
SERENITY Aware System Development Process
NASA Astrophysics Data System (ADS)
Serrano, Daniel; Maña, Antonio; Llarena, Rafael; Crespo, Beatriz Gallego-Nicasio; Li, Keqin
Traditionally, security patterns have successfully been used to describe security and dependability. In the SERENITY Project the notion of security and dependability (S&D) pattern has been extended to exact specifications of re-usable security mechanisms for Ambient Intelligence (AmI) systems. These S&D Patterns include information on the security properties satisfied by the solution and on the context conditions to be fulfilled. This chapter presents the development of applications supported by SERENITY. In the context of SERENITY we refer to these applications as Serenity-aware applications. Firstly, this chapter presents the Serenity-aware application design using S&D Artefacts. Secondly, it proposes a Java Application Programming Interface (API) to be used in the application development. And, finally, it introduces the development of an example Serenity-aware application.
17 CFR 229.801 - Securities Act industry guides.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...
17 CFR 229.801 - Securities Act industry guides.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...
17 CFR 229.801 - Securities Act industry guides.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...
17 CFR 229.801 - Securities Act industry guides.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Securities Act industry guides. 229.801 Section 229.801 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry...
17 CFR 229.801 - Securities Act industry guides.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Securities Act industry guides... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.801 Securities Act industry... claims and claim adjustment expenses of property-casualty insurance underwriters. (g) Guide 7...
Examining the Relationship between Organization Systems and Information Security Awareness
ERIC Educational Resources Information Center
Tintamusik, Yanarong
2010-01-01
The focus of this dissertation was to examine the crucial relationship between organization systems within the framework of the organizational behavior theory and information security awareness (ISA) of users within the framework of the information security theory. Despite advanced security technologies designed to protect information assets,…
Developing Renewable Energy Projects Larger Than 10 MWs at Federal Facilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2013-03-01
To accomplish Federal goals for renewable energy, sustainability, and energy security, large-scale renewable energy projects must be developed and constructed on Federal sites at a significant scale with significant private investment. For the purposes of this Guide, large-scale Federal renewable energy projects are defined as renewable energy facilities larger than 10 megawatts (MW) that are sited on Federal property and lands and typically financed and owned by third parties.1 The U.S. Department of Energy’s Federal Energy Management Program (FEMP) helps Federal agencies meet these goals and assists agency personnel navigate the complexities of developing such projects and attract the necessarymore » private capital to complete them. This Guide is intended to provide a general resource that will begin to develop the Federal employee’s awareness and understanding of the project developer’s operating environment and the private sector’s awareness and understanding of the Federal environment. Because the vast majority of the investment that is required to meet the goals for large-scale renewable energy projects will come from the private sector, this Guide has been organized to match Federal processes with typical phases of commercial project development. FEMP collaborated with the National Renewable Energy Laboratory (NREL) and professional project developers on this Guide to ensure that Federal projects have key elements recognizable to private sector developers and investors. The main purpose of this Guide is to provide a project development framework to allow the Federal Government, private developers, and investors to work in a coordinated fashion on large-scale renewable energy projects. The framework includes key elements that describe a successful, financially attractive large-scale renewable energy project. This framework begins the translation between the Federal and private sector operating environments. When viewing the overall« less
Teaching Laboratory Renovation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Al-Zuhairi, Ali Jassim; Al-Dahhan, Wedad; Hussein, Falah
Scientists at universities across Iraq are actively working to report actual incidents and accidents occurring in their laboratories, as well as structural improvements made to improve safety and security, to raise awareness and encourage openness, leading to widespread adoption of robust Chemical Safety and Security (CSS) practices. The improvement of students’ understanding of concepts in science and its applications, practical scientific skills and understanding of how science and scientists work in laboratory experiences have been considered key aspects of education in science for over 100 years. Facility requirements for the necessary level of safety and security combined with specific requirementsmore » relevant to the course to be conducted dictate the structural design of a particular laboratory, and the design process must address both. This manuscript is the second in a series of five case studies describing laboratory incidents, accidents, and laboratory improvements. We summarize the process used to guide a major renovation of the chemistry instructional laboratory facilities at Al-Nahrain University and discuss lessons learned from the project.« less
Complying with the Campus Security Act--1990. Title II--Crime Awareness and Campus Security.
ERIC Educational Resources Information Center
National Association of Student Personnel Administrators, Inc.
This paper offers guidelines to colleges and universities which must comply with requirements of the Student Right-to-Know and Campus Security Act of 1990, specifically Title II, Crime Awareness and Campus Security. An introduction outlines some measures that campuses are urged to adopt such as campus-wide committees to review security policies,…
SPAR: a security- and power-aware routing protocol for wireless ad hoc and sensor networks
NASA Astrophysics Data System (ADS)
Oberoi, Vikram; Chigan, Chunxiao
2005-05-01
Wireless Ad Hoc and Sensor Networks (WAHSNs) are vulnerable to extensive attacks as well as severe resource constraints. To fulfill the security needs, many security enhancements have been proposed. Like wise, from resource constraint perspective, many power aware schemes have been proposed to save the battery power. However, we observe that for the severely resource limited and extremely vulnerable WAHSNs, taking security or power (or any other resource) alone into consideration for protocol design is rather inadequate toward the truly "secure-and-useful" WAHSNs. For example, from resource constraint perspective, we identify one of the potential problems, the Security-Capable-Congestion (SCC) behavior, for the WAHSNs routing protocols where only the security are concerned. On the other hand, the design approach where only scarce resource is concerned, such as many power-aware WAHSNs protocols, leaves security unconsidered and is undesirable to many WAHSNs application scenarios. Motivated by these observations, we propose a co-design approach, where both the high security and effective resource consumption are targeted for WAHSNs protocol design. Specifically, we propose a novel routing protocol, Security- and Power- Aware Routing (SPAR) protocol based on this co-design approach. In SPAR, the routing decisions are made based on both security and power as routing criteria. The idea of the SPAR mechanism is routing protocol independent and therefore can be broadly integrated into any of the existing WAHSNs routing protocols. The simulation results show that SPAR outperforms the WAHSNs routing protocols where security or power alone is considered, significantly. This research finding demonstrates the proposed security- and resource- aware co-design approach is promising towards the truly "secure-and-useful" WAHSNs.
Information Security – Guidance for Manually Completing the Information Security Awareness Training
The purpose of this guidance is to provide an alternative manual process for disseminating EPA Information Security Awareness Training (ISAT) materials and collecting results from EPA users who elect to complete the ISAT manually.
National Concept of Operations for Maritime Domain Awareness
2007-12-01
Maritime Domain Awareness (MDA) is the effective understanding of anything associated with the global maritime domain that could impact the security... Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding... Awareness (MDA) is the effective understanding of anything associated with the global maritime domain that could impact the security, safety
Exploring the effectiveness of transit security awareness campaigns in the San Francisco Bay Area.
DOT National Transportation Integrated Search
2010-06-01
Public involvement in alerting officials of suspicious and potentially harmful activity is critical to the overall security of a transit system. As part of an effort to get passengers and the public involved, many transit agencies have security aware...
NASA Astrophysics Data System (ADS)
Bai, Wei; Yang, Hui; Yu, Ao; Xiao, Hongyun; He, Linkuan; Feng, Lei; Zhang, Jie
2018-01-01
The leakage of confidential information is one of important issues in the network security area. Elastic Optical Networks (EON) as a promising technology in the optical transport network is under threat from eavesdropping attacks. It is a great demand to support confidential information service (CIS) and design efficient security strategy against the eavesdropping attacks. In this paper, we propose a solution to cope with the eavesdropping attacks in routing and spectrum allocation. Firstly, we introduce probability theory to describe eavesdropping issue and achieve awareness of eavesdropping attacks. Then we propose an eavesdropping-aware routing and spectrum allocation (ES-RSA) algorithm to guarantee information security. For further improving security and network performance, we employ multi-flow virtual concatenation (MFVC) and propose an eavesdropping-aware MFVC-based secure routing and spectrum allocation (MES-RSA) algorithm. The presented simulation results show that the proposed two RSA algorithms can both achieve greater security against the eavesdropping attacks and MES-RSA can also improve the network performance efficiently.
Explore Awareness of Information Security: Insights from Cognitive Neuromechanism.
Han, Dongmei; Dai, Yonghui; Han, Tianlin; Dai, Xingyun
2015-01-01
With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people's awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people's awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG) signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people's cognition of potential risks in online financial payment.
Explore Awareness of Information Security: Insights from Cognitive Neuromechanism
Han, Dongmei; Han, Tianlin; Dai, Xingyun
2015-01-01
With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals, online shopping, and social media have facilitated information exchange, social communication, and financial payment for people more and more than ever before. In the meantime, information security and privacy protection have been meeting with new severe challenges. Although we have taken a variety of information security measures in both management and technology, the actual effectiveness depends firstly on people's awareness of information security and the cognition of potential risks. In order to explore the new technology for the objective assessment of people's awareness and cognition on information security, this paper takes the online financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals. Results indicate that left hemisphere and beta rhythms of electroencephalogram (EEG) signal are sensitive to the cognitive degree of risks in the awareness of information security, which may be probably considered as the sign to assess people's cognition of potential risks in online financial payment. PMID:26587017
Just Around the Corner... A Guide for Career Education in the Intermediate Levels.
ERIC Educational Resources Information Center
Arkansas State Dept. of Education, Little Rock. Career Education Section.
This curriculum guide provides examples of activities a teacher at the intermediate level can use for any phase of career education being studied. Activities are listed under each of the eight elements of career education: (1) Self Awareness, (2) Educational Awareness, (3) Career Awareness, (4) Economic Awareness, (5) Decision Making, (6)…
17 CFR 202.8 - Small entity compliance guides.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Small entity compliance guides. 202.8 Section 202.8 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION INFORMAL AND OTHER PROCEDURES § 202.8 Small entity compliance guides. The following small entity compliance guides...
17 CFR 202.8 - Small entity compliance guides.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Small entity compliance guides. 202.8 Section 202.8 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION INFORMAL AND OTHER PROCEDURES § 202.8 Small entity compliance guides. The following small entity compliance guides...
Port Security: A National Planning Guide
DOT National Transportation Integrated Search
1997-01-01
Port Security: A National Planning Guide has been produced for the purpose of conveying the United States Department of Transportations policy perspective on port security to the maritime community. This guide provides an overview of the essential as...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kurt Derr; Milos Manic
Location Based Services (LBS), context aware applications, and people and object tracking depend on the ability to locate mobile devices, also known as localization, in the wireless landscape. Localization enables a diverse set of applications that include, but are not limited to, vehicle guidance in an industrial environment, security monitoring, self-guided tours, personalized communications services, resource tracking, mobile commerce services, guiding emergency workers during fire emergencies, habitat monitoring, environmental surveillance, and receiving alerts. This paper presents a new neural network approach (LENSR) based on a competitive topological Counter Propagation Network (CPN) with k-nearest neighborhood vector mapping, for indoor location estimationmore » based on received signal strength. The advantage of this approach is both speed and accuracy. The tested accuracy of the algorithm was 90.6% within 1 meter and 96.4% within 1.5 meters. Several approaches for location estimation using WLAN technology were reviewed for comparison of results.« less
ERIC Educational Resources Information Center
Arkansas State Dept. of Education, Little Rock. Career Education Section.
This curriculum guide provides examples of activities a teacher at the primary level can use for any phase of career education being studied. Activities are listed under each of the eight elements of career education: (1) Self Awareness, (2) Educational Awareness, (3) Career Awareness, (4) Economic Awareness, (5) Decision Making, (6) Beginning…
ERIC Educational Resources Information Center
Giacobe, Nicklaus A.
2013-01-01
Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…
Cultural Awareness in Nuclear Security Programs: A Critical Link
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nasser, Al-Sharif Nasser bin; Auda, Jasmine; Bachner, Katherine
Nuclear security programs that offer training and capacity building opportunities to practitioners working in nuclear facilities play a central role in strengthening the global nuclear security architecture. There is often a significant divide, however, between both the development of these programs and their implementation, and between the programs’ intended and actual outcomes. This article argues that this disconnect can often be attributed to an absence of cultural awareness and an inability for internationally-designed programs to effectively resonate with local audiences. Furthermore, the importance of the role of cultural awareness in implementing nuclear security programs will be assessed, and its applicationsmore » in the Jordanian context will be presented.« less
Cultural Awareness in Nuclear Security Programs: A Critical Link
Nasser, Al-Sharif Nasser bin; Auda, Jasmine; Bachner, Katherine
2016-11-20
Nuclear security programs that offer training and capacity building opportunities to practitioners working in nuclear facilities play a central role in strengthening the global nuclear security architecture. There is often a significant divide, however, between both the development of these programs and their implementation, and between the programs’ intended and actual outcomes. This article argues that this disconnect can often be attributed to an absence of cultural awareness and an inability for internationally-designed programs to effectively resonate with local audiences. Furthermore, the importance of the role of cultural awareness in implementing nuclear security programs will be assessed, and its applicationsmore » in the Jordanian context will be presented.« less
17 CFR 229.802 - Exchange Act industry guides.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...
17 CFR 229.802 - Exchange Act industry guides.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...
17 CFR 229.802 - Exchange Act industry guides.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...
17 CFR 229.802 - Exchange Act industry guides.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...
17 CFR 229.802 - Exchange Act industry guides.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Exchange Act industry guides. 229.802 Section 229.802 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION STANDARD... AND CONSERVATION ACT OF 1975-REGULATION S-K List of Industry Guides § 229.802 Exchange Act industry...
ERIC Educational Resources Information Center
Grant, Robert Luther
2017-01-01
Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…
ERIC Educational Resources Information Center
2001
This guide contains all of the information, support and tools that community members need to implement "Talking About Mental Illness" in their community--an awareness program proven to be effective in bringing about positive change in young people's knowledge about mental illness, and in reducing stigma that surrounds mental illness. The…
Transit Security Procedures Guide
DOT National Transportation Integrated Search
1994-12-01
To protect passenger, employees, revenue, and property, transit systems are encouraged to take a proactive, prevention-oriented systems approach to transit security. This guide is a compilation of materials for planning and improving transit security...
Enable Web-Based Tracking and Guiding by Integrating Location-Awareness with the World Wide Web
ERIC Educational Resources Information Center
Zhou, Rui
2008-01-01
Purpose: The aim of this research is to enable web-based tracking and guiding by integrating location-awareness with the Worldwide Web so that the users can use various location-based applications without installing extra software. Design/methodology/approach: The concept of web-based tracking and guiding is introduced and the relevant issues are…
17 CFR 202.8 - Small entity compliance guides.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Small entity compliance guides. 202.8 Section 202.8 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION INFORMAL AND...: Small Business and the SEC. 1 1 These items are also available on the Securities and Exchange Commission...
17 CFR 202.8 - Small entity compliance guides.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Small entity compliance guides. 202.8 Section 202.8 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION INFORMAL AND...: Small Business and the SEC. 1 1 These items are also available on the Securities and Exchange Commission...
17 CFR 202.8 - Small entity compliance guides.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Small entity compliance guides. 202.8 Section 202.8 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION INFORMAL AND...: Small Business and the SEC. 1 1 These items are also available on the Securities and Exchange Commission...
A Study of Security Awareness Information Delivery within the Defense Intelligence Community
ERIC Educational Resources Information Center
Krasley, Paul F.
2011-01-01
Due to limited resources and inconsistent guidance from the U.S. Federal Government, Department of Defense, and multiple environments within the intelligence community, the defense intelligence agencies each developed their own methods to deliver security awareness information. These multiple delivery methods may be providing different levels of…
Fostering E-Mail Security Awareness: The West Point Carronade
ERIC Educational Resources Information Center
Ferguson, Aaron J.
2005-01-01
The United States Military Academy (USMA) at West Point had a problem with some cadets clicking on suspicious attachments and embedded links, significantly affecting network performance and resource availability. West Point information technology leadership needed a way to increase e-mail security awareness in hopes of maintaining a strong…
Commitment to nursing: results of a qualitative interview study.
Gould, Dinah; Fontenla, Marina
2006-04-01
The aims of the study were to explore opportunities to undergo continuing professional education, family friendly policy and holding an innovative or traditional post on nurses' job satisfaction and professional and organizational commitment. Qualified nurses have become a scare resource in the National Health Service. Managers need to be aware of the work-related factors most likely to secure nurses' professional and organizational commitment which will contribute to the retention. Commitment is thought to be increased if opportunities for continuing professional education are good. Family friendly policy is also important. Less is known about the relationship between type of nursing work and commitment. An in-depth, exploratory approach to data collection were taken, employing an interview guide with open-ended questions. Data were collected with 27 nurses in clinical grades in two contrasting trusts. Family friendly policies emerged as most important in securing nursing commitment. Those in innovative posts whose work entailed social hours and greater professional autonomy also displayed greater levels of job satisfaction. Opportunities for continuing professional education had less influence on professional and organizational commitment. Providing flexible or social working hours appears to be more influential than providing opportunities for continuing professional education in securing nursing commitment in this exploratory study.
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation.
Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae
2015-06-26
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both.
A Secure Routing Protocol for Wireless Sensor Networks Considering Secure Data Aggregation
Rahayu, Triana Mugia; Lee, Sang-Gon; Lee, Hoon-Jae
2015-01-01
The commonly unattended and hostile deployments of WSNs and their resource-constrained sensor devices have led to an increasing demand for secure energy-efficient protocols. Routing and data aggregation receive the most attention since they are among the daily network routines. With the awareness of such demand, we found that so far there has been no work that lays out a secure routing protocol as the foundation for a secure data aggregation protocol. We argue that the secure routing role would be rendered useless if the data aggregation scheme built on it is not secure. Conversely, the secure data aggregation protocol needs a secure underlying routing protocol as its foundation in order to be effectively optimal. As an attempt for the solution, we devise an energy-aware protocol based on LEACH and ESPDA that combines secure routing protocol and secure data aggregation protocol. We then evaluate its security effectiveness and its energy-efficiency aspects, knowing that there are always trade-off between both. PMID:26131669
General Business for Economic Awareness. Curriculum Guide.
ERIC Educational Resources Information Center
District of Columbia Public Schools, Washington, DC. Dept. of Career Development.
Designed to assist secondary teachers of general business courses, this guide suggests student objectives, content, and activities as a point of departure for teaching general business particularly, as it relates to economic awareness. Eleven instructional units are included: Business All Around Us; Finding Information; Career Exploration; Money;…
Poison Awareness: A Discussion Leader's Guide.
ERIC Educational Resources Information Center
National Evaluation Systems, Inc., Amherst, MA.
Because over 40,000 children are annually poisoned by household products, this guide for group leaders emphasizes hazards and preventive actions. Major objectives are defined: (1) to raise the audience's knowledge/awareness level concerning major hazards associated with potentially poisonous household products, (2) to point out primary hazard…
The hack attack - Increasing computer system awareness of vulnerability threats
NASA Technical Reports Server (NTRS)
Quann, John; Belford, Peter
1987-01-01
The paper discusses the issue of electronic vulnerability of computer based systems supporting NASA Goddard Space Flight Center (GSFC) by unauthorized users. To test the security of the system and increase security awareness, NYMA, Inc. employed computer 'hackers' to attempt to infiltrate the system(s) under controlled conditions. Penetration procedures, methods, and descriptions are detailed in the paper. The procedure increased the security consciousness of GSFC management to the electronic vulnerability of the system(s).
Biological Awareness: Statements for Self-Discovery.
ERIC Educational Resources Information Center
Edington, D.W.; Cunningham, Lee
This guide to biological awareness through guided self-discovery is based on 51 single focus statements concerning the human body. For each statement there are explanations of the underlying physiological principles and suggested activities and discussion ideas to encourage understanding of the statement in terms of the human body's functions,…
Coastal Awareness: A Resource Guide for Teachers in Junior High Science.
ERIC Educational Resources Information Center
Rasmussen, Frederick A.
Background information, activity suggestions, and recommended resource materials comprise this guide for designing a week-long ecology unit for junior high school students on Coastal Awareness. Discussed is how various physical processes such as waves, currents, and tides affect rocky shores, marshes, sandy beaches, and estuaries. To encourage…
Coastal Awareness: A Resource Guide for Teachers in Elementary Science.
ERIC Educational Resources Information Center
Rasmussen, Frederick A.
Intended to encourage elementary teachers to explore coastal ecology with their students, this guide presents background material, activity suggestions, and recommended resource materials that could be used in designing a week-long unit on Coastal Awareness. Discussed is how various physical processes such as waves, tides, and currents affect…
The Shaping of Managers' Security Objectives through Information Security Awareness Training
ERIC Educational Resources Information Center
Harris, Mark A.
2010-01-01
Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…
2009-06-01
to maritime information Mission: Act as a Maritime Awareness Coordinator and data critical to building situational awareness . We are...Maritime Awareness Technical Sub-committee (NMATS) July 2008 Desired Outcome Maritime Information Exchange Vision: Global maritime information ...Global Maritime Situational Awareness I i i i 1 Information Hubs n t at ves: . 2. MSSIS (Maritime Safety & Security Information Systems
ERIC Educational Resources Information Center
Armstead, Stanley K.
2017-01-01
In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…
Suspect/Counterfeit Items Information Guide for Subcontractors/Suppliers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tessmar, Nancy D.; Salazar, Michael J.
2012-09-18
Counterfeiting of industrial and commercial grade items is an international problem that places worker safety, program objectives, expensive equipment, and security at risk. In order to prevent the introduction of Suspect/Counterfeit Items (S/CI), this information sheet is being made available as a guide to assist in the implementation of S/CI awareness and controls, in conjunction with subcontractor's/supplier's quality assurance programs. When it comes to counterfeit goods, including industrial materials, items, and equipment, no market is immune. Some manufactures have been known to misrepresent their products and intentionally use inferior materials and processes to manufacture substandard items, whose properties can significantlymore » cart from established standards and specifications. These substandard items termed by the Department of Energy (DOE) as S/CI, pose immediate and potential threats to the safety of DOE and contractor workers, the public, and the environment. Failure of certain systems and processes caused by an S/CI could also have national security implications at Los Alamos National Laboratory (LANL). Nuclear Safety Rules (federal Laws), DOE Orders, and other regulations set forth requirements for DOE contractors to implement effective controls to assure that items and services meet specified requirements. This includes techniques to implement and thereby minimizing the potential threat of entry of S/CI to LANL. As a qualified supplier of goods or services to the LANL, your company will be required to establish and maintain effective controls to prevent the introduction of S/CI to LANL. This will require that your company warrant that all items (including their subassemblies, components, and parts) sold to LANL are genuine (i.e. not counterfeit), new, and unused, and conform to the requirements of the LANL purchase orders/contracts unless otherwise approved in writing to the Los Alamos National Security (LANS) contract administrator/procurements specialist.« less
Becoming: A Leader's Guide for High School Graduates.
ERIC Educational Resources Information Center
Voight, Nancy L.; And Others
This is the leader's guide of a community-based guidance program designed to help high school graduates become aware of themselves and of educational and employment opportunities and to develop the strength to carry out the life changes they choose to make. It consists of four sections. In section 1, entitled "Becoming Aware," a series…
4-6 Computer Awareness. Interim Guide.
ERIC Educational Resources Information Center
Manitoba Dept. of Education, Winnipeg. Computer Services Branch.
This guide was developed to assist teachers in achieving goals related to the development of computer awareness in students in grades 4-6 in the Canadian province of Manitoba. An overview of the program describes a set of basic concepts, skills, and attitudes relating to computer technology, and provides information on activities that can be used…
Sensitivity and Awareness: A Guide for Developing Understanding among Children.
ERIC Educational Resources Information Center
McPhee, Norma H.; Favazza, Paddy C.; Lewis, Eleanore Grater
This guide is designed specifically as a resource for classroom teachers, librarians, or consultants who are concerned with helping children develop an understanding and an ease with people who are different, especially people with disabilities. The book includes materials to be used in sensitivity and awareness discussion sessions based on 12…
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 10 Energy 2 2011-01-01 2011-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 10 Energy 2 2013-01-01 2013-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 10 Energy 2 2012-01-01 2012-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
10 CFR 95.33 - Security education.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 10 Energy 2 2010-01-01 2010-01-01 false Security education. 95.33 Section 95.33 Energy NUCLEAR... INFORMATION AND RESTRICTED DATA Physical Security § 95.33 Security education. All cleared employees must be... information. The facility may obtain defensive security, threat awareness, and other education and training...
Adversarial Feature Selection Against Evasion Attacks.
Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio
2016-03-01
Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.
Online Safety: Fraud, Security, Phishing, Vishing
... Theft Online Safety Privacy Report Scams and Frauds Online Safety Be aware of these scams when you' ... Security and Safety Internet Fraud Phishing and Vishing Online Security and Safety The internet makes many everyday ...
Elementary Career Education Guide, Volume 2: Career Awareness--Primary.
ERIC Educational Resources Information Center
Watertown Independent School District 1, SD.
Volume 2 of the six-volume articulated elementary education career guide deals with the career awareness level of career education and aims at developing student career identity. The lessons in the volume are divided and color-coded by grade level (early childhood, primary levels one, two, and three corresponding respectively with grades K-three,…
ERIC Educational Resources Information Center
Cvijanovic, Serge; Spero, Galila
The environmental education unit is intended for use by elementary school classroom teachers as they develop and implement programs to help students become visually aware of street environments. The teacher's guide is presented in two major sections. Section I consists primarily of reading and observing exercises. Lessons are entitled "What…
Coastal Awareness: A Resource Guide for Teachers in Senior High Science. Preprint.
ERIC Educational Resources Information Center
Rasmussen, Frederick A.
The stated purpose of this resource guide is to entice teachers to explore ecological aspects of coastal awareness. Discussions describe different characteristics of the coast such as: (1) waves, currents, and tides; (2) sandy beaches; (3) rocky shores; (4) estuaries; and (5) marshes. These discussions present some of the physical processes that…
Career Awareness Units, Magnolia Public Schools, Grades 1-7.
ERIC Educational Resources Information Center
Magnolia School District 14, AR.
The guide contains career awareness units for grades one through seven. A chart for each grade level lists the unit titles with textbook references, resource speakers, and study trips. Some of the speakers and study trips suggested throughout the guide are specific to the local area. For each unit, concepts to be developed are coordinated in chart…
CNN Newsroom Classroom Guides. May 1-31, 1995.
ERIC Educational Resources Information Center
Cable News Network, Atlanta, GA.
