Sample records for security decision directive

  1. 33 CFR 104.150 - Right to appeal.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Right to appeal. 104.150 Section 104.150 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS General § 104.150 Right to appeal. Any person directly affected by a decision or...

  2. 33 CFR 105.150 - Right to appeal.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Right to appeal. 105.150 Section 105.150 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES General § 105.150 Right to appeal. Any person directly affected by a decision...

  3. 46 CFR 1.03-40 - Appeals from decisions or actions of the National Maritime Center.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Maritime Center. 1.03-40 Section 1.03-40 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY PROCEDURES... Appeal § 1.03-40 Appeals from decisions or actions of the National Maritime Center. Any person directly affected by a decision or action of an officer or employee of the National Maritime Center (NMC) involving...

  4. Special Operations Forces Interagency Counterterrorism Reference Manual

    DTIC Science & Technology

    2009-03-01

    information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering...and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other...Presidential Review Directives and Presidential Decision Directives (Clin- ton administration) and National Security Study Directives and National

  5. Research on the Decision Method of Maintenance Materials Direct Supply

    NASA Astrophysics Data System (ADS)

    Zhu, Qian; Shi, Xiaopei; Liu, Shenyang; Luo, Guangxu; Zhu, Chen

    2018-05-01

    With the further development of civil military integration, more and more maintenance materials will be supplied by the factory directly. Aiming at the mode condition of maintenance materials factory direct supply, maintenance materials needs equipment support in the process of facing a number of direct supply manufacturers how to decision problems, using AHP, considering many factors optimization of direct supply manufacturers involved, and gives the weights of the evaluation indexes of the direct supply manufacturers to evaluate optimal. Finally, with 4 straights for the manufacturer as an example, considering the various evaluation indexes to carry out evaluation and drawing the correct evaluation of direct supply manufacturers, the best manufacturers direct supply is selected. An example shows that, AHP can provide scientific and theoretical basis to materials factory direct supply security.

  6. False alarms and incorrect rejections in an information security center: correlation with the frequency of incidents.

    PubMed

    Bruno, Thiers; Abrahão, Julia

    2012-01-01

    This study examines the actions taken by operators aimed at preventing and combating information security incidents at a banking organization. The work utilizes the theoretical framework of ergonomics and cognitive psychology. The method is workplace ergonomic analysis. Its focus is directed towards examining the cognitive dimension of the work environment with special attention to the occurrence of correlations between variability in incident frequency and the results of sign detection actions. It categorizes 45,142 operator decisions according to the theory of signal detection (Sternberg, 2000). It analyzes the correlation between incident proportions (indirectly associated with the cognitive efforts demanded from the operator) and operator decisions. The study demonstrated the existence of a positive correlation between incident proportions and false positive decisions (false alarms). However, this correlation could not be observed in relation to decisions of the false-negative type (incorrect rejection).

  7. 76 FR 53921 - Privacy Act of 1974; Department of Homeland Security ALL-034 Emergency Care Medical Records...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-30

    ..., and others performing or working on a contract, service, grant, cooperative agreement, or other... medical records, including psychological records, the decision to release directly to the individual, or...

  8. Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals

    NASA Astrophysics Data System (ADS)

    Fleischmann, Kenneth R.

    The biggest challenge facing computer security researchers and professionals is not learning how to make ethical decisions; rather it is learning how to recognize ethical decisions. All too often, technology development suffers from what Langdon Winner terms technological somnambulism - we sleepwalk through our technology design, following past precedents without a second thought, and fail to consider the perspectives of other stakeholders [1]. Computer security research and practice involves a number of opportunities for ethical decisions. For example, decisions about whether or not to automatically provide security updates involve tradeoffs related to caring versus user autonomy. Decisions about online voting include tradeoffs between convenience and security. Finally, decisions about routinely screening e-mails for spam involve tradeoffs of efficiency and privacy. It is critical that these and other decisions facing computer security researchers and professionals are confronted head on as value-laden design decisions, and that computer security researchers and professionals consider the perspectives of various stakeholders in making these decisions.

  9. 44 CFR 352.1 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... boundaries. (q) Command and control means making and issuing protective action decisions and directing... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Definitions. 352.1 Section... SECURITY PREPAREDNESS COMMERCIAL NUCLEAR POWER PLANTS: EMERGENCY PREPAREDNESS PLANNING § 352.1 Definitions...

  10. Technology and Ethics.

    ERIC Educational Resources Information Center

    Brown, Joan Marie

    1997-01-01

    Describes four open-ended activities for students in grades 4-12 designed to encourage thought, discussion, and decision making in classes dealing with issues in ethics and technology. Provides teacher directions, describes activities, and outlines debriefing sessions for lessons in copyright infringement, network security, artificial…

  11. The Media and National Security Decision-Making

    DTIC Science & Technology

    2004-02-29

    2002. Muller, Kerstin, “The CNN effect, media and global governance,” Speech by Minister of State Kerstin Muller to Open the Forum Global Issues on...time to analyze, develop and arrive at a decision is acutely abbreviated. Many factors influence this, and the increasing public awareness on global ... issues , thanks to the abundance of information, makes this a complex task. The attention and support Americans give to an issue is in direct

  12. 17 CFR 201.140 - Commission orders and decisions: Signature and availability.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Commission orders and decisions: Signature and availability. 201.140 Section 201.140 Commodity and Securities Exchanges SECURITIES... and decisions: Signature and availability. (a) Signature required. All orders and decisions of the...

  13. 6 CFR 13.37 - Initial Decision.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Initial Decision. 13.37 Section 13.37 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.37 Initial Decision. (a) The ALJ will issue an Initial Decision based only on the record, which will contain...

  14. 46 CFR 150.170 - Right of appeal.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 5 2011-10-01 2011-10-01 false Right of appeal. 150.170 Section 150.170 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES COMPATIBILITY OF CARGOES § 150.170 Right of appeal. Any person directly affected by a decision or action taken under this...

  15. 46 CFR 147.33 - Right of appeal.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 5 2013-10-01 2013-10-01 false Right of appeal. 147.33 Section 147.33 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES HAZARDOUS SHIPS' STORES General Provisions § 147.33 Right of appeal. Any person directly affected by a decision or action taken under this...

  16. 46 CFR 147.33 - Right of appeal.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 5 2014-10-01 2014-10-01 false Right of appeal. 147.33 Section 147.33 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES HAZARDOUS SHIPS' STORES General Provisions § 147.33 Right of appeal. Any person directly affected by a decision or action taken under this...

  17. 46 CFR 150.170 - Right of appeal.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 5 2012-10-01 2012-10-01 false Right of appeal. 150.170 Section 150.170 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES COMPATIBILITY OF CARGOES § 150.170 Right of appeal. Any person directly affected by a decision or action taken under this...

  18. 46 CFR 150.170 - Right of appeal.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 5 2014-10-01 2014-10-01 false Right of appeal. 150.170 Section 150.170 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES COMPATIBILITY OF CARGOES § 150.170 Right of appeal. Any person directly affected by a decision or action taken under this...

  19. 46 CFR 150.170 - Right of appeal.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 5 2013-10-01 2013-10-01 false Right of appeal. 150.170 Section 150.170 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES COMPATIBILITY OF CARGOES § 150.170 Right of appeal. Any person directly affected by a decision or action taken under this...

  20. 46 CFR 147.33 - Right of appeal.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 5 2011-10-01 2011-10-01 false Right of appeal. 147.33 Section 147.33 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES HAZARDOUS SHIPS' STORES General Provisions § 147.33 Right of appeal. Any person directly affected by a decision or action taken under this...

  1. 46 CFR 147.33 - Right of appeal.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 5 2012-10-01 2012-10-01 false Right of appeal. 147.33 Section 147.33 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES HAZARDOUS SHIPS' STORES General Provisions § 147.33 Right of appeal. Any person directly affected by a decision or action taken under this...

  2. 17 CFR 10.105 - Review by Commission on its own initiative.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... own initiative. 10.105 Section 10.105 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... initiative. The Commission may on its own initiative, within 30 days after the initial decision has been... the Commission has directed review on its own initiative shall be served on all parties by the...

  3. 46 CFR 169.113 - Right of appeal.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Right of appeal. 169.113 Section 169.113 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS General Provisions § 169.113 Right of appeal. Any person directly affected by a decision or action taken under this...

  4. 46 CFR 147.33 - Right of appeal.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Right of appeal. 147.33 Section 147.33 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES HAZARDOUS SHIPS' STORES General Provisions § 147.33 Right of appeal. Any person directly affected by a decision or action taken under this...

  5. 46 CFR 150.170 - Right of appeal.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Right of appeal. 150.170 Section 150.170 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES COMPATIBILITY OF CARGOES § 150.170 Right of appeal. Any person directly affected by a decision or action taken under this...

  6. 46 CFR 188.01-7 - Right of appeal.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Right of appeal. 188.01-7 Section 188.01-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS GENERAL PROVISIONS Authority and Purpose § 188.01-7 Right of appeal. Any person directly affected by a decision or...

  7. 46 CFR 168.05-15 - Right of appeal.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Right of appeal. 168.05-15 Section 168.05-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS CIVILIAN NAUTICAL SCHOOL VESSELS General Requirements § 168.05-15 Right of appeal. Any person directly affected by a decision or...

  8. 46 CFR 15.510 - Right of appeal.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 1 2010-10-01 2010-10-01 false Right of appeal. 15.510 Section 15.510 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; Inspected Vessels § 15.510 Right of appeal. Any person directly affected by a decision or action...

  9. 46 CFR 188.01-7 - Right of appeal.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 7 2011-10-01 2011-10-01 false Right of appeal. 188.01-7 Section 188.01-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS GENERAL PROVISIONS Authority and Purpose § 188.01-7 Right of appeal. Any person directly affected by a decision or...

  10. 46 CFR 188.01-7 - Right of appeal.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 7 2014-10-01 2014-10-01 false Right of appeal. 188.01-7 Section 188.01-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS GENERAL PROVISIONS Authority and Purpose § 188.01-7 Right of appeal. Any person directly affected by a decision or...

  11. 46 CFR 188.01-7 - Right of appeal.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 7 2013-10-01 2013-10-01 false Right of appeal. 188.01-7 Section 188.01-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS GENERAL PROVISIONS Authority and Purpose § 188.01-7 Right of appeal. Any person directly affected by a decision or...

  12. 46 CFR 188.01-7 - Right of appeal.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 7 2012-10-01 2012-10-01 false Right of appeal. 188.01-7 Section 188.01-7 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) OCEANOGRAPHIC RESEARCH VESSELS GENERAL PROVISIONS Authority and Purpose § 188.01-7 Right of appeal. Any person directly affected by a decision or...

  13. 46 CFR 15.510 - Right of appeal.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 1 2014-10-01 2014-10-01 false Right of appeal. 15.510 Section 15.510 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; Inspected Vessels § 15.510 Right of appeal. Any person directly affected by a decision or action...

  14. 46 CFR 15.510 - Right of appeal.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 1 2013-10-01 2013-10-01 false Right of appeal. 15.510 Section 15.510 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; Inspected Vessels § 15.510 Right of appeal. Any person directly affected by a decision or action...

  15. 46 CFR 15.510 - Right of appeal.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 1 2012-10-01 2012-10-01 false Right of appeal. 15.510 Section 15.510 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; Inspected Vessels § 15.510 Right of appeal. Any person directly affected by a decision or action...

  16. 46 CFR 15.510 - Right of appeal.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 1 2011-10-01 2011-10-01 false Right of appeal. 15.510 Section 15.510 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MERCHANT MARINE OFFICERS AND SEAMEN MANNING REQUIREMENTS Manning Requirements; Inspected Vessels § 15.510 Right of appeal. Any person directly affected by a decision or action...

  17. 46 CFR 169.113 - Right of appeal.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 7 2011-10-01 2011-10-01 false Right of appeal. 169.113 Section 169.113 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS SAILING SCHOOL VESSELS General Provisions § 169.113 Right of appeal. Any person directly affected by a decision or action taken under this...

  18. ICRP Publication 125: Radiological Protection in Security Screening.

    PubMed

    Cool, D A; Lazo, E; Tattersall, P; Simeonov, G; Niu, S

    2014-07-01

    The use of technologies to provide security screening for individuals and objects has been increasing rapidly, in keeping with the significant increase in security concerns worldwide. Within the spectrum of technologies, the use of ionizing radiation to provide backscatter and transmission screening capabilities has also increased. The Commission has previously made a number of statements related to the general topic of deliberate exposures of individuals in non-medical settings. This report provides advice on how the radiological protection principles recommended by the Commission should be applied within the context of security screening. More specifically, the principles of justification, optimisation of protection, and dose limitation for planned exposure situations are directly applicable to the use of ionising radiation in security screening. In addition, several specific topics are considered in this report, including the situation in which individuals may be exposed because they are concealed (‘stowaways’) in a cargo container or conveyance that may be subject to screening. The Commission continues to recommend that careful justification of screening should be considered before decisions are made to employ the technology. If a decision is made that its use is justified, the framework for protection as a planned exposure situation should be employed, including optimization of protection with the use of dose constraints and the appropriate provisions for authorisation and inspection.

  19. 6 CFR 27.330 - Summary decision procedures.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Summary decision procedures. 27.330 Section 27.330 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.330 Summary decision procedures. (a) The Presiding Officer...

  20. 6 CFR 27.330 - Summary decision procedures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Summary decision procedures. 27.330 Section 27.330 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.330 Summary decision procedures. (a) The Presiding Officer...

  1. 6 CFR 27.330 - Summary decision procedures.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Summary decision procedures. 27.330 Section 27.330 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.330 Summary decision procedures. (a) The Presiding Officer...

  2. 6 CFR 27.330 - Summary decision procedures.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Summary decision procedures. 27.330 Section 27.330 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.330 Summary decision procedures. (a) The Presiding Officer...

  3. 6 CFR 27.330 - Summary decision procedures.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Summary decision procedures. 27.330 Section 27.330 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.330 Summary decision procedures. (a) The Presiding Officer...

  4. 46 CFR 147A.6 - Right of appeal.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 5 2014-10-01 2014-10-01 false Right of appeal. 147A.6 Section 147A.6 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES INTERIM REGULATIONS FOR SHIPBOARD FUMIGATION General § 147A.6 Right of appeal. Any person directly affected by a decision or action taken under...

  5. 46 CFR 147A.6 - Right of appeal.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 5 2013-10-01 2013-10-01 false Right of appeal. 147A.6 Section 147A.6 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES INTERIM REGULATIONS FOR SHIPBOARD FUMIGATION General § 147A.6 Right of appeal. Any person directly affected by a decision or action taken under...

  6. 46 CFR 147A.6 - Right of appeal.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 5 2012-10-01 2012-10-01 false Right of appeal. 147A.6 Section 147A.6 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES INTERIM REGULATIONS FOR SHIPBOARD FUMIGATION General § 147A.6 Right of appeal. Any person directly affected by a decision or action taken under...

  7. 46 CFR 147A.6 - Right of appeal.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 5 2011-10-01 2011-10-01 false Right of appeal. 147A.6 Section 147A.6 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES INTERIM REGULATIONS FOR SHIPBOARD FUMIGATION General § 147A.6 Right of appeal. Any person directly affected by a decision or action taken under...

  8. 46 CFR 107.01-3 - Right of appeal.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Right of appeal. 107.01-3 Section 107.01-3 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS INSPECTION AND CERTIFICATION General § 107.01-3 Right of appeal. Any person directly affected by a decision or action taken...

  9. 46 CFR 107.01-3 - Right of appeal.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Right of appeal. 107.01-3 Section 107.01-3 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS INSPECTION AND CERTIFICATION General § 107.01-3 Right of appeal. Any person directly affected by a decision or action taken...

  10. 46 CFR 107.01-3 - Right of appeal.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Right of appeal. 107.01-3 Section 107.01-3 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS INSPECTION AND CERTIFICATION General § 107.01-3 Right of appeal. Any person directly affected by a decision or action taken...

  11. 46 CFR 107.01-3 - Right of appeal.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Right of appeal. 107.01-3 Section 107.01-3 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS INSPECTION AND CERTIFICATION General § 107.01-3 Right of appeal. Any person directly affected by a decision or action taken...

  12. 46 CFR 107.01-3 - Right of appeal.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Right of appeal. 107.01-3 Section 107.01-3 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) A-MOBILE OFFSHORE DRILLING UNITS INSPECTION AND CERTIFICATION General § 107.01-3 Right of appeal. Any person directly affected by a decision or action taken...

  13. 46 CFR 110.01-4 - Right of appeal.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 4 2011-10-01 2011-10-01 false Right of appeal. 110.01-4 Section 110.01-4 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING GENERAL PROVISIONS Applicability § 110.01-4 Right of appeal. Any person directly affected by a decision or action taken under this...

  14. 46 CFR 110.01-4 - Right of appeal.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Right of appeal. 110.01-4 Section 110.01-4 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING GENERAL PROVISIONS Applicability § 110.01-4 Right of appeal. Any person directly affected by a decision or action taken under this...

  15. 46 CFR 110.01-4 - Right of appeal.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 4 2014-10-01 2014-10-01 false Right of appeal. 110.01-4 Section 110.01-4 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING GENERAL PROVISIONS Applicability § 110.01-4 Right of appeal. Any person directly affected by a decision or action taken under this...

  16. 46 CFR 148.01-15 - Right of appeal.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Right of appeal. 148.01-15 Section 148.01-15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES CARRIAGE OF SOLID HAZARDOUS MATERIALS IN BULK General § 148.01-15 Right of appeal. Any person directly affected by a decision or action...

  17. 46 CFR 147A.6 - Right of appeal.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Right of appeal. 147A.6 Section 147A.6 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DANGEROUS CARGOES INTERIM REGULATIONS FOR SHIPBOARD FUMIGATION General § 147A.6 Right of appeal. Any person directly affected by a decision or action taken under...

  18. 46 CFR 167.10-50 - Right of appeal.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Right of appeal. 167.10-50 Section 167.10-50 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) NAUTICAL SCHOOLS PUBLIC NAUTICAL SCHOOL SHIPS Enforcement and Right of Appeal § 167.10-50 Right of appeal. Any person directly affected by a decision or...

  19. 46 CFR 110.01-4 - Right of appeal.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 4 2012-10-01 2012-10-01 false Right of appeal. 110.01-4 Section 110.01-4 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING GENERAL PROVISIONS Applicability § 110.01-4 Right of appeal. Any person directly affected by a decision or action taken under this...

  20. 46 CFR 110.01-4 - Right of appeal.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 4 2013-10-01 2013-10-01 false Right of appeal. 110.01-4 Section 110.01-4 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) ELECTRICAL ENGINEERING GENERAL PROVISIONS Applicability § 110.01-4 Right of appeal. Any person directly affected by a decision or action taken under this...

  1. 17 CFR 140.14 - Delegation of authority to the Secretary of the Commission.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Secretary of the Commission. 140.14 Section 140.14 Commodity and Securities Exchanges COMMODITY FUTURES... of authority to the Secretary of the Commission. After the Commission has formally reached a decision... directed that the document be issued, the Secretary of the Commission (or a person designated in writing by...

  2. 17 CFR 140.14 - Delegation of authority to the Secretary of the Commission.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Secretary of the Commission. 140.14 Section 140.14 Commodity and Securities Exchanges COMMODITY FUTURES... of authority to the Secretary of the Commission. After the Commission has formally reached a decision... directed that the document be issued, the Secretary of the Commission (or a person designated in writing by...

  3. 17 CFR 140.14 - Delegation of authority to the Secretary of the Commission.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Secretary of the Commission. 140.14 Section 140.14 Commodity and Securities Exchanges COMMODITY FUTURES... of authority to the Secretary of the Commission. After the Commission has formally reached a decision... directed that the document be issued, the Secretary of the Commission (or a person designated in writing by...

  4. 6 CFR 13.38 - Reconsideration of Initial Decision.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Reconsideration of Initial Decision. 13.38 Section 13.38 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.38 Reconsideration of Initial Decision. (a) Except as provided in paragraph (d) of...

  5. 76 FR 65366 - Amendments to Procedures for Certain Determinations and Decisions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-21

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2007-0092] RIN 0960-AG72 Amendments to Procedures for Certain Determinations and Decisions AGENCY: Social Security Administration... CONTACT: Joshua Silverman, Office of Regulations, Social Security Administration, 6401 Security Boulevard...

  6. A Layered Decision Model for Cost-Effective System Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wei, Huaqiang; Alves-Foss, James; Soule, Terry

    System security involves decisions in at least three areas: identification of well-defined security policies, selection of cost-effective defence strategies, and implementation of real-time defence tactics. Although choices made in each of these areas affect the others, existing decision models typically handle these three decision areas in isolation. There is no comprehensive tool that can integrate them to provide a single efficient model for safeguarding a network. In addition, there is no clear way to determine which particular combinations of defence decisions result in cost-effective solutions. To address these problems, this paper introduces a Layered Decision Model (LDM) for use inmore » deciding how to address defence decisions based on their cost-effectiveness. To validate the LDM and illustrate how it is used, we used simulation to test model rationality and applied the LDM to the design of system security for an e-commercial business case.« less

  7. Foreign Investment and National Security: Economic Considerations

    DTIC Science & Technology

    2010-02-08

    euros. The OECD projects that the overall amount of direct investment flows in 2008 will decline as a result of lower levels of foreign direct...2.7 2.5 North America 129.9 244.4 n.a. 13.7 18.7 n.a. United States 101.0 175.4 192.9 10.7 13.4 12.5 Other developed econ . -34.6 46.7 n.a. -3.7...periodic regulatory impact assessments, and requirements that decisions to block an investment should be taken at high government levels . Critical

  8. Foreign Investment and National Security: Economic Considerations

    DTIC Science & Technology

    2008-12-01

    overall amount of direct investment flows in 2008 will decline as a result of lower levels of foreign direct investment into and out of the United States...244.4 n.a. 13.7 18.7 n.a. United States 101.0 175.4 192.9 10.7 13.4 12.5 Other developed econ . -34.6 46.7 n.a. -3.7 3.6 n.a. Developing economies...regulatory impact assessments, and requirements that decisions to block an investment should be taken at high government levels

  9. 5 CFR 9701.222 - Reconsideration of classification decisions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... decisions. 9701.222 Section 9701.222 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.222...

  10. Method of calculation of critical values of financial indicators for developing food security strategy

    NASA Astrophysics Data System (ADS)

    Aigyl Ilshatovna, Sabirova; Svetlana Fanilevna, Khasanova; Vildanovna, Nagumanova Regina

    2018-05-01

    On the basis of decision making theory (minimax and maximin approaches) the authors propose a technique with the results of calculations of the critical values of effectiveness indicators of agricultural producers in the Republic of Tatarstan for 2013-2015. There is justified necessity of monitoring the effectiveness of the state support and the direction of its improvement.

  11. 76 FR 65512 - Record of Decision Addendum for the Department of Homeland Security Headquarters Consolidation at...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-21

    ... parts 1500-1508), GSA Order PBS P 1095.1F (Environmental considerations in decision-making, dated... Decision Addendum for the Department of Homeland Security Headquarters Consolidation at St. Elizabeths in...). ACTION: Record of Decision Addendum. SUMMARY: Pursuant to the requirements of the National Environmental...

  12. 77 FR 56676 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-13

    ... have been reviewed for inclusion of Social Security Numbers or equivalent non-publicly- available... Decisions are made available to the public (after redaction of Social Security Numbers or equivalent non... Judicial Officer Administrative Decisions (after redaction of Social Security Numbers or equivalent non...

  13. 17 CFR 8.20 - Final decision.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Final decision. 8.20 Section 8.20 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION EXCHANGE PROCEDURES FOR DISCIPLINARY, SUMMARY, AND MEMBERSHIP DENIAL ACTIONS Disciplinary Procedure § 8.20 Final decision. Each...

  14. Design of an Aircrew Scheduling Decision Aid for the 6916th Electronic Security Squadron.

    DTIC Science & Technology

    1987-06-01

    Security Classification) Design of an Aircrew Scheduling Decision Aid for the 6916th Electronic Security Squadron 12. PERSONAL AUTHOR(S) Thomas J. Kopf...Because of the great number of possible scheduling alternatives, it is difficult to find an optimal solution to-the scheduling problem. Additionally...changes to the original schedule make it even more difficult to find an optimal solution. The emergence of capable microcompu- ters, decision support

  15. The Role of Human Factors/Ergonomics in the Science of Security: Decision Making and Action Selection in Cyberspace.

    PubMed

    Proctor, Robert W; Chen, Jing

    2015-08-01

    The overarching goal is to convey the concept of science of security and the contributions that a scientifically based, human factors approach can make to this interdisciplinary field. Rather than a piecemeal approach to solving cybersecurity problems as they arise, the U.S. government is mounting a systematic effort to develop an approach grounded in science. Because humans play a central role in security measures, research on security-related decisions and actions grounded in principles of human information-processing and decision-making is crucial to this interdisciplinary effort. We describe the science of security and the role that human factors can play in it, and use two examples of research in cybersecurity--detection of phishing attacks and selection of mobile applications--to illustrate the contribution of a scientific, human factors approach. In these research areas, we show that systematic information-processing analyses of the decisions that users make and the actions they take provide a basis for integrating the human component of security science. Human factors specialists should utilize their foundation in the science of applied information processing and decision making to contribute to the science of cybersecurity. © 2015, Human Factors and Ergonomics Society.

  16. 20 CFR 220.35 - Introduction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... term is defined in the Social Security Act. In making these decisions the Board must apply the... Services in making disability decisions under the Social Security Act. Regulations of the Social Security... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Introduction. 220.35 Section 220.35 Employees...

  17. 6 CFR 21.17 - Decisions and notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Decisions and notices. 21.17 Section 21.17 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE...

  18. 6 CFR 21.17 - Decisions and notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Decisions and notices. 21.17 Section 21.17 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE...

  19. 6 CFR 21.17 - Decisions and notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Decisions and notices. 21.17 Section 21.17 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE...

  20. 6 CFR 21.17 - Decisions and notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Decisions and notices. 21.17 Section 21.17 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE...

  1. 6 CFR 21.17 - Decisions and notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Decisions and notices. 21.17 Section 21.17 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE...

  2. 17 CFR 8.28 - Final decision.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Final decision. 8.28 Section 8.28 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION EXCHANGE PROCEDURES FOR DISCIPLINARY, SUMMARY, AND MEMBERSHIP DENIAL ACTIONS Summary Actions § 8.28 Final decision. Each exchange shall...

  3. 20 CFR 703.204 - Decision on insurance carrier's application; minimum amount of deposit.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.204 Decision on insurance... determining the extent of an insurance carrier's unsecured LHWCA obligations and fixing the amount of security... number of factors in setting the security deposit amount including, but not limited to, the— (1...

