Sample records for security decision making

  1. Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals

    NASA Astrophysics Data System (ADS)

    Fleischmann, Kenneth R.

    The biggest challenge facing computer security researchers and professionals is not learning how to make ethical decisions; rather it is learning how to recognize ethical decisions. All too often, technology development suffers from what Langdon Winner terms technological somnambulism - we sleepwalk through our technology design, following past precedents without a second thought, and fail to consider the perspectives of other stakeholders [1]. Computer security research and practice involves a number of opportunities for ethical decisions. For example, decisions about whether or not to automatically provide security updates involve tradeoffs related to caring versus user autonomy. Decisions about online voting include tradeoffs between convenience and security. Finally, decisions about routinely screening e-mails for spam involve tradeoffs of efficiency and privacy. It is critical that these and other decisions facing computer security researchers and professionals are confronted head on as value-laden design decisions, and that computer security researchers and professionals consider the perspectives of various stakeholders in making these decisions.

  2. The Role of Human Factors/Ergonomics in the Science of Security: Decision Making and Action Selection in Cyberspace.

    PubMed

    Proctor, Robert W; Chen, Jing

    2015-08-01

    The overarching goal is to convey the concept of science of security and the contributions that a scientifically based, human factors approach can make to this interdisciplinary field. Rather than a piecemeal approach to solving cybersecurity problems as they arise, the U.S. government is mounting a systematic effort to develop an approach grounded in science. Because humans play a central role in security measures, research on security-related decisions and actions grounded in principles of human information-processing and decision-making is crucial to this interdisciplinary effort. We describe the science of security and the role that human factors can play in it, and use two examples of research in cybersecurity--detection of phishing attacks and selection of mobile applications--to illustrate the contribution of a scientific, human factors approach. In these research areas, we show that systematic information-processing analyses of the decisions that users make and the actions they take provide a basis for integrating the human component of security science. Human factors specialists should utilize their foundation in the science of applied information processing and decision making to contribute to the science of cybersecurity. © 2015, Human Factors and Ergonomics Society.

  3. 20 CFR 220.35 - Introduction.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... term is defined in the Social Security Act. In making these decisions the Board must apply the... Services in making disability decisions under the Social Security Act. Regulations of the Social Security... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Introduction. 220.35 Section 220.35 Employees...

  4. Security Design Flaws That Affect Usability in Online Banking

    ERIC Educational Resources Information Center

    Gurlen, Stephanie

    2013-01-01

    As the popularity of online banking Websites has increased, the security of these sites has become increasingly critical as attacks against these sites are on the rise. However, the design decisions made during construction of the sites could make usability more difficult, where the user has difficulty making good security decisions. This study…

  5. On the Southern Border of the United States: Threats and Opportunities in an Economy of Force Theater

    DTIC Science & Technology

    2007-05-10

    U.S. Naval War College, National Security Decision Making handout dated 19 April 2006, page 2. 15 Geoffrey Crawford, The Posse Comitatus Act...2. 20 Shawn Burns, Homeland Security Considerations, U.S. Naval War College, National Security Decision Making handout dated 19 April 2006, page 3...States.42 The routes that make free-flowing ports of entry so attractive for 40 Ibid. Vallone

  6. The Effect of Knowledge of Online Security Risks on Consumer Decision Making in B2C e-Commerce

    ERIC Educational Resources Information Center

    Wang, Ping An

    2010-01-01

    This dissertation research studied how different degrees of knowledge of online security risks affect B2C (business-to-consumer) e-commerce consumer decision making. Online information security risks, such as identity theft, have increasingly become a major factor inhibiting the potential growth of e-commerce. On the other hand, e-commerce…

  7. 44 CFR 9.6 - Decision-making process.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Decision-making process. 9.6... HOMELAND SECURITY GENERAL FLOODPLAIN MANAGEMENT AND PROTECTION OF WETLANDS § 9.6 Decision-making process... protection decision-making process to be followed by the Agency in applying the Orders to its actions. While...

  8. Multi-view Decision Making (MVDM) Workshop

    DTIC Science & Technology

    2009-02-01

    reflect the realities of system-of-systems development, acquisition, fielding and support: multi-view decision making (MVDM). MVDM addresses the...including mission risk, interoperable acquisition, and operational security and survivability. Hence, a multi-view approach to decision making is

  9. Development of Decision-Making Automated System for Optimal Placement of Physical Access Control System’s Elements

    NASA Astrophysics Data System (ADS)

    Danilova, Olga; Semenova, Zinaida

    2018-04-01

    The objective of this study is a detailed analysis of physical protection systems development for information resources. The optimization theory and decision-making mathematical apparatus is used to formulate correctly and create an algorithm of selection procedure for security systems optimal configuration considering the location of the secured object’s access point and zones. The result of this study is a software implementation scheme of decision-making system for optimal placement of the physical access control system’s elements.

  10. An Artificial Neural Network-Based Decision-Support System for Integrated Network Security

    DTIC Science & Technology

    2014-09-01

    group that they need to know in order to make team-based decisions in real-time environments, (c) Employ secure cloud computing services to host mobile...THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of Engineering and Management Air Force...out-of-the-loop syndrome and create complexity creep. As a result, full automation efforts can lead to inappropriate decision-making despite a

  11. The PRC Decision-Making Process

    DTIC Science & Technology

    2002-03-01

    REPORT DATE March 2002 3. REPORT TYPE AND DATES COVERED Master’s Thesis 4. TITLE AND SUBTITLE The PRC Decision - Making ...of crisis. It explores who has the authority to make decisions in China today and who will have this authority as new leaders...security and foreign policy decision - making during times of crisis. The April 2001 EP-3 incident is examined to assess high-level

  12. 76 FR 65512 - Record of Decision Addendum for the Department of Homeland Security Headquarters Consolidation at...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-21

    ... parts 1500-1508), GSA Order PBS P 1095.1F (Environmental considerations in decision-making, dated... Decision Addendum for the Department of Homeland Security Headquarters Consolidation at St. Elizabeths in...). ACTION: Record of Decision Addendum. SUMMARY: Pursuant to the requirements of the National Environmental...

  13. The Constructive Role of Decisions: Implications from a quantum Approach

    DTIC Science & Technology

    2016-12-01

    objectives. The first was to explore the nature of constructive influences in decision making . The second concerned understanding decision making in...Prisoner’s Dilemma. **First objective; constructive judgments. This is the idea that sometimes making a decision can alter the underlying relevant mental...the performance of the agent. 15.  SUBJECT TERMS EOARD, Quantum Probability, Human Modeling, Human Decision Making 16.  SECURITY CLASSIFICATION OF

  14. 75 FR 6237 - Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-08

    ... additional one hour after the decision making cut off time of 5:30 p.m. to submit a CEA to the various.... The Exchange will continue to enforce the 5:30 p.m. decision making requirement, while also allowing..., processing information with respect to, and facilitating transactions in securities, to remove impediments to...

  15. The impact of geographic information systems on emergency management decision making at the U.S. Department of Homeland Security

    NASA Astrophysics Data System (ADS)

    King, Steven Gray

    Geographic information systems (GIS) reveal relationships and patterns from large quantities of diverse data in the form of maps and reports. The United States spends billions of dollars to use GIS to improve decisions made during responses to natural disasters and terrorist attacks, but precisely how GIS improves or impairs decision making is not known. This research examined how GIS affect decision making during natural disasters, and how GIS can be more effectively used to improve decision making for emergency management. Using a qualitative case study methodology, this research examined decision making at the U.S. Department of Homeland Security (DHS) during a large full-scale disaster exercise. This study indicates that GIS provided decision makers at DHS with an outstanding context for information that would otherwise be challenging to understand, especially through the integration of multiple data sources and dynamic three-dimensional interactive maps. Decision making was hampered by outdated information, a reliance on predictive models based on hypothetical data rather than actual event data, and a lack of understanding of the capabilities of GIS beyond cartography. Geospatial analysts, emergency managers, and other decision makers who use GIS should take specific steps to improve decision making based on GIS for disaster response and emergency management.

  16. Data Driven Decision Making in the Social Studies

    ERIC Educational Resources Information Center

    Ediger, Marlow

    2010-01-01

    Data driven decision making emphasizes the importance of the teacher using objective sources of information in developing the social studies curriculum. Too frequently, decisions of teachers have been made based on routine and outdated methods of teaching. Valid and reliable tests used to secure results from pupil learning make for better…

  17. Design of an Aircrew Scheduling Decision Aid for the 6916th Electronic Security Squadron.

    DTIC Science & Technology

    1987-06-01

    Security Classification) Design of an Aircrew Scheduling Decision Aid for the 6916th Electronic Security Squadron 12. PERSONAL AUTHOR(S) Thomas J. Kopf...Because of the great number of possible scheduling alternatives, it is difficult to find an optimal solution to-the scheduling problem. Additionally...changes to the original schedule make it even more difficult to find an optimal solution. The emergence of capable microcompu- ters, decision support

  18. The Defense Industrial Base: Prescription for a Psychosomatic Ailment

    DTIC Science & Technology

    1983-08-01

    The Decision- Making Process ------------------------- 65 Notes ---------------------------------------- FIGURE 4-1. The Decision [laking Process...the strategy and tactics process to make certain that we can attain out national security objectives. (IFP is also known as mobilization planning or...decision- making model that could improve the capacity and capability-of the military-industrial complex, thereby increasing the probability of success

  19. Strategies of Decision Making

    DTIC Science & Technology

    1989-05-01

    6.11.02.B 74F n/a n/a 11. TITLE (Include Security Classification) Strategies of Decision Making 12. PERSONAL AUTHOR(S) Gary A. Klein 13a. TYPE OF...NOTATION Judith Orasanu, contracting officer’s representative Arailability: Klein, G. Strategies of decision making . in Military Review. May 1989.(see...T.aIng pI(l( i ’I , / Decision making ) Com bat 19. ABSTRACT (Continue on reverse if necessary and identify by block number) This article posits that

  20. A false sense of security: lesbian, gay, bisexual, and transgender (LGBT) surrogate health care decision-making rights.

    PubMed

    Wahlert, Lance; Fiester, Autumn

    2013-01-01

    This article addresses the timely and ethically problematic issue of surrogate decision-making rights for lesbian, gay, bisexual, and transgender (LGBT) patients and their families in the American health care system. Despite multiple pro-LGBT recommendations that have been released in recent years by the Obama administration, the Institute of Medicine, and the US Department of Health and Human Services, such initiatives, while laudable, also have unfortunately occasioned a "false sense of security" for many LGBT patients, their families, and their caregivers. In particular, new regulations on surrogate decision making merely invoke a sense of universal patient rights rather than actually generating them. Therefore, it is imperative that primary care physicians urge all LGBT patients to take proactive steps to protect themselves and their loved ones by naming proxy decision makers well before the crises that would necessitate such decisions.

  1. Waste Management Decision-Making Process During a Homeland Security Incident Response

    EPA Pesticide Factsheets

    A step-by-step guide on how to make waste management-related decisions including how waste can be minimized, collected and treated, as well as where waste can be sent for staging, storage and final disposal.

  2. A Neural Information Field Approach to Computational Cognition

    DTIC Science & Technology

    2016-11-18

    We have extended our perceptual decision making model to account for the effects of context in this flexible DISTRIBUTION A. Approved for public...developed a new perceptual decision making model; demonstrated adaptive motor control in a large-scale cognitive simulation with spiking neurons (Spaun...TERMS EOARD, Computational Cognition, Mixed-initiative decision making 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18. NUMBER OF

  3. 12 CFR 12.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... which a national bank makes or participates in making the purchase or sale of securities, but does not... other property shall be purchased or sold by or for the account; or (2) Makes decisions as to what... the transaction means: (1) In the case of a customer who purchases a security through or from a...

  4. 20 CFR 418.3650 - How do we make our decision upon review?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false How do we make our decision upon review? 418.3650 Section 418.3650 Employees' Benefits SOCIAL SECURITY ADMINISTRATION MEDICARE SUBSIDIES Medicare... decision upon review? After you request review of our initial determination, we will review the information...

  5. 78 FR 27462 - Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-10

    ... making routing, quotation, price and size decisions regarding where they should send orders and quotes... more transparent and accessible to market participants making routing decisions concerning their... participants additional information in [[Page 27464

  6. Personal finance: there are no shortcuts to financial security.

    PubMed

    Yarkony, Kathryn

    2009-12-01

    Perioperative nurses have skills that lend themselves to sound financial decision-making, and during these difficult economic times, it is important to know how to secure earnings for the future. Key strategies include saving for retirement, consulting a financial advisor, investing in reliable vehicles, holding investments until the market stabilizes, and controlling credit card debt. Nurses can use the nursing process of assessment, diagnosis, planning, implementation, and evaluation to help them make sound financial decisions. (c) AORN, Inc, 2009.

  7. 20 CFR 411.205 - What if I disagree with the PM's decision about whether I am making timely progress toward self...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... about whether I am making timely progress toward self-supporting employment? 411.205 Section 411.205 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM...-supporting employment? If you disagree with the PM's decision, you may request that we review the decision...

  8. Decision-Making in National Security Affairs: Toward a Typology.

    DTIC Science & Technology

    1985-06-07

    decisional model, and thus provide the necessary linkage between observation and application of theory in explaining and/or predicting policy decisions . r...examines theories and models of decision -making processes from an interdisciplinary perspective, with a view toward deriving means by which the behavior of...processes, game theory , linear programming, network and graph theory , time series analysis, and the like. The discipline of decision analysis is a relatively

  9. 78 FR 46325 - Agency Information Collection Activities: Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-31

    ... to facilitate informed decision making regarding deposit accounts offered at depository institutions... information, such as account numbers or social security numbers, should not be included. FOR FURTHER... consumer ability to make informed decisions regarding deposit accounts by requiring uniformity in the...

  10. 17 CFR Appendix A to Part 420 - Separate Reporting Entity

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... SECTION 15C OF THE SECURITIES EXCHANGE ACT OF 1934 LARGE POSITION REPORTING Pt. 420, App. A Appendix A to... reporting rules; (3) Decisions related to the purchase, sale or retention of Treasury securities must be made by employees of such entity(ies). Employees of such entity(ies) who make decisions to purchase or...

  11. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.

    PubMed

    Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.

  12. 44 CFR 9.6 - Decision-making process.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... HOMELAND SECURITY GENERAL FLOODPLAIN MANAGEMENT AND PROTECTION OF WETLANDS § 9.6 Decision-making process. (a) Purpose. The purpose of this section is to set out the floodplain management and wetlands... light of the information gained in Steps 4 and 5. FEMA shall not act in a floodplain or wetland unless...

  13. 44 CFR 9.6 - Decision-making process.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... HOMELAND SECURITY GENERAL FLOODPLAIN MANAGEMENT AND PROTECTION OF WETLANDS § 9.6 Decision-making process. (a) Purpose. The purpose of this section is to set out the floodplain management and wetlands... light of the information gained in Steps 4 and 5. FEMA shall not act in a floodplain or wetland unless...

  14. 44 CFR 9.6 - Decision-making process.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... HOMELAND SECURITY GENERAL FLOODPLAIN MANAGEMENT AND PROTECTION OF WETLANDS § 9.6 Decision-making process. (a) Purpose. The purpose of this section is to set out the floodplain management and wetlands... light of the information gained in Steps 4 and 5. FEMA shall not act in a floodplain or wetland unless...

  15. 44 CFR 9.6 - Decision-making process.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... HOMELAND SECURITY GENERAL FLOODPLAIN MANAGEMENT AND PROTECTION OF WETLANDS § 9.6 Decision-making process. (a) Purpose. The purpose of this section is to set out the floodplain management and wetlands... light of the information gained in Steps 4 and 5. FEMA shall not act in a floodplain or wetland unless...

  16. The Impact of Geographic Information Systems on Emergency Management Decision Making at the U.S. Department of Homeland Security

    ERIC Educational Resources Information Center

    King, Steven Gray

    2012-01-01

    Geographic information systems (GIS) reveal relationships and patterns from large quantities of diverse data in the form of maps and reports. The United States spends billions of dollars to use GIS to improve decisions made during responses to natural disasters and terrorist attacks, but precisely how GIS improves or impairs decision making is not…

  17. 17 CFR 240.14e-3 - Transactions in securities on the basis of material, nonpublic information in the context of...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... section if such person shows that: (1) The individual(s) making the investment decision on behalf of such... individual(s) making investment decision(s) would not violate paragraph (a) of this section, which policies... on behalf of the offering person or such issuer, to purchase or sell or cause to be purchased or sold...

  18. Research on web-based decision support system for sports competitions

    NASA Astrophysics Data System (ADS)

    Huo, Hanqiang

    2010-07-01

    This paper describes the system architecture and implementation technology of the decision support system for sports competitions, discusses the design of decision-making modules, management modules and security of the system, and proposes the development idea of building a web-based decision support system for sports competitions.

  19. 20 CFR 404.349 - When is a child living apart from me in my care?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... care? 404.349 Section 404.349 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... and make important decisions about his or her needs, and one of the following circumstances exist: (i... mentally disabled, and you supervise his or her activities, make important decisions about his or her needs...

  20. 77 FR 71871 - Information Collection Available for Public Comments and Recommendations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-04

    ... availability, location, and specifications of U.S.-flag vessels for the purpose of making vessel availability... Administrator to make a timely and informed decision on the availability of coastwise qualified vessels in support of a request from the Department of Homeland Security prior to the final decision on granting a...

  1. Service Oriented Architecture Security Risks and their Mitigation

    DTIC Science & Technology

    2012-10-01

    this section can be mitigated by making use of suitable authentication , confidentiality, integrity, and authorisation standards such as Security...for authorisation . Machines/non-human users should be clearly identified and authenticated by the identity provision and authentication services... authentication , any security related attributes for the subject, and the authorisation decisions given based on the security and privilege attributes

  2. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

    PubMed Central

    Veksler, Vladislav D.; Buchler, Norbou; Hoffman, Blaine E.; Cassenti, Daniel N.; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting. PMID:29867661

  3. The role of behavioral economics and behavioral decision making in Americans' retirement savings decisions.

    PubMed

    Knoll, Melissa A Z

    2010-01-01

    Traditional economic theory posits that people make decisions by maximizing a utility function in which all of the relevant constraints and preferences are included and weighed appropriately. Behavioral economists and decision-making researchers, however, are interested in how people make decisions in the face of incomplete information, limited cognitive resources, and decision biases. Empirical findings in the areas of behavioral economics and judgment and decision making (JDM) demonstrate departures from the notion that man is economically rational, illustrating instead that people often act in ways that are economically suboptimal. This article outlines findings from the JDM and behavioral-economics literatures that highlight the many behavioral impediments to saving that individuals may encounter on their way to financial security. I discuss how behavioral and psychological issues, such as self-control, emotions, and choice architecture can help policymakers understand what factors, aside from purely economic ones, may affect individuals' savings behavior.

  4. 20 CFR 405.220 - Decision by the Federal reviewing official.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Decision by the Federal reviewing official. 405.220 Section 405.220 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW... Medical and Vocational Expert System before making a decision. At all times, the Federal reviewing...

  5. 2017 Joint Annual NDIA/AIA Industrial Security Committee Fall Conference

    DTIC Science & Technology

    2017-11-15

    beyond credit data to offer the insights that government professionals need to make informed decisions and ensure citizen safety, manage compliance...business that provides information technology and professional services. We specialize in managing business processes and systems integration for both... Information Security System ISFD Industrial Security Facilities Database OBMS ODAA Business Management System STEPP Security, Training, Education and

  6. Developing useful transit-related crime and incident data

    DOT National Transportation Integrated Search

    2000-04-01

    Transit agencies have an obligation to provide a reasonably safe and secure system for their patrons and employees. Transit management must make decisions regarding the best use of police, security personnel, and other resources to reduce crime and i...

  7. Employee Participation--A Practical Guide.

    ERIC Educational Resources Information Center

    Wooden, Mark

    1990-01-01

    Despite the benefits of employee participation in decision making, it is not widespread. Making it work requires commitment, job security, training, access to information, communication channels, goal setting, flat organizational structures, and financial reinforcement. (SK)

  8. A Value-Based Hierarchy of Objectives for Military Decision-Making

    DTIC Science & Technology

    1991-09-01

    r"EHICS, ZECISION MAKING, DECISION THEORY ,ý LEADERSHIP , 101 LEAERSHIP TRAINIING) ` ~16. PRICI CODE 17. SfCURITY CLA SIPIATIOW 18. SECURITY...29, Just- War Theory ................ I..............30 Jus ad bellum............................ .32 Jus in bello.................33...professional competence, and elements of just war theory such as proportionality and discrimination. A review of the relevant literature on just war theory

  9. Intelligence-Led Risk Management for Homeland Security: A Collaborative Approach for a Common Goal

    DTIC Science & Technology

    2011-12-01

    phases of research into a summary analysis of the risk management policy within the homeland security enterprise. The result of the multi-goal policy ...management and policy decisions with emphasis on social aspects and efforts to support local and regional decision making, and to avoid cascading...independent variables. The second order social and economic effects of terrorism have been largely overlooked so far in accounting for the risk from

  10. The involvement of the striatum in decision making

    PubMed Central

    Goulet-Kennedy, Julie; Labbe, Sara; Fecteau, Shirley

    2016-01-01

    Decision making has been extensively studied in the context of economics and from a group perspective, but still little is known on individual decision making. Here we discuss the different cognitive processes involved in decision making and its associated neural substrates. The putative conductors in decision making appear to be the prefrontal cortex and the striatum. Impaired decision-making skills in various clinical populations have been associated with activity in the prefrontal cortex and in the striatum. We highlight the importance of strengthening the degree of integration of both cognitive and neural substrates in order to further our understanding of decision-making skills. In terms of cognitive paradigms, there is a need to improve the ecological value of experimental tasks that assess decision making in various contexts and with rewards; this would help translate laboratory learnings into real-life benefits. In terms of neural substrates, the use of neuroimaging techniques helps characterize the neural networks associated with decision making; more recently, ways to modulate brain activity, such as in the prefrontal cortex and connected regions (eg, striatum), with noninvasive brain stimulation have also shed light on the neural and cognitive substrates of decision making. Together, these cognitive and neural approaches might be useful for patients with impaired decision-making skills. The drive behind this line of work is that decision-making abilities underlie important aspects of wellness, health, security, and financial and social choices in our daily lives. PMID:27069380

  11. 75 FR 57811 - Notice of Intent To Prepare an Environmental Assessment and Scoping; President's Park South...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-22

    ... to prevent delays in decision-making. The proposed actions grow out of needs identified by USSS... respond to the street closures and re-design of security elements to ensure the iconic historic nature of... security elements in place of the temporary security elements identified above. The intent is to integrate...

  12. A GIS-based decision support system for regional eco-security assessment and its application on the Tibetan Plateau.

    PubMed

    Xiaodan, Wang; Xianghao, Zhong; Pan, Gao

    2010-10-01

    Regional eco-security assessment is an intricate, challenging task. In previous studies, the integration of eco-environmental models and geographical information systems (GIS) usually takes two approaches: loose coupling and tight coupling. However, the present study used a full coupling approach to develop a GIS-based regional eco-security assessment decision support system (ESDSS). This was achieved by merging the pressure-state-response (PSR) model and the analytic hierarchy process (AHP) into ArcGIS 9 as a dynamic link library (DLL) using ArcObjects in ArcGIS and Visual Basic for Applications. Such an approach makes it easy to capitalize on the GIS visualization and spatial analysis functions, thereby significantly supporting the dynamic estimation of regional eco-security. A case study is presented for the Tibetan Plateau, known as the world's "third pole" after the Arctic and Antarctic. Results verified the usefulness and feasibility of the developed method. As a useful tool, the ESDSS can also help local managers to make scientifically-based and effective decisions about Tibetan eco-environmental protection and land use. Copyright (c) 2010 Elsevier Ltd. All rights reserved.

  13. Decision making in a human population living sustainably.

    PubMed

    Hicks, John S; Burgman, Mark A; Marewski, Julian N; Fidler, Fiona; Gigerenzer, Gerd

    2012-10-01

    The Tiwi people of northern Australia have managed natural resources continuously for 6000-8000 years. Tiwi management objectives and outcomes may reflect how they gather information about the environment. We qualitatively analyzed Tiwi documents and management techniques to examine the relation between the social and physical environment of decision makers and their decision-making strategies. We hypothesized that principles of bounded rationality, namely, the use of efficient rules to navigate complex decision problems, explain how Tiwi managers use simple decision strategies (i.e., heuristics) to make robust decisions. Tiwi natural resource managers reduced complexity in decision making through a process that gathers incomplete and uncertain information to quickly guide decisions toward effective outcomes. They used management feedback to validate decisions through an information loop that resulted in long-term sustainability of environmental use. We examined the Tiwi decision-making processes relative to management of barramundi (Lates calcarifer) fisheries and contrasted their management with the state government's management of barramundi. Decisions that enhanced the status of individual people and their attainment of aspiration levels resulted in reliable resource availability for Tiwi consumers. Different decision processes adopted by the state for management of barramundi may not secure similarly sustainable outcomes. ©2012 Society for Conservation Biology.

  14. Crosstalk: The Journal of Defense Software Engineering. Volume 22, Number 3

    DTIC Science & Technology

    2009-04-01

    international standard for information security management systems like ISO /IEC 27001 :2005 [1] existed. Since that time, the organization has developed control...of ISO /IEC 27001 and the desire to make decisions based on business value and risk has prompted Ford’s IT Security and Controls organi- zation to begin...their conventional application security operation.u References 1. ISO /IEC 27001 :2005. “Information Technology – Security Techniques – Information

  15. The Potential Effects of Obesity on Social Security Claiming Behavior and Retirement Benefits.

    PubMed

    Knoll, Melissa A Z; Shoffner, Dave; O'Leary, Samantha

    2018-04-16

    Obesity prevalence among Americans has increased for nearly three decades. We explore the relationship between the rise in obesity and Social Security retirement benefit claiming, a decision impacting nearly all aging Americans. Specifically, we investigate whether obesity can affect individuals' decision to claim benefits early, a choice that has important implications for financial security in retirement, particularly for those with lower socioeconomic status (SES). We use a microsimulation model called MINT6 (Modeling Income in the Near Term, version 6) to demonstrate the potential effects of obesity on subjective life expectancy and claiming behavior. We impute obesity status using data from the National Health and Nutrition Examination Survey (NHANES), which describes the distribution of obesity prevalence within the United States by gender, poverty status, and race/ethnicity. We find that the rise in obesity and the consequent incidence of obesity-related diseases may lead some individuals to make claiming decisions that lead to lower monthly and lifetime Social Security retirement benefits. Further, we find that the potential economic impact of this decision is larger for those with lower SES. We present a behavioral perspective by addressing the potential effects that obesity can have on individuals' retirement decisions and their resulting Social Security retirement benefits.

  16. 78 FR 27444 - Forum Investment Advisors, LLC, et al.;

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-10

    ... securities into, and receive securities from, the series in connection with the purchase and redemption of... settlement date. \\5\\ In a forward commitment transaction, the buyer/seller enters into a contract to purchase... Investment Manager, will make investment decisions with respect to assets of each Fund allocated by the...

  17. Impact of Decision Criteria on Federal Aviation Administration Certification of Military Commercial Derivative Aircraft

    DTIC Science & Technology

    2012-03-01

    Capt Low was a member of the Sigma Iota Epsilon professional management fraternity. He has performed as an on-equipment and off-equipment...FAA Certification, Military Commercial Derivative Aircraft, Multi-Attribute Decision Making 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF

  18. Using Anticipative Malware Analysis to Support Decision Making

    DTIC Science & Technology

    2010-11-01

    specifically, we have designed and implemented a network sandbox, i.e. a sandbox that allows us to study malware behaviour from the network perspective. We...plan to use this sandbox to generate malware-sample profiles that can be used by decision making algorithms to help network administrators and security...also allows the user to specify the network topology to be used. 1 INTRODUCTION Once the presence of a malicious software (malware) threat has been

  19. The Media and National Security Decision-Making

    DTIC Science & Technology

    2004-02-29

    2002. Muller, Kerstin, “The CNN effect, media and global governance,” Speech by Minister of State Kerstin Muller to Open the Forum Global Issues on...time to analyze, develop and arrive at a decision is acutely abbreviated. Many factors influence this, and the increasing public awareness on global ... issues , thanks to the abundance of information, makes this a complex task. The attention and support Americans give to an issue is in direct

  20. "Choice Set" for health behavior in choice-constrained settings to frame research and inform policy: examples of food consumption, obesity and food security.

    PubMed

    Dover, Robert V H; Lambert, Estelle V

    2016-03-16

    Using the nexus between food consumption, food security and obesity, this paper addresses the complexity of health behavior decision-making moments that reflect relational social dynamics in context-specific dialogues, often in choice-constrained conditions. A pragmatic review of literature regarding social determinants of health in relation to food consumption, food security and obesity was used to advance this theoretical model. We suggest that health choice, such as food consumption, is based on more than the capacity and volition of individuals to make "healthy" choices, but is dialogic and adaptive. In terms of food consumption, there will always be choice-constrained conditions, along a continuum representing factors over which the individual has little or no control, to those for which they have greater agency. These range from food store geographies and inventories and food availability, logistical considerations such as transportation, food distribution, the structure of equity in food systems, state and non-government food and nutrition programs, to factors where the individual exercises a greater degree of autonomy, such as sociocultural foodways, family and neighborhood shopping strategies, and personal and family food preferences. At any given food decision-making moment, many factors of the continuum are present consciously or unconsciously when the individual makes a decision. These health behavior decision-making moments are mutable, whether from an individual perspective, or within a broader social or policy context. We review the construct of "choice set", the confluence of factors that are temporally weighted by the differentiated and relationally-contextualized importance of certain factors over others in that moment. The choice transition represents an essential shift of the choice set based on the conscious and unconscious weighting of accumulated evidence, such that people can project certain outcomes. Policies and interventions should avoid dichotomies of "good and bad" food choices or health behaviors, but focus on those issues that contribute to the weightedness of factors influencing food choice behavior at a given decision-making moment and within a given choice set.

  1. 76 FR 79275 - Truth in Savings (Regulation DD)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-21

    ... disclosure. Sensitive personal information, such as account numbers or social security numbers, should not be... improved, and consumers' ability to make informed decisions regarding deposit accounts would be... regulations, while making information on the other regulations available. The Bureau expects to conduct...

  2. 10 CFR 710.22 - Initial decision process.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ...) The Manager shall make an initial decision as to the individual's access authorization eligibility... Officer refers the individual's case to the Manager in accordance with § 710.25(e) or § 710.26(b). (b) Unless an extension of time is granted by the Director, Office of Personnel Security, DOE Headquarters...

  3. 10 CFR 710.22 - Initial decision process.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) The Manager shall make an initial decision as to the individual's access authorization eligibility... Administrative Judge refers the individual's case to the Manager in accordance with § 710.25(e) or § 710.26(b). (b) Unless an extension of time is granted by the Director, Office of Personnel Security, DOE...

  4. 10 CFR 710.22 - Initial decision process.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) The Manager shall make an initial decision as to the individual's access authorization eligibility... Officer refers the individual's case to the Manager in accordance with § 710.25(e) or § 710.26(b). (b) Unless an extension of time is granted by the Director, Office of Personnel Security, DOE Headquarters...

  5. 10 CFR 710.22 - Initial decision process.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) The Manager shall make an initial decision as to the individual's access authorization eligibility... Officer refers the individual's case to the Manager in accordance with § 710.25(e) or § 710.26(b). (b) Unless an extension of time is granted by the Director, Office of Personnel Security, DOE Headquarters...

  6. 75 FR 51864 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ... decisions. Data elements with respect to the SHORT subscription service that would be provided through the... information about technical data elements to support transmission and data-integrity processes between the... for making well-informed investment decisions. Broad access to the information collected by the SHORT...

  7. Securing clean water: A secret to success

    Treesearch

    Michael Somerville; Dino DeSimone

    2000-01-01

    Securing clean water is a primary goal for many agencies, organizations, and concerned citizens. To achieve that goal, agencies have traditionally taken a mostly regulatory approach. In recent years, however, a major trend in government has been to move decision-making and action-taking to the local level. Conservation Districts, watershed organizations, and other...

  8. Reflective practices at the Security Council: Children and armed conflict and the three United Nations

    PubMed Central

    Bode, Ingvild

    2017-01-01

    The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted. PMID:29782586

  9. Reflective practices at the Security Council: Children and armed conflict and the three United Nations.

    PubMed

    Bode, Ingvild

    2018-06-01

    The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted.

  10. Exploring Hospice Decisions: The Road from the Institute on Aging and Social Work to an ARRA Challenge Grant

    ERIC Educational Resources Information Center

    Waldrop, Deborah

    2014-01-01

    Decisions about treatment and options for care at the end stage of an advanced chronic illness are important determinants of the quality of a person's death and of how family members adapt in bereavement. This article describes the steps taken to secure federal funding to study how people make the decision to enroll in hospice. The National…

  11. Labor Market Information and Career Decision Making. ERIC Digest No. 83.

    ERIC Educational Resources Information Center

    Imel, Susan; Kerka, Sandra

    Labor market information (LMI) describes the interaction between occupations and employers. Three major components make up LMI: economic or labor force information, occupational information, and demographic information. Various agencies, including federal departments and state employment security agencies, compile LMI. A guide to the information…

  12. Framing a South Africa Policy Statement

    ERIC Educational Resources Information Center

    Murray, Roger F.

    1978-01-01

    A model position statement for the college trustee is presented that deals with the management of and decision-making for corporate equity securities. Neither selling the stock nor leaving decisions on social issues, such as the apartheid one, to corporate management is seen as a satisfactory alternative. Adoption of a position statement can guide…

  13. 17 CFR Appendix A to Part 420 - Separate Reporting Entity

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... reporting rules; (3) Decisions related to the purchase, sale or retention of Treasury securities must be made by employees of such entity(ies). Employees of such entity(ies) who make decisions to purchase or...) The records of such entity(ies) related to the ownership, financing, purchase and sale of Treasury...

  14. 75 FR 32840 - Securities Offering Disclosures

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-09

    ... make an informed investment decision regarding a possible purchase or sale of a savings association's... control number. As part of the approval process, we invite comments on the following information...

  15. Automated power management and control

    NASA Technical Reports Server (NTRS)

    Dolce, James L.

    1991-01-01

    A comprehensive automation design is being developed for Space Station Freedom's electric power system. A joint effort between NASA's Office of Aeronautics and Exploration Technology and NASA's Office of Space Station Freedom, it strives to increase station productivity by applying expert systems and conventional algorithms to automate power system operation. The initial station operation will use ground-based dispatches to perform the necessary command and control tasks. These tasks constitute planning and decision-making activities that strive to eliminate unplanned outages. We perceive an opportunity to help these dispatchers make fast and consistent on-line decisions by automating three key tasks: failure detection and diagnosis, resource scheduling, and security analysis. Expert systems will be used for the diagnostics and for the security analysis; conventional algorithms will be used for the resource scheduling.

  16. 78 FR 55657 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security Transportation...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ... making a final eligibility decision, TSA will advise the applicant that the FBI criminal record discloses... maintain the element of unpredictability for security purposes. Accordingly, persons who have been enrolled... processes, the applicable exemptions may be waived on a case-by-case basis. A notice of system of records...

  17. 75 FR 4498 - Control and Affiliation for Purposes of Market-Based Rate Requirements Under Section 205 of the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-28

    ... decision- making over sales of electric energy. 16. American Public Power Association (APPA) and National... securities of a public utility. Specifically, the Commission proposes to amend Part 33 of its regulations to... than 20 percent, of the outstanding voting securities of a public utility or holding company, where the...

  18. 20 CFR 416.556 - Waiver of adjustment or recovery-countable resources in excess of the limits prescribed in § 416...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... recovery of the subsequent overpayment. In making any determination or decision under this section... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Waiver of adjustment or recovery-countable... Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND...

  19. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods

    PubMed Central

    Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman

    2017-01-01

    Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users’ security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users’ behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals’ awareness of the consequences of security threats. By comparing participants’ behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users’ security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones. PMID:28297719

  20. Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods.

    PubMed

    Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman

    2017-01-01

    Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users' security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users' behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals' awareness of the consequences of security threats. By comparing participants' behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users' security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones.

  1. Practice brief. Securing wireless technology for healthcare.

    PubMed

    Retterer, John; Casto, Brian W

    2004-05-01

    Wireless networking can be a very complex science, requiring an understanding of physics and the electromagnetic spectrum. While the radio theory behind the technology can be challenging, a basic understanding of wireless networking can be sufficient for small-scale deployment. Numerous security mechanisms are available to wireless technologies, making it practical, scalable, and affordable for healthcare organizations. The decision on the selected security model should take into account the needs for additional server hardware and administrative costs. Where wide area network connections exist between cooperative organizations, deployment of a distributed security model can be considered to reduce administrative overhead. The wireless approach chosen should be dynamic and concentrate on the organization's specific environmental needs. Aspects of organizational mission, operations, service level, and budget allotment as well as an organization's risk tolerance are all part of the balance in the decision to deploy wireless technology.

  2. Integration of Dynamic Models in Range Operations

    NASA Technical Reports Server (NTRS)

    Bardina, Jorge; Thirumalainambi, Rajkumar

    2004-01-01

    This work addresses the various model interactions in real-time to make an efficient internet based decision making tool for Shuttle launch. The decision making tool depends on the launch commit criteria coupled with physical models. Dynamic interaction between a wide variety of simulation applications and techniques, embedded algorithms, and data visualizations are needed to exploit the full potential of modeling and simulation. This paper also discusses in depth details of web based 3-D graphics and applications to range safety. The advantages of this dynamic model integration are secure accessibility and distribution of real time information to other NASA centers.

  3. 17 CFR 240.10b5-1 - Trading “on the basis of” material nonpublic information in insider trading cases.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... nonpublic information if the person demonstrates that: (i) The individual making the investment decision on... the basis of” material nonpublic information about that security or issuer if the person making the... or sale is not “on the basis of” material nonpublic information if the person making the purchase or...

  4. Efficient Aviation Security: Strengthening the Analytic Foundation for Making Air Transportation Security Decisions

    DTIC Science & Technology

    2012-01-01

    Martin B. Zimmerman, “Market Incentives for Safe Commercial Airline Operation,” American Economic Review, Vol. 78, No. 5, 1988, pp. 913–935. Bosch...Modeling,” in Stuart Johnson, Martin C. Libicki, and Gregory F. Treverton, eds., New Challenges, New Tools for Defense Decisionmaking, Santa Monica, Calif...677–725. Persico, Nicola, and Petra E. Todd, “Passenger Profiling, Imperfect Screening, and Airport Security,” American Economic Review, Vol. 95

  5. Food Security as a Constraint on National Policy Decision Making in the Arab Region: A Case Study on Food Security in Sudan

    DTIC Science & Technology

    2009-04-17

    12 Food Shortage alld The Killg of Egypt Visioll ----------------------------------------------------------- 13 Arab Security Gap ...intervention widened the gap in the value of food commodities in the Arab countries among investors and farmers. 5. Reduction in food production due to drought...seeds and also conduct pre-harvest crop assessments to identify agricultural and livestock gaps among the Sudanese2o. On the other hand, the UN

  6. 78 FR 4079 - Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security U.S. Customs...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-18

    ... #0;notices is to give interested persons an opportunity to participate in #0;the rule making prior to... number references to law enforcement databases used to support or deny the membership decision for GES trusted traveler programs, as well as the membership decision for trusted traveler programs with foreign...

  7. Current Scientific Approaches to Decision Making in Complex Systems: 3. Volume 1. Conference Proceedings. Third Conference, Richmond, Surrey, England, 6-8 August 1978

    DTIC Science & Technology

    1980-01-01

    filter and select out. You use your nose - or heuristics. That is just maturity. The only thing we can do is help people discuss possible models of their...Decision models / Conversation Theory Decision training Team decisions Man-computer interaction Learning strategies 2& ANTAACT (Cme1 revere le N nneesmod...paper by Maria Novakowska on a new model of decision under risk. , /V TI I~ 4 A SECURITY CLASSIFICATION OF TIS PAOUI(Ves Date EntetQ ii ,ln 1 to hi

  8. Adolescent pediatric decision-making: a critical reconsideration in the light of the data.

    PubMed

    Partridge, Brian

    2014-12-01

    Adolescents present a puzzle. There are foundational unclarities about how they should be regarded as decision-makers. Although superficially adolescents may appear to have mature decisional capacity, their decision-making is in many ways unlike that of adults. Despite this seemingly obvious fact, a concern for the claims of autonomy has led to the development of the legal doctrine of the mature minor. This legal construct considers adolescents, as far as possible, as equivalent to adults for the purpose of medical decision-making. The movement to support independent decision-making by adolescents through providing information to them and securing their consent apart from their parents is encouraged by those legal understandings that hold that unemancipated minors should generally be considered as possessing effective decisional capacity. Such legal structures, however, do not adequately take account of the wide variations in adolescent capacities, the immaturity of most adolescent decision-makers, or the important contributions made by parents to the development of their adolescents through parental partnering in the adolescent's decision-making. The data available indicate that in general adolescents should be regarded as apprentice decision-makers who should make decisions in collaboration with their parents until at least the age of 18. Steps should not be taken pre-emptively to isolate adolescents from the guidance of their parents. As a general rule, what Piker has referred to as "collaborative paternalism" appears most likely both to protect adolescents from their own untoward choices, while also very importantly helping them with parental guidance to develop into mature decision-makers with the capacity to make medical choices on their own.

  9. Informed use of patients' records on trusted health care services.

    PubMed

    Sahama, Tony; Miller, Evonne

    2011-01-01

    Health care is an information-intensive business. Sharing information in health care processes is a smart use of data enabling informed decision-making whilst ensuring. the privacy and security of patient information. To achieve this, we propose data encryption techniques embedded Information Accountability Framework (IAF) that establishes transitions of the technological concept, thus enabling understanding of shared responsibility, accessibility, and efficient cost effective informed decisions between health care professionals and patients. The IAF results reveal possibilities of efficient informed medical decision making and minimisation of medical errors. Of achieving this will require significant cultural changes and research synergies to ensure the sustainability, acceptability and durability of the IAF.

  10. The Development Function in the 1970's.

    ERIC Educational Resources Information Center

    Frantzreb, Arthur C.

    The development function of the 1970's is seen as a test of the management skills of policy-making trustees, decision-making administrators and sales management development officers to plan for and secure financial resources from constituents buffeted by new issues and new forces in American society, in the economy, and in the educational system.…

  11. Patients' experiences of communication and involvement in decision-making about atrial fibrillation treatment in consultations with nurses and physicians.

    PubMed

    Siouta, Eleni; Hellström Muhli, Ulla; Hedberg, Berith; Broström, Anders; Fossum, Bjöörn; Karlgren, Klas

    2016-09-01

    Insights in consultations across patient interactions with physicians and nurses are of vital importance for strengthening the patients' involvement in the treatment decision-making process. The experience of involvement and communication in decision-making from the patients' perspective has been sparsely explored. To examine how patients describe involvement in and communication about decision-making regarding treatment in consultations with nurses and physicians. Twenty-two patients with atrial fibrillation (AF), aged 37-90 years, were interviewed directly after their consultations with nurses and physicians in outpatient AF clinics in six Swedish hospitals. In consultations with nurses, the patients felt involved when obtaining clarifications about AF as a disease and its treatment and when preparing for and building up confidence in decision-making. In consultations with physicians, the patients felt involved when they could cooperate in decision-making, when acquiring knowledge, and when they felt that they were being understood. One shared category was found in consultations with both nurses and physicians, and the patients felt involved when they had a sense of trust and felt secure during and between consultations. Patients with AF stated that they would need to acquire knowledge and build up confidence and ability in order to be effectively involved in the decision-making about treatment. Despite not being actively involved in decision-making, patients felt involved through experiencing supportive and confirming communication. Attention must be given to the relationship with the patient to create the conditions for patient involvement in the consultation. This can be achieved through supportive communication attempting to create a feeling of clarity and building confidence. This will support involvement in decision-making concerning AF treatment and feelings of being understood and of trust in physicians and/or nurses. © 2015 Nordic College of Caring Science.

  12. Making Decisions about U.S.-Japan Security Relations: Toward a Limited Forward-Deployment in the 21st Century

    DTIC Science & Technology

    1998-12-01

    conflict. In June 1994, well before the Nye report, the Japanese military analyst Shunji Taoka concluded that the DPRK was producing only sixty percent... Shunji , "The Japanese-American Security Treaty Without a U.S. Military Presence," Japan Policy Research Institute Working Paper No. 31, March 1997, 3...Strategy in Northeast Asia," Masters Thesis, Naval Postgraduate School, December 1994, 43. 62 Taoka, Shunji , "The Japanese-American Security Treaty

  13. Framework for Managing Metadata Security Tags as the Basis for Making Security Decisions.

    DTIC Science & Technology

    2002-12-01

    and Performance,” D.H. Associates, Inc., Sep 2001. [3] Deitel , H. M., and Deitel , P. J., Java How to Program , 3rd Edition, Prentice Hall Inc...1999. [4] Deitel , H. M., Deitel , P. J., and Nieto, T. R., Internet and The World Wide Web: How to Program , 2nd Edition, 2002. [5] Grohn, M. J., A...words) This thesis presents an analysis of a capability to employ CAPCO (Controlled Access Program Coordination Office) compliant Metadata security

  14. People, Process, and Policy: Case Studies in National Security Advising, the National Security Council, and Presidential Decision Making

    DTIC Science & Technology

    2017-06-01

    processes. Rothkopf, David J. 2006. Running the World: The Inside Story of The National Security Council and The Architects of American Power . 1st ed...recognized Soviet aims. They aimed to gain power , spread communism, and counter the West. Eisenhower’s belief in American physical and ideological...The Architects of American Power . 1st ed. New York: Public Affairs: 322-324. 22 Burke, Honest Broker?, 341. 23 U.N. Ambassador Albright, Treasury

  15. 20 CFR 401.70 - Appeals of refusals to correct records or refusals to allow access to records.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... explaining the decision on your appeal. The time limit for making our decision after we receive your appeal... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Appeals of refusals to correct records or refusals to allow access to records. 401.70 Section 401.70 Employees' Benefits SOCIAL SECURITY...

  16. Exploring the Lack of Interoperability of Databases within Department of Homeland Security Interagency Environment Concerning Maritime Port Security

    DTIC Science & Technology

    2009-03-01

    37 Figure 8 New Information Sharing Model from United States Intelligence Community Information Sharing...PRIDE while the Coast Guard has MISSLE and the newly constructed WATCHKEEPER. All these databases contain intelligence on incoming vessels...decisions making. Experts rely heavily on future projections as hallmarks of skilled performance." (Endsley et al. 2006) The SA model above

  17. Risk Assessment Methodology Based on the NISTIR 7628 Guidelines

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R

    2013-01-01

    Earlier work describes computational models of critical infrastructure that allow an analyst to estimate the security of a system in terms of the impact of loss per stakeholder resulting from security breakdowns. Here, we consider how to identify, monitor and estimate risk impact and probability for different smart grid stakeholders. Our constructive method leverages currently available standards and defined failure scenarios. We utilize the National Institute of Standards and Technology (NIST) Interagency or Internal Reports (NISTIR) 7628 as a basis to apply Cyberspace Security Econometrics system (CSES) for comparing design principles and courses of action in making security-related decisions.

  18. Providing and Funding Financial Literacy Programs for Low Income Adults and Youth. Strategy Brief

    ERIC Educational Resources Information Center

    Friedman, Pamela

    2005-01-01

    Making effective financial decisions and knowing how to manage money are skills critical to enjoying a secure financial future. Yet many individuals and families lack the knowledge necessary to make sound financial choices, as evidenced by falling savings rates, mounting consumer debt, and a growing dependence on alternative banking institutions.…

  19. Learning consensus in adversarial environments

    NASA Astrophysics Data System (ADS)

    Vamvoudakis, Kyriakos G.; García Carrillo, Luis R.; Hespanha, João. P.

    2013-05-01

    This work presents a game theory-based consensus problem for leaderless multi-agent systems in the presence of adversarial inputs that are introducing disturbance to the dynamics. Given the presence of enemy components and the possibility of malicious cyber attacks compromising the security of networked teams, a position agreement must be reached by the networked mobile team based on environmental changes. The problem is addressed under a distributed decision making framework that is robust to possible cyber attacks, which has an advantage over centralized decision making in the sense that a decision maker is not required to access information from all the other decision makers. The proposed framework derives three tuning laws for every agent; one associated with the cost, one associated with the controller, and one with the adversarial input.