These classroom guides for the daily CNN (Cable News Network) Newsroom broadcasts for the month of May provide program rundowns, suggestions for class activities and discussion, student handouts, and a list of related news terms. Topics covered by the guide include: (1) security systems and security at the Olympics, drawing to scale, civil war in…
ERIC Educational Resources Information Center
Francois, Michael T.
2016-01-01
Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…
Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam
2017-01-01
Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.
... Resources Resource Request System Contact Us Legal and Security Accessibility Accessibility Tools Disclaimer Privacy Act Statement & Security No Fear Act FOIA Inspector General Audits & Investigative ...
Final Technical Report. Project Boeing SGS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bell, Thomas E.
Boeing and its partner, PJM Interconnection, teamed to bring advanced “defense-grade” technologies for cyber security to the US regional power grid through demonstration in PJM’s energy management environment. Under this cooperative project with the Department of Energy, Boeing and PJM have developed and demonstrated a host of technologies specifically tailored to the needs of PJM and the electric sector as a whole. The team has demonstrated to the energy industry a combination of processes, techniques and technologies that have been successfully implemented in the commercial, defense, and intelligence communities to identify, mitigate and continuously monitor the cyber security of criticalmore » systems. Guided by the results of a Cyber Security Risk-Based Assessment completed in Phase I, the Boeing-PJM team has completed multiple iterations through the Phase II Development and Phase III Deployment phases. Multiple cyber security solutions have been completed across a variety of controls including: Application Security, Enhanced Malware Detection, Security Incident and Event Management (SIEM) Optimization, Continuous Vulnerability Monitoring, SCADA Monitoring/Intrusion Detection, Operational Resiliency, Cyber Range simulations and hands on cyber security personnel training. All of the developed and demonstrated solutions are suitable for replication across the electric sector and/or the energy sector as a whole. Benefits identified include; Improved malware and intrusion detection capability on critical SCADA networks including behavioral-based alerts resulting in improved zero-day threat protection; Improved Security Incident and Event Management system resulting in better threat visibility, thus increasing the likelihood of detecting a serious event; Improved malware detection and zero-day threat response capability; Improved ability to systematically evaluate and secure in house and vendor sourced software applications; Improved ability to continuously monitor and maintain secure configuration of network devices resulting in reduced vulnerabilities for potential exploitation; Improved overall cyber security situational awareness through the integration of multiple discrete security technologies into a single cyber security reporting console; Improved ability to maintain the resiliency of critical systems in the face of a targeted cyber attack of other significant event; Improved ability to model complex networks for penetration testing and advanced training of cyber security personnel« less
ERIC Educational Resources Information Center
American Counseling Association, Office of Public Policy and Information, Alexandria, VA.
This guide encourages counselors to actively celebrate Counseling Awareness Month. It was designed to simplify planning and publicizing activities for counselors involved with Counseling Awareness Month. It includes information about activities ranging from the simple, such as wearing a Counseling Awareness Month T-shirt, to the ambitious, such as…
Are we really "eating well with Canada's food guide"?
Slater, Joyce J; Mudryj, Adriana N
2018-05-22
Canada's Food Guide (CFG) has been an important health promotion tool for over seventy years. The most recent version was released in 2007. This study examined Canadians' exposure to, knowledge, and use of CFG. Data came from the Canadian Community Health Survey's Rapid Response on the Awareness and Usage of Canada's Food Guide, which included 10,098 Canadians ≥12 y in all ten provinces. Questions were asked on familiarity, awareness and usage of CFG and Canada's Food Guide for First Nations, Inuit and Métis, as well as healthy eating principles and behaviours. Descriptive statistics and logistic regression were used to observe counts and differences among key demographic variables. More than 80% of Canadians have heard of CFG however significantly more women than men were aware of the Guide. Most knew that 'Vegetables and Fruit' had the most recommended servings and that dark green vegetables should be consumed daily; however fewer than half knew this of orange vegetables. Just under one third had a copy in their homes, and the most common sources for obtaining CFG were child's school and health professional/trainer. Those who consulted CFG recently were more likely to consume the recommended servings of vegetables and fruits, and to state that their eating habits were 'much better' than one year previously. CFG has "brand recognition" among Canadians however there are gaps between awareness and eating behaviours. The new Food Guide could consider additional dissemination tools including social media, videos and workbooks tailored to various age groups, demographic groups and settings.
Mobile Tracking and Location Awareness in Disaster Relief and Humanitarian Assistance Situations
2012-09-01
establishing mobile ad - hoc networks. Smartphones also have accelerometers that are used to detect any motion by the device. Furthermore, almost every...AVAILABILITY STATEMENT Approved for public release; distribution is unlimited 12b. DISTRIBUTION CODE A 13. ABSTRACT (maximum 200 words...Picture, Situational Awareness 15. NUMBER OF PAGES 55 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY
INL Control System Situational Awareness Technology Annual Report 2012
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gordon Rueff; Bryce Wheeler; Todd Vollmer
The overall goal of this project is to develop an interoperable set of tools to provide a comprehensive, consistent implementation of cyber security and overall situational awareness of control and sensor network implementations. The operation and interoperability of these tools will fill voids in current technological offerings and address issues that remain an impediment to the security of control systems. This report provides an FY 2012 update on the Sophia, Mesh Mapper, Intelligent Cyber Sensor, and Data Fusion projects with respect to the year-two tasks and annual reporting requirements of the INL Control System Situational Awareness Technology report (July 2010).
For Spacious Skies: A Teacher's Guide. An Interdisciplinary Approach to the Sky.
ERIC Educational Resources Information Center
For Spacious Skies, Inc., Lexington, MA.
Despite the fact that the sky is the most dominant feature of our surroundings, it plays the role of an unseen background for many objects. It is the intent of this guide to bring about an awareness of the sky to young people. Topics for activities include: (1) "Sky Awareness"; (2) "Compass"; (3) "Hand Lens"; (4)…
O'Callaghan, Claire; Vaghi, Matilde M; Brummerloh, Berit; Cardinal, Rudolf N; Robbins, Trevor W
2018-02-02
Detecting causal relationships between actions and their outcomes is fundamental to guiding goal-directed behaviour. The ventromedial prefrontal cortex (vmPFC) has been extensively implicated in computing these environmental contingencies, via animal lesion models and human neuroimaging. However, whether the vmPFC is critical for contingency learning, and whether it can occur without subjective awareness of those contingencies, has not been established. To address this, we measured response adaption to contingency and subjective awareness of action-outcome relationships in individuals with vmPFC lesions and healthy elderly subjects. We showed that in both vmPFC damage and ageing, successful behavioural adaptation to variations in action-outcome contingencies was maintained, but subjective awareness of these contingencies was reduced. These results highlight two contexts where performance and awareness have been dissociated, and show that learning response-outcome contingencies to guide behaviour can occur without subjective awareness. Preserved responding in the vmPFC group suggests that this region is not critical for computing action-outcome contingencies to guide behaviour. In contrast, our findings highlight a critical role for the vmPFC in supporting awareness, or metacognitive ability, during learning. We further advance the hypothesis that responding to changing environmental contingencies, whilst simultaneously maintaining conscious awareness of those statistical regularities, is a form of dual-tasking that is impaired in ageing due to reduced prefrontal function. Copyright © 2018 The Authors. Published by Elsevier Ltd.. All rights reserved.
Essential Strategies for School Security: A Practical Guide for Teachers and School Administrators.
ERIC Educational Resources Information Center
Haynes, Richard A.; Henderson, Catherine L.
This self-help guide explores the many factors involved in implementing an effective program of protection for schools. It provides direction and answers to the many questions posed by crime and violence in schools by translating certain principles of security into applications for the campus setting. The guide explains the various protection…
Effect of Organizational Factors on Information Security Implementations
ERIC Educational Resources Information Center
Perez, Rafael G.
2013-01-01
The purpose of this quantitative inferential study is to determine the level of correlation between the organizational factors of information security awareness, balanced security processes, and organizational structure with the size of the estimation gap of information security implementations mediated by the end user intentionality. The study…
What is Security? A perspective on achieving security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Atencio, Julian J.
This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.
78 FR 61807 - National Cybersecurity Awareness Month, 2013
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-04
... National Cybersecurity Awareness Month, 2013 By the President of the United States of America A... public awareness about cybersecurity, and we recommit to enhancing the security and resilience of our... best practices for cybersecurity, increase information sharing between the Federal Government and...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schurman, D.L.; Datesman, G.H. Jr; Truitt, J.O.
The report presents a system for evaluating and correcting deficiencies in security-force effectiveness in licensed nuclear facilities. There are four checklists which security managers can copy directly, or can use as guidelines for developing their own checklists. The checklists are keyed to corrective-action guides found in the body of the report. In addition to the corrective-action guides, the report gives background information on the nature of security systems and discussions of various special problems of the licensed nuclear industry.
NASA Astrophysics Data System (ADS)
Pelz, M. S.; Ewing, N.; Davidson, E.; Hoeberechts, M.
2016-02-01
This presentation focuses on Ocean Aware, a joint project between Ocean Networks Canada (ONC) and the British Columbia Girl Guides Canada (Girl Guides). On World Oceans Day 2014, Girl Guides launched a new challenge to its members: "Are you Ocean Aware?" To answer this question, girls of any age can now earn their Ocean Aware Challenge crest. Ocean Networks Canada (ONC), an initiative of the University of Victoria, operates cabled ocean observatories which supply continuous power and Internet connectivity to a broad suite of subsea instruments from the coast to the deep sea. This Internet connectivity permits researchers, students and members of the public to download freely available data on their computers anywhere around the globe, in near real-time. Girl Guides provides a safe, all-girl environment that invites girls to challenge themselves, to find their voice, meet new friends, have fun and make a difference in the world. Girl Guides strives to ensure that girls and women from all walks of life, identities and lived experiences feel a sense of belonging and can fully participate. Girl Guides of Canada is a member of the World Association of Girl Guides and Girl Scouts. Through a partnership between ONC and Girl Guides, Ocean Aware was created to promote ocean literacy and ocean technology to thousands of Guiders in British Columbia and beyond. One of the most interesting challenges was to present STEM learning outcomes in such a way that they are accessible to girls, facilitators, and communities that are both on the coast and inland. With a creative eye to the preforming arts, hands-on experiments, interactive experiences and games, this challenge successfully brings the 7 Principles of Ocean Literacy to any girl, in any community. In this presentation we will share some of the strategies, challenges and impacts of creating a successful program that engages a large audience in ocean science through a novel partnership.
A governor's guide to emergency management. Volume two : homeland security
DOT National Transportation Integrated Search
2002-09-19
Homeland security is a complex challenge that demands significant investment; collaboration among local, state, and federal governments; and integration with the private sector. The purpose of A Governor's Guide to Emergency Management Volume Two: Ho...
The public transportation system security and emergency preparedness planning guide
DOT National Transportation Integrated Search
2003-01-01
Recent events have focused renewed attention on the vulnerability of the nation's critical infrastructure to major events, including terrorism. The Public Transportation System Security and Emergency Preparedness Planning Guide has been prepared to s...
High-Altitude Electromagnetic Pulse (HEMP) Testing
2011-11-10
Security Classification Guide ( SCG ). b. The HEMP simulation facility shall have a measured map of the peak amplitude waveform of the...Quadripartite Standardization Agreement s, sec second SCG security classification guide SN serial number SOP Standard Operating Procedure
Exploring Factors That Affect Adoption of Computer Security Practices among College Students
ERIC Educational Resources Information Center
Alqarni, Amani
2017-01-01
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
Career Development Exemplary Project. The First Draft of a Curriculum Guide for Grade Nine.
ERIC Educational Resources Information Center
Ailer, Audrey J.; And Others
The guide represents an effort to implement the first phase of an exploration of careers curriculum designed to provide in-depth exploration of jobs previously surveyed by students in the seventh and eighth grade career awareness phase of the program. The following three units are included for each of 11 subject areas: an awareness unit, 4 to 9…
For Spacious Skies Activity Guide. An Interdisciplinary Approach to the Sky.
ERIC Educational Resources Information Center
Ward, C. Whitney; Borden, Jack
Despite the fact that the sky is the most dominant feature of our surroundings, it plays the role of an unseen background for may objects. It is the intent of this guide to bring about an awareness of the sky to young people. Topics for activities include: (1) "Sky Awareness"; (2) "Compass"; (3) "Hand Lens"; (4) "Prism"; (5) "Binoculars"; (6)…
Zink, A; Thomé, F; Schielein, M; Spinner, C D; Biedermann, T; Tizek, L
2018-05-30
Outdoor professionals such as mountain guides are at a substantial risk of developing non-melanoma skin cancer (NMSC) due to solar ultraviolet radiation (UVR) exposure. Despite major recent primary prevention efforts, studies on secondary skin cancer prevention efforts are limited and corresponding data on outdoor workers scarce. To assess the sun protective behaviour and individual motivations for or against skin cancer screening examinations in the German mountain guide population to aid in the development of effective awareness and prevention strategies. A cross-sectional study among all registered mountain guides in Germany was conducted using a 35-item online questionnaire on primary and secondary prevention of NMSC as well as perceived barriers for prevention. A total of 145 mountain guides participated in the study in January 2017. Of these, 86.2% reported using sunscreen often or always, 62.1% with a sun protection factor (SPF) of 30-50% and 60.7% had undergone dermatological examination by a medical professional. The most common reasons for using secondary prevention efforts were hope of an early diagnosis (77.3%), fear of skin cancer (73.9%) and the intention to be aware of one's own health (70.5%). The main reasons for not doing so were absence of conspicuous skin conditions (63.2%) and feeling healthy (59.6%). Awareness of prevention strategies recommended by the scientific community is low among affected occupationally high-risk mountain guide populations. Understanding the specific needs of this high-risk group is essential for the development of sustainable awareness and prevention strategies. © 2018 European Academy of Dermatology and Venereology.
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2011 CFR
2011-01-01
... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2010 CFR
2010-01-01
... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning..., risk management, and contingency planning. (b) Provide the Federal information systems security...
Kohli, Charu; Gupta, Kalika; Banerjee, Bratati; Ingle, Gopal Krishna
2017-05-01
World population of elderly is increasing at a fast pace. The number of elderly in India has increased by 54.77% in the last 15 years. A number of social security measures have been taken by Indian government. To assess awareness, utilization and barriers faced while utilizing social security schemes by elderly in a secondary care hospital situated in a rural area in Delhi, India. A cross-sectional study was conducted among 360 individuals aged 60 years and above in a secondary care hospital situated in a rural area in Delhi. A pre-tested, semi-structured schedule prepared in local language was used. Data was analysed using SPSS software (version 17.0). Chi-square test was used to observe any statistical association between categorical variables. The results were considered statistically significant if p-value was less than 0.05. A majority of study subjects were females (54.2%), Hindu (89.7%), married (60.3%) and were not engaged in any occupation (82.8%). Awareness about Indira Gandhi National Old Age Pension Scheme (IGNOAPS) was present among 286 (79.4%) and Annapurna scheme in 193 (53.6%) subjects. Among 223 subjects who were below poverty line, 179 (80.3%) were aware of IGNOAPS; while, 112 (50.2%) were utilizing the scheme. There was no association of awareness with education status, occupation, religion, family type, marital status and caste (p>0.05). Corruption and tedious administrative formalities were major barriers reported. Awareness generation, provision of information on how to approach the concerned authority for utilizing the scheme and ease of administrative procedures should be an integral part of any social security scheme or measure. In the present study, about 79.4% of elderly were aware and 45% of the eligible subjects were utilizing pension scheme. Major barriers reported in utilization of schemes were corruption and tedious administrative procedures.
Social Security Measures for Elderly Population in Delhi, India: Awareness, Utilization and Barriers
Kohli, Charu; Banerjee, Bratati; Ingle, Gopal Krishna
2017-01-01
Introduction World population of elderly is increasing at a fast pace. The number of elderly in India has increased by 54.77% in the last 15 years. A number of social security measures have been taken by Indian government. Aim To assess awareness, utilization and barriers faced while utilizing social security schemes by elderly in a secondary care hospital situated in a rural area in Delhi, India. Materials and Methods A cross-sectional study was conducted among 360 individuals aged 60 years and above in a secondary care hospital situated in a rural area in Delhi. A pre-tested, semi-structured schedule prepared in local language was used. Data was analysed using SPSS software (version 17.0). Chi-square test was used to observe any statistical association between categorical variables. The results were considered statistically significant if p-value was less than 0.05. Results A majority of study subjects were females (54.2%), Hindu (89.7%), married (60.3%) and were not engaged in any occupation (82.8%). Awareness about Indira Gandhi National Old Age Pension Scheme (IGNOAPS) was present among 286 (79.4%) and Annapurna scheme in 193 (53.6%) subjects. Among 223 subjects who were below poverty line, 179 (80.3%) were aware of IGNOAPS; while, 112 (50.2%) were utilizing the scheme. There was no association of awareness with education status, occupation, religion, family type, marital status and caste (p>0.05). Corruption and tedious administrative formalities were major barriers reported. Conclusion Awareness generation, provision of information on how to approach the concerned authority for utilizing the scheme and ease of administrative procedures should be an integral part of any social security scheme or measure. In the present study, about 79.4% of elderly were aware and 45% of the eligible subjects were utilizing pension scheme. Major barriers reported in utilization of schemes were corruption and tedious administrative procedures. PMID:28658811
2015-07-27
devastated parts of Japan and damaged the Fukushima Daiichi nuclear power station, the U.S. military was able to deploy state-of-the-art maritime...capacity and interagency coordination to help improve their maritime domain awareness . The Department also is working with Indonesia to increase its...Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other
Phonemic Awareness: A Step by Step Approach for Success in Early Reading
ERIC Educational Resources Information Center
Perez, Idalia Rodriguez
2008-01-01
This guide will help teach phonemic awareness to Pre K-3 students. It presents phonemic awareness as a sophisticated branch of phonological awareness through interactive activities that allows the student to succeed in learning the sounds represented by the letters of the alphabet. The book is designed to provide easy-to-follow suggestions for:…
ERIC Educational Resources Information Center
Tucker, Bill
2012-01-01
As a state legislator, you're well aware of the fiscal pressures that have caused many states to change their pension systems. But you should also be aware of the impact that pension reform has on public education. This brief guide shows you how and why pension programs affect your state's efforts to attract and retain the best teachers. It…
Environmental Awareness (Sensory Awareness).
ERIC Educational Resources Information Center
Carpenter, Marian
Capitalizing on the resources available within a city block, this resource guide for the emotionally handicapped (K-6) describes methods and procedures for developing sensory awareness in the urban out-of-doors. Conceptual focus is on interdependency ("living things are interdependent"). Involvement in the environment (observing, thinking, doing)…
75 FR 35508 - Draft Regulatory Guide: Issuance, Availability
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-22
... Systems and Networks,'' requires licensees to develop cyber-security plans and programs to protect critical digital assets, including digital safety systems, from malicious cyber attacks. Regulatory Guide 5.71, ``Cyber Security Programs for Nuclear Facilities,'' provides guidance to meet the requirements of...
77 FR 65048 - Privacy Act; System of Records: Personal Property Claims, State-27
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-24
... cyber security awareness training which covers the procedures for handling Sensitive but Unclassified... Property Claims. SECURITY CLASSIFICATION: Unclassified. SYSTEM LOCATION: Department of State, SA-3, Suite... which can include information such as names, birthdates, social security numbers (SSNs), employee IDs...
Assessing staff attitudes towards information security in a European healthcare establishment.
Furnell, S M; Gaunt, P N; Holben, R F; Sanders, P W; Stockel, C T; Warren, M J
1996-01-01
Information security is now recognized as an important consideration in modern healthcare establishments (HCEs), with a variety of guidelines and standards currently available to enable the environments to be properly protected. However, financial and operational constraints often exist which influence the practicality of these recommendations. This paper establishes that the staff culture of the organization is of particular importance in determining the level and types of security that will be accepted. This culture will be based upon staff awareness of and attitudes towards security and it is, therefore, important to have a clear idea of what these attitudes are. To this end, two surveys have been conducted within a reference environment to establish the attitudes of general users and technical staff, allowing the results to be fed back to HCE management to enable security policy to be appropriately defined. These results indicated that, although the establishment had participated in a European healthcare security initiative, staff attitudes and awareness were still weak in some areas.
Context aware adaptive security service model
NASA Astrophysics Data System (ADS)
Tunia, Marcin A.
2015-09-01
Present systems and devices are usually protected against different threats concerning digital data processing. The protection mechanisms consume resources, which are either highly limited or intensively utilized by many entities. The optimization of these resources usage is advantageous. The resources that are saved performing optimization may be utilized by other mechanisms or may be sufficient for longer time. It is usually assumed that protection has to provide specific quality and attack resistance. By interpreting context situation of business services - users and services themselves, it is possible to adapt security services parameters to countermeasure threats associated with current situation. This approach leads to optimization of used resources and maintains sufficient security level. This paper presents architecture of adaptive security service, which is context-aware and exploits quality of context data issue.
2002-02-01
NVLAP procedures are compatible with, among others, the most recent official publications of ISO / IEC 17025 (formally ISO / IEC Guide 25), ISO Guides 2, 30... IEC Guide 17025 and the relevant requirements of ISO 9002-1994. NVLAP Handbook 150-20 contains information that is specific to Common Criteria...Evaluation Technical Report EAP Evaluation Acceptance Package IEC International Electrotechnical Commission ISO International
ERIC Educational Resources Information Center
Johnson, David P.
2017-01-01
The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human…
2017-04-13
Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be...policy, and law . The research question is whether the Departments of Homeland Security (DHS) and Defense (DOD) have federal statutory authority to... law ); Department of Homeland Security; Department of Defense; establish standards; physical protection and security; national security 16. SECURITY
NASA Technical Reports Server (NTRS)
Burgess, Kevin (Inventor); Yakos, David (Inventor); Walthall, Bryan (Inventor)
2012-01-01
A stemless ball valve comprising: a right flange; left flange; ball with an axis pin and two travel pins; ball seal on either side of the ball; guide sleeve with inner walls comprising two channels; cartridge guide holder; inner magnetic cartridge; and outer magnetic cartridge. The ball is situated inside of the guide sleeve, and a travel pin is located in each of the two channels. The guide sleeve is situated inside of the cartridge guide holder, which is located adjacent to and outside of the inner magnetic cartridge and secured to the inner magnetic cartridge such that when the inner magnetic cartridge rotates, the cartridge guide holder also rotates. The cartridge guide holder is secured to the guide sleeve such that when the cartridge guide holder rotates, the travel pins move within the channels in the inner walls of the guide sleeve, thereby causing the ball to rotate.
Attending to Nuanced Emotions: Fostering Supervisees' Emotional Awareness and Complexity
ERIC Educational Resources Information Center
Tangen, Jodi L.
2017-01-01
There is limited supervision research exploring how supervisees learn emotional awareness and complexity. In this article, the 5 levels of emotional awareness and 3 aspects of emotional complexity are explored in light of the supervision enterprise. In addition, 2 supervision intervention guides and a case example are provided.
Governance: The Mission Ingredient in Security Cooperation
2017-06-09
assistance guiding principle of “do-no-harm,” should be included in the future DOS guidance. Seven do-no-harm lessons include: (1) norms and... principle of “do-no-harm.” 15. SUBJECT TERMS Security cooperation, security assistance, defense institution building, USAID, best practices...foreign assistance guiding principle of “do-no-harm,” should be included in the future DOS guidance. Seven do-no-harm lessons include: (1) norms and
14 CFR 1203.408 - Assistance by installation security classification officers.
Code of Federal Regulations, 2011 CFR
2011-01-01
... ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.408 Assistance by installation security classification officers. Installation Security Classification Officers, as the... 14 Aeronautics and Space 5 2011-01-01 2010-01-01 true Assistance by installation security...
14 CFR 1203.408 - Assistance by installation security classification officers.
Code of Federal Regulations, 2010 CFR
2010-01-01
... ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.408 Assistance by installation security classification officers. Installation Security Classification Officers, as the... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Assistance by installation security...
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice.
Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim
2016-06-15
Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.
49 CFR 1552.21 - Scope and definitions.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.21 Scope and definitions. (a) Scope. This subpart applies to flight schools that provide instruction under 49 U.S.C. Subtitle VII, Part A, in the operation of aircraft or aircraft simulators, and to...
49 CFR 1552.21 - Scope and definitions.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.21 Scope and definitions. (a) Scope. This subpart applies to flight schools that provide instruction under 49 U.S.C. Subtitle VII, Part A, in the operation of aircraft or aircraft simulators, and to...
49 CFR 1552.21 - Scope and definitions.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.21 Scope and definitions. (a) Scope. This subpart applies to flight schools that provide instruction under 49 U.S.C. Subtitle VII, Part A, in the operation of aircraft or aircraft simulators, and to...
49 CFR 1552.21 - Scope and definitions.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.21 Scope and definitions. (a) Scope. This subpart applies to flight schools that provide instruction under 49 U.S.C. Subtitle VII, Part A, in the operation of aircraft or aircraft simulators, and to...
49 CFR 1552.21 - Scope and definitions.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.21 Scope and definitions. (a) Scope. This subpart applies to flight schools that provide instruction under 49 U.S.C. Subtitle VII, Part A, in the operation of aircraft or aircraft simulators, and to...
National Aeronautics and Space Administration's (NASA) Automated Information Security Handbook
NASA Technical Reports Server (NTRS)
Roback, E.
1991-01-01
The NASA Automated Information Security Handbook provides NASA's overall approach to automated information systems security including discussions of such aspects as: program goals and objectives, assignment of responsibilities, risk assessment, foreign national access, contingency planning and disaster recovery, awareness training, procurement, certification, planning, and special considerations for microcomputers.
A Study on Corporate Security Awareness and Compliance Behavior Intent
ERIC Educational Resources Information Center
Clark, Christine Y.
2013-01-01
Understanding the drivers to encourage employees' security compliance behavior is increasingly important in today's highly networked environment to protect computer and information assets of the company. The traditional approach for corporations to implement technology-based controls, to prevent security breaches is no longer sufficient.…
Using SysML to model complex systems for security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cano, Lester Arturo
2010-08-01
As security systems integrate more Information Technology the design of these systems has tended to become more complex. Some of the most difficult issues in designing Complex Security Systems (CSS) are: Capturing Requirements: Defining Hardware Interfaces: Defining Software Interfaces: Integrating Technologies: Radio Systems: Voice Over IP Systems: Situational Awareness Systems.