  4. 20 CFR 703.204 - Decision on insurance carrier's application; minimum amount of deposit.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.204 Decision on insurance... determining the extent of an insurance carrier's unsecured LHWCA obligations and fixing the amount of security... number of factors in setting the security deposit amount including, but not limited to, the— (1...

  5. 17 CFR 201.411 - Commission consideration of initial decisions by hearing officers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Commission consideration of initial decisions by hearing officers. 201.411 Section 201.411 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES OF PRACTICE Rules of Practice Appeal to the Commission and...

  6. THE LONG REACH OF EDUCATION: EARLY RETIREMENT.

    PubMed

    Venti, Steven; Wise, David A

    2015-12-01

    The goal of this paper is to draw attention to the long lasting effect of education on economic outcomes. We use the relationship between education and two routes to early retirement - the receipt of Social Security Disability Insurance (DI) and the early claiming of Social Security retirement benefits - to illustrate the long-lasting influence of education. We find that for both men and women with less than a high school degree the median DI participation rate is 6.6 times the participation rate for those with a college degree or more. Similarly, men and women with less than a high school education are over 25 percentage points more likely to claim Social Security benefits early than those with a college degree or more. We focus on four critical "pathways" through which education may indirectly influence early retirement - health, employment, earnings, and the accumulation of assets. We find that for women health is the dominant pathway through which education influences DI participation. For men, the health, earnings, and wealth pathways are of roughly equal magnitude. For both men and women the principal channel through which education influences early Social Security claiming decisions is the earnings pathway. We also consider the direct effect of education that does not operate through these pathways. The direct effect of education is much greater for early claiming of Social Security benefits than for DI participation, accounting for 72 percent of the effect of education for men and 67 percent for women. For women the direct effect of education on DI participation is not statistically significant, suggesting that the total effect may be through the four pathways.

  7. Exploring key factors in online shopping with a hybrid model.

    PubMed

    Chen, Hsiao-Ming; Wu, Chia-Huei; Tsai, Sang-Bing; Yu, Jian; Wang, Jiangtao; Zheng, Yuxiang

    2016-01-01

    Nowadays, the web increasingly influences retail sales. An in-depth analysis of consumer decision-making in the context of e-business has become an important issue for internet vendors. However, factors affecting e-business are complicated and intertwined. To stimulate online sales, understanding key influential factors and causal relationships among the factors is important. To gain more insights into this issue, this paper introduces a hybrid method, which combines the Decision Making Trial and Evaluation Laboratory (DEMATEL) with the analytic network process, called DANP method, to find out the driving factors that influence the online business mostly. By DEMATEL approach the causal graph showed that "online service" dimension has the highest degree of direct impact on other dimensions; thus, the internet vendor is suggested to made strong efforts on service quality throughout the online shopping process. In addition, the study adopted DANP to measure the importance of key factors, among which "transaction security" proves to be the most important criterion. Hence, transaction security should be treated with top priority to boost the online businesses. From our study with DANP approach, the comprehensive information can be visually detected so that the decision makers can spotlight on the root causes to develop effectual actions.

  8. Representing Farmer Irrigation Decisions in Northern India: Model Development from the Bottom Up.

    NASA Astrophysics Data System (ADS)

    O'Keeffe, J.; Buytaert, W.; Brozovic, N.; Mijic, A.

    2017-12-01

    The plains of northern India are among the most intensely populated and irrigated regions of the world. Sustaining water demand has been made possible by exploiting the vast and hugely productive aquifers underlying the Indo-Gangetic basin. However, an increasing demand from a growing population and highly variable socio-economic and environmental variables mean present resources may not be sustainable, resulting in water security becoming one of India's biggest challenges. Unless solutions which take into consideration the regions evolving anthropogenic and environmental conditions are found, the sustainability of India's water resources looks bleak. Understanding water user decisions and their potential outcome is important for development of suitable water resource management options. Computational models are commonly used to assist water use decision making, typically representing natural processes well. The inclusion of human decision making however, one of the dominant drivers of change, has lagged behind. Improved representation of irrigation water user behaviour within models provides more accurate, relevant information for irrigation management. This research conceptualizes and proceduralizes observed farmer irrigation practices, highlighting feedbacks between the environment and livelihood. It is developed using a bottom up approach, informed through field experience and stakeholder interaction in Uttar Pradesh, northern India. Real world insights are incorporated through collected information creating a realistic representation of field conditions, providing a useful tool for policy analysis and water management. The modelling framework is applied to four districts. Results suggest predicted future climate will have little direct impact on water resources, crop yields or farmer income. In addition, increased abstraction may be sustainable in some areas under carefully managed conditions. By simulating dynamic decision making, feedbacks and interactions between water users, irrigation officials, agricultural practices, and external influences such as energy pricing and farming subsidies, this work highlights the importance of directly including water user behaviour in policy making and operational tools, which will help achieve water and livelihood security.

  9. Security Design Flaws That Affect Usability in Online Banking

    ERIC Educational Resources Information Center

    Gurlen, Stephanie

    2013-01-01

    As the popularity of online banking Websites has increased, the security of these sites has become increasingly critical as attacks against these sites are on the rise. However, the design decisions made during construction of the sites could make usability more difficult, where the user has difficulty making good security decisions. This study…

  10. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Okhravi, Hamed; Sheldon, Frederick T.; Haines, Joshua

    Data diodes provide protection of critical cyber assets by the means of physically enforcing traffic direction on the network. In order to deploy data diodes effectively, it is imperative to understand the protection they provide, the protection they do not provide, their limitations, and their place in the larger security infrastructure. In this work, we study data diodes, their functionalities and limitations. We then propose two critical infrastructure systems that can benefit from the additional protection offered by data diodes: process control networks and net-centric cyber decision support systems. We review the security requirements of these systems, describe the architectures,more » and study the trade-offs. Finally, the architectures are evaluated against different attack patterns.« less

  11. 78 FR 11939 - Social Security Ruling, SSR 13-2p.; Titles II and XVI: Evaluating Cases Involving Drug Addiction...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-20

    ... determination or decision. The type and number of CEs we purchase will depend on the claimant's allegations and... decisions relating to the Federal old-age, survivors, disability, supplemental security income, special veterans benefits, and black lung benefits programs. SSRs may be based on determinations or decisions made...

  12. The strategic security officer.

    PubMed

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  13. The Effect of Knowledge of Online Security Risks on Consumer Decision Making in B2C e-Commerce

    ERIC Educational Resources Information Center

    Wang, Ping An

    2010-01-01

    This dissertation research studied how different degrees of knowledge of online security risks affect B2C (business-to-consumer) e-commerce consumer decision making. Online information security risks, such as identity theft, have increasingly become a major factor inhibiting the potential growth of e-commerce. On the other hand, e-commerce…

  14. FY 2016 Site-Directed Research & Development Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bender, Howard

    As the Nevada National Security Site (NNSS) continues to evolve and transition its mission to a broader scope, significant challenges lie ahead that present unique opportunities for our research and development (R&D) enterprise. At the juncture, we are poised to create a different future investment strategy. Our decisions at the beginning of a new tri-decade span must be guided as expertly as possible given the greater complexity and multifaceted nature of our work.

  15. The Influence of the Catholic Church on the Eisenhower Administration’s Decision to Directly Intervene in Vietnam

    DTIC Science & Technology

    2013-06-14

    pillars of containment philosophy. The book Strategies of Containment: A Critical Appraisal of American National Security Policy during the Cold War...and Government of Vietnam Strategies in Conflict” provides details and facts that assist in understanding the broad themes of the two countries...resisting outside influence for centuries. As a result, the country developed an eclectic mix of cultures, languages, and nationalities within its borders

  16. THE LONG REACH OF EDUCATION: EARLY RETIREMENT

    PubMed Central

    Wise, David A.

    2015-01-01

    The goal of this paper is to draw attention to the long lasting effect of education on economic outcomes. We use the relationship between education and two routes to early retirement – the receipt of Social Security Disability Insurance (DI) and the early claiming of Social Security retirement benefits – to illustrate the long-lasting influence of education. We find that for both men and women with less than a high school degree the median DI participation rate is 6.6 times the participation rate for those with a college degree or more. Similarly, men and women with less than a high school education are over 25 percentage points more likely to claim Social Security benefits early than those with a college degree or more. We focus on four critical “pathways” through which education may indirectly influence early retirement – health, employment, earnings, and the accumulation of assets. We find that for women health is the dominant pathway through which education influences DI participation. For men, the health, earnings, and wealth pathways are of roughly equal magnitude. For both men and women the principal channel through which education influences early Social Security claiming decisions is the earnings pathway. We also consider the direct effect of education that does not operate through these pathways. The direct effect of education is much greater for early claiming of Social Security benefits than for DI participation, accounting for 72 percent of the effect of education for men and 67 percent for women. For women the direct effect of education on DI participation is not statistically significant, suggesting that the total effect may be through the four pathways. PMID:26664822

  17. Water security-National and global issues

    USGS Publications Warehouse

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  18. Security Investment in Contagious Networks.

    PubMed

    Hasheminasab, Seyed Alireza; Tork Ladani, Behrouz

    2018-01-16

    Security of the systems is normally interdependent in such a way that security risks of one part affect other parts and threats spread through the vulnerable links in the network. So, the risks of the systems can be mitigated through investments in the security of interconnecting links. This article takes an innovative look at the problem of security investment of nodes on their vulnerable links in a given contagious network as a game-theoretic model that can be applied to a variety of applications including information systems. In the proposed game model, each node computes its corresponding risk based on the value of its assets, vulnerabilities, and threats to determine the optimum level of security investments on its external links respecting its limited budget. Furthermore, direct and indirect nonlinear influences of a node's security investment on the risks of other nodes are considered. The existence and uniqueness of the game's Nash equilibrium in the proposed game are also proved. Further analysis of the model in a practical case revealed that taking advantage of the investment effects of other players, perfectly rational players (i.e., those who use the utility function of the proposed game model) make more cost-effective decisions than selfish nonrational or semirational players. © 2018 Society for Risk Analysis.

  19. The Potential Effects of Obesity on Social Security Claiming Behavior and Retirement Benefits.

    PubMed

    Knoll, Melissa A Z; Shoffner, Dave; O'Leary, Samantha

    2018-04-16

    Obesity prevalence among Americans has increased for nearly three decades. We explore the relationship between the rise in obesity and Social Security retirement benefit claiming, a decision impacting nearly all aging Americans. Specifically, we investigate whether obesity can affect individuals' decision to claim benefits early, a choice that has important implications for financial security in retirement, particularly for those with lower socioeconomic status (SES). We use a microsimulation model called MINT6 (Modeling Income in the Near Term, version 6) to demonstrate the potential effects of obesity on subjective life expectancy and claiming behavior. We impute obesity status using data from the National Health and Nutrition Examination Survey (NHANES), which describes the distribution of obesity prevalence within the United States by gender, poverty status, and race/ethnicity. We find that the rise in obesity and the consequent incidence of obesity-related diseases may lead some individuals to make claiming decisions that lead to lower monthly and lifetime Social Security retirement benefits. Further, we find that the potential economic impact of this decision is larger for those with lower SES. We present a behavioral perspective by addressing the potential effects that obesity can have on individuals' retirement decisions and their resulting Social Security retirement benefits.

  20. 20 CFR 435.82 - Appeal of decision of ACOAG.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 435.82 Employees' Benefits SOCIAL SECURITY ADMINISTRATION UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, OTHER NON-PROFIT ORGANIZATIONS... Commissioner of Social Security a written request for review of the ACOAG's decision. The written request for...

  1. 20 CFR 435.82 - Appeal of decision of ACOAG.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 435.82 Employees' Benefits SOCIAL SECURITY ADMINISTRATION UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, OTHER NON-PROFIT ORGANIZATIONS... Commissioner of Social Security a written request for review of the ACOAG's decision. The written request for...

  2. 20 CFR 435.82 - Appeal of decision of ACOAG.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 435.82 Employees' Benefits SOCIAL SECURITY ADMINISTRATION UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, OTHER NON-PROFIT ORGANIZATIONS... Commissioner of Social Security a written request for review of the ACOAG's decision. The written request for...

  3. 20 CFR 435.82 - Appeal of decision of ACOAG.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 435.82 Employees' Benefits SOCIAL SECURITY ADMINISTRATION UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, OTHER NON-PROFIT ORGANIZATIONS... Commissioner of Social Security a written request for review of the ACOAG's decision. The written request for...

  4. 20 CFR 435.82 - Appeal of decision of ACOAG.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 435.82 Employees' Benefits SOCIAL SECURITY ADMINISTRATION UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, OTHER NON-PROFIT ORGANIZATIONS... Commissioner of Social Security a written request for review of the ACOAG's decision. The written request for...

  5. Iraq: Post-Saddam Governance and Security

    DTIC Science & Technology

    2006-10-18

    the Ottoman empire until British forces defeated the Ottomans in World War I and took control of what is now Iraq in 1918 . Britain had tried to take...December 2005, and he reportedly continues to play a role in oil decisions. (A table on U.S. appropriations for the Iraqi opposition, including the INC...former head of the Hawza, was Ayatollah Abol Qasem Musavi-Khoi. Like Khoi, Sistani generally opposes a direct role for clerics in government, but he

  6. Iraq: Post-Saddam Governance and Security

    DTIC Science & Technology

    2006-11-07

    the Ottomans in World War I and took control of what is now Iraq in 1918 . Britain had tried to take Iraq from the Ottomans in Iraq earlier in World War... role in oil decisions. (A table on U.S. appropriations for the Iraqi opposition, including the INC, is an appendix).4 Another secular group, the Iraq...Sistani generally opposes a direct role for clerics in government, but he believes in clerical supervision of political leaders. He wants Iraq to

  7. 12 CFR 12.7 - Securities trading policies and procedures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... registered broker/dealers; (ii) Execute transactions in securities for customers; or (iii) Process orders for... investment recommendations or decisions for the accounts of customers; (ii) Participate in the determination of the recommendations or decisions; or (iii) In connection with their duties, obtain information...

  8. Why robots should not be delegated with the decision to kill

    NASA Astrophysics Data System (ADS)

    Sharkey, Noel

    2017-04-01

    The EPSRC first principle of robotics, "robots should not be designed solely or primarily to kill or harm humans, except in the interests of national security", is challenged in detail here. Focusing on security and armed conflict, arguments are marshalled against the principle on ethical, legal, technical and security grounds. A new principle is proposed that robots should never be delegated with the decision to apply violent force to humans.

  9. On the Southern Border of the United States: Threats and Opportunities in an Economy of Force Theater

    DTIC Science & Technology

    2007-05-10

    U.S. Naval War College, National Security Decision Making handout dated 19 April 2006, page 2. 15 Geoffrey Crawford, The Posse Comitatus Act...2. 20 Shawn Burns, Homeland Security Considerations, U.S. Naval War College, National Security Decision Making handout dated 19 April 2006, page 3...States.42 The routes that make free-flowing ports of entry so attractive for 40 Ibid. Vallone

  10. Emerging Security Mechanisms for Medical Cyber Physical Systems.

    PubMed

    Kocabas, Ovunc; Soyata, Tolga; Aktas, Mehmet K

    2016-01-01

    The following decade will witness a surge in remote health-monitoring systems that are based on body-worn monitoring devices. These Medical Cyber Physical Systems (MCPS) will be capable of transmitting the acquired data to a private or public cloud for storage and processing. Machine learning algorithms running in the cloud and processing this data can provide decision support to healthcare professionals. There is no doubt that the security and privacy of the medical data is one of the most important concerns in designing an MCPS. In this paper, we depict the general architecture of an MCPS consisting of four layers: data acquisition, data aggregation, cloud processing, and action. Due to the differences in hardware and communication capabilities of each layer, different encryption schemes must be used to guarantee data privacy within that layer. We survey conventional and emerging encryption schemes based on their ability to provide secure storage, data sharing, and secure computation. Our detailed experimental evaluation of each scheme shows that while the emerging encryption schemes enable exciting new features such as secure sharing and secure computation, they introduce several orders-of-magnitude computational and storage overhead. We conclude our paper by outlining future research directions to improve the usability of the emerging encryption schemes in an MCPS.

  11. 17 CFR 171.33 - Final decision by the Commission.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Final decision by the Commission. 171.33 Section 171.33 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION... substantially correct and that none of the arguments on appeal made by the appellant raise important questions...

  12. 17 CFR 9.33 - Final decision by the Commission.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Final decision by the Commission. 9.33 Section 9.33 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES... appellant raise important questions of law or policy, the Commission may, by appropriate order, summarily...

  13. 20 CFR 416.1570 - Decision by hearing officer.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 416.1570 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED...) After the close of the hearing, the hearing officer shall issue a decision or certify the case to the...., failure to pay dues or to complete continuing legal education requirements), that will not disqualify the...

  14. 20 CFR 416.1570 - Decision by hearing officer.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 416.1570 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED...) After the close of the hearing, the hearing officer will issue a decision or certify the case to the... (e.g., failure to pay dues or to complete continuing legal education requirements), that will not...

  15. 20 CFR 416.1570 - Decision by hearing officer.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 416.1570 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED...) After the close of the hearing, the hearing officer will issue a decision or certify the case to the... (e.g., failure to pay dues or to complete continuing legal education requirements), that will not...

  16. 20 CFR 416.1570 - Decision by hearing officer.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 416.1570 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED...) After the close of the hearing, the hearing officer will issue a decision or certify the case to the... (e.g., failure to pay dues or to complete continuing legal education requirements), that will not...

  17. 20 CFR 416.1570 - Decision by hearing officer.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 416.1570 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED...) After the close of the hearing, the hearing officer shall issue a decision or certify the case to the...., failure to pay dues or to complete continuing legal education requirements), that will not disqualify the...

  18. An Artificial Neural Network-Based Decision-Support System for Integrated Network Security

    DTIC Science & Technology

    2014-09-01

    group that they need to know in order to make team-based decisions in real-time environments, (c) Employ secure cloud computing services to host mobile...THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of Engineering and Management Air Force...out-of-the-loop syndrome and create complexity creep. As a result, full automation efforts can lead to inappropriate decision-making despite a

  19. Livestock and food security: vulnerability to population growth and climate change

    PubMed Central

    Godber, Olivia F; Wall, Richard

    2014-01-01

    Livestock production is an important contributor to sustainable food security for many nations, particularly in low-income areas and marginal habitats that are unsuitable for crop production. Animal products account for approximately one-third of global human protein consumption. Here, a range of indicators, derived from FAOSTAT and World Bank statistics, are used to model the relative vulnerability of nations at the global scale to predicted climate and population changes, which are likely to impact on their use of grazing livestock for food. Vulnerability analysis has been widely used in global change science to predict impacts on food security and famine. It is a tool that is useful to inform policy decision making and direct the targeting of interventions. The model developed shows that nations within sub-Saharan Africa, particularly in the Sahel region, and some Asian nations are likely to be the most vulnerable. Livestock-based food security is already compromised in many areas on these continents and suffers constraints from current climate in addition to the lack of economic and technical support allowing mitigation of predicted climate change impacts. Governance is shown to be a highly influential factor and, paradoxically, it is suggested that current self-sufficiency may increase future potential vulnerability because trade networks are poorly developed. This may be relieved through freer trade of food products, which is also associated with improved governance. Policy decisions, support and interventions will need to be targeted at the most vulnerable nations, but given the strong influence of governance, to be effective, any implementation will require considerable care in the management of underlying structural reform. PMID:24692268

  20. Indo-Russian Military and Nuclear Cooperation: Implications for U.S. Security Interests

    DTIC Science & Technology

    1999-12-01

    India’s quest for global status and equity. The rise of the BJP has resulted in a new approach to international nuclear politics in New Delhi. India has...normative advantages afforded to India by the acquisition of nuclear arms. These polar views result in a "chicken or the egg scenario" in which one side...decisions by its leadership could result in the first bilateral nuclear exchange in history (with Pakistan or China) or lead to direct conflict with the

  1. POLICY VARIATION, LABOR SUPPLY ELASTICITIES, AND A STRUCTURAL MODEL OF RETIREMENT

    PubMed Central

    MANOLI, DAY; MULLEN, KATHLEEN J.; WAGNER, MATHIS

    2015-01-01

    This paper exploits a combination of policy variation from multiple pension reforms in Austria and administrative data from the Austrian Social Security Database. Using the policy changes for identification, we estimate social security wealth and accrual elasticities in individuals’ retirement decisions. Next, we use these elasticities to estimate a dynamic programming model of retirement decisions. Finally, we use the estimated model to examine the labor supply and welfare consequences of potential social security reforms. PMID:26472916

  2. Health-based Provisional Advisory Levels (PALs) for homeland security.

    PubMed

    Adeshina, Femi; Sonich-Mullin, Cynthia; Ross, Robert H; Wood, Carol S

    2009-12-01

    The Homeland Security Presidential Directive #8 (HSPD-8) for National Emergency Preparedness was issued to " establish policies to strengthen the preparedness of the United States to prevent and respond to threatened or actual domestic terrorist attacks, major disasters, and other emergencies by requiring a national domestic all- hazards preparedness goal. "In response to HSPD-8 and HSPD-22 (classified) on Domestic Chemical Defense, the US Environmental Protection Agency (US EPA) National Homeland Security Research Center (NHSRC) is developing health-based Provisional Advisory Levels (PALs) for priority chemicals (including chemical warfare agents, pesticides, and toxic industrial chemicals) in air and drinking water. PALs are temporary values that will neither be promulgated, nor be formally issued as regulatory guidance. They are intended to be used at the discretion of risk managers in emergency situations. The PAL Program provides advisory exposure levels for chemical agents to assist in emergency planning and response decision-making, and to aid in making informed risk management decisions for evacuation, temporary re-entry into affected areas, and resumed-use of infrastructure, such as water resources. These risk management decisions may be made at the federal, state, and local levels. Three exposure levels (PAL 1, PAL 2, and PAL 3), distinguished by severity of toxic effects, are developed for 24-hour, 30-day, 90-day, and 2-year durations for potential exposure to drinking water and ambient air by the general public. Developed PALs are evaluated both by a US EPA working group, and an external multidisciplinary panel to ensure scientific credibility and wide acceptance. In this Special Issue publication, we present background information on the PAL program, the methodology used in deriving PALs, and the technical support documents for the derivation of PALs for acrylonitrile, hydrogen sulfide, and phosgene.

  3. 12 CFR 344.9 - Personal securities trading reporting by bank officers and employees.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... decisions for the accounts of customers; (2) Participate in the determination of such recommendations or decisions; or (3) In connection with their duties, obtain information concerning which securities are being purchased or sold or recommend such action, must report to the bank, within 30-calendar days after the end...

  4. External validity and anchoring heuristics: application of DUNDRUM-1 to secure service gatekeeping in South Wales.

    PubMed

    Lawrence, Daniel; Davies, Tracey-Lee; Bagshaw, Ruth; Hewlett, Paul; Taylor, Pamela; Watt, Andrew

    2018-02-01

    Aims and method Structured clinical judgement tools provide scope for the standardisation of forensic service gatekeeping and also allow identification of heuristics in this decision process. The DUNDRUM-1 triage tool was completed retrospectively for 121 first-time referrals to forensic services in South Wales. Fifty were admitted to medium security, 49 to low security and 22 remained in open conditions. DUNDRUM-1 total scores differed appropriately between different levels of security. However, regression revealed heuristic anchoring on the 'legal process' and 'immediacy of risk due to mental disorder' items. Clinical implications Patient placement was broadly aligned with DUNDRUM-1 recommendations. However, not all triage items informed gatekeeping decisions. It remains to be seen whether decisions anchored in this way are effective. Declaration of interest Dr Mark Freestone gave permission for AUC values from Freestone et al. (2015) to be presented here for comparison.

  5. Scenario and multiple criteria decision analysis for energy and environmental security of military and industrial installations.

    PubMed

    Karvetski, Christopher W; Lambert, James H; Linkov, Igor

    2011-04-01

    Military and industrial facilities need secure and reliable power generation. Grid outages can result in cascading infrastructure failures as well as security breaches and should be avoided. Adding redundancy and increasing reliability can require additional environmental, financial, logistical, and other considerations and resources. Uncertain scenarios consisting of emergent environmental conditions, regulatory changes, growth of regional energy demands, and other concerns result in further complications. Decisions on selecting energy alternatives are made on an ad hoc basis. The present work integrates scenario analysis and multiple criteria decision analysis (MCDA) to identify combinations of impactful emergent conditions and to perform a preliminary benefits analysis of energy and environmental security investments for industrial and military installations. Application of a traditional MCDA approach would require significant stakeholder elicitations under multiple uncertain scenarios. The approach proposed in this study develops and iteratively adjusts a scoring function for investment alternatives to find the scenarios with the most significant impacts on installation security. A robust prioritization of investment alternatives can be achieved by integrating stakeholder preferences and focusing modeling and decision-analytical tools on a few key emergent conditions and scenarios. The approach is described and demonstrated for a campus of several dozen interconnected industrial buildings within a major installation. Copyright © 2010 SETAC.

  6. Poor relief, taxes and the first Universal Pension Reform: the origin of the Swedish welfare state reconsidered.

    PubMed

    Edebalk, Per Gunnar; Olsson, Mats

    2010-01-01

    In the year 1900, Sweden probably had the oldest population in the contemporary world. It was also the first nation to implement a universal pension system in 1913. The universal character in early social legislation has certainly been decisive for the development of the Swedish welfare state. This alternative has not been self-evident. Why did the reforms turn universal, when the continental model, the Bismarck social security system, was exclusively directed at industrial workers? Research has concentrated on demographic factors and growing demands for social security, or on the fact that Sweden was still a predominantly rural society with about 2,400 local authorities. This article examines the development of social legislation in the light of local government expenditures and incomes, and suggests an overlooked possibility: the formulation of the first universal national social security reform was a redistributional response to uneven distribution of incomes and general expenditures among the rural districts in Sweden.

  7. [Research applications in digital radiology. Big data and co].

    PubMed

    Müller, H; Hanbury, A

    2016-02-01

    Medical imaging produces increasingly complex images (e.g. thinner slices and higher resolution) with more protocols, so that image reading has also become much more complex. More information needs to be processed and usually the number of radiologists available for these tasks has not increased to the same extent. The objective of this article is to present current research results from projects on the use of image data for clinical decision support. An infrastructure that can allow large volumes of data to be accessed is presented. In this way the best performing tools can be identified without the medical data having to leave secure servers. The text presents the results of the VISCERAL and Khresmoi EU-funded projects, which allow the analysis of previous cases from institutional archives to support decision-making and for process automation. The results also represent a secure evaluation environment for medical image analysis. This allows the use of data extracted from past cases to solve information needs occurring when diagnosing new cases. The presented research prototypes allow direct extraction of knowledge from the visual data of the images and to use this for decision support or process automation. Real clinical use has not been tested but several subjective user tests showed the effectiveness and efficiency of the process. The future in radiology will clearly depend on better use of the important knowledge in clinical image archives to automate processes and aid decision-making via big data analysis. This can help concentrate the work of radiologists towards the most important parts of diagnostics.