  20. Multicriteria Selection of Optimal Location of TCSC in a Competitive Energy Market

    NASA Astrophysics Data System (ADS)

    Alomoush, Muwaffaq I.

    2010-05-01

    The paper investigates selection of the best location of thyristor-controlled series compensator (TCSC) in a transmission system from many candidate locations in a competitive energy market such that the TCSC causes a net valuable impact on congestion management outcome, transmission utilization, transmission losses, voltage stability, degree of fulfillment of spot market contracts, and system security. The problem is treated as a multicriteria decision-making process such that the candidate locations of TCSC are the alternatives and the conflicting objectives are the outcomes of the dispatch process, which may have different importance weights. The paper proposes some performance indices that the dispatch decision-making entity can use to measure market dispatch outcomes of each alternative. Based on agreed-upon preferences, the measures presented may help the decision maker compare and rank dispatch scenarios to ultimately decide which location is the optimal one. To solve the multicriteria decision, we use the preference ranking organization method for enrichment evaluations (PROMETHEE), which is a multicriteria decision support method that can handle complex conflicting-objective decision-making processes.

  1. A Novel Group Decision-Making Method Based on Sensor Data and Fuzzy Information.

    PubMed

    Bai, Yu-Ting; Zhang, Bai-Hai; Wang, Xiao-Yi; Jin, Xue-Bo; Xu, Ji-Ping; Su, Ting-Li; Wang, Zhao-Yang

    2016-10-28

    Algal bloom is a typical phenomenon of the eutrophication of rivers and lakes and makes the water dirty and smelly. It is a serious threat to water security and public health. Most scholars studying solutions for this pollution have studied the principles of remediation approaches, but few have studied the decision-making and selection of the approaches. Existing research uses simplex decision-making information which is highly subjective and uses little of the data from water quality sensors. To utilize these data and solve the rational decision-making problem, a novel group decision-making method is proposed using the sensor data with fuzzy evaluation information. Firstly, the optimal similarity aggregation model of group opinions is built based on the modified similarity measurement of Vague values. Secondly, the approaches' ability to improve the water quality indexes is expressed using Vague evaluation methods. Thirdly, the water quality sensor data are analyzed to match the features of the alternative approaches with grey relational degrees. This allows the best remediation approach to be selected to meet the current water status. Finally, the selection model is applied to the remediation of algal bloom in lakes. The results show this method's rationality and feasibility when using different data from different sources.

  2. Windows of Opportunity: East Timor and Australian Strategic Decision Making (1975-1999)

    DTIC Science & Technology

    2014-06-01

    could not be further from the truth. Australia has always been consistent, adjusting its foreign policy to take advantage of shifting international ... International Security. Cambridge; New York: Cambridge University Press, 2003. Carey, P. B. R, and G. Carter Bentley. East Timor at the Crossroads: The...DISTRIBUTION A. Approved for public release: distribution unlimited. WINDOWS OF OPPORTUNITY: EAST TIMOR AND AUSTRALIAN STRATEGIC DECISION

  3. Women’s Role in Disaster Management and Implications for National Security

    DTIC Science & Technology

    2017-07-11

    management policies, plans and decision making processes,” available at http://www.unisdr.org/we/ inform /publications/1037. Beijing Agenda for Global...1 WOMEN’S ROLE IN DISASTER MANAGEMENT AND IMPLICATIONS FOR NATIONAL SECURITY By Jessica Ear Introduction Disasters are increasing in...frequency and intensity. For those lacking control and access to services and resources such as education and information , disaster risks are even

  4. When Information Improves Information Security

    NASA Astrophysics Data System (ADS)

    Grossklags, Jens; Johnson, Benjamin; Christin, Nicolas

    This paper presents a formal, quantitative evaluation of the impact of bounded-rational security decision-making subject to limited information and externalities. We investigate a mixed economy of an individual rational expert and several naïve near-sighted agents. We further model three canonical types of negative externalities (weakest-link, best shot and total effort), and study the impact of two information regimes on the threat level agents are facing.

  5. A quantitative risk-based model for reasoning over critical system properties

    NASA Technical Reports Server (NTRS)

    Feather, M. S.

    2002-01-01

    This position paper suggests the use of a quantitative risk-based model to help support reeasoning and decision making that spans many of the critical properties such as security, safety, survivability, fault tolerance, and real-time.

  6. [Structural elements of critical thinking of nurses in emergency care].

    PubMed

    Crossetti, Maria da Graça Oliveira; Bittencourt, Greicy Kelly Gouveia Dias; Lima, Ana Amélia Antunes; de Góes, Marta Georgina Oliveira; Saurin, Gislaine

    2014-09-01

    The objective of this study was to analyze the structural elements of critical thinking (CT) of nurses in the clinical decision-making process. This exploratory, qualitative study was conducted with 20 emergency care nurses in three hospitals in southern Brazil. Data were collected from April to June 2009, and a validated clinical case was applied from which nurses listed health problems, prescribed care and listed the structural elements of CT. Content analysis resulted in categories used to determine priority structural elements of CT, namely theoretical foundations and practical relationship to clinical decision making; technical and scientific knowledge and clinical experience, thought processes and clinical decision making: clinical reasoning and basis for clinical judgments of nurses: patient assessment and ethics. It was concluded that thinking critically is a skill that enables implementation of a secure and effective nursing care process.

  7. Financial literacy: Do people know the ABCs of finance?

    PubMed

    Lusardi, Annamaria

    2015-04-01

    Increasingly, individuals are in charge of their own financial security and are confronted with ever more complex financial instruments. However, there is evidence that many individuals are not well-equipped to make sound saving decisions. This article looks at financial literacy, which is defined as the ability to process economic information and make informed decisions about financial planning, wealth accumulation, debt, and pensions. Failure to plan for retirement, lack of participation in the stock market, and poor borrowing behavior can all be linked to ignorance of basic financial concepts. Financial literacy impacts financial decision making, with implications that apply to individuals, communities, countries, and society as a whole. Given the lack of financial literacy among the population, it may be important to remedy it by adding financial literacy to the school curriculum. © The Author(s) 2015.

  8. The Intersection of National Security and Climate Change

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hund, Gretchen; Fankhauser, Jana G.; Kurzrok, Andrew J.

    On June 4, 2014, the Henry M. Jackson Foundation and the Pacific Northwest National Laboratory hosted a groundbreaking symposium in Seattle, Washington, that brought together 36 leaders from federal agencies, state and local governments, NGOs, business, and academia. The participants examined approaches and tools to help decision makers make informed choices about the climate and security risks they face. The following executive summary is based on the day’s discussions and examines the problem of climate change and its impact on national security, the responses to date, and future considerations.

  9. The appropriate and effective use of security technologies in U.S. schools : a guide for schools and law enforcement agencies.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Green, Mary Wilson

    The purpose of this report is to provide school administrators with the ability to determine their security system requirements, so they can make informed decisions when working with vendors and others to improve their security posture. This is accomplished by (1) explaining a systems-based approach to defining the objectives and needs of the system, and (2), providing information on the ability of common components (sensors, cameras, metal detectors, etc) to achieve those objectives, in an effectively integrated system.

  10. Prioritization of information using decision support systems for seismic risk in Bucharest city

    NASA Astrophysics Data System (ADS)

    Armas, Iuliana; Gheorghe, Diana

    2014-05-01

    Nowadays, because of the ever increasing volume of information, policymakers are faced with decision making problems. Achieving an objective and suitable decision making may become a challenge. In such situations decision support systems (DSS) have been developed. DSS can assist in the decision making process, offering support on how a decision should be made, rather than what decision should be made (Simon, 1979). This in turn potentially involves a huge number of stakeholders and criteria. Regarding seismic risk, Bucharest City is highly vulnerable (Mandrescu et al., 2007). The aim of this study is to implement a spatial decision support system in order to secure a suitable shelter in case of an earthquake occurrence in the historical centre of Bucharest City. In case of a seismic risk, a shelter is essential for sheltering people who lost their homes or whose homes are in danger of collapsing while people at risk receive first aid in the post-disaster phase. For the present study, the SMCE Module for ILWIS 3.4 was used. The methodology included structuring the problem by creating a decision tree, standardizing and weighting of the criteria. The results showed that the most suitable buildings are Tania Hotel, Hanul lui Manuc, The National Bank of Romania, The Romanian Commercial Bank and The National History Museum.

  11. 44 CFR 352.1 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... boundaries. (q) Command and control means making and issuing protective action decisions and directing... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Definitions. 352.1 Section... SECURITY PREPAREDNESS COMMERCIAL NUCLEAR POWER PLANTS: EMERGENCY PREPAREDNESS PLANNING § 352.1 Definitions...

  12. Homeland Security Intelligence: To What End

    DTIC Science & Technology

    2010-09-01

    decision making is generous (Treverton & Gabbard , 2008; Reveron 2007). This literature commonly falls into roughly one of two categories, 1) the...Treverton, G.F. & Gabbard , C.B. (2008). Assessing the tradecraft of intelligence analysis. Arlington VA: RAND. Turner, M. (2005). Why secret intelligence

  13. Technology and Ethics.

    ERIC Educational Resources Information Center

    Brown, Joan Marie

    1997-01-01

    Describes four open-ended activities for students in grades 4-12 designed to encourage thought, discussion, and decision making in classes dealing with issues in ethics and technology. Provides teacher directions, describes activities, and outlines debriefing sessions for lessons in copyright infringement, network security, artificial…

  14. Collaborative Policy Making: Vertical Integration in The Homeland Security Enterprise

    DTIC Science & Technology

    2011-12-01

    NEMA ), • International Association Emergency Managers (IAEM), • National Association of Chiefs of Police, International Association of...on application of normative principles to the facts and evidence accumulated by decision makers—and will show why other alternative courses of

  15. Ethical Decision-Making for Homeland Security

    DTIC Science & Technology

    2013-09-01

    how the universal laws of an ideal state could reconcile the interests of both individuals and groups . Cohen’s emphasis on the universal character...unethical decision as an ethical one . Excellence was another personal trait, listed 12 times in the surveyed group . This is another good quality for...and improve the ethical climate of leadership and groups . A booklet or field guide for employees on ethics would be a good opportunity for the

  16. Administrative review process for adjudicating initial disability claims. Final rule.

    PubMed

    2006-03-31

    The Social Security Administration is committed to providing the high quality of service the American people expect and deserve. In light of the significant growth in the number of disability claims and the increased complexity of those claims, the need to make substantial changes in our disability determination process has become urgent. We are publishing a final rule that amends our administrative review process for applications for benefits that are based on whether you are disabled under title II of the Social Security Act (the Act), or applications for supplemental security income (SSI) payments that are based on whether you are disabled or blind under title XVI of the Act. We expect that this final rule will improve the accuracy, consistency, and timeliness of decision-making throughout the disability determination process.

  17. A Comparison of Tactical Leader Decision Making Between Automated and Live Counterparts in a Virtual Environment

    DTIC Science & Technology

    2014-06-01

    Scott A. Patton June 2014 Thesis Advisor: Quinn Kennedy Second Reader: Jonathan Alt THIS PAGE INTENTIONALLY LEFT BLANK i REPORT...DOCUMENTATION PAGE Form Approved OMB No. 0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response...Robotic Integration 15. NUMBER OF PAGES 119 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF

  18. Technosocial Predictive Analytics in Support of Naturalistic Decision Making

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sanfilippo, Antonio P.; Cowell, Andrew J.; Malone, Elizabeth L.

    2009-06-23

    A main challenge we face in fostering sustainable growth is to anticipate outcomes through predictive and proactive across domains as diverse as energy, security, the environment, health and finance in order to maximize opportunities, influence outcomes and counter adversities. The goal of this paper is to present new methods for anticipatory analytical thinking which address this challenge through the development of a multi-perspective approach to predictive modeling as a core to a creative decision making process. This approach is uniquely multidisciplinary in that it strives to create decision advantage through the integration of human and physical models, and leverages knowledgemore » management and visual analytics to support creative thinking by facilitating the achievement of interoperable knowledge inputs and enhancing the user’s cognitive access. We describe a prototype system which implements this approach and exemplify its functionality with reference to a use case in which predictive modeling is paired with analytic gaming to support collaborative decision-making in the domain of agricultural land management.« less

  19. Developmental reversals in risky decision making: intelligence agents show larger decision biases than college students.

    PubMed

    Reyna, Valerie F; Chick, Christina F; Corbin, Jonathan C; Hsia, Andrew N

    2014-01-01

    Intelligence agents make risky decisions routinely, with serious consequences for national security. Although common sense and most theories imply that experienced intelligence professionals should be less prone to irrational inconsistencies than college students, we show the opposite. Moreover, the growth of experience-based intuition predicts this developmental reversal. We presented intelligence agents, college students, and postcollege adults with 30 risky-choice problems in gain and loss frames and then compared the three groups' decisions. The agents not only exhibited larger framing biases than the students, but also were more confident in their decisions. The postcollege adults (who were selected to be similar to the students) occupied an interesting middle ground, being generally as biased as the students (sometimes more biased) but less biased than the agents. An experimental manipulation testing an explanation for these effects, derived from fuzzy-trace theory, made the students look as biased as the agents. These results show that, although framing biases are irrational (because equivalent outcomes are treated differently), they are the ironical output of cognitively advanced mechanisms of meaning making.

  20. 75 FR 33682 - Export Administration Regulations; Technical Amendments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-15

    ...-01] RIN 0694-AE93 Export Administration Regulations; Technical Amendments AGENCY: Bureau of Industry... Bureau of Industry and Security (BIS) makes a technical amendment to the Export Administration... review of final decisions and orders issued in BIS export control administrative enforcement proceedings...

  1. Team of Advisors: The Social Science of Advice in Homeland and National Security

    DTIC Science & Technology

    2017-03-01

    terrorism- shape -attitudes-toward- policies. Walcott, Charles E., Shirley Anne Warshaw, and Stephen J . Wayne. “The Chief of Staff.” Presidential...4 C . PROBLEM STATEMENT .......................................................................4 D. RESEARCH QUESTION...7 B. HOW LEADERS MAKE DECISIONS ...................................................8 C

  2. 32 CFR 806.5 - Responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... to the Director, Freedom of Information and Security Review (DFOISR), and provides guidance and instructions to MAJCOMs. Responsibilities of other Air Force elements follow. (b) SAF/GCA makes final decisions... Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ADMINISTRATION AIR FORCE FREEDOM OF...

  3. U.S National cropland soil moisture monitoring using SMAP

    USDA-ARS?s Scientific Manuscript database

    Crop condition information is critical for public and private sector decision making that concerns agricultural policy, food production, food security, and food commodity prices. Crop conditions change quickly due to various growing condition events, such as temperature extremes, soil moisture defic...

  4. 20 CFR 405.360 - Official record.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... in making the decision under review and any additional evidence or written statements that the... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Official record. 405.360 Section 405.360 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING INITIAL...

  5. Securing Your Legacy

    ERIC Educational Resources Information Center

    Valeau, Edward

    2009-01-01

    In this article, the author, a former college president, reflects on his career and the challenges of retirement. He shares his experience from career preparation to on-the-job training to succession planning. The author stresses that the decisions college presidents make define the legacies they leave.

  6. Support Tool in the Diagnosis of Major Depressive Disorder

    NASA Astrophysics Data System (ADS)

    Nunes, Luciano Comin; Pinheiro, Plácido Rogério; Pequeno, Tarcísio Cavalcante; Pinheiro, Mirian Calíope Dantas

    Major Depressive Disorder have been responsible for millions of professionals temporary removal, and even permanent, from diverse fields of activities around the world, generating damage to social, financial, productive systems and social security, and especially damage to the image of the individual and his family that these disorders produce in individuals who are patients, characteristics that make them stigmatized and discriminated into their society, making difficult their return to the production system. The lack of early diagnosis has provided reactive and late measures, only when the professional suffering psychological disorder is already showing signs of incapacity for working and social relationships. This article aims to assist in the decision making to establish early diagnosis of these types of psychological disorders. It presents a proposal for a hybrid model composed of expert system structured methodologies for decision support (Multi-Criteria Decision Analysis - MCDA) and representations of knowledge structured in logical rules of production and probabilities (Artificial Intelligence - AI).

  7. CrossTalk: The Journal of Defense Software Engineering. Volume 21, Number 3

    DTIC Science & Technology

    2008-03-01

    describes essentials for requirements development and management. In addi- tion to providing training, eLearning and consulting services, she speaks at and...information, support sense- making, enable collaborative decision making, and effect changes in the physical environment. For example, the Global ...across layers, which enables effective use of resources and helps enforce security and confiden- tiality policies. Global Data Space DDS provides a

  8. Operation Husky: Seeking an Operational Approach to Decisive Victory

    DTIC Science & Technology

    2014-05-22

    Wilt, War From the Top: German and British Military Decision Making during World War II (Bloomington: Indiana University Press, 1990), 198. 7Ibid...primary objectives. On D-Day, three British divisions would land on the southeast corner of the island and secure the ports of Syracuse and Augusta ...15 line of Syracuse - Palazzolo - Ragusa, gain contact with Force 343, and then move to capture the port of Augusta , the port of Catania, and the

  9. Exploring key factors in online shopping with a hybrid model.

    PubMed

    Chen, Hsiao-Ming; Wu, Chia-Huei; Tsai, Sang-Bing; Yu, Jian; Wang, Jiangtao; Zheng, Yuxiang

    2016-01-01

    Nowadays, the web increasingly influences retail sales. An in-depth analysis of consumer decision-making in the context of e-business has become an important issue for internet vendors. However, factors affecting e-business are complicated and intertwined. To stimulate online sales, understanding key influential factors and causal relationships among the factors is important. To gain more insights into this issue, this paper introduces a hybrid method, which combines the Decision Making Trial and Evaluation Laboratory (DEMATEL) with the analytic network process, called DANP method, to find out the driving factors that influence the online business mostly. By DEMATEL approach the causal graph showed that "online service" dimension has the highest degree of direct impact on other dimensions; thus, the internet vendor is suggested to made strong efforts on service quality throughout the online shopping process. In addition, the study adopted DANP to measure the importance of key factors, among which "transaction security" proves to be the most important criterion. Hence, transaction security should be treated with top priority to boost the online businesses. From our study with DANP approach, the comprehensive information can be visually detected so that the decision makers can spotlight on the root causes to develop effectual actions.

  10. [Vertical integration and contracting-out in generic hospital services in Spain].

    PubMed

    Puig-Junoy, J; Pérez-Sust, P

    2002-01-01

    This study examines the factors that influence make or buy decisions corresponding to four generic services (housekeeping, laundry, food services, and maintenance and security) in Spanish hospitals (3,160 transactions in 790 hospitals). The empirical estimation of a logistic model based on hospital utility maximization is presented. Factors included in the model are not only those related to transaction costs, but also those related to public intervention and the political dimension. A total of 55.7% of hospitals contracted-out at least one of the generic services. The services most frequently contracted-out were housekeeping and maintenance and security(45.1 and 32.5%, respectively). In contrast, the services (94.3% and 80.1%, respectively). Hospital size (economies of scale), measured by the number of beds, was one of the most important factors influencing make or buy decisions. We find evidence that economies of scale are related to a higher level of vertical integration, while specialization and for-profit objectives favor the decision to contract-out. The choice of organizational model for laundry services presents a different pattern from that of the other three services. Empirical results show that some asset specificity could be present in laundry services.

  11. Learning to See the Opportunities in Crisis and Catastrophe: A Decision Makers Guide to the Issue-Attention Cycle

    DTIC Science & Technology

    2015-09-01

    riots, Ferguson riots, AIDS, National Security Agency (NSA) leaks, childhood obesity , and social security. Thirteen issues make up this cluster...civil issues with low numbers of fatalities and economic impacts. Issues of this kind include childhood obesity (2.25 hearings per year); riots due...up the 25th to 50th percentile include those having only tangential impact to the public, including among others, global warming, childhood obesity

  12. Chinese Attitudes on Preventive War and the Preemption Doctrine

    DTIC Science & Technology

    2009-07-01

    policy, ―strategic culture‖ is an active area of research on the role of ideas and domestic identity in decision making.39 Thomas Berger argues that...resort to war was typically treated as the inherent sovereign right of any state. While Saint Thomas Aquinas had defined conditions for ―just‖ and...September 2002), 15. 8 Thomas U. Berger, ―Norms, Identity, and National Security in Germany and Japan,‖ in The Culture of National Security, 326. 9

  13. Mapping the Relevance of Complex Decision Making to Canadian Forces Land Operations (Mappage de la pertinence de la prise de d cisions complexes pour les op rations terrestres des Forces canadiennes)

    DTIC Science & Technology

    2011-03-01

    operations erent types of lenge categor le pattern of of scenarios, ersonnel are nalysis s based upon . See Section t question th iffer on their...environmen change may Multiple con achievable a Underspecif Independent (they may h tential scen e complexity verall areas t ere both con ry operations rather...scenario de iption of the ghanistan operations co t as a liaison hanistan Nat of Security (N here was a m ut the level o in security. I security in

  14. 77 FR 39222 - Consumer Use of Reverse Mortgages

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-02

    ... influence reverse mortgage consumers' decision-making, consumers' use of reverse mortgage loan proceeds.... Sensitive personal information such as account numbers or Social Security numbers should not be included... personal information that could be used to identify an individual consumer or account, nor should they...

  15. 76 FR 7757 - Hull Identification Numbers for Recreational Vessels

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-11

    ... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 181 [Docket No. USCG-2007-29236] Hull Identification Numbers for Recreational Vessels AGENCY: Coast Guard, DHS. ACTION: Follow-up to request for... expanded hull identification number (HIN). The Coast Guard's decision-making process included consideration...

  16. A framework for the analysis of the security of supply of utilising carbon dioxide as a chemical feedstock.

    PubMed

    Fraga, Eric S; Ng, Melvin

    2015-01-01

    Recent developments in catalysts have enhanced the potential for the utilisation of carbon dioxide as a chemical feedstock. Using the appropriate energy efficient catalyst enables a range of chemical pathways leading to desirable products. In doing so, CO2 provides an economically and environmentally beneficial source of C1 feedstock, while improving the issues relating to security of supply that are associated with fossil-based feedstocks. However, the dependence on catalysts brings other supply chains into consideration, supply chains that may also have security of supply issues. The choice of chemical pathways for specific products will therefore entail an assessment not only of economic factors but also the security of supply issues for the catalysts. This is a multi-criteria decision making problem. In this paper, we present a modified 4A framework based on the framework suggested by the Asian Pacific Energy Research centre for macro-economic applications. The 4A methodology is named after the criteria used to compare alternatives: availability, acceptability, applicability and affordability. We have adapted this framework for the consideration of alternative chemical reaction processes using a micro-economic outlook. Data from a number of sources were collected and used to quantify each of the 4A criteria. A graphical representation of the assessments is used to support the decision maker in comparing alternatives. The framework not only allows for the comparison of processes but also highlights current limitations in the CCU processes. The framework presented can be used by a variety of stakeholders, including regulators, investors, and process industries, with the aim of identifying promising routes within a broader multi-criteria decision making process.

  17. Can Climate Information be relevant to decision making for Agriculture on the 1-10 year timescale? Case studies from southern Africa

    NASA Astrophysics Data System (ADS)

    Fujisawa, Mariko

    2016-04-01

    Climate forecasts have been developed to assist decision making in sectors averse to, and affected by, climate risks, and agriculture is one of those. In agriculture and food security, climate information is now used on a range of timescales, from days (weather), months (seasonal outlooks) to decades (climate change scenarios). Former researchers have shown that when seasonal climate forecast information was provided to farmers prior to decision making, farmers adapted by changing their choice of planting seeds and timing or area planted. However, it is not always clear that the end-users' needs for climate information are met and there might be a large gap between information supplied and needed. It has been pointed out that even when forecasts were available, they were often not utilized by farmers and extension services because of lack of trust in the forecast or the forecasts did not reach the targeted farmers. Many studies have focused on the use of either seasonal forecasts or longer term climate change prediction, but little research has been done on the medium term, that is, 1 to 10 year future climate information. The agriculture and food system sector is one potential user of medium term information, as land use policy and cropping systems selection may fall into this time scale and may affect farmers' decision making process. Assuming that reliable information is provided and it is utilized by farmers for decision making, it might contribute to resilient farming and indeed to longer term food security. To this end, we try to determine the effect of medium term climate information on farmers' strategic decision making process. We explored the end-users' needs for climate information and especially the possible role of medium term information in agricultural system, by conducting interview surveys with farmers and agricultural experts. In this study, the cases of apple production in South Africa, maize production in Malawi and rice production in Tanzania will be presented. With case studies of various crops, we also aim to identify what climatic factors and timescale of prediction may be critical to what crop types of farmers, which may be of value to climate prediction community to further develop climate prediction useful for agricultural system.

  18. Representing Farmer Irrigation Decisions in Northern India: Model Development from the Bottom Up.

    NASA Astrophysics Data System (ADS)

    O'Keeffe, J.; Buytaert, W.; Brozovic, N.; Mijic, A.

    2017-12-01

    The plains of northern India are among the most intensely populated and irrigated regions of the world. Sustaining water demand has been made possible by exploiting the vast and hugely productive aquifers underlying the Indo-Gangetic basin. However, an increasing demand from a growing population and highly variable socio-economic and environmental variables mean present resources may not be sustainable, resulting in water security becoming one of India's biggest challenges. Unless solutions which take into consideration the regions evolving anthropogenic and environmental conditions are found, the sustainability of India's water resources looks bleak. Understanding water user decisions and their potential outcome is important for development of suitable water resource management options. Computational models are commonly used to assist water use decision making, typically representing natural processes well. The inclusion of human decision making however, one of the dominant drivers of change, has lagged behind. Improved representation of irrigation water user behaviour within models provides more accurate, relevant information for irrigation management. This research conceptualizes and proceduralizes observed farmer irrigation practices, highlighting feedbacks between the environment and livelihood. It is developed using a bottom up approach, informed through field experience and stakeholder interaction in Uttar Pradesh, northern India. Real world insights are incorporated through collected information creating a realistic representation of field conditions, providing a useful tool for policy analysis and water management. The modelling framework is applied to four districts. Results suggest predicted future climate will have little direct impact on water resources, crop yields or farmer income. In addition, increased abstraction may be sustainable in some areas under carefully managed conditions. By simulating dynamic decision making, feedbacks and interactions between water users, irrigation officials, agricultural practices, and external influences such as energy pricing and farming subsidies, this work highlights the importance of directly including water user behaviour in policy making and operational tools, which will help achieve water and livelihood security.

  19. Health Security and Risk Aversion.

    PubMed

    Herington, Jonathan

    2016-09-01

    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (i) that security is intrinsically valuable, (ii) that it is necessary for social planning and (iii) that it is an appropriate response to decision-making in contexts of very limited information. Striking the right balance between securing and maximizing population health thus requires a substantive, and hitherto unrecognized, value judgment. Finally, I critically evaluate the current health security agenda in light of this new account of the concept and its relationship to the other aims of public health policy. © 2016 John Wiley & Sons Ltd.

  20. Complexity Science: A Mechanism for Strategic Foresight and Resiliency in National Security Decision-Making.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ackermann, Mark R.; Hayden, Nancy Kay; Backus, George A.

    Most national policy decisions are complex with a variety of stakeholders, disparate interests and the potential for unintended consequences. While a number of analytical tools exist to help decision makers sort through the mountains of data and myriad of options, decision support teams are increasingly turning to complexity science for improved analysis and better insight into the potential impact of policy decisions. While complexity science has great potential, it has only proven useful in limited case s and when properly applied. In advance of more widespread use, a national - level effort to refine complexity science and more rigorously establishmore » its technical underpinnings is recommended.« less

  1. Risk-based decision making for terrorism applications.

    PubMed

    Dillon, Robin L; Liebe, Robert M; Bestafka, Thomas

    2009-03-01

    This article describes the anti-terrorism risk-based decision aid (ARDA), a risk-based decision-making approach for prioritizing anti-terrorism measures. The ARDA model was developed as part of a larger effort to assess investments for protecting U.S. Navy assets at risk and determine whether the most effective anti-terrorism alternatives are being used to reduce the risk to the facilities and war-fighting assets. With ARDA and some support from subject matter experts, we examine thousands of scenarios composed of 15 attack modes against 160 facility types on two installations and hundreds of portfolios of 22 mitigation alternatives. ARDA uses multiattribute utility theory to solve some of the commonly identified challenges in security risk analysis. This article describes the process and documents lessons learned from applying the ARDA model for this application.

  2. Food Security, Decision Making and the Use of Remote Sensing in Famine Early Warning Systems

    NASA Technical Reports Server (NTRS)

    Brown, Molly E.

    2008-01-01

    Famine early warning systems use remote sensing in combination with socio-economic and household food economy analysis to provide timely and rigorous information on emerging food security crises. The Famine Early Warning Systems Network (FEWS NET) is the US Agency for International Development's decision support system in 20 African countries, as well as in Guatemala, Haiti and Afghanistan. FEWS NET provides early and actionable policy guidance for the US Government and its humanitarian aid partners. As we move into an era of climate change where weather hazards will become more frequent and severe, understanding how to provide quantitative and actionable scientific information for policy makers using biophysical data is critical for an appropriate and effective response.

  3. Is DOD on the Right Path to Financial Auditability?

    DTIC Science & Technology

    2012-03-22

    and DOD decision-making. Moreover, most of the 10 ERPs run the same software applications (i.e. SAP [Systems Applications and Programs] or PeopleSoft...Financial Readiness; GFEBS; DEAMS; Navy ERP 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 19a. NAME OF...Navy ERP CLASSIFICATION: Unclassified To make every dollar count, the Department of Defense (DOD) must be able to account for every dollar

  4. The Gray Panthers Are Coming: Is Your Institution Ready?

    ERIC Educational Resources Information Center

    Clewis, John

    1981-01-01

    Problems facing older faculty and staff members who want to continue working are discussed, along with innovative ways to help them achieve a financially secure retirement. A retirement planning program and seminar plans to help faculty and staff avoid making poor retirement decisions are proposed. (MLW)

  5. 32 CFR 2001.10 - Classification standards.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Classification standards. 2001.10 Section 2001... Classification § 2001.10 Classification standards. Identifying or describing damage to the national security. Section 1.1(a) of the Order specifies the conditions that must be met when making classification decisions...

  6. 32 CFR 2001.10 - Classification standards.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Classification standards. 2001.10 Section 2001... Classification § 2001.10 Classification standards. Identifying or describing damage to the national security. Section 1.1(a) of the Order specifies the conditions that must be met when making classification decisions...

  7. 32 CFR 2001.10 - Classification standards.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Classification standards. 2001.10 Section 2001... Classification § 2001.10 Classification standards. Identifying or describing damage to the national security. Section 1.1(a) of the Order specifies the conditions that must be met when making classification decisions...

  8. 77 FR 36587 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-19

    ... securities from taking into account broker-dealers' promotional or sales efforts when making those decisions... information summarized below. The Commission plans to submit this existing collection of information to the... adequate information to evaluate and approve a rule 12b-1 plan and, thus, are necessary for investor...

  9. 43 CFR 6.7 - Domestic patent protection.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... patent protection will be sought in the United States pending the Commissioner's decision on the dispute... national security, or public health, safety, or welfare, report to the Commissioner promptly upon making..., or public health safety, or welfare, bring the invention to the attention of any Government agency to...

  10. 32 CFR 2001.10 - Classification standards.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Classification standards. 2001.10 Section 2001... Classification § 2001.10 Classification standards. Identifying or describing damage to the national security. Section 1.1(a) of the Order specifies the conditions that must be met when making classification decisions...

  11. 32 CFR 2001.10 - Classification standards.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Classification standards. 2001.10 Section 2001... Classification § 2001.10 Classification standards. Identifying or describing damage to the national security. Section 1.1(a) of the Order specifies the conditions that must be met when making classification decisions...

  12. The Growth of the Japanese Economy: Challenges to American National Security

    DTIC Science & Technology

    1991-09-01

    the flexibility to make decisions and the ability to fend for oneself , which are indispensable parts of anN country’s national security---would indeed...Europe, but American industry in Europe.ඪ As far as Japan was concerned, Servan-Schreiber admitted that it "...will manage to keep up to the... managing its economic machine in a manner that the United States found more acceptable. It is a simple assumption, yet it has been the cornerstone of the

  13. Momentary fitting in a fluid environment: A grounded theory of triage nurse decision making.

    PubMed

    Reay, Gudrun; Rankin, James A; Then, Karen L

    2016-05-01

    Triage nurses control access to the Emergency Department (ED) and make decisions about patient acuity, patient priority, and placement of the patient in the ED. Understanding the processes and strategies that triage nurses use to make decisions is therefore vital for patient safety and the operation of the ED. The aim of the current study was to generate a substantive grounded theory (GT) of decision making by emergency triage Registered Nurses (RNs). Data collection consisted of seven observations of the triage environment at three tertiary care hospitals where RNs conducted triage and twelve interviews with triage RNs. The data were analyzed by constant comparison in accordance with the classical GT method. In the resultant theory, Momentary Fitting in a Fluid Environment, triage is conceptualized as a process consisting of four categories, determining acuity, anticipating needs, managing space, and creating space. The findings indicate that triage RNs continually strive to achieve fit, while simultaneously considering the individual patient and the ED as a whole entity. Triage RNs require appropriately designed triage environments and computer technology that enable them to secure real time knowledge of the ED to maintain situation awareness. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. Planning ahead in public health? A qualitative study of the time horizons used in public health decision-making

    PubMed Central

    Taylor-Robinson, David C; Milton, Beth; Lloyd-Williams, Ffion; O'Flaherty, Martin; Capewell, Simon

    2008-01-01

    Background In order to better understand factors that influence decisions for public health, we undertook a qualitative study to explore issues relating to the time horizons used in decision-making. Methods Qualitative study using semi-structured interviews. 33 individuals involved in the decision making process around coronary heart disease were purposively sampled from the UK National Health Service (national, regional and local levels), academia and voluntary organizations. Analysis was based on the framework method using N-VIVO software. Interviews were transcribed, coded and emergent themes identified. Results Many participants suggested that the timescales for public health decision-making are too short. Commissioners and some practitioners working at the national level particularly felt constrained in terms of planning for the long-term. Furthermore respondents felt that longer term planning was needed to address the wider determinants of health and to achieve societal level changes. Three prominent 'systems' issues were identified as important drivers of short term thinking: the need to demonstrate impact within the 4 year political cycle; the requirement to 'balance the books' within the annual commissioning cycle and the disruption caused by frequent re-organisations within the health service. In addition respondents suggested that the tools and evidence base for longer term planning were not well established. Conclusion Many public health decision and policy makers feel that the timescales for decision-making are too short. Substantial systemic barriers to longer-term planning exist. Policy makers need to look beyond short-term targets and budget cycles to secure investment for long-term improvement in public health. PMID:19094194

  15. Planning ahead in public health? A qualitative study of the time horizons used in public health decision-making.

    PubMed

    Taylor-Robinson, David C; Milton, Beth; Lloyd-Williams, Ffion; O'Flaherty, Martin; Capewell, Simon

    2008-12-18

    In order to better understand factors that influence decisions for public health, we undertook a qualitative study to explore issues relating to the time horizons used in decision-making. Qualitative study using semi-structured interviews. 33 individuals involved in the decision making process around coronary heart disease were purposively sampled from the UK National Health Service (national, regional and local levels), academia and voluntary organizations. Analysis was based on the framework method using N-VIVO software. Interviews were transcribed, coded and emergent themes identified. Many participants suggested that the timescales for public health decision-making are too short. Commissioners and some practitioners working at the national level particularly felt constrained in terms of planning for the long-term. Furthermore respondents felt that longer term planning was needed to address the wider determinants of health and to achieve societal level changes. Three prominent 'systems' issues were identified as important drivers of short term thinking: the need to demonstrate impact within the 4 year political cycle; the requirement to 'balance the books' within the annual commissioning cycle and the disruption caused by frequent re-organisations within the health service. In addition respondents suggested that the tools and evidence base for longer term planning were not well established. Many public health decision and policy makers feel that the timescales for decision-making are too short. Substantial systemic barriers to longer-term planning exist. Policy makers need to look beyond short-term targets and budget cycles to secure investment for long-term improvement in public health.

  16. Understanding and applying principles of social cognition and decision making in adaptive environmental governance.

    PubMed

    DeCaro, Daniel A; Arnol, Craig Anthony Tony; Boama, Emmanuel Frimpong; Garmestani, Ahjond S

    2017-03-01

    Environmental governance systems are under greater pressure to adapt and to cope with increased social and ecological uncertainty from stressors like climate change. We review principles of social cognition and decision making that shape and constrain how environmental governance systems adapt. We focus primarily on the interplay between key decision makers in society and legal systems. We argue that adaptive governance must overcome three cooperative dilemmas to facilitate adaptation: (1) encouraging collaborative problem solving, (2) garnering social acceptance and commitment, and (3) cultivating a culture of trust and tolerance for change and uncertainty. However, to do so governance systems must cope with biases in people's decision making that cloud their judgment and create conflict. These systems must also satisfy people's fundamental needs for self-determination, fairness, and security, ensuring that changes to environmental governance are perceived as legitimate, trustworthy, and acceptable. We discuss the implications of these principles for common governance solutions (e.g., public participation, enforcement) and conclude with methodological recommendations. We outline how scholars can investigate the social cognitive principles involved in cases of adaptive governance.

  17. Understanding and applying principles of social cognition and decision making in adaptive environmental governance

    PubMed Central

    DeCaro, Daniel A.; Arnol, Craig Anthony (Tony); Boama, Emmanuel Frimpong; Garmestani, Ahjond S.

    2018-01-01

    Environmental governance systems are under greater pressure to adapt and to cope with increased social and ecological uncertainty from stressors like climate change. We review principles of social cognition and decision making that shape and constrain how environmental governance systems adapt. We focus primarily on the interplay between key decision makers in society and legal systems. We argue that adaptive governance must overcome three cooperative dilemmas to facilitate adaptation: (1) encouraging collaborative problem solving, (2) garnering social acceptance and commitment, and (3) cultivating a culture of trust and tolerance for change and uncertainty. However, to do so governance systems must cope with biases in people’s decision making that cloud their judgment and create conflict. These systems must also satisfy people’s fundamental needs for self-determination, fairness, and security, ensuring that changes to environmental governance are perceived as legitimate, trustworthy, and acceptable. We discuss the implications of these principles for common governance solutions (e.g., public participation, enforcement) and conclude with methodological recommendations. We outline how scholars can investigate the social cognitive principles involved in cases of adaptive governance. PMID:29780425

  18. Fundamental economic irreversibilities influence policies for enhancing international forest phytosanitary security

    Treesearch

    Thomas P. Holmes; Will Allen; Robert G. Haight; E. Carina H. Keskitalo; Mariella Marzano; Maria Pettersson; Christopher P. Quine; E. R. Langer

    2017-01-01

    National and international efforts to manage forest biosecurity create tension between opposing sources of ecological and economic irreversibility. Phytosanitary policies designed to protect national borders from biological invasions incur sunk costs deriving from economic and political irreversibilities that incentivizes wait-and-see decision-making. However, the...

  19. Course Notes and Suggestions for Consumer Education.

    ERIC Educational Resources Information Center

    Sweetwater Union High School District, Chula Vista, CA.

    The document is a guide to a consumer education course; the course format is a series of several activity-based miniunits for each of 15 instructional areas: components of life styles, decision making, settling conflicts, budgeting, handling and controlling family income, credit, interest rates, savings institutions, family financial security,…

  20. The Two Solitudes of Educational Policy and the Challenge of Development

    ERIC Educational Resources Information Center

    Murgatroyd, Stephen; Sahlberg, Pasi

    2016-01-01

    Policy makers are challenged to improve educational outcomes, manage scarce resources and secure public acceptance of their initiatives to provide quality, relevant and effective education. In making decisions they are pulled between competing ideologies about the process and purposes of schooling. This paper explores these ideologies and suggests…

  1. THE USE OF SCENARIO ANALYSIS TO ASSESS LANDSCAPE CHANGE ON WATERSHED CONDITION IN THE PACKIFIC NORTHWEST (USA)

    EPA Science Inventory

    The ability to assess, report, and forecast the life support functions of ecosystems is absolutely critical to our capacity to make informed decisions which will maintain the sustainable nature of our environmental services and secure these resources into the future. Scenario ana...

  2. Risk and Infrastructure Science Center - Global Security Sciences

    Science.gov Websites

    delivers scientific tools and methodologies to inform decision making regarding the most challenging Sciences ASD Accelerator Systems AES APS Engineering Support XSD X-ray Science Physical Sciences and Leadership Strategic Alliance for Global Energy Solutions Overview Leadership Systems Science Center Overview

  3. The Potential of Free-Choice Learning for Environmental Participation in Greece

    ERIC Educational Resources Information Center

    Skanavis, Constantina; Sakellari, Maria; Petreniti, Vassiliki

    2005-01-01

    Citizen participation in environmental decision-making is of extreme importance in securing a good quality of life. Local communities know best what alternate solutions should be implemented for appropriate management of their area. This paper presents findings about the environmental characteristics of various Greek citizens' groups, where…

  4. Consumer Education (A High School One Semester Course).

    ERIC Educational Resources Information Center

    Hawaii State Dept. of Education, Honolulu. Office of Instructional Services.

    Designed for a one-semester high school social studies elective course, this curriculum guide uses a multidisciplinary approach to teach consumer education. Eight units of study cover the marketplace, consumer protection, decision making, money management, credit and taxes, basic necessities, housing, and future security. Within each unit, an…

  5. Security and Communication Improve Community Trust

    ERIC Educational Resources Information Center

    Schneiderman, Mark

    2015-01-01

    Using student information in schools is nothing new nor is the reliance on information technologies supported by external service providers. What is new is the adoption of innovations like cloud computing and data analytics that are increasing teacher and family data access, creating actionable information to drive instruction and decision making,…

  6. Knowledge versus National Security: The Case of Androscoggin High School

    ERIC Educational Resources Information Center

    Doscher, Stephanie Paul

    2008-01-01

    As instructional leaders, principals often make curriculum decisions that balance their community's need for knowledge with the nation's need for knowledge workers. Across the country, school administrators are searching for funding and effective means of infusing more technology, foreign language learning, and global perspectives instruction into…

  7. Laundry Facility Considerations: Tips on an Often Overlooked Student Housing Issue.

    ERIC Educational Resources Information Center

    Reynolds, Rick

    1991-01-01

    Administrators making long-term decisions on campus laundry equipment and service need to consider self-ownership versus contracting. Considerations in selecting a contractor include the contract, accountability, repair services, and machine usage pricing. Laundry rooms should not be located where they pose security problems and should be arranged…

  8. 76 FR 14440 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-16

    ... 40-F is used by investors in making investment decisions with respect to the securities of such... performance of the functions of the agency, including whether the information will have practical utility; (b... to enhance the quality, utility, and clarity of the information collected; and (d) ways to minimize...

  9. 20 CFR 405.301 - Hearing before an administrative law judge-general.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... law judge. (c) You may examine the evidence used in making the decision or determination under review... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Hearing before an administrative law judge-general. 405.301 Section 405.301 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW...

  10. 20 CFR 404.929 - Hearing before an administrative law judge-general.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... evidence used in making the determination or decision under review, and present and question witnesses. The... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Hearing before an administrative law judge-general. 404.929 Section 404.929 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...

  11. 20 CFR 416.1429 - Hearing before an administrative law judge-general.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... evidence, examine the evidence used in making the determination or decision under review, and present and... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Hearing before an administrative law judge-general. 416.1429 Section 416.1429 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL...

  12. Postwar Developments in German Political, Social and Security Policies.

    ERIC Educational Resources Information Center

    Baker, Kendall L., Ed.

    To understand developments in West Germany since World War II, one must consider numerous social, political, economic, military, and educational variables. Important among these are the decline in output orientation, increase in interpersonal political involvement, decline in value placed on politics, stress on democratic decision making,…

  13. Conflict and Security Indices: A Summary of Open-Source Data

    DTIC Science & Technology

    2008-09-01

    in the same dimensions as the HDI while adjusting for gender inequality . The Gender Empowerment Measure (GEM) measures the extent of women’s...measures gender inequality in three key areas: political participation and decision making power, as measured by women’s and men’s percentage share of

  14. Online catalog access and distribution of remotely sensed information

    NASA Astrophysics Data System (ADS)

    Lutton, Stephen M.

    1997-09-01

    Remote sensing is providing voluminous data and value added information products. Electronic sensors, communication electronics, computer software, hardware, and network communications technology have matured to the point where a distributed infrastructure for remotely sensed information is a reality. The amount of remotely sensed data and information is making distributed infrastructure almost a necessity. This infrastructure provides data collection, archiving, cataloging, browsing, processing, and viewing for applications from scientific research to economic, legal, and national security decision making. The remote sensing field is entering a new exciting stage of commercial growth and expansion into the mainstream of government and business decision making. This paper overviews this new distributed infrastructure and then focuses on describing a software system for on-line catalog access and distribution of remotely sensed information.

  15. Privacy and security compliance in the E-healthcare marketplace.

    PubMed

    Lutes, M

    2000-03-01

    Complying with security and privacy regulations proposed by HHS in response to the Health Insurance Portability and Accountability Act (HIPAA) will require healthcare managers to address both internal and external business interactions and initiatives. The proposed regulations mandate certain procedures regarding administration, physical safeguards, technical security for data integrity and confidentiality, and technical security against unauthorized access. In particular, the proposed regulations require organizations to contractually ensure that vendors adhere to the regulations. Healthcare organizations also must implement training procedures for staff members who have contact with protected health information and designate a privacy officer to guard against improper disclosure of such information. Documented policies for organizational decision making are vital to an organization's efforts to implement procedures for compliance with the regulations.

  16. Lessons Learned in Over a Decade of Technical Support for U.S. Nuclear Cyber Security Programmes

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Glantz, Clifford S.; Landine, Guy P.; Craig, Philip A.

    Pacific Northwest National Laboratory’s (PNNL) nuclear cyber security team has been providing technical support to the U.S. Nuclear Regulatory Commission (NRC) since 2002. This team has provided cyber security technical experties in conducting cyber security inspections, developing of regulatory rules and guidance, reviewing facility cyber security plans, developing inspection guidance, and developing and teaching NRC inspectors how to conduct cyber security assessments. The extensive experience the PNNL team has gathered has allowed them to compile a lenghty list of recommendations on how to improve cyber security programs and conduct assessments. A selected set of recommendations are presented, including the needmore » to: integrate an array of defenisve strategies into a facility’s cyber security program, coordinate physical and cyber security activities, train phycial security forces to resist a cyber-enabled physical attack, improve estimates of the consequences of a cyber attack, properly resource cyber security assessments, appropropriately account for insider threats, routinely monitor security devices for potential attacks, supplement compliance-based requirements with risk-based decision making, and introduce the concept of resilience into cyber security programs.« less

  17. A cognitive and economic decision theory for examining cyber defense strategies.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bier, Asmeret Brooke

    Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participantsmore » interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.« less

  18. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.

    PubMed

    Bernik, Igor; Prislan, Kaja

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.