ERIC Educational Resources Information Center
Sauls, Jeff; Gudigantala, Naveen
2013-01-01
Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…
Implementing healthcare information security: standards can help.
Orel, Andrej; Bernik, Igor
2013-01-01
Using widely spread common approaches to systems security in health dedicated controlled environments, a level of awareness, confidence and acceptance of relevant standardisation is evaluated. Patients' information is sensitive, so putting appropriate organisational techniques as well as modern technology in place to secure health information is of paramount importance. Mobile devices are becoming the top priorities in advanced information security planning with healthcare environments being no exception. There are less and less application areas in healthcare without having a need for a mobile functionality which represents an even greater information security challenge. This is also true in emergency treatments, rehabilitation and homecare just to mention a few areas outside hospital controlled environments. Unfortunately quite often traditional unsecured communications principles are still in routine use for communicating sensitive health related information. The security awareness level with users, patients and care professionals is not high enough so potential threats and risks may not be addressed and the respective information security management is therefore weak. Standards like ISO/IEC 27000 ISMS family, the ISO/IEC 27799 information security guidelines in health are often not well known, but together with legislation principles such as HIPAA, they can help.
Mobile Device Security: Perspectives of Future Healthcare Workers
Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander
2017-01-01
Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients’ protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students’ perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants’ perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority. PMID:28566992
Mobile Device Security: Perspectives of Future Healthcare Workers.
Hewitt, Barbara; Dolezel, Diane; McLeod, Alexander
2017-01-01
Healthcare data breaches on mobile devices continue to increase, yet the healthcare industry has not adopted mobile device security standards. This increase is disturbing because individuals are often accessing patients' protected health information on personal mobile devices, which could lead to a data breach. This deficiency led the researchers to explore the perceptions of future healthcare workers regarding mobile device security. To determine healthcare students' perspectives on mobile device security, the investigators designed and distributed a survey based on the Technology Threat Avoidance Theory. Three hundred thirty-five students participated in the survey. The data were analyzed to determine participants' perceptions about security threats, effectiveness and costs of safeguards, self-efficacy, susceptibility, severity, and their motivation and actions to secure their mobile devices. Awareness of interventions to protect mobile devices was also examined. Results indicate that while future healthcare professionals perceive the severity of threats to their mobile data, they do not feel personally susceptible. Additionally, participants were knowledgeable about security safeguards, but their knowledge of costs and problems related to the adoption of these measures was mixed. These findings indicate that increasing security awareness of healthcare professionals should be a priority.
Design and Implementation of Context-Aware Musuem Guide Agents
NASA Astrophysics Data System (ADS)
Satoh, Ichiro
This paper presents an agent-based system for building and operating context-aware services in public spaces, including museums. The system provides users with agents and detects the locations of users and deploys location-aware user-assistant agents at computers near the their current locations by using active RFID-tags. When a visitor moves between exhibits in a museum, this dynamically deploys his/her agent at the computers close to the exhibits by using mobile agent technology. It annotates the exhibits in his/her personalized form and navigate him/her user to the next exhibits along his/her routes. It also introduces user movement as a natural approach to interacting between users and agents. To demonstrate the utility and effectiveness of the system, we constructed location/user-aware visitor-guide services and experimented them for two weeks in a public museum.
ERIC Educational Resources Information Center
Alberta Dept. of Agriculture, Edmonton.
Intended as an activities and resource guide for the Outdoorsman Project, this leader's guide supports the project's objectives of providing opportunities for each 4-H member to experience practical and real situations in the outdoors, instilling an appreciation of the environment in the participants, and encouraging environmental awareness. The…
ERIC Educational Resources Information Center
Dewey, Connie; Aaron, Bonnie; Miller, Cathy
2012-01-01
This report describes a problem-based learning project focusing on superintendents' awareness of literature-based best practices in supporting student attendance. The project focused on two guiding questions: Do educational leaders have awareness of literature-based practices and strategies that increase student attendance? Do educational…
17 CFR 240.17g-4 - Prevention of misuse of material nonpublic information.
Code of Federal Regulations, 2010 CFR
2010-04-01
... otherwise benefiting from any transaction in securities or money market instruments when the person is aware... services that affects the securities or money market instruments; and (3) The inappropriate dissemination...
Addressing the Economic Security Issues Facing Same-Sex Couples.
ERIC Educational Resources Information Center
Dolan, Elizabeth M.; Stum, Marlene S.; Rupured, Michael
1999-01-01
Provides educators and researchers with an awareness of the financial security issues faced by same-sex couples and offers suggestions for incorporating the discussion of these ideas into existing curricula and research. (Author/JOW)
Uncertainty and Risk Management in Cyber Situational Awareness
NASA Astrophysics Data System (ADS)
Li, Jason; Ou, Xinming; Rajagopalan, Raj
Handling cyber threats unavoidably needs to deal with both uncertain and imprecise information. What we can observe as potential malicious activities can seldom give us 100% confidence on important questions we care about, e.g. what machines are compromised and what damage has been incurred. In security planning, we need information on how likely a vulnerability can lead to a successful compromise to better balance security and functionality, performance, and ease of use. These information are at best qualitative and are often vague and imprecise. In cyber situational awareness, we have to rely on such imperfect information to detect real attacks and to prevent an attack from happening through appropriate risk management. This chapter surveys existing technologies in handling uncertainty and risk management in cyber situational awareness.
Integrating Programming Language and Operating System Information Security Mechanisms
2016-08-31
suggestions for reducing the burden, to the Department of Defense, Executive Service Directorate (0704-0188). Respondents should be aware that...improve the precision of security enforcement, and to provide greater assurance of information security. This grant focuses on two key projects: language...based control of authority; and formal guarantees for the correctness of audit information. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17
Developing the security culture at the SEISMED Reference Centres.
Fowler, J
1996-01-01
The paper gives a brief summary of the SEISMED project and the particular role played by the Reference Centres. Details are given of the hardware and application systems in use in the Royal Hospitals (NHS) Trust (RHT), one of the SEISMED Reference Centres. It proposes, without verification, a definition of a Security Culture based on three criteria. These are suggested to be the "Awareness" the "Acceptance" and the "Actions" of the management and staff to improve Information Systems Security throughout the RHT. The way that "Awareness" was increased is shown by the specific initiatives commenced as a result of a CRAMM Risk Analysis and the management and staff training programmes. The specific initiatives mentioned include, an Information Systems Security Policy, a contingency and disaster recovery plan, improvements in the physical protection of equipment and changes to the method of access control. The "Acceptance" by the staff of these measures is considered and the success or failure of "Developing A Security Culture" examined. The role of SEISMED in this process is assessed.
ERIC Educational Resources Information Center
Kim, Philip
2010-01-01
Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization's information assets. Many financial…
The Handbook for Campus Safety and Security Reporting. 2016 Edition
ERIC Educational Resources Information Center
US Department of Education, 2016
2016-01-01
Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…
DOT National Transportation Integrated Search
2007-01-03
This report is the thirs in a series describing the development of performance measures pertaining to the security of the maritime transportation network (port security metrics). THe development of measures to guide improvements in maritime security ...
Impact of awareness of the Japanese Food Guide Spinning Top on eating behaviour.
Takaizumi, Kanae; Harada, Kazuhiro; Shibata, Ai; Nakamura, Yoshio
2012-03-01
To investigate whether awareness of the Japanese Food Guide (JFG) can promote changes in eating behaviour. A longitudinal study was conducted in 2007 and 2009 by means of an Internet-based survey. Awareness status of the JFG and a sixteen-item scale for calculating eating behaviour scores were obtained. Japan. In total, 787 Japanese adults (20-59 years) who registered with an Internet research service organization were included in the study. The respondents were divided into three groups. The respondents who were aware of the JFG in 2007 were categorized into Group 1. Those who were not aware of the JFG in 2007 were categorized into either Group 2 or Group 3. Group 2 became aware of the JFG by 2009, and Group 3 was not aware of the JFG in 2009. In Group 2, the eating behaviour score increased significantly by 0·8 points from 4·7 in 2007 to 5·5 in 2009 (P = 0·004). The eating behaviour score of Group 1 (6·5 points in 2007; 6·3 points in 2009) and Group 3 (3·8 points in 2007; 4·1 points in 2009) did not change significantly from 2007 to 2009. Awareness of the JFG promoted eating behaviour change in the Japanese population. The results indicate that awareness of nutrition information from sources such as the JFG would promote healthy eating.
32 CFR 2001.15 - Classification guides.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Classification guides. 2001.15 Section 2001.15..., NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Classification § 2001.15 Classification guides. (a) Preparation of classification guides. Originators of classification...
32 CFR 2001.15 - Classification guides.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 6 2012-07-01 2012-07-01 false Classification guides. 2001.15 Section 2001.15..., NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Classification § 2001.15 Classification guides. (a) Preparation of classification guides. Originators of classification...
32 CFR 2001.15 - Classification guides.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 6 2014-07-01 2014-07-01 false Classification guides. 2001.15 Section 2001.15..., NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Classification § 2001.15 Classification guides. (a) Preparation of classification guides. Originators of classification...
32 CFR 2001.15 - Classification guides.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Classification guides. 2001.15 Section 2001.15..., NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Classification § 2001.15 Classification guides. (a) Preparation of classification guides. Originators of classification...
32 CFR 2001.15 - Classification guides.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Classification guides. 2001.15 Section 2001.15..., NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Classification § 2001.15 Classification guides. (a) Preparation of classification guides. Originators of classification...
Healthy Water Healthy People Water Quality Educators Guide
ERIC Educational Resources Information Center
Project WET Foundation, 2003
2003-01-01
This 200-page activity guide for educators of students in grades six through university level raises the awareness and understanding of water quality issues and their relationship to personal, public and environmental health. "Healthy Water Healthy People Water Quality Educators Guide" will help educators address science standards through 25…
Nebraska Secondary Bicycle Program Guide.
ERIC Educational Resources Information Center
Tichenor, Fred E.
Provided is a secondary education bicycle program guide designed for use in a general bicycle awareness course or as part of a driver education course. Chapter 1 of the guide contains the course objectives (psychomotor, cognitive, and affective) and a course outline organized into eight lessons. Each lesson lists lesson objectives, student…
Women's History Curriculum Guide.
ERIC Educational Resources Information Center
Ruthsdotter, Mary, Ed.; Eisenberg, Bonnie, Ed.
This curriculum guide is designed to facilitate teachers' first efforts to introduce information about women in U.S. history. The guide promotes a multicultural awareness of women's history beginning with the Native Americans and proceeding to current issues of diversity. Activities are divided for grades 1-6 and 7-12 but may be adapted as…
ERIC Educational Resources Information Center
Fairleigh Dickinson Univ., Rutherford, NJ.
Part of a manufacturing cluster series which addresses itself to career awareness, orientation, exploration, and preparation, this guide and its accompanying student manual were written as a direct followup of the instructor's guide and student manual titled "Exploring Manufacturing Occupations." Four major sections are included. The first section…
Graphic Communications. Curriculum Guide.
ERIC Educational Resources Information Center
North Dakota State Board for Vocational Education, Bismarck.
This guide provides the basic foundation to develop a one-semester course based on the cluster concept, graphic communications. One of a set of six guides for an industrial arts curriculum at the junior high school level, it suggests exploratory experiences designed to (1) develop an awareness and understanding of the drafting and graphic arts…
Career Awareness K-6: Dictionary of Occupational Titles.
ERIC Educational Resources Information Center
Shipp, Jeanetta C.
The occupational handbook, although useful independently, is designed to be used with the career awareness guide "I Can Be Me from A to Z." The handbook is intended to aid pupils in elementary school to become aware of the occupational clusters they will be studying in more depth during junior and senior high school. The publication focuses…
Diversity Awareness for K-6 Teachers: The Impact on Student Learning
ERIC Educational Resources Information Center
McLeod, Rona Leach
2011-01-01
"Diversity Awareness for K-6 Teachers: The Impact on Student Learning" is a resource guide for elementary teachers and college-level student teachers for teaching diversity awareness across the various areas of content. It contains many exciting activities teachers can use to enhance learning while making learning and teaching fun and exciting.…
A Heuristic Algorithm for Planning Personalized Learning Paths for Context-Aware Ubiquitous Learning
ERIC Educational Resources Information Center
Hwang, Gwo-Jen; Kuo, Fan-Ray; Yin, Peng-Yeng; Chuang, Kuo-Hsien
2010-01-01
In a context-aware ubiquitous learning environment, learning systems can detect students' learning behaviors in the real-world with the help of context-aware (sensor) technology; that is, students can be guided to observe or operate real-world objects with personalized support from the digital world. In this study, an optimization problem that…
Encouraging Refugee Awareness in the Classroom: A Guide for Teachers. Issue Paper.
ERIC Educational Resources Information Center
DeCarlo, Jacqueline; Hamilton, Virginia, Ed.
This lesson packet focuses on the growing situation of refugees and cultural awareness. In the document are definitions of terms, suggestions for infusing lessons on the refugees into the curriculum, and resource information. One of the purposes of working to create refugee awareness is to help ordinary students become extraordinary citizens of…
32 CFR 2700.22 - Classification guides.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 6 2012-07-01 2012-07-01 false Classification guides. 2700.22 Section 2700.22... SECURITY INFORMATION REGULATIONS Derivative Classification § 2700.22 Classification guides. OMSN shall issue classification guides pursuant to section 2-2 of E.O. 12065. These guides, which shall be used to...
32 CFR 2700.22 - Classification guides.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 6 2014-07-01 2014-07-01 false Classification guides. 2700.22 Section 2700.22... SECURITY INFORMATION REGULATIONS Derivative Classification § 2700.22 Classification guides. OMSN shall issue classification guides pursuant to section 2-2 of E.O. 12065. These guides, which shall be used to...
32 CFR 2700.22 - Classification guides.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Classification guides. 2700.22 Section 2700.22... SECURITY INFORMATION REGULATIONS Derivative Classification § 2700.22 Classification guides. OMSN shall issue classification guides pursuant to section 2-2 of E.O. 12065. These guides, which shall be used to...
32 CFR 2700.22 - Classification guides.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Classification guides. 2700.22 Section 2700.22... SECURITY INFORMATION REGULATIONS Derivative Classification § 2700.22 Classification guides. OMSN shall issue classification guides pursuant to section 2-2 of E.O. 12065. These guides, which shall be used to...
Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice
Javed, Muhammad Awais; Ben Hamida, Elyes; Znaidi, Wassim
2016-01-01
Connecting vehicles securely and reliably is pivotal to the implementation of next generation ITS applications of smart cities. With continuously growing security threats, vehicles could be exposed to a number of service attacks that could put their safety at stake. To address this concern, both US and European ITS standards have selected Elliptic Curve Cryptography (ECC) algorithms to secure vehicular communications. However, there is still a lack of benchmarking studies on existing security standards in real-world settings. In this paper, we first analyze the security architecture of the ETSI ITS standard. We then implement the ECC based digital signature and encryption procedures using an experimental test-bed and conduct an extensive benchmark study to assess their performance which depends on factors such as payload size, processor speed and security levels. Using network simulation models, we further evaluate the impact of standard compliant security procedures in dense and realistic smart cities scenarios. Obtained results suggest that existing security solutions directly impact the achieved quality of service (QoS) and safety awareness of vehicular applications, in terms of increased packet inter-arrival delays, packet and cryptographic losses, and reduced safety awareness in safety applications. Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities. PMID:27314358
Activity Learning as a Foundation for Security Monitoring in Smart Homes.
Dahmen, Jessamyn; Thomas, Brian L; Cook, Diane J; Wang, Xiaobo
2017-03-31
Smart environment technology has matured to the point where it is regularly used in everyday homes as well as research labs. With this maturation of the technology, we can consider using smart homes as a practical mechanism for improving home security. In this paper, we introduce an activity-aware approach to security monitoring and threat detection in smart homes. We describe our approach using the CASAS smart home framework and activity learning algorithms. By monitoring for activity-based anomalies we can detect possible threats and take appropriate action. We evaluate our proposed method using data collected in CASAS smart homes and demonstrate the partnership between activity-aware smart homes and biometric devices in the context of the CASAS on-campus smart apartment testbed.
2008-06-01
183 14. Ethical Issues in War: An Overview Martin L. Cook...185 15. Ethics and War in Comparative Religious Perspective...be guided by values and ethics with the intent of doing some type of good for parts of the international system, or the overall system in general
Integrated situational awareness for cyber attack detection, analysis, and mitigation
NASA Astrophysics Data System (ADS)
Cheng, Yi; Sagduyu, Yalin; Deng, Julia; Li, Jason; Liu, Peng
2012-06-01
Real-time cyberspace situational awareness is critical for securing and protecting today's enterprise networks from various cyber threats. When a security incident occurs, network administrators and security analysts need to know what exactly has happened in the network, why it happened, and what actions or countermeasures should be taken to quickly mitigate the potential impacts. In this paper, we propose an integrated cyberspace situational awareness system for efficient cyber attack detection, analysis and mitigation in large-scale enterprise networks. Essentially, a cyberspace common operational picture will be developed, which is a multi-layer graphical model and can efficiently capture and represent the statuses, relationships, and interdependencies of various entities and elements within and among different levels of a network. Once shared among authorized users, this cyberspace common operational picture can provide an integrated view of the logical, physical, and cyber domains, and a unique visualization of disparate data sets to support decision makers. In addition, advanced analyses, such as Bayesian Network analysis, will be explored to address the information uncertainty, dynamic and complex cyber attack detection, and optimal impact mitigation issues. All the developed technologies will be further integrated into an automatic software toolkit to achieve near real-time cyberspace situational awareness and impact mitigation in large-scale computer networks.
ERIC Educational Resources Information Center
Stevenson, Jill L.; Moore, Dale A.; Newman, Jerry; Schmidt, Janet L.; Smith, Sarah M.; Smith, Jean; Kerr, Susan; Wallace, Michael; BoyEs, Pat
2011-01-01
4-H livestock projects present disease transmission risks that can be reduced by the use of bio-security practices. The responsibility of teaching bio-security to youth belongs primarily to volunteer leaders, who may not be aware of the importance of these practices. A needs assessment for an online educational module about bio-security revealed…
Visual-motor recalibration in geographical slant perception
NASA Technical Reports Server (NTRS)
Bhalla, M.; Proffitt, D. R.; Kaiser, M. K. (Principal Investigator)
1999-01-01
In 4 experiments, it was shown that hills appear steeper to people who are encumbered by wearing a heavy backpack (Experiment 1), are fatigued (Experiment 2), are of low physical fitness (Experiment 3), or are elderly and/or in declining health (Experiment 4). Visually guided actions are unaffected by these manipulations of physiological potential. Although dissociable, the awareness and action systems were also shown to be interconnected. Recalibration of the transformation relating awareness and actions was found to occur over long-term changes in physiological potential (fitness level, age, and health) but not with transitory changes (fatigue and load). Findings are discussed in terms of a time-dependent coordination between the separate systems that control explicit visual awareness and visually guided action.
Learner Centric in M-Learning: Integration of Security, Dependability and Trust
ERIC Educational Resources Information Center
Mahalingam, Sheila; Abdollah, Faizal Mohd; Sahib, Shahrin
2014-01-01
The paper focus on learner centric attributes in a m-learning environment encounters the security measurements. In order to build up a systematic threat and countermeasure for protecting the learners as well as providing awareness and satisfaction in utilizing the mobile learning system, a security model need to be overhauled. The brief literature…
39 CFR 267.3 - Responsibility.
Code of Federal Regulations, 2013 CFR
2013-07-01
... UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.3... custodians are responsible for insuring that information security standards and procedures are followed and that all relevant employees participate in the information security awareness programs. [40 FR 45726...
39 CFR 267.3 - Responsibility.
Code of Federal Regulations, 2012 CFR
2012-07-01
... UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.3... custodians are responsible for insuring that information security standards and procedures are followed and that all relevant employees participate in the information security awareness programs. [40 FR 45726...
39 CFR 267.3 - Responsibility.
Code of Federal Regulations, 2011 CFR
2011-07-01
... UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.3... custodians are responsible for insuring that information security standards and procedures are followed and that all relevant employees participate in the information security awareness programs. [40 FR 45726...
39 CFR 267.3 - Responsibility.
Code of Federal Regulations, 2014 CFR
2014-07-01
... UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.3... custodians are responsible for insuring that information security standards and procedures are followed and that all relevant employees participate in the information security awareness programs. [40 FR 45726...
39 CFR 267.3 - Responsibility.
Code of Federal Regulations, 2010 CFR
2010-07-01
... UNITED STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.3... custodians are responsible for insuring that information security standards and procedures are followed and that all relevant employees participate in the information security awareness programs. [40 FR 45726...
33 CFR 150.602 - What occupational awareness training is required?
Code of Federal Regulations, 2011 CFR
2011-07-01
... safety and health, the implementation of an approved, port-specific safety and environmental management... HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Workplace Safety and Health Safety and Health (general) § 150.602 What occupational awareness training is required? (a) Each...
ERIC Educational Resources Information Center
Allen, Archibald; Hailey, Pleasant L., Jr.
This instructor's manual contains job analysis and training curriculum for the positions of Resident Selection and Occupancy Trainee, Resident Security Aide, Resident Security Officer, Security Officer II, and Community Security Aide. The two sections of the manual and their parts are as follows: Section I: A Model Curriculum for Resident…
ERIC Educational Resources Information Center
Cummings, E. Mark
2003-01-01
Advocates renewed efforts toward assessing attachment on a single continuum of emotional security. Contends that theory is essential to guide attachment assessment and that the constructs of secure base and emotional security provide the needed conceptual foundation. Addresses challenges to the scoring of attachment on a security continuum.…
Transboundary natural area protection: Broadening the definition of national security
Haven B. Cook
2007-01-01
This paper looks at the definition and concept of national security, and examines how the environment is linked with national security. The traditional, state view of national security that guides most foreign policy includes the concepts of military power, sovereignty and geopolitical stability. This paper advocates broadening the definition of security to include...
Teaching Global Awareness Using the Media. Grades 6-12, Global Awareness Series.
ERIC Educational Resources Information Center
Lamy, Steven L.; And Others
This teaching guide on global awareness contains 15 media-related activities for students in grades 6-12. The objective is to help students see how the media affect their opinions and the roles the media plays in world affairs. The activities are divided into five sections. The first section contains a general survey of the students' knowledge of…
A Guide to Drug Abuse Education and Information Materials, 1972.
ERIC Educational Resources Information Center
National Inst. of Mental Health (DHEW), Rockville, MD.
This guide was developed from efforts initiated by the National Institute of Mental Health (NIMH) to inform and educate the public about drug abuse beginning in April, 1969. At that time, NIMH produced television spots, radio announcements, newspaper and magazine ads, films, and general awareness publications. This guide was developed to make…
Proactive Guide for the Threat of Terrorism in Schools.
ERIC Educational Resources Information Center
Texas School Safety Center, San Marcos.
Although American schools have not been targeted for terrorist activity, circumstances do warrant that schools adopt a heightened state of awareness. This guide addresses the potential for terrorist activity within the context of September 11, 2001, and the new reality America faces. A significant portion of the information in this guide was…
Teen Drinking Prevention Program: Teen Action Guide.
ERIC Educational Resources Information Center
Substance Abuse and Mental Health Services Administration (DHHS/PHS), Rockville, MD. Center for Substance Abuse Prevention.
This guide was designed to help teenagers become involved in fun, alcohol-free activities. It provides youth with ideas on how to influence and change the factors that encourage teenage drinking. The guide has four purposes: (1) raise public awareness of the underage drinking crisis; (2) change community norms that encourage underage drinking; (3)…
Native Americans of Washington State (A Curriculum Guide for Elementary Grades). First Edition.
ERIC Educational Resources Information Center
Forsyth, Karen Williams; Neal, Colleen
Developed as a supplemental curriculum guide for elementary teachers, the guide assists in implementing Native American activities to classroom curriculum to make students aware of the numerous tribes within the state of Washington. Divided in three geographic, cultural areas (Northwest Coast region, Puget Sound Lowlands region, and Plateau…
MECCA (Making Equity Count for Classroom Achievement). Utah Gender Equity Curriculum Guide.
ERIC Educational Resources Information Center
Utah State Office of Education, Salt Lake City.
This gender equity trainer's guide has three purposes: to raise awareness in Utah's preservice and inservice teachers of harmful, often unconscious, behaviors; to encourage gender fairness; and to help teachers develop strategies that result in gender fairness in schools. The guide contains 12 modules of instruction that cover the following…
Exploring Manufacturing Occupations. Instructor's Guide. The Manufacturing Cluster.
ERIC Educational Resources Information Center
Fairleigh Dickinson Univ., Rutherford, NJ.
The major focus of this guide and its accompanying student manual (CE 010 397) is to help the student understand the manufacturing enterprise. (The guide and student manual are part of a manufacturing cluster series which addresses itself to career awareness, orientation, exploration, and preparation.) Seven sections are included. An overview of…
5 CFR 930.301 - Information systems security awareness training program.
Code of Federal Regulations, 2012 CFR
2012-01-01
... training in system/application life cycle management, risk management, and contingency planning. (4) Chief... security management, system/application life cycle management, risk management, and contingency planning... management; and management and implementation level training in system/application life cycle management...
Security Recommendations for mHealth Apps: Elaboration of a Developer's Guide.
Morera, Enrique Pérez; de la Torre Díez, Isabel; Garcia-Zapirain, Begoña; López-Coronado, Miguel; Arambarri, Jon
2016-06-01
Being the third fastest-growing app category behind games and utilities, mHealth apps are changing the healthcare model, as medicine today involves the data they compile and analyse, information known as Big Data. However, the majority of apps are lacking in security when gathering and dealing with the information, which becomes a serious problem. This article presents a guide regarding security solution, intended to be of great use for developers of mHealth apps. In August 2015 current mobile health apps were sought out in virtual stores such as Android Google Play, Apple iTunes App Store etc., in order to classify them in terms of usefulness. After this search, the most widespread weaknesses in the field of security in the development of these mobile apps were examined, based on sources such as the "OWASP Mobile Security Project, the initiative recently launched by the Office of Civil Rights (OCR), and other articles of scientific interest. An informative, elemental guide has been created for the development of mHealth apps. It includes information about elements of security and its implementation on different levels for all types of mobile health apps based on the data that each app manipulates, the associated calculated risk as a result of the likelihood of occurrence and the threat level resulting from its vulnerabilities - high level (apps for monitoring, diagnosis, treatment and care) from 6 ≤ 9, medium level (calculator, localizer and alarm) from 3 ≤ 6 and low level (informative and educational apps) from 0 ≤ 3. The guide aims to guarantee and facilitate security measures in the development of mobile health applications by programmers unconnected to the ITC and professional health areas.