  8. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.

    PubMed

    Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.

  9. Development of Decision-Making Automated System for Optimal Placement of Physical Access Control System’s Elements

    NASA Astrophysics Data System (ADS)

    Danilova, Olga; Semenova, Zinaida

    2018-04-01

    The objective of this study is a detailed analysis of physical protection systems development for information resources. The optimization theory and decision-making mathematical apparatus is used to formulate correctly and create an algorithm of selection procedure for security systems optimal configuration considering the location of the secured object’s access point and zones. The result of this study is a software implementation scheme of decision-making system for optimal placement of the physical access control system’s elements.

  10. Decision Model for U.S.- Mexico Border Security Measures

    DTIC Science & Technology

    2017-09-01

    and money assigned to border security investments. 14. SUBJECT TERMS Department of Homeland Security (DHS), border security, U.S.–Mexico border...and money assigned to border security investments. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION...FAA Federal Aviation Administration FAMS Federal Air Marshals Service FAST Free and Secure Trade GSA General Services Administration HIR Human

  11. 75 FR 6237 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-08

    ... additional one hour after the decision making cut off time of 5:30 p.m. to submit a CEA to the various.... The Exchange will continue to enforce the 5:30 p.m. decision making requirement, while also allowing..., processing information with respect to, and facilitating transactions in securities, to remove impediments to...

  12. 17 CFR Appendix A to Part 420 - Separate Reporting Entity

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 LARGE POSITION REPORTING Pt. 420, App. A Appendix A to... reporting rules; (3) Decisions related to the purchase, sale or retention of Treasury securities must be made by employees of such entity(ies). Employees of such entity(ies) who make decisions to purchase or...

  13. 31 CFR 306.23 - Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... TREASURY DIRECT Book-entry Securities System. 306.23 Section 306.23 Money and Finance: Treasury Regulations... Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System. (a) Eligible issues. The... conversion to the TREASURY DIRECT Book-entry Securities System. The notice shall specify the period during...

  14. 48 CFR 239.7402 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... decisions of the Federal Communications Commission (FCC) and other governmental regulatory bodies on rates... requiring security during telecommunications; (ii) The requirement for the contractor to secure telecommunications systems; (iii) The telecommunications security equipment, devices, techniques, or services with...

  15. 48 CFR 239.7402 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... decisions of the Federal Communications Commission (FCC) and other governmental regulatory bodies on rates... requiring security during telecommunications; (ii) The requirement for the contractor to secure telecommunications systems; (iii) The telecommunications security equipment, devices, techniques, or services with...

  16. 48 CFR 239.7402 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... decisions of the Federal Communications Commission (FCC) and other governmental regulatory bodies on rates... requiring security during telecommunications; (ii) The requirement for the contractor to secure telecommunications systems; (iii) The telecommunications security equipment, devices, techniques, or services with...

  17. 78 FR 12130 - Social Security Ruling, SSR 13-3p; Appeal of an Initial Medical Disability Cessation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-21

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0106] Social Security Ruling, SSR 13-3p; Appeal of an Initial Medical Disability Cessation Determination or Decision AGENCY: Social Security Administration. ACTION: Notice of Social Security Ruling (SSR). SUMMARY: We are giving notice of SSR 13-3p. This...

  18. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods

    PubMed Central

    Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman

    2017-01-01

    Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users’ security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users’ behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals’ awareness of the consequences of security threats. By comparing participants’ behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users’ security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones. PMID:28297719

  19. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods.

    PubMed

    Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman

    2017-01-01

    Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users' security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users' behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals' awareness of the consequences of security threats. By comparing participants' behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users' security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones.

  20. Livestock and food security: vulnerability to population growth and climate change.

    PubMed

    Godber, Olivia F; Wall, Richard

    2014-10-01

    Livestock production is an important contributor to sustainable food security for many nations, particularly in low-income areas and marginal habitats that are unsuitable for crop production. Animal products account for approximately one-third of global human protein consumption. Here, a range of indicators, derived from FAOSTAT and World Bank statistics, are used to model the relative vulnerability of nations at the global scale to predicted climate and population changes, which are likely to impact on their use of grazing livestock for food. Vulnerability analysis has been widely used in global change science to predict impacts on food security and famine. It is a tool that is useful to inform policy decision making and direct the targeting of interventions. The model developed shows that nations within sub-Saharan Africa, particularly in the Sahel region, and some Asian nations are likely to be the most vulnerable. Livestock-based food security is already compromised in many areas on these continents and suffers constraints from current climate in addition to the lack of economic and technical support allowing mitigation of predicted climate change impacts. Governance is shown to be a highly influential factor and, paradoxically, it is suggested that current self-sufficiency may increase future potential vulnerability because trade networks are poorly developed. This may be relieved through freer trade of food products, which is also associated with improved governance. Policy decisions, support and interventions will need to be targeted at the most vulnerable nations, but given the strong influence of governance, to be effective, any implementation will require considerable care in the management of underlying structural reform. © 2014 The Authors. Global Change Biology Published by John Wiley & Sons Ltd.

  1. Feasibility of a novel participatory multi-sector continuous improvement approach to enhance food security in remote Indigenous Australian communities.

    PubMed

    Brimblecombe, J; Bailie, R; van den Boogaard, C; Wood, B; Liberato, S C; Ferguson, M; Coveney, J; Jaenke, R; Ritchie, J

    2017-12-01

    Food insecurity underlies and compounds many of the development issues faced by remote Indigenous communities in Australia. Multi-sector approaches offer promise to improve food security. We assessed the feasibility of a novel multi-sector approach to enhance community food security in remote Indigenous Australia. A longitudinal comparative multi-site case study, the Good Food Systems Good Food for All Project, was conducted (2009-2013) with four Aboriginal communities. Continuous improvement meetings were held in each community. Data from project documents and store sales were used to assess feasibility according to engagement, uptake and sustainability of action, and impact on community diet, as well as identifying conditions facilitating or hindering these. Engagement was established where: the community perceived a need for the approach; where trust was developed between the community and facilitators; where there was community stability; and where flexibility was applied in the timing of meetings. The approach enabled stakeholders in each community to collectively appraise the community food system and plan action. Actions that could be directly implemented within available resources resulted from developing collaborative capacity. Actions requiring advocacy, multi-sectoral involvement, commitment or further resources were less frequently used. Positive shifts in community diet were associated with key areas where actions were implemented. A multi-sector participatory approach seeking continuous improvement engaged committed Aboriginal and non-Aboriginal stakeholders and was shown to have potential to shift community diet. Provision of clear mechanisms to link this approach with higher level policy and decision-making structures, clarity of roles and responsibilities, and processes to prioritise and communicate actions across sectors should further strengthen capacity for food security improvement. Integrating this approach enabling local decision-making into community governance structures with adequate resourcing is an imperative.

  2. Towards a Global Maritime Surveillance- A New European Challenge for European Security

    NASA Astrophysics Data System (ADS)

    Claverie, Alain; Barbagelata, Andrea; Pasco, Xavier; Darnis, Jean Pierre

    2005-03-01

    The illegal immigration connected to traffic and criminal activity is creating problems in Europe. Maritime surveillance is one of the most problematic dimensions.The political decision and the international agreement of the development of VTMS and the AIS are a first step towards securing the maritime traffic and protecting the maritime borders.The weight of the terrorism through the emergence of new set of threats is changing the situation in creating new needs of control through a global approach. The recent sea trial of the US department of Homeland Security is an indicator of this evolution. Space technologies have unique capabilities to support this kind of global approaches:• GNSS and the satellite telecommunication fleet (e.g. INMARSAT, ORBCOM) have a direct contribution to the extension of the AIS.• Satellite remote sensing is the logic extension of the control of the "VTMS" area.The new generation of satellite fleet (e.g. Pléiades, TerraSar, COSMO/SkyMed, Radarsat) should ensure an acceptable first level of control.The revisitation time, the near real time transmission with fast processing is an effective answer to the need of the Maritime Security Authorities.

  3. Implementing a resident lifting system in an extended care hospital. Demonstrating cost-benefit.

    PubMed

    Spiegel, Jerry; Yassi, Analee; Ronald, Lisa A; Tate, Robert B; Hacking, Penny; Colby, Teresa

    2002-03-01

    1. Implemeting mechanical resident lifting equipment in an extended care facility produced a payback from direct savings alone within 4 years. Payback occurred more quickly when the effect of indirect savings or the trend to rising compensation costs was considered. 2. Combining the observations of the occupational health nurses related to staff well being with relevant cost-benefit data is useful in influencing decision makers and in securing funding for prevention measures. 3. Clear identification of a viewpoint is an important part of an economic evaluation and cost-benefit analysis.

  4. 31 CFR 357.25 - Security interests.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false Security interests. 357.25 Section 357... Legacy Treasury Direct Book-Entry Securities System (Legacy Treasury Direct) § 357.25 Security interests... security interest of any kind, including a pledge, in a security in Legacy Treasury Direct ® except as...

  5. 31 CFR 357.25 - Security interests.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Security interests. 357.25 Section 357... Legacy Treasury Direct Book-Entry Securities System (Legacy Treasury Direct) § 357.25 Security interests... security interest of any kind, including a pledge, in a security in Legacy Treasury Direct ® except as...

  6. 31 CFR 357.25 - Security interests.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false Security interests. 357.25 Section 357... Legacy Treasury Direct Book-Entry Securities System (Legacy Treasury Direct) § 357.25 Security interests... security interest of any kind, including a pledge, in a security in Legacy Treasury Direct ® except as...

  7. 20 CFR 405.5 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING INITIAL DISABILITY... means the Social Security Act, as amended. Administrative appeals judge means an official, other than an... employed by the Social Security Administration. Board means Decision Review Board. Commissioner means the...

  8. Security training with interactive laser-video-disk technology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilson, D.

    1988-01-01

    DOE, through its contractor EG and G Energy Measurements, Inc., has developed a state-of-the-art interactive-video system for use at the Department of Energy's Central Training Academy. Called the Security Training and Evaluation Shooting System (STRESS), the computer-driven decision shooting system employs the latest is laservideo-disk technology. STRESS is designed to provide realistic and stressful training for security inspectors employed by the DOE and its contractors. The system uses wide-screen video projection, sophisticated scenario-branching technology, and customized video scenarios especially designed for the DOE. Firing a weapon that has been modified to shoot ''laser bullets,'' and wearing a special vest thatmore » detects ''hits'': the security inspector encounters adversaries on the wide screen who can shoot or be shot by the inspector in scenarios that demand fast decisions. Based on those decisions, the computer provides instantaneous branching to different scenes, giving the inspector confrontational training with the realism and variability of real life.« less

  9. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

    PubMed Central

    Veksler, Vladislav D.; Buchler, Norbou; Hoffman, Blaine E.; Cassenti, Daniel N.; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting. PMID:29867661

  10. 31 CFR 306.23 - Securities eligible to be held in the Legacy Treasury Direct® Book-entry Securities System.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Legacy Treasury Direct® Book-entry Securities System. 306.23 Section 306.23 Money and Finance: Treasury... Securities eligible to be held in the Legacy Treasury Direct® Book-entry Securities System. (a) Eligible... book-entry securities system. (b) Conversion of Registered Security to book-entry form to be held in...

  11. 31 CFR 357.20 - Securities account in Legacy Treasury Direct ®.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Securities System (Legacy Treasury Direct) § 357.20 Securities account in Legacy Treasury Direct ®. (a) Account. A securities account consists of: (1) An account master record, and (2) A securities portfolio... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Securities account in Legacy Treasury...

  12. The Current Mind-Set of Federal Information Security Decision-Makers on the Value of Governance: An Informative Study

    ERIC Educational Resources Information Center

    Stroup, Jay Walter

    2014-01-01

    Understanding the mind-set or perceptions of organizational leaders and decision-makers is important to ascertaining the trends and priorities in policy and governance of the organization. This study finds that a significant shift in the mind-set of government IT and information security leaders has started and will likely result in placing a…

  13. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Contingency Measures § 1542.303 Security Directives and Information Circulars. (a) TSA may issue an... Security Directive by submitting data, views, or arguments in writing to TSA. TSA may amend the Security...

  14. Game theoretic analysis of physical protection system design

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Canion, B.; Schneider, E.; Bickel, E.

    The physical protection system (PPS) of a fictional small modular reactor (SMR) facility have been modeled as a platform for a game theoretic approach to security decision analysis. To demonstrate the game theoretic approach, a rational adversary with complete knowledge of the facility has been modeled attempting a sabotage attack. The adversary adjusts his decisions in response to investments made by the defender to enhance the security measures. This can lead to a conservative physical protection system design. Since defender upgrades were limited by a budget, cost benefit analysis may be conducted upon security upgrades. One approach to cost benefitmore » analysis is the efficient frontier, which depicts the reduction in expected consequence per incremental increase in the security budget.« less

  15. A secure communication using cascade chaotic computing systems on clinical decision support.

    PubMed

    Koksal, Ahmet Sertol; Er, Orhan; Evirgen, Hayrettin; Yumusak, Nejat

    2016-06-01

    Clinical decision support systems (C-DSS) provide supportive tools to the expert for the determination of the disease. Today, many of the support systems, which have been developed for a better and more accurate diagnosis, have reached a dynamic structure due to artificial intelligence techniques. However, in cases when important diagnosis studies should be performed in secret, a secure communication system is required. In this study, secure communication of a DSS is examined through a developed double layer chaotic communication system. The developed communication system consists of four main parts: random number generator, cascade chaotic calculation layer, PCM, and logical mixer layers. Thanks to this system, important patient data created by DSS will be conveyed to the center through a secure communication line.

  16. Flattening the organization: implementing self-directed work groups.

    PubMed

    Brandon, G M

    1996-01-01

    In response to tremendous growth of managed care and threats to financial stability and job security, the Greater Baltimore Medical Center (GBMC) restructured itself into independent business units. The radiology department at GBMC resolved to reduce cost per unit-of-service, improve service, determine optimal staffing levels and reduce the number of layers of organization. It was decided to achieve those goals by implementing self-directed work groups. Staff buy-in was critical to success of the project. To begin, the staff was educated intensively about current trends in healthcare, managed care and potential changes in the job market. The radiology department was allowed to reduce the size of its staff through attrition and worked hard to focus staff concern on the impact each individual could have on the bottom line and the resultant effect on job security. Self-directed work groups were designed on a matrix that used small "service teams" in combinations to form larger "work groups." Actual work and daily activities occur at the service team level; information exchange and major decisions occue at the work group level. Seventeen months after beginning the project and 10 months after implementation, the organization has flattened, staff members have adjusted well to new roles, there have been no lay-offs, and the matrix system of small and large groups have proved particularly valuable.

  17. 76 FR 81827 - Declassification of National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-29

    ... prompt decision on the appeal. (b) [Reserved] Sec. 1260.82 What actions must NARA take with information... Declassification of National Security Information AGENCY: National Archives and Records Administration. ACTION... related to declassification of classified national security information in records transferred to NARA's...

  18. Multi-view Decision Making (MVDM) Workshop

    DTIC Science & Technology

    2009-02-01

    reflect the realities of system-of-systems development, acquisition, fielding and support: multi-view decision making (MVDM). MVDM addresses the...including mission risk, interoperable acquisition, and operational security and survivability. Hence, a multi-view approach to decision making is

  19. 49 CFR 1548.19 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... CARRIER SECURITY § 1548.19 Security Directives and Information Circulars. (a) TSA may issue an Information... security measures are necessary to respond to a threat assessment, or to a specific threat against civil...

  20. 5 CFR 9701.222 - Reconsideration of classification decisions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.222...

  1. 5 CFR 9701.222 - Reconsideration of classification decisions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.222...

  2. 5 CFR 9701.222 - Reconsideration of classification decisions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.222...

  3. 5 CFR 9701.222 - Reconsideration of classification decisions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.222...

  4. Interdependent Risk and Cyber Security: An Analysis of Security Investment and Cyber Insurance

    ERIC Educational Resources Information Center

    Shim, Woohyun

    2010-01-01

    An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…

  5. Service Oriented Architecture Security Risks and their Mitigation

    DTIC Science & Technology

    2012-10-01

    this section can be mitigated by making use of suitable authentication , confidentiality, integrity, and authorisation standards such as Security...for authorisation . Machines/non-human users should be clearly identified and authenticated by the identity provision and authentication services... authentication , any security related attributes for the subject, and the authorisation decisions given based on the security and privilege attributes

  6. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  7. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  8. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  9. 49 CFR 1542.303 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...

  10. 10 CFR 824.13 - Initial decision.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Initial decision. 824.13 Section 824.13 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY VIOLATIONS § 824.13 Initial decision. (a) The Hearing Officer shall issue an initial decision as soon as...

  11. 44 CFR 9.6 - Decision-making process.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Decision-making process. 9.6... HOMELAND SECURITY GENERAL FLOODPLAIN MANAGEMENT AND PROTECTION OF WETLANDS § 9.6 Decision-making process... protection decision-making process to be followed by the Agency in applying the Orders to its actions. While...

  12. Research on web-based decision support system for sports competitions

    NASA Astrophysics Data System (ADS)

    Huo, Hanqiang

    2010-07-01

    This paper describes the system architecture and implementation technology of the decision support system for sports competitions, discusses the design of decision-making modules, management modules and security of the system, and proposes the development idea of building a web-based decision support system for sports competitions.

  13. 31 CFR 363.203 - After I purchase my marketable Treasury security in TreasuryDirect ®, is there a period of time...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Treasury security in TreasuryDirect ®, is there a period of time during which I may not transfer the... Treasury security in TreasuryDirect ®, is there a period of time during which I may not transfer the security? Once you purchase a marketable Treasury security in TreasuryDirect, you may not transfer that...

  14. 31 CFR 363.203 - After I purchase my marketable Treasury security in TreasuryDirect ®, is there a period of time...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Treasury security in TreasuryDirect ®, is there a period of time during which I may not transfer the... Treasury security in TreasuryDirect ®, is there a period of time during which I may not transfer the security? Once you purchase a marketable Treasury security in TreasuryDirect, you may not transfer that...

  15. 31 CFR 363.203 - After I purchase my marketable Treasury security in TreasuryDirect ®, is there a period of time...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Treasury security in TreasuryDirect ®, is there a period of time during which I may not transfer the... Treasury security in TreasuryDirect ®, is there a period of time during which I may not transfer the security? Once you purchase a marketable Treasury security in TreasuryDirect, you may not transfer that...

  16. 31 CFR 363.203 - After I purchase my marketable Treasury security in TreasuryDirect ®, is there a period of time...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Treasury security in TreasuryDirect ®, is there a period of time during which I may not transfer the... Treasury security in TreasuryDirect ®, is there a period of time during which I may not transfer the security? Once you purchase a marketable Treasury security in TreasuryDirect, you may not transfer that...

  17. 31 CFR 363.203 - After I purchase my marketable Treasury security in TreasuryDirect ®, is there a period of time...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Treasury security in TreasuryDirect ®, is there a period of time during which I may not transfer the... Treasury security in TreasuryDirect ®, is there a period of time during which I may not transfer the security? Once you purchase a marketable Treasury security in TreasuryDirect, you may not transfer that...

  18. 17 CFR 8.18 - Decision.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION EXCHANGE PROCEDURES FOR DISCIPLINARY, SUMMARY, AND MEMBERSHIP DENIAL ACTIONS Disciplinary Procedure § 8.18 Decision. Promptly following a hearing conducted in accordance with § 8.17, the disciplinary committee shall render a written decision...

  19. Sun-Burned: Space Weather's Impact on United States National Security

    NASA Astrophysics Data System (ADS)

    Stebbins, B.

    2014-12-01

    The heightened media attention surrounding the 2013-14 solar maximum presented an excellent opportunity to examine the ever-increasing vulnerability of US national security and its Department of Defense to space weather. This vulnerability exists for three principal reasons: 1) a massive US space-based infrastructure; 2) an almost exclusive reliance on an aging and stressed continental US power grid; and 3) a direct dependence upon a US economy adapted to the conveniences of space and uninterrupted power. I tailored my research and work for the national security policy maker and military strategists in an endeavor to initiate and inform a substantive dialogue on America's preparation for, and response to, a major solar event that would severely degrade core national security capabilities, such as military operations. Significant risk to the Department of Defense exists from powerful events that could impact its space-based infrastructure and even the terrestrial power grid. Given this ever-present and increasing risk to the United States, my work advocates raising the issue of space weather and its impacts to the level of a national security threat. With the current solar cycle having already peaked and the next projected solar maximum just a decade away, the government has a relatively small window to make policy decisions that prepare the nation and its Defense Department to mitigate impacts from these potentially catastrophic phenomena.

  20. The Defender's Role in Cyber Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    The embodiment of this work is a table top game to explore cyber security and network defense concepts and cost. The game structure is such that it provides players an immersive environment to play a given role in cyber security to investigate the result of infrastructure and response decisions.

  1. Social security reforms and poverty among older dual-earner couples.

    PubMed

    Mitchell, O S

    1991-01-01

    The author analyzes factors affecting the retirement decisions of couples in which both spouses work. She "develops a framework for assessing how several past and prospective Social Security reforms might be expected to affect older working couples' retirement ages and retirement incomes. Two questions are addressed in some detail: (1) What are the likely effects of various changes in Social Security rules on the retirement decisions of older working women and their husbands? and (2) How might these changes alter the incidence of poverty among retired dual-earner couples? Empirical evidence from the United States suggests that many benefit reforms currently being discussed in policy circles will enhance Social Security system revenues, but will also worsen the economic status of an important segment of dual-earner couples." excerpt

  2. Managing Community Resilience to Climate Extremes, Rapid Unsustainable Urbanization, Emergencies of Scarcity, and Biodiversity Crises by Use of a Disaster Risk Reduction Bank.

    PubMed

    Canyon, Deon V; Burkle, Frederick M; Speare, Rick

    2015-12-01

    Earth's climate is changing and national and international decision-makers are recognizing that global health security requires urgent attention and a significant investment to protect the future. In most locations, current data are inadequate to conduct a full assessment of the direct and indirect health impacts of climate change. All states require this information to evaluate community-level resilience to climate extremes and climate change. A model that is being used successfully in the United Kingdom, Australia, and New Zealand is recommended to generate rapid information to assist decision-makers in the event of a disaster. The model overcomes barriers to success inherent in the traditional ''top-down'' approach to managing crises and recognizes the capacity of capable citizens and community organizers to facilitate response and recovery if provided the opportunity and resources. Local information is a prerequisite for strategic and tactical statewide planning. Time and resources are required to analyze risks within each community and what is required to prevent (mitigate), prepare, respond, recover (rehabilitate), anticipate, and assess any threatening events. Specific requirements at all levels from state to community must emphasize community roles by focusing on how best to maintain, respond, and recover public health protections and the infrastructure necessary for health security.

  3. 2017 Joint Annual NDIA/AIA Industrial Security Committee Fall Conference

    DTIC Science & Technology

    2017-11-15

    beyond credit data to offer the insights that government professionals need to make informed decisions and ensure citizen safety, manage compliance...business that provides information technology and professional services. We specialize in managing business processes and systems integration for both... Information Security System ISFD Industrial Security Facilities Database OBMS ODAA Business Management System STEPP Security, Training, Education and

  4. Intelligence-Led Risk Management for Homeland Security: A Collaborative Approach for a Common Goal

    DTIC Science & Technology

    2011-12-01

    phases of research into a summary analysis of the risk management policy within the homeland security enterprise. The result of the multi-goal policy ...management and policy decisions with emphasis on social aspects and efforts to support local and regional decision making, and to avoid cascading...independent variables. The second order social and economic effects of terrorism have been largely overlooked so far in accounting for the risk from

  5. Expanded managed care liability: what impact on employer coverage?

    PubMed

    Studdert, D M; Sage, W M; Gresenz, C R; Hensler, D R

    1999-01-01

    Policymakers are considering legislative changes that would increase managed care organizations' exposure to civil liability for withholding coverage or failing to deliver needed care. Using a combination of empirical information and theoretical analysis, we assess the likely responses of health plans and Employee Retirement Income Security Act (ERISA) plan sponsors to an expansion of liability, and we evaluate the policy impact of those moves. We conclude that the direct costs of liability are uncertain but that the prospect of litigation may have other important effects on coverage decision making, information exchange, risk contracting, and the extent of employers' involvement in health coverage.

  6. 17 CFR 204.39 - Written decision.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Written decision. 204.39... DEBT COLLECTION Salary Offset § 204.39 Written decision. (a) If pre-offset hearing is held. Within 60... a written decision setting forth the basis of his/her findings in accordance with 5 CFR 550.1104(g...

  7. 37 CFR 41.125 - Decision on motions.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Decision on motions. (a) Order of consideration. The Board may take up motions for decisions in any order, may grant, deny, or dismiss any motion, and may take such other action appropriate to secure the just... 37 Patents, Trademarks, and Copyrights 1 2011-07-01 2011-07-01 false Decision on motions. 41.125...

  8. 37 CFR 41.125 - Decision on motions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Decision on motions. (a) Order of consideration. The Board may take up motions for decisions in any order, may grant, deny, or dismiss any motion, and may take such other action appropriate to secure the just... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Decision on motions. 41.125...

  9. Integrated Energy Solutions Research | Integrated Energy Solutions | NREL

    Science.gov Websites

    that spans the height and width of the wall they are facing. Decision Science and Informatics Enabling decision makers with rigorous, technology-neutral, data-backed decision support to maximize the impact of security in energy systems through analysis, decision support, advanced energy technology development, and

  10. 15 CFR 785.7 - Summary decision.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Summary decision. 785.7 Section 785.7... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS ENFORCEMENT § 785.7 Summary decision. The ALJ may render a summary decision disposing of all or part of a proceeding on the motion of...

  11. 32 CFR 321.9 - Appeal of initial amendment decision.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.9 Appeal of initial amendment... record, the Defense Security Service, Office of FOI and Privacy will assure that such appeal is handled... may be sent to the Defense Security Service, Office of FOI and Privacy, (GCF), 1340 Braddock Place...

  12. 32 CFR 321.9 - Appeal of initial amendment decision.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.9 Appeal of initial amendment... record, the Defense Security Service, Office of FOI and Privacy will assure that such appeal is handled... may be sent to the Defense Security Service, Office of FOI and Privacy, (GCF), 1340 Braddock Place...