  19. Consumer Decision-Making of Older People: A 45-Year Review.

    PubMed

    Hettich, Dominik; Hattula, Stefan; Bornemann, Torsten

    2017-03-15

    Aging is one of the key future challenges for global life. Of particular interest is the consumption-related decision-making of older people, as its better understanding would enable the effective influence of behavior, which would help to secure the economic well-being and ensure a better quality of life for this population. This article explores the respective literature and identifies gaps for future research. We conducted a holistic review of peer-reviewed literature that examined the decision-making of older consumers. Using a structured approach based on the consumer decision process model, we present the findings of 45 years of research (a total of 42 articles) and identify further research areas. The review reveals that the literature on older consumers' decision-making is fragmented, and that the findings are mixed. In particular, results on the role of emotions are controversial. While emotions have been shown to be better controlled by older individuals, emotions are also found to be highly influential in commercial advertisements. Similarly, the literature contains a lively debate on the relevance of price, service and store quality, and provider choice. These results call for a more holistic view of the decision-making of older consumers, and the review highlights numerous opportunities for future research. For instance, little is known about how older consumers deal with need recognition and the reasons they search for particular information. Moreover, understanding is lacking with respect to online purchase and feedback behavior. © The Author 2017. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  20. Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheldon, Frederick T; Abercrombie, Robert K; Mili, Ali

    2008-01-01

    Good security metrics are required to make good decisions about how to design security countermeasures, to choose between alternative security architectures, and to improve security during operations. Therefore, in essence, measurement can be viewed as a decision aid. The lack of sound practical security metrics is severely hampering progress in the development of secure systems. The Cyberspace Security Econometrics System (CSES) offers the following advantages over traditional measurement systems: (1) CSES reflects the variances that exist amongst different stakeholders of the same system. Different stakeholders will typically attach different stakes to the same requirement or service (e.g., a service maymore » be provided by an information technology system or process control system, etc.). (2) For a given stakeholder, CSES reflects the variance that may exist among the stakes she/he attaches to meeting each requirement. The same stakeholder may attach different stakes to satisfying different requirements within the overall system specification. (3) For a given compound specification (e.g., combination(s) of commercial off the shelf software and/or hardware), CSES reflects the variance that may exist amongst the levels of verification and validation (i.e., certification) performed on components of the specification. The certification activity may produce higher levels of assurance across different components of the specification than others. Consequently, this paper introduces the basis, objectives and capabilities for the CSES including inputs/outputs and the basic structural and mathematical underpinnings.« less

  1. Life-Cycle Assessment of a Distributed-Scale Thermochemical Bioenergy Conversion System

    Treesearch

    Hongmei Gu; Richard Bergman

    2016-01-01

    Expanding bioenergy production from woody biomass has the potential to decrease net greenhouse gas (GHG) emissions and improve the energy security of the United States. Science-based and internationally accepted life-cycle assessment (LCA) is an effective tool for policy makers to make scientifically informed decisions on expanding renewable energy production from...

  2. A Survey of Private Ohio Academic Libraries' Physical Processing Practices for Circulating Books.

    ERIC Educational Resources Information Center

    Factor, Olivia Spaid

    Little guidance is given in today's general technical services or cataloging textbooks to assist librarians in making decisions on procedures for the physical preparation of materials prior to placement on the shelves for public access. As small, private academic libraries face automation of circulation, addition of security systems, and debates…

  3. Towards Secure and Trustworthy Cyberspace: Social Media Analytics on Hacker Communities

    ERIC Educational Resources Information Center

    Li, Weifeng

    2017-01-01

    Social media analytics is a critical research area spawned by the increasing availability of rich and abundant online user-generated content. So far, social media analytics has had a profound impact on organizational decision making in many aspects, including product and service design, market segmentation, customer relationship management, and…

  4. Gender Equity in Australian Universities: The Many Paradoxes of Securing Senior Leadership Positions

    ERIC Educational Resources Information Center

    Noble, Carolyn

    2014-01-01

    To date western feminist scholarship on gender and work has primarily focused on women providing valuable information as to their discrimination and invisibility, especially in the echelons of power and in senior decision-making positions. Feminist scholars have needed to explore women's under representation in senior leadership positions because…

  5. 45 CFR 164.502 - Uses and disclosures of protected health information: general rules.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Privacy of Individually Identifiable...: adults and emancipated minors. If under applicable law a person has authority to act on behalf of an individual who is an adult or an emancipated minor in making decisions related to health care, a covered...

  6. Filtering the Net in Libraries: The Case (Mostly) in Favor.

    ERIC Educational Resources Information Center

    Banks, Michael A.

    1998-01-01

    Examines issues and decision-making involved in restricting Internet access in libraries, for the most part favoring filtering devices. Questions to consider when selecting a filtering program are provided. Some of the better filtering programs are described, and Web addresses are included for each. Security risks associated with Java and…

  7. Student Rights and Freedoms: Toward Implementation Models.

    ERIC Educational Resources Information Center

    Collins, Charles C.

    Faculty, administration, and the board of trustees are dubious champions of student rights and freedoms. Without reliable protectors within the academic community, students have the options of securing their rights and freedoms by (1) the exercise of raw power, (2) finding a means to participate in the decision making process, or (3) seeking…

  8. Coping with Your Loss and Grief.

    ERIC Educational Resources Information Center

    Oregon State Univ., Corvallis. Cooperative Extension Service.

    This guide offers advice to help people cope with a variety of losses, including losses associated with divorce, retirement, relocation, disability, or illness, and the loss of a pet, financial security, independence, or control and decision making. It discusses what one can expect when one suffers a loss and how to handle grief. Common reactions…

  9. Teaching Hands-on Plumbing in a County Facility: A Working Plumber's Experience.

    ERIC Educational Resources Information Center

    Mattucci, Robert F.; Johnson, Meghan W.

    2003-01-01

    A plumbing program teaches minimum-security inmates technical skills, decision making, motivation, and teamwork. In New York, 80 inmates have completed the program and 2 have become apprentices upon release. The course, combined with substance abuse treatment and high school equivalency, seeks to counteract recidivism with practical life skills.…

  10. Leveraging the water-energy-food nexus for a sustainability transition: Institutional and policy design choices in a fragmented world (Invited)

    NASA Astrophysics Data System (ADS)

    Aggarwal, R.

    2013-12-01

    Given the critical - but often subtle - feedbacks between water, energy, and food security, a nexus approach that integrates management and governance across sectors and scales is increasingly being advocated in research and policy circles. As a first step, such an approach calls for an integrated multi-disciplinary assessment of the externalities across sectors and tradeoffs involved in enhancing security in one sector on the other sectors. Recent research efforts have focused on understanding these tradeoffs, say, through estimating the energy costs of expanding irrigation for greater food security; or estimating the embodied land and water costs in increased energy production. While such efforts have increased awareness about the inter-connectedness of such issues, the fundamental question of how such an understanding influences decision-making and how it can lead to coordinated action towards a transition to more sustainable pathways still remains largely unanswered. The long legacy of sectoral organization of political and bureaucratic structures has led to a fragmentary policy and institutional landscape, on which cross-sectoral public action and coordination poses several challenges. Moreover, poorly defined property rights, imperfect or absent markets, and uncertainty about resource dynamics imply that economic signals about relative scarcity in one sector are not necessarily clear to decision makers in the other sectors. In this study, we examine these issues related to water-energy food nexus in the context of semi-arid groundwater irrigated regions of western and southern India. Using a social-ecological systems framework, we begin by characterizing some of the key inter-dependencies among food, water, and energy at the farm household, village and state level. We then examine the factors that influence decision-making at these levels, and the extent to which these decisions internalize the externalities. Specifically, we examine the role of energy pricing and rationing policy on groundwater withdrawals and type of crops grown. Finally, we examine several emerging examples of innovative policies and institutions that have leveraged the synergies among sectors. Although these examples do not necessarily provide optimal solutions, these provide some clues as to how decision- making within individual sectors can be influenced through institutional and policy design to transition towards more sustainable pathways in a second best world. We conclude by exploring what lessons these cases might hold for navigating these tradeoffs in other contexts.

  11. Differences in multiple-target visual search performance between non-professional and professional searchers due to decision-making criteria.

    PubMed

    Biggs, Adam T; Mitroff, Stephen R

    2015-11-01

    Professional visual searches, such as those conducted by airport security personnel, often demand highly accurate performance. As many factors can hinder accuracy, it is critical to understand the potential influences. Here, we examined how explicit decision-making criteria might affect multiple-target search performance. Non-professional searchers (college undergraduates) and professional searchers (airport security officers) classified trials as 'safe' or 'dangerous', in one of two conditions. Those in the 'one = dangerous' condition classified trials as dangerous if they found one or two targets, and those in the 'one = safe' condition only classified trials as dangerous if they found two targets. The data suggest an important role of context that may be mediated by experience; non-professional searchers were more likely to miss a second target in the one = dangerous condition (i.e., when finding a second found target did not change the classification), whereas professional searchers were more likely to miss a second in the one = safe condition. © 2014 The British Psychological Society.

  12. Real-time monitoring of smallholder farmer responses to intra-seasonal climate variability in central Kenya

    NASA Astrophysics Data System (ADS)

    Krell, N.; Evans, T. P.; Estes, L. D.; Caylor, K. K.

    2017-12-01

    While international metrics of food security and water availability are generated as spatial averages at the regional to national levels, climate variability impacts are differentially felt at the household level. This project investigated scales of variability of climate impacts on smallholder farmers using social and environmental data in central Kenya. Using sub-daily real-time environmental measurements to monitor smallholder agriculture, we investigated how changes in seasonal precipitation affected food security around Laikipia county from September 2015 to present. We also conducted SMS-based surveys of over 700 farmers to understand farmers' decision-making within the growing season. Our results highlight field-scale heterogeneity in biophysical and social factors governing crop yields using locally sensed real-time environmental data and weekly farmer-reported information about planting, harvesting, irrigation, and crop yields. Our preliminary results show relationships between changes in seasonal precipitation, NDVI, and soil moisture related to crop yields and decision-making at several scales. These datasets present a unique opportunity to collect highly spatially and temporally resolved information from data-poor regions at the household level.

  13. Sensor data security level estimation scheme for wireless sensor networks.

    PubMed

    Ramos, Alex; Filho, Raimir Holanda

    2015-01-19

    Due to their increasing dissemination, wireless sensor networks (WSNs) have become the target of more and more sophisticated attacks, even capable of circumventing both attack detection and prevention mechanisms. This may cause WSN users, who totally trust these security mechanisms, to think that a sensor reading is secure, even when an adversary has corrupted it. For that reason, a scheme capable of estimating the security level (SL) that these mechanisms provide to sensor data is needed, so that users can be aware of the actual security state of this data and can make better decisions on its use. However, existing security estimation schemes proposed for WSNs fully ignore detection mechanisms and analyze solely the security provided by prevention mechanisms. In this context, this work presents the sensor data security estimator (SDSE), a new comprehensive security estimation scheme for WSNs. SDSE is designed for estimating the sensor data security level based on security metrics that analyze both attack prevention and detection mechanisms. In order to validate our proposed scheme, we have carried out extensive simulations that show the high accuracy of SDSE estimates.

  14. Sensor Data Security Level Estimation Scheme for Wireless Sensor Networks

    PubMed Central

    Ramos, Alex; Filho, Raimir Holanda

    2015-01-01

    Due to their increasing dissemination, wireless sensor networks (WSNs) have become the target of more and more sophisticated attacks, even capable of circumventing both attack detection and prevention mechanisms. This may cause WSN users, who totally trust these security mechanisms, to think that a sensor reading is secure, even when an adversary has corrupted it. For that reason, a scheme capable of estimating the security level (SL) that these mechanisms provide to sensor data is needed, so that users can be aware of the actual security state of this data and can make better decisions on its use. However, existing security estimation schemes proposed for WSNs fully ignore detection mechanisms and analyze solely the security provided by prevention mechanisms. In this context, this work presents the sensor data security estimator (SDSE), a new comprehensive security estimation scheme for WSNs. SDSE is designed for estimating the sensor data security level based on security metrics that analyze both attack prevention and detection mechanisms. In order to validate our proposed scheme, we have carried out extensive simulations that show the high accuracy of SDSE estimates. PMID:25608215

  15. Should childhood MMR vaccination be compulsory? Rights, duties and the public interest

    PubMed Central

    Sheather, Julian

    2013-01-01

    When children and young people lack the capacity to make decisions about their care and treatment, decisions have to be made on their behalf based on an assessment of their welfare or interests. In law, parents, or others with the relevant parental responsibility, are ordinarily regarded as the appropriate decision-makers. One way of framing this is to say that parents have certain decision-making rights with respect to their children. Such rights, however, are not generally regarded as absolute, rather they can be seen as secondary to and limited by the duties that parents have with regard to their children, duties to promote their welfare. It is against these parental duties that children could, at least in theory if not in practice, claim a right to certain kinds of protection. The legal rights of parents here, as opposed to the rights of the children, can be thought of as rights that secure for parents the freedom from interference necessary to fulfill the underlying duty. PMID:23732893

  16. Traditional and online consumers in China: a preliminary study of their personality traits and decision-making styles.

    PubMed

    Zhu, Junpeng; Xu, You; Huang, Jingyi; Yeow, Changdar; Wang, Wei

    2012-12-01

    Population of online consumers increases rapidly, but the decision-making styles of online consumers and psychiatric denominators such as the personality correlates remain unclear. In 196 traditional, and 196 age-, education- and gender-matched online consumers, we have tested the Zuckerman-Kuhlman Personality Questionnaire (ZKPQ) and the Consumer Style Inventory (CSI). After exploratory and confirmatory factor analyses, we have defined a five-factor model CSI with 24 items. Online consumers scored lower on ZKPQ Neuroticism-Anxiety and higher on Aggression-Hostility than traditional ones did, and scored higher on CSI Novelty-fashion consciousness and Brand consciousness, and lower on Time consciousness than the traditional consumers did. ZKPQ Neuroticism-Anxiety was positively correlated with CSI Confused by overchoice in both groups, Sociability was positively correlated with Novelty-fashion consciousness and negatively with Time consciousness in traditional group, and Impulsive Sensation Seeking was positively correlated with Novelty-fashion consciousness and Time consciousness in online group. Our study suggests that, regarding the decision-making styles, online consumers display curiosity that lacks security and need other ways to improve their social lives. It also calls further designs to address the contributions of other psychiatric features to the particular decision-making styles in online consumers.

  17. Industrial Wireless Sensors: A User's Perspective on the Impact of Standards on Wide-spread Deployment

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Taft, Cyrus W.; Manges, Wayne W; Sorge, John N

    2012-01-01

    The role of wireless sensing technologies in industrial instrumentation will undoubtedly become more important in the years ahead. . Deployment of such instrumentation in an industrial setting with its heightened security and robustness criteria hinges on user acceptance of verified performance as well as meeting cost requirements. Today, industrial users face many choices when specifying a wireless sensor network, including radio performance, battery life, interoperability, security, and standards compliance. The potential market for industrial wireless sensors is literally millions of wireless instruments and it is imperative that accurate information for applying the technology to real-world applications be available to themore » end-user so that they can make informed deployment decisions. The majority of industrial wireless automation designs now being deployed or being considered for deployment are based on three different standards . The HART Communications Foundation s WirelessHART (IEC 62591), the International Society of Automation s ISA100.11a, and the offering from the Industrial Wireless Alliance of China known as WIA-PA (IEC 62601). Aside from these industrial automation standards, users must also be cognizant of the underlying wireless network standards IEEE 802.11, IEEE 802.15.4, and IEEE 802.15.3a and their interactions with the three principal industrial automation protocols mentioned previously. The crucial questions being asked by end users revolve around sensor network performance, interoperability, reliability, and security. This paper will discuss potential wireless sensor applications in power plants, barriers to the acceptance of wireless technology, concerns related to standards, and provide an end user prospective on the issues affecting wide-spread deployment of wireless sensors. Finally, the authors conclude with a discussion of a recommended path forward including how standards organizations can better facilitate end user decision making and how end users can locate and use objective information for decision making.« less

  18. An Integrated Systems Approach to Designing Climate Change Adaptation Policy in Water Resources

    NASA Astrophysics Data System (ADS)

    Ryu, D.; Malano, H. M.; Davidson, B.; George, B.

    2014-12-01

    Climate change projections are characterised by large uncertainties with rainfall variability being the key challenge in designing adaptation policies. Climate change adaptation in water resources shows all the typical characteristics of 'wicked' problems typified by cognitive uncertainty as new scientific knowledge becomes available, problem instability, knowledge imperfection and strategic uncertainty due to institutional changes that inevitably occur over time. Planning that is characterised by uncertainties and instability requires an approach that can accommodate flexibility and adaptive capacity for decision-making. An ability to take corrective measures in the event that scenarios and responses envisaged initially derive into forms at some future stage. We present an integrated-multidisciplinary and comprehensive framework designed to interface and inform science and decision making in the formulation of water resource management strategies to deal with climate change in the Musi Catchment of Andhra Pradesh, India. At the core of this framework is a dialogue between stakeholders, decision makers and scientists to define a set of plausible responses to an ensemble of climate change scenarios derived from global climate modelling. The modelling framework used to evaluate the resulting combination of climate scenarios and adaptation responses includes the surface and groundwater assessment models (SWAT & MODFLOW) and the water allocation modelling (REALM) to determine the water security of each adaptation strategy. Three climate scenarios extracted from downscaled climate models were selected for evaluation together with four agreed responses—changing cropping patterns, increasing watershed development, changing the volume of groundwater extraction and improving irrigation efficiency. Water security in this context is represented by the combination of level of water availability and its associated security of supply for three economic activities (agriculture, urban, industrial) on a spatially distributed basis. The resulting combinations of climate scenarios and adaptation responses were subjected to a combined hydro-economic assessment based on the degree of water security together with its cost-effectiveness against the Business-as-usual scenario.

  19. 17 CFR 201.140 - Commission orders and decisions: Signature and availability.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Commission orders and decisions: Signature and availability. 201.140 Section 201.140 Commodity and Securities Exchanges SECURITIES... and decisions: Signature and availability. (a) Signature required. All orders and decisions of the...

  20. Design of the national health security preparedness index.

    PubMed

    Uzun Jacobson, Evin; Inglesby, Tom; Khan, Ali S; Rajotte, James C; Burhans, Robert L; Slemp, Catherine C; Links, Jonathan M

    2014-01-01

    The importance of health security in the United States has been highlighted by recent emergencies such as the H1N1 influenza pandemic, Superstorm Sandy, and the Boston Marathon bombing. The nation's health security remains a high priority today, with federal, state, territorial, tribal, and local governments, as well as nongovernment organizations and the private sector, engaging in activities that prevent, protect, mitigate, respond to, and recover from health threats. The Association of State and Territorial Health Officials (ASTHO), through a cooperative agreement with the Centers for Disease Control and Prevention (CDC) Office of Public Health Preparedness and Response (OPHPR), led an effort to create an annual measure of health security preparedness at the national level. The collaborative released the National Health Security Preparedness Index (NHSPI(™)) in December 2013 and provided composite results for the 50 states and for the nation as a whole. The Index results represent current levels of health security preparedness in a consistent format and provide actionable information to drive decision making for continuous improvement of the nation's health security. The overall 2013 National Index result was 7.2 on the reported base-10 scale, with areas of greater strength in the domains of health surveillance, incident and information management, and countermeasure management. The strength of the Index relies on the interdependencies of the many elements in health security preparedness, making the sum greater than its parts. Moving forward, additional health security-related disciplines and measures will be included alongside continued validation efforts.

  1. Environment and the Military. A Selected Bibliography

    DTIC Science & Technology

    1993-05-01

    What Price Clean Air? A Market Approach to Energy and Environmental Policy. New York: 1993. 96pp. (HC110 .A4W45 1993) Commoner, Barry. Making Peace with...Decision Making and the Environment. Newbury Park: Sage, 1992. 212pp. (HD75.6 .S74 1992) Steger, Will, and Bowermaster, Jon. Saving the Earth: A...34Environment and Security: Muddled Thinking ." Bulletin of the Atomic Scientists, Vol. 47, April 1991, pp. 22- 28. Diederich, Michael D., Jr. "’Law of War

  2. Medical records. Enhancing privacy, preserving the common good.

    PubMed

    Etzioni, A

    1999-01-01

    Personal medical information is now bought and sold on the open market. Companies use it to make hiring and firing decisions and to identify customers for new products. The justification for providing such access to medical information is that doing so benefits the public by securing public safety, controlling costs, and supporting medical research. And individuals have supposedly consented to it. But we can achieve the common goods while better protecting privacy by making institutional changes in the way information is maintained and protected.

  3. 6 CFR 13.37 - Initial Decision.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Initial Decision. 13.37 Section 13.37 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.37 Initial Decision. (a) The ALJ will issue an Initial Decision based only on the record, which will contain...

  4. Computerized Vocational Information and Decision-Making in Secured Environments in New York State.

    ERIC Educational Resources Information Center

    Heller, Barbara R.; Gross, Linda Chitayat

    A study was conducted on the use of the Guidance Information System (GIS), an on-line computer information retrieval system for occupational, two-year college, four-year college, and scholarship and financial aid information, in four detention/correctional facilities in New York. These were the Queens House of Detention for Men (QHDM), Brooklyn…

  5. 17 CFR 275.206(4)-1 - Advertisements by investment advisers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... of each such recommendation (e.g., whether to buy, sell or hold), the market price at that time, the price at which the recommendation was to be acted upon, and the market price of each such security as of... graph, chart, formula or other device being offered will assist any person in making his own decisions...

  6. A Career Decision-Making Profile of Latina/o Incoming College Students

    ERIC Educational Resources Information Center

    Risco, Cristina M.; Duffy, Ryan D.

    2011-01-01

    The current study explored the work values, career decidedness, and career choice comfort of 236 Latina/o incoming college students. Of a possible 13 work values, students placed more importance on work enjoyment, genuine interest in the field, and job security and less importance on family expectations, having free time, and working without close…

  7. A Citizen's Guide to U.S. Foreign Policy: Election '88. Nonpartisan Briefs on 18 Key Issues.

    ERIC Educational Resources Information Center

    Hoepli, Nancy, Ed.; And Others

    In order to make informed voting decisions citizens need background information on complex foreign policy issues facing the United States. This guide presents current issues and provides information to help citizens cast a thoughtful vote. The guide is divided into six main headings: Leadership; Security; Economic and Social Issues; Critical…

  8. The Department of Homeland Security’s Pursuit of Data-Driven Decision Making

    DTIC Science & Technology

    2015-12-01

    agencies’ information management systems pertaining to mission support and business operations 1 KT...Directorate’s operating environment. xviii managed . Meanwhile, adding to the intrinsic organizational change management challenges is the idea that...a timely manner. The lack of a single, enterprise-wide information management system has resulted in numerous, disparate systems operating within

  9. The Facts Ma'am, Just the Facts: Social Security Disability Benefit Programs and Work Incentives

    ERIC Educational Resources Information Center

    Brooke, Valerie; McDonough, Jennifer T.

    2008-01-01

    Individuals With Disabilities Education Act Amendments of 1997 (IDEA) requires that parents and students be involved in all aspects of the transition planning and decision-making process, and most teachers recognize that this involvement is vital to success. To fully participate effectively, students and their family members need to become…

  10. Towards a Bio-inspired Security Framework for Mission-Critical Wireless Sensor Networks

    NASA Astrophysics Data System (ADS)

    Ren, Wei; Song, Jun; Ma, Zhao; Huang, Shiyong

    Mission-critical wireless sensor networks (WSNs) have been found in numerous promising applications in civil and military fields. However, the functionality of WSNs extensively relies on its security capability for detecting and defending sophisticated adversaries, such as Sybil, worm hole and mobile adversaries. In this paper, we propose a bio-inspired security framework to provide intelligence-enabled security mechanisms. This scheme is composed of a middleware, multiple agents and mobile agents. The agents monitor the network packets, host activities, make decisions and launch corresponding responses. Middleware performs an infrastructure for the communication between various agents and corresponding mobility. Certain cognitive models and intelligent algorithms such as Layered Reference Model of Brain and Self-Organizing Neural Network with Competitive Learning are explored in the context of sensor networks that have resource constraints. The security framework and implementation are also described in details.

  11. Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation

    PubMed Central

    2016-01-01

    Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model—ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it’s recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes. PMID:27655001

  12. Association Between Women's Empowerment and Maternal and Child Nutrition in Kalalé District of Northern Benin.

    PubMed

    Alaofè, Halimatou; Zhu, Min; Burney, Jennifer; Naylor, Rosamond; Douglas, Taren

    2017-09-01

    Evidence on effectiveness of women's empowerment (WE) to reduce undernutrition is limited in sub-Sahara Africa, and few studies incorporate multidimensional measures of WE. To examine whether a WE status, in sum and across leadership, decision-making, mobility, economic security, male involvement in housework, and nonfamily group domains, is associated with women and their children nutritional status in Kalalé district of northern Benin. Data were obtained from the 2014 Solar Market Garden baseline study: 767 paired reproductive-age women aged 15 to 49 years and children 6 to 59 months old. Exploratory principal component (cross-validate with confirmatory) factor analysis was first conducted to identify the structure of empowerment. Then, using a new survey-based index, regression analysis was conducted to examine associations between WE measures and maternal dietary diversity score (DDS) and body mass index (BMI), as well as their child's DDS, height-for-age z score (HAZ), weight-for-height z score (WHZ), and weight-for-age z score (WAZ). Positive associations were observed between women's composite empowerment, leadership, maternal DDS and BMI, and female child's DDS. However, opposite signs were found between economic security and child's DDS. Mobility was positively associated with female children's WHZ and male children's HAZ and WAZ, while decision-making was correlated with male child's WHZ and female children's WAZ. Women's empowerment can be associated with undernutrition. Efforts to improve nutrition may benefit from empowerment initiatives that promote women's self-confidence and decision-making in Benin. However, additional qualitative and longitudinal research may enhance understanding of WE in the present area.

  13. Statistical Models for Predicting Threat Detection From Human Behavior.

    PubMed

    Kelley, Timothy; Amon, Mary J; Bertenthal, Bennett I

    2018-01-01

    Users must regularly distinguish between secure and insecure cyber platforms in order to preserve their privacy and safety. Mouse tracking is an accessible, high-resolution measure that can be leveraged to understand the dynamics of perception, categorization, and decision-making in threat detection. Researchers have begun to utilize measures like mouse tracking in cyber security research, including in the study of risky online behavior. However, it remains an empirical question to what extent real-time information about user behavior is predictive of user outcomes and demonstrates added value compared to traditional self-report questionnaires. Participants navigated through six simulated websites, which resembled either secure "non-spoof" or insecure "spoof" versions of popular websites. Websites also varied in terms of authentication level (i.e., extended validation, standard validation, or partial encryption). Spoof websites had modified Uniform Resource Locator (URL) and authentication level. Participants chose to "login" to or "back" out of each website based on perceived website security. Mouse tracking information was recorded throughout the task, along with task performance. After completing the website identification task, participants completed a questionnaire assessing their security knowledge and degree of familiarity with the websites simulated during the experiment. Despite being primed to the possibility of website phishing attacks, participants generally showed a bias for logging in to websites versus backing out of potentially dangerous sites. Along these lines, participant ability to identify spoof websites was around the level of chance. Hierarchical Bayesian logistic models were used to compare the accuracy of two-factor (i.e., website security and encryption level), survey-based (i.e., security knowledge and website familiarity), and real-time measures (i.e., mouse tracking) in predicting risky online behavior during phishing attacks. Participant accuracy in identifying spoof and non-spoof websites was best captured using a model that included real-time indicators of decision-making behavior, as compared to two-factor and survey-based models. Findings validate three widely applicable measures of user behavior derived from mouse tracking recordings, which can be utilized in cyber security and user intervention research. Survey data alone are not as strong at predicting risky Internet behavior as models that incorporate real-time measures of user behavior, such as mouse tracking.

  14. Health-based Provisional Advisory Levels (PALs) for homeland security.

    PubMed

    Adeshina, Femi; Sonich-Mullin, Cynthia; Ross, Robert H; Wood, Carol S

    2009-12-01

    The Homeland Security Presidential Directive #8 (HSPD-8) for National Emergency Preparedness was issued to " establish policies to strengthen the preparedness of the United States to prevent and respond to threatened or actual domestic terrorist attacks, major disasters, and other emergencies by requiring a national domestic all- hazards preparedness goal. "In response to HSPD-8 and HSPD-22 (classified) on Domestic Chemical Defense, the US Environmental Protection Agency (US EPA) National Homeland Security Research Center (NHSRC) is developing health-based Provisional Advisory Levels (PALs) for priority chemicals (including chemical warfare agents, pesticides, and toxic industrial chemicals) in air and drinking water. PALs are temporary values that will neither be promulgated, nor be formally issued as regulatory guidance. They are intended to be used at the discretion of risk managers in emergency situations. The PAL Program provides advisory exposure levels for chemical agents to assist in emergency planning and response decision-making, and to aid in making informed risk management decisions for evacuation, temporary re-entry into affected areas, and resumed-use of infrastructure, such as water resources. These risk management decisions may be made at the federal, state, and local levels. Three exposure levels (PAL 1, PAL 2, and PAL 3), distinguished by severity of toxic effects, are developed for 24-hour, 30-day, 90-day, and 2-year durations for potential exposure to drinking water and ambient air by the general public. Developed PALs are evaluated both by a US EPA working group, and an external multidisciplinary panel to ensure scientific credibility and wide acceptance. In this Special Issue publication, we present background information on the PAL program, the methodology used in deriving PALs, and the technical support documents for the derivation of PALs for acrylonitrile, hydrogen sulfide, and phosgene.

  15. Advanced Simulation and Computing Business Plan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rummel, E.

    To maintain a credible nuclear weapons program, the National Nuclear Security Administration’s (NNSA’s) Office of Defense Programs (DP) needs to make certain that the capabilities, tools, and expert staff are in place and are able to deliver validated assessments. This requires a complete and robust simulation environment backed by an experimental program to test ASC Program models. This ASC Business Plan document encapsulates a complex set of elements, each of which is essential to the success of the simulation component of the Nuclear Security Enterprise. The ASC Business Plan addresses the hiring, mentoring, and retaining of programmatic technical staff responsiblemore » for building the simulation tools of the nuclear security complex. The ASC Business Plan describes how the ASC Program engages with industry partners—partners upon whom the ASC Program relies on for today’s and tomorrow’s high performance architectures. Each piece in this chain is essential to assure policymakers, who must make decisions based on the results of simulations, that they are receiving all the actionable information they need.« less

  16. Cross-Layer Damage Assessment for Cyber Situational Awareness

    NASA Astrophysics Data System (ADS)

    Liu, Peng; Jia, Xiaoqi; Zhang, Shengzhi; Xiong, Xi; Jhi, Yoon-Chan; Bai, Kun; Li, Jason

    Damage assessment plays a very important role in securing enterprise networks and systems. Gaining good awareness about the effects and impact of cyber attack actions would enable security officers to make the right cyber defense decisions and take the right cyber defense actions. A good number of damage assessment techniques have been proposed in the literature, but they typically focus on a single abstraction level (of the software system in concern). As a result, existing damage assessment techniques and tools are still very limited in satisfying the needs of comprehensive damage assessment which should not result in any “blind spots”.

  17. A quantum optical firewall based on simple quantum devices

    NASA Astrophysics Data System (ADS)

    Amellal, H.; Meslouhi, A.; Hassouni, Y.; El Baz, M.

    2015-07-01

    In order to enhance the transmission security in quantum communications via coherent states, we propose a quantum optical firewall device to protect a quantum cryptosystem against eavesdropping through optical attack strategies. Similar to the classical model of the firewall, the proposed device gives legitimate users the possibility of filtering, controlling (input/output states) and making a decision (access or deny) concerning the traveling states. To prove the security and efficiency of the suggested optical firewall, we analyze its performances against the family of intercept and resend attacks, especially against one of the most prominent attack schemes known as "Faked State Attack."

  18. The DUNDRUM-1 structured professional judgment for triage to appropriate levels of therapeutic security: retrospective-cohort validation study

    PubMed Central

    2011-01-01

    Background The assessment of those presenting to prison in-reach and court diversion services and those referred for admission to mental health services is a triage decision, allocating the patient to the appropriate level of therapeutic security. This is a critical clinical decision. We set out to improve on unstructured clinical judgement. We collated qualitative information and devised an 11 item structured professional judgment instrument for this purpose then tested for validity. Methods All those assessed following screening over a three month period at a busy remand committals prison (n = 246) were rated in a retrospective cohort design blind to outcome. Similarly, all those admitted to a mental health service from the same prison in-reach service over an overlapping two year period were rated blind to outcome (n = 100). Results The 11 item scale had good internal consistency (Cronbach's alpha = 0.95) and inter-rater reliability. The scale score did not correlate with the HCR-20 'historical' score. For the three month sample, the receiver operating characteristic area under the curve (AUC) for those admitted to hospital was 0.893 (95% confidence interval 0.843 to 0.943). For the two year sample, AUC distinguished at each level between those admitted to open wards, low secure units or a medium/high secure service. Open wards v low secure units AUC = 0.805 (95% CI 0.680 to 0.930); low secure v medium/high secure AUC = 0.866, (95% CI 0.784 to 0.949). Item to outcome correlations were significant for all 11 items. Conclusions The DUNDRUM-1 triage security scale and its items performed to criterion levels when tested against the real world outcome. This instrument can be used to ensure consistency in decision making when deciding who to admit to secure forensic hospitals. It can also be used to benchmark admission thresholds between services and jurisdictions. In this study we found some divergence between assessed need and actual placement. This provides fertile ground for future research as well as practical assistance in assessing unmet need, auditing case mix and planning care pathways. PMID:21410967

  19. Security and privacy issues in implantable medical devices: A comprehensive survey.

    PubMed

    Camara, Carmen; Peris-Lopez, Pedro; Tapiador, Juan E

    2015-06-01

    Bioengineering is a field in expansion. New technologies are appearing to provide a more efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) constitute one example, these being devices with more computing, decision making and communication capabilities. Several research works in the computer security field have identified serious security and privacy risks in IMDs that could compromise the implant and even the health of the patient who carries it. This article surveys the main security goals for the next generation of IMDs and analyzes the most relevant protection mechanisms proposed so far. On the one hand, the security proposals must have into consideration the inherent constraints of these small and implanted devices: energy, storage and computing power. On the other hand, proposed solutions must achieve an adequate balance between the safety of the patient and the security level offered, with the battery lifetime being another critical parameter in the design phase. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. [Research applications in digital radiology. Big data and co].

    PubMed

    Müller, H; Hanbury, A

    2016-02-01

    Medical imaging produces increasingly complex images (e.g. thinner slices and higher resolution) with more protocols, so that image reading has also become much more complex. More information needs to be processed and usually the number of radiologists available for these tasks has not increased to the same extent. The objective of this article is to present current research results from projects on the use of image data for clinical decision support. An infrastructure that can allow large volumes of data to be accessed is presented. In this way the best performing tools can be identified without the medical data having to leave secure servers. The text presents the results of the VISCERAL and Khresmoi EU-funded projects, which allow the analysis of previous cases from institutional archives to support decision-making and for process automation. The results also represent a secure evaluation environment for medical image analysis. This allows the use of data extracted from past cases to solve information needs occurring when diagnosing new cases. The presented research prototypes allow direct extraction of knowledge from the visual data of the images and to use this for decision support or process automation. Real clinical use has not been tested but several subjective user tests showed the effectiveness and efficiency of the process. The future in radiology will clearly depend on better use of the important knowledge in clinical image archives to automate processes and aid decision-making via big data analysis. This can help concentrate the work of radiologists towards the most important parts of diagnostics.

  1. Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety.

    PubMed

    Sackner-Bernstein, Jonathan

    2017-03-01

    The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware.

  2. Using Trust to Establish a Secure Routing Model in Cognitive Radio Network.

    PubMed

    Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin; Zhang, Dongwen

    2015-01-01

    Specific to the selective forwarding attack on routing in cognitive radio network, this paper proposes a trust-based secure routing model. Through monitoring nodes' forwarding behaviors, trusts of nodes are constructed to identify malicious nodes. In consideration of that routing selection-based model must be closely collaborative with spectrum allocation, a route request piggybacking available spectrum opportunities is sent to non-malicious nodes. In the routing decision phase, nodes' trusts are used to construct available path trusts and delay measurement is combined for making routing decisions. At the same time, according to the trust classification, different responses are made specific to their service requests. By adopting stricter punishment on malicious behaviors from non-trusted nodes, the cooperation of nodes in routing can be stimulated. Simulation results and analysis indicate that this model has good performance in network throughput and end-to-end delay under the selective forwarding attack.

  3. Research on Decision-Making Support of Chineserural Land Tenure Information System

    NASA Astrophysics Data System (ADS)

    Tan, Jun; Su, Hongyou

    Since 1949, the information of land tenure has a positive effect on defining the scope of collective land and state-owned land, implementing the system of cultivated land protection and land use control, designing general land use planning, etc. But as the economic and social development, the existing land tenure information is not appropriate anymore and results in many problems. The emphasis in the near future should be placed on establishing rural land tenure information system including cadastral management system, the uniform property registration system and cadastral management information system, defining the scope and content of various collective land ownership, securing peasants' land tenure rights, shortening the gap between urban and rural areas, all of which will guarantee the effective use of information of land tenure for the government's decision-making.

  4. The Short- to Medium-Term Predictive Accuracy of Static and Dynamic Risk Assessment Measures in a Secure Forensic Hospital

    ERIC Educational Resources Information Center

    Chu, Chi Meng; Thomas, Stuart D. M.; Ogloff, James R. P.; Daffern, Michael

    2013-01-01

    Although violence risk assessment knowledge and practice has advanced over the past few decades, it remains practically difficult to decide which measures clinicians should use to assess and make decisions about the violence potential of individuals on an ongoing basis, particularly in the short to medium term. Within this context, this study…

  5. Machine Learning in the Presence of an Adversary: Attacking and Defending the SpamBayes Spam Filter

    DTIC Science & Technology

    2008-05-20

    Machine learning techniques are often used for decision making in security critical applications such as intrusion detection and spam filtering...filter. The defenses shown in this thesis are able to work against the attacks developed against SpamBayes and are sufficiently generic to be easily extended into other statistical machine learning algorithms.

  6. Identity Theft and Consumer Health Education: A Case Study Teaching the Skill of Decision Making

    ERIC Educational Resources Information Center

    Jefson, Cristy A.

    2007-01-01

    Identity theft is the fastest growing white-collar crime in America, increasing 40% annually. Identity theft occurs when personal-identifying information, such as a social security number, date of birth, or address, is used to commit fraud. From January 1, 2005, to December 31, 2005, 255,565 people in the United States were victims of identity…

  7. Roadmap for K-12 and Postsecondary Linkages: Key Focus Areas to Ensure Quality Implementation. Data for Action

    ERIC Educational Resources Information Center

    Data Quality Campaign, 2014

    2014-01-01

    States rely on data from both the K-12 and postsecondary sectors to inform policy discussions; chart the progress of students, schools, districts, colleges, and the state; pinpoint best practices and areas of need; allocate scarce resources; and make other important education decisions every day. However, states need to securely link limited, but…

  8. 20 CFR 404.348 - When is a child living with me in my care?

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false When is a child living with me in my care? 404.348 Section 404.348 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS... activities and you do not make important decisions about his or her needs, either alone or with help from...

  9. On the Design of a Comprehensive Authorisation Framework for Service Oriented Architecture (SOA)

    DTIC Science & Technology

    2013-07-01

    Authentication Server AZM Authorisation Manager AZS Authorisation Server BP Business Process BPAA Business Process Authorisation Architecture BPAD Business...Internet Protocol Security JAAS Java Authentication and Authorisation Service MAC Mandatory Access Control RBAC Role Based Access Control RCA Regional...the authentication process, make authorisation decisions using application specific access control functions that results in the practice of

  10. Method of calculation of critical values of financial indicators for developing food security strategy

    NASA Astrophysics Data System (ADS)

    Aigyl Ilshatovna, Sabirova; Svetlana Fanilevna, Khasanova; Vildanovna, Nagumanova Regina

    2018-05-01

    On the basis of decision making theory (minimax and maximin approaches) the authors propose a technique with the results of calculations of the critical values of effectiveness indicators of agricultural producers in the Republic of Tatarstan for 2013-2015. There is justified necessity of monitoring the effectiveness of the state support and the direction of its improvement.

  11. Evidence and Options for Informed Decision-Making to Achive Arctic Sustainability

    NASA Astrophysics Data System (ADS)

    Berkman, P. A.

    2017-12-01

    This presentation will consider the development of evidence and options for informed decision-making that will need to operate across generations to achieve Arctic sustainability (Figure). Context of these Arctic decisions is global, recognizing that we live in an interconnected civilization on a planetary scale, as revealed unambiguously with evidence from the `world' wars in the first half of the 20thcentury. First, for clarification, data and evidence are not the same. Data is generated from information and observations to answer specific questions, posed with methods from the natural and social sciences as well as indigenous knowledge. These data reveal patterns and trends in our societies and natural world, underscoring the evidence for decisions to address impacts, issues and resources within, across and beyond the boundaries of nations - recognizing that nations still are the principal jurisdictional unit. However, for this decision-support process to be effective, options (without advocacy) - which can be used or ignored explicitly - must be generated from the evidence, taking into consideration stakeholder perspectives and governance records in a manner that will contribute to informed decision-making. The resulting decisions will involve built elements that require capitalization and technology as well as governance mechanisms coming from diverse jurisdictional authorities. The innovation required is to balance economic prosperity, environmental protection and societal well-being. These three pillars of sustainability further involve stability, balancing urgencies of the moment and of future generations, recognizing that children born today will be alive in the 22nd century. Consequently, options for informed decisions must operate across a continuum of urgencies from security time scales to sustainability time scales. This decision-support process is holistic (international, interdisciplinary and inclusive), reflecting the applications of science diplomacy to balance national interests and common interests for the benefit of all on Earth.

  12. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium.

    PubMed

    Somasundaram, M; Sivakumar, R

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security.

  13. 6 CFR 27.330 - Summary decision procedures.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Summary decision procedures. 27.330 Section 27.330 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.330 Summary decision procedures. (a) The Presiding Officer...

  14. 6 CFR 27.330 - Summary decision procedures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Summary decision procedures. 27.330 Section 27.330 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.330 Summary decision procedures. (a) The Presiding Officer...

  15. 6 CFR 27.330 - Summary decision procedures.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Summary decision procedures. 27.330 Section 27.330 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.330 Summary decision procedures. (a) The Presiding Officer...

  16. 6 CFR 27.330 - Summary decision procedures.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Summary decision procedures. 27.330 Section 27.330 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.330 Summary decision procedures. (a) The Presiding Officer...

  17. 6 CFR 27.330 - Summary decision procedures.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Summary decision procedures. 27.330 Section 27.330 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Orders and Adjudications § 27.330 Summary decision procedures. (a) The Presiding Officer...

  18. Efforts to secure universal access to HIV/AIDS treatment: a comparison of BRICS countries.

    PubMed

    Sun, Jing; Boing, Alexandra Crispim; Silveira, Marysabel P T; Bertoldi, Andréa D; Ziganshina, Liliya E; Khaziakhmetova, Veronica N; Khamidulina, Rashida M; Chokshi, Maulik R; McGee, Shelley; Suleman, Fatima

    2014-02-01

    This article illustrates how the BRICS countries have been building their focused leadership, making important high level commitment and national policy changes, and improving their health systems, in addressing the HIV/AIDS epidemics in respective settings. Specific aspects are focused on efforts of creating public provisions to secure universal access to ARVs from the aspects of active responsive system and national program, health system strengthening, fostering local production of ARVs, supply chain management, and information system strengthening. Challenges in each BRICS country are analyzed respectively. The most important contributors to the success of response to HIV/AIDS include: creating legal basis for healthcare as a fundamental human right; political commitment to necessary funding for universal access and concrete actions to secure equal quality care; comprehensive system to secure demands that all people in need are capable of accessing prevention, treatment and care; active community involvement; decentralization of the management system considering the local settings; integration of treatment and prevention; taking horizontal approach to strengthen health systems; fully use of the TRIPS flexibility; and regular monitoring and evaluation to serve evidence based decision making. © 2013 Chinese Cochrane Center, West China Hospital of Sichuan University and Wiley Publishing Asia Pty Ltd.

  19. AgriSense-STARS: Advancing Methods of Agricultural Monitoring for Food Security in Smallholder Regions - the Case for Tanzania

    NASA Astrophysics Data System (ADS)

    Dempewolf, J.; Becker-Reshef, I.; Nakalembe, C. L.; Tumbo, S.; Maurice, S.; Mbilinyi, B.; Ntikha, O.; Hansen, M.; Justice, C. J.; Adusei, B.; Kongo, V.

    2015-12-01

    In-season monitoring of crop conditions provides critical information for agricultural policy and decision making and most importantly for food security planning and management. Nationwide agricultural monitoring in countries dominated by smallholder farming systems, generally relies on extensive networks of field data collectors. In Tanzania, extension agents make up this network and report on conditions across the country, approaching a "near-census". Data is collected on paper which is resource and time intensive, as well as prone to errors. Data quality is ambiguous and there is a general lack of clear and functional feedback loops between farmers, extension agents, analysts and decision makers. Moreover, the data are not spatially explicit, limiting the usefulness for analysis and quality of policy outcomes. Despite significant advances in remote sensing and information communication technologies (ICT) for monitoring agriculture, the full potential of these new tools is yet to be realized in Tanzania. Their use is constrained by the lack of resources, skills and infrastructure to access and process these data. The use of ICT technologies for data collection, processing and analysis is equally limited. The AgriSense-STARS project is developing and testing a system for national-scale in-season monitoring of smallholder agriculture using a combination of three main tools, 1) GLAM-East Africa, an automated MODIS satellite image processing system, 2) field data collection using GeoODK and unmanned aerial vehicles (UAVs), and 3) the Tanzania Crop Monitor, a collaborative online portal for data management and reporting. These tools are developed and applied in Tanzania through the National Food Security Division of the Ministry of Agriculture, Food Security and Cooperatives (MAFC) within a statistically representative sampling framework (area frame) that ensures data quality, representability and resource efficiency.

  20. Feasibility of a novel participatory multi-sector continuous improvement approach to enhance food security in remote Indigenous Australian communities.

    PubMed

    Brimblecombe, J; Bailie, R; van den Boogaard, C; Wood, B; Liberato, S C; Ferguson, M; Coveney, J; Jaenke, R; Ritchie, J

    2017-12-01

    Food insecurity underlies and compounds many of the development issues faced by remote Indigenous communities in Australia. Multi-sector approaches offer promise to improve food security. We assessed the feasibility of a novel multi-sector approach to enhance community food security in remote Indigenous Australia. A longitudinal comparative multi-site case study, the Good Food Systems Good Food for All Project, was conducted (2009-2013) with four Aboriginal communities. Continuous improvement meetings were held in each community. Data from project documents and store sales were used to assess feasibility according to engagement, uptake and sustainability of action, and impact on community diet, as well as identifying conditions facilitating or hindering these. Engagement was established where: the community perceived a need for the approach; where trust was developed between the community and facilitators; where there was community stability; and where flexibility was applied in the timing of meetings. The approach enabled stakeholders in each community to collectively appraise the community food system and plan action. Actions that could be directly implemented within available resources resulted from developing collaborative capacity. Actions requiring advocacy, multi-sectoral involvement, commitment or further resources were less frequently used. Positive shifts in community diet were associated with key areas where actions were implemented. A multi-sector participatory approach seeking continuous improvement engaged committed Aboriginal and non-Aboriginal stakeholders and was shown to have potential to shift community diet. Provision of clear mechanisms to link this approach with higher level policy and decision-making structures, clarity of roles and responsibilities, and processes to prioritise and communicate actions across sectors should further strengthen capacity for food security improvement. Integrating this approach enabling local decision-making into community governance structures with adequate resourcing is an imperative.

  1. CHAMPION: Intelligent Hierarchical Reasoning Agents for Enhanced Decision Support

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hohimer, Ryan E.; Greitzer, Frank L.; Noonan, Christine F.

    2011-11-15

    We describe the design and development of an advanced reasoning framework employing semantic technologies, organized within a hierarchy of computational reasoning agents that interpret domain specific information. Designed based on an inspirational metaphor of the pattern recognition functions performed by the human neocortex, the CHAMPION reasoning framework represents a new computational modeling approach that derives invariant knowledge representations through memory-prediction belief propagation processes that are driven by formal ontological language specification and semantic technologies. The CHAMPION framework shows promise for enhancing complex decision making in diverse problem domains including cyber security, nonproliferation and energy consumption analysis.

  2. The myth of secure computing.

    PubMed

    Austin, Robert D; Darby, Christopher A

    2003-06-01

    Few senior executives pay a whole lot of attention to computer security. They either hand off responsibility to their technical people or bring in consultants. But given the stakes involved, an arm's-length approach is extremely unwise. According to industry estimates, security breaches affect 90% of all businesses every year and cost some $17 billion. Fortunately, the authors say, senior executives don't need to learn about the more arcane aspects of their company's IT systems in order to take a hands-on approach. Instead, they should focus on the familiar task of managing risk. Their role should be to assess the business value of their information assets, determine the likelihood that those assets will be compromised, and then tailor a set of risk abatement processes to their company's particular vulnerabilities. This approach, which views computer security as an operational rather than a technical challenge, is akin to a classic quality assurance program in that it attempts to avoid problems rather than fix them and involves all employees, not just IT staffers. The goal is not to make computer systems completely secure--that's impossible--but to reduce the business risk to an acceptable level. This article looks at the types of threats a company is apt to face. It also examines the processes a general manager should spearhead to lessen the likelihood of a successful attack. The authors recommend eight processes in all, ranging from deciding how much protection each digital asset deserves to insisting on secure software to rehearsing a response to a security breach. The important thing to realize, they emphasize, is that decisions about digital security are not much different from other cost-benefit decisions. The tools general managers bring to bear on other areas of the business are good models for what they need to do in this technical space.