33 CFR 150.602 - What occupational awareness training is required?
Code of Federal Regulations, 2013 CFR
2013-07-01
... HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Workplace Safety and Health Safety and Health (general) § 150.602 What occupational awareness training is required? (a) Each deepwater port operator must ensure that all deepwater port personnel are provided with information and...
Pocket guide to transportation, 2004
DOT National Transportation Integrated Search
2004-01-01
The Bureau of Transportation Statistics compiled the data in this guide from multiple sources. The guide is divided into six sections and a glossary: (1) Transportation System Extent and Use, (2) Transportation Safety, (3) Transportation Security, (4...
Pocket guide to transportation, 2005
DOT National Transportation Integrated Search
2005-01-01
The Bureau of Transportation Statistics compiled the data in this guide from multiple sources. The guide is divided into six sections and a glossary: (1) Transportation System Extent and Use, (2) Transportation Safety, (3) Transportation Security, (4...
Pocket guide to transportation, 2003
DOT National Transportation Integrated Search
2003-01-01
The Bureau of Transportation Statistics compiled the data in this guide from multiple sources. The guide is divided into six sections and a glossary: (1) Transportation System Extent and Use, (2) Transportation Safety, (3) Transportation Security, (4...
Activity Learning as a Foundation for Security Monitoring in Smart Homes
Dahmen, Jessamyn; Thomas, Brian L.; Cook, Diane J.; Wang, Xiaobo
2017-01-01
Smart environment technology has matured to the point where it is regularly used in everyday homes as well as research labs. With this maturation of the technology, we can consider using smart homes as a practical mechanism for improving home security. In this paper, we introduce an activity-aware approach to security monitoring and threat detection in smart homes. We describe our approach using the CASAS smart home framework and activity learning algorithms. By monitoring for activity-based anomalies we can detect possible threats and take appropriate action. We evaluate our proposed method using data collected in CASAS smart homes and demonstrate the partnership between activity-aware smart homes and biometric devices in the context of the CASAS on-campus smart apartment testbed. PMID:28362342
Information Assurance and Cyber Defence (Assurance de l’information et cyberdefense)
2010-11-01
project is that knowledge exchange in a timely fashion is highly significant. Authentication and Authorisation of Users and Services in Federated...Detection, Protection and Countermeasures; • Security Models and Architectures; • Security Policies, Evaluation, Authorisation and Access Control; and...Evaluation, Authorisation and Access Control • Network and Information Security Awareness The topics for the symposium had been established
Sánchez-Henarejos, Ana; Fernández-Alemán, José Luis; Toval, Ambrosio; Hernández-Hernández, Isabel; Sánchez-García, Ana Belén; Carrillo de Gea, Juan Manuel
2014-04-01
The appearance of electronic health records has led to the need to strengthen the security of personal health data in order to ensure privacy. Despite the large number of technical security measures and recommendations that exist to protect the security of health data, there is an increase in violations of the privacy of patients' personal data in healthcare organizations, which is in many cases caused by the mistakes or oversights of healthcare professionals. In this paper, we present a guide to good practice for information security in the handling of personal health data by health personnel, drawn from recommendations, regulations and national and international standards. The material presented in this paper can be used in the security audit of health professionals, or as a part of continuing education programs in ambulatory care facilities. Copyright © 2013 Elsevier España, S.L. All rights reserved.
The Role Of Moral Awareness In Computer Security
NASA Astrophysics Data System (ADS)
Stawinski, Arthur
1984-08-01
Maintaining security of databases and other computer systems requires constraining the behavior of those persons who are able to access these systems so that they do not obtain, alter, or abuse the information contained in these systems. Three types of constraints are available: Physical contraints are obstructions designed to prevent (or at least make difficult) access to data by unauthorized persons; external constraints restrict behavior through threat of detection and punishment; internal constraints are self-imposed limitations on behavior which are derived from a person's moral standards. This paper argues that an effective computer security program will require attention to internal constraints as well as physical and external ones. Recent developments in moral philosophy and the psychology of moral development have given us new understanding of how individuals grow in moral awareness and how this growth can be encouraged. These insights are the foundation for some practical proposals for encouraging morally responsible behavior by computer professionals and others with access to confidential data. The aim of this paper is to encourage computer security professionals to discuss, refine and incorporate systems of internal constraints in developing methods of maintaining security.
Zink, Alexander; Koch, Elisabeth; Seifert, Florian; Rotter, Markus; Spinner, Christoph D; Biedermann, Tilo
2016-01-01
Nonmelanoma skin cancer (NMSC) is the most common cancer in Switzerland and Europe. The main causative factor is exposure to ultraviolet radiation, which puts outdoor workers in general at a higher risk of developing NMSC than indoor workers. However, few studies have clinically examined the risk of developing NMSC to outdoor workers, especially mountain guides. We aimed to investigate the prevalence of NMSC and corresponding precancerous lesions, and the associated risk behaviour of mountain and ski guides in order to develop future prevention programmes. We conducted a cross-sectional study including mountain and ski guides from southern Germany, who underwent a full-body skin check-up by a dermatologist. We assessed their NMSC awareness and risk behaviour using a paper-based questionnaire. Of the 62 state-certified mountain and ski guides (55 men, 7 women; mean age 52.9 ± 13.4 years) included in this study, 27 (43.5%) were diagnosed with NMSC or its premalignant stages. In addition, 59.7% of the participants expressed the opinion that their protection from ultraviolet radiation exposure needs to be improved; 83.6% requested further information on NMSC, and 48.5% had never undergone a skin check-up or consulted a dermatologist before. Mountain and ski guides are at a high risk for developing NMSC. Their unmet medical needs indicate an underestimation of NMSC prevalence, which is usually based on reports by insurance companies, and offer the chance for developing evidence-based awareness and prevention tools that can be promoted to individuals with other outdoor jobs.
Cross-Layer Damage Assessment for Cyber Situational Awareness
NASA Astrophysics Data System (ADS)
Liu, Peng; Jia, Xiaoqi; Zhang, Shengzhi; Xiong, Xi; Jhi, Yoon-Chan; Bai, Kun; Li, Jason
Damage assessment plays a very important role in securing enterprise networks and systems. Gaining good awareness about the effects and impact of cyber attack actions would enable security officers to make the right cyber defense decisions and take the right cyber defense actions. A good number of damage assessment techniques have been proposed in the literature, but they typically focus on a single abstraction level (of the software system in concern). As a result, existing damage assessment techniques and tools are still very limited in satisfying the needs of comprehensive damage assessment which should not result in any “blind spots”.
Network Access Control List Situation Awareness
ERIC Educational Resources Information Center
Reifers, Andrew
2010-01-01
Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…
76 FR 59112 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-23
... (DoD) strategy for cyberspace, --Presentation on Doctrine of Cybersecurity relating to computer... paper, ``Enabling Distributed Security in Cyberspace'', --Discussion with Cybersecurity Coordinator and... Awareness Month, --Discussion on cybersecurity with Senior Defense and Intelligence Advisor, --Discussion...
75 FR 29308 - Availability of Compliance Guide for Mobile Slaughter Units
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-25
... guide is intended for owners and managers of a new or existing red meat or poultry mobile slaughter unit... ensure that minorities, women, and persons with disabilities are aware of this notice, FSIS will announce...
Pocket guide to transportation, 2007
DOT National Transportation Integrated Search
2007-01-01
The Bureau of Transportation Statistics compiled the data in this guide from multiple sources. The guide is divided into six sections and a glossary: (1) System Extent and Use, (2) Safety, (3) Security, (4) Mobility, (5) Economy, (6) Environment, and...
Pocket guide to transportation, 2006
DOT National Transportation Integrated Search
2006-01-01
The Bureau of Transportation Statistics compiled the data in this guide from multiple sources. The guide is divided into six sections and a glossary: (1) System Extent and Use, (2) Safety, (3) Security, (4) Mobility, (5) Economy, (6) Environment, and...
Pocket guide to transportation, 2008
DOT National Transportation Integrated Search
2008-02-01
The Bureau of Transportation Statistics compiled the data in this guide from multiple sources. The guide is divided into six sections and a glossary: (1) System Extent and Use, (2) Safety, (3) Security, (4) Mobility, (5) Economy, (6) Environment, and...
ERIC Educational Resources Information Center
Global Learning, Inc., Union, NJ.
This guide seeks to provide public and school librarians with a variety of practical resources and activities for contributing to the public's understanding of major global trends and relationships that affect local communities. The guide contains four sections geared towards children, young adults, adults, and school settings. The children's…
ERIC Educational Resources Information Center
National Heart, Lung, and Blood Inst. (DHHS/NIH), Bethesda, MD.
The most recent national surveys of public awareness and knowledge of treatment and control of cardiovascular disease (CVD) show that health initiatives targeting specific populations are effective ways to support health promotion and disease prevention. Projects and activities outlined in this guide are directed to spectators at sporting events,…
ERIC Educational Resources Information Center
Missouri Univ., Columbia. Instructional Materials Lab.
This curriculum guide is designed to assist administrators and teachers of industrial arts and vocational and technical school programs with the development of a meaningful curriculum in the area of electricity and electronics. Included in the volume are curriculum guides for the following courses: Self- and Career Awareness of Electricity and…
Guide to Non-Sexist Early Childhood Education.
ERIC Educational Resources Information Center
Sprung, Barbara
This guide describes the development of a nonsexist early childhood curriculum designed to make teachers and parents more aware of the sexism existing in society and reflected in our schools. The guide is divided into six chapters: Chapter 1 presents a brief history of the Non-Sexist Child Development Project; Chapter 2 examines some of the basic…
LATIN FOR SECONDARY SCHOOLS (A GUIDE TO MINIMUM ESSENTIALS).
ERIC Educational Resources Information Center
LEAMON, M. PHILLIP; AND OTHERS
A SET OF MINIMUM ESSENTIALS FOR EACH LEVEL OF A 4-YEAR SEQUENCE OF LATIN IN SECONDARY SCHOOLS IS PRESENTED IN THIS CURRICULUM GUIDE. FOLLOWING STATEMENTS OF THE OBJECTIVES OF LATIN STUDY--READING THE LATIN OF THE GREAT ROMAN AUTHORS, ATTAINING A LINGUISTIC PROFICIENCY, AND ACQUIRING A WIDER HISTORICAL AND CULTURAL AWARENESS--THE GUIDE OUTLINES FOR…
ERIC Educational Resources Information Center
Chewonki Foundation, Wiscasset, ME.
This action guide is designed to help students and teachers become aware of the concepts and issues of waste management, and to motivate them to action in the classroom, school, home, and community. The guide emphasizes interdisciplinary activities that concentrate on the process of problem solving. Activities are identified by appropriate grade…
Wetlands & Wildlife: Alaska Wildlife Curriculum Primary Teacher's Guide K-3.
ERIC Educational Resources Information Center
Sigman, Marilyn; And Others
This curriculum guide was designed to give students at the primary level an awareness of Alaska's wetlands and the fish and wildlife that live there. This guide is divided into 13 sections consisting of learning activities covering the following topics: (1) wetland areas in Alaska; (2) water cycles; (3) plants and wildlife found in wetlands; (4)…
Software Security Knowledge: Training
2011-05-01
eliminating those erro~rs. It can be found at http:ffcwe.mitre.org/top25. Any programmer who writes C’Ode \\r-Vith~out betng aware of those proble ~ms a·nd...time on security. Ultimately, these reasons stem from an underlying problem in the software market . B~cause software is essentially a black·box, it is...security of software and start to effect change in the software market . Nevertheless, we still frequently get pushback when we advocate for security
Method of Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks
NASA Technical Reports Server (NTRS)
Baras, John S. (Inventor); Roy-Chowdhury, Ayan (Inventor)
2014-01-01
A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly.
2012-11-01
Abbreviations BPC building partner capacity DOD Department of Defense DSCA Defense Security Cooperation Agency EFTS Enhanced Freight Tracking System...SCOs are ready to receive a planned delivery. For both FMS and pseudo-FMS processes, DOD uses the Enhanced Freight Tracking System ( EFTS ), a secure...providing data for this system. The Security Assistance Management Manual recommends that SCOs use the EFTS to maintain awareness of incoming shipments
The research of computer network security and protection strategy
NASA Astrophysics Data System (ADS)
He, Jian
2017-05-01
With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.
75 FR 70342 - Privacy Act; System of Records: Equal Employment Opportunity Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-17
... users are given cyber security awareness training which covers the procedures for handling Sensitive but.... State-09 SYSTEM NAME: Equal Employment Opportunity Records. SECURITY CLASSIFICATION: Unclassified... apply to the Equal Employment Opportunity Records, State-09. DISCLOSURE TO CONSUMER REPORTING AGENCIES...
Software Development Life Cycle Security Issues
NASA Astrophysics Data System (ADS)
Kaur, Daljit; Kaur, Parminder
2011-12-01
Security is now-a-days one of the major problems because of many reasons. Security is now-a-days one of the major problems because of many reasons. The main cause is that software can't withstand security attacks because of vulnerabilities in it which are caused by defective specifications design and implementation. We have conducted a survey asking software developers, project managers and other people in software development about their security awareness and implementation in Software Development Life Cycle (SDLC). The survey was open to participation for three weeks and this paper explains the survey results.
Status of Social Engineering Awareness in Business Organizations and Colleges/Universities
ERIC Educational Resources Information Center
Hauser, Deanna Mae
2017-01-01
Social engineers manipulate individuals into divulging confidential information or compromising personal or organizational security. The purpose of this qualitative case study was to examine the potential lack of social engineering awareness that affects employees at companies in southeastern Michigan. The research method consisted of interviews…
Measurement Invariance of the Mindful Attention Awareness Scale across Adult Attachment Style
ERIC Educational Resources Information Center
Cordon, Shari L.; Finney, Sara J.
2008-01-01
In this study, the authors examine the measurement invariance of the Mindful Attention Awareness Scale (MAAS) across adult attachment style. A 1-factor model and measurement invariance was supported across groups. As predicted, latent mean differences showed that securely attached individuals reported significantly more mindfulness than did…
75 FR 1830 - Final Regulatory Guide: Issuance, Availability
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-13
... review of applications for permits and licenses. RG 5.71, ``Cyber Security Programs for Nuclear... NUCLEAR REGULATORY COMMISSION [NRC-2010-0009] Final Regulatory Guide: Issuance, Availability AGENCY: Nuclear Regulatory Commission. ACTION: Notice of Issuance and Availability of Regulatory Guide...
Mariner's guide for hurricane awareness in the North Atlantic basin.
DOT National Transportation Integrated Search
2000-08-01
This guide will hopefully aid the Mariner in understanding the complex structure and behavior of : tropical cyclones in the North Atlantic Ocean. Once armed with this knowledge, and the information : on where to acquire forecasts and guidance for cur...
Foundations for Security Aware Software Development Education
2005-11-22
depending on the budget, that support robustness. We discuss the educational customer base, projected lifetime, and complexity of paradigm shift that should...in Honour of Sir Tony Hoar, [6] Cheetham, C. and Ferraiolo, K., "The Systems Security Millenial Perspectives in Computer Science, Engineering...Capability Maturity Model", 21st 2002, 229-246. National Information Systems Security Conference, [15] Schwartz, J., "Object Oriented Extensions to October 5
Awareness-Enabled Coordination
2006-04-01
contextualization, policy, team coordination. 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY ...CLASSIFICATION OF THIS PAGE 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF ABSTRACT UNCLASSIFIED UNCLASSIFIED UL NSN 7540-01-280... netowrk . Federal Austin FBI DHS CBP BobMary Carol John Alice 1 5 Texas NJ 3 4 1 2 3 4 Xavier Yanni 5 6 2 1 2 4 3 Policy & resource flow n Policies
NASA Astrophysics Data System (ADS)
d'Orgeville, Céline; Fetzer, Gregory J.
2016-07-01
This paper recalls the history of sodium guide star laser systems used in astronomy and space situational awareness adaptive optics, analyzing the impact that sodium laser technology evolution has had on routine telescope operations. While it would not be practical to describe every single sodium guide star laser system developed to date, it is possible to characterize their evolution in broad technology terms. The first generation of sodium lasers used dye laser technology to create the first sodium laser guide stars in Hawaii, California, and Spain in the late 1980s and 1990s. These experimental systems were turned into the first laser guide star facilities to equip mediumto- large diameter adaptive optics telescopes, opening a new era of Laser Guide Star Adaptive Optics (LGS AO)-enabled diffraction-limited imaging from the ground. Although they produced exciting scientific results, these laser guide star facilities were large, power-hungry and messy. In the USA, a second-generation of sodium lasers was developed in the 2000s that used cleaner, yet still large and complex, solid-state laser technology. These are the systems in routine operation at the 8 to 10m-class astronomical telescopes and 4m-class satellite imaging facilities today. Meanwhile in Europe, a third generation of sodium lasers was being developed using inherently compact and efficient fiber laser technology, and resulting in the only commercially available sodium guide star laser system to date. Fiber-based sodium lasers are being or will soon be deployed at three astronomical telescopes and two space surveillance stations. These highly promising systems are still relatively large to install on telescopes and they remain significantly expensive to procure and maintain. We are thus proposing to develop a fourth generation of sodium lasers: based on semiconductor technology, these lasers could provide a definitive solution to the problem of sodium LGS AO laser sources for all astronomy and space situational awareness applications.
NASA Astrophysics Data System (ADS)
d'Orgeville, C.; Fetzer, G.
This presentation recalls the history of sodium guide star laser systems used in astronomy and space situational awareness adaptive optics, analysing the impact that sodium laser technology evolution has had on routine telescope operations. While it would not be practical to describe every single sodium guide star laser system developed to date, it is possible to characterize their evolution in broad technology terms. The first generation of sodium lasers used dye laser technology to create the first sodium laser guide stars in Hawaii, California, and Spain in the late 1980's and 1990's. These experimental systems were turned into the first laser guide star facilities to equip medium-to-large diameter adaptive optics telescopes, opening a new era of LGS AO-enabled diffraction-limited imaging from the ground. Although they produced exciting scientific results, these laser guide star facilities were large, power-hungry and messy. In the USA, a second-generation of sodium lasers was developed in the 2000's that used cleaner, yet still large and complex, solid-state laser technology. These are the systems in routine operation at the 8-10m class astronomical telescopes and 4m-class satellite imaging facilities today. Meanwhile in Europe, a third generation of sodium lasers was being developed using inherently compact and efficient fiber laser technology, and resulting in the only commercially available sodium guide star laser system to date. Fiber-based sodium lasers will be deployed at two astronomical telescopes and at least one space debris tracking station this year. Although highly promising, these systems remain significantly expensive and they have yet to demonstrate high performance in the field. We are proposing to develop a fourth generation of sodium lasers: based on semiconductor technology, these lasers could provide the final solution to the problem of sodium laser guide star adaptive optics for all astronomy and space situational awareness applications.
Computer and Network Security in Small Libraries: A Guide for Planning.
ERIC Educational Resources Information Center
Williams, Robert L.
This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…
2014-06-16
SCADA systems. These professionals should be aware of the vulnerabilities so they can take intelligent precautions to mitigate attacks. SCADA...vulnerabilities • Describe mitigation options for protecting a system from SCADA attacks For students that go on to pursue a degree in Computer...from SCADA attacks For students who do not remain in the IT realm, this introduction provides an awareness to help them mitigate threats for their
Checkerboard--A Way to Financial Awareness.
ERIC Educational Resources Information Center
Dawson, Rod
1986-01-01
Describes Checkerboard, a game-like exercise designed to teach financial awareness, control, and appraisal to managers and reinforce the principle that all people in managerial positions make decisions, all of which incur costs and generate benefits. Students are guided by discovery and discussion toward improved financial decision making. (MBR)
Listen to Me Listen to You: A Step-By-Step Guide to Communication Skills Training
ERIC Educational Resources Information Center
Kotzman, Mandy; Kotzman, Anne
2008-01-01
This step-by-step guide is a companion to the popular "Listen to Me, Listen to You: A Practical Guide to Self-Awareness, Communication Skills and Conflict Management" (New Expanded Edition, Penguin Books, 2007). It is designed for use by anyone working in communication skills and personal development training. Resource material is grouped under…
Spot Rare Occurrences More Frequently by Lessening Inattentional Blindness
2013-04-29
with weapon slip through airport security , not hearing a siren when driving conditions are complicated by fog, or not seeing explosives on a truck...awareness of potential actual threats has been implemented in airport security for several years. The effectiveness of this Threat Image Projection
32 CFR 2700.22 - Classification guides.
Code of Federal Regulations, 2010 CFR
2010-07-01
... SECURITY INFORMATION REGULATIONS Derivative Classification § 2700.22 Classification guides. OMSN shall... direct derivative classification, shall identify the information to be protected in specific and uniform...
17 CFR 200.507 - Declassification dates on derivative documents.
Code of Federal Regulations, 2011 CFR
2011-04-01
... derivative documents. 200.507 Section 200.507 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... of National Security Information and Material § 200.507 Declassification dates on derivative... derivative document that derives its classification from the approved use of the classification guide of...
ERIC Educational Resources Information Center
Data Quality Campaign, 2011
2011-01-01
Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…
Joint Logistics Commanders Guide for the Management of Multinational Program,
1981-07-01
purchase of the A-300 Airbus and the 1977 record-breaking export performance of the French and UK aerospace industries of around $5 billion and $2 billion...DIS. They are the Defense Industrial Security Clearance Office ( DISCO ), the Defense Industrial Security Institute (DISI), and the Office of Industrial...Security International (ISI). Defense Industrial Security Clearance Office ( DISCO ) The Defense Industrial Security Program (DISP) establishes pro
LiPISC: A Lightweight and Flexible Method for Privacy-Aware Intersection Set Computation
Huang, Shiyong; Ren, Yi; Choo, Kim-Kwang Raymond
2016-01-01
Privacy-aware intersection set computation (PISC) can be modeled as secure multi-party computation. The basic idea is to compute the intersection of input sets without leaking privacy. Furthermore, PISC should be sufficiently flexible to recommend approximate intersection items. In this paper, we reveal two previously unpublished attacks against PISC, which can be used to reveal and link one input set to another input set, resulting in privacy leakage. We coin these as Set Linkage Attack and Set Reveal Attack. We then present a lightweight and flexible PISC scheme (LiPISC) and prove its security (including against Set Linkage Attack and Set Reveal Attack). PMID:27326763
LiPISC: A Lightweight and Flexible Method for Privacy-Aware Intersection Set Computation.
Ren, Wei; Huang, Shiyong; Ren, Yi; Choo, Kim-Kwang Raymond
2016-01-01
Privacy-aware intersection set computation (PISC) can be modeled as secure multi-party computation. The basic idea is to compute the intersection of input sets without leaking privacy. Furthermore, PISC should be sufficiently flexible to recommend approximate intersection items. In this paper, we reveal two previously unpublished attacks against PISC, which can be used to reveal and link one input set to another input set, resulting in privacy leakage. We coin these as Set Linkage Attack and Set Reveal Attack. We then present a lightweight and flexible PISC scheme (LiPISC) and prove its security (including against Set Linkage Attack and Set Reveal Attack).
Developing Enhanced Morphological Awareness in Adolescent Learners
ERIC Educational Resources Information Center
Hendrix, Rebecca A.; Griffin, Robert A.
2017-01-01
Morphological awareness--knowledge of roots and affixes within language and their interactions with one another to create multitudes of words--is arguably a skill requiring extended study beyond the elementary grades. With the rigors of contemporary curriculum that gradually guide students into college and career readiness--and, essentially, into…
Authentic Leadership: Practical Reflexivity, Self-Awareness, and Self-Authorship
ERIC Educational Resources Information Center
Eriksen, Matthew
2009-01-01
This assignment provides a process to facilitate student engagement in practical reflexivity and self-authorship through which students develop the self-awareness that is required to be an authentic and effective leader. It facilitates the development of students' personal leadership principles, which help guide their decision making and actions,…
ERIC Educational Resources Information Center
Peters, Richard O.
Several instructional strategies have been developed and employed to affect student awareness of natural and social environmental settings. Three instructional strategy orientations have been structured for affecting student conceptual learning and values acquisition-clarification: affective, cognitive, and affective-cognitive. Outdoor education…
Student Organizations--FBLA Projects and Activities Relating to Free Enterprise.
ERIC Educational Resources Information Center
Western Kentucky Univ., Bowling Green.
This guide for Future Business Leaders of America and Phi Beta Lambda chapters describes 25 economic awareness projects/activities to create awareness of the free enterprise economic system. Introductory materials include suggestions for project planning and management and a worksheet for planning activities and projects. The projects/activities…
Developing Ministerial Collaborative Planning Capacity
2012-03-14
1204, Arlington, VA 22202- 4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be subject to any...to build capacity and legitimacy within a host nation’s security sector. Providing a safe and secure environment founded on the rule of law is the...6 Vision: A highly efficient ministry capable of providing security and stability for all components of society, applying the rule of law and
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-21
... Aliens and Other Designated Individuals; Security Awareness Training for Flight School Employees AGENCY... checks for all aliens and other designated individuals seeking flight instruction (``candidates'') from... OMB Control Number 1652-0021, Flight Training for Aliens and Other Designated Individuals; Security...
Risky Business: Students and Smartphones
ERIC Educational Resources Information Center
Jones, Beth H.; Chin, Amita Goyal; Aiken, Peter
2014-01-01
The increase in smartphone adoption has been no less than astounding. Unfortunately, the explosive growth has been accompanied by a rash of security problems. A contributing factor to the growing security problem is a lack of education, training, and awareness. In addition, "bring your own device" (BYOD) policies often leave security…
The Handbook for Campus Crime Reporting
ERIC Educational Resources Information Center
Ward, Diane; Lee, Janice
2005-01-01
Campus security and safety are important issues in postsecondary education today. Providing students nationwide with a safe environment in which to learn and keeping students, parents and employees well informed about campus security are goals that have been voiced by many groups. These goals were advanced by the Crime Awareness and Campus…
The safety and security of distribution systems has come under reassessment in the past year. Several chemical and biological agents have been identified that might constitute a credible threat against water supply systems. There have also been a few reported threats against wate...