  13. 32 CFR 321.9 - Appeal of initial amendment decision.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.9 Appeal of initial amendment... record, the Defense Security Service, Office of FOI and Privacy will assure that such appeal is handled... may be sent to the Defense Security Service, Office of FOI and Privacy, (GCF), 1340 Braddock Place...

  14. 32 CFR 321.9 - Appeal of initial amendment decision.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.9 Appeal of initial amendment... record, the Defense Security Service, Office of FOI and Privacy will assure that such appeal is handled... may be sent to the Defense Security Service, Office of FOI and Privacy, (GCF), 1340 Braddock Place...

  15. 32 CFR 321.9 - Appeal of initial amendment decision.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... (CONTINUED) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.9 Appeal of initial amendment... record, the Defense Security Service, Office of FOI and Privacy will assure that such appeal is handled... may be sent to the Defense Security Service, Office of FOI and Privacy, (GCF), 1340 Braddock Place...

  16. 6 CFR 13.41 - Stay pending appeal.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Stay pending appeal. 13.41 Section 13.41 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.41 Stay pending appeal. (a) An Initial Decision is stayed automatically pending disposition of a...

  17. 75 FR 60488 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-30

    ... decisions. Data elements with respect to the SHORT subscription service that would be provided through the... information about technical data elements to support transmission and data-integrity processes between the... Securities and Exchange Commission (``Commission''), pursuant to Section 19(b)(1) of the Securities [[Page...

  18. Security Controls Hurt Research, NAS Warns.

    ERIC Educational Resources Information Center

    Kolata, Gina

    1982-01-01

    A National Academy of Sciences (NAS) report found no evidence that leaks of technical information from universities or other research centers have damaged national security. However, in areas where control is warranted, decisions should be based on criteria. These criteria and issues related to security control and technological transfer are…

  19. The Mexican Social Security counterreform: pensions for profit.

    PubMed

    Laurell, A C

    1999-01-01

    The social security counterreform, initiated in 1997, forms part of the neoliberal reorganization of Mexican society. The reform implies a profound change in the guiding principles of social security, as the public model based on integrality, solidarity, and redistribution is replaced by a model based on private administration of funds and services, individualization of entitlement, and reduction of rights. Its economic purpose is to move social services and benefits into the direct sphere of private capital accumulation. Although these changes will involve the whole social security system--old-age and disability pensions, health care, child care, and workers' compensation--they are most immediately evident in the pension scheme. The pay-as-you-go scheme is being replaced by privately managed individual retirement accounts which especially favor the big financial groups. These groups are gaining control over huge amounts of capital, are authorized to charge a high commission, and run no financial risks. The privatization of the system requires decisive state intervention with a legal change and a sizable state subsidy (1 to 1.5 percent of GNP) over five decades. The supposed positive impact on economic growth and employment is uncertain. A review of the new law and of the estimates of future annuities reveals shrinking pension coverage and inadequate incomes from pensions.

  20. 48 CFR 3033.211 - Contracting Officer's decision.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Contracting Officer's decision. 3033.211 Section 3033.211 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY... APPEALS Disputes and Appeals 3033.211 Contracting Officer's decision. For DHS contracts, the Board of...

  1. 20 CFR 405.405 - Decision Review Board.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Decision Review Board. 405.405 Section 405.405 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING... judge's decision has been effectuated to study our disability determination process. If the Board...

  2. 33 CFR 104.145 - Maritime Security (MARSEC) Directive.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 104.145 Section 104.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS General § 104.145 Maritime Security (MARSEC...

  3. 33 CFR 105.145 - Maritime Security (MARSEC) Directive.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC) Directive. 105.145 Section 105.145 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES General § 105.145 Maritime Security (MARSEC...

  4. 49 CFR 1554.103 - Security Directives.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... necessary to respond to a threat assessment or to a specific threat against civil aviation, TSA issues a..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT REPAIR STATION SECURITY Security Measures... each Security Directive TSA issues to the repair station within the time prescribed. Each repair...

  5. 49 CFR 1549.109 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... SCREENING PROGRAM Operations § 1549.109 Security Directives and Information Circulars. (a) TSA may issue an Information Circular to notify certified cargo screening facilities of security concerns. (b) When TSA...

  6. 49 CFR 1544.305 - Security Directives and Information Circulars.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.305 Security Directives and Information Circulars. (a) TSA may issue an Information Circular to notify aircraft operators of...

  7. 31 CFR 357.25 - Security interests.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... BONDS, NOTES AND BILLS HELD IN LEGACY TREASURY DIRECT Legacy Treasury Direct Book-Entry Securities System (Legacy Treasury Direct) § 357.25 Security interests. (a) General. The Department will not... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Security interests. 357.25 Section...

  8. 31 CFR 357.26 - Direct Deposit.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... AND BILLS HELD IN LEGACY TREASURY DIRECT Legacy Treasury Direct Book-Entry Securities System (Legacy... security shall be by direct deposit unless it is deemed necessary by the Department to make payment by... account. Where the Legacy Treasury Direct ® securities account is in the name of individual(s) in their...

  9. 33 CFR 106.140 - Maritime Security (MARSEC) Directive.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Maritime Security (MARSEC... SECURITY MARITIME SECURITY MARINE SECURITY: OUTER CONTINENTAL SHELF (OCS) FACILITIES General § 106.140 Maritime Security (MARSEC) Directive. All OCS facility owners or operators subject to this part must comply...

  10. A false sense of security: lesbian, gay, bisexual, and transgender (LGBT) surrogate health care decision-making rights.

    PubMed

    Wahlert, Lance; Fiester, Autumn

    2013-01-01

    This article addresses the timely and ethically problematic issue of surrogate decision-making rights for lesbian, gay, bisexual, and transgender (LGBT) patients and their families in the American health care system. Despite multiple pro-LGBT recommendations that have been released in recent years by the Obama administration, the Institute of Medicine, and the US Department of Health and Human Services, such initiatives, while laudable, also have unfortunately occasioned a "false sense of security" for many LGBT patients, their families, and their caregivers. In particular, new regulations on surrogate decision making merely invoke a sense of universal patient rights rather than actually generating them. Therefore, it is imperative that primary care physicians urge all LGBT patients to take proactive steps to protect themselves and their loved ones by naming proxy decision makers well before the crises that would necessitate such decisions.

  11. 20 CFR 435.80 - Appeal process.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... Officer (GMO); and (2) Final appeal to the Commissioner of Social Security from an adverse decision... written decisions by the GMO may be appealed: (1) A disallowance or other determination denying payment of... decision and requirements of grantee response. The Grants Management Officer's (GMO) adverse post-award...

  12. 20 CFR 435.80 - Appeal process.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... Officer (GMO); and (2) Final appeal to the Commissioner of Social Security from an adverse decision... written decisions by the GMO may be appealed: (1) A disallowance or other determination denying payment of... decision and requirements of grantee response. The Grants Management Officer's (GMO) adverse post-award...

  13. 20 CFR 435.80 - Appeal process.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... Officer (GMO); and (2) Final appeal to the Commissioner of Social Security from an adverse decision... written decisions by the GMO may be appealed: (1) A disallowance or other determination denying payment of... decision and requirements of grantee response. The Grants Management Officer's (GMO) adverse post-award...

  14. 20 CFR 435.80 - Appeal process.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... Officer (GMO); and (2) Final appeal to the Commissioner of Social Security from an adverse decision... written decisions by the GMO may be appealed: (1) A disallowance or other determination denying payment of... decision and requirements of grantee response. The Grants Management Officer's (GMO) adverse post-award...

  15. 20 CFR 435.80 - Appeal process.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Officer (GMO); and (2) Final appeal to the Commissioner of Social Security from an adverse decision... written decisions by the GMO may be appealed: (1) A disallowance or other determination denying payment of... decision and requirements of grantee response. The Grants Management Officer's (GMO) adverse post-award...

  16. 29 CFR 2570.8 - Summary decision.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Summary decision. 2570.8 Section 2570.8 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR ADMINISTRATION... ERISA Section 502(i) § 2570.8 Summary decision. For prohibited transaction penalty proceedings, this...

  17. Practice brief. Securing wireless technology for healthcare.

    PubMed

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  18. The arms race at a time of decision

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rotblat, J.; Pascolini, A.

    1984-01-01

    This book contains thirty-one articles by leading scientists and scholars form East and West presented at the 33rd Pugwash Conference held in Venice in 1983. The contributors provide research findings and recommendations on such topics as space militarization, nuclear strategy and safety, European security, regional security, and the security of the Third World.

  19. 77 FR 43155 - Guidance on Due Diligence Requirements for Savings Associations in Determining Whether a...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-24

    ... particular security. Savings associations, regardless of size, should not purchase securities for which they... characteristics to be purchased and held by insured savings associations. Under section 362.11(b), a savings... management's credit risk analysis and its use in examiner decisions concerning investment security risk...

  20. An Investigation of Influencing Factors for Adopting Federated Identity Authentication in Service-Oriented Architecture (SOA)

    ERIC Educational Resources Information Center

    Tadesse, Yohannes

    2012-01-01

    The importance of information security has made many organizations to invest and utilize effective information security controls within the information systems (IS) architecture. An organization's strategic decisions to secure enterprise-wide services often associated with the overall competitive advantages that are attained through the process of…

  1. Competition, Speculative Risks, and IT Security Outsourcing

    NASA Astrophysics Data System (ADS)

    Cezar, Asunur; Cavusoglu, Huseyin; Raghunathan, Srinivasan

    Information security management is becoming a more critical and, simultaneously, a challenging function for many firms. Even though many security managers are skeptical about outsourcing of IT security, others have cited reasons that are used for outsourcing of traditional IT functions for why security outsourcing is likely to increase. Our research offers a novel explanation, based on competitive externalities associated with IT security, for firms' decisions to outsource IT security. We show that if competitive externalities are ignored, then a firm will outsource security if and only if the MSSP offers a quality (or a cost) advantage over in-house operations, which is consistent with the traditional explanation for security outsourcing. However, a higher quality is neither a prerequisite nor a guarantee for a firm to outsource security. The competitive risk environment and the nature of the security function outsourced, in addition to quality, determine firms' outsourcing decisions. If the reward from the competitor's breach is higher than the loss from own breach, then even if the likelihood of a breach is higher under the MSSP the expected benefit from the competitive demand externality may offset the loss from the higher likelihood of breaches, resulting in one or both firms outsourcing security. The incentive to outsource security monitoring is higher than that of infrastructure management because the MSSP can reduce the likelihood of breach on both firms and thus enhance the demand externality effect. The incentive to outsource security monitoring (infrastructure management) is higher (lower) if either the likelihood of breach on both firms is lower (higher) when security is outsourced or the benefit (relative to loss) from the externality is higher (lower). The benefit from the demand externality arising out of a security breach is higher when more of the customers that leave the breached firm switch to the non-breached firm.

  2. 31 CFR 357.22 - Transfers.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... AND BILLS HELD IN LEGACY TREASURY DIRECT Legacy Treasury Direct Book-Entry Securities System (Legacy...-entry system, and TreasuryDirect ®. A security may also be transferred between accounts in Legacy... system. A transfer of a security from Legacy Treasury Direct to the commercial book-entry system is...

  3. The role of the health physicist in nuclear security.

    PubMed

    Waller, Edward J; van Maanen, Jim

    2015-04-01

    Health physics is a recognized safety function in the holistic context of the protection of workers, members of the public, and the environment against the hazardous effects of ionizing radiation, often generically designated as radiation protection. The role of the health physicist as protector dates back to the Manhattan Project. Nuclear security is the prevention and detection of, and response to, criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Its importance has become more visible and pronounced in the post 9/11 environment, and it has a shared purpose with health physics in the context of protection of workers, members of the public, and the environment. However, the duties and responsibilities of the health physicist in the nuclear security domain are neither clearly defined nor recognized, while a fundamental understanding of nuclear phenomena in general, nuclear or other radioactive material specifically, and the potential hazards related to them is required for threat assessment, protection, and risk management. Furthermore, given the unique skills and attributes of professional health physicists, it is argued that the role of the health physicist should encompass all aspects of nuclear security, ranging from input in the development to implementation and execution of an efficient and effective nuclear security regime. As such, health physicists should transcend their current typical role as consultants in nuclear security issues and become fully integrated and recognized experts in the nuclear security domain and decision making process. Issues regarding the security clearances of health physics personnel and the possibility of insider threats must be addressed in the same manner as for other trusted individuals; however, the net gain from recognizing and integrating health physics expertise in all levels of a nuclear security regime far outweighs any negative aspects. In fact, it can be argued that health physics is essential in achieving an integrated approach toward nuclear safety, security, and safeguards.

  4. The Role of the Health Physicist in Nuclear Security

    PubMed Central

    Waller, Edward J.; van Maanen, Jim

    2015-01-01

    Abstract Health physics is a recognized safety function in the holistic context of the protection of workers, members of the public, and the environment against the hazardous effects of ionizing radiation, often generically designated as radiation protection. The role of the health physicist as protector dates back to the Manhattan Project. Nuclear security is the prevention and detection of, and response to, criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Its importance has become more visible and pronounced in the post 9/11 environment, and it has a shared purpose with health physics in the context of protection of workers, members of the public, and the environment. However, the duties and responsibilities of the health physicist in the nuclear security domain are neither clearly defined nor recognized, while a fundamental understanding of nuclear phenomena in general, nuclear or other radioactive material specifically, and the potential hazards related to them is required for threat assessment, protection, and risk management. Furthermore, given the unique skills and attributes of professional health physicists, it is argued that the role of the health physicist should encompass all aspects of nuclear security, ranging from input in the development to implementation and execution of an efficient and effective nuclear security regime. As such, health physicists should transcend their current typical role as consultants in nuclear security issues and become fully integrated and recognized experts in the nuclear security domain and decision making process. Issues regarding the security clearances of health physics personnel and the possibility of insider threats must be addressed in the same manner as for other trusted individuals; however, the net gain from recognizing and integrating health physics expertise in all levels of a nuclear security regime far outweighs any negative aspects. In fact, it can be argued that health physics is essential in achieving an integrated approach toward nuclear safety, security, and safeguards. PMID:25706142

  5. 20 CFR 423.3 - Other process directed to the Social Security Administration or the Commissioner.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Other process directed to the Social Security Administration or the Commissioner. 423.3 Section 423.3 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.3 Other process directed to the Social Security Administration or the...

  6. 20 CFR 423.3 - Other process directed to the Social Security Administration or the Commissioner.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Other process directed to the Social Security Administration or the Commissioner. 423.3 Section 423.3 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.3 Other process directed to the Social Security Administration or the...

  7. 20 CFR 703.204 - Decision on insurance carrier's application; minimum amount of deposit.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Decision on insurance carrier's application..., DEPARTMENT OF LABOR LONGSHOREMEN'S AND HARBOR WORKERS' COMPENSATION ACT AND RELATED STATUTES INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.204 Decision on insurance carrier's...

  8. 20 CFR 405.370 - Decision by the administrative law judge.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Decision by the administrative law judge. 405.370 Section 405.370 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING INITIAL DISABILITY CLAIMS Administrative Law Judge Hearing § 405.370 Decision by the...

  9. 20 CFR 405.220 - Decision by the Federal reviewing official.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Decision by the Federal reviewing official. 405.220 Section 405.220 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW... Medical and Vocational Expert System before making a decision. At all times, the Federal reviewing...

  10. 29 CFR 2570.117 - Summary decision.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Summary decision. 2570.117 Section 2570.117 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... ERISA Section 502(c)(6) § 2570.117 Summary decision. For 502(c)(6) civil penalty proceedings, this...

  11. 29 CFR 2570.97 - Summary decision.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Summary decision. 2570.97 Section 2570.97 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR ADMINISTRATION... ERISA Section 502(c)(5) § 2570.97 Summary decision. For 502(c)(5) civil penalty proceedings, this...

  12. 29 CFR 2570.167 - Summary decision.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Summary decision. 2570.167 Section 2570.167 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... ERISA Section 502(c)(8) § 2570.167 Summary decision. For 502(c)(8) civil penalty proceedings, this...

  13. 29 CFR 2570.67 - Summary decision.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Summary decision. 2570.67 Section 2570.67 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR ADMINISTRATION... ERISA Section 502(c)(2) § 2570.67 Summary decision. For 502(c)(2) civil penalty proceedings, this...

  14. 29 CFR 2570.137 - Summary decision.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Summary decision. 2570.137 Section 2570.137 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... ERISA Section 502(c)(7) § 2570.137 Summary decision. For 502(c)(7) civil penalty proceedings, this...

  15. Information Security Management (ISM)

    NASA Astrophysics Data System (ADS)

    Šalgovičová, Jarmila; Prajová, Vanessa

    2012-12-01

    Currently, all organizations have to tackle the issue of information security. The paper deals with various aspects of Information Security Management (ISM), including procedures, processes, organizational structures, policies and control processes. Introduction of Information Security Management should be a strategic decision. The concept and implementation of Information Security Management in an organization are determined by the corporate needs and objectives, security requirements, the processes deployed as well as the size and structure of the organization. The implementation of ISM should be carried out to the extent consistent with the needs of the organization.

  16. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  17. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  18. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  19. 49 CFR 1548.11 - Training and knowledge for individuals with security-related duties.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...; (2) Applicable Security Directives and Information Circulars; (3) The approved airport security... Directives and Information Circulars; (4) The approved airport security program(s) applicable to their... security-related duties. 1548.11 Section 1548.11 Transportation Other Regulations Relating to...

  20. Personal finance: there are no shortcuts to financial security.

    PubMed

    Yarkony, Kathryn

    2009-12-01

    Perioperative nurses have skills that lend themselves to sound financial decision-making, and during these difficult economic times, it is important to know how to secure earnings for the future. Key strategies include saving for retirement, consulting a financial advisor, investing in reliable vehicles, holding investments until the market stabilizes, and controlling credit card debt. Nurses can use the nursing process of assessment, diagnosis, planning, implementation, and evaluation to help them make sound financial decisions. (c) AORN, Inc, 2009.

  1. A GIS-based decision support system for regional eco-security assessment and its application on the Tibetan Plateau.

    PubMed

    Xiaodan, Wang; Xianghao, Zhong; Pan, Gao

    2010-10-01

    Regional eco-security assessment is an intricate, challenging task. In previous studies, the integration of eco-environmental models and geographical information systems (GIS) usually takes two approaches: loose coupling and tight coupling. However, the present study used a full coupling approach to develop a GIS-based regional eco-security assessment decision support system (ESDSS). This was achieved by merging the pressure-state-response (PSR) model and the analytic hierarchy process (AHP) into ArcGIS 9 as a dynamic link library (DLL) using ArcObjects in ArcGIS and Visual Basic for Applications. Such an approach makes it easy to capitalize on the GIS visualization and spatial analysis functions, thereby significantly supporting the dynamic estimation of regional eco-security. A case study is presented for the Tibetan Plateau, known as the world's "third pole" after the Arctic and Antarctic. Results verified the usefulness and feasibility of the developed method. As a useful tool, the ESDSS can also help local managers to make scientifically-based and effective decisions about Tibetan eco-environmental protection and land use. Copyright (c) 2010 Elsevier Ltd. All rights reserved.

  2. Lawrence Livermore National Laboratory safeguards and security quarterly progress report to the US Department of Energy quarter ending September 30, 1994

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davis, G.; Mansur, D.L.; Ruhter, W.D.

    1994-10-01

    This report presents the details of the Lawrence Livermore National Laboratory safeguards and securities program. This program is focused on developing new technology, such as x- and gamma-ray spectrometry, for measurement of special nuclear materials. This program supports the Office of Safeguards and Securities in the following five areas; safeguards technology, safeguards and decision support, computer security, automated physical security, and automated visitor access control systems.

  3. The Constructive Role of Decisions: Implications from a quantum Approach

    DTIC Science & Technology

    2016-12-01

    objectives. The first was to explore the nature of constructive influences in decision making . The second concerned understanding decision making in...Prisoner’s Dilemma. **First objective; constructive judgments. This is the idea that sometimes making a decision can alter the underlying relevant mental...the performance of the agent. 15.  SUBJECT TERMS EOARD, Quantum Probability, Human Modeling, Human Decision Making 16.  SECURITY CLASSIFICATION OF

  4. The impact of geographic information systems on emergency management decision making at the U.S. Department of Homeland Security

    NASA Astrophysics Data System (ADS)

    King, Steven Gray

    Geographic information systems (GIS) reveal relationships and patterns from large quantities of diverse data in the form of maps and reports. The United States spends billions of dollars to use GIS to improve decisions made during responses to natural disasters and terrorist attacks, but precisely how GIS improves or impairs decision making is not known. This research examined how GIS affect decision making during natural disasters, and how GIS can be more effectively used to improve decision making for emergency management. Using a qualitative case study methodology, this research examined decision making at the U.S. Department of Homeland Security (DHS) during a large full-scale disaster exercise. This study indicates that GIS provided decision makers at DHS with an outstanding context for information that would otherwise be challenging to understand, especially through the integration of multiple data sources and dynamic three-dimensional interactive maps. Decision making was hampered by outdated information, a reliance on predictive models based on hypothetical data rather than actual event data, and a lack of understanding of the capabilities of GIS beyond cartography. Geospatial analysts, emergency managers, and other decision makers who use GIS should take specific steps to improve decision making based on GIS for disaster response and emergency management.

  5. 19 CFR 171.21 - Written decisions.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 2 2013-04-01 2013-04-01 false Written decisions. 171.21 Section 171.21 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... statement setting forth the decision on the matter and the findings of fact and conclusions of law upon...

  6. 19 CFR 181.116 - Petition regarding adverse marking decision.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 2 2011-04-01 2011-04-01 false Petition regarding adverse marking decision. 181.116 Section 181.116 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... merchandise which was the subject of the adverse marking decision may file a petition with Customs requesting...

  7. 19 CFR 171.21 - Written decisions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 2 2012-04-01 2012-04-01 false Written decisions. 171.21 Section 171.21 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... statement setting forth the decision on the matter and the findings of fact and conclusions of law upon...

  8. 19 CFR 171.21 - Written decisions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 2 2011-04-01 2011-04-01 false Written decisions. 171.21 Section 171.21 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... statement setting forth the decision on the matter and the findings of fact and conclusions of law upon...

  9. 19 CFR 181.116 - Petition regarding adverse marking decision.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 2 2014-04-01 2014-04-01 false Petition regarding adverse marking decision. 181.116 Section 181.116 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... merchandise which was the subject of the adverse marking decision may file a petition with Customs requesting...

  10. 19 CFR 171.21 - Written decisions.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 2 2014-04-01 2014-04-01 false Written decisions. 171.21 Section 171.21 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... statement setting forth the decision on the matter and the findings of fact and conclusions of law upon...

  11. 19 CFR 181.116 - Petition regarding adverse marking decision.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Petition regarding adverse marking decision. 181.116 Section 181.116 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... merchandise which was the subject of the adverse marking decision may file a petition with Customs requesting...

  12. 19 CFR 171.21 - Written decisions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Written decisions. 171.21 Section 171.21 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY... statement setting forth the decision on the matter and the findings of fact and conclusions of law upon...

  13. 17 CFR 141.6 - Written decision.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Written decision. 141.6....6 Written decision. (a) The hearing official shall issue a written opinion no later than 60 days after the hearing. (b) The written opinion will include a statement of the facts presented to...

  14. 19 CFR 133.44 - Decision of disputed claim of infringement.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Decision of disputed claim of infringement. 133.44 Section 133.44 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... § 133.44 Decision of disputed claim of infringement. (a) Claim of infringement sustained. Upon...

  15. 46 CFR 50.20-35 - Marine inspector's decisions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 46 Shipping 2 2012-10-01 2012-10-01 false Marine inspector's decisions. 50.20-35 Section 50.20-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING GENERAL PROVISIONS Plan Submittal and Approval § 50.20-35 Marine inspector's decisions. (a) When it becomes necessary for...

  16. 46 CFR 50.20-35 - Marine inspector's decisions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 46 Shipping 2 2011-10-01 2011-10-01 false Marine inspector's decisions. 50.20-35 Section 50.20-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING GENERAL PROVISIONS Plan Submittal and Approval § 50.20-35 Marine inspector's decisions. (a) When it becomes necessary for...

  17. 46 CFR 50.20-35 - Marine inspector's decisions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 46 Shipping 2 2013-10-01 2013-10-01 false Marine inspector's decisions. 50.20-35 Section 50.20-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING GENERAL PROVISIONS Plan Submittal and Approval § 50.20-35 Marine inspector's decisions. (a) When it becomes necessary for...

  18. 46 CFR 50.20-35 - Marine inspector's decisions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 46 Shipping 2 2010-10-01 2010-10-01 false Marine inspector's decisions. 50.20-35 Section 50.20-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING GENERAL PROVISIONS Plan Submittal and Approval § 50.20-35 Marine inspector's decisions. (a) When it becomes necessary for...

  19. 46 CFR 50.20-35 - Marine inspector's decisions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 46 Shipping 2 2014-10-01 2014-10-01 false Marine inspector's decisions. 50.20-35 Section 50.20-35 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) MARINE ENGINEERING GENERAL PROVISIONS Plan Submittal and Approval § 50.20-35 Marine inspector's decisions. (a) When it becomes necessary for...

  20. Data Driven Decision Making in the Social Studies

    ERIC Educational Resources Information Center

    Ediger, Marlow

    2010-01-01

    Data driven decision making emphasizes the importance of the teacher using objective sources of information in developing the social studies curriculum. Too frequently, decisions of teachers have been made based on routine and outdated methods of teaching. Valid and reliable tests used to secure results from pupil learning make for better…

  1. The PRC Decision-Making Process

    DTIC Science & Technology

    2002-03-01

    REPORT DATE March 2002 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE The PRC Decision - Making ...of crisis. It explores who has the authority to make decisions in China today and who will have this authority as new leaders...security and foreign policy decision - making during times of crisis. The April 2001 EP-3 incident is examined to assess high-level

  2. Importance of biometrics to addressing vulnerabilities of the U.S. infrastructure

    NASA Astrophysics Data System (ADS)

    Arndt, Craig M.; Hall, Nathaniel A.