  3. 6 CFR 13.38 - Reconsideration of Initial Decision.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Reconsideration of Initial Decision. 13.38 Section 13.38 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.38 Reconsideration of Initial Decision. (a) Except as provided in paragraph (d) of...

  4. Framing health and foreign policy: lessons for global health diplomacy.

    PubMed

    Labonté, Ronald; Gagnon, Michelle L

    2010-08-22

    Global health financing has increased dramatically in recent years, indicative of a rise in health as a foreign policy issue. Several governments have issued specific foreign policy statements on global health and a new term, global health diplomacy, has been coined to describe the processes by which state and non-state actors engage to position health issues more prominently in foreign policy decision-making. Their ability to do so is important to advancing international cooperation in health. In this paper we review the arguments for health in foreign policy that inform global health diplomacy. These are organized into six policy frames: security, development, global public goods, trade, human rights and ethical/moral reasoning. Each of these frames has implications for how global health as a foreign policy issue is conceptualized. Differing arguments within and between these policy frames, while overlapping, can also be contradictory. This raises an important question about which arguments prevail in actual state decision-making. This question is addressed through an analysis of policy or policy-related documents and academic literature pertinent to each policy framing with some assessment of policy practice. The reference point for this analysis is the explicit goal of improving global health equity. This goal has increasing national traction within national public health discourse and decision-making and, through the Millennium Development Goals and other multilateral reports and declarations, is entering global health policy discussion. Initial findings support conventional international relations theory that most states, even when committed to health as a foreign policy goal, still make decisions primarily on the basis of the 'high politics' of national security and economic material interests. Development, human rights and ethical/moral arguments for global health assistance, the traditional 'low politics' of foreign policy, are present in discourse but do not appear to dominate practice. While political momentum for health as a foreign policy goal persists, the framing of this goal remains a contested issue. The analysis offered in this article may prove helpful to those engaged in global health diplomacy or in efforts to have global governance across a range of sectoral interests pay more attention to health equity impacts.

  5. Framing health and foreign policy: lessons for global health diplomacy

    PubMed Central

    2010-01-01

    Global health financing has increased dramatically in recent years, indicative of a rise in health as a foreign policy issue. Several governments have issued specific foreign policy statements on global health and a new term, global health diplomacy, has been coined to describe the processes by which state and non-state actors engage to position health issues more prominently in foreign policy decision-making. Their ability to do so is important to advancing international cooperation in health. In this paper we review the arguments for health in foreign policy that inform global health diplomacy. These are organized into six policy frames: security, development, global public goods, trade, human rights and ethical/moral reasoning. Each of these frames has implications for how global health as a foreign policy issue is conceptualized. Differing arguments within and between these policy frames, while overlapping, can also be contradictory. This raises an important question about which arguments prevail in actual state decision-making. This question is addressed through an analysis of policy or policy-related documents and academic literature pertinent to each policy framing with some assessment of policy practice. The reference point for this analysis is the explicit goal of improving global health equity. This goal has increasing national traction within national public health discourse and decision-making and, through the Millennium Development Goals and other multilateral reports and declarations, is entering global health policy discussion. Initial findings support conventional international relations theory that most states, even when committed to health as a foreign policy goal, still make decisions primarily on the basis of the 'high politics' of national security and economic material interests. Development, human rights and ethical/moral arguments for global health assistance, the traditional 'low politics' of foreign policy, are present in discourse but do not appear to dominate practice. While political momentum for health as a foreign policy goal persists, the framing of this goal remains a contested issue. The analysis offered in this article may prove helpful to those engaged in global health diplomacy or in efforts to have global governance across a range of sectoral interests pay more attention to health equity impacts. PMID:20727211

  6. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  7. The Forensic Confirmation Bias: A Comparison Between Experts and Novices.

    PubMed

    van den Eeden, Claire A J; de Poot, Christianne J; van Koppen, Peter J

    2018-05-17

    A large body of research has described the influence of context information on forensic decision-making. In this study, we examined the effect of context information on the search for and selection of traces by students (N = 36) and crime scene investigators (N = 58). Participants investigated an ambiguous mock crime scene and received prior information indicating suicide, a violent death or no information. Participants described their impression of the scene and wrote down which traces they wanted to secure. Results showed that context information impacted first impression of the scene and crime scene behavior, namely number of traces secured. Participants in the murder condition secured most traces. Furthermore, the students secured more crime-related traces. Students were more confident in their first impression. This study does not indicate that experts outperform novices. We therefore argue for proper training on cognitive processes as an integral part of all forensic education. © 2018 American Academy of Forensic Sciences.

  8. My, your and our needs for safety and security: relatives' reflections on using information and communication technology in dementia care.

    PubMed

    Olsson, Annakarin; Engström, Maria; Skovdahl, Kirsti; Lampic, Claudia

    2012-03-01

    The present paper reports on a study aimed at describing relatives' reflections on different kinds of information and communication technology (ICT) devices that are used or can be used in the daily care of persons with dementia. Many persons with dementia continue living in their own homes, which requires the support of their relatives. One way to meet the needs of relatives and persons with dementia is to use ICT. An interview study was conducted in Sweden (2007-2008) with a purposive sample of 14 spouses of a person with dementia. Qualitative content analysis was used to identify categories and themes in the data. Relatives' reflections on the use of ICT were described as ICT - a support in daily life, ICT - internal and external conditions and ICT - the decision to use or not use. Based on these categories, a theme was revealed: shifting between different perspectives: my, your and our needs for safety and security. Relatives struggle to create a situation of safety and security in daily life for themselves and the persons with dementia. ICT devices with the right functionality and used at the right time are regarded as useful in solving everyday problems. In the decision to use or not use ICT, the opportunity to create a safe and secure environment overshadows potential ethical problems. Providing early information about ICT to persons with dementia and their relatives could facilitate joint decision-making regarding use of ICT. © 2011 The Authors. Scandinavian Journal of Caring Sciences © 2011 Nordic College of Caring Science.

  9. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    PubMed

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  10. [Improvement of controlling system by a separated medical unit of special purpose].

    PubMed

    Shelepov, A M; Savchenko, I F; Zhidik, V V; Gogolevskiĭ, A S

    2009-11-01

    The article presents a variant securing of field treatment institutes by mobile command points in combination with creation of automated system of control of a separated medical unit of special purpose and improvement of communications devices, computing and relaying of data. Such improvement of system of control permits to solve governmental tasks and make decision more effective, spending less time.

  11. National Security Space Launch Report

    DTIC Science & Technology

    2006-01-01

    fielding a radical breakthrough in space launch during the next 15 years. We uncovered no evidence that such a breakthrough would emerge before 2020...to the NSS launch architecture as the two families mature and knowledge is gained that will be vital to EELV decisions. Anticipating that near ...procured these systems on a commercial basis, making insight into their design and development limited compared with programs intended for near

  12. Allegiance: Egypt Security Forces

    DTIC Science & Technology

    2013-12-01

    precept that humans are self -interested, an inherent trait of human nature; elements of rational choice theory developed from this initial frame...rebellious collective action.18 This illustrates the impact of the greater collective good, valued at times above an actor’s self -interest, which gained...in a particular manner which is difficult to fit into a self -interest niche. Utility theory’s rationale removes feeling from the decision making

  13. Serbia and the NATO Partnership for Peace Program

    DTIC Science & Technology

    2008-03-01

    Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management ...For the first time, principles for democratic control of the military were established and clearly stated in the constitutional text and the tasks...book announced all principles driving the decision making process in Serbia related to national security and defense. The defense budget procedures

  14. Challenges in Computational Social Modeling and Simulation for National Security Decision Making

    DTIC Science & Technology

    2011-06-01

    This study is grounded within a system-activity theory , a logico-philosophical model of interdisciplinary research [13, 14], the concepts of social...often a difficult challenge. Ironically, social science research methods , such as ethnography , may be tremendously helpful in designing these...social sciences. Moreover, CSS projects draw on knowledge and methods from other fields of study , including graph theory , information visualization

  15. The Role of Metaphors in Fostering Macrocognitive Processes in Distributed Teams

    DTIC Science & Technology

    2012-07-30

    temporal dynamics, and storytelling towards the goal of improving team coordination and performance in distributed decision making teams. Specifically...better reflect the context of organizational and military teams and 3) to investigate how storytelling (complex form of metaphor) can be used as a...Information Sharing, Situation Awareness, Storytelling , Metaphors, Reflexivity.Team Simulation, NeoCITIES 16. SECURITY CLASSIFICATION OF: a. REPORT b

  16. Evaluation of water security in Jordan using a multi-agent, hydroeconomic model: Initial model results from the Jordan Water Project

    NASA Astrophysics Data System (ADS)

    Yoon, J.; Klassert, C. J. A.; Lachaut, T.; Selby, P. D.; Knox, S.; Gorelick, S.; Rajsekhar, D.; Tilmant, A.; Avisse, N.; Harou, J. J.; Medellin-Azuara, J.; Gawel, E.; Klauer, B.; Mustafa, D.; Talozi, S.; Sigel, K.; Zhang, H.

    2016-12-01

    Our work focuses on development of a multi-agent, hydroeconomic model for water policy evaluation in Jordan. Jordan ranks among the most water-scarce countries in the world, a situation exacerbated due to a recent influx of refugees escaping the ongoing civil war in neighboring Syria. The modular, multi-agent model is used to evaluate interventions for enhancing Jordan's water security, integrating biophysical modules that simulate natural and engineered phenomena with human modules that represent behavior at multiple levels of decision making. The hydrologic modules are developed using spatially-distributed groundwater and surface water models, which are translated into compact simulators for efficient integration into the multi-agent model. For the multi-agent model, we explicitly account for human agency at multiple levels of decision making, with agents representing riparian, management, supplier, and water user groups. Human agents are implemented as autonomous entities in the model that make decisions in relation to one another and in response to hydrologic and socioeconomic conditions. The integrated model is programmed in Python using Pynsim, a generalizable, open-source object-oriented software framework for modeling network-based water resource systems. The modeling time periods include historical (2006-2014) and future (present-2050) time spans. For the historical runs, the model performance is validated against historical data for several observations that reflect the interacting dynamics of both the hydrologic and human components of the system. A historical counterfactual scenario is also constructed to isolate and identify the impacts of the recent Syrian civil war and refugee crisis on Jordan's water system. For the future period, model runs are conducted to evaluate potential supply, demand, and institutional interventions over a wide range of plausible climate and socioeconomic scenarios. In addition, model sensitivity analysis is conducted revealing the hydrologic and human aspects of the system that most strongly influence water security outcomes, providing insight into coupled human-water system dynamics as well as priority areas of focus for continued model improvement.

  17. Learning from the Past, Looking to the Future: Modeling Social Unrest in Karachi, Pakistan

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Olson, Jarrod; Kurzrok, Andrew J.; Hund, Gretchen

    Social unrest represents a major challenge for policy makers around the globe, as it can quickly escalate from small scale disturbances to highly public protests, riots and even civil war. This research was motivated by a need to understand social instability and to unpack the comments made during a spring 2013 conference hosted by Pacific Northwest National Laboratory’s Center for Global Security and the U.S. Institute for Peace, where policymakers noted that models considering social instability are often not suitable for decision-making. This analysis shows that existing state level models of instability could be improved in spatial scale to themore » city level, even without significantly improved data access. Better data would make this analysis more complete and likely improve the quality of the model. Another challenge with incorporating modeling into decision-making is the need to understand uncertainty in a model. Policy makers are frequently tasked with making decisions without a clear outcome, so characterization of uncertainty is critical. This report describes the work and findings of the project. It took place in three phases: a literature review of social stability research, a “hindsight scan” that looked at historical data, and a “foresight scan” looking at future scenarios.« less

  18. [How much knowledge do health insurance companies need to make reimbursement decisions?].

    PubMed

    Pfeiffer, Doris

    2009-01-01

    Health insurance companies play a very significant role in the sociopolitical context. It is their responsibility to meet the demands of modern health services delivery, while at the same time limited financial resources need to be considered. Difficult decisions have to be made which must take into account the needs of the insured party as well as the healthcare situation and oncoming possibilities. Health insurance companies rely on secure knowledge with a high level of evidence to justify their decisions in a collectively funded healthcare system. Where the elimination of knowledge gaps is not related to the expectation of profit on the part of potential providers of medical services, procedures or products the funding of high-quality studies should be considered.

  19. Accurate decisions in an uncertain world: collective cognition increases true positives while decreasing false positives.

    PubMed

    Wolf, Max; Kurvers, Ralf H J M; Ward, Ashley J W; Krause, Stefan; Krause, Jens

    2013-04-07

    In a wide range of contexts, including predator avoidance, medical decision-making and security screening, decision accuracy is fundamentally constrained by the trade-off between true and false positives. Increased true positives are possible only at the cost of increased false positives; conversely, decreased false positives are associated with decreased true positives. We use an integrated theoretical and experimental approach to show that a group of decision-makers can overcome this basic limitation. Using a mathematical model, we show that a simple quorum decision rule enables individuals in groups to simultaneously increase true positives and decrease false positives. The results from a predator-detection experiment that we performed with humans are in line with these predictions: (i) after observing the choices of the other group members, individuals both increase true positives and decrease false positives, (ii) this effect gets stronger as group size increases, (iii) individuals use a quorum threshold set between the average true- and false-positive rates of the other group members, and (iv) individuals adjust their quorum adaptively to the performance of the group. Our results have broad implications for our understanding of the ecology and evolution of group-living animals and lend themselves for applications in the human domain such as the design of improved screening methods in medical, forensic, security and business applications.

  20. Accurate decisions in an uncertain world: collective cognition increases true positives while decreasing false positives

    PubMed Central

    Wolf, Max; Kurvers, Ralf H. J. M.; Ward, Ashley J. W.; Krause, Stefan; Krause, Jens

    2013-01-01

    In a wide range of contexts, including predator avoidance, medical decision-making and security screening, decision accuracy is fundamentally constrained by the trade-off between true and false positives. Increased true positives are possible only at the cost of increased false positives; conversely, decreased false positives are associated with decreased true positives. We use an integrated theoretical and experimental approach to show that a group of decision-makers can overcome this basic limitation. Using a mathematical model, we show that a simple quorum decision rule enables individuals in groups to simultaneously increase true positives and decrease false positives. The results from a predator-detection experiment that we performed with humans are in line with these predictions: (i) after observing the choices of the other group members, individuals both increase true positives and decrease false positives, (ii) this effect gets stronger as group size increases, (iii) individuals use a quorum threshold set between the average true- and false-positive rates of the other group members, and (iv) individuals adjust their quorum adaptively to the performance of the group. Our results have broad implications for our understanding of the ecology and evolution of group-living animals and lend themselves for applications in the human domain such as the design of improved screening methods in medical, forensic, security and business applications. PMID:23407830

  1. Design of Hack-Resistant Diabetes Devices and Disclosure of Their Cyber Safety

    PubMed Central

    Sackner-Bernstein, Jonathan

    2017-01-01

    Background: The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware. PMID:27837161

  2. Text messaging to communicate with public health audiences: how the HIPAA Security Rule affects practice.

    PubMed

    Karasz, Hilary N; Eiden, Amy; Bogan, Sharon

    2013-04-01

    Text messaging is a powerful communication tool for public health purposes, particularly because of the potential to customize messages to meet individuals' needs. However, using text messaging to send personal health information requires analysis of laws addressing the protection of electronic health information. The Health Insurance Portability and Accountability Act (HIPAA) Security Rule is written with flexibility to account for changing technologies. In practice, however, the rule leads to uncertainty about how to make text messaging policy decisions. Text messaging to send health information can be implemented in a public health setting through 2 possible approaches: restructuring text messages to remove personal health information and retaining limited personal health information in the message but conducting a risk analysis and satisfying other requirements to meet the HIPAA Security Rule.

  3. 76 FR 65366 - Amendments to Procedures for Certain Determinations and Decisions

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-10-21

    ... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2007-0092] RIN 0960-AG72 Amendments to Procedures for Certain Determinations and Decisions AGENCY: Social Security Administration... CONTACT: Joshua Silverman, Office of Regulations, Social Security Administration, 6401 Security Boulevard...

  4. Dying well with reduced agency: a scoping review and thematic synthesis of the decision-making process in dementia, traumatic brain injury and frailty.

    PubMed

    Birchley, Giles; Jones, Kerry; Huxtable, Richard; Dixon, Jeremy; Kitzinger, Jenny; Clare, Linda

    2016-07-27

    In most Anglophone nations, policy and law increasingly foster an autonomy-based model, raising issues for large numbers of people who fail to fit the paradigm, and indicating problems in translating practical and theoretical understandings of 'good death' to policy. Three exemplar populations are frail older people, people with dementia and people with severe traumatic brain injury. We hypothesise that these groups face some over-lapping challenges in securing good end-of-life care linked to their limited agency. To better understand these challenges, we conducted a scoping review and thematic synthesis. To capture a range of literature, we followed established scoping review methods. We then used thematic synthesis to describe the broad themes emerging from this literature. Initial searches generated 22,375 references, and screening yielded 49, highly heterogeneous, studies that met inclusion criteria, encompassing 12 countries and a variety of settings. The thematic synthesis identified three themes: the first concerned the processes of end-of-life decision-making, highlighting the ambiguity of the dominant shared decision-making process, wherein decisions are determined by families or doctors, sometimes explicitly marginalising the antecedent decisions of patients. Despite this marginalisation, however, the patient does play a role both as a social presence and as an active agent, by whose actions the decisions of those with authority are influenced. The second theme examined the tension between predominant notions of a good death as 'natural' and the drive to medicalise death through the lens of the experiences and actions of those faced with the actuality of death. The final theme considered the concept of antecedent end-of-life decision-making (in all its forms), its influence on policy and decision-making, and some caveats that arise from the studies. Together these three themes indicate a number of directions for future research, which are likely to be applicable to other conditions that result in reduced agency. Above all, this review emphasises the need for new concepts and fresh approaches to end of life decision-making that address the needs of the growing population of frail older people, people with dementia and those with severe traumatic brain injury.

  5. The Influence of Future Command, Control, Communications, and Computers (C4) on Doctrine and the Operational Commander's Decision-Making Process

    NASA Technical Reports Server (NTRS)

    Mayer, Michael G.

    1996-01-01

    Future C4 systems will alter the traditional balance between force and information, having a profound influence on doctrine and the operational commander's decision making process. The Joint Staff's future vision of C4 is conceptualized in 'C4I for the Warrior' which envisions a joint C4I architecture providing timely sensor to shoot information direct to the warfighter. C4 system must manage and filter an overwhelming amount of information; deal with interoperability issues; overcome technological limitations; meet emerging security requirements; and protect against 'Information Warfare.' Severe budget constraints necessitate unified control of C4 systems under singular leadership for the common good of all the services. In addition, acquisition policy and procedures must be revamped to allow new technologies to be fielded quickly; and the commercial marketplace will become the preferred starting point for modernization. Flatter command structures are recommended in this environment where information is available instantaneously. New responsibilities for decision making at lower levels are created. Commanders will have to strike a balance between exerting greater control and allowing subordinates enough flexibility to maintain initiative. Clearly, the commander's intent remains the most important tool in striking this balance.

  6. Statistical Models for Predicting Threat Detection From Human Behavior

    PubMed Central

    Kelley, Timothy; Amon, Mary J.; Bertenthal, Bennett I.

    2018-01-01

    Users must regularly distinguish between secure and insecure cyber platforms in order to preserve their privacy and safety. Mouse tracking is an accessible, high-resolution measure that can be leveraged to understand the dynamics of perception, categorization, and decision-making in threat detection. Researchers have begun to utilize measures like mouse tracking in cyber security research, including in the study of risky online behavior. However, it remains an empirical question to what extent real-time information about user behavior is predictive of user outcomes and demonstrates added value compared to traditional self-report questionnaires. Participants navigated through six simulated websites, which resembled either secure “non-spoof” or insecure “spoof” versions of popular websites. Websites also varied in terms of authentication level (i.e., extended validation, standard validation, or partial encryption). Spoof websites had modified Uniform Resource Locator (URL) and authentication level. Participants chose to “login” to or “back” out of each website based on perceived website security. Mouse tracking information was recorded throughout the task, along with task performance. After completing the website identification task, participants completed a questionnaire assessing their security knowledge and degree of familiarity with the websites simulated during the experiment. Despite being primed to the possibility of website phishing attacks, participants generally showed a bias for logging in to websites versus backing out of potentially dangerous sites. Along these lines, participant ability to identify spoof websites was around the level of chance. Hierarchical Bayesian logistic models were used to compare the accuracy of two-factor (i.e., website security and encryption level), survey-based (i.e., security knowledge and website familiarity), and real-time measures (i.e., mouse tracking) in predicting risky online behavior during phishing attacks. Participant accuracy in identifying spoof and non-spoof websites was best captured using a model that included real-time indicators of decision-making behavior, as compared to two-factor and survey-based models. Findings validate three widely applicable measures of user behavior derived from mouse tracking recordings, which can be utilized in cyber security and user intervention research. Survey data alone are not as strong at predicting risky Internet behavior as models that incorporate real-time measures of user behavior, such as mouse tracking. PMID:29713296

  7. Risk Assessment Overview

    NASA Technical Reports Server (NTRS)

    Prassinos, Peter G.; Lyver, John W., IV; Bui, Chinh T.

    2011-01-01

    Risk assessment is used in many industries to identify and manage risks. Initially developed for use on aeronautical and nuclear systems, risk assessment has been applied to transportation, chemical, computer, financial, and security systems among others. It is used to gain an understanding of the weaknesses or vulnerabilities in a system so modification can be made to increase operability, efficiency, and safety and to reduce failure and down-time. Risk assessment results are primary inputs to risk-informed decision making; where risk information including uncertainty is used along with other pertinent information to assist management in the decision-making process. Therefore, to be useful, a risk assessment must be directed at specific objectives. As the world embraces the globalization of trade and manufacturing, understanding the associated risk become important to decision making. Applying risk assessment techniques to a global system of development, manufacturing, and transportation can provide insight into how the system can fail, the likelihood of system failure and the consequences of system failure. The risk assessment can identify those elements that contribute most to risk and identify measures to prevent and mitigate failures, disruptions, and damaging outcomes. In addition, risk associated with public and environment impact can be identified. The risk insights gained can be applied to making decisions concerning suitable development and manufacturing locations, supply chains, and transportation strategies. While risk assessment has been mostly applied to mechanical and electrical systems, the concepts and techniques can be applied across other systems and activities. This paper provides a basic overview of the development of a risk assessment.

  8. A Layered Decision Model for Cost-Effective System Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wei, Huaqiang; Alves-Foss, James; Soule, Terry

    System security involves decisions in at least three areas: identification of well-defined security policies, selection of cost-effective defence strategies, and implementation of real-time defence tactics. Although choices made in each of these areas affect the others, existing decision models typically handle these three decision areas in isolation. There is no comprehensive tool that can integrate them to provide a single efficient model for safeguarding a network. In addition, there is no clear way to determine which particular combinations of defence decisions result in cost-effective solutions. To address these problems, this paper introduces a Layered Decision Model (LDM) for use inmore » deciding how to address defence decisions based on their cost-effectiveness. To validate the LDM and illustrate how it is used, we used simulation to test model rationality and applied the LDM to the design of system security for an e-commercial business case.« less

  9. [Public health stewardship and governance regarding the Colombian healthcare system, 2012-2013].

    PubMed

    Roth-Deubel, André N; Molina-Marín, Gloria

    2013-01-01

    Analysing decision-making concerning public health issues regarding the Colombian healthcare system from a market economy-based approach. This study involved applying Glaser and Strauss's grounded theory in six Colombian cities during 2012: Bogotá, Barranquilla, Bucaramanga, Leticia, Medellin and Pasto. 120 individual interviews were conducted with professionals involved in decision-making, running public healthcare programmes and making policy within public and private institutions. Fourteen focus groups were held with community organisation leaders. The findings suggested national and municipal health authorities' weak stewardship and ineffective governance regarding public healthcare policy and programmes, related to a lack of staff trained in public health management issues. In turn, this was related to political parties' interference and private insurers' particular interests and the structural fragmentation of functions and actors within the health system, thereby limiting public health development. A new axiology is necessary for achieving effective governance (I.e. cooperation between Colombian Healthcare Social Security System actors) to overcome current incompetence and financial self-interest predominating within the Colombian healthcare system.

  10. Physical design correlates of efficiency and safety in emergency departments: a qualitative examination.

    PubMed

    Pati, Debajyoti; Harvey, Thomas E; Pati, Sipra

    2014-01-01

    The objective of this study was to explore and identify physical design correlates of safety and efficiency in emergency department (ED) operations. This study adopted an exploratory, multimeasure approach to (1) examine the interactions between ED operations and physical design at 4 sites and (2) identify domains of physical design decision-making that potentially influence efficiency and safety. Multidisciplinary gaming and semistructured interviews were conducted with stakeholders at each site. Study data suggest that 16 domains of physical design decisions influence safety, efficiency, or both. These include (1) entrance and patient waiting, (2) traffic management, (3) subwaiting or internal waiting areas, (4) triage, (5) examination/treatment area configuration, (6) examination/treatment area centralization versus decentralization, (7) examination/treatment room standardization, (8) adequate space, (9) nurse work space, (10) physician work space, (11) adjacencies and access, (12) equipment room, (13) psych room, (14) staff de-stressing room, (15) hallway width, and (16) results waiting area. Safety and efficiency from a physical environment perspective in ED design are mutually reinforcing concepts--enhancing efficiency bears positive implications for safety. Furthermore, safety and security emerged as correlated concepts, with security issues bearing implications for safety, thereby suggesting important associations between safety, security, and efficiency.

  11. Natural capital and ecosystem services informing decisions: From promise to practice

    PubMed Central

    Guerry, Anne D.; Polasky, Stephen; Lubchenco, Jane; Chaplin-Kramer, Rebecca; Daily, Gretchen C.; Griffin, Robert; Ruckelshaus, Mary; Bateman, Ian J.; Duraiappah, Anantha; Elmqvist, Thomas; Feldman, Marcus W.; Folke, Carl; Hoekstra, Jon; Kareiva, Peter M.; Keeler, Bonnie L.; Li, Shuzhuo; McKenzie, Emily; Ouyang, Zhiyun; Reyers, Belinda; Ricketts, Taylor H.; Rockström, Johan; Tallis, Heather; Vira, Bhaskar

    2015-01-01

    The central challenge of the 21st century is to develop economic, social, and governance systems capable of ending poverty and achieving sustainable levels of population and consumption while securing the life-support systems underpinning current and future human well-being. Essential to meeting this challenge is the incorporation of natural capital and the ecosystem services it provides into decision-making. We explore progress and crucial gaps at this frontier, reflecting upon the 10 y since the Millennium Ecosystem Assessment. We focus on three key dimensions of progress and ongoing challenges: raising awareness of the interdependence of ecosystems and human well-being, advancing the fundamental interdisciplinary science of ecosystem services, and implementing this science in decisions to restore natural capital and use it sustainably. Awareness of human dependence on nature is at an all-time high, the science of ecosystem services is rapidly advancing, and talk of natural capital is now common from governments to corporate boardrooms. However, successful implementation is still in early stages. We explore why ecosystem service information has yet to fundamentally change decision-making and suggest a path forward that emphasizes: (i) developing solid evidence linking decisions to impacts on natural capital and ecosystem services, and then to human well-being; (ii) working closely with leaders in government, business, and civil society to develop the knowledge, tools, and practices necessary to integrate natural capital and ecosystem services into everyday decision-making; and (iii) reforming institutions to change policy and practices to better align private short-term goals with societal long-term goals. PMID:26082539

  12. Natural capital and ecosystem services informing decisions: From promise to practice.

    PubMed

    Guerry, Anne D; Polasky, Stephen; Lubchenco, Jane; Chaplin-Kramer, Rebecca; Daily, Gretchen C; Griffin, Robert; Ruckelshaus, Mary; Bateman, Ian J; Duraiappah, Anantha; Elmqvist, Thomas; Feldman, Marcus W; Folke, Carl; Hoekstra, Jon; Kareiva, Peter M; Keeler, Bonnie L; Li, Shuzhuo; McKenzie, Emily; Ouyang, Zhiyun; Reyers, Belinda; Ricketts, Taylor H; Rockström, Johan; Tallis, Heather; Vira, Bhaskar

    2015-06-16

    The central challenge of the 21st century is to develop economic, social, and governance systems capable of ending poverty and achieving sustainable levels of population and consumption while securing the life-support systems underpinning current and future human well-being. Essential to meeting this challenge is the incorporation of natural capital and the ecosystem services it provides into decision-making. We explore progress and crucial gaps at this frontier, reflecting upon the 10 y since the Millennium Ecosystem Assessment. We focus on three key dimensions of progress and ongoing challenges: raising awareness of the interdependence of ecosystems and human well-being, advancing the fundamental interdisciplinary science of ecosystem services, and implementing this science in decisions to restore natural capital and use it sustainably. Awareness of human dependence on nature is at an all-time high, the science of ecosystem services is rapidly advancing, and talk of natural capital is now common from governments to corporate boardrooms. However, successful implementation is still in early stages. We explore why ecosystem service information has yet to fundamentally change decision-making and suggest a path forward that emphasizes: (i) developing solid evidence linking decisions to impacts on natural capital and ecosystem services, and then to human well-being; (ii) working closely with leaders in government, business, and civil society to develop the knowledge, tools, and practices necessary to integrate natural capital and ecosystem services into everyday decision-making; and (iii) reforming institutions to change policy and practices to better align private short-term goals with societal long-term goals.

  13. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium

    PubMed Central

    Somasundaram, M.; Sivakumar, R.

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security. PMID:26759829

  14. Initiative in Soviet Air Force Tactics and Decision Making.

    DTIC Science & Technology

    1986-06-01

    34 [Ref. 7: p. 1211 [Ref. 8: p.197] The issue is do modern Soviet Air Force command style and tactics allow for the freidom of actions or initiative...Approved for public release; distribution is unlimited. ;:.,,. ,,- .,, ... ., , V SECURITY CLASSIFICATION OF THIS PACE "" ? /"/’ 22 - REPORT DOCUMENTATION...REPORT 2b. DECLASSiFICATIONiDOWNGRAOING SCHEDULE Approved for public release; distribution is unlimited. 4 PERFORMING ORGANIZATION REPORT NUMBER(S) S

  15. A Case Study of Information Resource Management in the Department of Defense

    DTIC Science & Technology

    1992-03-01

    prepared to make effective decisions in a military environment. The justification for the use of information technology (IT) in support of operations...t ement No PfICt NO [ask No r 11 TITLE (Include Security Classification) A Case Study ofinformation Resourcc Management in the Departnentufl)clelse...block number) FIELD GROUP SUBGROUP Case study,Corporate Information Management, CIM. Information Hesource Munagenitnt IRM 19 ABSTRACT (continue on

  16. Diagnosis diagrams for passing signals on an automatic block signaling railway section

    NASA Astrophysics Data System (ADS)

    Spunei, E.; Piroi, I.; Chioncel, C. P.; Piroi, F.

    2018-01-01

    This work presents a diagnosis method for railway traffic security installations. More specifically, the authors present a series of diagnosis charts for passing signals on a railway block equipped with an automatic block signaling installation. These charts are based on the exploitation electric schemes, and are subsequently used to develop a diagnosis software package. The thus developed software package contributes substantially to a reduction of failure detection and remedy for these types of installation faults. The use of the software package eliminates making wrong decisions in the fault detection process, decisions that may result in longer remedy times and, sometimes, to railway traffic events.

  17. NASA Biomedical Informatics Capabilities and Needs

    NASA Technical Reports Server (NTRS)

    Johnson-Throop, Kathy A.

    2009-01-01

    To improve on-orbit clinical capabilities by developing and providing operational support for intelligent, robust, reliable, and secure, enterprise-wide and comprehensive health care and biomedical informatics systems with increasing levels of autonomy, for use on Earth, low Earth orbit & exploration class missions. Biomedical Informatics is an emerging discipline that has been defined as the study, invention, and implementation of structures and algorithms to improve communication, understanding and management of medical information. The end objective of biomedical informatics is the coalescing of data, knowledge, and the tools necessary to apply that data and knowledge in the decision-making process, at the time and place that a decision needs to be made.

  18. Tanzanian farmers' knowledge and attitudes to GM biotechnology and the potential use of GM crops to provide improved levels of food security. A Qualitative Study

    PubMed Central

    2010-01-01

    Background Genetically Modified (GM) crops have been championed as one possible method to improve food security and individual nutritional status in sub Saharan Africa. Understanding and acceptability of GM crop technology to farmers and consumers have not been assessed. We developed a qualitative research study involving farmers as both producers and consumers to gauge the understanding of GM crop technology, its acceptability, and identifying issues of concern. Methods Nineteen individual interviews (10 male and 9 female) and five mixed gender focus group discussions with local farmers were conducted in 3 regions in Tanzania. Analysis took place concurrently with data collection. Following initial interviews, subsequent questions were adjusted based on emerging themes. Results Understanding, awareness and knowledge of GM crop technology and terminology and its potential risks and benefits was very poor in all regions. Receptivity to the potential use of GM crops was, however, high. Respondents focused on the potential benefits of GM crops rather than any potential longer term health risks. A number of factors, most significantly field trial data, would influence farmers' decisions regarding the introduction of GM crop varieties into their farming practice. Understanding of the potential improved health provision possible by changes in agricultural practice and food-related decision making, and the health benefits of a diet containing essential vitamins, minerals and micronutrients is also poor in these communities. Conclusion This study forms a basis from which further research work can be undertaken. It is important to continue to assess opinions and attitudes of farmers and consumers in sub Saharan Africa towards potential use of GM technologies whilst highlighting the importance of the relationship between agriculture, health and development. This will allow people in the region to make accurate, informed decisions about whether they believe use of GM biotechnology is an appropriate way in which to tackle issues of food security, provide improved health and drive development. PMID:20624286

  19. Tanzanian farmers' knowledge and attitudes to GM biotechnology and the potential use of GM crops to provide improved levels of food security. A Qualitative Study.

    PubMed

    Lewis, Christopher P; Newell, James N; Herron, Caroline M; Nawabu, Haidari

    2010-07-12

    Genetically Modified (GM) crops have been championed as one possible method to improve food security and individual nutritional status in sub Saharan Africa. Understanding and acceptability of GM crop technology to farmers and consumers have not been assessed. We developed a qualitative research study involving farmers as both producers and consumers to gauge the understanding of GM crop technology, its acceptability, and identifying issues of concern. Nineteen individual interviews (10 male and 9 female) and five mixed gender focus group discussions with local farmers were conducted in 3 regions in Tanzania. Analysis took place concurrently with data collection. Following initial interviews, subsequent questions were adjusted based on emerging themes. Understanding, awareness and knowledge of GM crop technology and terminology and its potential risks and benefits was very poor in all regions. Receptivity to the potential use of GM crops was, however, high. Respondents focused on the potential benefits of GM crops rather than any potential longer term health risks. A number of factors, most significantly field trial data, would influence farmers' decisions regarding the introduction of GM crop varieties into their farming practice. Understanding of the potential improved health provision possible by changes in agricultural practice and food-related decision making, and the health benefits of a diet containing essential vitamins, minerals and micronutrients is also poor in these communities. This study forms a basis from which further research work can be undertaken. It is important to continue to assess opinions and attitudes of farmers and consumers in sub Saharan Africa towards potential use of GM technologies whilst highlighting the importance of the relationship between agriculture, health and development. This will allow people in the region to make accurate, informed decisions about whether they believe use of GM biotechnology is an appropriate way in which to tackle issues of food security, provide improved health and drive development.

  20. Effective information management and assurance for a modern organisation during a crisis.

    PubMed

    MacLeod, Andrew

    2015-01-01

    During a crisis, organisations face a major unpredictable event with potentially negative consequences. Effective information management and assurance can assist the organisation in making sure that they have the correct information in a secure format to make decisions to recover their operations. The main elements of effective information management and assurance are confidentiality, integrity and availability, combined with non-repudiation. Should an element of effective information management or assurance be removed it can have a detrimental effect on the other elements and render the information management and assurance practices of the organisation ineffectual.

  1. Towards a New Food System Assessment: AgMIP Coordinated Global and Regional Assessments of Climate Change

    NASA Technical Reports Server (NTRS)

    Rosenzweig, Cynthia E.; Thorburn, Peter

    2017-01-01

    Agricultural stakeholders need more credible information on which to base adaptation and mitigation policy decisions. In order to provide this, we must improve the rigor of agricultural modelling. Ensemble approaches can be used to address scale issues and integrated teams can overcome disciplinary silos. The AgMIP Coordinated Global and Regional Assessments of Climate Change and Food Security (CGRA) has the goal to link agricultural systems models using common protocols and scenarios to significantly improve understanding of climate effects on crops, livestock and livelihoods across multiple scales. The AgMIP CGRA assessment brings together experts in climate, crop, livestock, economics, and food security to develop Protocols to guide the process throughout the assessment. Scenarios are designed to consistently combine elements of intertwined storylines of future society including, socioeconomic development, greenhouse gas concentrations, and specific pathways of agricultural sector development. Through these approaches, AgMIP partners around the world are providing an evidence base for their stakeholders as they make decisions and investments.

  2. Challenges in Securing the Interface Between the Cloud and Pervasive Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lagesse, Brent J

    2011-01-01

    Cloud computing presents an opportunity for pervasive systems to leverage computational and storage resources to accomplish tasks that would not normally be possible on such resource-constrained devices. Cloud computing can enable hardware designers to build lighter systems that last longer and are more mobile. Despite the advantages cloud computing offers to the designers of pervasive systems, there are some limitations of leveraging cloud computing that must be addressed. We take the position that cloud-based pervasive system must be secured holistically and discuss ways this might be accomplished. In this paper, we discuss a pervasive system utilizing cloud computing resources andmore » issues that must be addressed in such a system. In this system, the user's mobile device cannot always have network access to leverage resources from the cloud, so it must make intelligent decisions about what data should be stored locally and what processes should be run locally. As a result of these decisions, the user becomes vulnerable to attacks while interfacing with the pervasive system.« less

  3. Text Messaging to Communicate With Public Health Audiences: How the HIPAA Security Rule Affects Practice

    PubMed Central

    Karasz, Hilary N.; Eiden, Amy; Bogan, Sharon

    2013-01-01

    Text messaging is a powerful communication tool for public health purposes, particularly because of the potential to customize messages to meet individuals’ needs. However, using text messaging to send personal health information requires analysis of laws addressing the protection of electronic health information. The Health Insurance Portability and Accountability Act (HIPAA) Security Rule is written with flexibility to account for changing technologies. In practice, however, the rule leads to uncertainty about how to make text messaging policy decisions. Text messaging to send health information can be implemented in a public health setting through 2 possible approaches: restructuring text messages to remove personal health information and retaining limited personal health information in the message but conducting a risk analysis and satisfying other requirements to meet the HIPAA Security Rule. PMID:23409902

  4. 5 CFR 9701.222 - Reconsideration of classification decisions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... decisions. 9701.222 Section 9701.222 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.222...

  5. Promoting de-escalation of commitment: a regulatory-focus perspective on sunk costs.

    PubMed

    Molden, Daniel C; Hui, Chin Ming

    2011-01-01

    People frequently escalate their commitment to failing endeavors. Explanations for such behavior typically involve loss aversion, failure to recognize other alternatives, and concerns with justifying prior actions; all of these factors produce recommitment to previous decisions with the goal of erasing losses and vindicating these decisions. Solutions to escalation of commitment have therefore focused on external oversight and divided responsibility during decision making to attenuate loss aversion, blindness to alternatives, and justification biases. However, these solutions require substantial resources and have additional adverse effects. The present studies tested an alternative method for de-escalating commitment: activating broad motivations for growth and advancement (promotion). This approach should reduce concerns with loss and increase perceptions of alternatives, thereby attenuating justification motives. In two studies featuring hypothetical financial decisions, activating promotion motivations reduced recommitment to poorly performing investments as compared with both not activating any additional motivations and activating motivations for safety and security (prevention).

  6. Secure Skyline Queries on Cloud Platform.

    PubMed

    Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian

    2017-04-01

    Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions.

  7. The Enterprise Data Trust at Mayo Clinic: a semantically integrated warehouse of biomedical data

    PubMed Central

    Beck, Scott A; Fisk, Thomas B; Mohr, David N

    2010-01-01

    Mayo Clinic's Enterprise Data Trust is a collection of data from patient care, education, research, and administrative transactional systems, organized to support information retrieval, business intelligence, and high-level decision making. Structurally it is a top-down, subject-oriented, integrated, time-variant, and non-volatile collection of data in support of Mayo Clinic's analytic and decision-making processes. It is an interconnected piece of Mayo Clinic's Enterprise Information Management initiative, which also includes Data Governance, Enterprise Data Modeling, the Enterprise Vocabulary System, and Metadata Management. These resources enable unprecedented organization of enterprise information about patient, genomic, and research data. While facile access for cohort definition or aggregate retrieval is supported, a high level of security, retrieval audit, and user authentication ensures privacy, confidentiality, and respect for the trust imparted by our patients for the respectful use of information about their conditions. PMID:20190054

  8. The Enterprise Data Trust at Mayo Clinic: a semantically integrated warehouse of biomedical data.

    PubMed

    Chute, Christopher G; Beck, Scott A; Fisk, Thomas B; Mohr, David N

    2010-01-01

    Mayo Clinic's Enterprise Data Trust is a collection of data from patient care, education, research, and administrative transactional systems, organized to support information retrieval, business intelligence, and high-level decision making. Structurally it is a top-down, subject-oriented, integrated, time-variant, and non-volatile collection of data in support of Mayo Clinic's analytic and decision-making processes. It is an interconnected piece of Mayo Clinic's Enterprise Information Management initiative, which also includes Data Governance, Enterprise Data Modeling, the Enterprise Vocabulary System, and Metadata Management. These resources enable unprecedented organization of enterprise information about patient, genomic, and research data. While facile access for cohort definition or aggregate retrieval is supported, a high level of security, retrieval audit, and user authentication ensures privacy, confidentiality, and respect for the trust imparted by our patients for the respectful use of information about their conditions.

  9. Impact of personal economic environment and personality factors on individual financial decision making.

    PubMed

    Prinz, Susanne; Gründer, Gerhard; Hilgers, Ralf D; Holtemöller, Oliver; Vernaleken, Ingo

    2014-01-01

    This study on healthy young male students aimed to enlighten the associations between an individual's financial decision making and surrogate makers for environmental factors covering long-term financial socialization, the current financial security/responsibility, and the personal affinity to financial affairs as represented by parental income, funding situation, and field of study. A group of 150 male young healthy students underwent two versions of the Holt and Laury (2002) lottery paradigm (matrix and random sequential version). Their financial decision was mainly driven by the factor "source of funding": students with strict performance control (grants, scholarships) had much higher rates of relative risk aversion (RRA) than subjects with support from family (ΔRRA = 0.22; p = 0.018). Personality scores only modestly affected the outcome. In an ANOVA, however, also the intelligence quotient significantly and relevantly contributed to the explanation of variance; the effects of parental income and the personality factors "agreeableness" and "openness" showed moderate to modest - but significant - effects. These findings suggest that environmental factors more than personality factors affect risk aversion.

  10. Impact of personal economic environment and personality factors on individual financial decision making

    PubMed Central

    Prinz, Susanne; Gründer, Gerhard; Hilgers, Ralf D.; Holtemöller, Oliver; Vernaleken, Ingo

    2014-01-01

    This study on healthy young male students aimed to enlighten the associations between an individual’s financial decision making and surrogate makers for environmental factors covering long-term financial socialization, the current financial security/responsibility, and the personal affinity to financial affairs as represented by parental income, funding situation, and field of study. A group of 150 male young healthy students underwent two versions of the Holt and Laury (2002) lottery paradigm (matrix and random sequential version). Their financial decision was mainly driven by the factor “source of funding”: students with strict performance control (grants, scholarships) had much higher rates of relative risk aversion (RRA) than subjects with support from family (ΔRRA = 0.22; p = 0.018). Personality scores only modestly affected the outcome. In an ANOVA, however, also the intelligence quotient significantly and relevantly contributed to the explanation of variance; the effects of parental income and the personality factors “agreeableness” and “openness” showed moderate to modest – but significant – effects. These findings suggest that environmental factors more than personality factors affect risk aversion. PMID:24624100

  11. Biosafety and Biosecurity: A Relative Risk-Based Framework for Safer, More Secure, and Sustainable Laboratory Capacity Building.

    PubMed

    Dickmann, Petra; Sheeley, Heather; Lightfoot, Nigel

    2015-01-01

    Laboratory capacity building is characterized by a paradox between endemicity and resources: countries with high endemicity of pathogenic agents often have low and intermittent resources (water, electricity) and capacities (laboratories, trained staff, adequate regulations). Meanwhile, countries with low endemicity of pathogenic agents often have high-containment facilities with costly infrastructure and maintenance governed by regulations. The common practice of exporting high biocontainment facilities and standards is not sustainable and concerns about biosafety and biosecurity require careful consideration. A group at Chatham House developed a draft conceptual framework for safer, more secure, and sustainable laboratory capacity building. The draft generic framework is guided by the phrase "LOCAL - PEOPLE - MAKE SENSE" that represents three major principles: capacity building according to local needs (local) with an emphasis on relationship and trust building (people) and continuous outcome and impact measurement (make sense). This draft generic framework can serve as a blueprint for international policy decision-making on improving biosafety and biosecurity in laboratory capacity building, but requires more testing and detailing development.

  12. Defense Resource Planning Under Uncertainty: An Application of Robust Decision Making to Munitions Mix Planning

    DTIC Science & Technology

    2016-02-01

    In addition , the parser updates some parameters based on uncertainties. For example, Analytica was very slow to update Pk values based on...moderate range. The additional security environments helped to fill gaps in lower severity. Weapons Effectiveness Pk values were modified to account for two...project is to help improve the value and character of defense resource planning in an era of growing uncertainty and complex strategic challenges

  13. An Integrative Risk Management/Governance Framework for Homeland Security Decision Making

    DTIC Science & Technology

    2008-03-01

    key modes of transportation include highways, motor carrier (trucking), motor coach ( intercity bus), maritime, pipeline, rail (passenger and freight...2004 Overview: A blast tore apart a metro train car in Moscow during the morning rush hour on February 6, 2004. The train was traveling between the...Circle Line train, No. 204, traveling from Liverpool Street to Aldgate Station. Within one minute, a second explosion took place on Circle Line train

  14. Acquisition Dominance: Why The Make - Buy Decision And Decentralization Are Essential For DoDs Information Technology Acquisitions And Operations

    DTIC Science & Technology

    2013-04-01

    of contractors which may impact mission and security. Organic DOD subject matter experts can assure their IT-dependent missions. Utilizing in...involved typically conduct a ritualistic liability-focused finger-pointing that detracts from solving the mission- impacting problem. Resolving these...that if things go wrong, sufficient risk management actions have been taken to minimize the impact of failure. The military bears the consequences

  15. Improving Resource Allocation Decisions to Reduce the Risk of Terrorist Attacks on Passenger Rail Systems

    DTIC Science & Technology

    2016-12-01

    theory, passenger rail bombing , attacker-defender methodology 15. NUMBER OF PAGES 103 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT...bombers carried out a successful coordinated attack against the London mass transit system in July 2005. Three suicide bombings occurred on trains and...iron rods to make shrapnel. The precise timing indicates the terrorists themselves detonated their own devices. In March 2016, a suicide bomb

  16. Factors Required for Successful Future Research in Decision Making

    DTIC Science & Technology

    1999-06-01

    to democracy and a market economy. The characteristics that this transition has in common with a complex system operating in its chaotic regime i...the Center for Science and Industrial Policy, Moscow. 4 T. J. Gordon and R. Pratt ! r • � .... 11ral Scanning, The� Hill Encyclopedia of Market ...foresight successful if it helped a firm beat a competitor or to secure greater market share. Some organizations rely on external futures

  17. Using Prospect Theory to Investigate Decision-Making Bias Within an Information Security Context

    DTIC Science & Technology

    2005-12-01

    risk was acceptable, 5 when to the CA the risk was so bad...Population Proportion Lower Tail: Risk Averse (A) Coded as 0. Risk Seeking (B) Coded as 1. Ho (indifferent in risk behavior): p = . 5 Ha ( risk averse...Averse (A) Coded as 0. Risk Seeking (B) Coded as 1. Ho (indifferent in risk behavior): p = . 5 Ha ( risk averse thus significantly below . 5 ): p < . 5

  18. Use of Statechart Assertions for Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes

    DTIC Science & Technology

    2012-06-01

    THIS PAGE INTENTIONALLY LEFT BLANK xv LIST OF ACRONYMS AND ABBREVIATIONS BPM Business Process Model BPMN Business Process Modeling Notation C&A...checking leads to an improvement in the quality and success of enterprise software development. Business Process Modeling Notation ( BPMN ) is an...emerging standard that allows business processes to be captured in a standardized format. BPMN lacks formal semantics which leaves many of its features

  19. A scalable satellite-based crop yield mapper: Integrating satellites and crop models for field-scale estimation in India

    NASA Astrophysics Data System (ADS)

    Jain, M.; Singh, B.; Srivastava, A.; Lobell, D. B.