Parents and Educators [Tip Card
ERIC Educational Resources Information Center
US Department of Homeland Security, 2011
2011-01-01
Stop.Think.Connect. is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. The Campaign's main objective is to help individuals become more aware of growing cyber threats and arm them with the tools to protect themselves, their families,…
ERIC Educational Resources Information Center
US Department of Homeland Security, 2005
2005-01-01
Stop.Think.Connect. is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. The Campaign's main objective is to help individuals become more aware of growing cyber threats and arm them with the tools to protect themselves, their families,…
Situational Awareness as a Measure of Performance in Cyber Security Collaborative Work
DOE Office of Scientific and Technical Information (OSTI.GOV)
Malviya, Ashish; Fink, Glenn A.; Sego, Landon H.
Cyber defense competitions arising from U.S. service academy exercises, offer a platform for collecting data that can inform research that ranges from characterizing the ideal cyber warrior to describing behaviors during certain challenging cyber defense situations. This knowledge in turn could lead to better preparation of cyber defenders in both military and civilian settings. We conducted proof of concept experimentation to collect data during the Pacific-rim Regional Collegiate Cyber Defense Competition (PRCCDC) and analyzed it to study the behavior of cyber defenders. We propose that situational awareness predicts performance of cyber security professionals, and in this paper we focus onmore » our collection and analysis of competition data to determine whether it supports our hypothesis. In addition to normal cyber data, we collected situational awareness and workload data and compared it against the performance of cyber defenders as indicated by their competition score. We conclude that there is a weak correlation between our measure of situational awareness and performance that we hope to exploit in further studies.« less
ERIC Educational Resources Information Center
Ilvonen, Ilona
2013-01-01
Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…
Small Nations in Multinational Operations and Armenian Perspectives
2014-12-12
National Security Powers: Are the Checks in Balance?” In U.S. Army War College Guide to National Security Issues, Volume II: National Security Policy and...SMALL NATIONS IN MULTINATIONAL OPERATIONS AND ARMENIAN PERSPECTIVES A thesis presented to the Faculty of the U.S. Army
GLOBE Program Teacher's Guide.
ERIC Educational Resources Information Center
1997
The GLOBE Program is a worldwide, hands-on educational program for elementary and secondary school students. GLOBE aims to increase student achievement in mathematics and science, awareness towards the environment, and improve science process skills through network technology. This teacher's guide provides an overview of the GLOBE program and…
Ohio's Resource Guide for Voluntary Skill Standards.
ERIC Educational Resources Information Center
Springfield-Clark Joint Vocational School, Springfield, OH.
Voluntary skill standards are industry-based, industry-verified performance specifications that identify the knowledge, skills, and abilities individuals need for success in an industry. This resource guide is designed to raise awareness of voluntary skill standards, identify their benefits, and encourage stakeholder involvement in implementation…
ERIC Educational Resources Information Center
Santa Rosa County Board of Public Instruction, Milton, FL.
Recommendations for incorporating conservation education into the K-5 curriculum comprise this teacher's guide. Examined are eight natural resources: air, energy, forests and plant life, human resources, minerals, soil, water, and wildlife. Each of these topics is considered in two ways: (1) a chart depicts concepts basic to understanding the…
Office Careers. Teacher's Guide. Pre-Vocational Office Education.
ERIC Educational Resources Information Center
Powell, Theressa
This guide is intended for use in providing competency-based prevocational instruction in business and office occupations programs. Addressed in the individual units are the following topics: career awareness (career planning, decision making, and educational planning); personal assessment; the business and office cluster (bookkeeper, word…
ERIC Educational Resources Information Center
Bebermeyer, Jim; Edmond, Mary, Ed.
Reflecting a need to prepare students for working in diverse organizations, this document was developed to increase school officials' awareness of bias in instructional materials and help them select bias-free materials. A number of the examples illustrate situations dealing with diversity in the workplace. The guide is divided into three parts:…
Self-awareness: a review and analysis of a basic nursing concept.
Eckroth-Bucher, Margie
2010-01-01
Self-awareness has long been addressed as fundamental for the professional nurse with the accepted view that self-awareness will lead to greater competence. Therefore, it is important to understand the historical evolution of the concept, attributes, antecedents, and consequences. Rodgers' evolutionary method was used for critical analysis of nursing, social sciences, and education literature. Analysis indicates that self-awareness is a dynamic, transformative process of self. Ultimately, self-awareness is the use of self-insights and presence knowingly to guide behavior that is genuine and authentic to create a healing interpersonal environment. Future research areas within practice and education are identified.
ERIC Educational Resources Information Center
Greene, Margret
A curriculum and teacher guide are provided for a program to teach daily living skills to 0-4 level adult basic education students. The guide presents a method of instruction and lists the materials provided. Teaching plans (content outlines) are provided for these areas: cooking, housekeeping, laundry, leisure skills, and medication awareness. A…
ERIC Educational Resources Information Center
Sandler, Joanne
This community action guide was developed to implement the strategies for the advancement of women developed at the United Nations world conference in Nairobi that ended the Decade for Women in 1985. The guide is intended to: (1) increase understanding and awareness of the existence of the Nairobi Forward-Looking Strategies for the Advancement of…
Climate change health assessment: a novel approach for Alaska Native communities.
Brubaker, Michael Y; Bell, Jacob N; Berner, James E; Warren, John A
2011-06-01
Develop a process for assessing climate change impacts on public health that identifies climate-health vulnerabilities and mechanisms and encourages adaptation. Multi-stakeholder, participatory, qualitative research. A Climate Change Health Assessment (CCHA) was developed that involved 4 steps: (1) scoping to describe local conditions and engage stakeholders; (2) surveying to collect descriptive and quantitative data; (3) analysis to evaluate the data; and (4) planning to communicate findings and explore appropriate actions with community members. The health effects related to extreme weather, thinning ice, erosion, flooding, thawing permafrost and changing conditions of water and food resources were considered. The CCHA process was developed and performed in north-west Arctic villages. Refinement of the process took place in Point Hope, a coastal Inupiat village that practices whaling and a variety of other traditional subsistence harvest practices. Local observers identified climate change impacts that resulted in damaged health infrastructure, compromised food and water security and increased risk of injury. Priority health issues included thawing traditional ice cellars, diminished quality of the community water source and increased safety issues related to sea ice change. The CCHA increased awareness about health vulnerability and encouraged informed planning and decision-making. A community-scale assessment process guided by observation-based data can identify climate health impacts, raise awareness and encourage adaptive actions, thereby improving the response capacity of communities vulnerable to climate change.
A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks
NASA Astrophysics Data System (ADS)
Stelios, Yannis; Papayanoulas, Nikos; Trakadas, Panagiotis; Maniatis, Sotiris; Leligou, Helen C.; Zahariadis, Theodore
Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes for all networking tasks, including routing, i.e. all nodes act as “routers”, forwarding the packets generated by their neighbours in their way to the sink node. This implies that malicious nodes (denying their cooperation) can significantly affect the network operation. Trust management schemes provide a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them either for data forwarding, data aggregation or any other cooperative function. We propose a secure routing solution based on a novel distributed trust management system, which allows for fast detection of a wide set of attacks and also incorporates energy awareness.
20 CFR 416.975 - Evaluation guides if you are self-employed.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... 416.975 Section 416.975 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... capital investment and profit-sharing agreements. We will generally consider work that you were forced to... given social security earnings credits because you materially participated in the activities of the farm...
Physician Attitudes toward Adopting Genome-Guided Prescribing through Clinical Decision Support
Overby, Casey Lynnette; Erwin, Angelika Ludtke; Abul-Husn, Noura S.; Ellis, Stephen B.; Scott, Stuart A.; Obeng, Aniwaa Owusu; Kannry, Joseph L.; Hripcsak, George; Bottinger, Erwin P.; Gottesman, Omri
2014-01-01
This study assessed physician attitudes toward adopting genome-guided prescribing through clinical decision support (CDS), prior to enlisting in the Clinical Implementation of Personalized Medicine through Electronic Health Records and Genomics pilot pharmacogenomics project (CLIPMERGE PGx). We developed a survey instrument that includes the Evidence Based Practice Attitude Scale, adapted to measure attitudes toward adopting genome-informed interventions (EBPAS-GII). The survey also includes items to measure physicians’ characteristics (awareness, experience, and perceived usefulness), attitudes about personal genome testing (PGT) services, and comfort using technology. We surveyed 101 General Internal Medicine physicians from the Icahn School of Medicine at Mount Sinai (ISMMS). The majority were residency program trainees (~88%). Prior to enlisting into CLIPMERGE PGx, most physicians were aware of and had used decision support aids. Few physicians, however, were aware of and had used genome-guided prescribing. The majority of physicians viewed decision support aids and genotype data as being useful for making prescribing decisions. Most physicians had not heard of, but were willing to use, PGT services and felt comfortable interpreting PGT results. Most physicians were comfortable with technology. Physicians who perceived genotype data to be useful in making prescribing decisions, had more positive attitudes toward adopting genome-guided prescribing through CDS. Our findings suggest that internal medicine physicians have a deficit in their familiarity and comfort interpreting and using genomic information. This has reinforced the importance of gathering feedback and guidance from our enrolled physicians when designing genome-guided CDS and the importance of prioritizing genomic medicine education at our institutions. PMID:25562141
Guiding Children's Invented Spellings: A Gateway into Literacy Learning
ERIC Educational Resources Information Center
Ouellette, Gene; Senechal, Monique; Haley, Allyson
2013-01-01
This teaching study tested whether guiding invented spelling through a Vygotskian approach to feedback would facilitate kindergarten children's entry into literacy more so than phonological awareness instruction. Participants included 40 kindergarteners whose early literacy skills were typical of literacy-rich classrooms, and who were receiving a…
Basics of Desktop Publishing. Teacher Edition.
ERIC Educational Resources Information Center
Beeby, Ellen
This color-coded teacher's guide contains curriculum materials designed to give students an awareness of various desktop publishing techniques before they determine their computer hardware and software needs. The guide contains six units, each of which includes some or all of the following basic components: objective sheet, suggested activities…
Garrone Neto, Domingos; Cordeiro, Ricardo Carlos; Haddad, Vidal
2005-01-01
This is a cross-sectional study of work-related accidents among traditional fishermen in the Medium Araguaia River region of Tocantins, Brazil. From June to August 2002, fishermen from the Municipality of Araguacema were interviewed about the organization of their work activities and work-related accidents during the previous six months. Of the 92 participating fishermen, 56 reported having suffered a work-related accident (annual incidence was 82.6%). Some 95.7% of those interviewed did not regularly pay social security insurance as self-employed workers and were not aware of their social rights and duties. For fishermen reporting accidents, this proportion was 98.2%. Approximately 23.0% had another work activity, mainly as construction workers (47.6%) or sport-fishing guides (23.9%). Injuries inflicted by aquatic animals were the main form of accidents (about 86.0%). From these results, it is apparent that accidents from aquatic animals are an important health hazard, in some cases causing temporary work incapacity.
Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio
2015-08-01
The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.
ERIC Educational Resources Information Center
Olijnyk, Nicholas Victor
2014-01-01
The central aim of the current research is to explore and describe the profile, dynamics, and structure of the information security specialty. This study's objectives are guided by four research questions: 1. What are the salient features of information security as a specialty? 2. How has the information security specialty emerged and evolved from…
Author-Editor Guide to Technical Publications Preparation. Revision
1990-01-01
meteorology, climatology, military technical publications. ( ") <- 15: Number of Pages: 68 17. Security Classification of Report: Unclassified 1... Security Classification of this Page: Unclassified 19. Security Classification of Abstract: Unclassified 20. Limitation of Abstract: UL Standard Form 298...34 There are, however, February 1983. numerous exceptions. Although some technical material may not be classified in accordance with security AFR 83-2, Air
Improving Situation Awareness with the Android Team Awareness Kit (ATAK)
2015-04-01
fluid user experience and enhanced data sharing. 19 6.2.2 Esri Esri is a US-based company that sells geospatial information systems and data services...field, Situational Awareness (SA) needs to be conveyed in a de- centralized manner to the users at the edge of the network as well as at operations...that ATAK has built-in, and the ways it is being used by a variety of military, homeland security, and law enforcement users . Keywords: situational
Awareness and Understanding of a College Active Shooter Crisis Plan
ERIC Educational Resources Information Center
Williams, Christopher Brian
2017-01-01
Gun violence on college campuses has gained the attention of campus leaders, leading to an active shooter policy and procedure development and implementation. There was little awareness within the campus leadership of a college in the Southeast United States on the college's active shooter policy and procedures. Guided by Coomb's crisis management…
Teaching Energy Awareness. Environmental Education Series.
ERIC Educational Resources Information Center
Gore, Patrick D.; And Others
The major objective of the 32 activities in this teaching guide is to make students aware of energy issues. Although the activities are designed for students in grades 4-12, they can be adapted for younger students and for adults. Departing from the standard expository approaches found in most curriculum materials, these teaching strategies…
Cultural Awareness Training Manual and Study Guide.
ERIC Educational Resources Information Center
Kassebaum, Peter
This learning package is designed for use in conjunction with inservice training for law enforcement personnel in California as well as for use in law enforcement academies and community college administration of justice classes in police community relations. It consists of a manual on cultural awareness and a companion workbook. Based in part on…
ERIC Educational Resources Information Center
Alabama State Dept. of Education, Montgomery.
This guide, which is intended for classroom teachers, supervisors, and administrators throughout Alabama, contains the minimum required content (core program) for public school instruction in career awareness and technological literacy in grades 7-10. Presented first are the following: introduction examining the vision and goals of career…
Enrichment of Teacher and Counselor Competencies in Career Education: K-6. Final Report.
ERIC Educational Resources Information Center
Peterson, Marla; And Others
The purpose of the Enrichment of Teacher and Counselor Competencies in Career Education Project (ETC Project) was to develop, evaluate, and disseminate: (1) Career Education Curriculum guides which result in the integration of positive values and attitudes toward work, self-awareness, and development of decision making skills; and awareness of…
Environmental Design: Instructional Guide and Resource for Elementary and Secondary School Use.
ERIC Educational Resources Information Center
Montgomery County Public Schools, Rockville, MD.
Instructional units with suggested resources and appropriate activities for teaching environmental design to students in grades 6-12 are presented. An overview of program goals and suggested environmental awareness exercises and projects is followed by six illustrative units. The first unit (grade 6) focuses on environmental awareness and…
ERIC Educational Resources Information Center
Derman, Lauraine
This document guides teachers through the production of a docu-drama designed to raise environmental awareness for primary school children aged 5-9 years old. The play is a narrated account of seven environmental problems and solutions that is acted in mime, rhyme, and song and could be adapted as a dramatic environmental awareness exercise. The…
County Agents for Children. Final Report. Part III. Developing Community Awareness.
ERIC Educational Resources Information Center
George Peabody Coll. for Teachers, Nashville, TN. John F. Kennedy Center for Research on Education and Human Development.
Based on the experiences of a child advocacy project in Tennessee entitled County Agents for Children, the guide -- over half of which consists of appendixes -- presents a general strategies and specific tasks for the child advocate volunteer or professional in developing community awareness. Specific ways to locate, organize, produce, distribute,…
Building Security. Honeywell Planning Guide.
ERIC Educational Resources Information Center
Honeywell, Inc., Minneapolis, Minn.
A general discussion of building detection and alarm systems to provide security against burglary and vandalism is provided by a manufacturer of automated monitoring and control systems. Security systems are identified as--(1) local alarm system, (2) central station alarm system, (3) proprietary alarm system, and (4) direct connect alarm system..…
Regulatory Guide on Conducting a Security Vulnerability Assessment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ek, David R.
This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... Interim Implementation Guide for the National Health Security Strategy of the United States of America...
Health Behaviours and Awareness of Canada's Food Guide: A Population-based Study.
Mathe, Nonsikelelo; Agborsangaya, Calypse B; Loitz, Christina C; Johnson, Jeffrey A; Johnson, Steven T
2016-06-01
Lifestyle behaviours among adults reporting awareness of Canada's Food Guide (CFG) are described. Data from a cross-sectional survey of adults from Alberta were used to estimate the prevalence of reported health behaviours among respondents aware of the CFG. Respondents (n = 1044) reported general awareness of CFG (mean age 50.3 years; 54.2% female) of whom 82.2% reported awareness of specific CFG recommendations. Respondents reported frequently reading food labels (>58.0%), reading the number of calories (45.5%), the amount of sodium (49.5%), the amount of fat (46.7%), and the type of fat (45.5%) on the food label. Most respondents (90.0%) reported frequently selecting foods to promote health. Approximately one-third of the respondents (35.8%) reported frequently consuming ≥5 portions of vegetables and fruit per day and regularly participating in physical activity (55.3%). Body weight was perceived as healthy by 63.4% of the respondents. Most engaged in 2 health behaviours frequently. Adjusting for important socio-demographic characteristics, those who reported frequently consuming ≥5 portions of vegetables and fruit per day were more likely to engage in a second health behaviour outlined in CGF (OR: 23.6, 95% CI (16.2-34.4)). Awareness of CFG did not translate to positive health behaviours. More proactive population level strategies to support specific health behaviours as outlined in CFG might be warranted.
Novel technology for enhanced security and trust in communication networks
NASA Astrophysics Data System (ADS)
Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit; Jannson, Tomasz
2011-06-01
A novel technology that significantly enhances security and trust in wireless and wired communication networks has been developed. It is based on integration of a novel encryption mechanism and novel data packet structure with enhanced security tools. This novel data packet structure results in an unprecedented level of security and trust, while at the same time reducing power consumption and computing/communication overhead in networks. As a result, networks are provided with protection against intrusion, exploitation, and cyber attacks and posses self-building, self-awareness, self-configuring, self-healing, and self-protecting intelligence.
Potential uses of a wireless network in physical security systems.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Witzke, Edward L.
2010-07-01
Many possible applications requiring or benefiting from a wireless network are available for bolstering physical security and awareness at high security installations or facilities. These enhancements are not always straightforward and may require careful analysis, selection, tuning, and implementation of wireless technologies. In this paper, an introduction to wireless networks and the task of enhancing physical security is first given. Next, numerous applications of a wireless network are brought forth. The technical issues that arise when using a wireless network to support these applications are then discussed. Finally, a summary is presented.
Cyberbiosecurity: From Naive Trust to Risk Awareness.
Peccoud, Jean; Gallegos, Jenna E; Murch, Randall; Buchholz, Wallace G; Raman, Sanjay
2018-01-01
The cyber-physical nature of biotechnology raises unprecedented security concerns. Computers can be compromised by encoding malware in DNA sequences, and biological threats can be synthesized using publicly available data. Trust within the biotechnology community creates vulnerabilities at the interface between cyberspace and biology. Awareness is a prerequisite to managing these risks. Copyright © 2017 Elsevier Ltd. All rights reserved.
Security Risks and Protection in Online Learning: A Survey
ERIC Educational Resources Information Center
Chen, Yong; He, Wu
2013-01-01
This paper describes a survey of online learning which attempts to determine online learning providers' awareness of potential security risks and the protection measures that will diminish them. The authors use a combination of two methods: blog mining and a traditional literature search. The findings indicate that, while scholars have…
Database Systems and Oracle: Experiences and Lessons Learned
ERIC Educational Resources Information Center
Dunn, Deborah
2005-01-01
In a tight job market, IT professionals with database experience are likely to be in great demand. Companies need database personnel who can help improve access to and security of data. The events of September 11 have increased business' awareness of the need for database security, backup, and recovery procedures. It is our responsibility to…
Physical Education for Tomorrow.
ERIC Educational Resources Information Center
Ohio State Univ., Columbus. Center for Vocational and Technical Education.
The learning experiences in the teacher's guide are built on the concept of movement exploration. Self-awareness is realized as students discover potentials for performing basic motor skills and explore creative movement. Intended for use at the preschool and primary levels, the guide suggests and describes ways for the teacher to introduce and…
Taking Part: An Elementary Curriculum in the Participation Series.
ERIC Educational Resources Information Center
Klubock, Dorothy, Ed.; And Others
One of a series of teacher-developed curriculum guides intended to encourage active student participation and involvement in important social issues, this elementary level guide provides children with an age-appropriate understanding of the process of political elections. Students are encouraged to become aware of what is happening around them…
Teaching Self Awareness and Group Interaction: A Guide for Driver Education Teachers.
ERIC Educational Resources Information Center
Wisconsin State Dept. of Public Instruction, Madison.
This teaching guide presents materials to help driver education teachers develop classroom discussions designed to raise students' consciousness of themselves, their interactions with others, and the resolution of traffic situations. Small group discussions in the recommended approach. To develop and maintain a conducive classroom atmosphere,…
Career Development Guides: Situational English.
ERIC Educational Resources Information Center
Appel, Jeanette D.
The guide provides lesson plans for a 12-week situational English course geared toward career development at the junior high school level. The course aims at increasing eighth- and ninth-grade student self-awareness, involving interested parents in classroom activities, and providing students with an opportunity to evaluate what they have learned…
Economics: Canada. Senior Division.
ERIC Educational Resources Information Center
Ontario Dept. of Education, Toronto.
This resource guide sets out a structure from which units, semester courses, or one-year courses may be developed in Canadian economic studies in the senior high. The Ontario Department of Education lists five possible aims for courses developed from this resource guide: 1) student awareness of fundamental problems, basic forces at work, and key…
Energy Conservation Activity Guide, Grades 9-12. Bulletin 1602.
ERIC Educational Resources Information Center
Fraser, Mollie; And Others
As an interdisciplinary, non-sequential teaching guide, this publication was developed to increase awareness and understanding of the energy situation and to encourage individuals to become energy conservationists. Sections provide background information for the teacher followed by a variety of student activities using different subject areas for…
Building Wellness Lifestyles: Administrator's Guide.
ERIC Educational Resources Information Center
Koss, Larry; Ketcham, Michael
Prepared as a guide for summer camp administrators, this manual and this wellness program are built upon six principal concepts: enjoying fitness; eating well; taking care of oneself; enjoying life; relating to others; and being part of the world. Wellness is described as serving to awaken one's awareness to lifestyle norms and practices that…
Education for Business in Iowa: Curriculum and Reference Guide.
ERIC Educational Resources Information Center
Iowa State Dept. of Public Instruction, Des Moines.
In recognition of the need to strengthen schools' efforts in developing students' awareness of the technological, consumer, occupational, recreational, and cultural aspects of business, this guide was compiled to provide information assisting those who design and implement curricula relating to business. The first division consists of statements…
ERIC Educational Resources Information Center
Manitoba Dept. of Education, Winnipeg.
Manitoba's curriculum guide for German 100, 200, and 300 is designed to (1) make teachers of these courses aware of the official policy concerning the nature, goals, and objectives of the courses and approved teaching materials, and (2) provide instructional guidelines. The guide provides information about three sets of teaching materials from…
Multicultural Awareness for the Classroom: The Black Americans.
ERIC Educational Resources Information Center
Valbuena, Felix Mario; And Others
This guide provides the teacher of multiethnic students with information and lesson plans for teaching about black Americans. The guide contains seven sections, the first of which outlines African history and the history of blacks in the United States, specifically Michigan. Section two examines the African oral tradition and discusses African…
Kindergarten Teachers' Perspective on Guided Reading
ERIC Educational Resources Information Center
Carrasco, Mary E.
2016-01-01
Within a Southwestern school system, deficits in early literacy skills exist as is illustrated by kindergarten students not meeting the requirements on the Phonological Awareness and Phonics Inventory (PAPI). To address this deficit in early literacy skills, the school system instituted the use of the Guided Reading Approach (GR); however, it was…
Hazardous Waste and You. A Teacher's Guide.
ERIC Educational Resources Information Center
Ontario Waste Management Corp., Toronto.
This teaching guide provides an interactive introduction to hazardous waste, with particular emphasis on personal responsibility and action. Nine lessons engage advanced grade 10 and grade 11-12 science students in group discussions and actions that help them develop awareness of hazardous waste, understanding of the hazardous waste situation in…
Environmental Involvement. . . A Teacher's Guide (2nd Edition).
ERIC Educational Resources Information Center
1971
Presented in this teacher's guide are ideas and projects to help students develop an awareness and appreciation of their environment. Sharpening the senses is emphasized through activities dealing with water quality, sound qualities, and noise, air quality, solid waste control, and soil management. The text is divided into four levels roughly…
Introduction to Natural Resources. Teacher Edition.
ERIC Educational Resources Information Center
Hehn, Darold; Newport, Bob
This color-coded teacher's guide contains curriculum materials designed to help students develop an awareness of renewable and nonrenewable natural resources and to identify occupations in the area of natural resources. The guide contains nine units, each of which includes some or all of the following basic components: objective sheet, suggested…
The World of Man: A Curriculum Guide.
ERIC Educational Resources Information Center
Peters, Richard O.
This one semester, ecology-oriented, eleventh or twelfth grade elective course exposes students to the problems of environmental degradation and makes them aware of man's attempts to remedy crisis situations. The curriculum guide is divided into three major topics, each comprised of several subtopics which include content, objectives, and…
A Guide to Multicultural Education: Kindergarten Through Grade Three. Publication No. EC-462.
ERIC Educational Resources Information Center
Los Angeles Unified School District, CA.
This teaching guide presents learning activities for grades K-3 on multicultural education. The objective is to promote cultural awareness and understanding by developing acceptance of the students' own heritage and the heritage of others. Approaches include interdisciplinary, disciplinary, and cross-cultural. The cross-cultural approach…
A Guide to Collaboration for IEP Teams
ERIC Educational Resources Information Center
Martin, Nicholas R. M.
2005-01-01
With so many complex, challenging, and emotionally charged decisions involved, participating in an IEP meeting can seem like navigating through a minefield. But now there is a practical guide to managing these meetings with a high level of awareness, safety, and confidence. Developed for administrators, teachers, resource professionals, and…
ERIC Educational Resources Information Center
Irwin, Harriet; And Others
Appreciation and concern for the preservation of our natural resources by all citizens is the primary concern of this teacher's guide for use in the elementary grades. It employes the use of a filmstrip in conjunction with a local nature trail, to guide students in developing awareness - by looking closely, listening, touching, and smelling. Major…
ERIC Educational Resources Information Center
South Carolina State Education Oversight Committee, Columbia.
This guide shares information about the South Carolina Curriculum Standards with parents. The standards outline state requirements for children's learning, and what students across the state should be able to do in certain subjects. The guide lists seven key reasons for parents to be aware of the new curriculum standards, and then presents a…
ERIC Educational Resources Information Center
South Carolina State Education Oversight Committee, Columbia.