    2004-08-01

    Human identification technologies are important threat countermeasures in minimizing select infrastructure vulnerabilities. Properly targeted countermeasures should be selected and integrated into an overall security solution based on disciplined analysis and modeling. Available data on infrastructure value, threat intelligence, and system vulnerabilities are carefully organized, analyzed and modeled. Prior to design and deployment of an effective countermeasure; the proper role and appropriateness of technology in addressing the overall set of vulnerabilities is established. Deployment of biometrics systems, as with other countermeasures, introduces potentially heightened vulnerabilities into the system. Heightened vulnerabilities may arise from both the newly introduced system complexities and an unfocused understanding of the set of vulnerabilities impacted by the new countermeasure. The countermeasure's own inherent vulnerabilities and those introduced by the system's integration with the existing system are analyzed and modeled to determine the overall vulnerability impact. The United States infrastructure is composed of government and private assets. The infrastructure is valued by their potential impact on several components: human physical safety, physical/information replacement/repair cost, potential contribution to future loss (criticality in weapons production), direct productivity output, national macro-economic output/productivity, and information integrity. These components must be considered in determining the overall impact of an infrastructure security breach. Cost/benefit analysis is then incorporated in the security technology deployment decision process. Overall security risks based on system vulnerabilities and threat intelligence determines areas of potential benefit. Biometric countermeasures are often considered when additional security at intended points of entry would minimize vulnerabilities.

  3. Judicial Decisions in the Field of Labour Law.

    ERIC Educational Resources Information Center

    International Labour Review, 1993

    1993-01-01

    Summarizes recent judicial decisions in various countries concerning application of general legal principles to labor law, access to employment, conditions of employment, occupational safety and health, social security, and labor relations. (Author/SK)

  4. 15 CFR 720.3 - Final decision on administrative action denying export privileges.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS DENIAL OF EXPORT PRIVILEGES § 720.3 Final decision on administrative action...

  5. 15 CFR 720.3 - Final decision on administrative action denying export privileges.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS DENIAL OF EXPORT PRIVILEGES § 720.3 Final decision on administrative action...

  6. Guiding resource allocations based on terrorism risk.

    PubMed

    Willis, Henry H

    2007-06-01

    Establishing tolerable levels of risk is one of the most contentious and important risk management decisions. With every regulatory or funding decision for a risk management program, society decides whether or not risk is tolerable. The Urban Area Security Initiative (UASI) is a Department of Homeland Security (DHS) grant program designed to enhance security and overall preparedness to prevent, respond to, and recover from acts of terrorism by providing financial assistance for planning, equipment, training, and exercise needs of large urban areas. After briefly reviewing definitions of terrorism risk and rationales for risk-based resource allocation, this article compares estimates of terrorism risk in urban areas that received UASI funding in 2004 to other federal risk management decisions. This comparison suggests that UASI allocations are generally consistent with other federal risk management decisions. However, terrorism risk in several cities that received funding is below levels that are often tolerated in other risk management contexts. There are several reasons why the conclusions about terrorism risk being de minimis in specific cities should be challenged. Some of these surround the means used to estimate terrorism risk for this study. Others involve the comparison that is made to other risk management decisions. However, many of the observations reported are valid even if reported terrorism risk estimates are several orders of magnitude too low. Discussion of resource allocation should be extended to address risk tolerance and include explicit comparisons, like those presented here, to other risk management decisions.

  7. 75 FR 57811 - Notice of Intent To Prepare an Environmental Assessment and Scoping; President's Park South...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-22

    ... to prevent delays in decision-making. The proposed actions grow out of needs identified by USSS... respond to the street closures and re-design of security elements to ensure the iconic historic nature of... security elements in place of the temporary security elements identified above. The intent is to integrate...

  8. 32 CFR 2001.34 - Referrals.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... actions and decisions in a manner that facilitates archival processing for public access. Central agency... Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Declassification § 2001.34...

  9. Crosstalk: The Journal of Defense Software Engineering. Volume 22, Number 3

    DTIC Science & Technology

    2009-04-01

    international standard for information security management systems like ISO /IEC 27001 :2005 [1] existed. Since that time, the organization has developed control...of ISO /IEC 27001 and the desire to make decisions based on business value and risk has prompted Ford’s IT Security and Controls organi- zation to begin...their conventional application security operation.u References 1. ISO /IEC 27001 :2005. “Information Technology – Security Techniques – Information

  10. 14 CFR 380.34a - Substitution of direct air carrier's security or depository agreement.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 14 Aeronautics and Space 4 2014-01-01 2014-01-01 false Substitution of direct air carrier's... Applicable to Charter Operators § 380.34a Substitution of direct air carrier's security or depository agreement. (a) A direct air carrier may substitute its own security agreement and/or depository arrangements...

  11. 14 CFR 380.34a - Substitution of direct air carrier's security or depository agreement.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Substitution of direct air carrier's... Applicable to Charter Operators § 380.34a Substitution of direct air carrier's security or depository agreement. (a) A direct air carrier may substitute its own security agreement and/or depository arrangements...

  12. 14 CFR 380.34a - Substitution of direct air carrier's security or depository agreement.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 14 Aeronautics and Space 4 2012-01-01 2012-01-01 false Substitution of direct air carrier's... Applicable to Charter Operators § 380.34a Substitution of direct air carrier's security or depository agreement. (a) A direct air carrier may substitute its own security agreement and/or depository arrangements...

  13. 14 CFR 380.34a - Substitution of direct air carrier's security or depository agreement.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 14 Aeronautics and Space 4 2011-01-01 2011-01-01 false Substitution of direct air carrier's... Applicable to Charter Operators § 380.34a Substitution of direct air carrier's security or depository agreement. (a) A direct air carrier may substitute its own security agreement and/or depository arrangements...

  14. 14 CFR 380.34a - Substitution of direct air carrier's security or depository agreement.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 14 Aeronautics and Space 4 2013-01-01 2013-01-01 false Substitution of direct air carrier's... Applicable to Charter Operators § 380.34a Substitution of direct air carrier's security or depository agreement. (a) A direct air carrier may substitute its own security agreement and/or depository arrangements...

  15. 31 CFR 363.37 - How do I purchase and make payment for eligible Treasury securities through my TreasuryDirect...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Treasury securities through my TreasuryDirect ® account? (a) Online purchase. Purchases of eligible Treasury securities through your TreasuryDirect account must be made online. (b) Payment for savings bonds...

  16. 31 CFR 363.37 - How do I purchase and make payment for eligible Treasury securities through my TreasuryDirect...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... eligible Treasury securities through my TreasuryDirect ® account? (a) Online purchase. Purchases of eligible Treasury securities through your TreasuryDirect account must be made online. (b) Payment for...

  17. 31 CFR 363.37 - How do I purchase and make payment for eligible Treasury securities through my TreasuryDirect...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... eligible Treasury securities through my TreasuryDirect ® account? (a) Online purchase. Purchases of eligible Treasury securities through your TreasuryDirect account must be made online. (b) Payment for...

  18. 31 CFR 363.37 - How do I purchase and make payment for eligible Treasury securities through my TreasuryDirect...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Treasury securities through my TreasuryDirect ® account? (a) Online purchase. Purchases of eligible Treasury securities through your TreasuryDirect account must be made online. (b) Payment for savings bonds...

  19. 31 CFR 363.37 - How do I purchase and make payment for eligible Treasury securities through my TreasuryDirect...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Treasury securities through my TreasuryDirect ® account? (a) Online purchase. Purchases of eligible Treasury securities through your TreasuryDirect account must be made online. (b) Payment for savings bonds...

  20. Patients' experiences of communication and involvement in decision-making about atrial fibrillation treatment in consultations with nurses and physicians.

    PubMed

    Siouta, Eleni; Hellström Muhli, Ulla; Hedberg, Berith; Broström, Anders; Fossum, Bjöörn; Karlgren, Klas

    2016-09-01

    Insights in consultations across patient interactions with physicians and nurses are of vital importance for strengthening the patients' involvement in the treatment decision-making process. The experience of involvement and communication in decision-making from the patients' perspective has been sparsely explored. To examine how patients describe involvement in and communication about decision-making regarding treatment in consultations with nurses and physicians. Twenty-two patients with atrial fibrillation (AF), aged 37-90 years, were interviewed directly after their consultations with nurses and physicians in outpatient AF clinics in six Swedish hospitals. In consultations with nurses, the patients felt involved when obtaining clarifications about AF as a disease and its treatment and when preparing for and building up confidence in decision-making. In consultations with physicians, the patients felt involved when they could cooperate in decision-making, when acquiring knowledge, and when they felt that they were being understood. One shared category was found in consultations with both nurses and physicians, and the patients felt involved when they had a sense of trust and felt secure during and between consultations. Patients with AF stated that they would need to acquire knowledge and build up confidence and ability in order to be effectively involved in the decision-making about treatment. Despite not being actively involved in decision-making, patients felt involved through experiencing supportive and confirming communication. Attention must be given to the relationship with the patient to create the conditions for patient involvement in the consultation. This can be achieved through supportive communication attempting to create a feeling of clarity and building confidence. This will support involvement in decision-making concerning AF treatment and feelings of being understood and of trust in physicians and/or nurses. © 2015 Nordic College of Caring Science.

  1. Keeping Current and Increasing The Effectiveness of the Decision-Making Process and the Interoperability in the Digital Age: Geospatial Intelligence and Geospatial Information Systems’ Applications in the Military and Intelligence Fields for the Mexican Navy

    DTIC Science & Technology

    2008-12-01

    Guide, 3rd ed. (London; Thousand Oaks, Calif: Sage Publications, 1999), 228, http://www.loc.gov/catdir/ toc /fy042/99214121.html; (accessed date 6/25...analysis in the GEOINT context is the Sistema Nacional de Seguridad Pública, SNSP (National System of Public Security) with the implementation of the...named Sistema de Información Geográfica del Atlas Nacional de Riesgos (GIS national risk atlas) that is under the “direction of research” of that

  2. Developing useful transit-related crime and incident data

    DOT National Transportation Integrated Search

    2000-04-01

    Transit agencies have an obligation to provide a reasonably safe and secure system for their patrons and employees. Transit management must make decisions regarding the best use of police, security personnel, and other resources to reduce crime and i...

  3. 20 CFR 418.3650 - How do we make our decision upon review?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How do we make our decision upon review? 418.3650 Section 418.3650 Employees' Benefits SOCIAL SECURITY ADMINISTRATION MEDICARE SUBSIDIES Medicare... decision upon review? After you request review of our initial determination, we will review the information...

  4. Big data, little security: Addressing security issues in your platform

    NASA Astrophysics Data System (ADS)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  5. Digital watermarking for secure and adaptive teleconferencing

    NASA Astrophysics Data System (ADS)

    Vorbrueggen, Jan C.; Thorwirth, Niels

    2002-04-01

    The EC-sponsored project ANDROID aims to develop a management system for secure active networks. Active network means allowing the network's customers to execute code (Java-based so-called proxylets) on parts of the network infrastructure. Secure means that the network operator nonetheless retains full control over the network and its resources, and that proxylets use ANDROID-developed facilities to provide secure applications. Management is based on policies and allows autonomous, distributed decisions and actions to be taken. Proxylets interface with the system via policies; among actions they can take is controlling execution of other proxylets or redirection of network traffic. Secure teleconferencing is used as the application to demonstrate the approach's advantages. A way to control a teleconference's data streams is to use digital watermarking of the video, audio and/or shared-whiteboard streams, providing an imperceptible and inseparable side channel that delivers information from originating or intermediate stations to downstream stations. Depending on the information carried by the watermark, these stations can take many different actions. Examples are forwarding decisions based on security classifications (possibly time-varying) at security boundaries, set-up and tear-down of virtual private networks, intelligent and adaptive transcoding, recorder or playback control (e.g., speaking off the record), copyright protection, and sender authentication.

  6. Romania and the New Cold War Security Challenges

    DTIC Science & Technology

    2017-06-09

    social media with deep economic repercussions. The continuous changes in the Eastern Europe have a great influence on the Romanian security...environment, raising many challenges for the decision makers. This study tried to decipher this security paradigm, unfolding the Russian economic , political...and military unrest, magnified by the modern era domains such as informational, cyber and social media with deep economic repercussions. The

  7. Male Labor Force Participation and Social Security in Mexico.

    PubMed

    Aguila, Emma

    2014-04-01

    Labor-force participation among Mexican males in their early retirement years (60 to 64 years of age) has decreased in recent decades, from 94.6 percent in 1960 to 65.2 percent in 2010. Similar trends are evident elsewhere in Latin America, and have occurred in the developed world. Such trends pose challenges to financial sustainability of social security systems as working-age populations decrease and those in retirement increase both because of demographic trends and decisions to take early retirement. In this study, we find that the Mexican social security system provides incentives to retire early. The retirement incentives of the Mexican social security system affect retirement behavior, and may be one of the main contributors to early retirement decisions, particularly for lower-income populations. We simulated the effect of the reform from a Pay-As-You-Go (PAYG) to the new Personal Retirement Accounts (PRA) system and we find that the PRA system also provides incentives to early retirement. Further analysis is needed to assess the financial sustainability of the social security system and financial security in old age for the largest cohorts in Mexico that will begin to retire by 2040.

  8. A transmission security framework for email-based telemedicine.

    PubMed

    Caffery, Liam J; Smith, Anthony C

    2010-01-01

    Encryption is used to convert an email message to an unreadable format thereby securing patient privacy during the transmission of the message across the Internet. Two available means of encryption are: public key infrastructure (PKI) used in conjunction with ordinary email and secure hypertext transfer protocol (HTTPS) used by secure web-mail applications. Both of these approaches have advantages and disadvantages in terms of viability, cost, usability and compliance. The aim of this study was develop an instrument to identify the most appropriate means of encrypting email communication for telemedicine. A multi-method approach was used to construct the instrument. Technical assessment and existing bodies of knowledge regarding the utility of PKI were analyzed, along with survey results from users of Queensland Health's Child and Youth Mental Health Service secure web-mail service. The resultant decision support model identified that the following conditions affect the choice of encryption technology: correspondent's risk perception, correspondent's identification to the security afforded by encryption, email-client used by correspondents, the tolerance to human error and the availability of technical resources. A decision support model is presented as a flow chart to identify the most appropriate encryption for a specific email-based telemedicine service.

  9. Male Labor Force Participation and Social Security in Mexico

    PubMed Central

    Aguila, Emma

    2014-01-01

    Labor-force participation among Mexican males in their early retirement years (60 to 64 years of age) has decreased in recent decades, from 94.6 percent in 1960 to 65.2 percent in 2010. Similar trends are evident elsewhere in Latin America, and have occurred in the developed world. Such trends pose challenges to financial sustainability of social security systems as working-age populations decrease and those in retirement increase both because of demographic trends and decisions to take early retirement. In this study, we find that the Mexican social security system provides incentives to retire early. The retirement incentives of the Mexican social security system affect retirement behavior, and may be one of the main contributors to early retirement decisions, particularly for lower-income populations. We simulated the effect of the reform from a Pay-As-You-Go (PAYG) to the new Personal Retirement Accounts (PRA) system and we find that the PRA system also provides incentives to early retirement. Further analysis is needed to assess the financial sustainability of the social security system and financial security in old age for the largest cohorts in Mexico that will begin to retire by 2040. PMID:25328441

  10. Strategic Calculation in Estonia’s Decision to Enter the Coalition of the Willing for Operation Iraqi Freedom in 2003

    DTIC Science & Technology

    2015-05-21

    bandwagon , that is, ally with the state that poses the major threat in order to protect their own security. If balancing, then states are more secure...because aggressors face combined opposition. If bandwagoning , then security is scarce because aggression is rewarded.4 Balance of power theorists...Transformed: Complexity Theory and European Security (Lanham, MD: Rowman and Littlefield Publishers, 2001), 6. 10 establish an effective Baltic

  11. 20 CFR 416.1420 - Reconsidered determination.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Reconsidered determination. 416.1420 Section 416.1420 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED... Decisions Reconsideration § 416.1420 Reconsidered determination. After you or another person requests a...

  12. Prevention of recurrent rhinopharyngitis in at-risk children in France: a cost-effectiveness model for a nonspecific immunostimulating bacterial extract (OM-85 BV).

    PubMed

    Pessey, Jean-Jacques; Mégas, Françoise; Arnould, Benoît; Baron-Papillon, Florence

    2003-01-01

    To estimate the pharmacoeconomic impact for the French Social Security System of preventing recurrent acute rhinopharyngitis (RARP) in at-risk children with OM-85 BV, an immunostimulating agent indicated for the prevention of recurrences. A decision-analysis model. The probability of progression of the infection and of its associated care, the principal direct costs linked to them, and the effectiveness of OM-85 BV were established or calculated by reviewing the available literature (published between 1984 and 2000). Four experts validated the parameters and the model. For the French Social Security System, the mean direct cost for an acute rhinopharyngitis (ARP) infection was 49.39 Euro(2000 values). By using OM-85 BV prevention, 1.52 infections were prevented in 6 months saving 67.83 Euro on the costs of care for the recurrently infected child. Sensitivity analyses confirmed the robustness of the model and indicated a saving of between 6.28 Euro and 303.64 Euro in direct costs for each individual treated preventively. Threshold analyses showed that OM-85 BV prophylaxis is economically profitable if more than 0.15 infections are prevented and if direct costs of care of an ARP are greater than 4.78 Euro. Non-specific immunotherapy should be considered for the child at risk of RARP and administered in addition to other recommended measures. The economic savings for the community of using a medication for which the clinical effectiveness has been demonstrated should also be taken into account in assessing its usefulness.

  13. Feasibility of a patient decision aid regarding disclosure of personal health information: qualitative evaluation of the Health Care Information Directive

    PubMed Central

    Tracy, C Shawn; Dantas, Guilherme Coelho; Upshur, Ross EG

    2004-01-01

    Background Concerns regarding the privacy of health information are escalating owing both to the growing use of information technology to store and exchange data and to the increasing demand on the part of patients to control the use of their medical records. The objective of this study was to evaluate the Health Care Information Directive (HCID), a recently-developed patient decision aid that aims to delineate the level of health information an individual is willing to share. Methods We convened a series of four focus group meetings with several communities in a large Canadian city. A total of 28 men and women participated, representing health care consumer advocates, urban professionals, senior citizens, and immigrants who speak English as a second language. Data were analysed using qualitative methods. Results Participants lacked substantial knowledge regarding the fate and uses of personal health information. They expressed mistrust concerning how their information will be used and protected. Several suggestions were made towards customizing the use of data according to specific needs rather than broad and full access to their charts. Furthermore, despite concern regarding the implementation of a tool like the HCID, participants were hopeful that a refined instrument could contribute to the improved regulation of health information. Conclusion This study indicated poor knowledge concerning the uses of personal health information, distrust concerning security provisions, and cautious support for a patient decision aid such as the HCID to improve control over health data. PMID:15361257

  14. Feasibility of a patient decision aid regarding disclosure of personal health information: qualitative evaluation of the Health Care Information Directive.

    PubMed

    Tracy, C Shawn; Dantas, Guilherme Coelho; Upshur, Ross E G

    2004-09-10

    Concerns regarding the privacy of health information are escalating owing both to the growing use of information technology to store and exchange data and to the increasing demand on the part of patients to control the use of their medical records. The objective of this study was to evaluate the Health Care Information Directive (HCID), a recently-developed patient decision aid that aims to delineate the level of health information an individual is willing to share. We convened a series of four focus group meetings with several communities in a large Canadian city. A total of 28 men and women participated, representing health care consumer advocates, urban professionals, senior citizens, and immigrants who speak English as a second language. Data were analysed using qualitative methods. Participants lacked substantial knowledge regarding the fate and uses of personal health information. They expressed mistrust concerning how their information will be used and protected. Several suggestions were made towards customizing the use of data according to specific needs rather than broad and full access to their charts. Furthermore, despite concern regarding the implementation of a tool like the HCID, participants were hopeful that a refined instrument could contribute to the improved regulation of health information. This study indicated poor knowledge concerning the uses of personal health information, distrust concerning security provisions, and cautious support for a patient decision aid such as the HCID to improve control over health data.

  15. The Ability of the United States Federal Radiological Monitoring and Assessment Center to Collect and Disseminate Environmental Measurements during Radiological Emergencies

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craig Marianno and James Essex

    The Federal Radiological Monitoring and Assessment Center (FRMAC) is the United States’ response organization for radiological emergencies. The FRMAC is structured as an operations center and employs the combined resources of several federal agencies to respond to any disaster resulting in the release of radioactivity. The mission of the FRMAC is to support state and local authorities in the gathering of environmental data using an array of survey equipment ranging from alpha probes, beta/gamma probes, and high-purity germanium (HPGe) spectroscopy to the gathering of physical samples. Once collected, the data are projected on maps to assist public officials make protectivemore » action decisions. In addition to the accumulation of data, it is the legal obligation of the FRMAC to keep archival records of all data points and their actions. During an event, it is conceivable that hundreds to thousands of sample points will be recorded over a relatively short time. It is in the interest of the federal government and public that the information collected be put to the best use as fast as possible. Toward this end, the Remote Sensing Laboratory, working under the direction of the United States Department of Energy’s National Nuclear Security Administration, is investigating the use of several technologies that will accelerate data flow from field teams to the FRMAC and, finally, distribution of data to decision makers and the public. Not only can finished data products be viewed through the internet, but the actual collection of data via “real-time” telemetry can be viewed using this same method. Data from the field will be transferred directly to the FRMAC using the MCPD (multi-path communication device). This base station receives the survey information from the field teams via Bluetooth and instantly investigates the best communication pathway to transfer data to the FRMAC. Possible paths include standalone radio, commercial cellular networks (GPRS and CDMA) and satellite. Once inside the FRMAC, this information is transferred to the pertinent divisions for review, data storage, and eventual display on map products. The internet is also a powerful communications tool being utilized by the FRMAC. Using a secure internet connection, field team location and data collection can be viewed live-time by any computer attached to the internet. Similarly, survey information from our fixed-wing aircraft can be viewed while the mission is being flown. All accumulated data and maps generated in the FRMAC are disseminated on a web page through the secure FRMAC web site. Several new data communication processes are being investigated to aid the FRMAC. Each of these provides an important tool to efficiently collect, record and disseminate environmental measurements to FRMAC scientists and decision makers. The ultimate goal of these processes is to improve the flow of protection decisions and information to the public.« less

  16. Decision-Making in National Security Affairs: Toward a Typology.

    DTIC Science & Technology

    1985-06-07

    decisional model, and thus provide the necessary linkage between observation and application of theory in explaining and/or predicting policy decisions . r...examines theories and models of decision -making processes from an interdisciplinary perspective, with a view toward deriving means by which the behavior of...processes, game theory , linear programming, network and graph theory , time series analysis, and the like. The discipline of decision analysis is a relatively

  17. Waste Management Decision-Making Process During a Homeland Security Incident Response

    EPA Pesticide Factsheets

    A step-by-step guide on how to make waste management-related decisions including how waste can be minimized, collected and treated, as well as where waste can be sent for staging, storage and final disposal.

  18. Speeding decisions. Social security's information exchange program.

    PubMed

    Winter, Kitt; Hastings, Bob

    2011-05-01

    The Social Security Administration has plenty of reasons to streamline its records request process-more than 15 million reasons each year, in fact. That's why it has been pioneering information exchange projects with the private sector, including use of the Nationwide Health Information Network.

  19. 10 CFR 706.10 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in... within the scope of the Labor Management Relations Act at the various DOE installations should be... published decisions. This policy does not preclude adoption of special arrangements which may be required...

  20. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Knipper, W.

    This presentation builds on our response to events that pose, or have the potential to pose, a serious security or law enforcement risk and must be responded to and controlled in a clear a decisive fashion. We will examine some common concepts in the command and control of security-centric events.

  1. National Security Policy and Security Challenges of Maldives

    DTIC Science & Technology

    2014-06-13

    creates the true problems the Maldivians are currently facing. Hidden agendas, unprofessionalism, and low ethical standards of politicians and...based on sharia law. The theories of cultural relativism and democracy strongly advocate the freedoms of societies, thus the Maldivian decision as a

  2. The Defense Industrial Base: Prescription for a Psychosomatic Ailment

    DTIC Science & Technology

    1983-08-01

    The Decision- Making Process ------------------------- 65 Notes ---------------------------------------- FIGURE 4-1. The Decision [laking Process...the strategy and tactics process to make certain that we can attain out national security objectives. (IFP is also known as mobilization planning or...decision- making model that could improve the capacity and capability-of the military-industrial complex, thereby increasing the probability of success

  3. 20 CFR 411.205 - What if I disagree with the PM's decision about whether I am making timely progress toward self...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... about whether I am making timely progress toward self-supporting employment? 411.205 Section 411.205 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM...-supporting employment? If you disagree with the PM's decision, you may request that we review the decision...

  4. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.

    PubMed

    Bernik, Igor; Prislan, Kaja

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.

  5. MCloud: Secure Provenance for Mobile Cloud Users

    DTIC Science & Technology

    2016-10-03

    Feasibility of Smartphone Clouds , 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid). 04-MAY- 15, Shenzhen, China...final decision. MCloud: Secure Provenance for Mobile Cloud Users Final Report Bogdan Carbunar Florida International University Computing and...Release; Distribution Unlimited UU UU UU UU 03-10-2016 31-May-2013 30-May-2016 Final Report: MCloud: Secure Provenance for Mobile Cloud Users The views

  6. JPRS Report, Soviet Union: Political Affairs

    DTIC Science & Technology

    1988-03-22

    or to secure high profits. The decisions that are made frequently differ from one another, heated debates ensue, and, as we know, the truth emerges... securely attached to production. An analysis conducted among workers in Frunze who were discharged showed that they were usually young people between...no improvement in contract discipline, the necessary growth rates of labor productivity and improvement in product quality are not secured , the

  7. The DUNDRUM-1 structured professional judgment for triage to appropriate levels of therapeutic security: retrospective-cohort validation study

    PubMed Central

    2011-01-01

    Background The assessment of those presenting to prison in-reach and court diversion services and those referred for admission to mental health services is a triage decision, allocating the patient to the appropriate level of therapeutic security. This is a critical clinical decision. We set out to improve on unstructured clinical judgement. We collated qualitative information and devised an 11 item structured professional judgment instrument for this purpose then tested for validity. Methods All those assessed following screening over a three month period at a busy remand committals prison (n = 246) were rated in a retrospective cohort design blind to outcome. Similarly, all those admitted to a mental health service from the same prison in-reach service over an overlapping two year period were rated blind to outcome (n = 100). Results The 11 item scale had good internal consistency (Cronbach's alpha = 0.95) and inter-rater reliability. The scale score did not correlate with the HCR-20 'historical' score. For the three month sample, the receiver operating characteristic area under the curve (AUC) for those admitted to hospital was 0.893 (95% confidence interval 0.843 to 0.943). For the two year sample, AUC distinguished at each level between those admitted to open wards, low secure units or a medium/high secure service. Open wards v low secure units AUC = 0.805 (95% CI 0.680 to 0.930); low secure v medium/high secure AUC = 0.866, (95% CI 0.784 to 0.949). Item to outcome correlations were significant for all 11 items. Conclusions The DUNDRUM-1 triage security scale and its items performed to criterion levels when tested against the real world outcome. This instrument can be used to ensure consistency in decision making when deciding who to admit to secure forensic hospitals. It can also be used to benchmark admission thresholds between services and jurisdictions. In this study we found some divergence between assessed need and actual placement. This provides fertile ground for future research as well as practical assistance in assessing unmet need, auditing case mix and planning care pathways. PMID:21410967

  8. Security Requirements Management in Software Product Line Engineering

    NASA Astrophysics Data System (ADS)

    Mellado, Daniel; Fernández-Medina, Eduardo; Piattini, Mario

    Security requirements engineering is both a central task and a critical success factor in product line development due to the complexity and extensive nature of product lines. However, most of the current product line practices in requirements engineering do not adequately address security requirements engineering. Therefore, in this chapter we will propose a security requirements engineering process (SREPPLine) driven by security standards and based on a security requirements decision model along with a security variability model to manage the variability of the artefacts related to security requirements. The aim of this approach is to deal with security requirements from the early stages of the product line development in a systematic way, in order to facilitate conformance with the most relevant security standards with regard to the management of security requirements, such as ISO/IEC 27001 and ISO/IEC 15408.