    2015-12-01

    Food security will be challenged over the upcoming decades due to increased food demand, natural resource degradation, and climate change. In order to identify potential solutions to increase food security in the face of these changes, tools that can rapidly and accurately assess farm productivity are needed. With this aim, we have developed generalizable methods to map crop yields at the field scale using a combination of satellite imagery and crop models, and implement this approach within Google Earth Engine. We use these methods to examine wheat yield trends in Northern India, which provides over 15% of the global wheat supply and where over 80% of farmers rely on wheat as a staple food source. In addition, we identify the extent to which farmers are shifting sow date in response to heat stress, and how well shifting sow date reduces the negative impacts of heat stress on yield. To identify local-level decision-making, we map wheat sow date and yield at a high spatial resolution (30 m) using Landsat satellite imagery from 1980 to the present. This unique dataset allows us to examine sow date decisions at the field scale over 30 years, and by relating these decisions to weather experienced over the same time period, we can identify how farmers learn and adapt cropping decisions based on weather through time.

  20. Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systems.

    PubMed

    Lee, Tian-Fu

    2014-12-01

    Telecare medicine information systems provide a communicating platform for accessing remote medical resources through public networks, and help health care workers and medical personnel to rapidly making correct clinical decisions and treatments. An authentication scheme for data exchange in telecare medicine information systems enables legal users in hospitals and medical institutes to establish a secure channel and exchange electronic medical records or electronic health records securely and efficiently. This investigation develops an efficient and secure verified-based three-party authentication scheme by using extended chaotic maps for data exchange in telecare medicine information systems. The proposed scheme does not require server's public keys and avoids time-consuming modular exponential computations and scalar multiplications on elliptic curve used in previous related approaches. Additionally, the proposed scheme is proven secure in the random oracle model, and realizes the lower bounds of messages and rounds in communications. Compared to related verified-based approaches, the proposed scheme not only possesses higher security, but also has lower computational cost and fewer transmissions. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  1. 77 FR 56676 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-13

    ... have been reviewed for inclusion of Social Security Numbers or equivalent non-publicly- available... Decisions are made available to the public (after redaction of Social Security Numbers or equivalent non... Judicial Officer Administrative Decisions (after redaction of Social Security Numbers or equivalent non...

  2. 17 CFR 8.20 - Final decision.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Final decision. 8.20 Section 8.20 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION EXCHANGE PROCEDURES FOR DISCIPLINARY, SUMMARY, AND MEMBERSHIP DENIAL ACTIONS Disciplinary Procedure § 8.20 Final decision. Each...

  3. Space-Derived Transparency: Players, Policies, Implications, and Synergies

    NASA Astrophysics Data System (ADS)

    Kinnan, C. J.

    2001-06-01

    Space-derived transparency will become a common means of monitoring, preventing, and mitigating crises, verifying compliance with treaties and law, and enabling confidence and security building measures. Democratization and globalization, the proliferation of information technologies, the availability of commercial space high-resolution imagery, and the growing influence of NGOs invite this question: What is (space-derived) transparency and what effect does it have on US security policy? Three camps have emerged in the debate -Horaeists who seek to build a transnational society through complete transparency; Preservationists, mostly military, who fear the threat to national security, want to deny most space-derived information to non-traditional/non-state actors; and Synergists who seek to capitalize on the best of both camps. There is evidence suggesting that space-derived transparency is an inevitable trend and will resist even the best means of preservationist control. Space-derived transparency may change the dynamic of the security environment by introducing new players into the policy fomentation and implementation process. These players, if not properly schooled in imagery analysis or the potential effects of their use of misinterpreted space-derived imagery, could force policy makers to make fast, ill-considered decisions in order to respond to incidents. In some cases this fast response will defuse potential crises and in other situations these rushed decisions might result in policies without considering the potential consequences, which could turn incidents into crises. Space-derived transparency is a step forward into the future for each camp . . . the challenge for the United States lies in forging synergies in an increasingly transparent world while maintaining the balance between openness and security.

  4. Critical factors in career decision making for women medical graduates.

    PubMed

    Lawrence, Joanna; Poole, Phillippa; Diener, Scott

    2003-04-01

    Within the next 30 years there will be equal numbers of women and men in the medical workforce. Indications are that women are increasing their participation in specialties other than general practice, although at a slower rate than their participation in the workforce as a whole. To inform those involved in training and employment of medical women, this study investigated the influencing factors in career decision making for female medical graduates. A total of 305 women medical graduates from the University of Auckland responded to a mail survey (73% response rate) which examined influences on decision making, in both qualitative and quantitative ways, as part of a larger survey. Most women were satisfied with their careers. The principal component analysis of the influencing factors identified four distinct factors important in career choice - interest, flexibility, women friendliness and job security, although the first two of these were rated more highly than the others. Barriers to full participation by medical women in training and employment need to be systematically examined and removed. This is not only to allow women themselves to reach their full potential, but for workforce and socio-economic reasons. Initiatives that allow and value more flexible training and work practices, particularly through the years of child raising, are necessary for women and the health care workforce at large.

  5. Updated preparedness and response framework for influenza pandemics.

    PubMed

    Holloway, Rachel; Rasmussen, Sonja A; Zaza, Stephanie; Cox, Nancy J; Jernigan, Daniel B

    2014-09-26

    The complexities of planning for and responding to the emergence of novel influenza viruses emphasize the need for systematic frameworks to describe the progression of the event; weigh the risk of emergence and potential public health impact; evaluate transmissibility, antiviral resistance, and severity; and make decisions about interventions. On the basis of experience from recent influenza responses, CDC has updated its framework to describe influenza pandemic progression using six intervals (two prepandemic and four pandemic intervals) and eight domains. This updated framework can be used for influenza pandemic planning and serves as recommendations for risk assessment, decision-making, and action in the United States. The updated framework replaces the U.S. federal government stages from the 2006 implementation plan for the National Strategy for Pandemic Influenza (US Homeland Security Council. National strategy for pandemic influenza: implementation plan. Washington, DC: US Homeland Security Council; 2006. Available at http://www.flu.gov/planning-preparedness/federal/pandemic-influenza-implementation.pdf). The six intervals of the updated framework are as follows: 1) investigation of cases of novel influenza, 2) recognition of increased potential for ongoing transmission, 3) initiation of a pandemic wave, 4) acceleration of a pandemic wave, 5) deceleration of a pandemic wave, and 6) preparation for future pandemic waves. The following eight domains are used to organize response efforts within each interval: incident management, surveillance and epidemiology, laboratory, community mitigation, medical care and countermeasures, vaccine, risk communications, and state/local coordination. Compared with the previous U.S. government stages, this updated framework provides greater detail and clarity regarding the potential timing of key decisions and actions aimed at slowing the spread and mitigating the impact of an emerging pandemic. Use of this updated framework is anticipated to improve pandemic preparedness and response in the United States. Activities and decisions during a response are event-specific. These intervals serve as a reference for public health decision-making by federal, state, and local health authorities in the United States during an influenza pandemic and are not meant to be prescriptive or comprehensive. This framework incorporates information from newly developed tools for pandemic planning and response, including the Influenza Risk Assessment Tool and the Pandemic Severity Assessment Framework, and has been aligned with the pandemic phases restructured in 2013 by the World Health Organization.

  6. 6 CFR 21.17 - Decisions and notices.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 6 Domestic Security 1 2013-01-01 2013-01-01 false Decisions and notices. 21.17 Section 21.17 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE...

  7. 6 CFR 21.17 - Decisions and notices.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 6 Domestic Security 1 2014-01-01 2014-01-01 false Decisions and notices. 21.17 Section 21.17 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE...

  8. 6 CFR 21.17 - Decisions and notices.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 6 Domestic Security 1 2011-01-01 2011-01-01 false Decisions and notices. 21.17 Section 21.17 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE...

  9. 6 CFR 21.17 - Decisions and notices.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Decisions and notices. 21.17 Section 21.17 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE...

  10. 6 CFR 21.17 - Decisions and notices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Decisions and notices. 21.17 Section 21.17 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY NONDISCRIMINATION ON THE BASIS OF RACE, COLOR, OR NATIONAL ORIGIN IN PROGRAMS OR ACTIVITIES RECEIVING FEDERAL FINANCIAL ASSISTANCE...

  11. 17 CFR 8.28 - Final decision.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Final decision. 8.28 Section 8.28 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION EXCHANGE PROCEDURES FOR DISCIPLINARY, SUMMARY, AND MEMBERSHIP DENIAL ACTIONS Summary Actions § 8.28 Final decision. Each exchange shall...

  12. On the security of two remote user authentication schemes for telecare medical information systems.

    PubMed

    Kim, Kee-Won; Lee, Jae-Dong

    2014-05-01

    The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.

  13. Climate change, resource use and food security in midcentury under a range of plausible scenarios

    NASA Astrophysics Data System (ADS)

    Wiebe, K.

    2016-12-01

    Achieving and maintaining food security at local, national and global scales is challenged by changes in population, income and climate, among other socioeconomic and biophysical drivers. Assessing these challenges and possible solutions over the coming decades requires a systematic and multidisciplinary approach. The Global Futures and Strategic Foresight program, a CGIAR initiative led by the International Food Policy Research Institute in collaboration with the 14 other CGIAR research centers, is working to improve tools and conduct ex ante assessments of promising technologies, investments and policies under alternative global futures to inform decision making in the CGIAR and its partners. Alternative socioeconomic and climate scenarios are explored using an integrated system of climate, water, crop and economic models. This presentation will share findings from recent projections of food production and prices to 2050 at global and regional scales, together with their potential implications for land and water use, food security, nutrition and health.

  14. Water security-National and global issues

    USGS Publications Warehouse

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  15. Secure and Trustable Electronic Medical Records Sharing using Blockchain.

    PubMed

    Dubovitskaya, Alevtina; Xu, Zhigang; Ryu, Samuel; Schumacher, Michael; Wang, Fusheng

    2017-01-01

    Electronic medical records (EMRs) are critical, highly sensitive private information in healthcare, and need to be frequently shared among peers. Blockchain provides a shared, immutable and transparent history of all the transactions to build applications with trust, accountability and transparency. This provides a unique opportunity to develop a secure and trustable EMR data management and sharing system using blockchain. In this paper, we present our perspectives on blockchain based healthcare data management, in particular, for EMR data sharing between healthcare providers and for research studies. We propose a framework on managing and sharing EMR data for cancer patient care. In collaboration with Stony Brook University Hospital, we implemented our framework in a prototype that ensures privacy, security, availability, and fine-grained access control over EMR data. The proposed work can significantly reduce the turnaround time for EMR sharing, improve decision making for medical care, and reduce the overall cost.

  16. Secure and Trustable Electronic Medical Records Sharing using Blockchain

    PubMed Central

    Dubovitskaya, Alevtina; Xu, Zhigang; Ryu, Samuel; Schumacher, Michael; Wang, Fusheng

    2017-01-01

    Electronic medical records (EMRs) are critical, highly sensitive private information in healthcare, and need to be frequently shared among peers. Blockchain provides a shared, immutable and transparent history of all the transactions to build applications with trust, accountability and transparency. This provides a unique opportunity to develop a secure and trustable EMR data management and sharing system using blockchain. In this paper, we present our perspectives on blockchain based healthcare data management, in particular, for EMR data sharing between healthcare providers and for research studies. We propose a framework on managing and sharing EMR data for cancer patient care. In collaboration with Stony Brook University Hospital, we implemented our framework in a prototype that ensures privacy, security, availability, and fine-grained access control over EMR data. The proposed work can significantly reduce the turnaround time for EMR sharing, improve decision making for medical care, and reduce the overall cost. PMID:29854130

  17. Sexual safety and sexual security among young Black women who have sex with women and men.

    PubMed

    Alexander, Kamila Anise; Fannin, Ehriel F

    2014-01-01

    To examine sexuality narratives of Black women who have sex with women and men and explore factors that influence their sexual safety and sexual security. Secondary qualitative content analysis. We recruited young self-identified Black women from beauty salons and community-based organizations. Our sample included a subset of five sexually active, Black women age 19 to 25 who reported engaging in sexual relationships with women and men. Participants were selected from a larger parent study that included sexuality narratives from 25 women. We analyzed interview transcripts in which participants described sexual relationships. We used constant comparative techniques and conventional content analysis methodology. We uncovered three themes illustrating influences on sexual safety and sexual security: institutional expectations, emotional connectedness, and sexual behaviors. From this analysis, we derive valuable insights into decision-making processes within sexual relationships from the perspectives of young Black women who have sex with women and men. Clinicians and investigators can use these findings to inform programs designed to improve the sexual health of this often invisible group of women. Nurses are uniquely positioned to support young women as they navigate societal institutions and emotional experiences that inform future sexual decisions and behaviors. © 2014 AWHONN, the Association of Women's Health, Obstetric and Neonatal Nurses.

  18. Personalized health care and health information technology policy: an exploratory analysis.

    PubMed

    Wald, Jonathan S; Shapiro, Michael

    2013-01-01

    Personalized healthcare (PHC) is envisioned to enhance clinical practice decision-making using new genome-driven knowledge that tailors diagnosis, treatment, and prevention to the individual patient. In 2012, we conducted a focused environmental scan and informal interviews with fifteen experts to anticipate how PHC might impact health Information Technology (IT) policy in the United States. Findings indicatedthat PHC has a variable impact on current clinical practice, creates complex questions for providers, patients, and policy-makers, and will require a robust health IT infrastructure with advanced data architecture, clinical decision support, provider workflow tools, and re-use of clinical data for research. A number of health IT challenge areas were identified, along with five policy areas including: interoperable clinical decision support, standards for patient values and preferences, patient engagement, data transparency, and robust privacy and security.

  19. Data and monitoring needs for a more ecological agriculture

    NASA Astrophysics Data System (ADS)

    Zaks, David P. M.; Kucharik, Christopher J.

    2011-01-01

    Information on the life-cycle environmental impacts of agricultural production is often limited. As demands grow for increasing agricultural output while reducing its negative environmental impacts, both existing and novel data sources can be leveraged to provide more information to producers, consumers, scientists and policy makers. We review the components and organization of an agroecological sensor web that integrates remote sensing technologies and in situ sensors with models in order to provide decision makers with effective management options at useful spatial and temporal scales for making more informed decisions about agricultural productivity while reducing environmental burdens. Several components of the system are already in place, but by increasing the extent and accessibility of information, decision makers will have the opportunity to enhance food security and environmental quality. Potential roadblocks to implementation include farmer acceptance, data transparency and technology deployment.

  20. 20 CFR 703.204 - Decision on insurance carrier's application; minimum amount of deposit.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.204 Decision on insurance... determining the extent of an insurance carrier's unsecured LHWCA obligations and fixing the amount of security... number of factors in setting the security deposit amount including, but not limited to, the— (1...

  1. 20 CFR 703.204 - Decision on insurance carrier's application; minimum amount of deposit.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... INSURANCE REGULATIONS Insurance Carrier Security Deposit Requirements § 703.204 Decision on insurance... determining the extent of an insurance carrier's unsecured LHWCA obligations and fixing the amount of security... number of factors in setting the security deposit amount including, but not limited to, the— (1...

  2. 17 CFR 201.411 - Commission consideration of initial decisions by hearing officers.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Commission consideration of initial decisions by hearing officers. 201.411 Section 201.411 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION RULES OF PRACTICE Rules of Practice Appeal to the Commission and...

  3. Expanded DEMATEL for Determining Cause and Effect Group in Bidirectional Relations

    PubMed Central

    Falatoonitoosi, Elham; Ahmed, Shamsuddin; Sorooshian, Shahryar

    2014-01-01

    Decision-Making Trial and Evaluation Laboratory (DEMATEL) methodology has been proposed to solve complex and intertwined problem groups in many situations such as developing the capabilities, complex group decision making, security problems, marketing approaches, global managers, and control systems. DEMATEL is able to realize casual relationships by dividing important issues into cause and effect group as well as making it possible to visualize the casual relationships of subcriteria and systems in the course of casual diagram that it may demonstrate communication network or a little control relationships between individuals. Despite of its ability to visualize cause and effect inside a network, the original DEMATEL has not been able to find the cause and effect group between different networks. Therefore, the aim of this study is proposing the expanded DEMATEL to cover this deficiency by new formulations to determine cause and effect factors between separate networks that have bidirectional direct impact on each other. At the end, the feasibility of new extra formulations is validated by case study in three numerical examples of green supply chain networks for an automotive company. PMID:24693224

  4. Expanded DEMATEL for determining cause and effect group in bidirectional relations.

    PubMed

    Falatoonitoosi, Elham; Ahmed, Shamsuddin; Sorooshian, Shahryar

    2014-01-01

    Decision-Making Trial and Evaluation Laboratory (DEMATEL) methodology has been proposed to solve complex and intertwined problem groups in many situations such as developing the capabilities, complex group decision making, security problems, marketing approaches, global managers, and control systems. DEMATEL is able to realize casual relationships by dividing important issues into cause and effect group as well as making it possible to visualize the casual relationships of subcriteria and systems in the course of casual diagram that it may demonstrate communication network or a little control relationships between individuals. Despite of its ability to visualize cause and effect inside a network, the original DEMATEL has not been able to find the cause and effect group between different networks. Therefore, the aim of this study is proposing the expanded DEMATEL to cover this deficiency by new formulations to determine cause and effect factors between separate networks that have bidirectional direct impact on each other. At the end, the feasibility of new extra formulations is validated by case study in three numerical examples of green supply chain networks for an automotive company.

  5. STAKEHOLDER INVOLVEMENT IN THE HEALTH TECHNOLOGY ASSESSMENT PROCESS IN LATIN AMERICA.

    PubMed

    Pichon-Riviere, Andres; Soto, Natalie; Augustovski, Federico; Sampietro-Colom, Laura

    2018-06-11

    Latin American countries are taking important steps to expand and strengthen universal health coverage, and health technology assessment (HTA) has an increasingly prominent role in this process. Participation of all relevant stakeholders has become a priority in this effort. Key issues in this area were discussed during the 2017 Latin American Health Technology Assessment International (HTAi) Policy Forum. The Forum included forty-one participants from Latin American HTA agencies; public, social security, and private insurance sectors; and the pharmaceutical and medical device industry. A background paper and presentations by invited experts and Forum members supported discussions. This study presents a summary of these discussions. Stakeholder involvement in HTA remains inconsistently implemented in the region and few countries have established formal processes. Participants agreed that stakeholder involvement is key to improve the HTA process, but the form and timing of such improvements must be adapted to local contexts. The legitimization of both HTA and decision-making processes was identified as one of the main reasons to promote stakeholder involvement; but to be successful, the entire system of assessment and decision making must be properly staffed and organized, and certain basic conditions must be met, including transparency in the HTA process and a clear link between HTA and decision making. Participants suggested a need for establishing clear rules of participation in HTA that would protect HTA producers and decision makers from potentially distorting external influences. Such rules and mechanisms could help foster trust and credibility among stakeholders, supporting actual involvement in HTA processes.

  6. An investigative analysis of information assurance issues associated with the GIG's P&P architecture

    NASA Astrophysics Data System (ADS)

    Farroha, B. S.; Cole, R. G.; Farroha, D. L.; DeSimone, A.

    2007-04-01

    The Global Information Grid (GIG) is a collection of systems, programs and initiatives aimed at building a secure network and set of information capabilities modeled after the Internet. The GIG is expected to facilitate DoD's transformation by allowing warfighters, policy makers and support personnel to engage in rapid decision making. The roadmap is designed to take advantage of converged services of voice, data, video, and imagery over common data links. The vision is to have commanders identify threats more effectively, make informed decisions, and respond with greater precision and lethality. The information advantage gained through the GIG and network-centric warfare (NCW) allows a warfighting force to achieve dramatically improved information positions, in the form of common operational pictures that provide the basis for shared situational awareness and knowledge, and a resulting increase in combat power. The GIG Precedence and Preemption (P&P) requirements stem from the need to utilize scarce resources at critical times in the most effective way in support of national security, the intelligence community and the war-fighter. Information Assurance (IA) enables all information and data to be available end-to-end to support any mission without delay in accordance to the sensitivity of the task. Together, P&P and IA ensure data availability integrity, authentication, confidentiality, and non-repudiation. This study addresses and analyzes the QoS and P & P requirements and architecture for the GIG. Threat scenarios are presented and used to evaluate the reference architectures. The goal of the study is to assess the Information Assurance concerns associated with implementing Precedence and Preemption within the GIG and to guarantee an acceptable minimum level of security and protection for DoD networks.

  7. Comparative Strategic Cultures Curriculum Project: Assessing Strategic Culture as a Methodological Approach to Understanding WMD Decision-Making by States and Non-State Actors

    DTIC Science & Technology

    2006-10-31

    International Security and Arms Control;: Stanford University Press, 1994. Lin, Chong-Pin. China’s Nuclear Weapons Strategy : Tradition within Evolution ...analysts tend to posit interests, emphasize strategic interaction , and discount bureaucratic influence. - Paul DiMaggio, “Culture and Cognition...Additional Sources - Henry Rowen, "The Evolution of Strategic Nuclear Doctrine," in Laurence Martin, ed., Strategic Thought in the Nuclear Age

  8. National Security Crisis Decision-Making: The Role of Regional Combatant Commander

    DTIC Science & Technology

    2007-05-03

    Schwarzkopf, 331. 63 GEN Schwarzkopf testified that “the greatest threat US interests in the [USCENTCOM] area is the spillover of a regional conflict...Military and U.S. Foreign Policy, 1std ed. (New York: Palgrave Macmillan, 2004), 106. 89 Ibid., 95-97. 33 form of genocide against the Kosovar...and Rwanda , Africa. As J5 he was involved in policy discussions and negotiations on the continuing problems in Bosnia and North Korea, and writing

  9. Multinational Experiment 7. Outcome 3 - Cyber Domain. Objective 3.3: Concept Framework Version 3.0

    DTIC Science & Technology

    2012-10-03

    experimentation in order to give some parameters for Decision Makers’ actions. A.5 DIFFERENT LEGAL FRAMEWORKS The juridical framework to which we refer, in...material effects (e.g. psychological impact), economic et al, or, especially in the military field, it may affect Operational Security (OPSEC). 7...not expected at all to be run as a mechanistic tool that produces univocal outputs on the base of juridically qualified inputs, making unnecessary

  10. Bureaucratic Politics and Decision Making under Uncertainty in a National Security Crisis: Assessing the Effects of International Relations Theory and the Learning Impact of Role-Playing Simulation at the U.S. Naval Academy

    ERIC Educational Resources Information Center

    Biziouras, Nikolaos

    2013-01-01

    Using a pre-/posttest research design, this article measures the learning impact of active-learning techniques such as role-playing simulations in an international relations course. Using the students' different responses to the pre- and postsimulation surveys in a quasi-experimental design whereby two sections that were taught by the same…

  11. The Soviet Quest for Regional Security Studies of Foreign Policy Decision-Making in the USSR.

    DTIC Science & Technology

    1986-09-01

    where the totalitarian penetration was not in effect. These islands of separateness are the family , the churches, the universities and the military. In...support to the changes. The social revolution also had a devastating effect on the Polish United Workers Party which was partly desintegrated during the...and scientific relations, and relations betveen families living inside and outside Latvia. 3 1 *’ All this material indicates that there really were

  12. Extending key sharing: how to generate a key tightly coupled to a network security policy

    NASA Astrophysics Data System (ADS)

    Kazantzidis, Matheos

    2006-04-01

    Current state of the art security policy technologies, besides the small scale limitation and largely manual nature of accompanied management methods, are lacking a) in real-timeliness of policy implementation and b) vulnerabilities and inflexibility stemming from the centralized policy decision making; even if, for example, a policy description or access control database is distributed, the actual decision is often a centralized action and forms a system single point of failure. In this paper we are presenting a new fundamental concept that allows implement a security policy by a systematic and efficient key distribution procedure. Specifically, we extend the polynomial Shamir key splitting. According to this, a global key is split into n parts, any k of which can re-construct the original key. In this paper we present a method that instead of having "any k parts" be able to re-construct the original key, the latter can only be reconstructed if keys are combined as any access control policy describes. This leads into an easily deployable key generation procedure that results a single key per entity that "knows" its role in the specific access control policy from which it was derived. The system is considered efficient as it may be used to avoid expensive PKI operations or pairwise key distributions as well as provides superior security due to its distributed nature, the fact that the key is tightly coupled to the policy, and that policy change may be implemented easier and faster.

  13. Secure Skyline Queries on Cloud Platform

    PubMed Central

    Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian

    2017-01-01

    Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions. PMID:28883710

  14. Security Investment in Contagious Networks.

    PubMed

    Hasheminasab, Seyed Alireza; Tork Ladani, Behrouz

    2018-01-16

    Security of the systems is normally interdependent in such a way that security risks of one part affect other parts and threats spread through the vulnerable links in the network. So, the risks of the systems can be mitigated through investments in the security of interconnecting links. This article takes an innovative look at the problem of security investment of nodes on their vulnerable links in a given contagious network as a game-theoretic model that can be applied to a variety of applications including information systems. In the proposed game model, each node computes its corresponding risk based on the value of its assets, vulnerabilities, and threats to determine the optimum level of security investments on its external links respecting its limited budget. Furthermore, direct and indirect nonlinear influences of a node's security investment on the risks of other nodes are considered. The existence and uniqueness of the game's Nash equilibrium in the proposed game are also proved. Further analysis of the model in a practical case revealed that taking advantage of the investment effects of other players, perfectly rational players (i.e., those who use the utility function of the proposed game model) make more cost-effective decisions than selfish nonrational or semirational players. © 2018 Society for Risk Analysis.

  15. Health information security: a case study of three selected medical centers in iran.

    PubMed

    Hajrahimi, Nafiseh; Dehaghani, Sayed Mehdi Hejazi; Sheikhtaheri, Abbas

    2013-03-01

    Health Information System (HIS) is considered a unique factor in improving the quality of health care activities and cost reduction, but today with the development of information technology and use of internet and computer networks, patients' electronic records and health information systems have become a source for hackers. This study aims at checking health information security of three selected medical centers in Iran using AHP fuzzy and TOPSIS compound model. To achieve that security measures were identified, based on the research literature and decision making matrix using experts' points of view. Among the 27 indicators, seven indicators were selected as effective indicators and Fuzzy AHP technique was used to determine the importance of security indicators. Based on the comparisons made between the three selected medical centers to assess the security of health information, it is concluded that Chamran hospital has the most acceptable level of security and attention in three indicators of "verification and system design, user access management, access control system", Al Zahra Hospital in two indicators of "access management and network access control" and Amin Hospital in "equipment safety and system design". In terms of information security, Chamran Hospital ranked first, Al-Zahra Hospital ranked second and Al- Zahra hospital has the third place.

  16. Health Information Security: A Case Study of Three Selected Medical Centers in Iran

    PubMed Central

    Hajrahimi, Nafiseh; Dehaghani, Sayed Mehdi Hejazi; Sheikhtaheri, Abbas

    2013-01-01

    Health Information System (HIS) is considered a unique factor in improving the quality of health care activities and cost reduction, but today with the development of information technology and use of internet and computer networks, patients’ electronic records and health information systems have become a source for hackers. Methods This study aims at checking health information security of three selected medical centers in Iran using AHP fuzzy and TOPSIS compound model. To achieve that security measures were identified, based on the research literature and decision making matrix using experts’ points of view. Results and discussion Among the 27 indicators, seven indicators were selected as effective indicators and Fuzzy AHP technique was used to determine the importance of security indicators. Based on the comparisons made between the three selected medical centers to assess the security of health information, it is concluded that Chamran hospital has the most acceptable level of security and attention in three indicators of “verification and system design, user access management, access control system”, Al Zahra Hospital in two indicators of “access management and network access control” and Amin Hospital in “equipment safety and system design”. In terms of information security, Chamran Hospital ranked first, Al-Zahra Hospital ranked second and Al- Zahra hospital has the third place. PMID:23572861

  17. Physical contact and financial risk taking.

    PubMed

    Levav, Jonathan; Argo, Jennifer J

    2010-06-01

    We show that minimal physical contact can increase people's sense of security and consequently lead them to increased risk-taking behavior. In three experiments, with both hypothetical and real payoffs, a female experimenter's light, comforting pat on the shoulder led participants to greater financial risk taking. Further, this effect was both mediated and moderated by feelings of security in both male and female participants. Finally, we established the boundary conditions for the impact of physical contact on risk-taking behaviors by demonstrating that the effect does not occur when the touching is performed by a male and is attenuated when the touch consists of a handshake. The results suggest that subtle physical contact can be strongly influential in decision making and the willingness to accept risk.

  18. A review of X-ray explosives detection techniques for checked baggage.

    PubMed

    Wells, K; Bradley, D A

    2012-08-01

    In recent times, the security focus for civil aviation has shifted from hijacking in the 1980s, towards deliberate sabotage. X-ray imaging provides a major tool in checked baggage inspection, with various sensitive techniques being brought to bear in determining the form, and density of items within luggage as well as other material dependent parameters. This review first examines the various challenges to X-ray technology in securing a safe system of passenger transportation. An overview is then presented of the various conventional and less conventional approaches that are available to the airline industry, leading to developments in state-of-the-art imaging technology supported by enhanced machine and observer-based decision making principles. Copyright © 2012 Elsevier Ltd. All rights reserved.

  19. Developing a Framework for Evaluating Organizational Information Assurance Metrics Programs

    DTIC Science & Technology

    2007-03-01

    least cost.  Standards  such as  ISO /IEC 17799 and  ISO /IEC  27001  provide guidance on the domains that  security management should consider when... ISO /IEC 17799, 2000;  ISO /IEC  27001 ,  2005).        6    In order to attempt to find this optimal mix, organizations can make risk  decisions weighing...Electronic version].     International Organization of Standards.  (2000).   ISO /IEC  27001 .  Information  Technology Security Techniques:  Information

  20. Communicating Uncertainty about Climate Change for Application to Security Risk Management

    NASA Astrophysics Data System (ADS)

    Gulledge, J. M.

    2011-12-01

    The science of climate change has convincingly demonstrated that human activities, including the release of greenhouse gases, land-surface changes, particle emissions, and redistribution of water, are changing global and regional climates. Consequently, key institutions are now concerned about the potential social impacts of climate change. For example, the 2010 Quadrennial Defense Review Report from the U.S. Department of Defense states that "climate change, energy security, and economic stability are inextricably linked." Meanwhile, insured losses from climate and weather-related natural disasters have risen dramatically over the past thirty years. Although these losses stem largely from socioeconomic trends, insurers are concerned that climate change could exacerbate this trend and render certain types of climate risk non-diversifiable. Meanwhile, the climate science community-broadly defined as physical, biological, and social scientists focused on some aspect of climate change-remains largely focused scholarly activities that are valued in the academy but not especially useful to decision makers. On the other hand, climate scientists who engage in policy discussions have generally permitted vested interests who support or oppose climate policies to frame the discussion of climate science within the policy arena. Such discussions focus on whether scientific uncertainties are sufficiently resolved to justify policy and the vested interests overstate or understate key uncertainties to support their own agendas. Consequently, the scientific community has become absorbed defending scientific findings to the near exclusion of developing novel tools to aid in risk-based decision-making. For example, the Intergovernmental Panel on Climate Change (IPCC), established expressly for the purpose of informing governments, has largely been engaged in attempts to reduce unavoidable uncertainties rather than helping the world's governments define a science-based risk-management framework for climate security. The IPCC's Fourth Assessment Report concluded that "Responding to climate change involves an iterative risk management process that includes both adaptation and mitigation and takes into account climate change damages, co-benefits, sustainability, equity and attitudes to risk." In risk management, key uncertainties guide action aimed at reducing risk and cannot be ignored or used to justify inaction. Security policies such as arms control and counter-terrorism demonstrate that high-impact outcomes matter to decision makers even if they are likely to be rare events. In spite of this fact, the long tail on the probability distribution of climate sensitivity was largely ignored by the climate science community until recently and its implications for decision making are still not receiving adequate attention. Informing risk management requires scientists to shift from a singular aversion to type I statistical error (i.e. false positive) to a balanced presentation of both type I error and type II error (i.e. false negative) when the latter may have serious consequences. Examples from national security, extreme weather, and economics illustrate these concepts.

  1. What choices should we be able to make about designer babies? A Citizens' Jury of young people in South Wales.

    PubMed

    Iredale, Rachel; Longley, Marcus; Thomas, Christian; Shaw, Anita

    2006-09-01

    Young people will increasingly have the option of using new technologies for reproductive decision making but their voices are rarely heard in debates about acceptable public policy in this area. Capturing the views of young people about potentially esoteric topics, such as genetics, is difficult and methodologically challenging. A Citizens' Jury is a deliberative process that presents a question to a group of ordinary people, allows them to examine evidence given by expert witnesses and personal testimonies and arrive at a verdict. This Citizens' Jury explored designer babies in relation to inherited conditions, saviour siblings and sex selection with young people. Fourteen young people aged 16-19 in Wales. Acceptance of designer baby technology was purpose-specific; it was perceived by participants to be acceptable for preventing inherited conditions and to create a child to save a sibling, but was not recommended for sex selection. Jurors stated that permission should not depend on parents' age, although some measure of suitability should be assessed. Preventing potential parents from going abroad was considered impractical. These young people felt the Human Fertilisation and Embryology Authority should have members under 20 and that the term 'designer baby' was not useful. Perspectives on the acceptability of this technology were nuanced, and based on implicit value judgements about the extent of individual benefit derived. Young people have valuable and interesting contributions to make to the debate about genetics and reproductive decision making and a variety of innovative methods must be used to secure their involvement in decision-making processes.

  2. Using the Alaska Ocean Observing System to Inform Decision Making for Coastal Resiliency Relating to Inundation, Ocean Acidification, Harmful Algal Blooms, Navigation Safety and Impacts of Vessel Traffic

    NASA Astrophysics Data System (ADS)

    McCammon, M.

    2017-12-01

    State and federal agencies, coastal communities and Alaska Native residents, and non-governmental organizations are increasingly turning to the Alaska Ocean Observing System (AOOS) as a major source of ocean and coastal data and information products to inform decision making relating to a changing Arctic. AOOS implements its mission to provide ocean observing data and information to meet stakeholder needs by ensuring that all programs are "science based, stakeholder driven and policy neutral." Priority goals are to increase access to existing coastal and ocean data; package information and data in useful ways to meet stakeholder needs; and increase observing and forecasting capacity in all regions of the state. Recently certified by NOAA, the AOOS Data Assembly Center houses the largest collection of real-time ocean and coastal data, environmental models, and biological data in Alaska, and develops tools and applications to make it more publicly accessible and useful. Given the paucity of observations in the Alaska Arctic, the challenge is how to make decisions with little data compared to other areas of the U.S. coastline. AOOS addresses this issue by: integrating and visualizing existing data; developing data and information products and tools to make data more useful; serving as a convener role in areas such as coastal inundation and flooding, impacts of warming temperatures on food security, ocean acidification, observing technologies and capacity; and facilitating planning efforts to increase observations. In this presentation, I will give examples of each of these efforts, lessons learned, and suggestions for future actions.

  3. Status Update on the NCRP Scientific Committee SC 5-1 Report: Decision Making for Late-Phase Recovery from Nuclear or Radiological Incidents - 13450

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chen, S.Y.

    2013-07-01

    In August 2008, the U.S. Department of Homeland Security (DHS) issued its final Protective Action Guide (PAG) for radiological dispersal device (RDD) and improvised nuclear device (IND) incidents. This document specifies protective actions for public health during the early and intermediate phases and cleanup guidance for the late phase of RDD or IND incidents, and it discusses approaches to implementing the necessary actions. However, while the PAG provides specific guidance for the early and intermediate phases, it prescribes no equivalent guidance for the late-phase cleanup actions. Instead, the PAG offers a general description of a complex process using a site-specificmore » optimization approach. This approach does not predetermine cleanup levels but approaches the problem from the factors that would bear on the final agreed-on cleanup levels. Based on this approach, the decision-making process involves multifaceted considerations including public health, the environment, and the economy, as well as socio-political factors. In an effort to fully define the process and approach to be used in optimizing late-phase recovery and site restoration following an RDD or IND incident, DHS has tasked the NCRP with preparing a comprehensive report addressing all aspects of the optimization process. Preparation of the NCRP report is a three-year (2010-2013) project assigned to a scientific committee, the Scientific Committee (SC) 5-1; the report was initially titled, Approach to Optimizing Decision Making for Late- Phase Recovery from Nuclear or Radiological Terrorism Incidents. Members of SC 5-1 represent a broad range of expertise, including homeland security, health physics, risk and decision analysis, economics, environmental remediation and radioactive waste management, and communication. In the wake of the Fukushima nuclear accident of 2011, and guided by a recent process led by the White House through a Principal Level Exercise (PLE), the optimization approach has since been expanded to include off-site contamination from major nuclear power plant accidents as well as other nuclear or radiological incidents. The expanded application under the current guidance has thus led to a broadened scope of the report, which is reflected in its new title, Decision Making for Late-Phase Recovery from Nuclear or Radiological Incidents. The NCRP report, which is due for publication in 2013, will substantiate the current DHS guidance by clarifying and elaborating on the processes required for the development and implementation of procedures for optimizing decision making for late-phase recovery, enabling the establishment of cleanup goals on a site-specific basis. The report will contain a series of topics addressing important issues related to the long-term recovery from nuclear or radiological incidents. Special topics relevant to supporting the optimization of the decision-making process will include cost-benefit analysis, radioactive waste management, risk communication, stakeholder interaction, risk assessment, and decontamination approaches and techniques. The committee also evaluated past nuclear and radiological incidents for their relevance to the report, including the emerging issues associated with the Fukushima nuclear accident. Thus, due to the commonality of the late-phase issues (such as the potential widespread contamination following an event), the majority of the information pertaining to the response in the late-phase decision-making period, including site-specific optimization framework and approach, could be used or adapted for use in case of similar situations that are not due to terrorism, such as those that would be caused by major nuclear facility accidents or radiological incidents. To ensure that the report and the NCRP recommendations are current and relevant to the effective implementation of federal guidance, SC 5-1 has actively coordinated with the agencies of interest and other relevant stakeholders throughout the duration of the project. The resulting report will be an important resource to guide those involved in late-phase recovery efforts following a nuclear or radiological incident. (authors)« less

  4. Use of GIS-Based Sampling to Inform Food Security Assessments and Decision Making in Kenya

    NASA Astrophysics Data System (ADS)

    Wahome, A.; Ndubi, A. O.; Ndungu, L. W.; Mugo, R. M.; Flores Cordova, A. I.

    2017-12-01

    Kenya relies on agricultural production for supporting local consumption and other processing value chains. With changing climate in a rain-fed dependent agricultural production system, cropping zones are shifting and proper decision making will require updated data. Where up-to-date data is not available it is important that it is generated and passed over to relevant stakeholders to inform their decision making. The process of generating this data should be cost effective and less time consuming. The Kenyan State Department of Agriculture (SDA) runs an insurance programme for maize farmers in a number of counties in Kenya. Previously, SDA was using a list of farmers to identify the crop fields for this insurance programme. However, the process of listing of all farmers in each Unit Area of Insurance (UAI) proved to be tedious and very costly, hence need for an alternative approach, but acceptable sampling methodology. Building on the existing cropland maps, SERVIR, a joint NASA-USAID initiative that brings Earth observations (EO) for improved environmental decision making in developing countries, specifically its hub in Eastern and Soutehrn Africa developed a High Resolution Map based on 10m Sentinel satellite images from which a GIS based sampling frame for identifying maize fields was developed. Sampling points were randomly generated in each UAI and navigated to using hand-held GPS units for identification of maize farmers. In the GIS-based identification of farmers SDA uses 1 day to cover an area covered in 1 week by list identification of farmers. Similarly, SDA spends approximately 3,000 USD per sub-county to locate maize fields using GIS-based sampling as compared 10,000 USD they used to spend before. This has resulted in 70% cost reduction.

  5. A new security model for collaborative environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Agarwal, Deborah; Lorch, Markus; Thompson, Mary

    Prevalent authentication and authorization models for distributed systems provide for the protection of computer systems and resources from unauthorized use. The rules and policies that drive the access decisions in such systems are typically configured up front and require trust establishment before the systems can be used. This approach does not work well for computer software that moderates human-to-human interaction. This work proposes a new model for trust establishment and management in computer systems supporting collaborative work. The model supports the dynamic addition of new users to a collaboration with very little initial trust placed into their identity and supportsmore » the incremental building of trust relationships through endorsements from established collaborators. It also recognizes the strength of a users authentication when making trust decisions. By mimicking the way humans build trust naturally the model can support a wide variety of usage scenarios. Its particular strength lies in the support for ad-hoc and dynamic collaborations and the ubiquitous access to a Computer Supported Collaboration Workspace (CSCW) system from locations with varying levels of trust and security.« less

  6. Families, dependencies, and the moral ground of health savings accounts.

    PubMed

    Bishop, Jeffrey P

    2012-12-01

    Health Savings Accounts have been marginalized in the West. In Singapore, however, they are foundational to the financing of health care. In this brief essay, I shall begin to sketch a justification for Health Savings Accounts. The family has always been thought of as a mere prolegomena to the polis and to be primarily about securing the goods of material life: food, shelter, intimacy. I shall first explore the recent scientific literature on the communal nature of human thriving and follow it with a phenomenological account of human dependency. I shall claim that in securing the material means to sustain life, the family is also involved in the creation of the life-world of the child. That means that the bare necessities of life met in families are not merely about sustaining bodily life but are also part of the meaning-making aspects of life. The family then should have recourse to the material means of life-and-death decisions, because it is in these life-and-death decisions that the families' life-world of values is to be deployed.

  7. Dynamic and adaptive policy models for coalition operations

    NASA Astrophysics Data System (ADS)

    Verma, Dinesh; Calo, Seraphin; Chakraborty, Supriyo; Bertino, Elisa; Williams, Chris; Tucker, Jeremy; Rivera, Brian; de Mel, Geeth R.

    2017-05-01

    It is envisioned that the success of future military operations depends on the better integration, organizationally and operationally, among allies, coalition members, inter-agency partners, and so forth. However, this leads to a challenging and complex environment where the heterogeneity and dynamism in the operating environment intertwines with the evolving situational factors that affect the decision-making life cycle of the war fighter. Therefore, the users in such environments need secure, accessible, and resilient information infrastructures where policy-based mechanisms adopt the behaviours of the systems to meet end user goals. By specifying and enforcing a policy based model and framework for operations and security which accommodates heterogeneous coalitions, high levels of agility can be enabled to allow rapid assembly and restructuring of system and information resources. However, current prevalent policy models (e.g., rule based event-condition-action model and its variants) are not sufficient to deal with the highly dynamic and plausibly non-deterministic nature of these environments. Therefore, to address the above challenges, in this paper, we present a new approach for policies which enables managed systems to take more autonomic decisions regarding their operations.

  8. Gender roles and relationships: Implications for water management

    NASA Astrophysics Data System (ADS)

    Peter, G.

    This study mainstreams gender at household level by showing how the gendered roles and relations between women and men influence access, allocation and use of resources in a rural community, Makhosini, in Swaziland. Implications of the identified gender roles and relationships for water management in Swaziland are highlighted. The working hypotheses of this study are (i) that gender-neutral development initiatives will benefit equally women and men at household level; and (ii) in Swaziland the trend toward irrigated agriculture for food security will have unequal impacts on men and women as access, allocation and use of key resources is highly gendered, privileging men as the value of the resource increases. In this study, a questionnaire was administered to sampled male and female heads of household as well as women under male heads. The heads were asked to indicate the roles they play and key decisions they make in resource use as heads of households. The women under male heads were also asked to indicate their roles and key decision responsibilities. The key resources considered were land and crops produced. Comparative analysis on roles and decisions made as well as access and use of resources and production was done by gender and between the women groups. The results show marked gender differences within households and across resources. Men were overwhelmingly involved in productive roles, giving low priority to reproductive roles. In contrast, priority of women’s roles were reproductive in nature. The key findings are that there were no significant differences in the roles of men and women as heads of households. Women as heads of households assume the same roles as those of men heads suggesting relative gender-neutrality. Also all women played “double-day” roles. However, the data reveals that men dominate decisions on crops to be grown, inputs to be used, disposal of the products and use of income obtained. Only a small percentage of women claimed influence over decisions on high-income generating crops such as sugarcane. A majority of women did demonstrate influence in the areas of key rainfed crops such as sweet potatoes and maize. The only area where women had full control was on grass used for making handicrafts. The implications for water resources management are that gender-blind decisions regarding the importance of irrigated crop production for household security may in fact remove decision-making capacity out of the hands of women so increasing the gendered-nature of food insecurity. At the same time, however, women household heads do show some influence in irrigated crop production and in high-value rainfed crop production. This suggests possibilities for in-building gender-neutral practices where high value crops are concerned.

  9. Quality evaluation of portal sites in health system, as a tool for education and learning.

    PubMed

    Hejazi, Sayed Mehdi; Sarmadi, Sima

    2013-01-01

    The main objective of creating a portal is to make information service available for users who need them for performance of duties and responsibilities regardless of the sources. This article is attempted to consider the parameters that can evaluate these sites since these criteria can be effective in designing and implementing such portals. On the other hand, portal sites in health systems of every country make it possible for leaders, policy makers, and directors to system education as a tool for new learning technologies. One of the main decisions each manager has to make is precise selection of appropriate portal sites. This is a descriptive and qualitative study. The research sample was 53 computer professional working in the area of computer programming and design. In the first part of the study a questionnaire was send to the participants and in the second part of the study based on their response to the questionnaire the participant was interviewed and the main themes of the studies were formulated. The validity and the reliability of the questionnaire were confirmed. The study results were summarized in 10 themes and 50 sub-categories. The main themes included were portal requirements, security, management, and efficiency, user friendliness, built-in applications, portal flexibility, interoperability, and support systems. Portal sites in any education systems make it possible for health system leaders and policy makers to manage their organization information system efficiently and effectively. One of the major decisions each manager has to make is precise selection of an appropriate portal sites design and development. The themes and sub-categories of this study could help health system managers and policy makers and information technology professionals to make appropriate decisions regarding portal design and development.

  10. Science Teacher Decision-Making in a Climate of Heightened Accountability: A Rhizomatic Case Study Analysis of Two Science Departments in New York City

    NASA Astrophysics Data System (ADS)

    Purohit, Kiran Dilip

    Secondary science teachers make many daily decisions in the enactment of curriculum. Although curriculum materials are widely available to address science content, practices, and skills, the consideration that goes into deciding how and whether to use such materials is complicated by teachers' beliefs about science, their understandings of school-level accountability and testing measures, and their perspectives on the adolescent students they teach. This study addresses the need to understand how teachers consider multiple forces in their enactment of science curriculum. The purpose of this study was to explore the ways that discourses around accountability, science, and science education emerge in the narratives around teachers' decision-making in secondary science classrooms. Using a case study approach, I worked at two school sites with two pairs of science teachers. We established criteria for critical incidents together, then teachers identified critical decision-making moments in their classrooms. We analyzed those incidents together using a consultancy protocol, allowing teachers to focus their thinking on reframing the incidents and imagining other possible outcomes. Using post-structuralist rhizomatics, I assembled analyses of teachers' discussions of the critical incidents in the form of dramatization--scenes and monologues. I then developed two major interpretive strands. First, I connected teachers' sense of having "no time" to blocs of affect tied to larger discourses of national security, teacher accountability, and the joy of scientific discovery. Second, I demonstrated how teachers' concern in following logical pathways and sequences in science relates to the imposition of accountability measures that echo the outcomes-driven logic of the learning sciences. Across both interpretations, I found accountability to be complex, multidirectional, and unpredictable in how it works on and through teachers as they make decisions. Research in this area has important practical implications in the fields of professional development, curriculum development, and school change. As more states (including New York) adopt standards derived from the Next Generation Science Standards (NGSS), the importance of privileging teachers' investment and critical decision-making in the process of new curriculum development is vital. I suggest that tools like video-based coaching and consultancy protocol discussions support this kind of thoughtful curricular change.

  11. THE GODFATHER DOCTRINE SECURITY FORCE ASSISTANCE (SFA) TRAINING - AN OFFER THE MARINE CORPS CAN’T REFUSE

    DTIC Science & Technology

    2016-02-16

    additional duty. Proven advisors can be assigned to training or policy billets where advisor advocacy is desired. Additionally , they serve as advisors...USMC SFA success has history from the Philippines through Banana Wars, WWII, Vietnam, and most recently Iraq and Afghanistan. The current de-emphasis... values . An individual who is too quick, (Sonny), or too slow, (Fredo), to make a decision will fail as an advisor. The Marine Corps must identify and

  12. Building Potential for Pilot Expertise: Can Understanding How People Think and Make Decisions Improve the Ability of Military Flight Training to Create Potential Pilot Expertise?

    DTIC Science & Technology

    2012-04-24

    One example of this disconnect is learning to ride a bicycle by using training wheels. People do not use the training wheels so well that they...become an ingrained part of the bicycle riding experience; they outgrew the need for training wheels. “Presenting procedures to trainees gives them a...TERMS pilot training; military flight training; flight school; cognitive task analysis; CTA 16. SECURITY CLASSIFICATION OF: 17

  13. Ergonomics and design: its principles applied in the industry.

    PubMed

    Tavares, Ademario Santos; Silva, Francisco Nilson da

    2012-01-01

    Industrial Design encompasses both product development and optimization of production process. In this sense, Ergonomics plays a fundamental role, because its principles, methods and techniques can help operators to carry out their tasks most successfully. A case study carried out in an industry shows that the interaction among Design, Production Engineering and Materials Engineering departments may improve some aspects concerned security, comfort, efficiency and performance. In this process, Ergonomics had shown to be of essential importance to strategic decision making to the improvement of production section.

  14. Security Decision-Making in Pakistan

    DTIC Science & Technology

    1980-09-01

    intention of doing this job in worship, his 7life is a worship." But they are also reminded that: Sweat saves blood Blood saves life, Brain saves both...than anything else. In both Service First and Close Door, the military was called off the job before a thorough clean-up was made; in both cases, army...Some were opportunistic -59- job seekers but many were ir.tereztt;;a "- t i. military and were sincere nationalists. The official British analysIa of

  15. Program Evaluation: Experienced Agencies Follow a Similar Model for Prioritizing Research. Report to the Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia, Committee on Homeland Security and Governmental Affairs, U.S. Senate. GAO-11-176

    ERIC Educational Resources Information Center

    Kingsbury, Nancy

    2011-01-01

    Amid efforts to improve performance and constrain spending, federal agencies are being asked to expand the use of rigorous program evaluation in decision-making. In addition to performance data, indepth program evaluation studies are often needed for assessing program impact or designing improvements. Agencies can also use their evaluation…

  16. The development of control and monitoring system on marine current renewable energy Case study: strait of Toyapakeh - Nusa Penida, Bali

    NASA Astrophysics Data System (ADS)

    Arief, I. S.; Suherman, I. H.; Wardani, A. Y.; Baidowi, A.

    2017-05-01

    Control and monitoring system is a continuous process of securing the asset in the Marine Current Renewable Energy. A control and monitoring system is existed each critical components which is embedded in Failure Mode Effect Analysis (FMEA) method. As the result, the process in this paper developed through a matrix sensor. The matrix correlated to critical components and monitoring system which supported by sensors to conduct decision-making.

  17. Using the Smooth Receiver Operating Curve (ROC) Method for Evaluation and Decision Making in Biometric Systems

    DTIC Science & Technology

    2014-07-01

    partnership with Public Safety Canada. Led by Canada Border Services Agency partners included : Royal Canadian Mounted Police, Defence Research...Canada, as represented by the Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la...innovative technologies for public safety and security practitioners to achieve specific objectives; 4. Threats/Hazards F – Major trans-border criminal

  18. The decision-making process of workers in using sick time.

    PubMed

    Sandal, Candace L; Click, Elizabeth R; Dowling, Donna A; Guzik, Arlene

    2014-08-01

    The cost of employee absenteeism in the United States is significant in terms of sick pay, overtime costs, replacement personnel compensation, and lost productivity. Little is known about what workers consider when deciding to use sick time. Previous studies have examined work absence from an array of perspectives, including resulting work strain, job satisfaction, and job security, but absenteeism in the workplace has not been examined in terms of decision making. To scrutinize workers' decisions about using sick time, a descriptive pilot study was undertaken with a convenience sample (n = 94) of working college students. The responses to the survey revealed that the majority of the workers (73.4%) used sick time because they were too ill to work. These results are in direct opposition to previous research and suggest that workers may need education about preventing and managing minor illnesses before an absence is needed. Supporting and engaging employees and their significant others in healthy worker programs, regular surveillance examinations, and illness prevention strategies are wise investments in companies' financial futures. Future research should include a comparative study of worker absenteeism between worksites with occupational health nurses and those without nurses. Copyright 2014, SLACK Incorporated.

  19. Understanding and applying principles of social cognition and ...

    EPA Pesticide Factsheets

    Environmental governance systems are under greater pressure to adapt and to cope with increased social and ecological uncertainty from stressors like climate change. We review principles of social cognition and decision making that shape and constrain how environmental governance systems adapt. We focus primarily on the interplay between key decision makers in society and legal systems. We argue that adaptive governance must overcome three cooperative dilemmas to facilitate adaptation: (1) encouraging collaborative problem solving, (2) garnering social acceptance and commitment, and (3) cultivating a culture of trust and tolerance for change and uncertainty. However, to do so governance systems must cope with biases in people’s decision making that cloud their judgment and create conflict. These systems must also satisfy people’s fundamental needs for self-determination, fairness, and security, ensuring that changes to environmental governance are perceived as legitimate, trustworthy, and acceptable. We discuss the implications of these principles for common governance solutions (e.g., public participation, enforcement) and conclude with methodological recommendations. We outline how scholars can investigate the social cognitive principles involved in cases of adaptive governance. Social-ecological stressors place significant pressure on major societal systems, triggering adaptive reforms in human governance and environmental law. Though potentially benefici

  20. Organizational Culture and Safety

    NASA Technical Reports Server (NTRS)

    Adams, Catherine A.

    2003-01-01

    '..only a fool perseveres in error.' Cicero. Humans will break the most advanced technological devices and override safety and security systems if they are given the latitude. Within the workplace, the operator may be just one of several factors in causing accidents or making risky decisions. Other variables considered for their involvement in the negative and often catastrophic outcomes include the organizational context and culture. Many organizations have constructed and implemented safety programs to be assimilated into their culture to assure employee commitment and understanding of the importance of everyday safety. The purpose of this paper is to examine literature on organizational safety cultures and programs that attempt to combat vulnerability, risk taking behavior and decisions and identify the role of training in attempting to mitigate unsafe acts.

  1. Mean-Field-Game Model for Botnet Defense in Cyber-Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kolokoltsov, V. N., E-mail: v.kolokoltsov@warwick.ac.uk; Bensoussan, A.

    We initiate the analysis of the response of computer owners to various offers of defence systems against a cyber-hacker (for instance, a botnet attack), as a stochastic game of a large number of interacting agents. We introduce a simple mean-field game that models their behavior. It takes into account both the random process of the propagation of the infection (controlled by the botner herder) and the decision making process of customers. Its stationary version turns out to be exactly solvable (but not at all trivial) under an additional natural assumption that the execution time of the decisions of the customersmore » (say, switch on or out the defence system) is much faster that the infection rates.« less

  2. Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Water Security

    NASA Technical Reports Server (NTRS)

    Hakimdavar, Raha; Wood, Danielle; Eylander, John; Peters-Lidard, Christa; Smith, Jane; Doorn, Brad; Green, David; Hummel, Corey; Moore, Thomas C.

    2018-01-01

    River basins for which transboundary coordination and governance is a factor are of concern to US national security, yet there is often a lack of sufficient data-driven information available at the needed time horizons to inform transboundary water decision-making for the intelligence, defense, and foreign policy communities. To address this need, a two-day workshop entitled Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Global Water Security was held in August 2017 in Maryland. The committee that organized and convened the workshop (the Organizing Committee) included representatives from the National Aeronautics and Space Administration (NASA), the US Army Corps of Engineers Engineer Research and Development Center (ERDC), and the US Air Force. The primary goal of the workshop was to advance knowledge on the current US Government and partners' technical information needs and gaps to support national security interests in relation to transboundary water. The workshop also aimed to identify avenues for greater communication and collaboration among the scientific, intelligence, defense, and foreign policy communities. The discussion around transboundary water was considered in the context of the greater global water challenges facing US national security.

  3. Understanding the Value of a Computer Emergency Response Capability for Nuclear Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gasper, Peter Donald; Rodriguez, Julio Gallardo

    The international nuclear community has a great understanding of the physical security needs relating to the prevention, detection, and response of malicious acts associated with nuclear facilities and radioactive material. International Atomic Energy Agency (IAEA) Nuclear Security Recommendations (INFCIRC_225_Rev 5) outlines specific guidelines and recommendations for implementing and maintaining an organization’s nuclear security posture. An important element for inclusion into supporting revision 5 is the establishment of a “Cyber Emergency Response Team (CERT)” focused on the international communities cybersecurity needs to maintain a comprehensive nuclear security posture. Cybersecurity and the importance of nuclear cybersecurity require that there be a specificmore » focus on developing an International Nuclear CERT (NS-CERT). States establishing contingency plans should have an understanding of the cyber threat landscape and the potential impacts to systems in place to protect and mitigate malicious activities. This paper will outline the necessary components, discuss the relationships needed within the international community, and outline a process by which the NS-CERT identifies, collects, processes, and reports critical information in order to establish situational awareness (SA) and support decision-making« less

  4. Developing decision-relevant data and information systems for California water through listening and collaboration

    NASA Astrophysics Data System (ADS)

    Bales, R. C.; Bernacchi, L.; Conklin, M. H.; Viers, J. H.; Fogg, G. E.; Fisher, A. T.; Kiparsky, M.

    2017-12-01

    California's historic drought of 2011-2015 provided excellent conditions for researchers to listen to water-management challenges from decision makers, particularly with regard to data and information needs for improved decision making. Through the UC Water Security and Sustainability Research Initiative (http://ucwater.org/) we began a multi-year dialog with water-resources decision makers and state agencies that provide data and technical support for water management. Near-term products of that collaboration will be both a vision for a 21st-century water data and information system, and near-term steps to meet immediate legislative deadlines in a way that is consistent with the longer-term vision. While many university-based water researchers engage with state and local agencies on both science and policy challenges, UC Water's focus was on: i) integrated system management, from headwaters through groundwater and agriculture, and on ii) improved decision making through better water information systems. This focus aligned with the recognition by water leaders that fundamental changes in the way the state manages water were overdue. UC Water is focused on three "I"s: improved water information, empowering Institutions to use and to create new information, and enabling decision makers to make smart investments in both green and grey Infrastructure. Effective communication with water decision makers has led to engagement on high-priority programs where large knowledge gaps remain, including more-widespread groundwater recharge of storm flows, restoration of mountain forests in important source-water areas, governance structures for groundwater sustainability, and filling information gaps by bringing new technology to bear on measurement and data programs. Continuing engagement of UC Water researchers in public dialog around water resources, through opinion pieces, feature articles, blogs, white papers, social media, video clips and a feature documentary film have also been key to our continuing engagement. These novel partnerships are leading to decision-relevant tools and an improved integrated praxis in on-the-ground water-resources management. Our research is becoming more embedded in policies and our network remains interconnected with decision makers at multiple levels.

  5. Fostering better policy adoption and inter-disciplinary communication in healthcare: A qualitative analysis of practicing physicians’ common interests

    PubMed Central

    Crowley-Matoka, Megan; Collins, Jeremy D.; Chrisman, Howard B.; Milad, Magdy P.; Vogelzang, Robert L.

    2017-01-01

    Purpose In response to limited physician adoption of various healthcare initiatives, we sought to propose and assess a novel approach to policy development where one first characterizes diverse physician groups’ common interests, using a medical student and constructivist grounded theory. Methods In 6 months, a medical student completed 36 semi-structured interviews with interventional radiologists, gynecologists, and vascular surgeons that were systematically analyzed according to constructivist grounded theory to identifying common themes. Common drivers of clinical decision making and professional values across 3 distinct specialty groups were derived from physicians’ descriptions of their clinical decision making, stories, and concerns. Results Common drivers of clinical decision making included patient preference/benefit, experience, reimbursement, busyness/volume, and referral networks. Common values included honesty, trustworthiness, loyalty, humble service, compassion and perseverance, and practical wisdom. Although personal gains were perceived as important interests, such values were easily sacrificed for the good of patients or other non-financial interests. This balance was largely dependent on the incentives and security provided by physicians’ environments. Conclusions Using a medical student interviewer and constructivist grounded theory is a feasible means of collecting rich qualitative data to guide policy development. Healthcare administrators and medical educators should consider incorporating this methodology early in policy development to anticipate how value differences between physician groups will influence their acceptance of policies and other broad healthcare initiatives. PMID:28235088

  6. 78 FR 11939 - Social Security Ruling, SSR 13-2p.; Titles II and XVI: Evaluating Cases Involving Drug Addiction...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-20

    ... determination or decision. The type and number of CEs we purchase will depend on the claimant's allegations and... decisions relating to the Federal old-age, survivors, disability, supplemental security income, special veterans benefits, and black lung benefits programs. SSRs may be based on determinations or decisions made...

  7. The strategic security officer.

    PubMed

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  8. A malicious pattern detection engine for embedded security systems in the Internet of Things.

    PubMed

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-12-16

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns.

  9. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not tomore » unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule.« less

  10. Abortion in a just society.

    PubMed

    Hunt, M E

    1993-01-01

    A female Catholic theologian imagines a just society that does not judge women who decide to undergo an abortion. The Church, practitioners, and the courts must trust that women do make person-enhancing choices about the quality of life. In the last 15 years most progress in securing a woman's right to abortion has been limited to white, well-educated, and middle or upper middle class women. A just society would consider reproductive options a human right. Abortion providers are examples of a move to a just society; they are committed to women's well-being. There are some facts that make one pessimistic about achieving abortion in a just society. The US Supreme Court plans to review important decisions establishing abortion as a civil right. Further, some men insist on suing women who want to make their own reproductive decisions--an anti-choice tactic to wear away women's right to reproductive choice. Bombings of abortion clinics and harassment campaigns by anti-choice groups are common. These behaviors strain pro-choice proponents emotionally, psychically, and spiritually. Their tactics often lead to theologians practicing self-censorship because they fear backlash. Abortion providers also do this. Further, the reaction to AIDS is that sex is bad. Anti-abortion groups use AIDS to further their campaigns, claiming that AIDS is a punishment for sex. Strategies working towards abortion in a just society should be education and persuasion of policymakers and citizens about women's right to choose, since they are the ones most affected by abortion. Moreover, only women can secure their rights to abortion. In a just society, every health maintenance organization, insurance company, and group practice would consider abortion a normal service. A just society provides for the survival needs of the most marginalized.

  11. The wisdom of crowds for visual search

    PubMed Central

    Juni, Mordechai Z.; Eckstein, Miguel P.

    2017-01-01

    Decision-making accuracy typically increases through collective integration of people’s judgments into group decisions, a phenomenon known as the wisdom of crowds. For simple perceptual laboratory tasks, classic signal detection theory specifies the upper limit for collective integration benefits obtained by weighted averaging of people’s confidences, and simple majority voting can often approximate that limit. Life-critical perceptual decisions often involve searching large image data (e.g., medical, security, and aerial imagery), but the expected benefits and merits of using different pooling algorithms are unknown for such tasks. Here, we show that expected pooling benefits are significantly greater for visual search than for single-location perceptual tasks and the prediction given by classic signal detection theory. In addition, we show that simple majority voting obtains inferior accuracy benefits for visual search relative to averaging and weighted averaging of observers’ confidences. Analysis of gaze behavior across observers suggests that the greater collective integration benefits for visual search arise from an interaction between the foveated properties of the human visual system (high foveal acuity and low peripheral acuity) and observers’ nonexhaustive search patterns, and can be predicted by an extended signal detection theory framework with trial to trial sampling from a varying mixture of high and low target detectabilities across observers (SDT-MIX). These findings advance our theoretical understanding of how to predict and enhance the wisdom of crowds for real world search tasks and could apply more generally to any decision-making task for which the minority of group members with high expertise varies from decision to decision. PMID:28490500

  12. Ambiguity in determining financial capability of SSI and SSDI beneficiaries with psychiatric disabilities.

    PubMed

    Lazar, Christina M; Black, Anne C; McMahon, Thomas J; O'Shea, Kevin; Rosen, Marc I

    2015-03-01

    The liberty of individuals who receive Social Security disability payments is constrained if they are judged incapable of managing their payments and are assigned a payee or conservator to manage benefit payments on their behalf. Conversely, beneficiaries' well-being may be compromised if they misspend money that they need to survive. Several studies have shown that determinations of financial capability are made inconsistently and that capability guidelines appear to be applied inconsistently. This article describes ambiguities that remained for individuals even after a comprehensive assessment of financial capability was conducted by independent assessors. Trained, experienced assessors rated the financial capability of 118 individuals in intensive outpatient or inpatient psychiatric facilities who received Social Security Disability Insurance or Supplemental Security Income. Ten individuals' cases were determined to be difficult to judge. Six sources of ambiguity were identified by case review: distinguishing incapability from the challenges of navigating poverty, the amount of nonessential spending that indicates incapability, the amount of spending on harmful things that indicates incapability, how to consider intermittent periods of capability and incapability, the relative weighting of past behavior and future plans to change, and discrepancies between different sources of information. The cases raise fundamental questions about how to define and identify financial incapability, but they also illustrate how detailed consideration of beneficiaries' living situations and decision making can inform the difficult dichotomous decision about capability.

  13. Making better use of technological advances to meet stakeholder needs.

    PubMed

    Marshall, M J; Roger, P A; Bashiruddin, J B

    2006-04-01

    Controlling transboundary diseases requires an inclusive and collaborative international approach. Decisions should be taken (and seen to be taken) on advice from multidisciplinary teams of scientists and representatives from all groups significantly affected by the disease (the 'stakeholders'). Changes in trade and travel mean that, unless a new model is developed for disease prevention, there is a real possibility that transboundary animal diseases will become increasingly difficult to control. The traditional government approach of dealing almost exclusively with the commercial sector of the livestock industry is no longer sufficient, and new ways must be found to include all sectors, including 'grey' husbandry (fragmented, disparate groups whose involvement with animals may range from the legal and responsible to the unsanctioned and/or illegal). The increasing convergence of human and animal health issues makes it imperative to make the best possible use of new tools. The particular challenges confronting veterinary science are: preventing the introduction of disease, rapidly identifying disease and controlling epidemics. This paper focuses on the United Kingdom to investigate the inadequacies of current approaches, identify needs, offer recommendations and propose a new approach to disease control, which emphasises global considerations. The objectives are: better participation across the entire sector, better communication, better science and better decision-making, all of which should lead to better security from disease.

  14. Livestock and food security: vulnerability to population growth and climate change

    PubMed Central

    Godber, Olivia F; Wall, Richard

    2014-01-01

    Livestock production is an important contributor to sustainable food security for many nations, particularly in low-income areas and marginal habitats that are unsuitable for crop production. Animal products account for approximately one-third of global human protein consumption. Here, a range of indicators, derived from FAOSTAT and World Bank statistics, are used to model the relative vulnerability of nations at the global scale to predicted climate and population changes, which are likely to impact on their use of grazing livestock for food. Vulnerability analysis has been widely used in global change science to predict impacts on food security and famine. It is a tool that is useful to inform policy decision making and direct the targeting of interventions. The model developed shows that nations within sub-Saharan Africa, particularly in the Sahel region, and some Asian nations are likely to be the most vulnerable. Livestock-based food security is already compromised in many areas on these continents and suffers constraints from current climate in addition to the lack of economic and technical support allowing mitigation of predicted climate change impacts. Governance is shown to be a highly influential factor and, paradoxically, it is suggested that current self-sufficiency may increase future potential vulnerability because trade networks are poorly developed. This may be relieved through freer trade of food products, which is also associated with improved governance. Policy decisions, support and interventions will need to be targeted at the most vulnerable nations, but given the strong influence of governance, to be effective, any implementation will require considerable care in the management of underlying structural reform. PMID:24692268

  15. Experiences with the implementation of Individual Placement and Support for people with severe mental illness: a qualitative study among stakeholders.

    PubMed

    Vukadin, Miljana; Schaafsma, Frederieke G; Westerman, Marjan J; Michon, Harry W C; Anema, Johannes R

    2018-05-24

    Individual Placement and Support (IPS) is an evidence-based approach to help people with severe mental illness achieve competitive employment. This article provides insight into an organizational and a financial implementation strategy for IPS in the Netherlands by exploring the perceived facilitators and barriers among participating stakeholders. The goal of this multifaceted strategy was to improve IPS implementation by improving the collaboration between all organizations involved, and realising secured IPS funding with a 'pay for performance' element. A qualitative, explorative study among practitioners (n = 8) and decision makers (n = 7) in mental health care and vocational rehabilitation was performed using semi-structured interviews to collect rich information about the possible facilitators and barriers with regard to the organizational and financial implementation strategy for IPS. Important perceived facilitators were the key principles of the IPS model, regular meetings of stakeholders in mental health care and vocational rehabilitation, stakeholders' experienced ownership of IPS and collaboration, the mandate and influence of the decision makers involved and secured IPS funding. Important perceived barriers included the experienced rigidity of the IPS model fidelity scale and lack of independent fidelity reviewers, the temporary and fragmented character of the secured funding, lack of communication between decision makers and practitioners and negative attitudes and beliefs among mental health clinicians. Changes in legislation were experienced as a facilitator as well as a barrier. The results of this study suggest that the collaboration and IPS funding were experienced as improved by applying an organizational and a financial implementation strategy. However, considerable effort is still necessary to overcome the remaining barriers identified and to make the implementation of IPS a success in practice.

  16. Strengthening Agricultural Decisions in Countries at Risk of Food Insecurity: The GEOGLAM Crop Monitor for Early Warning

    NASA Astrophysics Data System (ADS)

    Becker-Reshef, I.; Barker, B.; McGaughey, K.; Humber, M. L.; Sanchez, A.; Justice, C. O.; Rembold, F.; Verdin, J. P.

    2016-12-01

    Timely, reliable information on crop conditions, and prospects at the subnational scale, is critical for making informed policy and agricultural decisions for ensuring food security, particularly for the most vulnerable countries. However, such information is often incomplete or lacking. As such, the Crop Monitor for Early Warning (CM for EW) was developed with the goal to reduce uncertainty and strengthen decision support by providing actionable information on a monthly basis to national, regional and global food security agencies through timely consensus assessments of crop conditions. This information is especially critical in recent years, given the extreme weather conditions impacting food supplies including the most recent El Nino event. This initiative brings together the main international food security monitoring agencies and organizations to develop monthly crop assessments based on satellite observations, meteorological information, field observations and ground reports, which reflect an international consensus. This activity grew out of the successful Crop Monitor for the G20 Agricultural Market Information System (AMIS), which provides operational monthly crop assessments of the main producing countries of the world. The CM for EW was launched in February 2016 and has already become a trusted source of information internationally and regionally. Its assessments have been featured in a large number of news articles, reports, and press releases, including a joint statement by the USAID's FEWS NET, UN World Food Program, European Commission Joint Research Center, and the UN Food and Agriculture Organziation, on the devastating impacts of the southern African drought due to El Nino. One of the main priorities for this activity going forward is to expand its partnership with regional and national monitoring agencies, and strengthen capacity for national crop condition assessments.

  17. A study on the development of automatic economic profit and loss calculation system for maritime boundary delimitation

    NASA Astrophysics Data System (ADS)

    Kwak, G.; Kim, K.; Park, Y.

    2014-02-01

    As the maritime boundary delimitation is important for the purpose of securing marine resources, in addition to the aspect of maritime security, interest in maritime boundary delimitation to help national benefits are increasing over the world. In Korea, the importance of maritime boundary delimitation with the neighbouring countries is also increasing in practice. The quantity of obtainable marine resources depending on maritime boundary acts as an important factor for maritime boundary delimitation. Accordingly, a study is required to calculate quantity of our obtainable marine resources depending on maritime boundary delimitation. This study intends to calculate obtainable marine resources depending on various maritime boundary scenarios insisted by several countries. It mainly aims at developing a GIS-based automation system to be utilized for decision making of the maritime boundary delimitation. For this target, it has designed a module using spatial analysis technique to automatically calculate profit and loss waters area of each country upon maritime boundary and another module to estimate economic profits and losses obtained by each country using the calculated waters area and pricing information of the marine resources. By linking both the designed modules, it has implemented an automatic economic profit and loss calculation system for the GIS-based maritime boundary delimitation. The system developed from this study automatically calculate quantity of the obtainable marine resources of a country for the maritime boundary to be added and created in the future. Thus, it is expected to support decision making for the maritime boundary negotiators.

  18. Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    PubMed Central

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system. PMID:22163983

  19. Security enhancement mechanism based on contextual authentication and role analysis for 2G-RFID systems.

    PubMed

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  20. Multi-stage ranking of emergency technology alternatives for water source pollution accidents using a fuzzy group decision making tool.

    PubMed

    Qu, Jianhua; Meng, Xianlin; You, Hong

    2016-06-05

    Due to the increasing number of unexpected water source pollution events, selection of the most appropriate disposal technology for a specific pollution scenario is of crucial importance to the security of urban water supplies. However, the formulation of the optimum option is considerably difficult owing to the substantial uncertainty of such accidents. In this research, a multi-stage technical screening and evaluation tool is proposed to determine the optimal technique scheme, considering the areas of pollutant elimination both in drinking water sources and water treatment plants. In stage 1, a CBR-based group decision tool was developed to screen available technologies for different scenarios. Then, the threat degree caused by the pollution was estimated in stage 2 using a threat evaluation system and was partitioned into four levels. For each threat level, a corresponding set of technique evaluation criteria weights was obtained using Group-G1. To identify the optimization alternatives corresponding to the different threat levels, an extension of TOPSIS, a multi-criteria interval-valued trapezoidal fuzzy decision making technique containing the four arrays of criteria weights, to a group decision environment was investigated in stage 3. The effectiveness of the developed tool was elaborated by two actual thallium-contaminated scenarios associated with different threat levels. Copyright © 2016 Elsevier B.V. All rights reserved.

  1. A Transferrable Belief Model Representation for Physical Security of Nuclear Materials

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    David Gerts

    This work analyzed various probabilistic methods such as classic statistics, Bayesian inference, possibilistic theory, and Dempster-Shafer theory of belief functions for the potential insight offered into the physical security of nuclear materials as well as more broad application to nuclear non-proliferation automated decision making theory. A review of the fundamental heuristic and basic limitations of each of these methods suggested that the Dempster-Shafer theory of belief functions may offer significant capability. Further examination of the various interpretations of Dempster-Shafer theory, such as random set, generalized Bayesian, and upper/lower probability demonstrate some limitations. Compared to the other heuristics, the transferrable beliefmore » model (TBM), one of the leading interpretations of Dempster-Shafer theory, can improve the automated detection of the violation of physical security using sensors and human judgment. The improvement is shown to give a significant heuristic advantage over other probabilistic options by demonstrating significant successes for several classic gedanken experiments.« less

  2. The CAMI Project - Weather and Climate Services for Caribbean Food Security

    NASA Astrophysics Data System (ADS)

    Trotman, Adrian; Van Meerbeeck, Cedric

    2013-04-01

    Food security is major focus of Caribbean governments, with production being of particular concern. For the past three decades, Caribbean agriculture has been declining in relative importance, both in terms of its contribution to GDP and its share of the labour force. One of the problems Caribbean agriculture faces is the destructive impacts from weather and climate extremes. These include flood, drought, extreme temperatures, and strong winds from tropical cyclones. Other potential disasters, such as from pests and diseases attacks, are also weather and climate driven. These make weather and climate information critically important to decision-making in agriculture in the Caribbean region. In an effort to help reduce weather and climate related risks to the food security sector, The Caribbean Institute for Meteorology and Hydrology, along with its partners the Caribbean Agricultural Research and Development Institute, the World Meteorological Organization (WMO) and ten National Meteorological Services from within the Caribbean Community launched and implemented the Caribbean Agrometeorological Initiative (CAMI). From 2010 to 2013, CAMI set out to provide relevant information to farmers, and the industry in general, for decision and policy making. The project is funded by the European Union through the Science and Technology Programme of the African, Caribbean and Pacific Group of Countries' (ACP). The overarching objective of CAMI was to increase and sustain agricultural productivity at the farm level in the Caribbean region through improved applications of weather and climate information, using an integrated and coordinated approach. Currently, this is done through (i) provision of relevant climate information appropriately disseminated, (ii) predictions on seasonal rainfall and temperature, (iii) support for improved irrigation management, (iv) the development of strategically selected weather-driven pest and disease models, (v) use of crop simulation models, (vi) training of staff of National Meteorological Services (NMS) and two relevant regional research institutions (vi) and the staging of forums for farmers and Agriculture Extension officers. With its innovative actions and generated products, the thrusts of CAMI link well to the components of the WMO's Global Framework for Climate Services.

  3. Remote Sensing and Capacity Building to Improve Food Security

    NASA Astrophysics Data System (ADS)

    Husak, G. J.; Funk, C. C.; Verdin, J. P.; Rowland, J.; Budde, M. E.

    2012-12-01

    The Famine Early Warning Systems Network (FEWS NET) is a U.S. Agency for International Development (USAID) supported project designed to monitor and anticipate food insecurity in the developing world, primarily Africa, Central America, the Caribbean and Central Asia. This is done through a network of partners involving U.S. government agencies, universities, country representatives, and partner institutions. This presentation will focus on the remotely sensed data used in FEWS NET activities and capacity building efforts designed to expand and enhance the use of FEWS NET tools and techniques. Remotely sensed data are of particular value in the developing world, where ground data networks and data reporting are limited. FEWS NET uses satellite based rainfall and vegetation greenness measures to monitor and assess food production conditions. Satellite rainfall estimates also drive crop models which are used in determining yield potential. Recent FEWS NET products also include estimates of actual evapotranspiration. Efforts are currently underway to assimilate these products into a single tool which would indicate areas experiencing abnormal conditions with implications for food production. FEWS NET is also involved in a number of capacity building activities. Two primary examples are the development of software and training of institutional partners in basic GIS and remote sensing. Software designed to incorporate rainfall station data with existing satellite-derived rainfall estimates gives users the ability to enhance satellite rainfall estimates or long-term means, resulting in gridded fields of rainfall that better reflect ground conditions. Further, this software includes a crop water balance model driven by the improved rainfall estimates. Finally, crop parameters, such as the planting date or length of growing period, can be adjusted by users to tailor the crop model to actual conditions. Training workshops in the use of this software, as well as basic GIS and remote sensing tools, are routinely conducted by FEWS NET representatives at host country meteorological and agricultural services. These institutions are then able to produce information that can more accurately inform food security decision making. Informed decision making reduces the risk associated with a given hazard. In the case of FEWS NET, this involves identification of shocks to food availability, allowing for the pre-positioning of aid to be available when a hazard strikes. Developing tools to incorporate better information in food production estimates and working closely with local staff trained in state-of-the-practice techniques results in a more informed decision making process, reducing the impacts of food security hazards.

  4. 20 CFR 435.82 - Appeal of decision of ACOAG.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 435.82 Employees' Benefits SOCIAL SECURITY ADMINISTRATION UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, OTHER NON-PROFIT ORGANIZATIONS... Commissioner of Social Security a written request for review of the ACOAG's decision. The written request for...

  5. 20 CFR 435.82 - Appeal of decision of ACOAG.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 435.82 Employees' Benefits SOCIAL SECURITY ADMINISTRATION UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, OTHER NON-PROFIT ORGANIZATIONS... Commissioner of Social Security a written request for review of the ACOAG's decision. The written request for...

  6. 20 CFR 435.82 - Appeal of decision of ACOAG.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 435.82 Employees' Benefits SOCIAL SECURITY ADMINISTRATION UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, OTHER NON-PROFIT ORGANIZATIONS... Commissioner of Social Security a written request for review of the ACOAG's decision. The written request for...

  7. 20 CFR 435.82 - Appeal of decision of ACOAG.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 435.82 Employees' Benefits SOCIAL SECURITY ADMINISTRATION UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, OTHER NON-PROFIT ORGANIZATIONS... Commissioner of Social Security a written request for review of the ACOAG's decision. The written request for...

  8. 20 CFR 435.82 - Appeal of decision of ACOAG.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 435.82 Employees' Benefits SOCIAL SECURITY ADMINISTRATION UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND AGREEMENTS WITH INSTITUTIONS OF HIGHER EDUCATION, HOSPITALS, OTHER NON-PROFIT ORGANIZATIONS... Commissioner of Social Security a written request for review of the ACOAG's decision. The written request for...

  9. Can memory and conformism resolve the vaccination dilemma?

    NASA Astrophysics Data System (ADS)

    Han, Dun; Sun, Mei

    2014-12-01

    Considering that memory and conformity could affect the agent’s decision, in this paper, we propose a novel model to describe the vaccination dilemma by entangling the spreading dynamics with an evolutionary framework. Our results indicate that if the individuals make decision mostly depending on their own payoffs and do not believe too much in the celebrity, the final infected number will be significantly reduced. Comparing with the individuals in the BA network, people in the ER network escape from contagion much more easily and could get bigger payoffs. For the countries, strengthening the medical security system and reducing the cost of immunity can curb the spread of viruses effectively. From an individual’s viewpoint, people just remember their own last season’s payoffs can urge them to vaccinate.

  10. Research on Application of FMECA in Missile Equipment Maintenance Decision

    NASA Astrophysics Data System (ADS)

    Kun, Wang

    2018-03-01

    Fault mode effects and criticality analysis (FMECA) is a method widely used in engineering. Studying the application of FMEA technology in military equipment maintenance decision-making, can help us build a better equipment maintenance support system, and increase the using efficiency of weapons and equipment. Through Failure Modes, Effects and Criticality Analysis (FMECA) of equipment, known and potential failure modes and their causes are found out, and the influence on the equipment performance, operation success, personnel security are determined. Furthermore, according to the synthetical effects of the severity of effects and the failure probability, possible measures for prevention and correction are put forward. Through replacing or adjusting the corresponding parts, corresponding maintenance strategy is decided for preventive maintenance of equipment, which helps improve the equipment reliability.

  11. 12 CFR 12.7 - Securities trading policies and procedures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... registered broker/dealers; (ii) Execute transactions in securities for customers; or (iii) Process orders for... investment recommendations or decisions for the accounts of customers; (ii) Participate in the determination of the recommendations or decisions; or (iii) In connection with their duties, obtain information...

  12. E-DECIDER Decision Support Gateway For Earthquake Disaster Response

    NASA Astrophysics Data System (ADS)

    Glasscoe, M. T.; Stough, T. M.; Parker, J. W.; Burl, M. C.; Donnellan, A.; Blom, R. G.; Pierce, M. E.; Wang, J.; Ma, Y.; Rundle, J. B.; Yoder, M. R.

    2013-12-01

    Earthquake Data Enhanced Cyber-Infrastructure for Disaster Evaluation and Response (E-DECIDER) is a NASA-funded project developing capabilities for decision-making utilizing remote sensing data and modeling software in order to provide decision support for earthquake disaster management and response. E-DECIDER incorporates earthquake forecasting methodology and geophysical modeling tools developed through NASA's QuakeSim project in order to produce standards-compliant map data products to aid in decision-making following an earthquake. Remote sensing and geodetic data, in conjunction with modeling and forecasting tools, help provide both long-term planning information for disaster management decision makers as well as short-term information following earthquake events (i.e. identifying areas where the greatest deformation and damage has occurred and emergency services may need to be focused). E-DECIDER utilizes a service-based GIS model for its cyber-infrastructure in order to produce standards-compliant products for different user types with multiple service protocols (such as KML, WMS, WFS, and WCS). The goal is to make complex GIS processing and domain-specific analysis tools more accessible to general users through software services as well as provide system sustainability through infrastructure services. The system comprises several components, which include: a GeoServer for thematic mapping and data distribution, a geospatial database for storage and spatial analysis, web service APIs, including simple-to-use REST APIs for complex GIS functionalities, and geoprocessing tools including python scripts to produce standards-compliant data products. These are then served to the E-DECIDER decision support gateway (http://e-decider.org), the E-DECIDER mobile interface, and to the Department of Homeland Security decision support middleware UICDS (Unified Incident Command and Decision Support). The E-DECIDER decision support gateway features a web interface that delivers map data products including deformation modeling results (slope change and strain magnitude) and aftershock forecasts, with remote sensing change detection results under development. These products are event triggered (from the USGS earthquake feed) and will be posted to event feeds on the E-DECIDER webpage and accessible via the mobile interface and UICDS. E-DECIDER also features a KML service that provides infrastructure information from the FEMA HAZUS database through UICDS and the mobile interface. The back-end GIS service architecture and front-end gateway components form a decision support system that is designed for ease-of-use and extensibility for end-users.

  13. Information Technology and Community Restoration Studies/Task 1: Information Technology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Upton, Jaki F.; Lesperance, Ann M.; Stein, Steven L.

    2009-11-19

    Executive Summary The Interagency Biological Restoration Demonstration—a program jointly funded by the Department of Defense's Defense Threat Reduction Agency and the Department of Homeland Security's (DHS's) Science and Technology Directorate—is developing policies, methods, plans, and applied technologies to restore large urban areas, critical infrastructures, and Department of Defense installations following the intentional release of a biological agent (anthrax) by terrorists. There is a perception that there should be a common system that can share information both vertically and horizontally amongst participating organizations as well as support analyses. A key question is: "How far away from this are we?" As partmore » of this program, Pacific Northwest National Laboratory conducted research to identify the current information technology tools that would be used by organizations in the greater Seattle urban area in such a scenario, to define criteria for use in evaluating information technology tools, and to identify current gaps. Researchers interviewed 28 individuals representing 25 agencies in civilian and military organizations to identify the tools they currently use to capture data needed to support operations and decision making. The organizations can be grouped into five broad categories: defense (Department of Defense), environmental/ecological (Environmental Protection Agency/Ecology), public health and medical services, emergency management, and critical infrastructure. The types of information that would be communicated in a biological terrorism incident include critical infrastructure and resource status, safety and protection information, laboratory test results, and general emergency information. The most commonly used tools are WebEOC (web-enabled crisis information management systems with real-time information sharing), mass notification software, resource tracking software, and NW WARN (web-based information to protect critical infrastructure systems). It appears that the current information management tools are used primarily for information gathering and sharing—not decision making. Respondents identified the following criteria for a future software system. It is easy to learn, updates information in real time, works with all agencies, is secure, uses a visualization or geographic information system feature, enables varying permission levels, flows information from one stage to another, works with other databases, feeds decision support tools, is compliant with appropriate standards, and is reasonably priced. Current tools have security issues, lack visual/mapping functions and critical infrastructure status, and do not integrate with other tools. It is clear that there is a need for an integrated, common operating system. The system would need to be accessible by all the organizations that would have a role in managing an anthrax incident to enable regional decision making. The most useful tool would feature a GIS visualization that would allow for a common operating picture that is updated in real time. To capitalize on information gained from the interviews, the following activities are recommended: • Rate emergency management decision tools against the criteria specified by the interviewees. • Identify and analyze other current activities focused on information sharing in the greater Seattle urban area. • Identify and analyze information sharing systems/tools used in other regions.« less

  14. Information infrastructure for emergency medical services.

    PubMed

    Orthner, Helmuth; Mishra, Ninad; Terndrup, Thomas; Acker, Joseph; Grimes, Gary; Gemmill, Jill; Battles, Marcie

    2005-01-01

    The pre-hospital emergency medical and public safety information environment is nearing a threshold of significant change. The change is driven in part by several emerging technologies such as secure, high-speed wireless communication in the local and wide area networks (wLAN, 3G), Geographic Information Systems (GIS), Global Positioning Systems (GPS), and powerful handheld computing and communication services, that are of sufficient utility to be more widely adopted. We propose a conceptual model to enable improved clinical decision making in the pre-hospital environment using these change agents.

  15. Joining forces for food security - Linking earth observation and crowd-sourcing for improved decision-support to aid organizations

    NASA Astrophysics Data System (ADS)

    Enenkel, M.; Dorigo, W.; See, L. M.; Vinck, P.; Pham, P.

    2013-12-01

    Droughts statistically exceed all other natural disasters in spatio-temporal extent, number of people affected or financial loss. Triggered by crop failure, food insecurity is a major manifestation of agricultural drought and water scarcity. However, other socio-economic precursors, such as chronically low levels of disaster preparedness, hampered access to food security or a lack of social safety nets are equally important factors. Consequently, this study is focused on two complementary developments - a new satellite-derived agricultural drought index and a mobile phone application. The Combined Drought Index (CDI) is enhanced by replacing field measurements of temperature and rainfall modelled/assimilated data. The vegetation component is replaced by a smoothed NDVI dataset. A soil moisture component is introduced to close the gap between rainfall deficiencies and the first visible impacts of atmospheric anomalies on vegetation. The mobile phone application enables the validation of drought index outputs and gives aid organizations an opportunity to increase the speed of socio-economic vulnerability assessments. Supported by Doctors without Borders (MSF) this approach aims at decreasing uncertainties in decision-making via a more holistic risk framework.

  16. Engineering aids for the design of survivable defense communications transmission capability

    NASA Astrophysics Data System (ADS)

    Stover, H. A.

    1984-01-01

    Adequate military communications are essential to the security of the United States, especially in the various stages of major wars. Enough communications must survive to make effective use of our military forces and weaponry, even in the face of a concerted enemy effort to destroy those communications. An evolutionary approach to provide survivability is recommended. It must be provided by the design engineer. Afterthought and modification must be replaced with foresight and design. The engineer must make survivability a criterion in every design decision. The design engineer needs help with the challenges and associated details of successfully accomplishing this. The author discusses and recommends development of convenient-to-use survivability engineering design tools to provide this help.

  17. Why robots should not be delegated with the decision to kill

    NASA Astrophysics Data System (ADS)

    Sharkey, Noel

    2017-04-01

    The EPSRC first principle of robotics, "robots should not be designed solely or primarily to kill or harm humans, except in the interests of national security", is challenged in detail here. Focusing on security and armed conflict, arguments are marshalled against the principle on ethical, legal, technical and security grounds. A new principle is proposed that robots should never be delegated with the decision to apply violent force to humans.

  18. Grassroots women have their say. Programme.

    PubMed

    1997-08-01

    The International Reproductive Rights Research Action Group was founded in 1992 to conduct international research on the meanings of "reproductive rights" for grassroots women in different settings. The qualitative ethnographic study conducted in Brazil, Egypt, Malaysia, Mexico, Nigeria, the Philippines, and the US sought to determine 1) concepts of entitlement about reproduction and sexuality; 2) how reproductive decisions are made; 3) how women practice resistance and accommodation in relation to self-identity and reproductive decision-making; and 4) what social, economic, legal, and political conditions and services affect women's decisions and reproductive life and rights. A number of interview techniques were employed with relatively small numbers of low-income people from diverse backgrounds in each country. The study revealed that significant similarities as well as differences existed among and within the study countries. The women studied exhibited a strong sense of entitlement over reproductive decisions, marriage, and sexual relations. In order to secure their needs, the women accommodated themselves to local expectations when they were unable to rely on a supportive environment to translate their sense of entitlement into effective rights.

  19. Global Operational Remotely Sensed Evapotranspiration System for Water Resources Management: Case Study for the State of New Mexico

    NASA Astrophysics Data System (ADS)

    Halverson, G. H.; Fisher, J.; Magnuson, M.; John, L.

    2017-12-01

    An operational system to produce and disseminate remotely sensed evapotranspiration using the PT-JPL model and support its analysis and use in water resources decision making is being integrated into the New Mexico state government. A partnership between the NASA Western Water Applications Office (WWAO), the Jet Propulsion Laboratory (JPL), and the New Mexico Office of the State Engineer (NMOSE) has enabled collaboration with a variety of state agencies to inform decision making processes for agriculture, rangeland, and forest management. This system improves drought understanding and mobilization, litigation support, and economic, municipal, and ground-water planning through interactive mapping of daily rates of evapotranspiration at 1 km spatial resolution with near real-time latency. This is facilitated by daily remote sensing acquisitions of land-surface temperature and near-surface air temperature and humidity from the Moderate-Resolution Imaging Spectroradiometer (MODIS) instrument on the Terra satellite as well as the short-term composites of Normalized Difference Vegetation Index (NDVI) and albedo provided by MODIS. Incorporating evapotranspiration data into agricultural water management better characterizes imbalances between water requirements and supplies. Monitoring evapotranspiration over rangeland areas improves remediation and prevention of aridification. Monitoring forest evapotranspiration improves wildlife management and response to wildfire risk. Continued implementation of this decision support system should enhance water and food security.

  20. What lies behind crop decisions?Coming to terms with revealing farmers' preferences

    NASA Astrophysics Data System (ADS)

    Gomez, C.; Gutierrez, C.; Pulido-Velazquez, M.; López Nicolás, A.

    2016-12-01

    The paper offers a fully-fledged applied revealed preference methodology to screen and represent farmers' choices as the solution of an optimal program involving trade-offs among the alternative welfare outcomes of crop decisions such as profits, income security and management easiness. The recursive two-stage method is proposed as an alternative to cope with the methodological problems inherent to common practice positive mathematical program methodologies (PMP). Differently from PMP, in the model proposed in this paper, the non-linear costs that are required for both calibration and smooth adjustment are not at odds with the assumptions of linear Leontief technologies and fixed crop prices and input costs. The method frees the model from ad-hoc assumptions about costs and then recovers the potential of economic analysis as a means to understand the rationale behind observed and forecasted farmers' decisions and then to enhance the potential of the model to support policy making in relevant domains such as agricultural policy, water management, risk management and climate change adaptation. After the introduction, where the methodological drawbacks and challenges are set up, section two presents the theoretical model, section three develops its empirical application and presents its implementation to a Spanish irrigation district and finally section four concludes and makes suggestions for further research.

  1. Electronic transfer of sensitive patient data.

    PubMed

    Detterbeck, A M W; Kaiser, J; Hirschfelder, U

    2015-01-01

    The purpose of this study was to develop decision-making aids and recommendations for dental practitioners regarding the utilization and sharing of sensitive digital patient data. In the current environment of growing digitization, healthcare professionals need detailed knowledge of secure data management to maximize confidentiality and minimize the risks involved in both archiving patient data and sharing it through electronic channels. Despite well-defined legal requirements, an all-inclusive technological solution does not currently exist. The need for a preliminary review and critical appraisal of common practices of data transfer prompted a search of the literature and the Web to identify viable methods of secure data exchange and to develop a flowchart. A strong focus was placed on the transmission of datasets both smaller than and larger than 10 MB, and on secure communication by smartphone. Although encryption of patient-related data should be routine, it is often difficult to implement. Pretty Good Privacy (PGP) and Secure/Multipurpose Internet Mail Extensions (S/MIME) are viable standards for secure e-mail encryption. Sharing of high-volume data should be accomplished with the help of file encryption. Careful handling of sensitive patient data is mandatory, and it is the end-user's responsibility to meet any requirements for encryption, preferably by using free, open-source (and hence transparent) software.

  2. How ISO/IEC 17799 can be used for base lining information assurance among entities using data mining for defense, homeland security, commercial, and other civilian/commercial domains

    NASA Astrophysics Data System (ADS)

    Perry, William G.

    2006-04-01

    One goal of database mining is to draw unique and valid perspectives from multiple data sources. Insights that are fashioned from closely-held data stores are likely to possess a high degree of reliability. The degree of information assurance comes into question, however, when external databases are accessed, combined and analyzed to form new perspectives. ISO/IEC 17799, Information technology-Security techniques-Code of practice for information security management, can be used to establish a higher level of information assurance among disparate entities using data mining in the defense, homeland security, commercial and other civilian/commercial domains. Organizations that meet ISO/IEC information security standards have identified and assessed risks, threats and vulnerabilities and have taken significant proactive steps to meet their unique security requirements. The ISO standards address twelve domains: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management and business continuity management and compliance. Analysts can be relatively confident that if organizations are ISO 17799 compliant, a high degree of information assurance is likely to be a characteristic of the data sets being used. The reverse may be true. Extracting, fusing and drawing conclusions based upon databases with a low degree of information assurance may be wrought with all of the hazards that come from knowingly using bad data to make decisions. Using ISO/IEC 17799 as a baseline for information assurance can help mitigate these risks.

  3. The Idea to Promote the Development of E-Government in the Civil Aviation System

    NASA Astrophysics Data System (ADS)

    Renliang, Jiang

    E-government has a significant impact on the organizational structure, working mechanism, operating methods and behavior patterns of the civil aviation administration department.The purpose of this research is to find some countermeasures propelling the electronization, network and office automation of the civil aviation system.The method used in the study was field and literature research.The studies showed that government departments in the civil aviation system could promote the development of e-government further by promoting open administration and implementing democratic and scientific decision-making, strengthening the popularization of information technology and information technology training on civil servants, paying attention to the integration and sharing of information resources, formulating a standard e-government system for the civil aviation system, developing the legal security system for the e-government and strengthening the network security.

  4. [Clinical ethics committees in Mexico: their development in the Mexican Institute of Social Security].

    PubMed

    Valdez-Martínez, Edith; Bedolla, Miguel

    2007-01-01

    The Mexican Institute of Social Security (IMSS) considers the relevance of ethics in a similar context than other countries have developed. According to these considerations, IMSS implemented formally of system of local committees on clinical ethics (CLEC), not only to provide support when ethical dilemmas emerge, but to facilitate the development of an ethics culture among health professionals. The implementation of the CLEC network started in 2004, and since then, its number has increased across the country. Currently IMSS has 78 CLECs. Their number continues to grow due to the level of awareness about the importance of ethics for making medical decisions. In November 2006 the first CLEC national meeting was held and the need to redefine strategies to improve performance of CLECS emerged. This article reports the current situation of the CLECs in Mexico.

  5. Secure VM for Monitoring Industrial Process Controllers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Dasgupta, Dipankar; Ali, Mohammad Hassan; Abercrombie, Robert K

    2011-01-01

    In this paper, we examine the biological immune system as an autonomic system for self-protection, which has evolved over millions of years probably through extensive redesigning, testing, tuning and optimization process. The powerful information processing capabilities of the immune system, such as feature extraction, pattern recognition, learning, memory, and its distributive nature provide rich metaphors for its artificial counterpart. Our study focuses on building an autonomic defense system, using some immunological metaphors for information gathering, analyzing, decision making and launching threat and attack responses. In order to detection Stuxnet like malware, we propose to include a secure VM (or dedicatedmore » host) to the SCADA Network to monitor behavior and all software updates. This on-going research effort is not to mimic the nature but to explore and learn valuable lessons useful for self-adaptive cyber defense systems.« less

  6. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey.

    PubMed

    Abdalzaher, Mohamed S; Seddik, Karim; Elsabrouty, Maha; Muta, Osamu; Furukawa, Hiroshi; Abdel-Rahman, Adel

    2016-06-29

    We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs.

  7. Dynamic adaptive learning for decision-making supporting systems

    NASA Astrophysics Data System (ADS)

    He, Haibo; Cao, Yuan; Chen, Sheng; Desai, Sachi; Hohil, Myron E.

    2008-03-01

    This paper proposes a novel adaptive learning method for data mining in support of decision-making systems. Due to the inherent characteristics of information ambiguity/uncertainty, high dimensionality and noisy in many homeland security and defense applications, such as surveillances, monitoring, net-centric battlefield, and others, it is critical to develop autonomous learning methods to efficiently learn useful information from raw data to help the decision making process. The proposed method is based on a dynamic learning principle in the feature spaces. Generally speaking, conventional approaches of learning from high dimensional data sets include various feature extraction (principal component analysis, wavelet transform, and others) and feature selection (embedded approach, wrapper approach, filter approach, and others) methods. However, very limited understandings of adaptive learning from different feature spaces have been achieved. We propose an integrative approach that takes advantages of feature selection and hypothesis ensemble techniques to achieve our goal. Based on the training data distributions, a feature score function is used to provide a measurement of the importance of different features for learning purpose. Then multiple hypotheses are iteratively developed in different feature spaces according to their learning capabilities. Unlike the pre-set iteration steps in many of the existing ensemble learning approaches, such as adaptive boosting (AdaBoost) method, the iterative learning process will automatically stop when the intelligent system can not provide a better understanding than a random guess in that particular subset of feature spaces. Finally, a voting algorithm is used to combine all the decisions from different hypotheses to provide the final prediction results. Simulation analyses of the proposed method on classification of different US military aircraft databases show the effectiveness of this method.

  8. 17 CFR 171.33 - Final decision by the Commission.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Final decision by the Commission. 171.33 Section 171.33 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION... substantially correct and that none of the arguments on appeal made by the appellant raise important questions...

  9. 17 CFR 9.33 - Final decision by the Commission.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Final decision by the Commission. 9.33 Section 9.33 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION RULES... appellant raise important questions of law or policy, the Commission may, by appropriate order, summarily...

  10. 20 CFR 416.1570 - Decision by hearing officer.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 416.1570 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED...) After the close of the hearing, the hearing officer shall issue a decision or certify the case to the...., failure to pay dues or to complete continuing legal education requirements), that will not disqualify the...

  11. 20 CFR 416.1570 - Decision by hearing officer.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 416.1570 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED...) After the close of the hearing, the hearing officer will issue a decision or certify the case to the... (e.g., failure to pay dues or to complete continuing legal education requirements), that will not...

  12. 20 CFR 416.1570 - Decision by hearing officer.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 416.1570 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED...) After the close of the hearing, the hearing officer will issue a decision or certify the case to the... (e.g., failure to pay dues or to complete continuing legal education requirements), that will not...

  13. 20 CFR 416.1570 - Decision by hearing officer.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 416.1570 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED...) After the close of the hearing, the hearing officer will issue a decision or certify the case to the... (e.g., failure to pay dues or to complete continuing legal education requirements), that will not...

  14. 20 CFR 416.1570 - Decision by hearing officer.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 416.1570 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED...) After the close of the hearing, the hearing officer shall issue a decision or certify the case to the...., failure to pay dues or to complete continuing legal education requirements), that will not disqualify the...

  15. Improving decision making in crisis.

    PubMed

    Higgins, Guy; Freedman, Jennifer

    2013-01-01

    The most critical activity during emergencies or crises is making decisions about what to do next. This paper provides insights into the challenges that people face in making decisions at any time, but particularly during emergencies and crises. It also introduces the reader to the concept of different sense-making/decision-making domains, the human behaviours that can adversely affect decision making - decision derailers - and ways in which emergency responders can leverage this knowledge to make better decisions. While the literature on decision making is extensive, this paper is focused on those aspects that apply particularly to decision making in emergencies or times of crisis.

  16. A Malicious Pattern Detection Engine for Embedded Security Systems in the Internet of Things

    PubMed Central

    Oh, Doohwan; Kim, Deokho; Ro, Won Woo

    2014-01-01

    With the emergence of the Internet of Things (IoT), a large number of physical objects in daily life have been aggressively connected to the Internet. As the number of objects connected to networks increases, the security systems face a critical challenge due to the global connectivity and accessibility of the IoT. However, it is difficult to adapt traditional security systems to the objects in the IoT, because of their limited computing power and memory size. In light of this, we present a lightweight security system that uses a novel malicious pattern-matching engine. We limit the memory usage of the proposed system in order to make it work on resource-constrained devices. To mitigate performance degradation due to limitations of computation power and memory, we propose two novel techniques, auxiliary shifting and early decision. Through both techniques, we can efficiently reduce the number of matching operations on resource-constrained systems. Experiments and performance analyses show that our proposed system achieves a maximum speedup of 2.14 with an IoT object and provides scalable performance for a large number of patterns. PMID:25521382

  17. Livestock and food security: vulnerability to population growth and climate change.

    PubMed

    Godber, Olivia F; Wall, Richard

    2014-10-01

    Livestock production is an important contributor to sustainable food security for many nations, particularly in low-income areas and marginal habitats that are unsuitable for crop production. Animal products account for approximately one-third of global human protein consumption. Here, a range of indicators, derived from FAOSTAT and World Bank statistics, are used to model the relative vulnerability of nations at the global scale to predicted climate and population changes, which are likely to impact on their use of grazing livestock for food. Vulnerability analysis has been widely used in global change science to predict impacts on food security and famine. It is a tool that is useful to inform policy decision making and direct the targeting of interventions. The model developed shows that nations within sub-Saharan Africa, particularly in the Sahel region, and some Asian nations are likely to be the most vulnerable. Livestock-based food security is already compromised in many areas on these continents and suffers constraints from current climate in addition to the lack of economic and technical support allowing mitigation of predicted climate change impacts. Governance is shown to be a highly influential factor and, paradoxically, it is suggested that current self-sufficiency may increase future potential vulnerability because trade networks are poorly developed. This may be relieved through freer trade of food products, which is also associated with improved governance. Policy decisions, support and interventions will need to be targeted at the most vulnerable nations, but given the strong influence of governance, to be effective, any implementation will require considerable care in the management of underlying structural reform. © 2014 The Authors. Global Change Biology Published by John Wiley & Sons Ltd.

  18. Bridging the Gap between Human Judgment and Automated Reasoning in Predictive Analytics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sanfilippo, Antonio P.; Riensche, Roderick M.; Unwin, Stephen D.

    2010-06-07

    Events occur daily that impact the health, security and sustainable growth of our society. If we are to address the challenges that emerge from these events, anticipatory reasoning has to become an everyday activity. Strong advances have been made in using integrated modeling for analysis and decision making. However, a wider impact of predictive analytics is currently hindered by the lack of systematic methods for integrating predictive inferences from computer models with human judgment. In this paper, we present a predictive analytics approach that supports anticipatory analysis and decision-making through a concerted reasoning effort that interleaves human judgment and automatedmore » inferences. We describe a systematic methodology for integrating modeling algorithms within a serious gaming environment in which role-playing by human agents provides updates to model nodes and the ensuing model outcomes in turn influence the behavior of the human players. The approach ensures a strong functional partnership between human players and computer models while maintaining a high degree of independence and greatly facilitating the connection between model and game structures.« less

  19. Combining conceptual graphs and argumentation for aiding in the teleexpertise.

    PubMed

    Doumbouya, Mamadou Bilo; Kamsu-Foguem, Bernard; Kenfack, Hugues; Foguem, Clovis

    2015-08-01

    Current medical information systems are too complex to be meaningfully exploited. Hence there is a need to develop new strategies for maximising the exploitation of medical data to the benefit of medical professionals. It is against this backdrop that we want to propose a tangible contribution by providing a tool which combines conceptual graphs and Dung׳s argumentation system in order to assist medical professionals in their decision making process. The proposed tool allows medical professionals to easily manipulate and visualise queries and answers for making decisions during the practice of teleexpertise. The knowledge modelling is made using an open application programming interface (API) called CoGui, which offers the means for building structured knowledge bases with the dedicated functionalities of graph-based reasoning via retrieved data from different institutions (hospitals, national security centre, and nursing homes). The tool that we have described in this study supports a formal traceable structure of the reasoning with acceptable arguments to elucidate some ethical problems that occur very often in the telemedicine domain. Copyright © 2015 Elsevier Ltd. All rights reserved.

  20. Computational biomedicine: a challenge for the twenty-first century.

    PubMed

    Coveney, Peter V; Shublaq, Nour W

    2012-01-01

    With the relentless increase of computer power and the widespread availability of digital patient-specific medical data, we are now entering an era when it is becoming possible to develop predictive models of human disease and pathology, which can be used to support and enhance clinical decision-making. The approach amounts to a grand challenge to computational science insofar as we need to be able to provide seamless yet secure access to large scale heterogeneous personal healthcare data in a facile way, typically integrated into complex workflows-some parts of which may need to be run on high performance computers-in a facile way that is integrated into clinical decision support software. In this paper, we review the state of the art in terms of case studies drawn from neurovascular pathologies and HIV/AIDS. These studies are representative of a large number of projects currently being performed within the Virtual Physiological Human initiative. They make demands of information technology at many scales, from the desktop to national and international infrastructures for data storage and processing, linked by high performance networks.

  1. Linear versus quadratic portfolio optimization model with transaction cost

    NASA Astrophysics Data System (ADS)

    Razak, Norhidayah Bt Ab; Kamil, Karmila Hanim; Elias, Siti Masitah

    2014-06-01

    Optimization model is introduced to become one of the decision making tools in investment. Hence, it is always a big challenge for investors to select the best model that could fulfill their goal in investment with respect to risk and return. In this paper we aims to discuss and compare the portfolio allocation and performance generated by quadratic and linear portfolio optimization models namely of Markowitz and Maximin model respectively. The application of these models has been proven to be significant and popular among others. However transaction cost has been debated as one of the important aspects that should be considered for portfolio reallocation as portfolio return could be significantly reduced when transaction cost is taken into consideration. Therefore, recognizing the importance to consider transaction cost value when calculating portfolio' return, we formulate this paper by using data from Shariah compliant securities listed in Bursa Malaysia. It is expected that, results from this paper will effectively justify the advantage of one model to another and shed some lights in quest to find the best decision making tools in investment for individual investors.

  2. [An assessment of the Family Health Program in municipalities of Northeast Brazil: old and new challenges].

    PubMed

    Rocha, Paulo de Medeiros; Uchoa, Alice da Costa; Rocha, Nadja de Sá Pinto Dantas; Souza, Elizabethe Cristina Fagundes de; Rocha, Marconi de Lima; Pinheiro, Themis Xavier de Albuquerque

    2008-01-01

    This article presents part of the results from the Baseline Studies, an evaluative research conducted in 21 municipalities with more than 100,000 inhabitants each, in three States of Northeast Brazil. The overall objective was to assess experiences in the implementation of the Family Health Program (FHP), with a focus on inductions in the PROESF. An implementation analysis was performed, using the case study method. The analysis focused on these dimensions: political-institutional, health organization, and comprehensive care. Outstanding advances included: prioritize the FHP in high-risk areas; institutional learning, with qualification of managers and teams; definition of institutional levels for regulating the FHP; and health team-user bonds and positive perceptions concerning the program. Challenges included: strengthening of local policy and decision-making capacity; allocation of primary care resources; greater employment security for human resources; effective implementation of the health care network; strengthening of social participation; upgrading of monitoring and evaluation for decision-making; receptivity; waiting lines for tests, appointments, and hospital admissions; implementation of teamwork; health promotion and inter-sector activities.

  3. POLICY VARIATION, LABOR SUPPLY ELASTICITIES, AND A STRUCTURAL MODEL OF RETIREMENT

    PubMed Central

    MANOLI, DAY; MULLEN, KATHLEEN J.; WAGNER, MATHIS

    2015-01-01

    This paper exploits a combination of policy variation from multiple pension reforms in Austria and administrative data from the Austrian Social Security Database. Using the policy changes for identification, we estimate social security wealth and accrual elasticities in individuals’ retirement decisions. Next, we use these elasticities to estimate a dynamic programming model of retirement decisions. Finally, we use the estimated model to examine the labor supply and welfare consequences of potential social security reforms. PMID:26472916

  4. Mandatory and Location-Aware Access Control for Relational Databases

    NASA Astrophysics Data System (ADS)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  5. Risk, Reward, and Decision-Making in a Rodent Model of Cognitive Aging

    PubMed Central

    Gilbert, Ryan J.; Mitchell, Marci R.; Simon, Nicholas W.; Bañuelos, Cristina; Setlow, Barry; Bizon, Jennifer L.

    2011-01-01

    Impaired decision-making in aging can directly impact factors (financial security, health care) that are critical to maintaining quality of life and independence at advanced ages. Naturalistic rodent models mimic human aging in other cognitive domains, and afford the opportunity to parse the effects of age on discrete aspects of decision-making in a manner relatively uncontaminated by experiential factors. Young adult (5–7 months) and aged (23–25 months) male F344 rats were trained on a probability discounting task in which they made discrete-trial choices between a small certain reward (one food pellet) and a large but uncertain reward (two food pellets with varying probabilities of delivery ranging from 100 to 0%). Young rats chose the large reward when it was associated with a high probability of delivery and shifted to the small but certain reward as probability of the large reward decreased. As a group, aged rats performed comparably to young, but there was significantly greater variance among aged rats. One subgroup of aged rats showed strong preference for the small certain reward. This preference was maintained under conditions in which large reward delivery was also certain, suggesting decreased sensitivity to reward magnitude. In contrast, another subgroup of aged rats showed strong preference for the large reward at low probabilities of delivery. Interestingly, this subgroup also showed elevated preference for probabilistic rewards when reward magnitudes were equalized. Previous findings using this same aged study population described strongly attenuated discounting of delayed rewards with age, together suggesting that a subgroup of aged rats may have deficits associated with accounting for reward costs (i.e., delay or probability). These deficits in cost-accounting were dissociable from the age-related differences in sensitivity to reward magnitude, suggesting that aging influences multiple, distinct mechanisms that can impact cost–benefit decision-making. PMID:22319463

  6. Risk, reward, and decision-making in a rodent model of cognitive aging.

    PubMed

    Gilbert, Ryan J; Mitchell, Marci R; Simon, Nicholas W; Bañuelos, Cristina; Setlow, Barry; Bizon, Jennifer L

    2011-01-01

    Impaired decision-making in aging can directly impact factors (financial security, health care) that are critical to maintaining quality of life and independence at advanced ages. Naturalistic rodent models mimic human aging in other cognitive domains, and afford the opportunity to parse the effects of age on discrete aspects of decision-making in a manner relatively uncontaminated by experiential factors. Young adult (5-7 months) and aged (23-25 months) male F344 rats were trained on a probability discounting task in which they made discrete-trial choices between a small certain reward (one food pellet) and a large but uncertain reward (two food pellets with varying probabilities of delivery ranging from 100 to 0%). Young rats chose the large reward when it was associated with a high probability of delivery and shifted to the small but certain reward as probability of the large reward decreased. As a group, aged rats performed comparably to young, but there was significantly greater variance among aged rats. One subgroup of aged rats showed strong preference for the small certain reward. This preference was maintained under conditions in which large reward delivery was also certain, suggesting decreased sensitivity to reward magnitude. In contrast, another subgroup of aged rats showed strong preference for the large reward at low probabilities of delivery. Interestingly, this subgroup also showed elevated preference for probabilistic rewards when reward magnitudes were equalized. Previous findings using this same aged study population described strongly attenuated discounting of delayed rewards with age, together suggesting that a subgroup of aged rats may have deficits associated with accounting for reward costs (i.e., delay or probability). These deficits in cost-accounting were dissociable from the age-related differences in sensitivity to reward magnitude, suggesting that aging influences multiple, distinct mechanisms that can impact cost-benefit decision-making.

  7. Decision-making in nursing practice: An integrative literature review.

    PubMed

    Nibbelink, Christine W; Brewer, Barbara B

    2018-03-01

    To identify and summarise factors and processes related to registered nurses' patient care decision-making in medical-surgical environments. A secondary goal of this literature review was to determine whether medical-surgical decision-making literature included factors that appeared to be similar to concepts and factors in naturalistic decision making (NDM). Decision-making in acute care nursing requires an evaluation of many complex factors. While decision-making research in acute care nursing is prevalent, errors in decision-making continue to lead to poor patient outcomes. Naturalistic decision making may provide a framework for further exploring decision-making in acute care nursing practice. A better understanding of the literature is needed to guide future research to more effectively support acute care nurse decision-making. PubMed and CINAHL databases were searched, and research meeting criteria was included. Data were identified from all included articles, and themes were developed based on these data. Key findings in this review include nursing experience and associated factors; organisation and unit culture influences on decision-making; education; understanding patient status; situation awareness; and autonomy. Acute care nurses employ a variety of decision-making factors and processes and informally identify experienced nurses to be important resources for decision-making. Incorporation of evidence into acute care nursing practice continues to be a struggle for acute care nurses. This review indicates that naturalistic decision making may be applicable to decision-making nursing research. Experienced nurses bring a broad range of previous patient encounters to their practice influencing their intuitive, unconscious processes which facilitates decision-making. Using naturalistic decision making as a conceptual framework to guide research may help with understanding how to better support less experienced nurses' decision-making for enhanced patient outcomes. © 2017 John Wiley & Sons Ltd.

  8. Emergency Preparedness for Catastrophic Events at Small and Medium Sized Airports: Lacking or Not?

    NASA Technical Reports Server (NTRS)

    Sweet, Kathleen M.

    2007-01-01

    The implementation of security methods and processes in general has had a decisive impact on the aviation industry. However, efforts to effectively coordinate varied aspects of security protocols between agencies and general aviation components have not been adequately addressed. Whether or not overall security issues, especially with regard to planning for catastrophic terrorist events, have been neglected at the nation's smaller airports is the main topic of this paper. For perspective, the term general aviation is generally accepted to include all flying except for military and scheduled airline operations. Genera aviation makes up more than 1 percent of the U.S. Gross Domestic Product and supports almost 1.3 mission high-skilled jobs in professional services and manufacturing and hence is an important component of the aviation industry (AOPA, n.d.). In both conceptual and practical terms, this paper argues for the proactive management of security planning and repeated security awareness training from both an individual and an organizational perspective within the general aviation venue. The results of a research project incorporating survey data from general aviation and small commercial airport managers as well as Transportation Security Administration (TSA) employees are reported. Survey findings suggest that miscommunication does take place on different organizational levels and that between TSA employees and airport management interaction can be contentious and cooperation diminished. The importance of organizational training for decreasing conflict and increasing security and preparedness is discussed as a primary implication.

  9. Shared Decision-Making in the Management of Congenital Vascular Malformations.

    PubMed

    Horbach, Sophie E R; Ubbink, Dirk T; Stubenrouch, Fabienne E; Koelemay, Mark J W; van der Vleuten, Carine J M; Verhoeven, Bas H; Reekers, Jim A; Schultze Kool, Leo J; van der Horst, Chantal M A M

    2017-03-01

    In shared decision-making, clinicians and patients arrive at a joint treatment decision, by incorporating best available evidence and the patients' personal values and preferences. Little is known about the role of shared decision-making in managing patients with congenital vascular malformations, for which preference-sensitive decision-making seems obvious. The authors investigated preferences regarding decision-making and current shared decision-making behavior during physician-patient encounters. In two Dutch university hospitals, adults and children with congenital vascular malformations facing a treatment-related decision were enrolled. Before the consultation, patients (or parents of children) expressed their preference regarding decision-making (Control Preferences Scale). Afterward, participants completed shared decision-making-specific questionnaires (nine-item Shared Decision-Making Questionnaire, CollaboRATE, and satisfaction), and physicians completed the Shared Decision-Making Questionnaire-Physician questionnaire. Consultations were audiotaped and patient involvement was scored by two independent researchers using the five-item Observing Patient Involvement instrument. All questionnaire results were expressed on a scale of 0 to 100 (optimum shared decision-making). Fifty-five participants (24 parents and 31 adult patients) were included. Two-thirds preferred the shared decision-making approach (Control Preferences Scale). Objective five-item Observing Patient Involvement scores were low (mean ± SD, 31 ± 15), whereas patient and physician Shared Decision-Making Questionnaire scores were high, with means of 68 ± 18 and 68 ± 19, respectively. The median CollaboRATE score was 93. There was no clear relationship between shared decision-making and satisfaction scores. Although adults and parents of children with vascular malformations express a strong desire for shared decision-making, objective shared decision-making behavior is still lacking, most likely because of poor awareness of the shared decision-making concept among patients, parents, and physicians. To improve shared decision-making practice, targeted interventions (e.g., decision aids, staff training) are essential.

  10. Decision Making on the Labor and Delivery Unit: An Investigation of Influencing Factors.

    PubMed

    Gregory, Megan E; Sonesh, Shirley C; Feitosa, Jennifer; Benishek, Lauren E; Hughes, Ashley M; Salas, Eduardo

    2017-09-01

    Objective The aim of this study was to describe the relationship between negative affect (NA), decision-making style, time stress, and decision quality in health care. Background Health care providers must often make swift, high-stakes decisions. Influencing factors of the decision-making process in this context have been understudied. Method Within a sample of labor and delivery nurses, physicians, and allied personnel, we used self-report measures to examine the impact of trait factors, including NA, decision-making style, and perceived time stress, on decision quality in a situational judgment test (Study 1). In Study 2, we observed the influence of state NA, state decision-making style, state time stress, and their relationship with decision quality on real clinical decisions. Results In Study 1, we found that trait NA significantly predicted avoidant decision-making style. Furthermore, those who were higher on trait time stress and trait avoidant decision-making style exhibited poorer decisions. In Study 2, we observed associations between state NA with state avoidant and analytical decision-making styles. We also observed that these decision-making styles, when considered in tandem with time stress, were influential in predicting clinical decision quality. Conclusion NA predicts some decision-making styles, and decision-making style can affect decision quality under time stress. This is particularly true for state factors. Application Individual differences, such as affect and decision-making style, should be considered during selection. Training to reduce time stress perceptions should be provided.

  11. Barriers to and facilitators of implementing shared decision making and decision support in a paediatric hospital: A descriptive study.

    PubMed

    Boland, Laura; McIsaac, Daniel I; Lawson, Margaret L

    2016-04-01

    To explore multiple stakeholders' perceived barriers to and facilitators of implementing shared decision making and decision support in a tertiary paediatric hospital. An interpretive descriptive qualitative study was conducted using focus groups and interviews to examine senior hospital administrators', clinicians', parents' and youths' perceived barriers to and facilitators of shared decision making and decision support implementation. Data were analyzed using inductive thematic analysis. Fifty-seven stakeholders participated. Six barrier and facilitator themes emerged. The main barrier was gaps in stakeholders' knowledge of shared decision making and decision support. Facilitators included compatibility between shared decision making and the hospital's culture and ideal practices, perceptions of positive patient and family outcomes associated with shared decision making, and positive attitudes regarding shared decision making and decision support. However, youth attitudes regarding the necessity and usefulness of a decision support program were a barrier. Two themes were both a barrier and a facilitator. First, stakeholder groups were uncertain which clinical situations are suitable for shared decision making (eg, new diagnoses, chronic illnesses, complex decisions or urgent decisions). Second, the clinical process may be hindered if shared decision making and decision support decrease efficiency and workflow; however, shared decision making may reduce repeat visits and save time over the long term. Specific knowledge translation strategies that improve shared decision making knowledge and match specific barriers identified by each stakeholder group may be required to promote successful shared decision making and decision support implementation in the authors' paediatric hospital.

  12. On Issue of Algorithm Forming for Assessing Investment Attractiveness of Region Through Its Technospheric Security

    NASA Astrophysics Data System (ADS)

    Filimonova, L. A.; Skvortsova, N. K.

    2017-11-01

    The article examines the problematic aspects of assessing the investment attractiveness of a region associated with the consideration of methodological issues that require refinement from the point of view of its technospheric security. Such issues include the formation of a sound system of indicators for the assessment of man-made risk which has a particular impact on the level of investment attractiveness of the region. In the context of the instability of the economic situation in Russia, the problem of man-made risks assessing in the context of the regional investment attractiveness based on an integrated approach and taking into account such principles as flexibility, adaptability, innovative orientation has not only lost its relevance but was also transformed into one of the most important conditions for ensuring the effective management of all spheres of the regional activities. The article poses the classical problem of making decisions on the results of the assessment of the investment attractiveness of the region in a matrix format evaluating the utility function. The authors of the article recommended a universal risk assessment model with its subsequent synthesis into technospheric security for the comprehensive assessment of regional investment attractiveness. The principal distinguishing feature of the study results are the schemes for manipulation in the evaluation activity associated with the selection of the optimality criteria groups and models for their study. These iterations make it possible to substantiate the choice of the solution for preserving the technospheric security of the region, a field of compromises or an “ideal” solution to the problem of the regional investment attractiveness loss.

  13. Decision-making on shared sanitation in the informal settlements of Kisumu, Kenya.

    PubMed

    Simiyu, Sheillah; Swilling, Mark; Cairncross, Sandy

    2017-10-01

    Unlike most quantitative studies that investigate decision-making on investing in sanitation, this study adopted a qualitative approach to investigate decision-making on shared sanitation in the informal settlements of Kisumu city, in Kenya. Using a grounded theory approach, landlords and tenants were interviewed to identify sanitation decisions, individuals involved in decision-making and factors influencing decision-making. The results indicate that the main sanitation decisions are on investment, emptying, repair and cleaning. Landlords make investment, emptying and repair decisions, while tenants make cleaning decisions. Absentee landlords are less involved in most decision-making compared to live-in landlords, who rarely consult tenants in decision-making. Tenants make decisions after consultations with a third party and often collectively with other tenants. Sanitation interventions in informal settlements should thus, target landlords and tenants, with investment efforts being directed at landlords and maintenance efforts at tenants.

  14. Evaluation of power system security and development of transmission pricing method

    NASA Astrophysics Data System (ADS)

    Kim, Hyungchul

    The electric power utility industry is presently undergoing a change towards the deregulated environment. This has resulted in unbundling of generation, transmission and distribution services. The introduction of competition into unbundled electricity services may lead system operation closer to its security boundaries resulting in smaller operating safety margins. The competitive environment is expected to lead to lower price rates for customers and higher efficiency for power suppliers in the long run. Under this deregulated environment, security assessment and pricing of transmission services have become important issues in power systems. This dissertation provides new methods for power system security assessment and transmission pricing. In power system security assessment, the following issues are discussed (1) The description of probabilistic methods for power system security assessment; (2) The computation time of simulation methods; (3) on-line security assessment for operation. A probabilistic method using Monte-Carlo simulation is proposed for power system security assessment. This method takes into account dynamic and static effects corresponding to contingencies. Two different Kohonen networks, Self-Organizing Maps and Learning Vector Quantization, are employed to speed up the probabilistic method. The combination of Kohonen networks and Monte-Carlo simulation can reduce computation time in comparison with straight Monte-Carlo simulation. A technique for security assessment employing Bayes classifier is also proposed. This method can be useful for system operators to make security decisions during on-line power system operation. This dissertation also suggests an approach for allocating transmission transaction costs based on reliability benefits in transmission services. The proposed method shows the transmission transaction cost of reliability benefits when transmission line capacities are considered. The ratio between allocation by transmission line capacity-use and allocation by reliability benefits is computed using the probability of system failure.

  15. An integrated water-energy-food-livelihoods approach for assessing environmental livelihood security

    NASA Astrophysics Data System (ADS)

    Biggs, E. M.; Duncan, J.; Boruff, B.; Bruce, E.; Neef, A.; McNeill, K.; van Ogtrop, F. F.; Haworth, B.; Duce, S.; Horsley, J.; Pauli, N.; Curnow, J.; Imanari, Y.

    2015-12-01

    Environmental livelihood security refers to the challenges of maintaining global food security and universal access to freshwater and energy to sustain livelihoods and promote inclusive economic growth, whilst sustaining key environmental systems' functionality, particularly under variable climatic regimes. Environmental security is a concept complementary to sustainable development, and considers the increased vulnerability people have to certain environmental stresses, such as climatic change. Bridging links between the core component concepts of environmental security is integral to future human security, and in an attempt to create this bridge, the nexus approach to human protection has been created, where water resource availability underpins food, water and energy security. The water-energy-food nexus has an influential role in attaining human security, yet little research has made the link between the nexus and livelihoods. In this research we provide a critical appraisal of the synergies between water-energy-food nexus framings and sustainable livelihoods approaches, both of which aim to promote sustainable development. In regions where livelihoods are dependent on environmental conditions, the concept of sustainable development is critical for ensuring future environmental and human security. Given our appraisal we go on to develop an integrated framework for assessing environmental livelihood security of multiscale and multi-level systems. This framework provides a tangible approach for assessing changes in the water-energy-food-livelihood indicators of a system. Examples of where system applications may occur are discussed for the Southeast Asia and Oceania region. Our approach will be particularly useful for policy-makers to inform evidence-based decision-making, especially in localities where climate change increases the vulnerability of impoverished communities and extenuates environmental livelihood insecurity.

  16. Using the Situated Clinical Decision-Making framework to guide analysis of nurses' clinical decision-making.

    PubMed

    Gillespie, Mary

    2010-11-01

    Nurses' clinical decision-making is a complex process that holds potential to influence the quality of care provided and patient outcomes. The evolution of nurses' decision-making that occurs with experience has been well documented. In addition, literature includes numerous strategies and approaches purported to support development of nurses' clinical decision-making. There has been, however, significantly less attention given to the process of assessing nurses' clinical decision-making and novice clinical educators are often challenged with knowing how to best support nurses and nursing students in developing their clinical decision-making capacity. The Situated Clinical Decision-Making framework is presented for use by clinical educators: it provides a structured approach to analyzing nursing students' and novice nurses' decision-making in clinical nursing practice, assists educators in identifying specific issues within nurses' clinical decision-making, and guides selection of relevant strategies to support development of clinical decision-making. A series of questions is offered as a guide for clinical educators when assessing nurses' clinical decision-making. The discussion presents key considerations related to analysis of various decision-making components, including common sources of challenge and errors that may occur within nurses' clinical decision-making. An exemplar illustrates use of the framework and guiding questions. Implications of this approach for selection of strategies that support development of clinical decision-making are highlighted. Copyright © 2010 Elsevier Ltd. All rights reserved.

  17. [Decision Making and Electrodermal Activity].

    PubMed

    Kobayakawa, Mutsutaka

    2016-08-01

    Decision making is aided by emotions. Bodily responses, such as sweating, heartbeat, and visceral sensation, are used to monitor the emotional state during decision making. Because decision making in dairy life is complicated and cognitively demanding, these bodily signals are thought to facilitate the decision making process by assigning positive or negative values for each of the behavioral options. The sweat response in a decision making task is measured by skin conductance response (SCR). SCR in decision making is divided into two categories: anticipatory SCR is observed before making decisions, and reward/punishment SCR is observed after the outcome of the decision is perceived. Brain lesion studies in human revealed that the amygdala and ventromedial prefrontal cortex are important in decision making. Patients with lesinon in the amygdala exhibit neither the anticipatory nor reward/punishment SCRs, while patients with the ventromedial prefrontal lesions have deficits only in the anticipatory SCRs. Decision making tasks and SCR analysis have contributed to reveal the implicit aspects of decision making. Further research is necessary for clarifying the role of explicit process of decision making and its relationship with the implicit process.

  18. ISTIMES Integrated System for Transport Infrastructures Surveillance and Monitoring by Electromagnetic Sensing

    NASA Astrophysics Data System (ADS)

    Argenti, M.; Giannini, V.; Averty, R.; Bigagli, L.; Dumoulin, J.

    2012-04-01

    The EC FP7 ISTIMES project has the goal of realizing an ICT-based system exploiting distributed and local sensors for non destructive electromagnetic monitoring in order to make critical transport infrastructures more reliable and safe. Higher situation awareness thanks to real time and detailed information and images of the controlled infrastructure status allows improving decision capabilities for emergency management stakeholders. Web-enabled sensors and a service-oriented approach are used as core of the architecture providing a sys-tem that adopts open standards (e.g. OGC SWE, OGC CSW etc.) and makes efforts to achieve full interoperability with other GMES and European Spatial Data Infrastructure initiatives as well as compliance with INSPIRE. The system exploits an open easily scalable network architecture to accommodate a wide range of sensors integrated with a set of tools for handling, analyzing and processing large data volumes from different organizations with different data models. Situation Awareness tools are also integrated in the system. Definition of sensor observations and services follows a metadata model based on the ISO 19115 Core set of metadata elements and the O&M model of OGC SWE. The ISTIMES infrastructure is based on an e-Infrastructure for geospatial data sharing, with a Data Cata-log that implements the discovery services for sensor data retrieval, acting as a broker through static connections based on standard SOS and WNS interfaces; a Decision Support component which helps decision makers providing support for data fusion and inference and generation of situation indexes; a Presentation component which implements system-users interaction services for information publication and rendering, by means of a WEB Portal using SOA design principles; A security framework using Shibboleth open source middleware based on the Security Assertion Markup Language supporting Single Sign On (SSO). ACKNOWLEDGEMENT - The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under Grant Agreement n° 225663

  19. A systematic approach for watershed ecological restoration strategy making: An application in the Taizi River Basin in northern China.

    PubMed

    Li, Mengdi; Fan, Juntao; Zhang, Yuan; Guo, Fen; Liu, Lusan; Xia, Rui; Xu, Zongxue; Wu, Fengchang

    2018-05-15

    Aiming to protect freshwater ecosystems, river ecological restoration has been brought into the research spotlight. However, it is challenging for decision makers to set appropriate objectives and select a combination of rehabilitation acts from numerous possible solutions to meet ecological, economic, and social demands. In this study, we developed a systematic approach to help make an optimal strategy for watershed restoration, which incorporated ecological security assessment and multi-objectives optimization (MOO) into the planning process to enhance restoration efficiency and effectiveness. The river ecological security status was evaluated by using a pressure-state-function-response (PSFR) assessment framework, and MOO was achieved by searching for the Pareto optimal solutions via Non-dominated Sorting Genetic Algorithm II (NSGA-II) to balance tradeoffs between different objectives. Further, we clustered the searched solutions into three types in terms of different optimized objective function values in order to provide insightful information for decision makers. The proposed method was applied in an example rehabilitation project in the Taizi River Basin in northern China. The MOO result in the Taizi River presented a set of Pareto optimal solutions that were classified into three types: I - high ecological improvement, high cost and high benefits solution; II - medial ecological improvement, medial cost and medial economic benefits solution; III - low ecological improvement, low cost and low economic benefits solution. The proposed systematic approach in our study can enhance the effectiveness of riverine ecological restoration project and could provide valuable reference for other ecological restoration planning. Copyright © 2018 Elsevier B.V. All rights reserved.

  20. The contribution of ecosystem services to place utility as a determinant of migration decision-making

    NASA Astrophysics Data System (ADS)

    Adams, Helen; Adger, W. Neil

    2013-03-01

    Environment migration research has sought to provide an account of how environmental risks and resources affect migration and mobility. Part of that effort has focused on the role of the environment in providing secure livelihoods through provisioning ecosystem services. However, many of the models of environment migration linkages fail to acknowledge the importance of social and psychological factors in the decision to migrate. Here, we seek to provide a more comprehensive model of migration decision-making under environmental change by investigating the attachment people form to place, and the role of the environment in creating that attachment. We hypothesize that environmental factors enter the migration decision-making process through their contribution to place utility, defined as a function of both affective and instrumental bonds to location, and that ecosystem services, the aspects of ecosystems that create wellbeing, contribute to both components of place utility. We test these ideas in four rural highland settlements in Peru sampled along an altitudinal gradient. We find that non-economic ecosystem services are important in creating place attachment and that ecological place attachment exists independently of use of provisioning ecosystem services. Individuals’ attitudes to ecosystem services vary with the type of ecosystem services available at a location and the degree of rurality. While social and economic factors are the dominant drivers of migration in these locations, a loss of non-provisioning ecosystem services leads to a decrease in place utility and commitment to place, determining factors in the decision to migrate. The findings suggest that policy interventions encouraging migration as an adaptation to environmental change will have limited success if they only focus on provisioning services. A much wider set of individuals will experience a decrease in place utility, and migration will be unable to alleviate that decrease since the factors that create it are specific to place.

  1. What is a “good” treatment decision?: Decisional control, knowledge, treatment decision-making, and quality of life in men with clinically localized prostate cancer

    PubMed Central

    Orom, Heather; Biddle, Caitlin; Underwood, Willie; Nelson, Christian J.; Homish, D. Lynn

    2016-01-01

    Objective We explored whether active patient involvement in decision making and greater patient knowledge are associated with better treatment decision making experiences and better quality of life (QOL) among men with clinically localized prostate cancer. Localized prostate cancer treatment decision-making is an advantageous model for studying patient treatment decision-making dynamics as there are multiple treatment options and a lack of empirical evidence to recommend one over the other; consequently, it is recommended that patients be fully involved in making the decision. Methods Men with newly diagnosed clinically localized prostate cancer (N=1529) completed measures of decisional control, prostate cancer knowledge, and their decision-making experience (decisional conflict, and decision-making satisfaction and difficulty) shortly after they made their treatment decision. Prostate cancer-specific QOL was assessed 6-months after treatment. Results More active involvement in decision making and greater knowledge were associated with lower decisional conflict and higher decision-making satisfaction, but greater decision-making difficulty. An interaction between decisional control and knowledge revealed that greater knowledge was only associated with greater difficulty for men actively involved in making the decision (67% of sample). Greater knowledge, but not decisional control predicted better QOL 6-months post-treatment. Conclusion Although men who are actively involved in decision making and more knowledgeable may make more informed decisions, they could benefit from decisional support (e.g., decision-making aids, emotional support from providers, strategies for reducing emotional distress) to make the process easier. Men who were more knowledgeable about prostate cancer and treatment side effects at the time they made their treatment decision may have appraised their QOL as higher because they had realistic expectations about side effects. PMID:26957566

  2. What Is a "Good" Treatment Decision? Decisional Control, Knowledge, Treatment Decision Making, and Quality of Life in Men with Clinically Localized Prostate Cancer.

    PubMed

    Orom, Heather; Biddle, Caitlin; Underwood, Willie; Nelson, Christian J; Homish, D Lynn

    2016-08-01

    We explored whether active patient involvement in decision making and greater patient knowledge are associated with better treatment decision-making experiences and better quality of life (QOL) among men with clinically localized prostate cancer. Localized prostate cancer treatment decision making is an advantageous model for studying patient treatment decision-making dynamics because there are multiple treatment options and a lack of empirical evidence to recommend one over the other; consequently, it is recommended that patients be fully involved in making the decision. Men with newly diagnosed clinically localized prostate cancer (N = 1529) completed measures of decisional control, prostate cancer knowledge, and decision-making experiences (decisional conflict and decision-making satisfaction and difficulty) shortly after they made their treatment decision. Prostate cancer-specific QOL was assessed at 6 months after treatment. More active involvement in decision making and greater knowledge were associated with lower decisional conflict and higher decision-making satisfaction but greater decision-making difficulty. An interaction between decisional control and knowledge revealed that greater knowledge was only associated with greater difficulty for men actively involved in making the decision (67% of sample). Greater knowledge, but not decisional control, predicted better QOL 6 months after treatment. Although men who are actively involved in decision making and more knowledgeable may make more informed decisions, they could benefit from decisional support (e.g., decision-making aids, emotional support from providers, strategies for reducing emotional distress) to make the process easier. Men who were more knowledgeable about prostate cancer and treatment side effects at the time that they made their treatment decision may have appraised their QOL as higher because they had realistic expectations about side effects. © The Author(s) 2016.

  3. Barriers to and facilitators of implementing shared decision making and decision support in a paediatric hospital: A descriptive study

    PubMed Central

    Boland, Laura; McIsaac, Daniel I; Lawson, Margaret L

    2016-01-01

    OBJECTIVE: To explore multiple stakeholders’ perceived barriers to and facilitators of implementing shared decision making and decision support in a tertiary paediatric hospital. METHODS: An interpretive descriptive qualitative study was conducted using focus groups and interviews to examine senior hospital administrators’, clinicians’, parents’ and youths’ perceived barriers to and facilitators of shared decision making and decision support implementation. Data were analyzed using inductive thematic analysis. RESULTS: Fifty-seven stakeholders participated. Six barrier and facilitator themes emerged. The main barrier was gaps in stakeholders’ knowledge of shared decision making and decision support. Facilitators included compatibility between shared decision making and the hospital’s culture and ideal practices, perceptions of positive patient and family outcomes associated with shared decision making, and positive attitudes regarding shared decision making and decision support. However, youth attitudes regarding the necessity and usefulness of a decision support program were a barrier. Two themes were both a barrier and a facilitator. First, stakeholder groups were uncertain which clinical situations are suitable for shared decision making (eg, new diagnoses, chronic illnesses, complex decisions or urgent decisions). Second, the clinical process may be hindered if shared decision making and decision support decrease efficiency and workflow; however, shared decision making may reduce repeat visits and save time over the long term. CONCLUSIONS: Specific knowledge translation strategies that improve shared decision making knowledge and match specific barriers identified by each stakeholder group may be required to promote successful shared decision making and decision support implementation in the authors’ paediatric hospital. PMID:27398058

  4. 12 CFR 344.9 - Personal securities trading reporting by bank officers and employees.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... decisions for the accounts of customers; (2) Participate in the determination of such recommendations or decisions; or (3) In connection with their duties, obtain information concerning which securities are being purchased or sold or recommend such action, must report to the bank, within 30-calendar days after the end...

  5. Distinction between Externally vs. Internally Guided Decision-Making: Operational Differences, Meta-Analytical Comparisons and Their Theoretical Implications

    PubMed Central

    Nakao, Takashi; Ohira, Hideki; Northoff, Georg

    2012-01-01

    Most experimental studies of decision-making have specifically examined situations in which a single less-predictable correct answer exists (externally guided decision-making under uncertainty). Along with such externally guided decision-making, there are instances of decision-making in which no correct answer based on external circumstances is available for the subject (internally guided decision-making). Such decisions are usually made in the context of moral decision-making as well as in preference judgment, where the answer depends on the subject’s own, i.e., internal, preferences rather than on external, i.e., circumstantial, criteria. The neuronal and psychological mechanisms that allow guidance of decisions based on more internally oriented criteria in the absence of external ones remain unclear. This study was undertaken to compare decision-making of these two kinds empirically and theoretically. First, we reviewed studies of decision-making to clarify experimental–operational differences between externally guided and internally guided decision-making. Second, using multi-level kernel density analysis, a whole-brain-based quantitative meta-analysis of neuroimaging studies was performed. Our meta-analysis revealed that the neural network used predominantly for internally guided decision-making differs from that for externally guided decision-making under uncertainty. This result suggests that studying only externally guided decision-making under uncertainty is insufficient to account for decision-making processes in the brain. Finally, based on the review and results of the meta-analysis, we discuss the differences and relations between decision-making of these two types in terms of their operational, neuronal, and theoretical characteristics. PMID:22403525

  6. External validity and anchoring heuristics: application of DUNDRUM-1 to secure service gatekeeping in South Wales.

    PubMed

    Lawrence, Daniel; Davies, Tracey-Lee; Bagshaw, Ruth; Hewlett, Paul; Taylor, Pamela; Watt, Andrew

    2018-02-01

    Aims and method Structured clinical judgement tools provide scope for the standardisation of forensic service gatekeeping and also allow identification of heuristics in this decision process. The DUNDRUM-1 triage tool was completed retrospectively for 121 first-time referrals to forensic services in South Wales. Fifty were admitted to medium security, 49 to low security and 22 remained in open conditions. DUNDRUM-1 total scores differed appropriately between different levels of security. However, regression revealed heuristic anchoring on the 'legal process' and 'immediacy of risk due to mental disorder' items. Clinical implications Patient placement was broadly aligned with DUNDRUM-1 recommendations. However, not all triage items informed gatekeeping decisions. It remains to be seen whether decisions anchored in this way are effective. Declaration of interest Dr Mark Freestone gave permission for AUC values from Freestone et al. (2015) to be presented here for comparison.

  7. Assessment of Trading Partners for China's Rare Earth Exports Using a Decision Analytic Approach

    PubMed Central

    He, Chunyan; Lei, Yalin; Ge, Jianping

    2014-01-01

    Chinese rare earth export policies currently result in accelerating its depletion. Thus adopting an optimal export trade selection strategy is crucial to determining and ultimately identifying the ideal trading partners. This paper introduces a multi-attribute decision-making methodology which is then used to select the optimal trading partner. In the method, an evaluation criteria system is established to assess the seven top trading partners based on three dimensions: political relationships, economic benefits and industrial security. Specifically, a simple additive weighing model derived from an additive utility function is utilized to calculate, rank and select alternatives. Results show that Japan would be the optimal trading partner for Chinese rare earths. The criteria evaluation method of trading partners for China's rare earth exports provides the Chinese government with a tool to enhance rare earth industrial policies. PMID:25051534

  8. Healthcare4VideoStorm: Making Smart Decisions Based on Storm Metrics.

    PubMed

    Zhang, Weishan; Duan, Pengcheng; Chen, Xiufeng; Lu, Qinghua

    2016-04-23

    Storm-based stream processing is widely used for real-time large-scale distributed processing. Knowing the run-time status and ensuring performance is critical to providing expected dependability for some applications, e.g., continuous video processing for security surveillance. The existing scheduling strategies' granularity is too coarse to have good performance, and mainly considers network resources without computing resources while scheduling. In this paper, we propose Healthcare4Storm, a framework that finds Storm insights based on Storm metrics to gain knowledge from the health status of an application, finally ending up with smart scheduling decisions. It takes into account both network and computing resources and conducts scheduling at a fine-grained level using tuples instead of topologies. The comprehensive evaluation shows that the proposed framework has good performance and can improve the dependability of the Storm-based applications.

  9. Assessment of trading partners for China's rare earth exports using a decision analytic approach.

    PubMed

    He, Chunyan; Lei, Yalin; Ge, Jianping

    2014-01-01

    Chinese rare earth export policies currently result in accelerating its depletion. Thus adopting an optimal export trade selection strategy is crucial to determining and ultimately identifying the ideal trading partners. This paper introduces a multi-attribute decision-making methodology which is then used to select the optimal trading partner. In the method, an evaluation criteria system is established to assess the seven top trading partners based on three dimensions: political relationships, economic benefits and industrial security. Specifically, a simple additive weighing model derived from an additive utility function is utilized to calculate, rank and select alternatives. Results show that Japan would be the optimal trading partner for Chinese rare earths. The criteria evaluation method of trading partners for China's rare earth exports provides the Chinese government with a tool to enhance rare earth industrial policies.

  10. Perspectives on Cybersecurity Information Sharing among Multiple Stakeholders Using a Decision-Theoretic Approach.

    PubMed

    He, Meilin; Devine, Laura; Zhuang, Jun

    2018-02-01

    The government, private sectors, and others users of the Internet are increasingly faced with the risk of cyber incidents. Damage to computer systems and theft of sensitive data caused by cyber attacks have the potential to result in lasting harm to entities under attack, or to society as a whole. The effects of cyber attacks are not always obvious, and detecting them is not a simple proposition. As the U.S. federal government believes that information sharing on cybersecurity issues among organizations is essential to safety, security, and resilience, the importance of trusted information exchange has been emphasized to support public and private decision making by encouraging the creation of the Information Sharing and Analysis Center (ISAC). Through a decision-theoretic approach, this article provides new perspectives on ISAC, and the advent of the new Information Sharing and Analysis Organizations (ISAOs), which are intended to provide similar benefits to organizations that cannot fit easily into the ISAC structure. To help understand the processes of information sharing against cyber threats, this article illustrates 15 representative information sharing structures between ISAC, government, and other participating entities, and provide discussions on the strategic interactions between different stakeholders. This article also identifies the costs of information sharing and information security borne by different parties in this public-private partnership both before and after cyber attacks, as well as the two main benefits. This article provides perspectives on the mechanism of information sharing and some detailed cost-benefit analysis. © 2017 Society for Risk Analysis.

  11. Joining Forces for Food Security - Linking Earth Observation and Crowd-sourcing for improved Decision-support

    NASA Astrophysics Data System (ADS)

    Enenkel, M.; Dorigo, W.; See, L. M.; Vinck, P.; Papp, A.

    2014-12-01

    Droughts statistically exceed all other natural disasters in complexity, spatio-temporal extent and number of people affected. Triggered by crop failure, food insecurity is a major manifestation of agricultural drought and water scarcity. However, other socio-economic precursors, such as chronically low levels of disaster preparedness, hampered access to food security or a lack of social safety nets are equally important factors. We will present the first results of the SATIDA (Satellite Technologies for Improved Drought-Risk Assessment) project, which advances three complementary developments. First, an existing drought indicator is enhanced by replacing in-situ measurements on rainfall and surface air temperature with satellite-derived datasets. We identify the vegetation status via a new noise-corrected and gap-filled vegetation index. In addition, we introduce a soil moisture component to close the gap between rainfall deficiencies, extreme temperature and the first visible impacts of atmospheric anomalies on vegetation. Second, once calibrated, the index is forced with seasonal forecasts to quantify their uncertainty and added value in the regions of interest. Third, a mobile application is developed to disseminate relevant visualizations to decision-makers in affected areas, to collect additional information about socio-economic conditions and to validate the output of the drought index in real conditions. Involving Doctors without Borders (MSF) as a key user, SATIDA aims at decreasing uncertainties in decision-making via a more holistic risk framework, resulting in longer lead times for disaster logistics in the preparedness phase.

  12. One Way of Thinking About Decision Making.

    ERIC Educational Resources Information Center

    Dalis, Gus T.; Strasser, Ben B.

    The authors present the DALSTRA model of decision making, a descriptive statement of ways individuals or groups respond to different kinds of decision-making problems they encounter. Decision making is viewed in two phases: the decision-making antecedents (whether to decide, how to decide) and the modes of decision making (Chance/Impulse,…

  13. Scenario and multiple criteria decision analysis for energy and environmental security of military and industrial installations.

    PubMed

    Karvetski, Christopher W; Lambert, James H; Linkov, Igor

    2011-04-01

    Military and industrial facilities need secure and reliable power generation. Grid outages can result in cascading infrastructure failures as well as security breaches and should be avoided. Adding redundancy and increasing reliability can require additional environmental, financial, logistical, and other considerations and resources. Uncertain scenarios consisting of emergent environmental conditions, regulatory changes, growth of regional energy demands, and other concerns result in further complications. Decisions on selecting energy alternatives are made on an ad hoc basis. The present work integrates scenario analysis and multiple criteria decision analysis (MCDA) to identify combinations of impactful emergent conditions and to perform a preliminary benefits analysis of energy and environmental security investments for industrial and military installations. Application of a traditional MCDA approach would require significant stakeholder elicitations under multiple uncertain scenarios. The approach proposed in this study develops and iteratively adjusts a scoring function for investment alternatives to find the scenarios with the most significant impacts on installation security. A robust prioritization of investment alternatives can be achieved by integrating stakeholder preferences and focusing modeling and decision-analytical tools on a few key emergent conditions and scenarios. The approach is described and demonstrated for a campus of several dozen interconnected industrial buildings within a major installation. Copyright © 2010 SETAC.

  14. Strategic Decision Making Paradigms: A Primer for Senior Leaders

    DTIC Science & Technology

    2009-07-01

    decision making . STRATEGIC DECISION MAKING Strategic Change: There are several strategic...influenced by stakeholders outside of the organization. The Ontology of Strategic Decision Making . Strategic decisions are non-routine and involve...Coates USAWC, July 2009 5 The Complexity of Strategic Decision Making Strategic decisions entail “ill-structured,”6 “messy” or

  15. Training in Decision-making Strategies: An approach to enhance students' competence to deal with socio-scientific issues

    NASA Astrophysics Data System (ADS)

    Gresch, Helge; Hasselhorn, Marcus; Bögeholz, Susanne

    2013-10-01

    Dealing with socio-scientific issues in science classes enables students to participate productively in controversial discussions concerning ethical topics, such as sustainable development. In this respect, well-structured decision-making processes are essential for elaborate reasoning. To foster decision-making competence, a computer-based programme was developed that trains secondary school students (grades 11-13) in decision-making strategies. The main research question is: does training students to use these strategies foster decision-making competence? In addition, the influence of meta-decision aids was examined. Students conducted a task analysis to select an appropriate strategy prior to the decision-making process. Hence, the second research question is: does combining decision-making training with a task analysis enhance decision-making competence at a higher rate? To answer these questions, 386 students were tested in a pre-post-follow-up control-group design that included two training groups (decision-making strategies/decision-making strategies combined with a task analysis) and a control group (decision-making with additional ecological information instead of strategic training). An open-ended questionnaire was used to assess decision-making competence in situations related to sustainable development. The decision-making training led to a significant improvement in the post-test and the follow-up, which was administered three months after the training. Long-term effects on the quality of the students' decisions were evident for both training groups. Gains in competence when reflecting upon the decision-making processes of others were found, to a lesser extent, in the training group that received the additional meta-decision training. In conclusion, training in decision-making strategies is a promising approach to deal with socio-scientific issues related to sustainable development.

  16. Shared Decision Making in ICUs: An American College of Critical Care Medicine and American Thoracic Society Policy Statement.

    PubMed

    Kon, Alexander A; Davidson, Judy E; Morrison, Wynne; Danis, Marion; White, Douglas B

    2016-01-01

    Shared decision making is endorsed by critical care organizations; however, there remains confusion about what shared decision making is, when it should be used, and approaches to promote partnerships in treatment decisions. The purpose of this statement is to define shared decision making, recommend when shared decision making should be used, identify the range of ethically acceptable decision-making models, and present important communication skills. The American College of Critical Care Medicine and American Thoracic Society Ethics Committees reviewed empirical research and normative analyses published in peer-reviewed journals to generate recommendations. Recommendations approved by consensus of the full Ethics Committees of American College of Critical Care Medicine and American Thoracic Society were included in the statement. Six recommendations were endorsed: 1) DEFINITION: Shared decision making is a collaborative process that allows patients, or their surrogates, and clinicians to make healthcare decisions together, taking into account the best scientific evidence available, as well as the patient's values, goals, and preferences. 2) Clinicians should engage in a shared decision making process to define overall goals of care (including decisions regarding limiting or withdrawing life-prolonging interventions) and when making major treatment decisions that may be affected by personal values, goals, and preferences. 3) Clinicians should use as their "default" approach a shared decision making process that includes three main elements: information exchange, deliberation, and making a treatment decision. 4) A wide range of decision-making approaches are ethically supportable, including patient- or surrogate-directed and clinician-directed models. Clinicians should tailor the decision-making process based on the preferences of the patient or surrogate. 5) Clinicians should be trained in communication skills. 6) Research is needed to evaluate decision-making strategies. Patient and surrogate preferences for decision-making roles regarding value-laden choices range from preferring to exercise significant authority to ceding such authority to providers. Clinicians should adapt the decision-making model to the needs and preferences of the patient or surrogate.

  17. Modelling elderly cardiac patients decision making using Cognitive Work Analysis: identifying requirements for patient decision aids.

    PubMed

    Dhukaram, Anandhi Vivekanandan; Baber, Chris

    2015-06-01

    Patients make various healthcare decisions on a daily basis. Such day-to-day decision making can have significant consequences on their own health, treatment, care, and costs. While decision aids (DAs) provide effective support in enhancing patient's decision making, to date there have been few studies examining patient's decision making process or exploring how the understanding of such decision processes can aid in extracting requirements for the design of DAs. This paper applies Cognitive Work Analysis (CWA) to analyse patient's decision making in order to inform requirements for supporting self-care decision making. This study uses focus groups to elicit information from elderly cardiovascular disease (CVD) patients concerning a range of decision situations they face on a daily basis. Specifically, the focus groups addressed issues related to the decision making of CVD in terms of medication compliance, pain, diet and exercise. The results of these focus groups are used to develop high level views using CWA. CWA framework decomposes the complex decision making problem to inform three approaches to DA design: one design based on high level requirements; one based on a normative model of decision-making for patients; and the third based on a range of heuristics that patients seem to use. CWA helps in extracting and synthesising decision making from different perspectives: decision processes, work organisation, patient competencies and strategies used in decision making. As decision making can be influenced by human behaviour like skills, rules and knowledge, it is argued that patients require support to different types of decision making. This paper also provides insights for designers in using CWA framework for the design of effective DAs to support patients in self-management. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  18. Decision-making in Swiss home-like childbirth: A grounded theory study.

    PubMed

    Meyer, Yvonne; Frank, Franziska; Schläppy Muntwyler, Franziska; Fleming, Valerie; Pehlke-Milde, Jessica

    2017-12-01

    Decision-making in midwifery, including a claim for shared decision-making between midwives and women, is of major significance for the health of mother and child. Midwives have little information about how to share decision-making responsibilities with women, especially when complications arise during birth. To increase understanding of decision-making in complex home-like birth settings by exploring midwives' and women's perspectives and to develop a dynamic model integrating participatory processes for making shared decisions. The study, based on grounded theory methodology, analysed 20 interviews of midwives and 20 women who had experienced complications in home-like births. The central phenomenon that arose from the data was "defining/redefining decision as a joint commitment to healthy childbirth". The sub-indicators that make up this phenomenon were safety, responsibility, mutual and personal commitments. These sub-indicators were also identified to influence temporal conditions of decision-making and to apply different strategies for shared decision-making. Women adopted strategies such as delegating a decision, making the midwife's decision her own, challenging a decision or taking a decision driven by the dynamics of childbirth. Midwives employed strategies such as remaining indecisive, approving a woman's decision, making an informed decision or taking the necessary decision. To respond to recommendations for shared responsibility for care, midwives need to strengthen their shared decision-making skills. The visual model of decision-making in childbirth derived from the data provides a framework for transferring clinical reasoning into practice. Copyright © 2017 Australian College of Midwives. Published by Elsevier Ltd. All rights reserved.

  19. Shared decision-making - Rhetoric and reality: Women's experiences and perceptions of adjuvant treatment decision-making for breast cancer.

    PubMed

    Mahmoodi, Neda; Sargeant, Sally

    2017-01-01

    This interview-based study uses phenomenology as a theoretical framework and thematic analysis to challenge existing explanatory frameworks of shared decision-making, in an exploration of women's experiences and perceptions of shared decision-making for adjuvant treatment in breast cancer. Three themes emerged are as follows: (1) women's desire to participate in shared decision-making, (2) the degree to which shared decision-making is perceived to be shared and (3) to what extent are women empowered within shared decision-making. Studying breast cancer patients' subjective experiences of adjuvant treatment decision-making provides a broader perspective on patient participatory role preferences and doctor-patient power dynamics within shared decision-making for breast cancer.

  20. Measuring Shared Decision Making in Psychiatric Care

    PubMed Central

    Salyers, Michelle P.; Matthias, Marianne S.; Fukui, Sadaaki; Holter, Mark C.; Collins, Linda; Rose, Nichole; Thompson, John; Coffman, Melinda; Torrey, William C.

    2014-01-01

    Objective Shared decision making is widely recognized to facilitate effective health care; tools are needed to measure the level of shared decision making in psychiatric practice. Methods A coding scheme assessing shared decision making in medical settings (1) was adapted, including creation of a manual. Trained raters analyzed 170 audio recordings of psychiatric medication check-up visits. Results Inter-rater reliability among three raters for a subset of 20 recordings ranged from 67% to 100% agreement for the presence of each of nine elements of shared decision making and 100% for the overall agreement between provider and consumer. Just over half of the decisions met minimum criteria for shared decision making. Shared decision making was not related to length of visit after controlling for complexity of decision. Conclusions The shared decision making rating scale appears to reliably assess shared decision making in psychiatric practice and could be helpful for future research, training, and implementation efforts. PMID:22854725

  1. The Priority Heuristic: Making Choices Without Trade-Offs

    PubMed Central

    Brandstätter, Eduard; Gigerenzer, Gerd; Hertwig, Ralph

    2010-01-01

    Bernoulli's framework of expected utility serves as a model for various psychological processes, including motivation, moral sense, attitudes, and decision making. To account for evidence at variance with expected utility, we generalize the framework of fast and frugal heuristics from inferences to preferences. The priority heuristic predicts (i) Allais' paradox, (ii) risk aversion for gains if probabilities are high, (iii) risk seeking for gains if probabilities are low (lottery tickets), (iv) risk aversion for losses if probabilities are low (buying insurance), (v) risk seeking for losses if probabilities are high, (vi) certainty effect, (vii) possibility effect, and (viii) intransitivities. We test how accurately the heuristic predicts people's choices, compared to previously proposed heuristics and three modifications of expected utility theory: security-potential/aspiration theory, transfer-of-attention-exchange model, and cumulative prospect theory. PMID:16637767

  2. Linking decision-making research and cancer prevention and control: important themes.

    PubMed

    McCaul, Kevin D; Peters, Ellen; Nelson, Wendy; Stefanek, Michael

    2005-07-01

    This article describes 6 themes underlying the multiple presentations from the Basic and Applied Decision Making in Cancer Control meeting, held February 19-20, 2004. The following themes have important implications for research and practice linking basic decision-making research to cancer prevention and control: (a) Traditional decision-making theories fail to capture real-world decision making, (b) decision makers are often unable to predict future preferences, (c) preferences are often constructed on the spot and thus are influenced by situational cues, (d) decision makers often rely on feelings rather than beliefs when making a decision, (e) the perspective of the decision maker is critical in determining preferences, and (f) informed decision making may--or may not--yield the best decisions.

  3. Measurement issues associated with using survey data matched with administrative data from the Social Security Administration.

    PubMed

    Davies, Paul S; Fisher, T Lynn

    2009-01-01

    Researchers using survey data matched with administrative data benefit from the rich demographic and economic detail available from survey data combined with detailed programmatic data from administrative records. The research benefits of using these matched data are too numerous to mention. But there are drawbacks as well, and those drawbacks have received less systematic attention from researchers. We focus on survey data matched with administrative data from the Social Security Administration and address the strengths and weaknesses of each in four specific areas: (1) program participation and benefits, (2) disability and health information, (3) earnings, and (4) deferred compensation. We discuss the implications of these strengths and weaknesses for decisions that researchers must make regarding the appropriate data source and definition for the concepts in question. From this discussion, some general conclusions are drawn about measurement issues associated with using matched survey and administrative data for research, policy evaluation, and statistics.

  4. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey

    PubMed Central

    Abdalzaher, Mohamed S.; Seddik, Karim; Elsabrouty, Maha; Muta, Osamu; Furukawa, Hiroshi; Abdel-Rahman, Adel

    2016-01-01

    We present a study of using game theory for protecting wireless sensor networks (WSNs) from selfish behavior or malicious nodes. Due to scalability, low complexity and disseminated nature of WSNs, malicious attacks can be modeled effectively using game theory. In this study, we survey the different game-theoretic defense strategies for WSNs. We present a taxonomy of the game theory approaches based on the nature of the attack, whether it is caused by an external attacker or it is the result of an internal node acting selfishly or maliciously. We also present a general trust model using game theory for decision making. We, finally, identify the significant role of evolutionary games for WSNs security against intelligent attacks; then, we list several prospect applications of game theory to enhance the data trustworthiness and node cooperation in different WSNs. PMID:27367700

  5. An examination of electronic health information privacy in older adults.

    PubMed

    Le, Thai; Thompson, Hilaire; Demiris, George

    2013-01-01

    Older adults are the quickest growing demographic group and are key consumers of health services. As the United States health system transitions to electronic health records, it is important to understand older adult perceptions of privacy and security. We performed a secondary analysis of the Health Information National Trends Survey (2012, Cycle 1), to examine differences in perceptions of electronic health information privacy between older adults and the general population. We found differences in the level of importance placed on access to electronic health information (older adults placed greater emphasis on provider as opposed to personal access) and tendency to withhold information out of concerns for privacy and security (older adults were less likely to withhold information). We provide recommendations to alleviate some of these privacy concerns. This may facilitate greater use of electronic health communication between patient and provider, while promoting shared decision making.

  6. Water Security Toolkit User Manual: Version 1.3 | Science ...

    EPA Pesticide Factsheets

    User manual: Data Product/Software The Water Security Toolkit (WST) is a suite of tools that help provide the information necessary to make good decisions resulting in the minimization of further human exposure to contaminants, and the maximization of the effectiveness of intervention strategies. WST assists in the evaluation of multiple response actions in order to select the most beneficial consequence management strategy. It includes hydraulic and water quality modeling software and optimization methodologies to identify: (1) sensor locations to detect contamination, (2) locations in the network in which the contamination was introduced, (3) hydrants to remove contaminated water from the distribution system, (4) locations in the network to inject decontamination agents to inactivate, remove or destroy contaminants, (5) locations in the network to take grab sample to confirm contamination or cleanup and (6) valves to close in order to isolate contaminated areas of the network.

  7. [Organization and functioning of health services of the IMSS-Solidaridad program].

    PubMed

    Velázquez-Díaz, G

    1992-01-01

    In this report the organization and performance of the IMSS-Solidaridad Program of Mexico is described. This program is managed by the Mexican Institute for Social Security, which services 10.5 million inhabitants of the rural underserved areas, with federal government resources in 18 states. This study compares the structure and functioning of the IMSS-Solidaridad Program with Local Health Systems, as they have been proposed by the Panamerican Health Organization for country members and by the Ministry of Health of Mexico, particularly in relation to the decision-making process at local level. Some assets and limitations of the IMSS-Solidaridad Program are analyzed and, finally, concrete procedures to improve coordination between the IMSS-Solidaridad Program and other health services for similar populations (populations without social security protection) in Mexico are suggested, with the purpose of using resources more adequately and succeed in the national goal to achieve equity in health.

  8. 17 CFR 242.103 - Nasdaq passive market making.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Nasdaq passive market making... Regulation M § 242.103 Nasdaq passive market making. (a) Scope of section. This section permits broker-dealers to engage in market making transactions in covered securities that are Nasdaq securities without...

  9. 17 CFR 242.103 - Nasdaq passive market making.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Nasdaq passive market making... Regulation M § 242.103 Nasdaq passive market making. (a) Scope of section. This section permits broker-dealers to engage in market making transactions in covered securities that are Nasdaq securities without...

  10. 17 CFR 242.103 - Nasdaq passive market making.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Nasdaq passive market making... Regulation M § 242.103 Nasdaq passive market making. (a) Scope of section. This section permits broker-dealers to engage in market making transactions in covered securities that are Nasdaq securities without...

  11. 17 CFR 242.103 - Nasdaq passive market making.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Nasdaq passive market making... Regulation M § 242.103 Nasdaq passive market making. (a) Scope of Section. This section permits broker-dealers to engage in market making transactions in covered securities that are Nasdaq securities without...

  12. 17 CFR 242.103 - Nasdaq passive market making.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Nasdaq passive market making... Regulation M § 242.103 Nasdaq passive market making. (a) Scope of Section. This section permits broker-dealers to engage in market making transactions in covered securities that are Nasdaq securities without...

  13. Consolidation of a WSN and Minimax Method to Rapidly Neutralise Intruders in Strategic Installations

    PubMed Central

    Conesa-Muñoz, Jesus; Ribeiro, Angela

    2012-01-01

    Due to the sensitive international situation caused by still-recent terrorist attacks, there is a common need to protect the safety of large spaces such as government buildings, airports and power stations. To address this problem, developments in several research fields, such as video and cognitive audio, decision support systems, human interface, computer architecture, communications networks and communications security, should be integrated with the goal of achieving advanced security systems capable of checking all of the specified requirements and spanning the gap that presently exists in the current market. This paper describes the implementation of a decision system for crisis management in infrastructural building security. Specifically, it describes the implementation of a decision system in the management of building intrusions. The positions of the unidentified persons are reported with the help of a Wireless Sensor Network (WSN). The goal is to achieve an intelligent system capable of making the best decision in real time in order to quickly neutralise one or more intruders who threaten strategic installations. It is assumed that the intruders’ behaviour is inferred through sequences of sensors’ activations and their fusion. This article presents a general approach to selecting the optimum operation from the available neutralisation strategies based on a Minimax algorithm. The distances among different scenario elements will be used to measure the risk of the scene, so a path planning technique will be integrated in order to attain a good performance. Different actions to be executed over the elements of the scene such as moving a guard, blocking a door or turning on an alarm will be used to neutralise the crisis. This set of actions executed to stop the crisis is known as the neutralisation strategy. Finally, the system has been tested in simulations of real situations, and the results have been evaluated according to the final state of the intruders. In 86.5% of the cases, the system achieved the capture of the intruders, and in 59.25% of the cases, they were intercepted before they reached their objective. PMID:22737008

  14. Couples’ reports of household decision-making and the utilization of maternal health services in Bangladesh

    PubMed Central

    Story, William T.; Burgard, Sarah A.

    2012-01-01

    This study examines the association between maternal health service utilization and household decision-making in Bangladesh. Most studies of the predictors of reproductive health service use focus on women’s reports; however, men are often involved in these decisions as well. Recently, studies have started to explore the association between health outcomes and reports of household decision-making from both husbands and wives as matched pairs. Many studies of household decision-making emphasize the importance of the wife alone making decisions; however, some have argued that joint decision-making between husbands and wives may yield better reproductive health outcomes than women making decisions without input or agreement from their partners. Husbands’ involvement in decision-making is particularly important in Bangladesh because men often dominate household decisions related to large, health-related purchases. We use matched husband and wife reports about who makes common household decisions to predict use of antenatal and skilled delivery care, using data from the 2007 Bangladesh Demographic and Health Survey. Results from regression analyses suggest that it is important to consider whether husbands and wives give concordant responses about who makes household decisions since discordant reports about who makes these decisions are negatively associated with reproductive health care use. In addition, compared to joint decision-making, husband-only decision-making is negatively associated with antenatal care use and skilled delivery care. Finally, associations between household decision-making arrangements and health service utilization vary depending on whose report is used and the type of health service utilized. PMID:23068556

  15. Couples' reports of household decision-making and the utilization of maternal health services in Bangladesh.

    PubMed

    Story, William T; Burgard, Sarah A

    2012-12-01

    This study examines the association between maternal health service utilization and household decision-making in Bangladesh. Most studies of the predictors of reproductive health service utilization focus on women's reports; however, men are often involved in these decisions as well. Recently, studies have started to explore the association between health outcomes and reports of household decision-making from both husbands and wives as matched pairs. Many studies of household decision-making emphasize the importance of the wife alone making decisions; however, some have argued that joint decision-making between husbands and wives may yield better reproductive health outcomes than women making decisions without input or agreement from their partners. Husbands' involvement in decision-making is particularly important in Bangladesh because men often dominate household decisions related to large, health-related purchases. We use matched husband and wife reports about who makes common household decisions to predict use of antenatal and skilled delivery care, using data from the 2007 Bangladesh Demographic and Health Survey. Results from regression analyses suggest that it is important to consider whether husbands and wives give concordant responses about who makes household decisions since discordant reports about who makes these decisions are negatively associated with reproductive health care use. In addition, compared to joint decision-making, husband-only decision-making is negatively associated with antenatal care use and skilled delivery care. Finally, associations between household decision-making arrangements and health service utilization vary depending on whose report is used and the type of health service utilized. Copyright © 2012 Elsevier Ltd. All rights reserved.

  16. Decision Model for U.S.- Mexico Border Security Measures

    DTIC Science & Technology

    2017-09-01

    and money assigned to border security investments. 14. SUBJECT TERMS Department of Homeland Security (DHS), border security, U.S.–Mexico border...and money assigned to border security investments. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION...FAA Federal Aviation Administration FAMS Federal Air Marshals Service FAST Free and Secure Trade GSA General Services Administration HIR Human

  17. Shared decision-making in epilepsy management.

    PubMed

    Pickrell, W O; Elwyn, G; Smith, P E M

    2015-06-01

    Policy makers, clinicians, and patients increasingly recognize the need for greater patient involvement in clinical decision-making. Shared decision-making helps address these concerns by providing a framework for clinicians and patients to make decisions together using the best evidence. Shared decision-making is applicable to situations where several acceptable options exist (clinical equipoise). Such situations occur commonly in epilepsy, for example, in decisions regarding the choice of medication, treatment in pregnancy, and medication withdrawal. A talk model is a way of implementing shared decision-making during consultations, and decision aids are useful tools to assist in the process. Although there is limited evidence available for shared decision-making in epilepsy, there are several benefits of shared decision-making in general including improved decision quality, more informed choices, and better treatment concordance. Copyright © 2015 Elsevier Inc. All rights reserved.

  18. [Shared decision-making in medical practice--patient-centred communication skills].

    PubMed

    van Staveren, Remke

    2011-01-01

    Most patients (70%) want to participate actively in important healthcare decisions, the rest (30%) prefer the doctor to make the decision for them. Shared decision-making provides more patient satisfaction, a better quality of life and contributes to a better doctor-patient relationship. Patients making their own decision generally make a well considered and medically sensible choice. In shared decision-making the doctor asks many open questions, gives and requests much information, asks if the patient wishes to participate in the decision-making and explicitly takes into account patient circumstances and preferences. Shared decision-making should remain an individual choice and should not become a new dogma.

  19. Advancing in the Career Decision-Making Process: The Role of Coping Strategies and Career Decision-Making Profiles

    ERIC Educational Resources Information Center

    Perez, Maya; Gati, Itamar

    2017-01-01

    We tested the associations among the career decision-making difficulties, the career decision status, and either (a) the career decision-making profiles of 575 young adults, or (b) the coping strategies of 379 young adults. As hypothesized, a more advanced decision status was negatively associated with both career decision-making difficulties…

  20. Inside the black box of shared decision making: distinguishing between the process of involvement and who makes the decision

    PubMed Central

    Edwards, Adrian; Elwyn, Glyn

    2006-01-01

    Abstract Background  Shared decision making has practical implications for everyday health care. However, it stems from largely theoretical frameworks and is not widely implemented in routine practice. Aims  We undertook an empirical study to inform understanding of shared decision making and how it can be operationalized more widely. Method  The study involved patients visiting UK general practitioners already well experienced in shared decision making. After these consultations, semi‐structured telephone interviews were conducted and analysed using the constant comparative method of content analysis. Results  All patients described at least some components of shared decision making but half appeared to perceive the decision as shared and half as ‘patient‐led’. However, patients exhibited some uncertainty about who had made the decision, reflecting different meanings of decision making from those described in the literature. A distinction is indicated between the process of involvement (option portrayal, exchange of information and exploring preferences for who makes the decision) and the actual decisional responsibility (who makes the decision). The process of involvement appeared to deliver benefits for patients, not the action of making the decision. Preferences for decisional responsibility varied during some consultations, generating unsatisfactory interactions when actual decisional responsibility did not align with patient preferences at that stage of a consultation. However, when conducted well, shared decision making enhanced reported satisfaction, understanding and confidence in the decisions. Conclusions  Practitioners can focus more on the process of involving patients in decision making rather than attaching importance to who actually makes the decision. They also need to be aware of the potential for changing patient preferences for decisional responsibility during a consultation and address non‐alignment of patient preferences with the actual model of decision making if this occurs. PMID:17083558

  1. Toward an Expanded Definition of Adaptive Decision Making.

    ERIC Educational Resources Information Center

    Phillips, Susan D.

    1997-01-01

    Uses the lifespan, life-space model to examine the definition of adaptive decision making. Reviews the existing definition of adaptive decision making as "rational" decision making and offers alternate perspectives on decision making with an emphasis on the implications of using the model. Makes suggestions for future theory, research,…

  2. Eating and drinking interventions for people at risk of lacking decision-making capacity: who decides and how?

    PubMed

    Clarke, Gemma; Galbraith, Sarah; Woodward, Jeremy; Holland, Anthony; Barclay, Stephen

    2015-06-11

    Some people with progressive neurological diseases find they need additional support with eating and drinking at mealtimes, and may require artificial nutrition and hydration. Decisions concerning artificial nutrition and hydration at the end of life are ethically complex, particularly if the individual lacks decision-making capacity. Decisions may concern issues of life and death: weighing the potential for increasing morbidity and prolonging suffering, with potentially shortening life. When individuals lack decision-making capacity, the standard processes of obtaining informed consent for medical interventions are disrupted. Increasingly multi-professional groups are being utilised to make difficult ethical decisions within healthcare. This paper reports upon a service evaluation which examined decision-making within a UK hospital Feeding Issues Multi-Professional Team. A three month observation of a hospital-based multi-professional team concerning feeding issues, and a one year examination of their records. The key research questions are: a) How are decisions made concerning artificial nutrition for individuals at risk of lacking decision-making capacity? b) What are the key decision-making factors that are balanced? c) Who is involved in the decision-making process? Decision-making was not a singular decision, but rather involved many different steps. Discussions involving relatives and other clinicians, often took place outside of meetings. Topics of discussion varied but the outcome relied upon balancing the information along four interdependent axes: (1) Risks, burdens and benefits; (2) Treatment goals; (3) Normative ethical values; (4) Interested parties. Decision-making was a dynamic ongoing process with many people involved. The multiple points of decision-making, and the number of people involved with the decision-making process, mean the question of 'who decides' cannot be fully answered. There is a potential for anonymity of multiple decision-makers to arise. Decisions in real world clinical practice may not fit precisely into a model of decision-making. The findings from this service evaluation illustrate that within multi-professional team decision-making; decisions may contain elements of both substituted and supported decision-making, and may be better represented as existing upon a continuum.

  3. Support Tool in the Diagnosis of Sales Price of Dental Plans

    NASA Astrophysics Data System (ADS)

    de Oliveira, Raquel A. F.; Lóscio, Bernadette F.; Pinheiro, Plácido Rogério

    It shows the formatting of a table of price to be used by a company is an activity that cannot be performed only empirically. The application of statistical methodologies and actuarial comes, increasingly, being used widely by companies primarily in the business of health plan. The increasing use of these techniques ensures that a manager of these companies more security and lower risk exposure while assisting them in making decisions. The aim of this paper is to present a tool for calculating the price of dental health developed in Java and PL/PgSQL.

  4. Cloud computing and patient engagement: leveraging available technology.

    PubMed

    Noblin, Alice; Cortelyou-Ward, Kendall; Servan, Rosa M

    2014-01-01

    Cloud computing technology has the potential to transform medical practices and improve patient engagement and quality of care. However, issues such as privacy and security and "fit" can make incorporation of the cloud an intimidating decision for many physicians. This article summarizes the four most common types of clouds and discusses their ideal uses, how they engage patients, and how they improve the quality of care offered. This technology also can be used to meet Meaningful Use requirements 1 and 2; and, if speculation is correct, the cloud will provide the necessary support needed for Meaningful Use 3 as well.

  5. Expanded managed care liability: what impact on employer coverage?

    PubMed

    Studdert, D M; Sage, W M; Gresenz, C R; Hensler, D R

    1999-01-01

    Policymakers are considering legislative changes that would increase managed care organizations' exposure to civil liability for withholding coverage or failing to deliver needed care. Using a combination of empirical information and theoretical analysis, we assess the likely responses of health plans and Employee Retirement Income Security Act (ERISA) plan sponsors to an expansion of liability, and we evaluate the policy impact of those moves. We conclude that the direct costs of liability are uncertain but that the prospect of litigation may have other important effects on coverage decision making, information exchange, risk contracting, and the extent of employers' involvement in health coverage.

  6. Intelligent Data Analysis in the EMERCOM Information System

    NASA Astrophysics Data System (ADS)

    Elena, Sharafutdinova; Tatiana, Avdeenko; Bakaev, Maxim

    2017-01-01

    The paper describes an information system development project for the Russian Ministry of Emergency Situations (MES, whose international operations body is known as EMERCOM), which was attended by the representatives of both the IT industry and the academia. Besides the general description of the system, we put forward OLAP and Data Mining-based approaches towards the intelligent analysis of the data accumulated in the database. In particular, some operational OLAP reports and an example of multi-dimensional information space based on OLAP Data Warehouse are presented. Finally, we outline Data Mining application to support decision-making regarding security inspections planning and results consideration.

  7. Non-negative Tensor Factorization for Robust Exploratory Big-Data Analytics

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Alexandrov, Boian; Vesselinov, Velimir Valentinov; Djidjev, Hristo Nikolov

    Currently, large multidimensional datasets are being accumulated in almost every field. Data are: (1) collected by distributed sensor networks in real-time all over the globe, (2) produced by large-scale experimental measurements or engineering activities, (3) generated by high-performance simulations, and (4) gathered by electronic communications and socialnetwork activities, etc. Simultaneous analysis of these ultra-large heterogeneous multidimensional datasets is often critical for scientific discoveries, decision-making, emergency response, and national and global security. The importance of such analyses mandates the development of the next-generation of robust machine learning (ML) methods and tools for bigdata exploratory analysis.

  8. Registered nurses' decision-making regarding documentation in patients' progress notes.

    PubMed

    Tower, Marion; Chaboyer, Wendy; Green, Quentine; Dyer, Kirsten; Wallis, Marianne

    2012-10-01

    To examine registered nurses' decision-making when documenting care in patients' progress notes. What constitutes effective nursing documentation is supported by available guidelines. However, ineffective documentation continues to be cited as a major cause of adverse events for patients. Decision-making in clinical practice is a complex process. To make an effective decision, the decision-maker must be situationally aware. The concept of situation awareness and its implications for making safe decisions has been examined extensively in air safety and more recently is being applied to health. The study was situated in a naturalistic paradigm. Purposive sampling was used to recruit 17 registered nurses who used think-aloud research methods when making decisions about documenting information in patients' progress notes. Follow-up interviews were conducted to validate interpretations. Data were analysed systematically for evidence of cues that demonstrated situation awareness as nurses made decisions about documentation. Three distinct decision-making scenarios were illuminated from the analysis: the newly admitted patient, the patient whose condition was as expected and the discharging patient. Nurses used mental models for decision-making in documenting in progress notes, and the cues nurses used to direct their assessment of patients' needs demonstrated situation awareness at different levels. Nurses demonstrate situation awareness at different levels in their decision-making processes. While situation awareness is important, it is also important to use an appropriate decision-making framework. Cognitive continuum theory is suggested as a decision-making model that could support situation awareness when nurses made decisions about documenting patient care. Because nurses are key decision-makers, it is imperative that effective decisions are made that translate into safe clinical care. Including situation awareness training, combined with employing cognitive continuum theory as a decision-making framework, provides a powerful means of guiding nurses' decision-making. © 2012 Blackwell Publishing Ltd.

  9. 48 CFR 239.7402 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... decisions of the Federal Communications Commission (FCC) and other governmental regulatory bodies on rates... requiring security during telecommunications; (ii) The requirement for the contractor to secure telecommunications systems; (iii) The telecommunications security equipment, devices, techniques, or services with...

  10. 48 CFR 239.7402 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... decisions of the Federal Communications Commission (FCC) and other governmental regulatory bodies on rates... requiring security during telecommunications; (ii) The requirement for the contractor to secure telecommunications systems; (iii) The telecommunications security equipment, devices, techniques, or services with...

  11. 48 CFR 239.7402 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... decisions of the Federal Communications Commission (FCC) and other governmental regulatory bodies on rates... requiring security during telecommunications; (ii) The requirement for the contractor to secure telecommunications systems; (iii) The telecommunications security equipment, devices, techniques, or services with...

  12. Strategies for promoting equity: experience with community financing in three African countries.

    PubMed

    Gilson, L; Kalyalya, D; Kuchler, F; Lake, S; Oranga, H; Ouendo, M

    2001-10-01

    Although the need for a pro-poor health reform agenda in low and middle income countries is increasingly clear, implementing such policy change is always difficult. This paper seeks to contribute to thinking about how to take forward such an agenda by reflection on the community financing activities of the UNICEF/WHO Bamako Initiative. It presents findings from a three-country study, undertaken in Benin, Kenya and Zambia in 1994/95, which was initiated in order to better understand the nature of the equity impact of community financing activities as well as the factors underlying this impact. The sustained relative affordability gains achieved in Benin emphasise the importance of ensuring that financing change is used as a policy lever for strengthening health service management in support of quality of care improvements. All countries, however, failed in protecting the most poor from the burden of payment, benefiting this group preferentially and ensuring that their views were heard in decision-making. Tackling these problems requires, amongst other things, an appropriate balance between central and local-level decision-making as well as the creation of local decision-making structures which have representation from civil society groups that can voice the needs of the most poor. Leadership, strategy and tactics are also always important in securing any kind of equity gain-such as establishing equity goals to drive implementation. In the experiences examined, the dominance of the goal of financial sustainability contributed to their equity failures. Further research is required to understand what equity goals communities themselves would prefer to guide financing policy.

  13. [Conflicting values in Colombia's health system: balancing the market economy and constitutional legislation, 2007-2009].

    PubMed

    Molina, Gloria; Ramírez, Andrés

    2013-04-01

    To present the conflicting moral issues that arise in clinical and administrative decision-making processes in Colombia's General Health Social Security System (SGSSS). A study was conducted between 2007 and 2009 in six Colombian cities (Barranquilla, Bogotá, Bucaramanga, Leticia, Medellín, and Pasto) using a theory-based qualitative methodology. A total of 179 in-depth interviews were held with physicians, nursing personnel, and administrators with broad experience in the health sector, as well as 10 focus groups representing users and leaders of community organizations involved in health. The interviews, which followed a predetermined script and used semistructured questions, gathered personal and professional information from the respondents. The health care decision-making process in Colombia is seen from two different moral perspectives: the rentier, or profit-making, motive, characterized by a neoliberal view of the market economy (the practical perspective), and the constitutional axiology of social democracy (the regulatory perspective). It was found that the utilitarian and individualistic motive predominates, in which individual and business profits are promoted over the collective interest, and this trend favors practices that undermine the rights of people and the community. Predominance of a morality that views the Colombian SGSSS in terms of the market model generates conditions that go against the principles and values that are supposed to guide the health system as guarantor of the right to health and human dignity. Health decisions should take into account not only technical and scientific criteria but also the principles and values involved, and consideration should be given to safeguarding them.

  14. A timely account of the role of duration in decision making.

    PubMed

    Ariely, D; Zakay, D

    2001-09-01

    The current work takes a general perspective on the role of time in decision making. There are many different relationships and interactions between time and decision making, and no single summary can do justice to this topic. In this paper we will describe a few of the aspects in which time and decision making are interleaved: (a) temporal perspectives of decisions--the various temporal orientations that decision-makers may adopt while making decisions, and the impact of such temporal orientations on the decision process and its outcomes; (b) time as a medium within which decisions take place--the nature of decision processes that occur along time; (c) time as a resource and as a contextual factor--the implications of shortage in time resources and the impact of time limits on decision making processes and performance; (d) time as a commodity--time as the subject matter of decision making. The paper ends with a few general questions on the role of duration in decision making.

  15. What is known about parents' treatment decisions? A narrative review of pediatric decision making.

    PubMed

    Lipstein, Ellen A; Brinkman, William B; Britto, Maria T

    2012-01-01

    With the increasing complexity of decisions in pediatric medicine, there is a growing need to understand the pediatric decision-making process. To conduct a narrative review of the current research on parent decision making about pediatric treatments and identify areas in need of further investigation. Articles presenting original research on parent decision making were identified from MEDLINE (1966-6/2011), using the terms "decision making," "parent," and "child." We included papers focused on treatment decisions but excluded those focused on information disclosure to children, vaccination, and research participation decisions. We found 55 papers describing 52 distinct studies, the majority being descriptive, qualitative studies of the decision-making process, with very limited assessment of decision outcomes. Although parents' preferences for degree of participation in pediatric decision making vary, most are interested in sharing the decision with the provider. In addition to the provider, parents are influenced in their decision making by changes in their child's health status, other community members, prior knowledge, and personal factors, such as emotions and faith. Parents struggle to balance these influences as well as to know when to include their child in decision making. Current research demonstrates a diversity of influences on parent decision making and parent decision preferences; however, little is known about decision outcomes or interventions to improve outcomes. Further investigation, using prospective methods, is needed in order to understand how to support parents through the difficult treatment decisions.

  16. Composite collective decision-making

    PubMed Central

    Czaczkes, Tomer J.; Czaczkes, Benjamin; Iglhaut, Carolin; Heinze, Jürgen

    2015-01-01

    Individual animals are adept at making decisions and have cognitive abilities, such as memory, which allow them to hone their decisions. Social animals can also share information. This allows social animals to make adaptive group-level decisions. Both individual and collective decision-making systems also have drawbacks and limitations, and while both are well studied, the interaction between them is still poorly understood. Here, we study how individual and collective decision-making interact during ant foraging. We first gathered empirical data on memory-based foraging persistence in the ant Lasius niger. We used these data to create an agent-based model where ants may use social information (trail pheromones), private information (memories) or both to make foraging decisions. The combined use of social and private information by individuals results in greater efficiency at the group level than when either information source was used alone. The modelled ants couple consensus decision-making, allowing them to quickly exploit high-quality food sources, and combined decision-making, allowing different individuals to specialize in exploiting different resource patches. Such a composite collective decision-making system reaps the benefits of both its constituent parts. Exploiting such insights into composite collective decision-making may lead to improved decision-making algorithms. PMID:26019155

  17. Geovisualization for Smart Video Surveillance

    NASA Astrophysics Data System (ADS)

    Oves García, R.; Valentín, L.; Serrano, S. A.; Palacios-Alonso, M. A.; Sucar, L. Enrique

    2017-09-01

    Nowadays with the emergence of smart cities and the creation of new sensors capable to connect to the network, it is not only possible to monitor the entire infrastructure of a city, including roads, bridges, rail/subways, airports, communications, water, power, but also to optimize its resources, plan its preventive maintenance and monitor security aspects while maximizing services for its citizens. In particular, the security aspect is one of the most important issues due to the need to ensure the safety of people. However, if we want to have a good security system, it is necessary to take into account the way that we are going to present the information. In order to show the amount of information generated by sensing devices in real time in an understandable way, several visualization techniques are proposed for both local (involves sensing devices in a separated way) and global visualization (involves sensing devices as a whole). Taking into consideration that the information is produced and transmitted from a geographic location, the integration of a Geographic Information System to manage and visualize the behavior of data becomes very relevant. With the purpose of facilitating the decision-making process in a security system, we have integrated the visualization techniques and the Geographic Information System to produce a smart security system, based on a cloud computing architecture, to show relevant information about a set of monitored areas with video cameras.

  18. Sun-Burned: Space Weather's Impact on United States National Security

    NASA Astrophysics Data System (ADS)

    Stebbins, B.

    2014-12-01

    The heightened media attention surrounding the 2013-14 solar maximum presented an excellent opportunity to examine the ever-increasing vulnerability of US national security and its Department of Defense to space weather. This vulnerability exists for three principal reasons: 1) a massive US space-based infrastructure; 2) an almost exclusive reliance on an aging and stressed continental US power grid; and 3) a direct dependence upon a US economy adapted to the conveniences of space and uninterrupted power. I tailored my research and work for the national security policy maker and military strategists in an endeavor to initiate and inform a substantive dialogue on America's preparation for, and response to, a major solar event that would severely degrade core national security capabilities, such as military operations. Significant risk to the Department of Defense exists from powerful events that could impact its space-based infrastructure and even the terrestrial power grid. Given this ever-present and increasing risk to the United States, my work advocates raising the issue of space weather and its impacts to the level of a national security threat. With the current solar cycle having already peaked and the next projected solar maximum just a decade away, the government has a relatively small window to make policy decisions that prepare the nation and its Defense Department to mitigate impacts from these potentially catastrophic phenomena.

  19. Analysis of the decision-making process of nurse managers: a collective reflection.

    PubMed

    Eduardo, Elizabete Araujo; Peres, Aida Maris; de Almeida, Maria de Lourdes; Roglio, Karina de Dea; Bernardino, Elizabeth

    2015-01-01

    to analyze the decision-making model adopted by nurses from the perspective of some decision-making process theories. qualitative approach, based on action research. Semi-structured questionnaires and seminars were conducted from April to June 2012 in order to understand the nature of decisions and the decision-making process of nine nurses in position of managers at a public hospital in Southern Brazil. Data were subjected to content analysis. data were classified in two categories: the current situation of decision-making, which showed a lack of systematization; the construction and collective decision-making, which emphasizes the need to develop a decision-making model. the decision-making model used by nurses is limited because it does not consider two important factors: the limits of human rationality, and the external and internal organizational environments that influence and determine right decisions.

  20. Shared Decision-Making for Nursing Practice: An Integrative Review.

    PubMed

    Truglio-Londrigan, Marie; Slyer, Jason T

    2018-01-01

    Shared decision-making has received national and international interest by providers, educators, researchers, and policy makers. The literature on shared decision-making is extensive, dealing with the individual components of shared decision-making rather than a comprehensive process. This view of shared decision-making leaves healthcare providers to wonder how to integrate shared decision-making into practice. To understand shared decision-making as a comprehensive process from the perspective of the patient and provider in all healthcare settings. An integrative review was conducted applying a systematic approach involving a literature search, data evaluation, and data analysis. The search included articles from PubMed, CINAHL, the Cochrane Central Register of Controlled Trials, and PsycINFO from 1970 through 2016. Articles included quantitative experimental and non-experimental designs, qualitative, and theoretical articles about shared decision-making between all healthcare providers and patients in all healthcare settings. Fifty-two papers were included in this integrative review. Three categories emerged from the synthesis: (a) communication/ relationship building; (b) working towards a shared decision; and (c) action for shared decision-making. Each major theme contained sub-themes represented in the proposed visual representation for shared decision-making. A comprehensive understanding of shared decision-making between the nurse and the patient was identified. A visual representation offers a guide that depicts shared decision-making as a process taking place during a healthcare encounter with implications for the continuation of shared decisions over time offering patients an opportunity to return to the nurse for reconsiderations of past shared decisions.

Top