This guide shares information about the South Carolina Curriculum Standards with parents. The standards outline state requirements for children's learning, and what students across the state should be able to do in certain subjects. The guide lists seven key reasons for parents to be aware of the new curriculum standards, and then presents a…
ERIC Educational Resources Information Center
South Carolina State Education Oversight Committee, Columbia.
This guide shares information about the South Carolina Curriculum Standards with parents. The standards outline state requirements for children's learning, and what students across the state should be able to do in certain subjects. The guide lists seven key reasons for parents to be aware of the new curriculum standards, and then presents a…
ERIC Educational Resources Information Center
South Carolina State Education Oversight Committee, Columbia.
This guide shares information about the South Carolina Curriculum Standards with parents. The standards outline state requirements for children's learning, and what students across the state should be able to do in certain subjects. The guide lists seven key reasons for parents to be aware of the new curriculum standards, and then presents a…
ERIC Educational Resources Information Center
South Carolina State Education Oversight Committee, Columbia.
This guide shares information about the South Carolina Curriculum Standards with parents. The standards outline state requirements for children's learning, and what students across the state should be able to do in certain subjects. The guide lists seven key reasons for parents to be aware of the new curriculum standards, and then presents a…
ERIC Educational Resources Information Center
South Carolina State Education Oversight Committee, Columbia.
This guide shares information about the South Carolina Curriculum Standards with parents. The standards outline state requirements for children's learning, and what students across the state should be able to do in certain subjects. The guide lists seven key reasons for parents to be aware of the new curriculum standards, and then presents a…
ERIC Educational Resources Information Center
South Carolina State Education Oversight Committee, Columbia.
This guide shares information about the South Carolina Curriculum Standards with parents. The standards outline state requirements for children's learning, and what students across the state should be able to do in certain subjects. The guide lists seven key reasons for parents to be aware of the new curriculum standards, and then presents a…
ERIC Educational Resources Information Center
South Carolina State Education Oversight Committee, Columbia.
This guide shares information about the South Carolina Curriculum Standards with parents. The standards outline state requirements for children's learning, and what students across the state should be able to do in certain subjects. The guide lists seven key reasons for parents to be aware of the new curriculum standards, and then presents a…
ERIC Educational Resources Information Center
South Carolina State Education Oversight Committee, Columbia.
This guide shares information about the South Carolina Curriculum Standards with parents. The standards outline state requirements for children's learning, and what students across the state should be able to do in certain subjects. The guide lists seven key reasons for parents to be aware of the new curriculum standards, and then presents a…
ERIC Educational Resources Information Center
South Carolina State Education Oversight Committee, Columbia.
This guide shares information about the South Carolina Curriculum Standards with parents. The standards outline state requirements for children's learning, and what students across the state should be able to do in certain subjects. The guide lists seven key reasons for parents to be aware of the new curriculum standards, and then presents a…
ERIC Educational Resources Information Center
South Carolina State Education Oversight Committee, Columbia.
This guide shares information about the South Carolina Curriculum Standards with parents. The standards outline state requirements for children's learning, and what students across the state should be able to do in certain subjects. The guide lists seven key reasons for parents to be aware of the new curriculum standards, and then presents a…
Swimming Pools. Managing School Facilities, Guide 2.
ERIC Educational Resources Information Center
Department for Education and Employment, London (England). Architects and Building Branch.
This guide for schools with swimming pools offers advice concerning appropriate training for pool managers, the importance of water quality and testing, safety in the handling of chemicals, maintenance and cleaning requirements, pool security, and health concerns. The guide covers both indoor and outdoor pools, explains some technical terms,…
Improving Control System Cyber-State Awareness using Known Secure Sensor Measurements
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ondrej Linda; Milos Manic; Miles McQueen
Abstract—This paper presents design and simulation of a low cost and low false alarm rate method for improved cyber-state awareness of critical control systems - the Known Secure Sensor Measurements (KSSM) method. The KSSM concept relies on physical measurements to detect malicious falsification of the control systems state. The KSSM method can be incrementally integrated with already installed control systems for enhanced resilience. This paper reviews the previously developed theoretical KSSM concept and then describes a simulation of the KSSM system. A simulated control system network is integrated with the KSSM components. The effectiveness of detection of various intrusion scenariosmore » is demonstrated on several control system network topologies.« less
Research on information security system of waste terminal disposal process
NASA Astrophysics Data System (ADS)
Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei
2017-05-01
Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.
Waibel-Duncan, Mary Katherine; Benner, Eleanor; Weeks, Meghan
2012-05-01
Y.O.O. Rock Columbia County Youth Outreach Opportunities for Families Children, and Youth (Waibel-Duncan & Gillam, 2009) represents our nonurban county's first organized effort to systematically identify and promote awareness of volunteer and outreach opportunities for families, children, and youth. In addition to describing Y.O.O. Rock's development, this article summarizes feedback from parents, professionals, and paraprofessionals and outlines their recommendations for the second edition of the guide. Issue briefs from the Corporation for National & Community Service (2005, 2006, 2008) suggest the need for reference guides like Y.O.O. Rock insofar as they document limited volunteer and outreach opportunities for young children as well as the family's role in engaging children in service to others. This article will inform others who seek to increase families', children's, and youth's awareness of volunteer activities and outreach opportunities in their communities. © 2012 Wiley Periodicals, Inc.
Application of the JDL data fusion process model for cyber security
NASA Astrophysics Data System (ADS)
Giacobe, Nicklaus A.
2010-04-01
A number of cyber security technologies have proposed the use of data fusion to enhance the defensive capabilities of the network and aid in the development of situational awareness for the security analyst. While there have been advances in fusion technologies and the application of fusion in intrusion detection systems (IDSs), in particular, additional progress can be made by gaining a better understanding of a variety of data fusion processes and applying them to the cyber security application domain. This research explores the underlying processes identified in the Joint Directors of Laboratories (JDL) data fusion process model and further describes them in a cyber security context.
Security Considerations for Archives: Rare Book, Manuscript, and Other Special Collections.
ERIC Educational Resources Information Center
Cupp, Christian M.
The first of six sections in this guide to security for special collections in archives and libraries discusses the importance of security and the difficulty of preventing theft of archival materials. The second section, which focuses on planning, recommends an inservice training program for staff, a planned communications network between library…
Strategies to Minimize the Effects of Information Security Threats on Business Performance
ERIC Educational Resources Information Center
Okoye, Stella Ifeyinwa
2017-01-01
Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…
A First Step Towards Network Security Virtualization: From Concept to Prototype
2015-10-01
ec2 security groups. http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network- security.html. [3] Jeffrey R. Ballard, Ian Rae, and Aditya...20] Matthew L. Meola Michael J. Freedman Jennifer Rexford Nate Foster, Rob Harrison and David Walker. Frenetic: A High-Level Langauge for OpenFlow
ERIC Educational Resources Information Center
York, Edwin; Johnson, Conrad
A timely and informative resource guide for K-12 teachers of career awareness activities, the booklet lists New Jersey historic sites, traditional craft demonstrations, and related displays of old tools. The first section explores the revival of interest in old occupations and crafts of earlier times, resulting in the development of an…
Career Awareness K-6: Compilation of Modules. I Can Be Me from A to Z.
ERIC Educational Resources Information Center
Shipp, Jeanetta C.
The guide was designed to aid teachers in incorporating career awareness units into major subject curricula on the elementary level. The major objectives are: to help the students develop positive self-concepts and attitudes toward careers; to learn about career opportunities; to expose students to diverse careers, life styles, and educational…
The SunWise School Program Guide: A School Program that Radiates Good Ideas
ERIC Educational Resources Information Center
US Environmental Protection Agency, 2003
2003-01-01
To help educators raise sun safety awareness, the U.S. Environmental Protection Agency (EPA) has developed the SunWise School Program, a national education program for children in grades K through 8. SunWise Partner Schools sponsor classroom and schoolwide activities that raise children's awareness of stratospheric ozone depletion, UV radiation,…
ERIC Educational Resources Information Center
Peters, Richard O.
Describing the Union 58 Experimental Schools Program (ESP) in northern, rural New Hampshire, this curriculum guide presents the concept of "proximity congruency" as a means for developing secondary level student sensory awareness of the environment in outdoor and/or environmental education procedures. Proximity congruency is defined as a…
ERIC Educational Resources Information Center
Asuquo, I. M.; Olajide, T. E.
2015-01-01
The study sought to determine the role of health education on breast cancer awareness among University of Calabar female undergraduates. To achieve the purpose of the study, three hypotheses were formulated to guide the study. Related literature was reviewed, while a survey research design was adopted for the study. Appropriately develop and…
Career Education: Learning with a Purpose. Junior High 7-9, Mathematics.
ERIC Educational Resources Information Center
State Fair Community Coll., Sedalia, MO.
The guide, prepared to supplement the existing curriculum, suggests activities for teachers related to three goals: (1) Self Goal: the student developing an awareness of who he/she is and through effective decision-making what he/she can become; (2) Society Goal: the student becoming aware of the interrelationships of society with his/her school,…
Situation Awareness in Sea Kayaking: Towards a Practical Checklist
ERIC Educational Resources Information Center
Aadland, Eivind; Vikene, Odd Lennart; Varley, Peter; Moe, Vegard Fusche
2017-01-01
Ever-changing weather and sea conditions constitute environmental hazards that sea kayakers must pay attention to and act upon to stay safe. The aim of this study was to propose a tool to aid sea kayakers' situation awareness (SA). We developed a checklist guided by theory on the concept of SA and expert problem detection, judgement and…
Information Assurance as a System of Systems in the Submarine Force
2013-09-01
cause and effect on overall ship mission and vulnerabilities . Organizational governance must raise the level of awareness as to network security...understand the cause and effect on overall ship mission and vulnerabilities . Organizational governance must raise the level of awareness as to network...Table 2. Assessment Scale– Vulnerability Severity (After NIST 800–30 Rev1 2012, F-2
Geographical Database Integrity Validation
NASA Technical Reports Server (NTRS)
Jacobs, Derya; Kauffman, Paul; Blackstock, Dexter
2000-01-01
Airport Safety Modeling Data (ASMD) was developed at the request of a 1997 White House Conference on Aviation Safety and Security. Politicians, military personnel, commercial aircraft manufacturers and the airline industry attended the conference. The objective of the conference was to study the airline industry and make recommendations to improve safety and security. One of the topics discussed at the conference was the loss of situational awareness by aircraft pilots. Loss of situational awareness occurs when a pilot loses his geographic position during flight and can result in crashes into terrain and obstacles. It was recognized at the conference that aviation safety could be improved by reducing the loss of situational awareness. The conference advised that a system be placed in the airplane cockpit that would provide pilots with a visual representation of the terrain around airports. The system would prevent airline crashes during times of inclement weather and loss of situational awareness. The system must be based on accurate data that represents terrain around airports. The Department of Defense and the National Imagery and Mapping Agency (NIMA) released ASMD to be used for the development of a visual system for aircraft pilots. ASMD was constructed from NIMA digital terrain elevation data (DTED).
Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks
ERIC Educational Resources Information Center
Prichard, Janet J.; MacDonald, Laurie E.
2004-01-01
On September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be…
Users Guide for the Strategic Thinking Mindset Test (STMT)
2017-06-01
intended as an exercise in honest self-awareness and self-reflection, this pre - knowledge would make the test much less useful in that regard. In the test ...Research Product 2018-02 User’s Guide for the Strategic Thinking Mindset Test (STMT) William S. Weyhrauch Consortium...COVERED (from. . . to) Sept 2012 – May 2016 4. TITLE AND SUBTITLE User’s Guide for the Strategic Thinking Mindset Test (STMT) 5a. CONTRACT OR
Sailer, Anna M; Vergoossen, Laura; Paulis, Leonie; van Zwam, Willem H; Das, Marco; Wildberger, Joachim E; Jeukens, Cécile R L P N
2017-11-01
Radiation safety and protection are a key component of fluoroscopy-guided interventions. We hypothesize that providing weekly personal dose feedback will increase radiation awareness and ultimately will lead to optimized behavior. Therefore, we designed and implemented a personalized feedback of procedure and personal doses for medical staff involved in fluoroscopy-guided interventions. Medical staff (physicians and technicians, n = 27) involved in fluoroscopy-guided interventions were equipped with electronic personal dose meters (PDMs). Procedure dose data including the dose area product and effective doses from PDMs were prospectively monitored for each consecutive procedure over an 8-month period (n = 1082). A personalized feedback form was designed displaying for each staff individually the personal dose per procedure, as well as relative and cumulative doses. This study consisted of two phases: (1) 1-5th months: Staff did not receive feedback (n = 701) and (2) 6-8th months: Staff received weekly individual dose feedback (n = 381). An anonymous evaluation was performed on the feedback and occupational dose. Personalized feedback was scored valuable by 76% of the staff and increased radiation dose awareness for 71%. 57 and 52% reported an increased feeling of occupational safety and changing their behavior because of personalized feedback, respectively. For technicians, the normalized dose was significantly lower in the feedback phase compared to the prefeedback phase: [median (IQR) normalized dose (phase 1) 0.12 (0.04-0.50) µSv/Gy cm 2 versus (phase 2) 0.08 (0.02-0.24) µSv/Gy cm 2 , p = 0.002]. Personalized dose feedback increases radiation awareness and safety and can be provided to staff involved in fluoroscopy-guided interventions.
46 CFR 154.1435 - Medical first aid guide.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 5 2010-10-01 2010-10-01 false Medical first aid guide. 154.1435 Section 154.1435 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SAFETY... Equipment § 154.1435 Medical first aid guide. Each vessel must have a copy of the IMO Medical First Aid...
The Effect of Intentional, Preplanned Movement on Novice Conductors' Gesture
ERIC Educational Resources Information Center
Bodnar, Erin N.
2017-01-01
Preplanning movement may be one way to broaden novice conductors' vocabulary of gesture and promote motor awareness. To test the difference between guided score study and guided score study with preplanned, intentional movement on the conducting gestures of novice conductors, undergraduate music education students (N = 20) were assigned to one of…
The Story of the Chinese in America.
ERIC Educational Resources Information Center
Jue, Mel
This curriculum guide for teachers of elementary school children provides information on Chinese people in America from the 1800's to the present. The purpose is to increase the Chinese American student's awareness and appreciation of his own heritage. Moreover, the guide attempts to develop among all people an understanding and appreciation of…
Taoscore Teacher's Guides: Phase 3.
ERIC Educational Resources Information Center
Taos Municipal Schools, NM.
The teacher's guide to elementary level career education is comprised of 11 units of learning activities, two each for grades 1-6. Each unit is a simulation of a career cluster; through active participation in the simulation, the students develop career awareness as well as curriculum-related concepts in math, language, reading, social studies,…
A Curriculum Activities Guide to Electric Power Generation and the Environment.
ERIC Educational Resources Information Center
Tully, Randolph R., Jr., Ed.
This guide was developed by teachers involved in a workshop on "Electric Power Generation and the Environment." Activity topics are: (1) Energy and the Consumer; (2) Energy and Water Pollution; and (3) Energy and Air Pollution. Within these topics, the activities are classified as awareness level, transitional level, or operational…
A Curriculum Activities Guide to In-Depth Environmental Studies.
ERIC Educational Resources Information Center
Hershey, John T., Ed.; And Others
This guide is the fourth in a series of four books emphasizing student-oriented problem solving related to environmental matters. It utilizes a three-level activity approach: awareness, transitional, and operational. The intent is to provide investigations that will motivate students to pursue in-depth studies, thus encouraging them to generate…
Materials for Serving Homeless Adult Learners. A Resource Guide.
ERIC Educational Resources Information Center
Office of Vocational and Adult Education (ED), Washington, DC. Div. of Adult Education and Literacy.
This guide is intended to assist in linking service providers to existing resources and models and to build awareness of the body of innovative work that has been developed to respond to needs of homeless adult learners. It describes materials for instruction, outreach, and program management that were primarily developed in projects funded under…
Baybook: A Guide to Reducing Water Pollution at Home.
ERIC Educational Resources Information Center
Citizens Program for the Chesapeake Bay, Inc., Baltimore, MD.
Developed to increase public awareness of the Chesapeake Bay ecosystem, this guide provides information and suggestions for improving the quality of life in the Bay area. Contents include background information and a "what can you do" section on separate topics related to: (1) resources of the Chesapeake Bay watershed; (2) streambank…
Watch Out! A Teacher's Guide to Traffic Safety.
ERIC Educational Resources Information Center
New York City Board of Education, Brooklyn, NY. Div. of Curriculum and Instruction.
This guide provides teachers with activities that can initiate an awareness of the New York city-wide traffic safety campaign and reinforce safety education. It contains the following: (1) background information on safety rules for teachers; (2) curriculum topics that can include traffic safety issues; (3) class- and school-wide activities for…
The Shape We're In: Community Action Guide.
ERIC Educational Resources Information Center
2003
"The Shape We're In" is a national public education initiative that places a media spotlight on physical activity and obesity to promote public awareness and spark dialogue and action across the country. The centerpiece is a five-part newspaper series delivered to newspapers nationwide. This community action guide begins by describing…
Rivers at Risk: An Activity Based Study Guide for the Colorado River Basin.
ERIC Educational Resources Information Center
Samples, Bob, Ed.
This activity guide is intended to increase student awareness and understanding about the Colorado River Basin. Each activity includes objectives, procedures, materials list, related activities, questions for students, and related information. The activities are varied to appeal to a wide range of learning styles and modalities and are…
Visitor Learning on Guided Tours: An Activity Theory Approach
ERIC Educational Resources Information Center
Robinson, Lily Beatrice
2016-01-01
Guided tours, field trips, and other non-formal learning experiences occur in a variety of settings such as museums, parks, civic buildings, and architectural landmarks for the purpose of educating the public. This study yielded four main findings. (1) Program educational goals were visitor awareness, positive affective experience, and advocacy.…
Guide for Planning K-6 Physical Education Programs.
ERIC Educational Resources Information Center
New York State Education Dept., Albany. Bureau of Elementary Curriculum Development.
This program planning guide for physical education in New York State Schools, grades K-6, is based on making the student fully aware of cultural, vocational, and aesthetic opportunities so the student can make constructive life decisions. The stated program goals are (a) mastery of communication and reasoning skills; (b) ability to sustain…
Environmental Science Curriculum Guide, 1987. Bulletin 1792.
ERIC Educational Resources Information Center
Louisiana State Dept. of Education, Baton Rouge. Div. of Academic Programs.
This guide for environmental science is intended to make students aware of the problems they will be facing in their environment, and of alternative measures to solve these problems. The course is designed to use scientific principles to study the processes of the environment; examine changes within the environment from a broad perspective;…
ERIC Educational Resources Information Center
Ohio State Univ., Columbus. Center for Vocational and Technical Education.
The purpose of the teacher's guide is to encourage the primary student to expand his or her awareness of jobs within the community. The role of the service station worker is examined, with emphasis on the goods and services provided. Subject areas for which the materials in this guide have potential are social studies, art, and language. Each set…
Junior High Instrumental Music: Wind-Percussion Strings. [Curriculum Guide.
ERIC Educational Resources Information Center
Alberta Dept. of Education, Edmonton. Curriculum Design Branch.
This curriculum guide outlines a secondary music program for Alberta, Canada, that aims: (1) to develop skills in listening, performing, and using notation; (2) to encourage students to strive for musical excellence; (3) to enable students to appreciate music; (4) to foster self-expression and creativity; and (5) to make students aware of the…
High School Industrial Arts. A Guide for Teachers.
ERIC Educational Resources Information Center
Oregon State Dept. of Education, Salem.
This teacher's guide is designed to help high school industrial arts teachers plan activities to develop their students' awareness of technology in our culture and the variety of related careers available to them. Discussed first are the objectives, scope, and sequence of industrial arts. Next, the special characteristics and needs of adolescents,…
All "Trashed" Out: An Activity Guide to Solid Waste Management for Grades K-6.
ERIC Educational Resources Information Center
Illinois Univ., Springfield. Center for Solid Waste Management and Research, Springfield.
This activity guide, specifically designed for Illinois classrooms but adaptable for other states, seeks to encourage primary students to make their own personal statement and responses to the environment through increased awareness of reducing, reusing, recycling, and composting of solid waste materials. The activities incorporate environmental…
A Guide to Group Counseling in Junior High School. Futureprint Counseling Component.
ERIC Educational Resources Information Center
Guillen, Mary A.
Designed for junior high school counselors, the guide offers an outline for facilitating group counseling sessions. Intended to be held one class period a week for eight weeks, the sessions aim toward potential improvement in self-esteem, personal relationships, peer understanding, self-awareness, academic performance, and social skills. Each…
Nutrition Education: Choose Well, Be Well. A Curriculum Guide for High School.
ERIC Educational Resources Information Center
California State Dept. of Education, Sacramento.
This curriculum guide for high school students contains 20 information acquisition lessons, 6 values awareness lessons, and 5 open-ended discussion lessons. Some lessons contain activities that extend over several days; other lessons contain one specific activity. The nutrition education goals are directed toward the attainment of nutrition…
Nutrition Education: Choose Well, Be Well. A Curriculum Guide for Junior High School.
ERIC Educational Resources Information Center
California State Dept. of Education, Sacramento.
This curriculum guide for junior high school students contains 17 information acquisition lessons, 5 values awareness lessons, and 6 open-ended discussion lessons. Some lessons contain activities that extend over several days; other lessons contain one specific activity. The nutrition education goals are directed toward the attainment of nutrition…
The Cispus Experience: A Curriculum Guide for the Cispus Learning Center.
ERIC Educational Resources Information Center
Association of Washington School Principals, Olympia.
This curriculum guide presents lesson plans for outdoor and environmental education at the Cispus Learning Center, a camp in Randle, Washington. Objectives for the Cispus experience cover student learning of content, socialization as a team member, development of aesthetic awareness of nature and art, and increased physical wellness. Lesson plans…
A Guide to Running a Recycling Project, Second Edition.
ERIC Educational Resources Information Center
Oregon Recycling Information and Organizing Network, Portland.
Today's increasing awareness of shortages has prompted people to reevaluate their consumption patterns of natural resources. In a time when there is no "away" location to throw wastes, many recycling centers have been organized. This guide contains information needed to organize and operate a recycling project. Suggestions for collection sites,…
Canadian Studies for Elementary and Junior High School Teachers. A Syllabus and Resource Guide.
ERIC Educational Resources Information Center
State Univ., of New York, Plattsburgh. Coll. at Plattsburgh. Center for the Study of Canada.
Developed to promote greater awareness and understanding of Canada by American students and teachers, this interdisciplinary curriculum guide includes not only social studies, but also activities dealing with mathematics, science, environmental studies, English, art, and music. The book is divided into five modules, each giving a different…
TELS: Teaching Essential Life Skills.
ERIC Educational Resources Information Center
Randolph Township Schools, NJ.
This guide was designed to provide classroom-level applications that can be utilized in the education of students in kindergarten through grade six. The purpose of the guide is to develop an educational process with a focus on technology education and problem solving skills that enhances the curriculum, instills in students an awareness of the…
Career Education Research and Development Project. Adult Education Career Education Guide.
ERIC Educational Resources Information Center
Hollier, Harold; Searles, Carmen C.
The curriculum guide was developed to help adult education teachers, counselors, and administrators in planning and implementing creative and innovative activities in the field of career awareness and exploration. The curriculum units are intended to be used in conjunction with subjects usually taught. The definition, goals, and basic concepts of…
Mechanisms Influencing Student Understanding on an Outdoor Guided Field Trip
ERIC Educational Resources Information Center
Caskey, Nourah Al-Rashid
2009-01-01
Field trips are a basic and important, yet often overlooked part of the student experience. They provide the opportunity to integrate real world knowledge with classroom learning and student previous personal experiences. Outdoor guided field trips leave students with an increased understanding, awareness and interest and in science. However, the…
ERIC Educational Resources Information Center
Irwin, Harriet; And Others
Appreciation and concern for the preservation of our natural resources by all citizens is the primary concern of this teacher's guide for use in the lower primary grades. It employs the use of a filmstrip in conjunction with a local nature trail, to guide students in developing awareness - by looking closely, listening, touching, and smelling. The…
Exploring Ho-Nee-Um in the Spring.
ERIC Educational Resources Information Center
Madison Public Schools, WI.
Appreciation and concern for the preservation of our natural resources by all citizens is the primary concern of this teacher's guide for use in grades three and four. It employs the use of a filmstrip in conjunction with a local nature trail, to guide students in developing awareness--by looking closely, listening, touching, and smelling. The…
Look Before you Leap. A Guide on Continuing Your Education.
ERIC Educational Resources Information Center
Singleton, Thelma M.
A comprehensive guide was formulated for directing economically disadvantaged students through the higher education process. It is meant to help alleviate three major problems: (1) severe lack of guidance and career counseling in secondary and postsecondary schools; (2) financial aid that is left unused because of lack of student awareness; and…
The Universal House: Energy, Shelter & The California Indian. Activity Guide, 4th/5th Grade.
ERIC Educational Resources Information Center
California Energy Extension Service, Sacramento.
This activity guide links energy awareness with resource management and traditional California Indian cultures for the 3rd-6th grade span. The materials combine cooperative, hands-on activities with background information and learning extensions. The interdisciplinary lessons are built upon themes, concepts, and learning processes outlined in…
Privacy and security issues in teleradiology.
White, Peter
2004-10-01
Teleradiology is now well established within healthcare in the USA, but ethico-legal concepts surrounding this innovation remain unclear. New legislation, the Health Insurance Portability and Accountability Act, as well as ethical guidelines and common law demonstrate the importance being placed on security of electronic data and the protection of patients' personal data. Radiologists need to be aware of the security, privacy, and confidentiality issues which relate to teleradiology, so that they can safeguard not only their own interests but also the best interests of their patients.
Objective evaluation of situation awareness for dynamic decision makers in teleoperations
NASA Technical Reports Server (NTRS)
Endsley, Mica R.
1991-01-01
Situation awareness, a current mental mode of the environment, is critical to the ability of operators to perform complex and dynamic tasks. This should be particularly true for teleoperators, who are separated from the situation they need to be aware of. The design of the man-machine interface must be guided by the goal of maintaining and enhancing situation awareness. The objective of this work has been to build a foundation upon which research in the area can proceed. A model of dynamic human decision making which is inclusive of situation awareness will be presented, along with a definition of situation awareness. A method for measuring situation awareness will also be presented as a tool for evaluating design concepts. The Situation Awareness Global Assessment Technique (SAGAT) is an objective measure of situation awareness originally developed for the fighter cockpit environment. The results of SAGAT validation efforts will be presented. Implications of this research for teleoperators and other operators of dynamic systems will be discussed.