  9. Epilepsy and social security: general aspects of the insured claimants and medical decisions.

    PubMed

    Ferreira, Lisiane Seguti; Palhares, Dario; Gava, Marília; Seguti, Vladimir Ferreira; Marasciulo, Antônio Carlos Estima

    2013-01-01

    Epilepsy affects adults at productive age and interferes with their ability to work. However, the granting of social security benefits to these patients has not received sufficient attention. This article aims to provide a profile of individuals with a previous diagnosis of epilepsy that file claims for social security benefits and a profile of the medical advisory decisions that support the concession of these benefits. A sample of thirty individuals with illness-related problems due to epilepsy was selected from the claimants that receive Social Security Incapacity/Sickness benefits. An exploratory data analysis of the 188 Social Security medical files of the thirty claimants was performed using the clinical and epidemiological information and the medical advisory criteria. The mean age of the claimants was 39 years and most of them were males in jobs that do not require a lot of schooling. The first claim was filed within an average of four years of employment. On average, each worker files a claim every three months, which entitles him/her to receive incapacity/sickness benefits for seventeen months. The frequency of seizures and the medications used by the claimants were registered in 60% of the medical files. In addition, the description of the physical and neurological exam was incomplete in 50% of the files. Furthermore, 60% of the files did not include the argument or the clinical evidence that was used to justify the concession of a benefit. The medical advisory decisions on epileptic workers tend to be inconsistent, overly lenient and generally lacking in clinical evidence. The disparities among the granted benefits indicate the need for the National Social Security System to review and draft specific guidelines for epilepsy.

  10. 31 CFR 363.12 - Who may purchase and hold book-entry securities in TreasuryDirect ®?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Who may purchase and hold book-entry securities in TreasuryDirect ®? 363.12 Section 363.12 Money and Finance: Treasury Regulations Relating to... TreasuryDirect § 363.12 Who may purchase and hold book-entry securities in TreasuryDirect ®? (a) A Treasury...

  11. 31 CFR 363.12 - Who may purchase and hold book-entry securities in TreasuryDirect ®?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Who may purchase and hold book-entry... TreasuryDirect § 363.12 Who may purchase and hold book-entry securities in TreasuryDirect ®? (a) A TreasuryDirect account owner may purchase and hold securities through his or her account. (b) We do not permit a...

  12. 7 CFR 3560.61 - Loan security.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Loan security. 3560.61 Section 3560.61 Agriculture... DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Direct Loan and Grant Origination § 3560.61 Loan security... collateral. (2) The amount of the loan against the collateral does not exceed its estimated security value...

  13. 31 CFR 357.27 - Reinvestment.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... AND BILLS HELD IN LEGACY TREASURY DIRECT Legacy Treasury Direct Book-Entry Securities System (Legacy... of a security may be reinvested at maturity in a new security in the same form of registration, provided a new security is then being offered by the Department and provision for reinvestment is made in...

  14. 17 CFR 300.306 - Completion or closeout pursuant to SIPC direction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Completion or closeout pursuant to SIPC direction. 300.306 Section 300.306 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) Schedule A to Part 285 RULES OF THE SECURITIES INVESTOR PROTECTION...

  15. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  16. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  17. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  18. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  19. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  20. Implementing an Information Security Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Lenaeus, Joseph D.; Landine, Guy P.

    The threats to information security have dramatically increased with the proliferation of information systems and the internet. Chemical, biological, radiological, nuclear, and explosives (CBRNe) facilities need to address these threats in order to protect themselves from the loss of intellectual property, theft of valuable or hazardous materials, and sabotage. Project 19 of the European Union CBRN Risk Mitigation Centres of Excellence Initiative is designed to help CBRN security managers, information technology/cybersecurity managers, and other decision-makers deal with these threats through the application of cost-effective information security programs. Project 19 has developed three guidance documents that are publically available to covermore » information security best practices, planning for an information security management system, and implementing security controls for information security.« less

  1. Approach to estimation of level of information security at enterprise based on genetic algorithm

    NASA Astrophysics Data System (ADS)

    V, Stepanov L.; V, Parinov A.; P, Korotkikh L.; S, Koltsov A.

    2018-05-01

    In the article, the way of formalization of different types of threats of information security and vulnerabilities of an information system of the enterprise and establishment is considered. In a type of complexity of ensuring information security of application of any new organized system, the concept and decisions in the sphere of information security are expedient. One of such approaches is the method of a genetic algorithm. For the enterprises of any fields of activity, the question of complex estimation of the level of security of information systems taking into account the quantitative and qualitative factors characterizing components of information security is relevant.

  2. 20 CFR 416.913 - Medical and other evidence of your impairment(s).

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ...(s). 416.913 Section 416.913 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... judge and Appeals Council levels, and at the reviewing official, administrative law judge, and Decision... teachers, counselors, early intervention team members, developmental center workers, and daycare center...

  3. 28 CFR 524.73 - Classification procedures.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... that the affected inmate is notified in writing as promptly as possible of the classification and the...) Central Office Inmate Monitoring Section—reviews classification decisions for all future separation... involving Witness Security cases. (2) Regional Office—reviews CIM classification decisions for Disruptive...

  4. 78 FR 27462 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-10

    ... making routing, quotation, price and size decisions regarding where they should send orders and quotes... more transparent and accessible to market participants making routing decisions concerning their... participants additional information in [[Page 27464

  5. 77 FR 75969 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-26

    ... rural areas by financing business facilities and community development. This purpose is achieved through... program decisions, and effectively monitor the intermediaries' activities to protect the Government's... instruments, loan agreements, and security, and other material necessary for prudent credit decisions and...

  6. 7 CFR 1469.31 - Appeals.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION SECURITY PROGRAM General Administration § 1469.31 Appeals. (a) An applicant or a participant may obtain administrative review of an adverse decision... paragraph (b) of this section. (b) Participants cannot appeal the following decisions: (1) Payment rates...

  7. The decision-making process of workers in using sick time.

    PubMed

    Sandal, Candace L; Click, Elizabeth R; Dowling, Donna A; Guzik, Arlene

    2014-08-01

    The cost of employee absenteeism in the United States is significant in terms of sick pay, overtime costs, replacement personnel compensation, and lost productivity. Little is known about what workers consider when deciding to use sick time. Previous studies have examined work absence from an array of perspectives, including resulting work strain, job satisfaction, and job security, but absenteeism in the workplace has not been examined in terms of decision making. To scrutinize workers' decisions about using sick time, a descriptive pilot study was undertaken with a convenience sample (n = 94) of working college students. The responses to the survey revealed that the majority of the workers (73.4%) used sick time because they were too ill to work. These results are in direct opposition to previous research and suggest that workers may need education about preventing and managing minor illnesses before an absence is needed. Supporting and engaging employees and their significant others in healthy worker programs, regular surveillance examinations, and illness prevention strategies are wise investments in companies' financial futures. Future research should include a comparative study of worker absenteeism between worksites with occupational health nurses and those without nurses. Copyright 2014, SLACK Incorporated.

  8. The Influence of Future Command, Control, Communications, and Computers (C4) on Doctrine and the Operational Commander's Decision-Making Process

    NASA Technical Reports Server (NTRS)

    Mayer, Michael G.

    1996-01-01

    Future C4 systems will alter the traditional balance between force and information, having a profound influence on doctrine and the operational commander's decision making process. The Joint Staff's future vision of C4 is conceptualized in 'C4I for the Warrior' which envisions a joint C4I architecture providing timely sensor to shoot information direct to the warfighter. C4 system must manage and filter an overwhelming amount of information; deal with interoperability issues; overcome technological limitations; meet emerging security requirements; and protect against 'Information Warfare.' Severe budget constraints necessitate unified control of C4 systems under singular leadership for the common good of all the services. In addition, acquisition policy and procedures must be revamped to allow new technologies to be fielded quickly; and the commercial marketplace will become the preferred starting point for modernization. Flatter command structures are recommended in this environment where information is available instantaneously. New responsibilities for decision making at lower levels are created. Commanders will have to strike a balance between exerting greater control and allowing subordinates enough flexibility to maintain initiative. Clearly, the commander's intent remains the most important tool in striking this balance.

  9. Impact of managed care on physicians' decisions to manipulate reimbursement rules: an explanatory model.

    PubMed

    VanGeest, Jonathan; Weiner, Saul; Johnson, Timothy; Cummins, Deborah

    2007-07-01

    To develop and test an explanatory model of the impact of managed care on physicians' decisions to manipulate reimbursement rules for patients. A self-administered mailed questionnaire of a national random sample of 1124 practicing physicians in the USA. Structural equation modelling was used. The main outcome measure assessed whether or not physicians had manipulated reimbursement rules (such as exaggerated the severity of patients conditions, changed billing diagnoses, or reported signs or symptoms that the patients did not have) to help patients secure coverage for needed treatment or services. The response rate was 64% (n = 720). Physicians' decisions to manipulate reimbursement rules for patients are directly driven not only by ethical beliefs about gaming the system but also by requests from patients, the perception of insufficient time to deliver care, and the proportion of Medicaid patients. Covert advocacy is also the indirect result of utilization review hassles, primary care specialty, and practice environment. Managed care is not just a set of rules that physicians choose to follow or disobey, but an environment of competing pressures from patients, purchasers, and high workload. Reimbursement manipulation is a response to that environment, rather than simply a reflection of individual physicians' values.

  10. Increasing operational command and control security by the implementation of device independent quantum key distribution

    NASA Astrophysics Data System (ADS)

    Bovino, Fabio Antonio; Messina, Angelo

    2016-10-01

    In a very simplistic way, the Command and Control functions can be summarized as the need to provide the decision makers with an exhaustive, real-time, situation picture and the capability to convey their decisions down to the operational forces. This two-ways data and information flow is vital to the execution of current operations and goes far beyond the border of military operations stretching to Police and disaster recovery as well. The availability of off-the shelf technology has enabled hostile elements to endanger the security of the communication networks by violating the traditional security protocols and devices and hacking sensitive databases. In this paper an innovative approach based to implementing Device Independent Quantum Key Distribution system is presented. The use of this technology would prevent security breaches due to a stolen crypto device placed in an end-to-end communication chain. The system, operating with attenuated laser, is practical and provides the increasing of the distance between the legitimate users.

  11. Securing support for eye health policy in low- and middle-income countries: identifying stakeholders through a multi-level analysis.

    PubMed

    Morone, Piergiuseppe; Camacho Cuena, Eva; Kocur, Ivo; Banatvala, Nicholas

    2014-05-01

    This article empirically evaluates advocacy in low- and middle-income countries as a key tool for raising policy priority and securing high-level decision maker support in eye health. We used a unique data set based on a survey conducted by World Health Organization in 2011 on eye care and prevention of blindness in 82 low- and middle-income countries. The theoretical framework derives from the idea that a plethora of stakeholders at local and global level pressure national governments, acting in economic and the political spheres. Previously, eye care has not been investigated in such a framework. We found structural differences across countries with different income levels and proposed policy recommendations to secure high-level decision makers' support for promoting eye health. Three case studies suggest that, in order to secure more support and resources for eye health, domestic and international stakeholders must strengthen their engagement with ministries of health at political and above all economic levels.

  12. 17 CFR 240.3a12-9 - Exemption of certain direct participation program securities from the arranging provisions of...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of certain direct participation program securities from the arranging provisions of sections 7(c) and 11(d)(1). 240.3a12-9 Section 240.3a12-9 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION (CONTINUED) GENERAL...

  13. 31 CFR 363.208 - Can I transfer my marketable Treasury security from my TreasuryDirect ® account to an account in...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... security from my TreasuryDirect ® account to an account in another book-entry system? 363.208 Section 363..., DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING SECURITIES HELD IN TREASURYDIRECT Marketable Treasury Securities § 363.208 Can I transfer my marketable Treasury security from my Treasury...

  14. The impact of patient participation direct enhanced service on patient reference groups in primary care: a qualitative study.

    PubMed

    Pollard, Lorraine; Agarwal, Shona; Harrad, Fawn; Lester, Louise; Cross, Ainsley; Wray, Paula; Smith, Gordon; Locke, Anthony; Sinfield, Paul

    2014-01-01

    NHS policy documents continue to make a wide-ranging commitment to patient involvement. The Patient Participation Direct Enhanced Service (PP-DES), launched in 2011, aimed to ensure patients are involved in decisions about the range and quality of services provided and commissioned by their practice through patient reference groups (PRGs). The aim of this exploratory study is to review the impact of the PP-DES (2011-13) on a sample of PRGs and assess how far it has facilitated their involvement in decisions about the services of their general practices. A qualitative methods design, using semi- structured interviews and focus groups, was employed to explore the experiences and views of GP practice staff (n = 24), PRG members (n = 80) at 12 GP practices, and other stakeholders (n = 4). Wide variation in the role and remit of the participating PRGs was found, which broadly ranged from activities to improve practice resources to supporting health promotion activities. The majority of PRG members were unfamiliar with the PP-DES scheme and its aims and purpose. Stakeholders and practice staff felt strongly that the main success of the PP-DES was that it had led to an increase in the number of PRGs being established in the locality. The PP-DES scheme has been a catalyst to establish PRGs. However, the picture was mixed in terms of the PRGs involvement in decisions about the services provided at their general practice as there was wide variation in the PRGs role and remit. The financial incentive alone, provided via the DES scheme, did not secure greater depth of PRG activity and power, however, as social factors were identified as playing an important role in PRGs' level of participation in decision making. Many PRGs have to become more firmly established before they are involved as partners in commissioning decisions at their practice.

  15. Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheldon, Frederick T; Abercrombie, Robert K; Mili, Ali

    2008-01-01

    Good security metrics are required to make good decisions about how to design security countermeasures, to choose between alternative security architectures, and to improve security during operations. Therefore, in essence, measurement can be viewed as a decision aid. The lack of sound practical security metrics is severely hampering progress in the development of secure systems. The Cyberspace Security Econometrics System (CSES) offers the following advantages over traditional measurement systems: (1) CSES reflects the variances that exist amongst different stakeholders of the same system. Different stakeholders will typically attach different stakes to the same requirement or service (e.g., a service maymore » be provided by an information technology system or process control system, etc.). (2) For a given stakeholder, CSES reflects the variance that may exist among the stakes she/he attaches to meeting each requirement. The same stakeholder may attach different stakes to satisfying different requirements within the overall system specification. (3) For a given compound specification (e.g., combination(s) of commercial off the shelf software and/or hardware), CSES reflects the variance that may exist amongst the levels of verification and validation (i.e., certification) performed on components of the specification. The certification activity may produce higher levels of assurance across different components of the specification than others. Consequently, this paper introduces the basis, objectives and capabilities for the CSES including inputs/outputs and the basic structural and mathematical underpinnings.« less

  16. The utility of the Historical Clinical Risk-20 Scale as a predictor of outcomes in decisions to transfer patients from high to lower levels of security--a UK perspective.

    PubMed

    Dolan, Mairead; Blattner, Regine

    2010-09-29

    Structured Professional Judgment (SPJ) approaches to violence risk assessment are increasingly being adopted into clinical practice in international forensic settings. The aim of this study was to examine the predictive validity of the Historical Clinical Risk -20 (HCR-20) violence risk assessment scale for outcome following transfers from high to medium security in a United Kingdom setting. The sample was predominately male and mentally ill and the majority of cases were detained under the criminal section of the Mental Health Act (1986). The HCR-20 was rated based on detailed case file information on 72 cases transferred from high to medium security. Outcomes were examined, independent of risk score, and cases were classed as "success or failure" based on established criteria. The mean length of follow up was 6 years. The total HCR-20 score was a robust predictor of failure at lower levels of security and return to high security. The Clinical and Risk management items contributed most to predictive accuracy. Although the HCR-20 was designed as a violence risk prediction tool our findings suggest it has potential utility in decisions to transfer patients from high to lower levels of security.

  17. Requirements, model and prototype for a multi-utility locational and security information hub.

    DOT National Transportation Integrated Search

    2015-11-01

    This project lays the foundation for building an exchange hub for locational and security data and risk assessment of potential excavation work. It acts primarily at 2 stages: upstream of the mark-out process, as a decision support tool to help strea...

  18. 20 CFR 423.3 - Other process directed to the Social Security Administration or the Commissioner.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... SERVICE OF PROCESS § 423.3 Other process directed to the Social Security Administration or the Commissioner. Subpoenas and other process (other than summonses and complaints) that are required to be served... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Other process directed to the Social Security...

  19. 15 CFR 785.16 - Decisions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Decisions. 785.16 Section 785.16 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL REGULATIONS ENFORCEMENT § 785.16...

  20. 8 CFR 103.10 - Precedent decisions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false Precedent decisions. 103.10 Section 103.10 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS IMMIGRATION BENEFITS; BIOMETRIC REQUIREMENTS; AVAILABILITY OF RECORDS Applying for Benefits, Surety Bonds, Fees § 103.10 Precedent...

  1. 8 CFR 103.10 - Precedent decisions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false Precedent decisions. 103.10 Section 103.10 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS IMMIGRATION BENEFITS; BIOMETRIC REQUIREMENTS; AVAILABILITY OF RECORDS Applying for Benefits, Surety Bonds, Fees § 103.10 Precedent...

  2. 8 CFR 103.10 - Precedent decisions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false Precedent decisions. 103.10 Section 103.10 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS IMMIGRATION BENEFITS; BIOMETRIC REQUIREMENTS; AVAILABILITY OF RECORDS Applying for Benefits, Surety Bonds, Fees § 103.10 Precedent...

  3. Preferential interactions promote blind cooperation and informed defection.

    PubMed

    Pérez-Escudero, Alfonso; Friedman, Jonathan; Gore, Jeff

    2016-12-06

    It is common sense that costs and benefits should be carefully weighed before deciding on a course of action. However, we often disapprove of people who do so, even when their actual decision benefits us. For example, we prefer people who directly agree to do us a favor over those who agree only after securing enough information to ensure that the favor will not be too costly. Why should we care about how people make their decisions, rather than just focus on the decisions themselves? Current models show that punishment of information gathering can be beneficial because it forces blind decisions, which under some circumstances enhances cooperation. Here we show that aversion to information gathering can be beneficial even in the absence of punishment, due to a different mechanism: preferential interactions with reliable partners. In a diverse population where different people have different-and unknown-preferences, those who seek additional information before agreeing to cooperate reveal that their preferences are close to the point where they would choose not to cooperate. Blind cooperators are therefore more likely to keep cooperating even if conditions change, and aversion to information gathering helps to interact preferentially with them. Conversely, blind defectors are more likely to keep defecting in the future, leading to a preference for informed defectors over blind ones. Both mechanisms-punishment to force blind decisions and preferential interactions-give qualitatively different predictions, which may enable experimental tests to disentangle them in real-world situations.

  4. Cost/benefit analysis for video security systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1997-01-01

    Dr. Don Hush and Scott Chapman, in conjunction with the Electrical and Computer Engineering Department of the University of New Mexico (UNM), have been contracted by Los Alamos National Laboratories to perform research in the area of high security video analysis. The first phase of this research, presented in this report, is a cost/benefit analysis of various approaches to the problem in question. This discussion begins with a description of three architectures that have been used as solutions to the problem of high security surveillance. An overview of the relative merits and weaknesses of each of the proposed systems ismore » included. These descriptions are followed directly by a discussion of the criteria chosen in evaluating the systems and the techniques used to perform the comparisons. The results are then given in graphical and tabular form, and their implications discussed. The project to this point has involved assessing hardware and software issues in image acquisition, processing and change detection. Future work is to leave these questions behind to consider the issues of change analysis - particularly the detection of human motion - and alarm decision criteria. The criteria for analysis in this report include: cost; speed; tradeoff issues in moving primative operations from software to hardware; real time operation considerations; change image resolution; and computational requirements.« less

  5. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation

    PubMed Central

    2016-01-01

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model—ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it’s recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes. PMID:27655001

  6. Strategies of Decision Making

    DTIC Science & Technology

    1989-05-01

    6.11.02.B 74F n/a n/a 11. TITLE (Include Security Classification) Strategies of Decision Making 12. PERSONAL AUTHOR(S) Gary A. Klein 13a. TYPE OF...NOTATION Judith Orasanu, contracting officer’s representative Arailability: Klein, G. Strategies of decision making . in Military Review. May 1989.(see...T.aIng pI(l( i ’I , / Decision making ) Com bat 19. ABSTRACT (Continue on reverse if necessary and identify by block number) This article posits that

  7. Corrective Action Decision Document/Closure Report for Corrective Action Unit 567: Miscellaneous Soil Sites - Nevada National Security Site, Nevada

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Matthews, Patrick

    2014-12-01

    This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 567: Miscellaneous Soil Sites, Nevada National Security Site, Nevada. The purpose of this Corrective Action Decision Document/Closure Report is to provide justification and documentation supporting the recommendation that no further corrective action is needed for CAU 567 based on the implementation of the corrective actions. The corrective actions implemented at CAU 567 were developed based on an evaluation of analytical data from the CAI, the assumed presence of COCs at specific locations, and the detailed and comparative analysis of the CAAs. The CAAs weremore » selected on technical merit focusing on performance, reliability, feasibility, safety, and cost. The implemented corrective actions meet all requirements for the technical components evaluated. The CAAs meet all applicable federal and state regulations for closure of the site. Based on the implementation of these corrective actions, the DOE, National Nuclear Security Administration Nevada Field Office provides the following recommendations: • No further corrective actions are necessary for CAU 567. • The Nevada Division of Environmental Protection issue a Notice of Completion to the DOE, National Nuclear Security Administration Nevada Field Office for closure of CAU 567. • CAU 567 be moved from Appendix III to Appendix IV of the FFACO.« less

  8. Spatio-temporal dynamics of security investments in an interdependent risk environment

    NASA Astrophysics Data System (ADS)

    Shafi, Kamran; Bender, Axel; Zhong, Weicai; Abbass, Hussein A.

    2012-10-01

    In a globalised world where risks spread through contagion, the decision of an entity to invest in securing its premises from stochastic risks no longer depends solely on its own actions but also on the actions of other interacting entities in the system. This phenomenon is commonly seen in many domains including airline, logistics and computer security and is referred to as Interdependent Security (IDS). An IDS game models this decision problem from a game-theoretic perspective and deals with the behavioural dynamics of risk-reduction investments in such settings. This paper enhances this model and investigates the spatio-temporal aspects of the IDS games. The spatio-temporal dynamics are studied using simple replicator dynamics on a variety of network structures and for various security cost tradeoffs that lead to different Nash equilibria in an IDS game. The simulation results show that the neighbourhood configuration has a greater effect on the IDS game dynamics than network structure. An in-depth empirical analysis of game dynamics is carried out on regular graphs, which leads to the articulation of necessary and sufficient conditions for dominance in IDS games under spatial constraints.

  9. Campus Police/Media Relations.

    ERIC Educational Resources Information Center

    Mullendore, Philip

    California state statutes and a series of court cases have required campus security and police departments to release information about incidents occurring on campus to the media and the general public. Despite the law and case decisions, recent studies reveal campus police and security officials are still reluctant to release information to the…

  10. 20 CFR 416.1488 - Conditions for reopening.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 416.1488 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED... case; or (c) At any time if it was obtained by fraud or similar fault. In determining whether a determination or decision was obtained by fraud or similar fault, we will take into account any physical, mental...

  11. 77 FR 3257 - Transfer of Land Tracts Located at Los Alamos National Laboratory, New Mexico

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-23

    ... DEPARTMENT OF ENERGY Transfer of Land Tracts Located at Los Alamos National Laboratory, New Mexico AGENCY: National Nuclear Security Administration, U.S. Department of Energy. ACTION: Amended Record of Decision. SUMMARY: The U.S. Department of Energy's National Nuclear Security Administration (DOE/NNSA) is...

  12. 7 CFR 1962.4 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...: Unauthorized sale of security. Purchase of security with intent to defraud and without payment of the purchase... loan funds for an unauthorized purpose; Decision after obtaining a loan to use and using the funds for... related instruments. Some examples of default or factors to consider in determining whether a borrower is...

  13. Teaching Context in Information Security

    ERIC Educational Resources Information Center

    Bishop, Matt

    2006-01-01

    This article investigates teaching the application of technical ideas by non-technical means, especially by using puzzles to engage students. After discussing the need to teach students to evaluate contexts in which decisions about computer security must be made, we suggest questions and scenarios drawn from political science, history, as well as…

  14. 78 FR 27444 - Forum Investment Advisors, LLC, et al.;

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-10

    ... securities into, and receive securities from, the series in connection with the purchase and redemption of... settlement date. \\5\\ In a forward commitment transaction, the buyer/seller enters into a contract to purchase... Investment Manager, will make investment decisions with respect to assets of each Fund allocated by the...

  15. Portfolio analysis of layered security measures.

    PubMed

    Chatterjee, Samrat; Hora, Stephen C; Rosoff, Heather

    2015-03-01

    Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity. © 2014 Society for Risk Analysis.

  16. 19 CFR 177.13 - Inconsistent customs decisions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Inconsistent customs decisions. 177.13 Section 177.13 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) ADMINISTRATIVE RULINGS General Ruling Procedure § 177.13 Inconsistent customs...

  17. 19 CFR 177.13 - Inconsistent customs decisions.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 2 2012-04-01 2012-04-01 false Inconsistent customs decisions. 177.13 Section 177.13 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) ADMINISTRATIVE RULINGS General Ruling Procedure § 177.13 Inconsistent customs...

  18. 19 CFR 177.13 - Inconsistent customs decisions.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 2 2011-04-01 2011-04-01 false Inconsistent customs decisions. 177.13 Section 177.13 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) ADMINISTRATIVE RULINGS General Ruling Procedure § 177.13 Inconsistent customs...

  19. Decision Support System for Disability Assessment and Intervention.

    ERIC Educational Resources Information Center

    Dowler, Denetta L.; And Others

    1991-01-01

    Constructed decision support system to aid referral of good candidates for rehabilitation from Social Security Administration to rehabilitation counselors. Three layers of system were gross screening based on policy guidelines, training materials, and interviews with experts; physical and mental functional capacity items derived from policy…

  20. 15 CFR 719.20 - Record for decision.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Record for decision. 719.20 Section 719.20 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS...

  1. 15 CFR 719.18 - Decisions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false Decisions. 719.18 Section 719.18 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS ENFORCEMENT § 719.18...

  2. 15 CFR 719.18 - Decisions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Decisions. 719.18 Section 719.18 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS ENFORCEMENT § 719.18...

  3. 15 CFR 719.20 - Record for decision.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false Record for decision. 719.20 Section 719.20 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS...

  4. Administrator, National Security Education Program

    DTIC Science & Technology

    1993-01-19

    1. Administer, direct, and manage the resources for the lit program. 2. Establish and direct an international education center, as approved by the...approve the hiring of, and evaluate the performance of personnel who staff the international education center. 4. Ensure appropriate internal management...Administrator, National Security Education Program * References: (a) DoD Directive 1025.2 , "National Security * Education Program," January 13, 1993

  5. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges.

    PubMed

    Curiac, Daniel-Ioan

    2016-04-07

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.

  6. Current Scientific Approaches to Decision Making in Complex Systems: 3. Volume 1. Conference Proceedings. Third Conference, Richmond, Surrey, England, 6-8 August 1978

    DTIC Science & Technology

    1980-01-01

    filter and select out. You use your nose - or heuristics. That is just maturity. The only thing we can do is help people discuss possible models of their...Decision models / Conversation Theory Decision training Team decisions Man-computer interaction Learning strategies 2& ANTAACT (Cme1 revere le N nneesmod...paper by Maria Novakowska on a new model of decision under risk. , /V TI I~ 4 A SECURITY CLASSIFICATION OF TIS PAOUI(Ves Date EntetQ ii ,ln 1 to hi

  7. 32 CFR 2700.1 - References.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... INFORMATION REGULATIONS Introduction § 2700.1 References. (a) Executive Order 12065, “National Security Information,” June 28, 1978, (hereinafter E.O. 12065). (b) Information Security Oversight Office, Directive No. 1, “National Security Information,” October 2, 1978, (hereinafter ISOO Directive No. 1). ...

  8. An Experimental Test of a Model for Decision Strategy Selection

    DTIC Science & Technology

    1977-12-01

    University of Washington, Seattle, WA 98195 1l. CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE Organizational Effectiveness Research Programg... Controlling Office) IS. SECURITY CLASS, (of this report) UNCLASSI FIED 15. DECLASSIFICATION/DOWNGRADING SCHEDULE 16. DISTRIBUTION STATEMENT (of this Report... Equivalence Interval Decision Maker Cost Curve Strategy Cost Expected Net Utility Effect of the Value of the Perceived Strategy Da ision Strategies Decision on

  9. A Neural Information Field Approach to Computational Cognition

    DTIC Science & Technology

    2016-11-18

    We have extended our perceptual decision making model to account for the effects of context in this flexible DISTRIBUTION A. Approved for public...developed a new perceptual decision making model; demonstrated adaptive motor control in a large-scale cognitive simulation with spiking neurons (Spaun...TERMS EOARD, Computational Cognition, Mixed-initiative decision making 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF

  10. The Impact of Geographic Information Systems on Emergency Management Decision Making at the U.S. Department of Homeland Security

    ERIC Educational Resources Information Center

    King, Steven Gray

    2012-01-01

    Geographic information systems (GIS) reveal relationships and patterns from large quantities of diverse data in the form of maps and reports. The United States spends billions of dollars to use GIS to improve decisions made during responses to natural disasters and terrorist attacks, but precisely how GIS improves or impairs decision making is not…

  11. Exploring Hospice Decisions: The Road from the Institute on Aging and Social Work to an ARRA Challenge Grant

    ERIC Educational Resources Information Center

    Waldrop, Deborah

    2014-01-01

    Decisions about treatment and options for care at the end stage of an advanced chronic illness are important determinants of the quality of a person's death and of how family members adapt in bereavement. This article describes the steps taken to secure federal funding to study how people make the decision to enroll in hospice. The National…

  12. 17 CFR 240.14e-3 - Transactions in securities on the basis of material, nonpublic information in the context of...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... section if such person shows that: (1) The individual(s) making the investment decision on behalf of such... individual(s) making investment decision(s) would not violate paragraph (a) of this section, which policies... on behalf of the offering person or such issuer, to purchase or sell or cause to be purchased or sold...

  13. The Flask Security Architecture: System Support for Diverse Security Policies

    DTIC Science & Technology

    2006-01-01

    Flask microkernel -based operating sys­ tem, that successfully overcomes these obstacles to pol- icy flexibility. The cleaner separation of mechanism and...other object managers in the system to en- force those access control decisions. Although the pro­ totype system is microkernel -based, the security...mecha­ nisms do not depend on a microkernel architecture and will easily generalize beyond it. The resulting system provides policy flexibility. It sup

  14. 31 CFR 363.206 - How can I transfer my marketable Treasury security into my TreasuryDirect ® account from another...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Treasury security into my TreasuryDirect ® account from another book-entry system? 363.206 Section 363.206... transfer your marketable Treasury security from the commercial book-entry system by contacting the..., DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING SECURITIES HELD IN TREASURYDIRECT...

  15. 78 FR 46325 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-31

    ... to facilitate informed decision making regarding deposit accounts offered at depository institutions... information, such as account numbers or social security numbers, should not be included. FOR FURTHER... consumer ability to make informed decisions regarding deposit accounts by requiring uniformity in the...

  16. 32 CFR 1802.26 - Notification of decision and prohibition on adverse action.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... NATIONAL COUNTERINTELLIGENCE CENTER CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS... regard to the challenge and that an appeal of the decision may be made to the Interagency Security Classification Appeals Panel (ISCAP) established pursuant to § 5.4 of this Order. ...

  17. 32 CFR 1802.26 - Notification of decision and prohibition on adverse action.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... NATIONAL COUNTERINTELLIGENCE CENTER CHALLENGES TO CLASSIFICATION OF DOCUMENTS BY AUTHORIZED HOLDERS... regard to the challenge and that an appeal of the decision may be made to the Interagency Security Classification Appeals Panel (ISCAP) established pursuant to § 5.4 of this Order. ...

  18. 20 CFR 404.1770 - Decision by hearing officer.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 404.1770 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY... the close of the hearing, the hearing officer shall issue a decision or certify the case to the...., failure to pay dues or to complete continuing legal education requirements), that will not disqualify the...

  19. 20 CFR 404.1770 - Decision by hearing officer.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 404.1770 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY... the close of the hearing, the hearing officer shall issue a decision or certify the case to the...., failure to pay dues or to complete continuing legal education requirements), that will not disqualify the...

  20. 15 CFR 719.9 - Summary decision.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Summary decision. 719.9 Section 719.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS ENFORCEMENT § 719.9...

  1. 15 CFR 719.9 - Summary decision.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 15 Commerce and Foreign Trade 2 2011-01-01 2011-01-01 false Summary decision. 719.9 Section 719.9 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS ENFORCEMENT § 719.9...

  2. 20 CFR 411.630 - Is SSA's decision final?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Is SSA's decision final? 411.630 Section 411.630 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Ticket to Work Program Dispute Resolution Disputes Between Beneficiaries and Employment Networks § 411...

  3. 20 CFR 411.630 - Is SSA's decision final?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Is SSA's decision final? 411.630 Section 411.630 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Ticket to Work Program Dispute Resolution Disputes Between Beneficiaries and Employment Networks § 411...

  4. 20 CFR 411.630 - Is SSA's decision final?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Is SSA's decision final? 411.630 Section 411.630 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Ticket to Work Program Dispute Resolution Disputes Between Beneficiaries and Employment Networks § 411...

  5. 20 CFR 411.630 - Is SSA's decision final?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Is SSA's decision final? 411.630 Section 411.630 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Ticket to Work Program Dispute Resolution Disputes Between Beneficiaries and Employment Networks § 411...

  6. 20 CFR 411.630 - Is SSA's decision final?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Is SSA's decision final? 411.630 Section 411.630 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Ticket to Work Program Dispute Resolution Disputes Between Beneficiaries and Employment Networks § 411...

  7. Impact of Decision Criteria on Federal Aviation Administration Certification of Military Commercial Derivative Aircraft

    DTIC Science & Technology

    2012-03-01

    Capt Low was a member of the Sigma Iota Epsilon professional management fraternity. He has performed as an on-equipment and off-equipment...FAA Certification, Military Commercial Derivative Aircraft, Multi-Attribute Decision Making 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF

  8. A game-theoretical approach to multimedia social networks security.

    PubMed

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders.

  9. A Game-Theoretical Approach to Multimedia Social Networks Security

    PubMed Central

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders. PMID:24977226

  10. 19 CFR 201.44 - Procedures.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... release of national security information in the custody of the Commission shall be directed to the... security information in its custody has been classified by another Federal agency, the Secretary shall... changed as required by section 2001.43(b) of Information Security Oversight Office Directive No. 1. The...

  11. Corrective Action Decision Document/Closure Report for Corrective Action Unit 570: Area 9 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada, Revision 0

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Matthews, Patrick

    2013-11-01

    This Corrective Action Decision Document/Closure Report presents information supporting the closure of Corrective Action Unit (CAU) 570: Area 9 Yucca Flat Atmospheric Test Sites, Nevada National Security Site, Nevada. This complies with the requirements of the Federal Facility Agreement and Consent Order (FFACO) that was agreed to by the State of Nevada; U.S. Department of Energy (DOE), Environmental Management; U.S. Department of Defense; and DOE, Legacy Management. The purpose of the CADD/CR is to provide justification and documentation supporting the recommendation that no further corrective action is needed.

  12. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges

    PubMed Central

    Curiac, Daniel-Ioan

    2016-01-01

    Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues. PMID:27070601

  13. Test and Evaluation for Enhanced Security: A Quantitative Method to Incorporate Expert Knowledge into Test Planning Decisions.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rizzo, Davinia; Blackburn, Mark

    Complex systems are comprised of technical, social, political and environmental factors as well as the programmatic factors of cost, schedule and risk. Testing these systems for enhanced security requires expert knowledge in many different fields. It is important to test these systems to ensure effectiveness, but testing is limited to due cost, schedule, safety, feasibility and a myriad of other reasons. Without an effective decision framework for Test and Evaluation (T&E) planning that can take into consideration technical as well as programmatic factors and leverage expert knowledge, security in complex systems may not be assessed effectively. Therefore, this paper coversmore » the identification of the current T&E planning problem and an approach to include the full variety of factors and leverage expert knowledge in T&E planning through the use of Bayesian Networks (BN).« less

  14. Variable-bias coin tossing

    NASA Astrophysics Data System (ADS)

    Colbeck, Roger; Kent, Adrian

    2006-03-01

    Alice is a charismatic quantum cryptographer who believes her parties are unmissable; Bob is a (relatively) glamorous string theorist who believes he is an indispensable guest. To prevent possibly traumatic collisions of self-perception and reality, their social code requires that decisions about invitation or acceptance be made via a cryptographically secure variable-bias coin toss (VBCT). This generates a shared random bit by the toss of a coin whose bias is secretly chosen, within a stipulated range, by one of the parties; the other party learns only the random bit. Thus one party can secretly influence the outcome, while both can save face by blaming any negative decisions on bad luck. We describe here some cryptographic VBCT protocols whose security is guaranteed by quantum theory and the impossibility of superluminal signaling, setting our results in the context of a general discussion of secure two-party computation. We also briefly discuss other cryptographic applications of VBCT.

  15. Securing clean water: A secret to success

    Treesearch

    Michael Somerville; Dino DeSimone

    2000-01-01

    Securing clean water is a primary goal for many agencies, organizations, and concerned citizens. To achieve that goal, agencies have traditionally taken a mostly regulatory approach. In recent years, however, a major trend in government has been to move decision-making and action-taking to the local level. Conservation Districts, watershed organizations, and other...

  16. 20 CFR 416.1530 - Payment of fees.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND..., as defined in § 416.1503, the amount of the fee allowed by a Federal court in a proceeding under... demonstration project, as defined in § 416.1517, and as a result of the determination or decision you have past...

  17. Coast guard : better logistics planning needed to aid operational decisions related to the deployment of the national security cutter and its support assets.

    DOT National Transportation Integrated Search

    2009-07-01

    As part of its more than $$24 billion Deepwater program to replace aging vessels and aircraft with new or upgraded assets, the Coast Guard is preparing the National Security Cutter (NSC) for service. GAO previously reported on Deepwater assets' deplo...

  18. I-WASTE: EPA’s Suite of Homeland Security Decision Support Tools for the Waste and Disaster Debris Management and Disposal

    EPA Science Inventory

    In the U.S., a single comprehensive approach to all-hazards domestic incident management has been established by the Department of Homeland Security through the National Response Framework. This helps prevent, prepare for, respond to, and recover from terrorist attacks, major di...

  19. 12 CFR 12.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... which a national bank makes or participates in making the purchase or sale of securities, but does not... other property shall be purchased or sold by or for the account; or (2) Makes decisions as to what... the transaction means: (1) In the case of a customer who purchases a security through or from a...

  20. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    DTIC Science & Technology

    2012-01-01

    Martin B. Zimmerman, “Market Incentives for Safe Commercial Airline Operation,” American Economic Review, Vol. 78, No. 5, 1988, pp. 913–935. Bosch...Modeling,” in Stuart Johnson, Martin C. Libicki, and Gregory F. Treverton, eds., New Challenges, New Tools for Defense Decisionmaking, Santa Monica, Calif...677–725. Persico, Nicola, and Petra E. Todd, “Passenger Profiling, Imperfect Screening, and Airport Security,” American Economic Review, Vol. 95

  1. Food Security as a Constraint on National Policy Decision Making in the Arab Region: A Case Study on Food Security in Sudan

    DTIC Science & Technology

    2009-04-17

    12 Food Shortage alld The Killg of Egypt Visioll ----------------------------------------------------------- 13 Arab Security Gap ...intervention widened the gap in the value of food commodities in the Arab countries among investors and farmers. 5. Reduction in food production due to drought...seeds and also conduct pre-harvest crop assessments to identify agricultural and livestock gaps among the Sudanese2o. On the other hand, the UN

  2. A Guide to the Changing Court Rulings on Union Security in the Public Sector: An Introduction.

    ERIC Educational Resources Information Center

    Jascourt, Hugh D.

    1985-01-01

    Introduces two articles that (1) supply the union and management perspectives of the Supreme Court decision in "Ellis vs. Brotherhood of Railway, Airline and Steamship Clerks" and (2) discuss how this decision affects the public sector in the area of education. (MLF)

  3. 19 CFR 172.21 - Decisions effective for limited time.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 2 2012-04-01 2012-04-01 false Decisions effective for limited time. 172.21 Section 172.21 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... liquidated damages will be deemed applicable and will be enforced by promptly transmitting the matter, after...

  4. 19 CFR 172.21 - Decisions effective for limited time.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 2 2014-04-01 2014-04-01 false Decisions effective for limited time. 172.21 Section 172.21 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... liquidated damages will be deemed applicable and will be enforced by promptly transmitting the matter, after...

  5. 19 CFR 111.94 - Decision on monetary penalty.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    .... If payment or arrangements for payment are not timely made, Customs will refer the matter to the... 19 Customs Duties 1 2014-04-01 2014-04-01 false Decision on monetary penalty. 111.94 Section 111.94 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF...

  6. 19 CFR 171.22 - Decisions effective for limited time.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 2 2013-04-01 2013-04-01 false Decisions effective for limited time. 171.22 Section 171.22 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... deemed applicable and will be enforced by promptly referring the matter, after required collection action...

  7. 19 CFR 171.22 - Decisions effective for limited time.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 2 2014-04-01 2014-04-01 false Decisions effective for limited time. 171.22 Section 171.22 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... deemed applicable and will be enforced by promptly referring the matter, after required collection action...

  8. 19 CFR 172.21 - Decisions effective for limited time.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 2 2011-04-01 2011-04-01 false Decisions effective for limited time. 172.21 Section 172.21 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... liquidated damages will be deemed applicable and will be enforced by promptly transmitting the matter, after...

  9. 19 CFR 111.94 - Decision on monetary penalty.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    .... If payment or arrangements for payment are not timely made, Customs will refer the matter to the... 19 Customs Duties 1 2010-04-01 2010-04-01 false Decision on monetary penalty. 111.94 Section 111.94 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF...

  10. 19 CFR 111.94 - Decision on monetary penalty.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    .... If payment or arrangements for payment are not timely made, Customs will refer the matter to the... 19 Customs Duties 1 2011-04-01 2011-04-01 false Decision on monetary penalty. 111.94 Section 111.94 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF...

  11. 19 CFR 172.21 - Decisions effective for limited time.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Decisions effective for limited time. 172.21 Section 172.21 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... liquidated damages will be deemed applicable and will be enforced by promptly transmitting the matter, after...

  12. 19 CFR 111.94 - Decision on monetary penalty.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    .... If payment or arrangements for payment are not timely made, Customs will refer the matter to the... 19 Customs Duties 1 2013-04-01 2013-04-01 false Decision on monetary penalty. 111.94 Section 111.94 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF...

  13. 19 CFR 171.22 - Decisions effective for limited time.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Decisions effective for limited time. 171.22 Section 171.22 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... deemed applicable and will be enforced by promptly referring the matter, after required collection action...

  14. 19 CFR 172.21 - Decisions effective for limited time.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 2 2013-04-01 2013-04-01 false Decisions effective for limited time. 172.21 Section 172.21 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... liquidated damages will be deemed applicable and will be enforced by promptly transmitting the matter, after...

  15. 19 CFR 171.22 - Decisions effective for limited time.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 2 2012-04-01 2012-04-01 false Decisions effective for limited time. 171.22 Section 171.22 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... deemed applicable and will be enforced by promptly referring the matter, after required collection action...

  16. 19 CFR 111.94 - Decision on monetary penalty.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    .... If payment or arrangements for payment are not timely made, Customs will refer the matter to the... 19 Customs Duties 1 2012-04-01 2012-04-01 false Decision on monetary penalty. 111.94 Section 111.94 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF...

  17. 19 CFR 171.22 - Decisions effective for limited time.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 2 2011-04-01 2011-04-01 false Decisions effective for limited time. 171.22 Section 171.22 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... deemed applicable and will be enforced by promptly referring the matter, after required collection action...

  18. 10 CFR 824.13 - Initial decision.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Initial decision. 824.13 Section 824.13 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... other matters as justice may require. (b) The Hearing Officer shall serve all parties with the initial...

  19. 10 CFR 824.13 - Initial decision.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 10 Energy 4 2014-01-01 2014-01-01 false Initial decision. 824.13 Section 824.13 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... other matters as justice may require. (b) The Hearing Officer shall serve all parties with the initial...

  20. 10 CFR 824.13 - Initial decision.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 10 Energy 4 2013-01-01 2013-01-01 false Initial decision. 824.13 Section 824.13 Energy DEPARTMENT OF ENERGY PROCEDURAL RULES FOR THE ASSESSMENT OF CIVIL PENALTIES FOR CLASSIFIED INFORMATION SECURITY... other matters as justice may require. (b) The Hearing Officer shall serve all parties with the initial...

  1. 44 CFR 9.6 - Decision-making process.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... HOMELAND SECURITY GENERAL FLOODPLAIN MANAGEMENT AND PROTECTION OF WETLANDS § 9.6 Decision-making process. (a) Purpose. The purpose of this section is to set out the floodplain management and wetlands... light of the information gained in Steps 4 and 5. FEMA shall not act in a floodplain or wetland unless...

  2. 44 CFR 9.6 - Decision-making process.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... HOMELAND SECURITY GENERAL FLOODPLAIN MANAGEMENT AND PROTECTION OF WETLANDS § 9.6 Decision-making process. (a) Purpose. The purpose of this section is to set out the floodplain management and wetlands... light of the information gained in Steps 4 and 5. FEMA shall not act in a floodplain or wetland unless...

  3. 44 CFR 9.6 - Decision-making process.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... HOMELAND SECURITY GENERAL FLOODPLAIN MANAGEMENT AND PROTECTION OF WETLANDS § 9.6 Decision-making process. (a) Purpose. The purpose of this section is to set out the floodplain management and wetlands... light of the information gained in Steps 4 and 5. FEMA shall not act in a floodplain or wetland unless...

  4. 44 CFR 9.6 - Decision-making process.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... HOMELAND SECURITY GENERAL FLOODPLAIN MANAGEMENT AND PROTECTION OF WETLANDS § 9.6 Decision-making process. (a) Purpose. The purpose of this section is to set out the floodplain management and wetlands... light of the information gained in Steps 4 and 5. FEMA shall not act in a floodplain or wetland unless...

  5. 8 CFR 245a.20 - Decisions, appeals, motions, and certifications.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... aliens previously in proceedings—(1) Upon the granting of an application. If the application for LIFE... 8 Aliens and Nationality 1 2014-01-01 2014-01-01 false Decisions, appeals, motions, and certifications. 245a.20 Section 245a.20 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION...

  6. 8 CFR 245a.20 - Decisions, appeals, motions, and certifications.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... aliens previously in proceedings—(1) Upon the granting of an application. If the application for LIFE... 8 Aliens and Nationality 1 2012-01-01 2012-01-01 false Decisions, appeals, motions, and certifications. 245a.20 Section 245a.20 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION...

  7. 8 CFR 245a.20 - Decisions, appeals, motions, and certifications.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... aliens previously in proceedings—(1) Upon the granting of an application. If the application for LIFE... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Decisions, appeals, motions, and certifications. 245a.20 Section 245a.20 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION...

  8. 8 CFR 245a.20 - Decisions, appeals, motions, and certifications.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... aliens previously in proceedings—(1) Upon the granting of an application. If the application for LIFE... 8 Aliens and Nationality 1 2013-01-01 2013-01-01 false Decisions, appeals, motions, and certifications. 245a.20 Section 245a.20 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION...

  9. 8 CFR 245a.20 - Decisions, appeals, motions, and certifications.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... aliens previously in proceedings—(1) Upon the granting of an application. If the application for LIFE... 8 Aliens and Nationality 1 2011-01-01 2011-01-01 false Decisions, appeals, motions, and certifications. 245a.20 Section 245a.20 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION...

  10. 17 CFR 201.900 - Informal Procedures and Supplementary Information Concerning Adjudicatory Proceedings.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... from the initial decision of a hearing officer, a review of a determination by a self-regulatory... review of a determination by a self-regulatory organization, or a remand of a prior Commission decision..., securities industry participants, self-regulatory organizations and other members of the public. The...

  11. 10 CFR 710.22 - Initial decision process.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) The Manager shall make an initial decision as to the individual's access authorization eligibility... Officer refers the individual's case to the Manager in accordance with § 710.25(e) or § 710.26(b). (b) Unless an extension of time is granted by the Director, Office of Personnel Security, DOE Headquarters...

  12. 10 CFR 710.22 - Initial decision process.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) The Manager shall make an initial decision as to the individual's access authorization eligibility... Administrative Judge refers the individual's case to the Manager in accordance with § 710.25(e) or § 710.26(b). (b) Unless an extension of time is granted by the Director, Office of Personnel Security, DOE...

  13. 10 CFR 710.22 - Initial decision process.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) The Manager shall make an initial decision as to the individual's access authorization eligibility... Officer refers the individual's case to the Manager in accordance with § 710.25(e) or § 710.26(b). (b) Unless an extension of time is granted by the Director, Office of Personnel Security, DOE Headquarters...

  14. 10 CFR 710.22 - Initial decision process.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) The Manager shall make an initial decision as to the individual's access authorization eligibility... Officer refers the individual's case to the Manager in accordance with § 710.25(e) or § 710.26(b). (b) Unless an extension of time is granted by the Director, Office of Personnel Security, DOE Headquarters...

  15. 75 FR 51864 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ... decisions. Data elements with respect to the SHORT subscription service that would be provided through the... information about technical data elements to support transmission and data-integrity processes between the... for making well-informed investment decisions. Broad access to the information collected by the SHORT...

  16. 20 CFR 405.372 - Finality of an administrative law judge's decision.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Finality of an administrative law judge's decision. 405.372 Section 405.372 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING INITIAL DISABILITY CLAIMS Administrative Law Judge Hearing § 405.372 Finality of...

  17. 20 CFR 405.371 - Notice of the decision of an administrative law judge.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Notice of the decision of an administrative law judge. 405.371 Section 405.371 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING INITIAL DISABILITY CLAIMS Administrative Law Judge Hearing § 405.371...

  18. Modelling a Network of Decision Makers

    DTIC Science & Technology

    2004-06-01

    DATES COVERED 00-00-2004 to 00-00-2004 4. TITLE AND SUBTITLE Modelling a Netowrk of Decision Makers (Briefing Charts) 5a. CONTRACT NUMBER 5b...contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 31 19a

  19. 19 CFR 115.18 - Decision of Commissioner of Customs final.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 19 Customs Duties 1 2012-04-01 2012-04-01 false Decision of Commissioner of Customs final. 115.18 Section 115.18 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARGO CONTAINER AND ROAD VEHICLE CERTIFICATION PURSUANT TO INTERNATIONAL CUSTOMS...

  20. 19 CFR 115.18 - Decision of Commissioner of Customs final.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 1 2014-04-01 2014-04-01 false Decision of Commissioner of Customs final. 115.18 Section 115.18 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARGO CONTAINER AND ROAD VEHICLE CERTIFICATION PURSUANT TO INTERNATIONAL CUSTOMS...

  1. 19 CFR 115.18 - Decision of Commissioner of Customs final.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 19 Customs Duties 1 2013-04-01 2013-04-01 false Decision of Commissioner of Customs final. 115.18 Section 115.18 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARGO CONTAINER AND ROAD VEHICLE CERTIFICATION PURSUANT TO INTERNATIONAL CUSTOMS...

  2. 19 CFR 115.18 - Decision of Commissioner of Customs final.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 19 Customs Duties 1 2011-04-01 2011-04-01 false Decision of Commissioner of Customs final. 115.18 Section 115.18 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARGO CONTAINER AND ROAD VEHICLE CERTIFICATION PURSUANT TO INTERNATIONAL CUSTOMS...

  3. 19 CFR 115.18 - Decision of Commissioner of Customs final.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Decision of Commissioner of Customs final. 115.18 Section 115.18 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY CARGO CONTAINER AND ROAD VEHICLE CERTIFICATION PURSUANT TO INTERNATIONAL CUSTOMS...

  4. 20 CFR 404.1770 - Decision by hearing officer.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 404.1770 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY... the close of the hearing, the hearing officer will issue a decision or certify the case to the Appeals...., failure to pay dues or to complete continuing legal education requirements), that will not disqualify the...

  5. 20 CFR 404.1770 - Decision by hearing officer.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 404.1770 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY... the close of the hearing, the hearing officer will issue a decision or certify the case to the Appeals...., failure to pay dues or to complete continuing legal education requirements), that will not disqualify the...

  6. 20 CFR 404.1770 - Decision by hearing officer.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 404.1770 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY... the close of the hearing, the hearing officer will issue a decision or certify the case to the Appeals...., failure to pay dues or to complete continuing legal education requirements), that will not disqualify the...

  7. 20 CFR 901.49 - Decision of the Administrative Law Judge.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 4 2013-04-01 2013-04-01 false Decision of the Administrative Law Judge. 901.49 Section 901.49 Employees' Benefits JOINT BOARD FOR THE ENROLLMENT OF ACTUARIES REGULATIONS GOVERNING THE PERFORMANCE OF ACTUARIAL SERVICES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974...

  8. 20 CFR 901.49 - Decision of the Administrative Law Judge.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 4 2012-04-01 2012-04-01 false Decision of the Administrative Law Judge. 901.49 Section 901.49 Employees' Benefits JOINT BOARD FOR THE ENROLLMENT OF ACTUARIES REGULATIONS GOVERNING THE PERFORMANCE OF ACTUARIAL SERVICES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974...

  9. 20 CFR 901.49 - Decision of the Administrative Law Judge.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 3 2011-04-01 2011-04-01 false Decision of the Administrative Law Judge. 901.49 Section 901.49 Employees' Benefits JOINT BOARD FOR THE ENROLLMENT OF ACTUARIES REGULATIONS GOVERNING THE PERFORMANCE OF ACTUARIAL SERVICES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974...

  10. 20 CFR 901.49 - Decision of the Administrative Law Judge.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 4 2014-04-01 2014-04-01 false Decision of the Administrative Law Judge. 901.49 Section 901.49 Employees' Benefits JOINT BOARD FOR THE ENROLLMENT OF ACTUARIES REGULATIONS GOVERNING THE PERFORMANCE OF ACTUARIAL SERVICES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974...

  11. 19 CFR 181.101 - Publication of decisions.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 19 Customs Duties 2 2014-04-01 2014-04-01 false Publication of decisions. 181.101 Section 181.101 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) NORTH AMERICAN FREE TRADE AGREEMENT Advance Ruling Procedures § 181.101 Publication of...

  12. 76 FR 51358 - National Nuclear Security Administration Amended Record of Decision: Disposition of Surplus...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-18

    ...: Disposition of Surplus Highly Enriched Uranium Environmental Impact Statement AGENCY: National Nuclear... decision at that time. The Supplement Analysis analyzed the potential environmental impacts associated with... radioactive waste (LLW). The HEU EIS evaluated the potential environmental impacts of down- blending at up to...

  13. 20 CFR 411.660 - Is SSA's decision final?

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Is SSA's decision final? 411.660 Section 411.660 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Ticket to Work Program Dispute Resolution Disputes Between Employment Networks and Program Managers § 411...

  14. 20 CFR 411.660 - Is SSA's decision final?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Is SSA's decision final? 411.660 Section 411.660 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Ticket to Work Program Dispute Resolution Disputes Between Employment Networks and Program Managers § 411...

  15. 20 CFR 411.660 - Is SSA's decision final?

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Is SSA's decision final? 411.660 Section 411.660 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Ticket to Work Program Dispute Resolution Disputes Between Employment Networks and Program Managers § 411...

  16. 20 CFR 411.660 - Is SSA's decision final?

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Is SSA's decision final? 411.660 Section 411.660 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Ticket to Work Program Dispute Resolution Disputes Between Employment Networks and Program Managers § 411...

  17. 20 CFR 411.660 - Is SSA's decision final?

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Is SSA's decision final? 411.660 Section 411.660 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Ticket to Work Program Dispute Resolution Disputes Between Employment Networks and Program Managers § 411...

  18. 20 CFR 404.1776 - Assignment of request for review of the hearing officer's decision.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Assignment of request for review of the hearing officer's decision. 404.1776 Section 404.1776 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Representation of Parties § 404.1776...

  19. 20 CFR 404.1776 - Assignment of request for review of the hearing officer's decision.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Assignment of request for review of the hearing officer's decision. 404.1776 Section 404.1776 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Representation of Parties § 404.1776...

  20. 20 CFR 404.1776 - Assignment of request for review of the hearing officer's decision.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Assignment of request for review of the hearing officer's decision. 404.1776 Section 404.1776 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Representation of Parties § 404.1776...

  1. 20 CFR 404.1776 - Assignment of request for review of the hearing officer's decision.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Assignment of request for review of the hearing officer's decision. 404.1776 Section 404.1776 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Representation of Parties § 404.1776...

  2. 20 CFR 404.1776 - Assignment of request for review of the hearing officer's decision.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 20 Employees' Benefits 2 2013-04-01 2013-04-01 false Assignment of request for review of the hearing officer's decision. 404.1776 Section 404.1776 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Representation of Parties § 404.1776...

  3. 28 CFR 4.13 - Record for decision. Receipt of documents comprising record; timing and extension.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... comprising record; timing and extension. 4.13 Section 4.13 Judicial Administration DEPARTMENT OF JUSTICE... DISCLOSURE ACT OF 1959, AND THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974 § 4.13 Record for decision... and reasons therefor will be noted in the record. ...

  4. 20 CFR 901.49 - Decision of the Administrative Law Judge.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Decision of the Administrative Law Judge. 901.49 Section 901.49 Employees' Benefits JOINT BOARD FOR THE ENROLLMENT OF ACTUARIES REGULATIONS GOVERNING THE PERFORMANCE OF ACTUARIAL SERVICES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF 1974...

  5. 20 CFR 405.410 - Selecting claims for Decision Review Board review.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Selecting claims for Decision Review Board review. 405.410 Section 405.410 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW... will not review claims based on the identity of the administrative law judge who decided the claim. (b...

  6. Spacepower for Australias Security - Grand Strategy or Strategy of Grandeur

    DTIC Science & Technology

    2012-06-01

    2000), 34–35; Also see Peter H Diamandis and Steven Kotler , Abundance: The Future Is Better Than You Think (New York: Free Press, 2012...Studies of Policy Decisions and Fiascoes (Boston: Houghton Mifflin, 1982), 4; Graham T Allison and Philip Zelikow, Essence of Decision: Explaining the...Ala.: Air University Press, 2009. Allison, Graham T, and Philip Zelikow. Essence of Decision: Explaining the Cuban Missile Crisis. New York

  7. USHPRR FUEL FABRICATION PILLAR: FABRICATION STATUS, PROCESS OPTIMIZATIONS, AND FUTURE PLANS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wight, Jared M.; Joshi, Vineet V.; Lavender, Curt A.

    The Fuel Fabrication (FF) Pillar, a project within the U.S. High Performance Research Reactor Conversion program of the National Nuclear Security Administration’s Office of Material Management and Minimization, is tasked with the scale-up and commercialization of high-density monolithic U-Mo fuel for the conversion of appropriate research reactors to use of low-enriched fuel. The FF Pillar has made significant steps to demonstrate and optimize the baseline co-rolling process using commercial-scale equipment at both the Y-12 National Security Complex (Y-12) and BWX Technologies (BWXT). These demonstrations include the fabrication of the next irradiation experiment, Mini-Plate 1 (MP-1), and casting optimizations at Y-12.more » The FF Pillar uses a detailed process flow diagram to identify potential gaps in processing knowledge or demonstration, which helps direct the strategic research agenda of the FF Pillar. This paper describes the significant progress made toward understanding the fuel characteristics, and models developed to make informed decisions, increase process yield, and decrease lifecycle waste and costs.« less

  8. Design and implementation of a web-based patient portal linked to an ambulatory care electronic health record: patient gateway for diabetes collaborative care.

    PubMed

    Grant, Richard W; Wald, Jonathan S; Poon, Eric G; Schnipper, Jeffrey L; Gandhi, Tejal K; Volk, Lynn A; Middleton, Blackford

    2006-10-01

    Despite the availability of expert guidelines and widespread diabetes quality improvement efforts, care of patients with diabetes remains suboptimal. Two key barriers to care that may be amenable to informatics-based interventions include (1) lack of patient engagement with therapeutic care plans and (2) lack of medication adjustment by physicians ("clinical inertia") during clinical encounters. The authors describe the conceptual framework, design, implementation, and analysis plan for a diabetes patient web-portal linked directly to the electronic health record (EHR) of a large academic medical center via secure Internet access designed to overcome barriers to effective diabetes care. Partners HealthCare System (Boston, MA), a multi-hospital health care network comprising several thousand physicians caring for over 1 million individual patients, has developed a comprehensive patient web-portal called Patient Gateway that allows patients to interact directly with their EHR via secure Internet access. Using this portal, a specific diabetes interface was designed to maximize patient engagement by importing the patient's current clinical data in an educational format, providing patient-tailored decision support, and enabling the patient to author a "Diabetes Care Plan." The physician view of the patient's Diabetes Care Plan was designed to be concise and to fit into typical EHR clinical workflow. We successfully designed and implemented a Diabetes Patient portal that allows direct interaction with our system's EHR. We are assessing the impact of this advanced informatics tool for collaborative diabetes care in a clinic-randomized controlled trial among 14 primary care practices within our integrated health care system.

  9. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  10. Risk Assessment Methodology Based on the NISTIR 7628 Guidelines

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R

    2013-01-01

    Earlier work describes computational models of critical infrastructure that allow an analyst to estimate the security of a system in terms of the impact of loss per stakeholder resulting from security breakdowns. Here, we consider how to identify, monitor and estimate risk impact and probability for different smart grid stakeholders. Our constructive method leverages currently available standards and defined failure scenarios. We utilize the National Institute of Standards and Technology (NIST) Interagency or Internal Reports (NISTIR) 7628 as a basis to apply Cyberspace Security Econometrics system (CSES) for comparing design principles and courses of action in making security-related decisions.

  11. Three-step semiquantum secure direct communication protocol

    NASA Astrophysics Data System (ADS)

    Zou, XiangFu; Qiu, DaoWen

    2014-09-01

    Quantum secure direct communication is the direct communication of secret messages without need for establishing a shared secret key first. In the existing schemes, quantum secure direct communication is possible only when both parties are quantum. In this paper, we construct a three-step semiquantum secure direct communication (SQSDC) protocol based on single photon sources in which the sender Alice is classical. In a semiquantum protocol, a person is termed classical if he (she) can measure, prepare and send quantum states only with the fixed orthogonal quantum basis {|0>, |1>}. The security of the proposed SQSDC protocol is guaranteed by the complete robustness of semiquantum key distribution protocols and the unconditional security of classical one-time pad encryption. Therefore, the proposed SQSDC protocol is also completely robust. Complete robustness indicates that nonzero information acquired by an eavesdropper Eve on the secret message implies the nonzero probability that the legitimate participants can find errors on the bits tested by this protocol. In the proposed protocol, we suggest a method to check Eves disturbing in the doves returning phase such that Alice does not need to announce publicly any position or their coded bits value after the photons transmission is completed. Moreover, the proposed SQSDC protocol can be implemented with the existing techniques. Compared with many quantum secure direct communication protocols, the proposed SQSDC protocol has two merits: firstly the sender only needs classical capabilities; secondly to check Eves disturbing after the transmission of quantum states, no additional classical information is needed.

  12. 31 CFR 363.10 - What is a TreasuryDirect ® account?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ...) FISCAL SERVICE, DEPARTMENT OF THE TREASURY BUREAU OF THE PUBLIC DEBT REGULATIONS GOVERNING SECURITIES HELD IN TREASURYDIRECT General Provisions Governing Securities Held in TreasuryDirect § 363.10 What is a TreasuryDirect ® account? A TreasuryDirect account is an online account maintained by us solely in...

  13. Corporate Philanthropy Toward Community Health Improvement in Manufacturing Communities.

    PubMed

    McHugh, Megan; Farley, Diane; Maechling, Claude R; Dunlop, Dorothy D; French, Dustin D; Holl, Jane L

    2018-06-01

    Virtually all large employers engage in corporate philanthropy, but little is known about the extent to which it is directed toward improving community health. We conducted in-depth interviews with leaders of corporate philanthropy from 13 of the largest manufacturing companies in the US to understand how giving decisions were made, the extent to which funding was directed towards improving community health, and whether companies coordinate with local public health agencies. We found that corporate giving was sizable and directed towards communities in which the manufacturers have a large presence. Giving was aligned with the social determinants of health (i.e., aimed at improving economic stability, the neighborhood and physical environment, education, food security and nutrition, the community and social context, and the health care system). However, improving public health was not often cited as a goal of corporate giving, and coordination with public health agencies was limited. Our results suggest that there may be opportunities for public health agencies to help guide corporate philanthropy, particularly by sharing community-level data and offering their measurement and evaluation expertise.

  14. Security Measures to Protect Mobile Agents

    NASA Astrophysics Data System (ADS)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  15. Assessment of the potential enhancement of rural food security in Mexico using decision tree land use classification on medium resolution satellite imagery

    NASA Astrophysics Data System (ADS)

    Bermeo, A.; Couturier, S.

    2017-01-01

    Because of its renewed importance in international agendas, food security in sub-tropical countries has been the object of studies at different scales, although the spatial components of food security are still largely undocumented. Among other aspects, food security can be assessed using a food selfsufficiency index. We propose a spatial representation of this assessment in the densely populated rural area of the Huasteca Poblana, Mexico, where there is a known tendency towards the loss of selfsufficiency of basic grains. The main agricultural systems in this area are the traditional milpa (a multicrop practice with maize as the main basic crop) system, coffee plantations and grazing land for bovine livestock. We estimate a potential additional milpa - based maize production by smallholders identifying the presence of extensive coffee and pasture systems in the production data of the agricultural census. The surface of extensive coffee plantations and pasture land were estimated using the detailed coffee agricultural census data, and a decision tree combining unsupervised and supervised spectral classification techniques of medium scale (Landsat) satellite imagery. We find that 30% of the territory would benefit more than 50% increment in food security and 13% could theoretically become maize self-sufficient from the conversion of extensive systems to the traditional multicrop milpa system.

  16. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Long, John P.; Hamill, Michael J.; Mitchell, M. G.

    A major portion of the Wireless Networking Project at Sandia National Laboratories over the last few years has been to examine IEEE 802.11 wireless networking for possible use at Sandia and if practical, introduce this technology. This project team deployed 802.11a, b, and g Wireless Local Area Networking at Sandia. This report examines the basics of wireless networking and captures key results from project tests and experiments. It also records project members thoughts and designs on wireless LAN architecture and security issues. It documents some of the actions and milestones of this project, including pilot and production deployment of wirelessmore » networking equipment, and captures the team's rationale behind some of the decisions made. Finally, the report examines lessons learned, future directions, and conclusions.« less

  17. Bridging the gap between climate change and maritime security: Towards a comprehensive framework for planning.

    PubMed

    Mazaris, Antonios D; Germond, Basil

    2018-09-01

    For the past two decades, the need to shield strategic maritime interests, to tackle criminality and terrorism at or from the sea and to conserve valuable marine resources has been recognized at the highest political level. Acknowledging and accounting for the interplay between climate change, the vulnerability of coastal populations and the occurrence of maritime criminality should be part of any ocean governance process. Still, given the complex interactions between climate change and socio-economic components of the marine realm, it has become urgent to establish a solid methodological framework, which could lead to sound and effective decisions. We propose that any such framework should not be built from scratch. The adaptation of well tested, existing uncertainty-management tools, such as Cumulative Effect Assessments, could serve as a solid basis to account for the magnitude and directionality of the dependencies between the impacts of climate change and the occurrence of maritime criminality, offering spatial explicit risk evaluations. Multi-Criteria Decision Making could then be employed to better and faster inform decision-makers. These mechanisms could provide a framework for comparison of alternative mitigation and adaptation actions and are essential in assessing responses to tackle maritime crime in the context of climate change. Copyright © 2018 Elsevier B.V. All rights reserved.

  18. Population heterogeneity promotes a preference for blind cooperation

    NASA Astrophysics Data System (ADS)

    Perez-Escudero, Alfonso; Friedman, Jonathan; Gore, Jeff

    Game theory--and common sense--recommend to carefully weigh costs and benefits before deciding on a course of action. Yet we often disapprove of people who do so, even when their actual decision benefits us. For example, we prefer people who directly agree to do us a favor over those who agree only after securing enough information to ensure that the favor will not be too costly. Why should we care about how people make their decisions, rather than just focus on the decisions themselves? Hoffman et al. (2015) have shown that such aversion to information gathering may be beneficial when it is strong enough to increase the level of cooperation. Here we show that the same type of aversion arises in heterogeneous populations, but for a different reason: individuals who seek additional information may reveal themselves to be undesirable partners, since they are less likely to cooperate in the future when conditions change. Aversion to information gathering thus facilitates preferential interactions with blind cooperators, who are more favorable partners. Due to this new mechanism the prevalence of such aversion rapidly increases with population diversity, because partner discrimination is more useful in populations which harbor partners of a more varied quality. We gratefully acknowledge funding from the Paul G. Allen Family Foundation, EMBO and Human Frontier Science Program.

  19. Health Security and Risk Aversion.

    PubMed

    Herington, Jonathan

    2016-09-01

    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (i) that security is intrinsically valuable, (ii) that it is necessary for social planning and (iii) that it is an appropriate response to decision-making in contexts of very limited information. Striking the right balance between securing and maximizing population health thus requires a substantive, and hitherto unrecognized, value judgment. Finally, I critically evaluate the current health security agenda in light of this new account of the concept and its relationship to the other aims of public health policy. © 2016 John Wiley & Sons Ltd.

  20. Population growth and global security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mumford, S.

    A new threat to international and domestic security has emerged in the past three decades: uncontrolled world population growth. Current world population growth control efforts are ineffective. Unchecked growth will threaten global security by depleting food, energy, and other resources. Immigration is another complicating factor that is straining the carrying capacity of some overpopulated regions. Barriers to effective action include the desire of decision-makers to avoid the controversy of abortion and the role of the Catholic church in lobbying against birth control. (3 graphs, 12 photos, 2 tables)

  1. Making Decisions about U.S.-Japan Security Relations: Toward a Limited Forward-Deployment in the 21st Century

    DTIC Science & Technology

    1998-12-01

    conflict. In June 1994, well before the Nye report, the Japanese military analyst Shunji Taoka concluded that the DPRK was producing only sixty percent... Shunji , "The Japanese-American Security Treaty Without a U.S. Military Presence," Japan Policy Research Institute Working Paper No. 31, March 1997, 3...Strategy in Northeast Asia," Masters Thesis, Naval Postgraduate School, December 1994, 43. 62 Taoka, Shunji , "The Japanese-American Security Treaty

  2. Framework for Managing Metadata Security Tags as the Basis for Making Security Decisions.

    DTIC Science & Technology

    2002-12-01

    and Performance,” D.H. Associates, Inc., Sep 2001. [3] Deitel , H. M., and Deitel , P. J., Java How to Program , 3rd Edition, Prentice Hall Inc...1999. [4] Deitel , H. M., Deitel , P. J., and Nieto, T. R., Internet and The World Wide Web: How to Program , 2nd Edition, 2002. [5] Grohn, M. J., A...words) This thesis presents an analysis of a capability to employ CAPCO (Controlled Access Program Coordination Office) compliant Metadata security

  3. People, Process, and Policy: Case Studies in National Security Advising, the National Security Council, and Presidential Decision Making

    DTIC Science & Technology

    2017-06-01

    processes. Rothkopf, David J. 2006. Running the World: The Inside Story of The National Security Council and The Architects of American Power . 1st ed...recognized Soviet aims. They aimed to gain power , spread communism, and counter the West. Eisenhower’s belief in American physical and ideological...The Architects of American Power . 1st ed. New York: Public Affairs: 322-324. 22 Burke, Honest Broker?, 341. 23 U.N. Ambassador Albright, Treasury

  4. Guidelines for contingency planning NASA (National Aeronautics and Space Administration) ADP security risk reduction decision studies

    NASA Technical Reports Server (NTRS)

    Tompkins, F. G.

    1984-01-01

    Guidance is presented to NASA Computer Security Officials for determining the acceptability or unacceptability of ADP security risks based on the technical, operational and economic feasibility of potential safeguards. The risk management process is reviewed as a specialized application of the systems approach to problem solving and information systems analysis and design. Reporting the results of the risk reduction analysis to management is considered. Report formats for the risk reduction study are provided.

  5. Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.

    Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less

  6. The National Security Language Initiative and the Teaching of Hindi

    ERIC Educational Resources Information Center

    Shinge, Manjula

    2008-01-01

    This article discusses the teaching of Hindi in the USA, with special reference to the National Security Language Initiative (NSLI). Asian Indian languages are briefly described, as are the growth and diversification of the Asian Indian population in the USA. The inclusion of Hindi in the NSLI, and the implications of this decision for the…

  7. One-Day Conference on School Safety & Security and Fair Dismissals Issues (Dayton, Ohio, June 24, 1999).

    ERIC Educational Resources Information Center

    Education Law Association, Dayton, OH.

    This booklet contains five chapters relating to issues in school safety and security, and fair dismissals: (1) "Ohio Legislation and Federal and State Decisions" (Richard J. Dickinson). Items of deliberation include financial matters, school safety issues, administrator and teacher contract matters, Title IX liability, school prayer, drug testing…

  8. Information Operations & Security

    DTIC Science & Technology

    2012-03-05

    Fred B. Schneider, Cornell The Promise of Security Metrics • Users: Purchasing decisions – Which system is the better value? • Builders ...Engineering University of Maryland, College Park DISTRIBUTION A: Approved for public release; distribution is unlimited. Digital Multimedia Anti...fingerprints for multimedia content: • Determine the time and place of recordings • Detect tampering in the multimedia content; bind video and

  9. 49 CFR 1515.11 - Review by administrative law judge and TSA Final Decision Maker.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... PROCEDURAL RULES APPEAL AND WAIVER PROCEDURES FOR SECURITY THREAT ASSESSMENTS FOR INDIVIDUALS § 1515.11... Threat Assessment on the grounds that he or she poses a security threat after an appeal as described in... been issued a Final Determination of Threat Assessment after an appeal as described in 49 CFR 1515.9...

  10. 78 FR 55657 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ... making a final eligibility decision, TSA will advise the applicant that the FBI criminal record discloses... maintain the element of unpredictability for security purposes. Accordingly, persons who have been enrolled... processes, the applicable exemptions may be waived on a case-by-case basis. A notice of system of records...

  11. 78 FR 41443 - BofA Funds Series Trust, et al., Notice of Application

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-10

    ... offices physically separate from MLPF&S. 3. Investment decisions for the Funds are determined solely by... securities which are eligible for purchase by money market funds under rule 2a-7, including conventional... have the security in inventory and be in a position to quote a purchase and sale price that is the best...

  12. Keeping the Guard Up in a Down Economy: Investing in IT Security in Hard Times

    ERIC Educational Resources Information Center

    Voss, Brian D.; Siegel, Peter M.

    2009-01-01

    Considering the unprecedented budget hardships in higher education, now may not seem to be an auspicious time to be emphasizing the importance of continuing, or even perhaps increasing, investments in information security. Decisions regarding these matters are usually in the hands of the CIOs, leaving information technology (IT) leaders in…

  13. 75 FR 4498 - Control and Affiliation for Purposes of Market-Based Rate Requirements Under Section 205 of the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-28

    ... decision- making over sales of electric energy. 16. American Public Power Association (APPA) and National... securities of a public utility. Specifically, the Commission proposes to amend Part 33 of its regulations to... than 20 percent, of the outstanding voting securities of a public utility or holding company, where the...

  14. 20 CFR 416.556 - Waiver of adjustment or recovery-countable resources in excess of the limits prescribed in § 416...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... recovery of the subsequent overpayment. In making any determination or decision under this section... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Waiver of adjustment or recovery-countable... Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND...

  15. 12 CFR 220.113 - Necessity for prompt payment and delivery in special cash accounts.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... twice each month, at which times decisions are made to purchase any securities wished to be acquired for... Governors recently received an inquiry concerning whether purchases of securities by certain municipal... selected to effect the system's purchase, it is arranged in advance with the firm that the system will not...

  16. 20 CFR 703.304 - Filing of Agreement and Undertaking; deposit of security.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ...), the employer must: (a) Execute and file with the Branch an Agreement and Undertaking, in a form... amount; (4) Authorize the Branch, at its discretion, to bring suit under any deposited indemnity bond or...) Give security in the amount fixed in the Office's decision: (1) In the form of an indemnity bond with...

  17. 20 CFR 703.304 - Filing of Agreement and Undertaking; deposit of security.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ...), the employer must: (a) Execute and file with the Branch an Agreement and Undertaking, in a form... amount; (4) Authorize the Branch, at its discretion, to bring suit under any deposited indemnity bond or...) Give security in the amount fixed in the Office's decision: (1) In the form of an indemnity bond with...

  18. 20 CFR 703.304 - Filing of Agreement and Undertaking; deposit of security.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ...), the employer must: (a) Execute and file with the Branch an Agreement and Undertaking, in a form... amount; (4) Authorize the Branch, at its discretion, to bring suit under any deposited indemnity bond or...) Give security in the amount fixed in the Office's decision: (1) In the form of an indemnity bond with...

  19. 20 CFR 703.304 - Filing of Agreement and Undertaking; deposit of security.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ...), the employer must: (a) Execute and file with the Branch an Agreement and Undertaking, in a form... amount; (4) Authorize the Branch, at its discretion, to bring suit under any deposited indemnity bond or...) Give security in the amount fixed in the Office's decision: (1) In the form of an indemnity bond with...

  20. 78 FR 20673 - Privacy Act of 1974; Department of Homeland Security/U.S. Citizenship and Immigration Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-05

    ... additional information, and issuing decision notices and/or proofs of benefit. This notice updates this... evidence or additional information, and issuing decision notices and/or proofs of benefit. This system of... Temporary Accounts and Draft Benefit Requests), which stores draft account and case information from...

Top