2009-02-01
management, available at <http://www.iso.org/ iso /en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=39612&ICS1=35&ICS2=40 &ICS3=>. ISO /IEC 27001 . Information...Management of the Systems Engineering Process. [ ISO /IEC 27001 ] ISO /IEC 27001 :2005. Information technology -- Security techniques -- Information security...software life cycles [ ISO /IEC 15026]. Software assurance is a key element of national security and homeland security. It is critical because dramatic
Towards an integrated defense system for cyber security situation awareness experiment
NASA Astrophysics Data System (ADS)
Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe
2015-05-01
In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.
Florida public transportation anti-terrorism resource guide
DOT National Transportation Integrated Search
2001-10-01
The Center for Urban Transportation (CUTR) at the University of South Florida (USF) assembled this guide to provide public transit agencies in Florida with information on current resources available to assist them with improving system security and g...
NASA Astrophysics Data System (ADS)
Valdevit, Thierry; Mayer, Nicolas; Barafort, Béatrix
While Information Security Management Systems (ISMS) are being adopted by the biggest IT companies, it remains quite difficult for smaller entities to implement and maintain all the requirements of ISO/IEC 27001. In order to increase information security in Luxembourg, the Public Research Centre Henri Tudor has been charged by the Luxembourg Ministry of Economy and Foreign Trade to find solutions to facilitate ISMS deployment for SMEs. After an initial experiment aiming at assisting a SME in getting the first national ISO/IEC 27001 certification for a private company, an implementation guide for deploying an ISMS, validated by local experts and experimented in SMEs, has been released and is presented in this paper.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ermak, D L; Nasstrom, J S; Tull, J E
The objective of the Local Integration of NARAC With Cities (LINC) project is to demonstrate the capability for providing local government agencies with advanced, CBNP-developed operational atmospheric plume prediction capabilities that can be seamlessly integrated with appropriate federal agency support for homeland security. LINC's approach is to integrate Lawrence Livermore National Laboratory's (LLNL) National Atmospheric Release Advisory Center (NARAC) tools and services with local emergency management and response centers. In the event of an airborne chemical or biological agent release in an urban area, large portions of the city and even the surrounding suburbs may be affected by the airbornemore » plume, depending on the type of agent, size of release, dissemination mechanism and ambient meteorological conditions. The goal of LINC is to provide real-time predictions that would be used by emergency managers and responders (fire, police, hazmat, etc.) to map the extent and effects of hazardous airborne material. Prompt predictions are provided to guide first responders in determining protective actions to be taken (use of personal protective equipment, evacuation, sheltering in place, etc.), safe locations for incident command posts, and critical facilities that may be at risk (hospitals, schools, etc.). LINC also provides response teams from multiple jurisdictions (local, state, and federal) with tools to effectively share information regarding the areas and populations at risk. The ultimate goal of LINC is a seamless and coordinated nationwide system that integrates NARAC prediction and situation awareness resources with the appropriate local, state and federal agencies for homeland security applications ranging from planning to emergency response to consequence assessment and attribution.« less
ERIC Educational Resources Information Center
McKnight, Jodi
2013-01-01
Online learning is integrated into nearly every type of college, university or workplace. It is more difficult for online instructors to assess the social-emotional components of learning due to a lack of face-to-face interaction. The following concept paper explores the emotional awareness levels of faculty teaching online courses and discusses…
ERIC Educational Resources Information Center
Zarrabi, Fatemeh
2016-01-01
The present study investigated the effectiveness of listening strategy instruction on the metacognitive listening strategies awareness of different EFL learner types (LTs). To achieve this goal, 150 EFL students took part in the study and were taught based on a guided lesson plan regarding listening strategies and a pre-test/post-test design was…
Teachers' Level of Awareness of 21st Century Occupational Roles in Rivers State Secondary Schools
ERIC Educational Resources Information Center
Uche, Chineze M.; Kaegon, Leesi E. S. P.; Okata, Fanny Chiemezie
2016-01-01
This study investigated the teachers' level of awareness of 21st century occupational roles in Rivers state secondary schools. Three research questions and three hypotheses guided the study. The population of study comprised of 247 public secondary schools and 57 private secondary schools in Port Harcourt metropolis of Rivers state which gave a…
An Adaptive Navigation Support System for Conducting Context-Aware Ubiquitous Learning in Museums
ERIC Educational Resources Information Center
Chiou, Chuang-Kai; Tseng, Judy C. R.; Hwang, Gwo-Jen; Heller, Shelly
2010-01-01
In context-aware ubiquitous learning, students are guided to learn in the real world with personalized supports from the learning system. As the learning resources are realistic objects in the real world, certain physical constraints, such as the limitation of stream of people who visit the same learning object, the time for moving from one object…
ERIC Educational Resources Information Center
Huang, Francis L.; Ford, Karen L.; Invernizzi, Marcia; Fan, Xitao
2013-01-01
We investigated the latent factor structure of the "Phonological Awareness Literacy Screening for Kindergarteners" in Spanish ("PALS español K"). Participants included 590 Spanish-speaking, public-school kindergarteners from five states. Three theoretically-guided factor structures were measured and tested with one half of our…
ERIC Educational Resources Information Center
Rollings, Meda Janeen
2010-01-01
The study addressed the problem of campus safety and the extent to which faculty and administrators are aware of institutional security policies. Further, the research compared perceptions of administrators and faculty regarding faculty awareness of and involvement in campus safety policy initiatives. The research sought to determine if the…
Network Adaptability from WMD Disruption and Cascading Failures
2016-04-01
Figure 1(b) shows a typical timeline before and after an attack with an example of average offered and requested bandwidth utilization. Telecom ...and security of our nation. Telecom networks and the Internet were originally designed to provide end-to-end communications which can survive failures...technology transfer The techniques developed for WMD-aware reprovisioning are also applicable for any disaster-aware provisioning on telecom
The Enterprise 2.0 Concept: Challenges on Data and Information Security
NASA Astrophysics Data System (ADS)
Silva, Ana; Moreira, Fernando; Varajão, João
The Web 2.0 wave has "hit" businesses all over the world, with companies taking advantage of the 2.0 concept and new applications stimulating collaboration between employees, and also with external partners (suppliers, contractors, universities, R&D organizations and others). However, the use of Web 2.0 applications inside organizations has created additional security challenges, especially regarding data and information security. Companies need to be aware of these risks when deploying the 2.0 concept and take a proactive approach on security. In this paper are identified and discussed some of the challenges and risks of the use of Web 2.0 tools, namely when it comes to securing companies' intellectual property.
14 CFR 1203.411 - Restrictions.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for... President through the National Security Council, classified information originating in one agency may not be...) Classified information shall not be disseminated outside the Executive Branch except under conditions that...
Report: EPA Improved Its National Security Information Program, but Some Improvements Still Needed
Report #16-P-0196, June 2, 2016. The EPA will continue to improve its national security information program by completing information classification guides that can be used uniformly and consistently throughout the agency.
14 CFR 1203.411 - Restrictions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for... President through the National Security Council, classified information originating in one agency may not be...) Classified information shall not be disseminated outside the Executive Branch except under conditions that...
A Citizen's Guide to U.S. Foreign Policy: Election '88. Nonpartisan Briefs on 18 Key Issues.
ERIC Educational Resources Information Center
Hoepli, Nancy, Ed.; And Others
In order to make informed voting decisions citizens need background information on complex foreign policy issues facing the United States. This guide presents current issues and provides information to help citizens cast a thoughtful vote. The guide is divided into six main headings: Leadership; Security; Economic and Social Issues; Critical…
ERIC Educational Resources Information Center
Golden, Susan L.
Based on the "simple truth" that people, not proposals, secure grants, this guide argues that grantseekers need to go well beyond strong ideas and "beautifully written" proposals. The guide provides fundraisers with the grantsmanship skills they need to navigate the grantmaking process: from avoiding common pitfalls such as…
Mackenzie, Geraldine; Carter, Hugh
2010-01-01
This chapter gives an educational overview of: * An awareness of the legal issues involved in health informatics * The need for the privacy and security of the patient record * The legal consequences of a breach of the security of the patient record * The concept of privacy law and what precautions ought to be taken to minimize legal liability for a breach of privacy and/or confidentiality.
Computer-aided Human Centric Cyber Situation Awareness
2016-03-20
in Video, IJCAI: International Joint Conf. on Artificial Intelligence . 16-JUL-11, . : , Kun Sun, Sushil Jajodia, Jason Li, Yi Cheng, Wei Tang...Cyber-Security Conference, June 2015. 2. V.S. Subrahmanian, Invited Speaker, Summer School on Business Intelligence and Big Data Analysis, Capri, Italy... Cybersecurity Conference, Yuval Ne’eman Workshop for Science, Technology and Security, Tel Aviv University, the Israeli National Cyber Bureau, Prime
ERIC Educational Resources Information Center
Information Reports and Bibliographies, 1988
1988-01-01
Presents statements made to the House Judiciary Subcommittee on Civil and Constitutional Rights by representatives of the Federal Bureau of Investigation and the library community concerning the surveillance of library users' reading habits as a national security measure. An FBI study on the extent of Soviet intelligence service's utilization of…
2014-01-31
59 Figure 26. Raspberry Pi SBC... Raspberry Pi single compute board (SBC) (see section 3.3.1.2). These snoopers can intercept the serial data, decode the information, and retransmit the...data. The Raspberry Pi contains two serial ports that allow receiving, altering, and retransmitting of serial data. These monitor points will provide
ERIC Educational Resources Information Center
Daniels, Daniel B., III
2014-01-01
There is a lack of literature linking end-user behavior to the availability of open-source intelligence (OSINT). Most OSINT literature has been focused on the use and assessment of open-source intelligence, not the proliferation of personally or organizationally identifiable information (PII/OII). Additionally, information security studies have…
Guided Online Group Discussion Enhances Student Critical Thinking Skills
ERIC Educational Resources Information Center
Gokhale, Anu; Machina, Kenton
2018-01-01
A teacher's objective is to provide students the cognitive strategies that enable them to think critically, make decisions, and solve problems. In order to guide student learning, teachers should be aware of the concepts that are prerequisite to the understanding of others and also of typical student misconceptions. The goal of this study was to…
Project S.P.I.C.E. Special Partnership in Career Education. Guide to Program Implementation.
ERIC Educational Resources Information Center
Volusia County Schools, Daytona Beach, FL.
This guide describes methods by which an educator can establish a program of career awareness for the educable mentally handicapped student using project SPICE (Special Partnership in Career Education) modules. The first of two sections provides an overview of the SPICE program. Specific topics included are peer facilitation, community career…
Decisions, Decisions: The Countless Times Instructional Practice and Reality Meet
ERIC Educational Resources Information Center
Miranda, Martina L.
2014-01-01
This article examines critical issues related to teacher decision-making in early childhood music classrooms. Through the story of one teacher's experience, we take a closer look at specific criteria to guide decision-making, and strategies to deepen awareness of young children's needs in the music classroom and guide instructional…
Conservation for Children [Levels 1-6 and an All-Levels Supplement].
ERIC Educational Resources Information Center
Cupertino Union School District, CA.
Developed to promote conservation awareness in elementary students, each of the six grade-level-sequenced activity guides provides: (1) a list of conservation concepts; (2) a criterion-referenced test; (3) a class record sheet; (4) a content guide; and (5) 90 student worksheets (40 for language arts, 20 for mathematics, 20 for social studies and…
Defense Dollars and Sense: A Common Cause Guide to the Defense Budget Process.
ERIC Educational Resources Information Center
Rovner, Mark
Designed to increase public awareness of military spending, this 5-part guide examines the process and problems of preparing the national defense budget. The publication begins with a brief overview of the 1984 defense budget. Major military programs, trends in budgeting, and key concerns in budget formulation are explored. Graphs and charts…
Career Education Classroom Activities: North Dakota, K-12: Elementary (Fifth).
ERIC Educational Resources Information Center
North Dakota State Board for Vocational Education, Bismarck.
The career education activities in the guide are to be integrated with the school curriculum at the fifth grade level. These activities are designed to help elementary children become more aware of the world of work and may be used selectively according to class needs and capabilities. A career education philosophy, how to use the guide, concepts…
ERIC Educational Resources Information Center
Holtvluwer, Nichole
2015-01-01
Nichole Holtvluwer writes for fellow guides who work in the toddler community. Recognizing that communication with parents is the most important path to serving the child, Holtvluwer offers concrete advice beginning with the guide's most important stance: withholding judgment. She details four steps to working with parents or caregivers: building…
Cross-Cultural Counseling. A Guide for Nutrition and Health Counselors.
ERIC Educational Resources Information Center
Schilling, Brenda; And Others
The United States is a land of people with diverse cultural and ethnic backgrounds. There will be a time when every counselor is called on to serve clients from a culture different from his or her own. This guide promotes awareness of cross-cultural counseling problems, and provides information for counseling clients with different beliefs,…
Natural Resources and Career Awareness: A Teacher's Guide for Grades K-6.
ERIC Educational Resources Information Center
Ward, George C.
The materials in this teacher's guide have three general divisions that are based on a sequential progression from kindergarten through grade six. Section A (kindergarten through two) explores the world of the child and divides this world into identifiable study groups. Section B (third and fourth grades) deals with the needs of living things and…
Career Development via Counselor/Teacher Teams; Guide for Implementation.
ERIC Educational Resources Information Center
Royal Oak City School District, MI.
The career development modules of the implementation guide, designed by counselor/teacher teams in Royal Oak, Michigan for junior high students, are intended to be used as a working copy for counselor/teacher teams. Career education concepts of self-awareness, assessment, and decision-making are correlated with the broad questions of: Who am I?…
ERIC Educational Resources Information Center
Michigan State Board of Education, Lansing.
An eight-chapter resource guide helps high school students become actively involved in the presidential election process. Chapter 1 contains directions for student participation in the 1984 Michigan statewide mock election; these directions are easily adaptable to other state and local mock election projects. Included are sample voter application…
Reporter's Guide: Drugs, Drug Abuse Issues, Resources.
ERIC Educational Resources Information Center
Parachini, Allan
The purposes of this booklet are: (1) to serve as a commentary on the evolution, state and problems of drug reporting; (2) to make the journalist aware of the prominent issues and some of the major misconceptions common among reporters, readers and/or listeners; (3) to serve as a guide to the fundamental background literature of the field; (4) to…
Development and Validation of the Guided Group Discussion Self-Estimate Inventory (GGD-SEI).
ERIC Educational Resources Information Center
Martin, David; Campbell, Bill
1998-01-01
A 19-item self-report measure was designed to promote increased self-awareness of a group leader's perceived ability to facilitate small group discussion. Results of analysis show high reliability and validity. The instrument, developed for use within education and training settings, provides a useful measure of guided small-group discussion…
Fire Safe Together. Kindergarten. Fire Safety for Texans: Fire and Burn Prevention Curriculum Guide.
ERIC Educational Resources Information Center
Texas State Commission on Fire Protection, Austin.
This booklet comprises the kindergarten component of a series of curriculum guides on fire and burn prevention. Designed to meet the age-specific needs of kindergarten students, its objectives include developing basic awareness of fire and burn dangers, developing simple actions to reduce injury, and encouraging parent involvement. Texas essential…
Orientation to Health Occupations: A Teacher's Guide.
ERIC Educational Resources Information Center
Moore, Elizabeth V.
The teacher's guide to Orientation to Health Occupations is an outline for a course designed to create student awareness of the broad range of health occupations. It can be adapted for use at the junior high school through postsecondary levels and is designed to be used in a variety of ways. There are 18 units of instruction, each containing one…
Neato Mosquito: An Elementary Curriculum Guide. 2nd Edition.
ERIC Educational Resources Information Center
Nasci, Roger S.; Herrington, James E.
This curriculum guide was designed with the purpose of developing public awareness of LaCrosse (LAC) encephalitis, which is a mosquito transmitted disease. LAC cases have been increasing in large numbers in the Upper Midwest and Great Lakes regions during recent years. This disease primarily affects children under the age of 15, and this guide…
A Guide to Parent Observation in the Primary Class
ERIC Educational Resources Information Center
Battle, Judy Shepps
2016-01-01
Just as the classroom guide must prepare for observation in the classroom, so too should parents prepare themselves for classroom observation. What is the purpose of their observation? What is the procedure? What should they note? What points of awareness should they keep in mind? Using the format of a letter to parents preparing to observe in a…
75 FR 65365 - Disaster Temporary Housing Operational Guide
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-22
... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2010-0062] Disaster Temporary Housing Operational Guide AGENCY: Federal Emergency Management Agency, DHS. ACTION: Notice of availability; request for comments. SUMMARY: The Federal Emergency Management Agency (FEMA) is...
Dissemination of effective physical activity interventions: are we applying the evidence?
Ballew, Paula; Brownson, Ross C.; Haire-Joshu, Debra; Heath, Gregory W.; Kreuter, Matthew W.
2010-01-01
Background. Given sparse knowledge on dissemination, this study sought to explore key benefits, barriers and contextual factors that are perceived to be important to the adoption and implementation of the ‘Community Guide's’ evidence-based physical activity recommendations. Design. We conducted case studies in two states where extensive adoption and implementation of the Guide's recommendations have occurred and in two states where widespread dissemination has lagged. Interviews (n = 76) were semi-structured and included both quantitative and qualitative methods. Participant perceptions from the following areas were examined: (i) priority of physical activity, (ii) awareness of and ability to define the term ‘evidence-based approaches’ and (iii) awareness, adoption, facilitators, benefits, challenges and barriers to Guide adoption. Results. Key enabling factors among high capacity states included: funds and direction from the Centers for Disease Control and Prevention; leadership support; capable staff; and successful partnerships and collaborations. Restraining forces among low capacity states included: the Guide recommendations being too new; participants being too new to current job; lack of time and training on how to use the Guide recommendations; limited funds and other resources and lack of leadership. Conclusion. To be effective, we must gain an understanding of contextual factors when designing for dissemination. PMID:20156839
14 CFR 1203.410 - Limitations.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for... requires protection in the interest of national security; and (2) the information may reasonably be... agency; or to restrain competition. (b) Basic scientific research information not clearly related to the...
TCP/IP Implementations and Vendors Guide,
1986-02-01
DOCUMENTATION PAGE la. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS 2a. SECURITY CLASSIFICATION AUTHORITY 3. DISTRIBUTION/ AVAILABILIT OF...UNIX System V (5.2) IMPLEMENTATION-LANGUAGE: C DISTRIBUTOR: UNIQ Digital Technologies 28 S. Water St. Batavia, fI1 60510 (312) 879-1008 CONTACT
Hansky, Bert; Vogt, Juergen; Gueldner, Holger; Schulte-Eistrup, Sebastian; Lamp, Barbara; Heintze, Johannes; Horstkotte, Dieter; Koerfer, Reiner
2007-01-01
Securing transvenous left ventricular (LV) pacing leads without an active fixation mechanism in proximal coronary vein (CV) segments is usually challenging and frequently impossible. We investigated how active fixation leads can be safely implanted in this location, how to avoid perforating the free wall of the CV, and how to recognize and respond to perforations. In five patients with no alternative to LV pacing from proximal CV segments, 4 Fr SelectSecure (Medtronic, Minneapolis, MN, USA) leads, which have a fixed helix, were implanted through a modified 6 Fr guide catheter with a pre-shaped tip (Launcher, Medtronic). Active fixation leads were successfully implanted in proximal CVs in five patients. There were no complications. Acute and chronic pacing thresholds were comparable to those of conventional CV leads. The pre-shaped guide catheter tip remains in close proximity to the myocardial aspect of the CV, directing the lead helix toward a safe implantation site. If only proximal CV pacing sites are available, 4 Fr SelectSecure leads can be safely implanted through a modified Launcher guide catheter, avoiding more invasive implantation techniques. Other than venous stenting or implantation of leads with retractable tines, SelectSecure leads are expected to remain extractable.
Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS)
2012-05-01
protect, and secure the United States and its interests. • AOF is the United States, Alaska, Canada, Mexico, Bahamas, Puerto Rico , and the U.S. Virgin...Criteria (UFC) for Smart Microgrid Cyber design guides for Industrial Control Systems (ICS) Residual systems Operations and Maintenance Operator...Training Sustainment Commercial Transition Cooperation with NIST for microgrid security standards Working with industry associations and
Context Aware Middleware Architectures: Survey and Challenges
Li, Xin; Eckert, Martina; Martinez, José-Fernán; Rubio, Gregorio
2015-01-01
Context aware applications, which can adapt their behaviors to changing environments, are attracting more and more attention. To simplify the complexity of developing applications, context aware middleware, which introduces context awareness into the traditional middleware, is highlighted to provide a homogeneous interface involving generic context management solutions. This paper provides a survey of state-of-the-art context aware middleware architectures proposed during the period from 2009 through 2015. First, a preliminary background, such as the principles of context, context awareness, context modelling, and context reasoning, is provided for a comprehensive understanding of context aware middleware. On this basis, an overview of eleven carefully selected middleware architectures is presented and their main features explained. Then, thorough comparisons and analysis of the presented middleware architectures are performed based on technical parameters including architectural style, context abstraction, context reasoning, scalability, fault tolerance, interoperability, service discovery, storage, security & privacy, context awareness level, and cloud-based big data analytics. The analysis shows that there is actually no context aware middleware architecture that complies with all requirements. Finally, challenges are pointed out as open issues for future work. PMID:26307988
Code of Federal Regulations, 2012 CFR
2012-07-01
... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... systems. (b) Increase the Government and DIB situational awareness of the extent and severity of cyber...
Code of Federal Regulations, 2013 CFR
2013-07-01
... DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... systems. (b) Increase the Government and DIB situational awareness of the extent and severity of cyber...
Usuzawa, Motoki; O Telan, Elizabeth; Kawano, Razel; S Dizon, Carmela; Alisjahbana, Bachti; Ashino, Yugo; Egawa, Shinichi; Fukumoto, Manabu; Izumi, Takako; Ono, Yuichi; Hattori, Toshio
2014-05-01
As the impacts of natural disasters have grown more severe, the importance of education for disaster medicine gains greater recognition. We launched a project to establish an international educational program for disaster medicine. In the present study, we surveyed medical personnel and medical/public health students in the Philippines (n = 45) and Indonesia (n = 67) for their awareness of the international frameworks related to disaster medicine: the Human Security (securing individual life and health), the Sphere Project (international humanitarian response), and the Hyogo Framework for Action 2005-2015 (international strategy for disaster reduction). In both countries, more than 50% responders were aware of human security, but only 2 to 12% were aware of the latter two. The survey also contained questions about the preferred subjects in prospective educational program, and risk perception on disaster and disaster-related infections. In the Philippines, significant disasters were geophysical (31.0%), hydrological (33.3%), or meteorological (24.8%), whereas in Indonesia, geophysical (63.0%) and hydrological (25.3%) were significant. Moreover, in the Philippines, leptospirosis (27.1%), dengue (18.6%), diarrhea (15.3%), and cholera (10.2%) were recognized common disaster-related infections. In Indonesia, diarrhea (22.0%) and respiratory infection (20.3%) are major disaster-related infections. Water-related infections were the major ones in both countries, but the profiles of risk perception were different (Pearson's chi-square test, p = 1.469e-05). The responders tended to overestimate the risk of low probability and high consequence such as geophysical disaster. These results are helpful for the development of a postgraduate course for disaster medicine in Asia Pacific countries.
ERIC Educational Resources Information Center
Keener, Sandra C.
1992-01-01
This annual guide to income tax for parents of children with disabilities covers organizing records; avoiding audits; deducting medical expenses; and considering the impact of recent changes in medical expenses, Social Security numbers for children, child care, earned income credit, and deduction for dependents. (DB)
Evaluating Common Privacy Vulnerabilities in Internet Service Providers
NASA Astrophysics Data System (ADS)
Kotzanikolaou, Panayiotis; Maniatis, Sotirios; Nikolouzou, Eugenia; Stathopoulos, Vassilios
Privacy in electronic communications receives increased attention in both research and industry forums, stemming from both the users' needs and from legal and regulatory requirements in national or international context. Privacy in internet-based communications heavily relies on the level of security of the Internet Service Providers (ISPs), as well as on the security awareness of the end users. This paper discusses the role of the ISP in the privacy of the communications. Based on real security audits performed in national-wide ISPs, we illustrate privacy-specific threats and vulnerabilities that many providers fail to address when implementing their security policies. We subsequently provide and discuss specific security measures that the ISPs can implement, in order to fine-tune their security policies in the context of privacy protection.
Case study: adapting the IAHSS curriculum in Thailand.
Goss, Richard J
2009-01-01
In late 2007 Corporate Protective Solutions (CPS), headquartered in Langley, B.C. Canada, an independent security consulting company that specialises in healthcare security, approached the IAHSS concerning the adaptation of the Basic Training Manual and Study Guide for Healthcare Security Officers for one of their clients. In this article, its managing director for Asia Pacific outlines the challenges of this project from which other international healthcare security managers can learn to replicate the process for their own facilities.
ERIC Educational Resources Information Center
Staton, John L.
A program in career planning was designed for disadvantaged New York City high school students who had experienced problems in attendance, punctuality, and relationships with others. Its goal was to increase student's self awareness of interests, aptitudes, abilities, and values in relationship to the world of work. Twenty-four Black and Hispanic…
Validity and reliability of food security measures.
Cafiero, Carlo; Melgar-Quiñonez, Hugo R; Ballard, Terri J; Kepple, Anne W
2014-12-01
This paper reviews some of the existing food security indicators, discussing the validity of the underlying concept and the expected reliability of measures under reasonably feasible conditions. The main objective of the paper is to raise awareness on existing trade-offs between different qualities of possible food security measurement tools that must be taken into account when such tools are proposed for practical application, especially for use within an international monitoring framework. The hope is to provide a timely, useful contribution to the process leading to the definition of a food security goal and the associated monitoring framework within the post-2015 Development Agenda. © 2014 New York Academy of Sciences.
ERIC Educational Resources Information Center
National Alliance of Business, Inc., Washington, DC.
This guide consists of suggestions, ideas, and tips intended to stimulate development of cooperative summer youth employment programs in local communities. Addressed in the individual sections of the guide are the following topics: tips on where to start, suggestions on how to get started, hints on securing resources, program resources, use of…
A Video Game for Cyber Security Training and Awareness
2006-01-01
potentially mundane. Video games have been proposed as an engaging training vehicle (Prenski, 2001). Here we describe a video game-like tool called Cyber- CIEGE...formation assurance, and information assurance technolo- gists with little background in video games . Early focus was on establishing a language that... video games or adventure games appear more inclined to explorethe game, sometimes proceeding beyond the simple aware- ness scenarios into more
2012-12-01
and activity coordination (for example, SOC management ). 10. In Reference D the information sharing framework represents a hub & node model in... management , vulnerabilities, critical assets, threats, impacts on operations etc. UNCLASSIFIED UNCLASSIFIED 6 PART 3 - CYBER SITUATIONAL AWARENESS...limit the effect of cyber incidents. 23. Tasks of the SOC include: • System maintenance and management including applying the directed security
2013-02-25
such as authentication , protocols, and ‘signature’ management exist but the imposition of such techniques must be balan 15p the legal requirements...gulation, mation face onflicting pressures to keep this data secure and yet allow access by authorised users. in the sharing network should be
Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong
2016-01-01
Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider.
Pervez, Zeeshan; Ahmad, Mahmood; Khattak, Asad Masood; Lee, Sungyoung; Chung, Tae Choong
2016-01-01
Privacy-aware search of outsourced data ensures relevant data access in the untrusted domain of a public cloud service provider. Subscriber of a public cloud storage service can determine the presence or absence of a particular keyword by submitting search query in the form of a trapdoor. However, these trapdoor-based search queries are limited in functionality and cannot be used to identify secure outsourced data which contains semantically equivalent information. In addition, trapdoor-based methodologies are confined to pre-defined trapdoors and prevent subscribers from searching outsourced data with arbitrarily defined search criteria. To solve the problem of relevant data access, we have proposed an index-based privacy-aware search methodology that ensures semantic retrieval of data from an untrusted domain. This method ensures oblivious execution of a search query and leverages authorized subscribers to model conjunctive search queries without relying on predefined trapdoors. A security analysis of our proposed methodology shows that, in a conspired attack, unauthorized subscribers and untrusted cloud service providers cannot deduce any information that can lead to the potential loss of data privacy. A computational time analysis on commodity hardware demonstrates that our proposed methodology requires moderate computational resources to model a privacy-aware search query and for its oblivious evaluation on a cloud service provider. PMID:27571421
Automated, Certified Program-rewriting for Software Security Enforcement
2012-03-05
VLC ), pages 257-260, Oak Brook, Illinois, Oc- tober 2010. [14] Aditi A. Patwardhan. Security-aware program visualization for analyz- ing in-lined...January 2010. [17] Meera Sridhar and Kevin W. Hamlen. Flexible in-lined reference moni- tor certification: Challenges and future directions. In...pages 55-60, Austin, Texas, January 2011. [18] Bhavani Thuraisingham and Kevin W. Hamlen. Challenges and future directions of software technology
ERIC Educational Resources Information Center
Committee for Economic Development, 2006
2006-01-01
To confront the twenty-first century challenges to our economy and national security, our education system must be strengthened to increase the foreign language skills and cultural awareness of our students. America's continued global leadership will depend on our students' abilities to interact with the world community both inside and outside our…
Shared Awareness in Times of Crisis: A Framework for Collaboration
2011-06-01
also affords a “ dashboard ” perspective allowing for centralization of resources. The U.S. Army’s Knowledge Online portal is one example of a single...labor, energy, materials, information, cash and technology into outputs of higher value • Organization’s values (criteria that managers and...follows: Challenges - Disabilities Inter-Organizational Cross-Organizational Privacy and Security high security (portal) blocks information flow Trust
Code of Federal Regulations, 2014 CFR
2014-07-01
... DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE (CS/IA... systems. (b) Increase the Government and DIB situational awareness of the extent and severity of cyber...
14 CFR 1203.407 - Duration of classification.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 1203.407 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.407 Duration of classification. (a) Information shall be classified as long as required by national security considerations. When it can be determined, a specific...
14 CFR 1203.407 - Duration of classification.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Section 1203.407 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Guides for Original Classification § 1203.407 Duration of classification. (a) Information shall be classified as long as required by national security considerations. When it can be determined, a specific...
Common Capabilities for Trust and Security in Service Oriented Infrastructures
NASA Astrophysics Data System (ADS)
Brossard, David; Colombo, Maurizio
In order to achieve agility of the enterprise and shorter concept-to-market timescales for new services, IT and communication providers and their customers increasingly use technologies and concepts which come together under the banner of the Service Oriented Infrastructure (SOI) approach. In this paper we focus on the challenges relating to SOI security. The solutions presented cover the following areas: i) identity federation, ii) distributed usage & access management, and iii) context-aware secure messaging, routing & transformation. We use a scenario from the collaborative engineering space to illustrate the challenges and the solutions.
Space Awareness, an Adult Education Curriculum Resource Guide. Bulletin No. 71-F-5.
ERIC Educational Resources Information Center
Jones, Marvin
The document was prepared to serve as a guide to adult educators and others interested in specific information relating to the National Aeronautics and Space Administration (NASA), and to provide a source of information of the breadth and scope of space explorations including space benefits to mankind. The course is organized into eight units of…
ERIC Educational Resources Information Center
Patterson, Sue
This guide is designed to help workplace trainers in the textile, clothing, and footwear (TCF) industry to become more aware of the language, literacy, and numeracy demands of training. It is divided into two main sections. Section 1, "Background Information," covers understanding language, literacy, and numeracy; understanding training…
ERIC Educational Resources Information Center
Kyle, James; And Others
The guide provides multiple experience-based activities for use by secondary social studies students as they examine occupational possibilities in their communities. The purposes of the materials are to help students evaluate themselves and their value systems, examine occupations, and become aware of the changing philosophy and value of work in…
ERIC Educational Resources Information Center
Dietz, William H., Ed.; Stern, Loraine, Ed.
Noting that the real challenge for parents is not being aware of what to feed their children, but rather getting children to actually eat those foods, this guide provides advice for parents of infants through adolescents regarding children's dietary needs while recognizing the role of children's emotions, tastes, and preferences. Following the…
ERIC Educational Resources Information Center
Little Rock School District, AR.
Part of a sequential series of curriculum units in environmental education for grades 4 through 12, this curriculum guide focuses on environmental problems in the United States for eleventh grade students. This unit is designed to make the student aware of how the problems of the past become critical problems of the present. Activities foster an…
Executive Guide to Software Maintenance. Reports on Computer Science and Technology.
ERIC Educational Resources Information Center
Osborne, Wilma M.
This guide is designed for federal executives and managers who have a responsibility for the planning and management of software projects and for federal staff members who are affected by, or involved in, making software changes, and who need to be aware of steps that can reduce both the difficulty and cost of software maintenance. Organized in a…
Edward Cesa; Edward Lempicki; Howard Knotts
2003-01-01
The purpose of this guide is to make officials of municipalities aware of an alternative strategy for using their street tree removals; a "recycling" strategy which can potentially turn a cost-burden scenario into an income-generating opportunity. The strategy involves merchandising sawmill-size logs from street tree removals to sawmills or other companies...
ERIC Educational Resources Information Center
Auld, Margaret E.; Ehlke, Graceann
This guide was developed to help the nurse in any outdoor setting or organized camp program serving children and youth to: (1) understand the responsibilities of camp nursing; (2) be aware of the nurse's relationships with the camp director and other workers; (3) relate the camp health program to the overall objectives of the camping program; (4)…
Dental Health Education Curriculum Guide for Use With Head Start Children and Families.
ERIC Educational Resources Information Center
American Dental Association, Chicago, IL.
This teaching guide for a dental health curriculum for children in the Head Start Program contains lesson plans for the following areas: (1) introduction to the dental health program; (2) visiting the dentist; (3) awareness of the mouth; (4) the important functions of the mouth; (5) the importance of keeping teeth and gums clean; (6)…
ERIC Educational Resources Information Center
Texas State Commission on Fire Protection, Austin.
This booklet comprises the high school economics component of a series of curriculum guides on fire and burn prevention. It is designed to meet the age-specific needs of eleventh and twelfth grade students. Objectives include: (1) developing an awareness of adult responsibilities to preserve family, property, and economy; (2) preparing for…
ERIC Educational Resources Information Center
Gans, Connie; And Others
The work-study guide is the third volume in the advanced level of a career education curriculum for elementary-secondary migrant children. Complementing the secondary level job information text and a workbook about decision making and self-awareness, the work-study guide is designed to accompany work exploration and experience programs. It…
Science and Math Activities and Resources for Teaching Home Economics (S.M.A.R.T.).
ERIC Educational Resources Information Center
Levine, Marjorie C.
This guide was written to aid home economics teachers in developing a greater understanding and use of basic skills in the home economics curriculum. The objectives of this guide are (1) to expand the awareness of underlying mathematics and science principles in the consumer and vocational home economics curriculum and (2) to provide a bank of…
A Sensemaking Perspective on Situation Awareness in Power Grid Operations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.; Schur, Anne; Paget, Mia L.
2008-07-21
With increasing complexity and interconnectivity of the electric power grid, the scope and complexity of grid operations continues to grow. New paradigms are needed to guide research to improve operations by enhancing situation awareness of operators. Research on human factors/situation awareness is described within a taxonomy of tools and approaches that address different levels of cognitive processing. While user interface features and visualization approaches represent the predominant focus of human factors studies of situation awareness, this paper argues that a complementary level, sensemaking, deserves further consideration by designers of decision support systems for power grid operations. A sensemaking perspective onmore » situation aware-ness may reveal new insights that complement ongoing human factors research, where the focus of the investigation of errors is to understand why the decision makers experienced the situation the way they did, or why what they saw made sense to them at the time.« less
Plan for Reducing Unnecessary use of Social Security Numbers
Recognizing that training and awareness are critical to protecting agency Personally Identifiable Information (PII), the EPA is developing online training for privacy contacts in its programs and regions.
CrossTalk. The Journal of Defense Software Engineering. Volume 25, Number 6
2012-12-01
Cyber Security Threat Definition Communicable Noncommunicable Based on Risky Behavior Coordinated Trojan horse programs Threats hidden in a...for Cyber Security Threats Cyber Security Threat Communicable Noncommunicable Risky Behaviors Coordinated Type of Intervention (at the System...types of data are breached. Further, educational materials on risky behaviors (e.g., for home Internet users) as well as recommended guide- lines for
Conflict in Context: Understanding Local to Global Security.
ERIC Educational Resources Information Center
Mertz, Gayle; Lieber, Carol Miller
This multidisciplinary guide provides middle and high school teachers and students with inquiry-based tools to support their exploration of emerging local, national, international, and transboundary security issues. Students are introduced to critical thinking, problem solving, and peacemaking strategies that will help them better understand…
Semantic policy and adversarial modeling for cyber threat identification and avoidance
NASA Astrophysics Data System (ADS)
DeFrancesco, Anton; McQueary, Bruce
2009-05-01
Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.
Gyrotropic Guiding-Center Fluid Theory for Turbulent Inhomogeneous Magnetized Plasma
2006-01-01
this paper, a new fluid theory is given in the guiding-center and gyrotropic approximation which is derivable from the Vlasov-Maxwell equations . The... equations can be solved (1) by using measurements of the low-order velocity moments to specify the initial and boundary conditions. 15. SUBJECT TERMS...Vlasov-Maxwell equations Fokker-Planck operator guiding-center Inhomogeneous, gyrotropic, magnetized plasma 16. SECURITY CLASSIFICATION OF: 17
DOE Office of Scientific and Technical Information (OSTI.GOV)
McDonald, K; Curran, B
I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusionmore » Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.« less
32 CFR 2400.15 - Classification guides.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 6 2012-07-01 2012-07-01 false Classification guides. 2400.15 Section 2400.15 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...
32 CFR 2400.15 - Classification guides.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Classification guides. 2400.15 Section 2400.15 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...
32 CFR 2400.15 - Classification guides.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 6 2011-07-01 2011-07-01 false Classification guides. 2400.15 Section 2400.15 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...
32 CFR 2400.15 - Classification guides.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 6 2014-07-01 2014-07-01 false Classification guides. 2400.15 Section 2400.15 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...
32 CFR 2400.15 - Classification guides.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 6 2013-07-01 2013-07-01 false Classification guides. 2400.15 Section 2400.15 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM...
ERIC Educational Resources Information Center
State Fair Community Coll., Sedalia, MO.
The revised guide, prepared to supplement the existing curriculum, suggests activities related to the three student goals: (1) to develop an awareness of who he/she is, and, through effective decision making, what he/she can become; (2) to become aware of the interrelationships of society with his/her school, community, family, work, and leisure;…
ERIC Educational Resources Information Center
Scanlan, Peter A.; Dokecki, Paul R.
This paper reports a research design guided by the hypothesis that adult constraint and peer cooperation exert conflicting forces on the development of racial awareness attitudes of 3-, 4-, and 5-year-olds. Subjects were 60 preschoolers from Tennessee, with an equal number of white and black children at each age. Methodology used was a modified…
ERIC Educational Resources Information Center
State Fair Community Coll., Sedalia, MO.
The revised guide, prepared to supplement the existing curriculum, suggests activities related to the three student goals: (1) to develop an awareness of who he/she is, and, through effective decision making, what he/she can become; (2) to become aware of the interrelationships of society with his/her school, community, family, work, and leisure;…
ERIC Educational Resources Information Center
Highline Public Schools, Seattle, WA.
This teacher's guide contains short-term activities aimed at expanding K-6 grade students' awareness of attitudes concerning traditional sex-role stereotyping. Subject areas are language arts, social studies, career education, mathematics, and physical education. Activities are divided into 10-20 minute, 20-40 minute, and 40 minute plus…
Rep. Clarke, Yvette D. [D-NY-11
2010-09-29
House - 11/01/2010 Referred to the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
SPAN security policies and guidelines
NASA Technical Reports Server (NTRS)
Sisson, Patricia L.; Green, James L.
1989-01-01
A guide is provided to system security with emphasis on requirements and guidelines that are necessary to maintain an acceptable level of security on the network. To have security for the network, each node on the network must be secure. Therefore, each system manager, must strictly adhere to the requirements and must consider implementing the guidelines discussed. There are areas of vulnerability within the operating system that may not be addressed. However, when a requirement or guideline is discussed, implementation techniques are included. Information related to computer and data security is discussed to provide information on implementation options. The information is presented as it relates to a VAX computer environment.
DNA EMP Awareness Course Notes. Supplement to Third Edition.
1978-07-31
UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (When Data Entered) REPORT DOCUMENTATION PAGE READ INSTRUCTIONS BEFORE COMPLETING FORM I REPORT...the environment through system design and testing. FORM 143 E,,N F’NOV 65 IS OBSOLETE DD JAN73 1473 EDITION OF UNCLASSIFIED SECURITY CLASSIFICATION OF...fields generated tems mission and deployment factors by the prompt gammas. Other forms of EMP, where these environments should be con- such as
Security Awareness Bulletin. Number 2-91, September 1991
1991-09-01
governments, competitors, In our rapidly changing workplace, computers and those having criminal intent, that uncontrolled access routinely communicate with...same as above; rental fee is slightly higher. Securily A wareness Bulletin 10 Number 2-91 New AIS Requirements in the Defense Industrial Security...original file copy. But remember, check the original for viruses 6. Files grow in size. Infamous to the Nvir, this before locking and relying upon it as a
Caught in the Middle at the U.S.-Canadian Border
2013-03-01
Ibid., 486–88. 85 World Trade Law , “Canada―United States Free Trade Agreement: Preamble,” (n.d.), http://www.worldtradelaw.net/ nafta /cusfta.pdf...Maritime Domain Awareness MDOT Michigan Department of Transportation MiSN Michigan Security Network MSOC Marine Security Operation Center NAFTA ...brother, Kevin, and in- laws , Bill and Susie Leining, have given throughout the years. I am especially grateful to my parents, Craig and Phyllis
Water dependency and water exploitation at global scale as indicators of water security
NASA Astrophysics Data System (ADS)
De Roo, A. P. J.; Beck, H.; Burek, P.; Bernard, B.
2015-12-01
A water dependency index has been developed indicating the dependency of water consumption from upstream sources of water, sometimes across (multiple) national border. This index is calculated at global scale using the 0.1 global LISFLOOD hydrological modelling system forced by WFDEI meteorological data for the timeframe 1979-2012. The global LISFLOOD model simulates the most important hydrological processes, as well as water abstraction and consumption from various sectors, and flood routing, at daily scale, with sub-timesteps for routing and subgrid parameterization related to elevation and landuse. The model contains also options for water allocation, to allow preferences of water use for particular sectors in water scarce periods. LISFLOOD is also used for the Global Flood Awareness System (GloFAS), the European Flood Awareness System (EFAS), continental scale climate change impact studies on floods and droughts. The water dependency indicator is calculated on a monthly basis, and various annual and multiannual indicators are derived from it. In this study, the indicator will be compared against water security areas known from other studies. Other indicators calculated are the Water Exploitation Index (WEI+), which is a commonly use water security indicator in Europe, and freshwater resources per capita indicators at regional, national and river basin scale. Several climate scnearios are run to indicate future trends in water security.
Cuba Fuentes, María Sofía; Zegarra Zamalloa, Carlos Orlando; Reichert, Sonja; Gill, Dawn
2016-04-27
Quaternary Prevention is defined as the action taken to identify patients at risk of overtreatment, to protect them from additional medical treatments, and to suggest interventions that are ethically acceptable. Many countries and organizations have joined in the efforts to practice quaternary prevention. These countries started a campaign called Choosing Wisely that implements recommendations in order to avoid harming patients. To determine the attitudes, perceptions and awareness towards Quaternary Prevention and the practice of Choosing Wisely Canada Recommendations among family doctors working in the Social Security System in Peru. A questionnaire was developed after reviewing the literature and contacting experts in the field and was sent by email to all 64 family physicians in the Social Security System (Essalud) in Lima Peru. Responses were received from 40 participants. The response rate was 64%. Approximately 95% reported that they understand the concept of quaternary prevention. Agreement with all the recommendations was 90% or higher. In most of the recommendations the applicability was more than 80%. The most important barriers perceived for the practice of Quaternary Prevention were patients expectations (33%). There are positive perceptions towards Quaternary Preventions and Choosing Wisely recommendations in the family doctors of social security in Lima Peru.
Byrd, Gary D; Devine, Patricia J; Corcoran, Kate E
2014-10-01
The Medical Library Association (MLA) Board of Directors and president charged an Ethical Awareness Task Force and recommended a survey to determine MLA members' awareness of and opinions about the current Code of Ethics for Health Sciences Librarianship. THE TASK FORCE AND MLA STAFF CRAFTED A SURVEY TO DETERMINE: (1) awareness of the MLA code and its provisions, (2) use of the MLA code to resolve professional ethical issues, (3) consultation of other ethical codes or guides, (4) views regarding the relative importance of the eleven MLA code statements, (5) challenges experienced in following any MLA code provisions, and (6) ethical problems not clearly addressed by the code. Over 500 members responded (similar to previous MLA surveys), and while most were aware of the code, over 30% could not remember when they had last read or thought about it, and nearly half had also referred to other codes or guidelines. The large majority thought that: (1) all code statements were equally important, (2) none were particularly difficult or challenging to follow, and (3) the code covered every ethical challenge encountered in their professional work. Comments provided by respondents who disagreed with the majority views suggest that the MLA code could usefully include a supplementary guide with practical advice on how to reason through a number of ethically challenging situations that are typically encountered by health sciences librarians.
Byrd, Gary D.; Devine, Patricia J.; Corcoran, Kate E.
2014-01-01
Objective: The Medical Library Association (MLA) Board of Directors and president charged an Ethical Awareness Task Force and recommended a survey to determine MLA members' awareness of and opinions about the current Code of Ethics for Health Sciences Librarianship. Methods: The task force and MLA staff crafted a survey to determine: (1) awareness of the MLA code and its provisions, (2) use of the MLA code to resolve professional ethical issues, (3) consultation of other ethical codes or guides, (4) views regarding the relative importance of the eleven MLA code statements, (5) challenges experienced in following any MLA code provisions, and (6) ethical problems not clearly addressed by the code. Results: Over 500 members responded (similar to previous MLA surveys), and while most were aware of the code, over 30% could not remember when they had last read or thought about it, and nearly half had also referred to other codes or guidelines. The large majority thought that: (1) all code statements were equally important, (2) none were particularly difficult or challenging to follow, and (3) the code covered every ethical challenge encountered in their professional work. Implications: Comments provided by respondents who disagreed with the majority views suggest that the MLA code could usefully include a supplementary guide with practical advice on how to reason through a number of ethically challenging situations that are typically encountered by health sciences librarians. PMID:25349544
Effective Strategies for School Security.
ERIC Educational Resources Information Center
Blauvelt, Peter D.
This handbook offers administrators specific advice on developing the skills, knowledge, and techniques needed for coping with problems of school crime and violence. The guide begins by advising administrators that having security information available at all times helps determine the climate of the school. Instructions are given for preparing…
20 CFR 404.1575 - Evaluation guides if you are self-employed.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... 404.1575 Section 404.1575 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... the work you do after you have become entitled to disability benefits. If you are entitled to social... this section, social security disability benefits means disability insurance benefits for a disabled...
Department of Defense Intelligence Information System (DoDIIS). Instructions 2000
2000-02-01
DIA, November 1993, DoDIIS Site Certifier’s Guide, SC-2610-143-93. e) DIA, June 1995, DoDIIS Security Architecture Guidance and Directions ( SAGD ), Draft...Plan S&T Scientific & Technical SAGD Security Architecture Guidance and Directions SBU Sensitive But Unclassified SCI Sensitive Compartmented
20 CFR 404.1575 - Evaluation guides if you are self-employed.
Code of Federal Regulations, 2011 CFR
2011-04-01
.... 404.1575 Section 404.1575 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... the work you do after you have become entitled to disability benefits. If you are entitled to social... this section, social security disability benefits means disability insurance benefits for a disabled...
ERIC Educational Resources Information Center
Atlanta Committee for the Olympic Games, GA.
This curriculum guide focuses on cultural awareness for students in grades K-8 through studying participants in the 1996 Olympic Games in Atlanta. The program explores the cultures of 20 countries through the eyes of an Olympic athlete. Volume 3 consists of two parts. Part 1 has five chapters with learning activities; those chapters include: (1)…
ERIC Educational Resources Information Center
Atlanta Committee for the Olympic Games, GA.
This curriculum guide focuses on cultural awareness for students in grades K-8 through studying participants in the 1996 Olympic Games in Atlanta (Georgia). The program explores the cultures of 20 countries through the eyes of an Olympic athlete. Volume 2 consists of two parts. Part 1 has five chapters with learning activities; those chapters…
ERIC Educational Resources Information Center
Texas State Commission on Fire Protection, Austin.
This booklet comprises the high school health component of a series of curriculum guides on fire and burn prevention. It is designed to meet the age-specific needs of ninth and tenth grade students. Objectives include: (1) reviewing comprehensive fire and burn prevention techniques and emergency actions; (2) developing an awareness of fire safety…
ERIC Educational Resources Information Center
Bush, Diane; Gonzalez-Arroyo, Michele; Stock, Laura; Delp, Linda; Miara, Christine; Dewey, Robin; Sinclair, Raymond C.; Ortega, Maria J.
This guide presents the lessons learned from three health education projects that focused on young worker issues and were funded by the National Institute for Occupational Safety and Health. In these projects, occupational health educators worked for 3 years, in three different communities, to raise the awareness of young worker issues, including…
Sensor data security level estimation scheme for wireless sensor networks.
Ramos, Alex; Filho, Raimir Holanda
2015-01-19
Due to their increasing dissemination, wireless sensor networks (WSNs) have become the target of more and more sophisticated attacks, even capable of circumventing both attack detection and prevention mechanisms. This may cause WSN users, who totally trust these security mechanisms, to think that a sensor reading is secure, even when an adversary has corrupted it. For that reason, a scheme capable of estimating the security level (SL) that these mechanisms provide to sensor data is needed, so that users can be aware of the actual security state of this data and can make better decisions on its use. However, existing security estimation schemes proposed for WSNs fully ignore detection mechanisms and analyze solely the security provided by prevention mechanisms. In this context, this work presents the sensor data security estimator (SDSE), a new comprehensive security estimation scheme for WSNs. SDSE is designed for estimating the sensor data security level based on security metrics that analyze both attack prevention and detection mechanisms. In order to validate our proposed scheme, we have carried out extensive simulations that show the high accuracy of SDSE estimates.
Sensor Data Security Level Estimation Scheme for Wireless Sensor Networks
Ramos, Alex; Filho, Raimir Holanda
2015-01-01
Due to their increasing dissemination, wireless sensor networks (WSNs) have become the target of more and more sophisticated attacks, even capable of circumventing both attack detection and prevention mechanisms. This may cause WSN users, who totally trust these security mechanisms, to think that a sensor reading is secure, even when an adversary has corrupted it. For that reason, a scheme capable of estimating the security level (SL) that these mechanisms provide to sensor data is needed, so that users can be aware of the actual security state of this data and can make better decisions on its use. However, existing security estimation schemes proposed for WSNs fully ignore detection mechanisms and analyze solely the security provided by prevention mechanisms. In this context, this work presents the sensor data security estimator (SDSE), a new comprehensive security estimation scheme for WSNs. SDSE is designed for estimating the sensor data security level based on security metrics that analyze both attack prevention and detection mechanisms. In order to validate our proposed scheme, we have carried out extensive simulations that show the high accuracy of SDSE estimates. PMID:25608215
75 FR 68811 - Recovery Publication, P-395, Fire Management Assistance Grant Program (FMAGP) Guide
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-09
... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID FEMA-2010-0066] Recovery Publication, P-395, Fire Management Assistance Grant Program (FMAGP) Guide AGENCY: Federal... Emergency Management Agency (FEMA) is accepting comments on the Fire Management Assistance Grant Program...
Management Guide to the Protection of Information Resources.
ERIC Educational Resources Information Center
Helsing, Cheryl; And Others
This guide introduces information systems security concerns and outlines the issues that must be addressed by all agency managers in meeting their responsibilities to protect information systems within their organizations. It describes the essential components of an effective information resource protection process that applies to an individual…
Cybersecurity Public Awareness Act of 2013
Sen. Whitehouse, Sheldon [D-RI
2013-10-31
Senate - 10/31/2013 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation: