Sample records for security human interactions

  1. Simulating human behavior for national security human interactions.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bernard, Michael Lewis; Hart, Dereck H.; Verzi, Stephen J.

    2007-01-01

    This 3-year research and development effort focused on what we believe is a significant technical gap in existing modeling and simulation capabilities: the representation of plausible human cognition and behaviors within a dynamic, simulated environment. Specifically, the intent of the ''Simulating Human Behavior for National Security Human Interactions'' project was to demonstrate initial simulated human modeling capability that realistically represents intra- and inter-group interaction behaviors between simulated humans and human-controlled avatars as they respond to their environment. Significant process was made towards simulating human behaviors through the development of a framework that produces realistic characteristics and movement. The simulated humansmore » were created from models designed to be psychologically plausible by being based on robust psychological research and theory. Progress was also made towards enhancing Sandia National Laboratories existing cognitive models to support culturally plausible behaviors that are important in representing group interactions. These models were implemented in the modular, interoperable, and commercially supported Umbra{reg_sign} simulation framework.« less

  2. Australian DefenceScience. Volume 16, Number 2, Winter

    DTIC Science & Technology

    2008-01-01

    Making Virtual Advisers speedily interactive To provide an authentically interactive experience for humans working with Virtual Advisers, the Virtual...peer trusted and strong authentication for checking of security credentials without recourse to third parties or infrastructure, thus eliminating...multiple passwords, or carry around multiple security tokens.” Each CodeStick device is readied for use with a biometric authentication process. Since

  3. Brain Immune Interactions as the Basis of Gulf War Illness: Gulf War Illness Consortium (GWIC)

    DTIC Science & Technology

    2016-10-01

    between the immune system and the brain. The GWIC includes both clinical ( human ) and preclinical (animal and cell) studies and researchers in the 10...47 pesticides , DFP, sarin 16. Price Code (Leave Bl k) 17. Security Classification of Report Unclassified 18. Security Classification of this...stronger and longer proinflammatory signaling effects between the immune system and the brain. The GWIC includes both clinical ( human ) and

  4. Breaking the cyber-security dilemma: aligning security needs and removing vulnerabilities.

    PubMed

    Dunn Cavelty, Myriam

    2014-09-01

    Current approaches to cyber-security are not working. Rather than producing more security, we seem to be facing less and less. The reason for this is a multi-dimensional and multi-faceted security dilemma that extends beyond the state and its interaction with other states. It will be shown how the focus on the state and "its" security crowds out consideration for the security of the individual citizen, with detrimental effects on the security of the whole system. The threat arising from cyberspace to (national) security is presented as possible disruption to a specific way of life, one building on information technologies and critical functions of infrastructures, with relatively little consideration for humans directly. This non-focus on people makes it easier for state actors to militarize cyber-security and (re-)assert their power in cyberspace, thereby overriding the different security needs of human beings in that space. Paradoxically, the use of cyberspace as a tool for national security, both in the dimension of war fighting and the dimension of mass-surveillance, has detrimental effects on the level of cyber-security globally. A solution out of this dilemma is a cyber-security policy that is decidedly anti-vulnerability and at the same time based on strong considerations for privacy and data protection. Such a security would have to be informed by an ethics of the infosphere that is based on the dignity of information related to human beings.

  5. Method for Determining the Sensitivity of a Physical Security System.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Speed, Ann; Gauthier, John H.; Hoffman, Matthew John

    Modern systems, such as physical security systems, are often designed to involve complex interactions of technological and human elements. Evaluation of the performance of these systems often overlooks the human element. A method is proposed here to expand the concept of sensitivity—as denoted by d’—from signal detection theory (Green & Swets 1966; Macmillan & Creelman 2005), which came out of the field of psychophysics, to cover not only human threat detection but also other human functions plus the performance of technical systems in a physical security system, thereby including humans in the overall evaluation of system performance. New in thismore » method is the idea that probabilities of hits (accurate identification of threats) and false alarms (saying “threat” when there is not one), which are used to calculate d’ of the system, can be applied to technologies and, furthermore, to different functions in the system beyond simple yes-no threat detection. At the most succinct level, the method returns a single number that represents the effectiveness of a physical security system; specifically, the balance between the handling of actual threats and the distraction of false alarms. The method can be automated, and the constituent parts revealed, such that given an interaction graph that indicates the functional associations of system elements and the individual probabilities of hits and false alarms for those elements, it will return the d’ of the entire system as well as d’ values for individual parts. The method can also return a measure of the response bias* of the system. One finding of this work is that the d’ for a physical security system can be relatively poor in spite of having excellent d’s for each of its individual functional elements.« less

  6. Functional Interactions Between c-Src and HER1 Potentiate Neoplastic Transformation: Implications for the Etiology of Human Breast Cancer

    DTIC Science & Technology

    2000-07-01

    receptor 120 16. PRICE CODE 17. SECURITY CLASSIFICATION 18 . SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF REPORT OF...THIS PAGE OF ABSTRACT Unclassified Unclassified Unclassified Unlimited NSN 7540-01-280-5500 Standard Form 298 (Rev. 2-89) Prescribed by ANSI Std. Z39- 18 ... 18 -26 Appended Manuscripts 3 INTRODUCTION Recent work in our laboratory has established the importance of a

  7. Observations on Ecology and National Security

    DTIC Science & Technology

    1975-03-01

    central business district.8"* To others, human ecology is concerned almost solely with the interaction between the human species and pathogenic ... aphid population," in Animal Populations in Relation to Their Food Resources. Blackwell, Oxford, England (1970). 14. T.R.E. Southwood and

  8. Preadolescents’ Relationships with Pet Dogs: Relationship Continuity and Associations with Adjustment

    PubMed Central

    Kerns, Kathryn A.; Koehn, Amanda J.; van Dulmen, Manfred H. M.; Stuart-Parrigon, Kaela L.; Coifman, Karin G.

    2017-01-01

    Research on human-animal interaction in children has been studied in isolation rather than integrated with core theories of children’s relationships. This study is one of the first to examine how children’s relationships with pet dogs are related to their human relationships (parent-child attachments, friendships) and to child adjustment, and to include observational assessment of children’s interactions with their pet dog. Children (9 to 11 years old, n = 99) completed questionnaires regarding relationships with pet dogs, parents, and friends. Half the children were observed interacting with their pet dog. Children and teachers reported children’s adjustment. Children who felt closer to their dogs were more securely attached to mothers and fathers, and reported more positive qualities and less conflict with friends. Children with more secure attachments to mothers, and greater companionship with dogs, interacted more with their dogs. Parental attachment and friendship quality, but not the pet dog relationship, were related to child adjustment. PMID:29422765

  9. A Secure Behavior Modification Sensor System for Physical Activity Improvement

    ERIC Educational Resources Information Center

    Price, Alan

    2011-01-01

    Today, advances in wireless sensor networks are making it possible to capture large amounts of information about a person and their interaction within their home environment. However, what is missing is how to ensure the security of the collected data and its use to alter human behavior for positive benefit. In this research, exploration was…

  10. Neural Signatures of Trust During Human-Automation Interactions

    DTIC Science & Technology

    2016-04-01

    magnetic resonance imaging by manipulating the reliability of advice from a human or automated luggage inspector framed as experts. HAT and HHT were...human-human trust, human-automation trust, brain, functional magnetic resonance imaging 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18...behavioral X-ray luggage-screening task with functional magnetic resonance imaging (fMRI) and manipulated reliabilities of advice (unknown to the

  11. Understanding complexities in coupled dynamics of human-water and food security

    NASA Astrophysics Data System (ADS)

    Usmani, M.; Kondal, A.; Lin, L.; Colwell, R. R.; Jutla, A.

    2017-12-01

    Traditional premise of food security is associated with satisfying human hunger by providing sufficient calories to population. Water is the key variable associated with the growth of crops, which is then used as a metric of success for abundance of food across globe. The current framework often negates complex coupled interaction between availability of food nutrients and human well-being (such as productivity, work efficiency, low birth weight, physical and mental growth). Our analysis suggests that 1 in 3 humans suffer from malnutrition across the globe. In last five decades, most of the countries have a decreasing availability trend in at least one of the twenty-three essential food nutrients required for human well-being. We argue that food security can only be achieved if information on use of water for crops and consumption of food must include availability of nutrients for humans. Here, we propose a new concept of "consumptive nutrients" that include constant feedback mechanism between water-human and societal processes- essential for growth, distribution and consumption of food nutrients. Using Ethiopia as a signature rain-fed agricultural region, we will show how decreasing precipitation has led to an increase in crop productivity, but decreased availability of nutrients for humans. This in turn has destabilizing impact on overall regional economy. We will demonstrate why inclusion of nutrients must be a part of discussion for ensuring food security to human population.

  12. Metaphors to Drive By: Exploring New Ways to Guide Human-Robot Interaction

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    David J. Bruemmer; David I. Gertman; Curtis W. Nielsen

    2007-08-01

    Autonomous behaviors created by the research and development community are not being extensively utilized within energy, defense, security, or industrial contexts. This paper provides evidence that the interaction methods used alongside these behaviors may not provide a mental model that can be easily adopted or used by operators. Although autonomy has the potential to reduce overall workload, the use of robot behaviors often increased the complexity of the underlying interaction metaphor. This paper reports our development of new metaphors that support increased robot complexity without passing the complexity of the interaction onto the operator. Furthermore, we illustrate how recognition ofmore » problems in human-robot interactions can drive the creation of new metaphors for design and how human factors lessons in usability, human performance, and our social contract with technology have the potential for enormous payoff in terms of establishing effective, user-friendly robot systems when appropriate metaphors are used.« less

  13. Understanding and Managing Causality of Change in Socio-Technical Systems II

    DTIC Science & Technology

    2011-01-25

    SUBJECT TERMS Cognition , Human Effectiveness, Information Science 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as Report (SAR) 18...at large taking into account the cognitive interaction between humans and technology. 8 Hussein Abbass Professor Abbass leads the...Network Centric Operations Future Air Traffic Management Systems Cognitive Engineering including Human-Computer Integration In all of the

  14. [Principles and methodology for ecological rehabilitation and security pattern design in key project construction].

    PubMed

    Chen, Li-Ding; Lu, Yi-He; Tian, Hui-Ying; Shi, Qian

    2007-03-01

    Global ecological security becomes increasingly important with the intensive human activities. The function of ecological security is influenced by human activities, and in return, the efficiency of human activities will also be affected by the patterns of regional ecological security. Since the 1990s, China has initiated the construction of key projects "Yangtze Three Gorges Dam", "Qinghai-Tibet Railway", "West-to-East Gas Pipeline", "West-to-East Electricity Transmission" and "South-to-North Water Transfer" , etc. The interaction between these projects and regional ecological security has particularly attracted the attention of Chinese government. It is not only important for the regional environmental protection, but also of significance for the smoothly implementation of various projects aimed to develop an ecological rehabilitation system and to design a regional ecological security pattern. This paper made a systematic analysis on the types and characteristics of key project construction and their effects on the environment, and on the basis of this, brought forward the basic principles and methodology for ecological rehabilitation and security pattern design in this construction. It was considered that the following issues should be addressed in the implementation of a key project: 1) analysis and evaluation of current regional ecological environment, 2) evaluation of anthropogenic disturbances and their ecological risk, 3) regional ecological rehabilitation and security pattern design, 4) scenario analysis of environmental benefits of regional ecological security pattern, 5) re-optimization of regional ecological system framework, and 6) establishment of regional ecosystem management plan.

  15. Space Security Law

    NASA Astrophysics Data System (ADS)

    Blount, P. J.

    2017-06-01

    Since the very beginning of the space age, security has been the critical, overriding concern at the heart of both international and domestic space law regimes. While these regimes certainly encompass broader interests, such as commercial uses of outer space, they are built on a legal foundation that is largely intended to regularize interactions among space actors to ensure security, safety, and sustainability in the space environment. Space security law, as a result, has central goals of both maintaining peace and providing security as a public good for the benefit of humankind. The idea of security is a technical and political construct. The law is a tool that is used to articulate that construct as concept and operationalize it as a value. As such, space security law is a network of law and regulation that governs a wide variety of space activities. There are four broad categories that typify the various manifestations of space security law: international peace and security; national security; human security; and space safety and sustainability. International peace and security, the first category, is directly concerned with the international law and norms that have been adopted to decrease the risk of conflict between states. National security, category two, consists of domestic law that implements, at the national level, the obligations found in the first category as well as law that promotes other national security goals. Human security, the third category, is the loose set of law and policy directed at the use of space for the protection of human populations, such as disaster response and planetary protection. Finally, the fourth category, space safety and security, represents the emerging body of law and policy that seeks to protect the space environment through measures that address space debris and harmful contamination. Obviously, these categories overlap and laws can serve duplicative purposes, but this compartmentalization reveals much about the legal structures that surround core security projects being pursued in and through space.

  16. DESERTIFICATION IN THE MEDITERRANEAN REGION. A SECURITY ISSUE

    EPA Science Inventory

    Desertification (representing soil degradation) is one of the three nature-induced (climate change, hydrological cycle) and of three primarily human-induced challenges (population growth, urbanisation and food) of global environmental change. These six components closely interact...

  17. Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security

    NASA Astrophysics Data System (ADS)

    Mahmadi, FN; Zaaba, ZF; Osman, A.

    2016-11-01

    Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.

  18. Occupational stress in human computer interaction.

    PubMed

    Smith, M J; Conway, F T; Karsh, B T

    1999-04-01

    There have been a variety of research approaches that have examined the stress issues related to human computer interaction including laboratory studies, cross-sectional surveys, longitudinal case studies and intervention studies. A critical review of these studies indicates that there are important physiological, biochemical, somatic and psychological indicators of stress that are related to work activities where human computer interaction occurs. Many of the stressors of human computer interaction at work are similar to those stressors that have historically been observed in other automated jobs. These include high workload, high work pressure, diminished job control, inadequate employee training to use new technology, monotonous tasks, por supervisory relations, and fear for job security. New stressors have emerged that can be tied primarily to human computer interaction. These include technology breakdowns, technology slowdowns, and electronic performance monitoring. The effects of the stress of human computer interaction in the workplace are increased physiological arousal; somatic complaints, especially of the musculoskeletal system; mood disturbances, particularly anxiety, fear and anger; and diminished quality of working life, such as reduced job satisfaction. Interventions to reduce the stress of computer technology have included improved technology implementation approaches and increased employee participation in implementation. Recommendations for ways to reduce the stress of human computer interaction at work are presented. These include proper ergonomic conditions, increased organizational support, improved job content, proper workload to decrease work pressure, and enhanced opportunities for social support. A model approach to the design of human computer interaction at work that focuses on the system "balance" is proposed.

  19. Tracer techniques in aeolian research: Approaches, applications, and challenges

    USDA-ARS?s Scientific Manuscript database

    Aeolian processes, the entrainment, transport and deposition of sediments by wind, impacts climate, biogeochemical cycles, food security, environmental quality and human health. Considering the multitude of interactions between aeolian processes and all the major components of the Earth system, ther...

  20. Security Issues in Cross-Organizational Peer-to-Peer Applications and Some Solutions

    NASA Astrophysics Data System (ADS)

    Gupta, Ankur; Awasthi, Lalit K.

    Peer-to-Peer networks have been widely used for sharing millions of terabytes of content, for large-scale distributed computing and for a variety of other novel applications, due to their scalability and fault-tolerance. However, the scope of P2P networks has somehow been limited to individual computers connected to the internet. P2P networks are also notorious for blatant copyright violations and facilitating several kinds of security attacks. Businesses and large organizations have thus stayed away from deploying P2P applications citing security loopholes in P2P systems as the biggest reason for non-adoption. In theory P2P applications can help fulfill many organizational requirements such as collaboration and joint projects with other organizations, access to specialized computing infrastructure and finally accessing the specialized information/content and expert human knowledge available at other organizations. These potentially beneficial interactions necessitate that the research community attempt to alleviate the security shortcomings in P2P systems and ensure their acceptance and wide deployment. This research paper therefore examines the security issues prevalent in enabling cross-organizational P2P interactions and provides some technical insights into how some of these issues can be resolved.

  1. An Analysis of Sea Turtle Demographics along Maryland Shores, 1990-2015

    NASA Astrophysics Data System (ADS)

    Rhoades, C.; Driscoll, C.; Weschler, A.; Crawford, M.

    2016-02-01

    The Maryland Department of Natural Resources Marine Mammal and Sea Turtle Stranding Program was established in the fall of 1990, and responded to their first documented sea turtle stranding in the summer of 1991. Over this twenty-five year period, 575 dead strandings of sea turtles have been documented. This research project analyzes all sea turtle case files from the initiation of this program for the following parameters in order to associate stranding trends; species, location (Atlantic Ocean v. Chesapeake Bay), seasonality, length, relative age, condition code, and sex. Further understanding these protected species will assist in conserving their coastal ecosystem and securing these species a sustainable future. Along with the parameters previously discussed, this study will also consider the factors contributing to the animal's death, if determined. These potential causes incorporate natural causes such as disease, and also detail instances of human interaction, including: dredge takes, commercial or recreational fishing interaction, power plant entrainment, propeller and boat strikes. A total of approximately 17% of the dead stranded sea turtles Maryland Department of Natural Resources responded to were found to have some proven aspect of human interaction. Lastly, in order to further investigate for human interaction stomach contents were analyzed for plastics or other forms of marine debris. This project will contribute to MD DNR and NOAA's mission, goals, and objectives by further understanding these protected species in order to conserve their coastal ecosystem and secure these species a sustainable future.

  2. Soil: The forgotten piece of the water, food, energy nexus

    USDA-ARS?s Scientific Manuscript database

    The water, food, energy nexus has prompted sustainability concerns as interactions between these interdependent human needs is degrading natural resources required for a secure future world. Discussions about the future needs for food, water, and energy to support the increasing world population hav...

  3. The Importance of the Secure Base Effect for Domestic Dogs – Evidence from a Manipulative Problem-Solving Task

    PubMed Central

    Horn, Lisa; Huber, Ludwig; Range, Friederike

    2013-01-01

    Background It has been suggested that dogs display a secure base effect similar to that found in human children (i.e., using the owner as a secure base for interacting with the environment). In children, this effect influences their daily lives and importantly also their performance in cognitive testing. Here, we investigate the importance of the secure base effect for dogs in a problem-solving task. Methodology/Principal Findings Using a manipulative task, we tested dogs in three conditions, in which we varied the owner's presence and behavior (Experiment 1: “Absent owner”, “Silent owner”, “Encouraging owner”) and in one additional condition, in which the owner was replaced by an unfamiliar human (Experiment 2: “Replaced owner”). We found that the dogs' duration of manipulating the apparatus was longer when their owner was present than absent, irrespective of the owner's behavior. The presence of an unfamiliar human however did not increase their manipulation. Furthermore, the reduced manipulation during the absence of the owner was not correlated with the dog's degree of separation distress scored in a preceding attachment experiment. Conclusions/Significance Our study is the first to provide evidence for an owner-specific secure base effect in dogs that extends from attachment tests to other areas of dogs' lives and also manifests itself in cognitive testing – thereby confirming the remarkable similarity between the secure base effect in dogs and in human children. These results also have important implications for behavioral testing in dogs, because the presence or absence of the owner during a test situation might substantially influence dogs' motivation and therefore the outcome of the test. PMID:23734243

  4. Avionics Collaborative Engineering Technology Delivery Order 0035: Secure Knowledge Management (SKM) Technology Research Roadmap - Technology Trends for Collaborative Information and Knowledge Management Research

    DTIC Science & Technology

    2004-06-01

    such as that represented in the know-how of the master craftsman), and cognitive (know why, perceptions, values, beliefs, and mental models).4... cognitive engineering, educational technology, industrial/organizational psychology, sociology, cultural anthropology, and computational...such as human-human interaction, interface design and evaluation methodology, cognitive models and user models, health and ergonomic studies, empirical

  5. Multimodal interaction for human-robot teams

    NASA Astrophysics Data System (ADS)

    Burke, Dustin; Schurr, Nathan; Ayers, Jeanine; Rousseau, Jeff; Fertitta, John; Carlin, Alan; Dumond, Danielle

    2013-05-01

    Unmanned ground vehicles have the potential for supporting small dismounted teams in mapping facilities, maintaining security in cleared buildings, and extending the team's reconnaissance and persistent surveillance capability. In order for such autonomous systems to integrate with the team, we must move beyond current interaction methods using heads-down teleoperation which require intensive human attention and affect the human operator's ability to maintain local situational awareness and ensure their own safety. This paper focuses on the design, development and demonstration of a multimodal interaction system that incorporates naturalistic human gestures, voice commands, and a tablet interface. By providing multiple, partially redundant interaction modes, our system degrades gracefully in complex environments and enables the human operator to robustly select the most suitable interaction method given the situational demands. For instance, the human can silently use arm and hand gestures for commanding a team of robots when it is important to maintain stealth. The tablet interface provides an overhead situational map allowing waypoint-based navigation for multiple ground robots in beyond-line-of-sight conditions. Using lightweight, wearable motion sensing hardware either worn comfortably beneath the operator's clothing or integrated within their uniform, our non-vision-based approach enables an accurate, continuous gesture recognition capability without line-of-sight constraints. To reduce the training necessary to operate the system, we designed the interactions around familiar arm and hand gestures.

  6. Human-Interaction Challenges in UAV-Based Autonomous Surveillance

    NASA Technical Reports Server (NTRS)

    Freed, Michael; Harris, Robert; Shafto, Michael G.

    2004-01-01

    Autonomous UAVs provide a platform for intelligent surveillance in application domains ranging from security and military operations to scientific information gathering and land management. Surveillance tasks are often long duration, requiring that any approach be adaptive to changes in the environment or user needs. We describe a decision- theoretic model of surveillance, appropriate for use on our autonomous helicopter, that provides a basis for optimizing the value of information returned by the UAV. From this approach arise a range of challenges in making this framework practical for use by human operators lacking specialized knowledge of autonomy and mathematics. This paper describes our platform and approach, then describes human-interaction challenges arising from this approach that we have identified and begun to address.

  7. A Gas Chromotographic-Mass Spectrometric Approach to Examining Stereoselective Interaction of Human Plasma Proteins with Soman

    DTIC Science & Technology

    2008-02-01

    ABSTRACT See reprint. 15. SUBJECT TERMS Human plasma proteins, soman, nerve agent , bioscavenger, gas chromatography, mass spectrometry 16. SECURITY...usually referred to as nerve agents ) are tabun (ethyl dimethylamidocyanophosphate, or GA ), sarin (iso- propyl methylfluorophosphonate, or GB), soman...Pharmacology and toxicology of chemical warfare agents Ann. Acad. Med. Singapore 2&: 104-107 (1997). 11. C Macilwain. Study proves Iraq used nerve gas . Nature 3

  8. Human detection and motion analysis at security points

    NASA Astrophysics Data System (ADS)

    Ozer, I. Burak; Lv, Tiehan; Wolf, Wayne H.

    2003-08-01

    This paper presents a real-time video surveillance system for the recognition of specific human activities. Specifically, the proposed automatic motion analysis is used as an on-line alarm system to detect abnormal situations in a campus environment. A smart multi-camera system developed at Princeton University is extended for use in smart environments in which the camera detects the presence of multiple persons as well as their gestures and their interaction in real-time.

  9. New Results on Unconditionally Secure Multi-receiver Manual Authentication

    NASA Astrophysics Data System (ADS)

    Wang, Shuhong; Safavi-Naini, Reihaneh

    Manual authentication is a recently proposed model of communication motivated by the settings where the only trusted infrastructure is a low bandwidth authenticated channel, possibly realized by the aid of a human, that connects the sender and the receiver who are otherwise connected through an insecure channel and do not have any shared key or public key infrastructure. A good example of such scenarios is pairing of devices in Bluetooth. Manual authentication systems are studied in computational and information theoretic security model and protocols with provable security have been proposed. In this paper we extend the results in information theoretic model in two directions. Firstly, we extend a single receiver scenario to multireceiver case where the sender wants to authenticate the same message to a group of receivers. We show new attacks (compared to single receiver case) that can launched in this model and demonstrate that the single receiver lower bound 2log(1/ɛ) + O(1) on the bandwidth of manual channel stays valid in the multireceiver scenario. We further propose a protocol that achieves this bound and provides security, in the sense that we define, if up to c receivers are corrupted. The second direction is the study of non-interactive protocols in unconditionally secure model. We prove that unlike computational security framework, without interaction a secure authentication protocol requires the bandwidth of the manual channel to be at least the same as the message size, hence non-trivial protocols do not exist.

  10. Hydrocomplexity: Addressing water security and emergent environmental risks

    NASA Astrophysics Data System (ADS)

    Kumar, Praveen

    2015-07-01

    Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.

  11. Analyzing commercial flight crewmember perceptions' regarding airline security effectiveness, morale, and professionalism

    NASA Astrophysics Data System (ADS)

    Belanger, James Durham

    Since the formation of the Transportation Security Administration (TSA) following the September 11, 2001 terrorist's attacks few studies involving commercial flight crewmember perceptions' of the organization's efficacy have been conducted, nor has there been any research into the effects on crewmember morale and professionalism resulting from their interactions with the TSA. This researcher surveyed 624 flight crewmembers, using a multiple-choice instrument to ascertain both their perceptions of TSA effectiveness involving an array of security issues, in addition to how crewmember interactions with the TSA may have affected their morale and professionalism. A 2-sample t-test measured the difference in the means of pilots and flight attendants regarding the study's scope, as did 2-way ANOVA and Tukey HSD comparisons, which factored in gender. The study found that crewmembers indicated some confidence in the areas of passenger and baggage screening and the Armed Pilot Program, with less confidence regarding ancillary personnel screening, airport perimeter security, and in both crewmember anti-terrorist training and human error issues. Statistical testing indicated varying differences in sample means concerning all study related issues. Finally, crewmembers indicated some effects on morale and professionalism, with a majority indicating a negative effect on both.

  12. Understanding climate-hydrologic-human interactions to guide groundwater model development for Southern High Plains

    USDA-ARS?s Scientific Manuscript database

    The Ogallala aquifer is the only reliable source of water in the southern High Plains (SHP) region of Texas, New Mexico and Oklahoma. Groundwater availability has fostered a strong agricultural economy that has a significant impact on global food security. Groundwater models that not only capture ...

  13. Atomic structure of the human cytomegalovirus capsid with its securing tegument layer of pp150

    PubMed Central

    Yu, Xuekui; Jih, Jonathan; Jiang, Jiansen; Zhou, Z. Hong

    2017-01-01

    Herpesviruses possess a genome-pressurized capsid. The 235-kilobase genome of human cytomegalovirus (HCMV) is by far the largest of any herpesvirus, yet it has been unclear how its capsid, which is similar in size to those of other herpesviruses, is stabilized. Here we report a HCMV atomic structure consisting of the herpesvirus-conserved capsid proteins MCP, Tri1, Tri2, and SCP and the HCMV-specific tegument protein pp150—totaling ~4000 molecules and 62 different conformers. MCPs manifest as a complex of insertions around a bacteriophage HK97 gp5–like domain, which gives rise to three classes of capsid floor–defining interactions; triplexes, composed of two “embracing” Tri2 conformers and a “third-wheeling” Tri1, fasten the capsid floor. HCMV-specific strategies include using hexon channels to accommodate the genome and pp150 helix bundles to secure the capsid via cysteine tetrad–to-SCP interactions. Our structure should inform rational design of countermeasures against HCMV, other herpesviruses, and even HIV/AIDS. PMID:28663444

  14. Camelot 3: Habitability criteria space research and design studio

    NASA Technical Reports Server (NTRS)

    Arroyo, F.; Budet, O.; Garcia, A.; Lee, J.; Lopez, R.; Lugo, R.; Mateo, A.; Mellado, R.; Mendez, H.; Ortiz, N.

    1989-01-01

    Acknowledging the importance of human beings on a mission to Mars, the University of Puerto Rico studied both psychological and physiological aspects. Different conditions necessary for human health and well-being were considered. As a result, habitability criteria were developed. The criteria are as follows: personal identification; social interaction; unpredictable conditions; contact with nature; mental landscapes; privacy; equalitarian conditions; variety; functionality; sensory stimulation; music and environmental sound; stability and security; comfort; and sense of orientation.

  15. Cyber security challenges in Smart Cities: Safety, security and privacy.

    PubMed

    Elmaghraby, Adel S; Losavio, Michael M

    2014-07-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the "Internet of Things." Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect.

  16. Causal Claims and the Operational Environment: An Analysis of Conventional and Emergent Causality as Applied to the Systems in 2007-2008 Iraq

    DTIC Science & Technology

    2012-06-08

    Douglas Ollivant, Surge, Iraq, Petraeus, COIN 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18 . NUMBER OF PAGES 19a. NAME OF...3See, New York Times, “Iraq 5 Years In,” http://www.nytimes.com/interactive/ 2008/03/ 18 /world...Government Printing Office, 26 September 2011), 5-2. 18 Open-systems or force fields are generally defined as any human or non-human entity that

  17. Extending the Security Net: The Impact of Rangeland Insurance on Ranching Economy and Culture

    ERIC Educational Resources Information Center

    Rowley, Rex J.

    2008-01-01

    Crop insurance is a relatively recent invention that attempts to level the playing field in our contest with the environment. It well represents the complexity and interaction within the human-land relationship. Ranching is another symbol of this relationship. The word stewardship captures a rancher's connection to the land. It denotes a respect…

  18. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists.

    PubMed

    Kraemer, Sara; Carayon, Pascale

    2007-03-01

    This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.

  19. Migrants, refugees and insecurity. Current threats to peace?

    PubMed

    Lohrmann, R

    2000-01-01

    Since the early 1980s, international migration has moved beyond humanitarian, economic development, labor market and societal integration concerns, raising complex interactive security implications for governments of migrant sending, receiving and transit countries, as well as for multilateral bodies. This article examines the effects of international migration on varied understandings and perceptions of international security. It discusses why international migration has come to be perceived as a security issue, both in industrialized and developing countries. Questions are raised on the migration-security nexus and the way in which the concepts "security" and "migration" are used. The real and perceived impacts of international migration upon national and regional security, both in industrialized and developing countries, are analyzed. The policies developed by governments and multilateral agencies since the mid-1980s to mitigate the destabilizing effects of certain kinds of international population movement and human displacement are examined. The conclusions stress the need for the establishment of a comprehensive framework of international cooperation among origin and receiving countries and international organizations to address the destabilizing implications of international migration.

  20. Land Use, Climate, and Water Resources-Global Stages of Interaction.

    PubMed

    Kaushal, Sujay S; Gold, Arthur J; Mayer, Paul M

    2017-10-24

    Land use and climate change can accelerate the depletion of freshwater resources that support humans and ecosystem services on a global scale. Here, we briefly review studies from around the world, and highlight those in this special issue. We identify stages that characterize increasing interaction between land use and climate change. During the first stage, hydrologic modifications and the built environment amplify overland flow via processes associated with runoff-dominated ecosystems (e.g., soil compaction, impervious surface cover, drainage, and channelization). During the second stage, changes in water storage impact the capacity of ecosystems to buffer extremes in water quantity and quality (e.g., either losses in snowpack, wetlands, and groundwater recharge or gains in water and nutrient storage behind dams in reservoirs). During the third stage, extremes in water quantity and quality contribute to losses in ecosystem services and water security (e.g., clean drinking water, flood mitigation, and habitat availability). During the final stage, management and restoration strategies attempt to regain lost ecosystem structure, function, and services but need to adapt to climate change. By anticipating the increasing interaction between land use and climate change, intervention points can be identified, and management strategies can be adjusted to improve outcomes for realistic expectations. Overall, global water security cannot be adequately restored without considering an increasing interaction between land use and climate change across progressive stages and our ever-increasing human domination of the water cycle from degradation to ecosystem restoration.

  1. Need for a gender-sensitive human security framework: results of a quantitative study of human security and sexual violence in Djohong District, Cameroon

    PubMed Central

    2014-01-01

    Background Human security shifts traditional concepts of security from interstate conflict and the absence of war to the security of the individual. Broad definitions of human security include livelihoods and food security, health, psychosocial well-being, enjoyment of civil and political rights and freedom from oppression, and personal safety, in addition to absence of conflict. Methods In March 2010, we undertook a population-based health and livelihood study of female refugees from conflict-affected Central African Republic living in Djohong District, Cameroon and their female counterparts within the Cameroonian host community. Embedded within the survey instrument were indicators of human security derived from the Leaning-Arie model that defined three domains of psychosocial stability suggesting individuals and communities are most stable when their core attachments to home, community and the future are intact. Results While the female refugee human security outcomes describe a population successfully assimilated and thriving in their new environments based on these three domains, the ability of human security indicators to predict the presence or absence of lifetime and six-month sexual violence was inadequate. Using receiver operating characteristic (ROC) analysis, the study demonstrates that common human security indicators do not uncover either lifetime or recent prevalence of sexual violence. Conclusions These data suggest that current gender-blind approaches of describing human security are missing serious threats to the safety of one half of the population and that efforts to develop robust human security indicators should include those that specifically measure violence against women. PMID:24829613

  2. Cyber security challenges in Smart Cities: Safety, security and privacy

    PubMed Central

    Elmaghraby, Adel S.; Losavio, Michael M.

    2014-01-01

    The world is experiencing an evolution of Smart Cities. These emerge from innovations in information technology that, while they create new economic and social opportunities, pose challenges to our security and expectations of privacy. Humans are already interconnected via smart phones and gadgets. Smart energy meters, security devices and smart appliances are being used in many cities. Homes, cars, public venues and other social systems are now on their path to the full connectivity known as the “Internet of Things.” Standards are evolving for all of these potentially connected systems. They will lead to unprecedented improvements in the quality of life. To benefit from them, city infrastructures and services are changing with new interconnected systems for monitoring, control and automation. Intelligent transportation, public and private, will access a web of interconnected data from GPS location to weather and traffic updates. Integrated systems will aid public safety, emergency responders and in disaster recovery. We examine two important and entangled challenges: security and privacy. Security includes illegal access to information and attacks causing physical disruptions in service availability. As digital citizens are more and more instrumented with data available about their location and activities, privacy seems to disappear. Privacy protecting systems that gather data and trigger emergency response when needed are technological challenges that go hand-in-hand with the continuous security challenges. Their implementation is essential for a Smart City in which we would wish to live. We also present a model representing the interactions between person, servers and things. Those are the major element in the Smart City and their interactions are what we need to protect. PMID:25685517

  3. A Cyber Situational Awareness Model for Network Administrators

    DTIC Science & Technology

    2017-03-01

    environments, the Internet of Things, artificial intelligence , and so on. As users’ data requirements grow more complex, they demand information...security of systems of interest. Further, artificial intelligence is a powerful concept in information technology. Therefore, new research should...look into how to use artificial intelligence to develop CSA. Human interaction with cyber systems is not making networks and their components safer

  4. 2015 Marine Corps Security Environment Forecast: Futures 2030-2045

    DTIC Science & Technology

    2015-01-01

    The technologies that make the iPhone “smart” were publically funded—the Internet, wireless networks, the global positioning system, microelectronics...Energy Revolution (63 percent);  Internet of Things (ubiquitous sensors embedded in interconnected computing devices) (50 percent);  “Sci-Fi...Neuroscience & artificial intelligence - Sensors /control systems -Power & energy -Human-robot interaction Robots/autonomous systems will become part of the

  5. Child Care Effects in Context: Quality, Stability, and Multiplicity in Nonmaternal Child Care Arrangements during the First 15 Months of Life

    ERIC Educational Resources Information Center

    Tran, Henry; Weinraub, Marsha

    2006-01-01

    Main and interactive effects of child care quality, stability, and multiplicity on infants' attachment security, language comprehension, language production, and cognitive development at 15 months were examined using data from the National Institute of Child Health and Human Development (NICHD) Study of Early Child Care. Thirty-nine percent of the…

  6. A secure and easy-to-implement web-based communication framework for caregiving robot teams

    NASA Astrophysics Data System (ADS)

    Tuna, G.; Daş, R.; Tuna, A.; Örenbaş, H.; Baykara, M.; Gülez, K.

    2016-03-01

    In recent years, robots have started to become more commonplace in our lives, from factory floors to museums, festivals and shows. They have started to change how we work and play. With an increase in the population of the elderly, they have also been started to be used for caregiving services, and hence many countries have been investing in the robot development. The advancements in robotics and wireless communications has led to the emergence of autonomous caregiving robot teams which cooperate to accomplish a set of tasks assigned by human operators. Although wireless communications and devices are flexible and convenient, they are vulnerable to many risks compared to traditional wired networks. Since robots with wireless communication capability transmit all data types, including sensory, coordination, and control, through radio frequencies, they are open to intruders and attackers unless protected and their openness may lead to many security issues such as data theft, passive listening, and service interruption. In this paper, a secure web-based communication framework is proposed to address potential security threats due to wireless communication in robot-robot and human-robot interaction. The proposed framework is simple and practical, and can be used by caregiving robot teams in the exchange of sensory data as well as coordination and control data.

  7. Baseline Suitability Analysis

    DTIC Science & Technology

    2013-07-18

    VA) • DFAS • Human Resources - HR Shared Services (Indianapolis, IN) • Personnel Security - HR Shared Services (Indianapolis, IN) DHRA...Security (Camp Lejeune) No Yes Yes AAFES Human Resources No No No Force Protection Yes Yes Yes DFAS Human Resources - HR Shared Services No...No No Personnel Security - HR Shared Services Yes Yes Yes DLA Human Resources No No Yes Personnel Security Yes Yes Yes DoDEA Human

  8. The Impact of Pro-Government Militias on State and Human Security: A Comparative Analysis of the Afghan Local Police and the Janjaweed

    DTIC Science & Technology

    2018-03-01

    GOVERNMENT MILITIAS ON STATE AND HUMAN SECURITY: A COMPARATIVE ANALYSIS OF THE AFGHAN LOCAL POLICE AND THE JANJAWEED by Mark D. Phelps March...MILITIAS ON STATE AND HUMAN SECURITY: A COMPARATIVE ANALYSIS OF THE AFGHAN LOCAL POLICE AND THE JANJAWEED 5. FUNDING NUMBERS 6. AUTHOR(S) Mark D...human security. This thesis examines the relationship and impact of pro-government militias on state and human security by conducting a comparative

  9. 5 CFR 9701.101 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... establishment of a new human resources management system within the Department of Homeland Security (DHS), as...

  10. Object and Facial Recognition in Augmented and Virtual Reality: Investigation into Software, Hardware and Potential Uses

    NASA Technical Reports Server (NTRS)

    Schulte, Erin

    2017-01-01

    As augmented and virtual reality grows in popularity, and more researchers focus on its development, other fields of technology have grown in the hopes of integrating with the up-and-coming hardware currently on the market. Namely, there has been a focus on how to make an intuitive, hands-free human-computer interaction (HCI) utilizing AR and VR that allows users to control their technology with little to no physical interaction with hardware. Computer vision, which is utilized in devices such as the Microsoft Kinect, webcams and other similar hardware has shown potential in assisting with the development of a HCI system that requires next to no human interaction with computing hardware and software. Object and facial recognition are two subsets of computer vision, both of which can be applied to HCI systems in the fields of medicine, security, industrial development and other similar areas.

  11. Domestic water and sanitation as water security: monitoring, concepts and strategy

    PubMed Central

    Bradley, David J.; Bartram, Jamie K.

    2013-01-01

    Domestic water and sanitation provide examples of a situation where long-term, target-driven efforts have been launched with the objective of reducing the proportion of people who are water-insecure, most recently through the millennium development goals (MDGs) framework. Impacts of these efforts have been monitored by an increasingly evidence-based system, and plans for the next period of international policy, which are likely to aim at universal coverage with basic water and sanitation, are being currently developed. As distinct from many other domains to which the concept of water security is applied, domestic or personal water security requires a perspective that incorporates the reciprocal notions of provision and risk, as the current status of domestic water and sanitation security is dominated by deficiency This paper reviews the interaction of science and technology with policies, practice and monitoring, and explores how far domestic water can helpfully fit into the proposed concept of water security, how that is best defined, and how far the human right to water affects the situation. It is considered that they fit well together in terms both of practical planning of targets and indicators and as a conceptual framework to help development. The focus needs to be broad, to extend beyond households, to emphasize maintenance as well as construction and to increase equity of access. International and subnational monitoring need to interact, and monitoring results need to be meaningful to service providers as well as users. PMID:24080628

  12. BaffleText: a Human Interactive Proof

    NASA Astrophysics Data System (ADS)

    Chew, Monica; Baird, Henry S.

    2003-01-01

    Internet services designed for human use are being abused by programs. We present a defense against such attacks in the form of a CAPTCHA (Completely Automatic Public Turing test to tell Computers and Humans Apart) that exploits the difference in ability between humans and machines in reading images of text. CAPTCHAs are a special case of 'human interactive proofs,' a broad class of security protocols that allow people to identify themselves over networks as members of given groups. We point out vulnerabilities of reading-based CAPTCHAs to dictionary and computer-vision attacks. We also draw on the literature on the psychophysics of human reading, which suggests fresh defenses available to CAPTCHAs. Motivated by these considerations, we propose BaffleText, a CAPTCHA which uses non-English pronounceable words to defend against dictionary attacks, and Gestalt-motivated image-masking degradations to defend against image restoration attacks. Experiments on human subjects confirm the human legibility and user acceptance of BaffleText images. We have found an image-complexity measure that correlates well with user acceptance and assists in engineering the generation of challenges to fit the ability gap. Recent computer-vision attacks, run independently by Mori and Jitendra, suggest that BaffleText is stronger than two existing CAPTCHAs.

  13. AR.Drone: security threat analysis and exemplary attack to track persons

    NASA Astrophysics Data System (ADS)

    Samland, Fred; Fruth, Jana; Hildebrandt, Mario; Hoppe, Tobias; Dittmann, Jana

    2012-01-01

    In this article we illustrate an approach of a security threat analysis of the quadrocopter AR.Drone, a toy for augmented reality (AR) games. The technical properties of the drone can be misused for attacks, which may relate security and/or privacy aspects. Our aim is to sensitize for the possibility of misuses and the motivation for an implementation of improved security mechanisms of the quadrocopter. We focus primarily on obvious security vulnerabilities (e.g. communication over unencrypted WLAN, usage of UDP, live video streaming via unencrypted WLAN to the control device) of this quadrocopter. We could practically verify in three exemplary scenarios that this can be misused by unauthorized persons for several attacks: high-jacking of the drone, eavesdropping of the AR.Drones unprotected video streams, and the tracking of persons. Amongst other aspects, our current research focuses on the realization of the attack of tracking persons and objects with the drone. Besides the realization of attacks, we want to evaluate the potential of this particular drone for a "safe-landing" function, as well as potential security enhancements. Additionally, in future we plan to investigate an automatic tracking of persons or objects without the need of human interactions.

  14. Security of attachment and quality of mother-toddler social interaction in a high-risk sample.

    PubMed

    Haltigan, John D; Lambert, Brittany L; Seifer, Ronald; Ekas, Naomi V; Bauer, Charles R; Messinger, Daniel S

    2012-02-01

    The quality of children's social interactions and their attachment security with a primary caregiver are two widely studied indices of socioemotional functioning in early childhood. Although both Bowlby and Ainsworth suggested that the parent-child interactions underlying the development of attachment security could be distinguished from other aspects of parent-child interaction (e.g., play), relatively little empirical research has examined this proposition. The aim of the current study was to explore this issue by examining concurrent relations between toddler's attachment security in the Strange Situation Procedure and quality of mother-child social interaction in a high-risk sample of toddlers characterized by prenatal cocaine exposure and low levels of maternal education. Analyses of variance suggested limited relations between attachment security and quality of social interaction. Further research examining the interrelations among various components of the parent-child relationship is needed. Copyright © 2011 Elsevier Inc. All rights reserved.

  15. Human-Robot Interaction Literature Review

    DTIC Science & Technology

    2012-03-01

    coordination, operation of non-simulated UVs, and mixed UAV and UGV systems . Recommendations THRIL should focus on studies that look at operating non...Security, 2012). UAVs were continued to be developed in operations such as Desert Storm, where the Pioneer UAV system provided intelligence and fire... systems . One of the programs that was part of the initial fielding of UGVs in military operations was the Vehicle Teleoperation Capability (VTC). The

  16. Automatic recognition of emotions from facial expressions

    NASA Astrophysics Data System (ADS)

    Xue, Henry; Gertner, Izidor

    2014-06-01

    In the human-computer interaction (HCI) process it is desirable to have an artificial intelligent (AI) system that can identify and categorize human emotions from facial expressions. Such systems can be used in security, in entertainment industries, and also to study visual perception, social interactions and disorders (e.g. schizophrenia and autism). In this work we survey and compare the performance of different feature extraction algorithms and classification schemes. We introduce a faster feature extraction method that resizes and applies a set of filters to the data images without sacrificing the accuracy. In addition, we have enhanced SVM to multiple dimensions while retaining the high accuracy rate of SVM. The algorithms were tested using the Japanese Female Facial Expression (JAFFE) Database and the Database of Faces (AT&T Faces).

  17. Urbanization, Extreme Climate Hazards and Food, Energy Water Security

    NASA Astrophysics Data System (ADS)

    Romero-Lankao, P.; Davidson, D.; McPhearson, T.

    2016-12-01

    Research is urgently needed that incorporates the interconnected nature of three critical resources supporting our cities: food, energy and water. Cities are increasing demands for food, water and energy resources that in turn stress resource supplies, creating risks of negative impacts to human and ecological wellbeing. Simultaneously, shifts in climatic conditions, including extremes such as floods, heat, and droughts, threaten the sustainable availability of adequate quantities and qualities of food, energy and water (FEW) resources needed for resilient cities and ecosystems. These resource flows cannot be treated in isolation simply because they are interconnected: shifts in food, energy or water dynamics in turn affect the others, affecting the security of the whole - i.e., FEW nexus security. We present a framework to examine the dynamic interactions of urbanization, FEW nexus security and extreme hazard risks, with two overarching research questions: Do existing and emerging actions intended to enhance a population's food, water and energy security have the capacity to ensure FEW nexus security in the face of changing climate and urban development conditions? Can we identify a common set of social, ecological and technological conditions across a diversity of urban-regions that support the emergence of innovations that can lead to structural transformations for FEW nexus security?

  18. Rapid Growth in Surgeons’ Use of Secure Messaging in a Patient Portal

    PubMed Central

    Shenson, Jared A.; Cronin, Robert M.; Davis, Sharon E.; Chen, Qingxia; Jackson, Gretchen Purcell

    2016-01-01

    Background Use of secure messaging through patient portals has risen substantially in recent years due to provider incentives and consumer demand. Secure messaging may increase patient satisfaction and improve outcomes, but also adds to physician workload. Most prior studies of secure messaging focused on primary care and medical specialties. We examined surgeons’ use of secure messaging and the contribution of messaging to outpatient interactions in a broadly-deployed patient portal. Methods We determined the number of clinic visits and secure messages for surgical providers in the first three years (2008–10) after patient portal deployment at an academic medical center. We calculated the proportion of outpatient interaction conducted through messaging for each specialty. Logistic regression models compared the likelihood of message-based versus clinic outpatient interaction across surgical specialties. Results Over the study period, surgical providers delivered care in 648,200 clinic visits and received 83,912 messages, with more than 200% growth in monthly message volume. Surgical specialties receiving the most messages were orthopedics/podiatry (25.1%), otolaryngology (20.1%), urology (10.8%), and general surgery (9.6%); vascular surgery (0.8%) and pediatric general surgery (0.2%) received the fewest. The proportion of outpatient interactions conducted through secure messaging increased significantly from 5.4% in 2008 to 15.3% in 2010 (p<0.001) with all specialties experiencing growth. Heart/lung transplantation (74.9%), liver/kidney/pancreas transplantation (69.5%), and general surgery (48.7%) had the highest proportion of message-based outpatient interaction by the end of the study. Conclusions This study demonstrates rapid adoption of online secure messaging across surgical specialties with significant growth in its use for outpatient interaction. Some specialties, particularly those with long-term follow-up, interacted with patients more through secure messaging than in person. As surgeons devote more time to secure messaging, additional research will be needed to understand the care delivered through online interactions and to develop models for reimbursement. PMID:26123340

  19. Information Management and the Biological Warfare Threat

    DTIC Science & Technology

    2002-03-01

    24 2. Scientific-Security Paradigm Interaction........................................ 25 3. Business - Security Paradigm...policies of openness and guardedness and discuss the three paradigms (scientific, business , security ) as a developing factor for information sharing...Trade Center. 3. Business - Security Paradigm Interaction Gene patenting (discussed previously) is utilized by business to protect their

  20. Security and Privacy Preservation in Human-Involved Networks

    NASA Astrophysics Data System (ADS)

    Asher, Craig; Aumasson, Jean-Philippe; Phan, Raphael C.-W.

    This paper discusses security within human-involved networks, with a focus on social networking services (SNS). We argue that more secure networks could be designed using semi-formal security models inspired from cryptography, as well as notions like that of ceremony, which exploits human-specific abilities and psychology to assist creating more secure protocols. We illustrate some of our ideas with the example of the SNS Facebook.

  1. 5 CFR 9701.103 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES..., to provide Governmentwide oversight in human resources management programs and practices. Department...

  2. A new security model for collaborative environments

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Agarwal, Deborah; Lorch, Markus; Thompson, Mary

    Prevalent authentication and authorization models for distributed systems provide for the protection of computer systems and resources from unauthorized use. The rules and policies that drive the access decisions in such systems are typically configured up front and require trust establishment before the systems can be used. This approach does not work well for computer software that moderates human-to-human interaction. This work proposes a new model for trust establishment and management in computer systems supporting collaborative work. The model supports the dynamic addition of new users to a collaboration with very little initial trust placed into their identity and supportsmore » the incremental building of trust relationships through endorsements from established collaborators. It also recognizes the strength of a users authentication when making trust decisions. By mimicking the way humans build trust naturally the model can support a wide variety of usage scenarios. Its particular strength lies in the support for ad-hoc and dynamic collaborations and the ubiquitous access to a Computer Supported Collaboration Workspace (CSCW) system from locations with varying levels of trust and security.« less

  3. How can we exploit above–belowground interactions to assist in addressing the challenges of food security?

    PubMed Central

    Orrell, Peter; Bennett, Alison E.

    2013-01-01

    Can above–belowground interactions help address issues of food security? We address this question in this manuscript, and review the intersection of above–belowground interactions and food security. We propose that above–belowground interactions could address two strategies identified by Godfray etal. (2010): reducing the Yield Gap, and Increasing Production Limits. In particular, to minimize the difference between potential and realized production (The Yield Gap) above–belowground interactions could be manipulated to reduce losses to pests and increase crop growth (and therefore yields). To Increase Production Limits we propose two mechanisms: utilizing intercropping (which uses multiple aspects of above–belowground interactions) and breeding for traits that promote beneficial above–belowground interactions, as well as breeding mutualistic organisms to improve their provided benefit. As a result, if they are managed correctly, there is great potential for above–belowground interactions to contribute to food security. PMID:24198821

  4. Integrating Safety with Science,Technology and Innovation at Los Alamos National Laboratory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rich, Bethany M

    2012-04-02

    The mission of Los Alamos National Laboratory (LANL) is to develop and apply science, technology and engineering solutions to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve emerging national security challenges. The most important responsibility is to direct and conduct efforts to meet the mission with an emphasis on safety, security, and quality. In this article, LANL Environmental, Safety, and Health (ESH) trainers discuss how their application and use of a kinetic learning module (learn by doing) with a unique fall arrest system is helping to address one the most common industrialmore » safety challenges: slips and falls. A unique integration of Human Performance Improvement (HPI), Behavior Based Safety (BBS) and elements of the Voluntary Protection Program (VPP) combined with an interactive simulator experience is being used to address slip and fall events at Los Alamos.« less

  5. Gender Aspects of Human Security

    ERIC Educational Resources Information Center

    Moussa, Ghada

    2008-01-01

    The chapter deals with the gender dimensions in human security through focusing on the relationship between gender and human security, first manifested in international declarations and conventions, and subsequently evolving in world women conferences. It aims at analysing the various gender aspects in its relation to different human security…

  6. Pilot study on real-time motion detection in UAS video data by human observer and image exploitation algorithm

    NASA Astrophysics Data System (ADS)

    Hild, Jutta; Krüger, Wolfgang; Brüstle, Stefan; Trantelle, Patrick; Unmüßig, Gabriel; Voit, Michael; Heinze, Norbert; Peinsipp-Byma, Elisabeth; Beyerer, Jürgen

    2017-05-01

    Real-time motion video analysis is a challenging and exhausting task for the human observer, particularly in safety and security critical domains. Hence, customized video analysis systems providing functions for the analysis of subtasks like motion detection or target tracking are welcome. While such automated algorithms relieve the human operators from performing basic subtasks, they impose additional interaction duties on them. Prior work shows that, e.g., for interaction with target tracking algorithms, a gaze-enhanced user interface is beneficial. In this contribution, we present an investigation on interaction with an independent motion detection (IDM) algorithm. Besides identifying an appropriate interaction technique for the user interface - again, we compare gaze-based and traditional mouse-based interaction - we focus on the benefit an IDM algorithm might provide for an UAS video analyst. In a pilot study, we exposed ten subjects to the task of moving target detection in UAS video data twice, once performing with automatic support, once performing without it. We compare the two conditions considering performance in terms of effectiveness (correct target selections). Additionally, we report perceived workload (measured using the NASA-TLX questionnaire) and user satisfaction (measured using the ISO 9241-411 questionnaire). The results show that a combination of gaze input and automated IDM algorithm provides valuable support for the human observer, increasing the number of correct target selections up to 62% and reducing workload at the same time.

  7. Understanding a Complex World: Why an Emphasis on Empathy Could Better Enable Army Leaders to Win

    DTIC Science & Technology

    2016-06-10

    complexity and speed of human interactions. Through the analysis of case studies involving General Stanley McChrystal and Colonel Michael Steele , this...Future; Win; Dilemma; Leadership; McChrystal, Stanley; Steele , Michael 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF...Stanley McChrystal and Colonel Michael Steele , this thesis describes how each individual’s empathetic mindset resulted in both favorable and

  8. Federal Government Information Systems Security Management and Governance Are Pacing Factors for Innovation

    ERIC Educational Resources Information Center

    Edwards, Gregory

    2011-01-01

    Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…

  9. Child rights, right to water and sanitation, and human security.

    PubMed

    Pink, Ross

    2012-06-15

    The article explores the intersection between child rights, water scarcity, sanitation, and the human security paradigm. The recognition of child rights has been advanced through the 1989 Convention on the Rights of the Child and other international legal instruments, while water rights are increasingly affirmed in international law and through the historic July 2010 United Nations General Assembly resolution that strengthened the legal foundation for water security and human rights. Yet there remains a development gap in terms of child access to clean and secure water sources for basic human development needs. The human security paradigm provides a legal and humanitarian foundation for the extension of child rights related to water and sanitation. Copyright © 2012 Pink.

  10. Legal assessment tool (LAT): an interactive tool to address privacy and data protection issues for data sharing.

    PubMed

    Kuchinke, Wolfgang; Krauth, Christian; Bergmann, René; Karakoyun, Töresin; Woollard, Astrid; Schluender, Irene; Braasch, Benjamin; Eckert, Martin; Ohmann, Christian

    2016-07-07

    In an unprecedented rate data in the life sciences is generated and stored in many different databases. An ever increasing part of this data is human health data and therefore falls under data protected by legal regulations. As part of the BioMedBridges project, which created infrastructures that connect more than 10 ESFRI research infrastructures (RI), the legal and ethical prerequisites of data sharing were examined employing a novel and pragmatic approach. We employed concepts from computer science to create legal requirement clusters that enable legal interoperability between databases for the areas of data protection, data security, Intellectual Property (IP) and security of biosample data. We analysed and extracted access rules and constraints from all data providers (databases) involved in the building of data bridges covering many of Europe's most important databases. These requirement clusters were applied to five usage scenarios representing the data flow in different data bridges: Image bridge, Phenotype data bridge, Personalised medicine data bridge, Structural data bridge, and Biosample data bridge. A matrix was built to relate the important concepts from data protection regulations (e.g. pseudonymisation, identifyability, access control, consent management) with the results of the requirement clusters. An interactive user interface for querying the matrix for requirements necessary for compliant data sharing was created. To guide researchers without the need for legal expert knowledge through legal requirements, an interactive tool, the Legal Assessment Tool (LAT), was developed. LAT provides researchers interactively with a selection process to characterise the involved types of data and databases and provides suitable requirements and recommendations for concrete data access and sharing situations. The results provided by LAT are based on an analysis of the data access and sharing conditions for different kinds of data of major databases in Europe. Data sharing for research purposes must be opened for human health data and LAT is one of the means to achieve this aim. In summary, LAT provides requirements in an interactive way for compliant data access and sharing with appropriate safeguards, restrictions and responsibilities by introducing a culture of responsibility and data governance when dealing with human data.

  11. Dressing the mind properly for the game.

    PubMed Central

    Sally, David

    2003-01-01

    Game theory as a theoretical and empirical approach to interaction has spread from economics to psychology, political science, sociology and biology. Numerous social interactions-foraging, talking, trusting, coordinating, competing-can be formally represented in a game with specific rules and strategies. These same interactions seem to rely on an interweaving of mental selves, but an effective strategy need not depend on explicit strategizing and higher mental capabilities, as less sentient creatures or even lines of software can play similar games. Human players are distinct because we are less consistent and our choices respond to elements of the setting that appear to be strategically insignificant. Recent analyses of this variable response have yielded a number of insights into the mental approach of human players: we often mentalize, but not always; we are endowed with social preferences; we distinguish among various types of opponents; we manifest different personalities; we are often guided by security concerns; and our strategic sophistication is usually modest. PMID:12689383

  12. Interactive Synthesis of Code Level Security Rules

    DTIC Science & Technology

    2017-04-01

    Interactive Synthesis of Code-Level Security Rules A Thesis Presented by Leo St. Amour to The Department of Computer Science in partial fulfillment...of the requirements for the degree of Master of Science in Computer Science Northeastern University Boston, Massachusetts April 2017 DISTRIBUTION...Abstract of the Thesis Interactive Synthesis of Code-Level Security Rules by Leo St. Amour Master of Science in Computer Science Northeastern University

  13. Human factors in computing systems: focus on patient-centered health communication at the ACM SIGCHI conference.

    PubMed

    Wilcox, Lauren; Patel, Rupa; Chen, Yunan; Shachak, Aviv

    2013-12-01

    Health Information Technologies, such as electronic health records (EHR) and secure messaging, have already transformed interactions among patients and clinicians. In addition, technologies supporting asynchronous communication outside of clinical encounters, such as email, SMS, and patient portals, are being increasingly used for follow-up, education, and data reporting. Meanwhile, patients are increasingly adopting personal tools to track various aspects of health status and therapeutic progress, wishing to review these data with clinicians during consultations. These issues have drawn increasing interest from the human-computer interaction (HCI) community, with special focus on critical challenges in patient-centered interactions and design opportunities that can address these challenges. We saw this community presenting and interacting at the ACM SIGCHI 2013, Conference on Human Factors in Computing Systems, (also known as CHI), held April 27-May 2nd, 2013 at the Palais de Congrès de Paris in France. CHI 2013 featured many formal avenues to pursue patient-centered health communication: a well-attended workshop, tracks of original research, and a lively panel discussion. In this report, we highlight these events and the main themes we identified. We hope that it will help bring the health care communication and the HCI communities closer together. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  14. Binding properties of food colorant allura red with human serum albumin in vitro.

    PubMed

    Wang, Langhong; Zhang, Guowen; Wang, Yaping

    2014-05-01

    Allura red (AR) is a widely used colorant in food industry, but may have a potential security risk. In this study, the properties of interaction between AR and human serum albumin (HSA) in vitro were determined by fluorescence, UV-Vis absorption and circular dichroism (CD) spectroscopy combining with multivariate curve resolution-alternating least squares (MCR-ALS) chemometrics and molecular modeling approaches. An expanded UV-Vis data matrix was resolved by MCR-ALS method, and the concentration profiles and pure spectra for the three reaction components (AR, HSA, and AR-HSA complex) of the system were then successfully obtained to evaluate the progress interaction of AR with HSA. The calculated thermodynamic parameters indicated that hydrogen binding and hydrophobic interactions played major roles in the binding process, and the interaction induced a decrease in the protein surface hydrophobicity. The competitive experiments revealed that AR mainly located in Sudlow's site I of HSA, and this result was further supported by molecular modeling studies. Analysis of CD spectra found that the addition of AR induced the conformational changes of HSA. This study have provided new insight into the mechanism of interaction between AR and HSA.

  15. The Role of Human Factors/Ergonomics in the Science of Security: Decision Making and Action Selection in Cyberspace.

    PubMed

    Proctor, Robert W; Chen, Jing

    2015-08-01

    The overarching goal is to convey the concept of science of security and the contributions that a scientifically based, human factors approach can make to this interdisciplinary field. Rather than a piecemeal approach to solving cybersecurity problems as they arise, the U.S. government is mounting a systematic effort to develop an approach grounded in science. Because humans play a central role in security measures, research on security-related decisions and actions grounded in principles of human information-processing and decision-making is crucial to this interdisciplinary effort. We describe the science of security and the role that human factors can play in it, and use two examples of research in cybersecurity--detection of phishing attacks and selection of mobile applications--to illustrate the contribution of a scientific, human factors approach. In these research areas, we show that systematic information-processing analyses of the decisions that users make and the actions they take provide a basis for integrating the human component of security science. Human factors specialists should utilize their foundation in the science of applied information processing and decision making to contribute to the science of cybersecurity. © 2015, Human Factors and Ergonomics Society.

  16. Beyond Conflict and Kinetics: Airpower Strategy for Human Security Operations

    DTIC Science & Technology

    2014-08-26

    America to a leadership role of the international community while dramatically altering its security environment. After World War II, American security...health, environmental, personal, community , and political security. At the same time it stopped short of providing a finite definition, instead...seven areas of human security are economic, food, health, environmental, personal, community and political security. These components are a “universal

  17. Interplay of genes and early mother-child relationship in the development of self-regulation from toddler to preschool age.

    PubMed

    Kochanska, Grazyna; Philibert, Robert A; Barry, Robin A

    2009-11-01

    A broad capacity for deliberate self-regulation plays a key role in emotion regulation. This longitudinal investigation from infancy to preschool age examines genotype by environment (G x E) interaction in the development of self-regulation, using molecular measures of children's genotypes and observed measures of the quality of early mother-child relationship, as reflected in attachment organization in infancy. In 89 children, we assessed the polymorphism in the serotonin transporter gene (5-HTTLPR, ss/sl vs. ll allele status), security of attachment to mothers at 15 months in the Strange Situation, and children's ability for self-regulation at 25, 38, and 52 months, using behavioral batteries of tasks that called for deliberately suppressing a dominant response and performing instead a sub-dominant response. There was a robust G x E interaction between genetic risk and the quality of early relationship. Among children who carried a short 5-HTTLPR allele (ss/sl ), those who were insecurely attached developed poor regulatory capacities, but those who were securely attached developed as good regulatory capacities as children who were homozygotic for the long allele (ll ). There was no effect of security for ll homozygotes. Those findings, consistent with diathesis-stress model, bridge research on self-regulation in typically developing children with research on non-human primates and research on psychopathology. They also indicate that a secure attachment relationship can serve as a protective factor in the presence of risk conferred by a genotype.

  18. Evaluation of the Presentation of Network Data via Visualization Tools for Network Analysts

    DTIC Science & Technology

    2014-03-01

    A. (eds.) The Human Computer Interaction Handbook, pp.544–582. Lawrence Erlbaum Associates, Mawah, NJ, 2003. 4. Goodall , John R. Introduction to...of either display type being used in the analysis of cyber security tasks. Goodall (19) is one of few whose work focused on comparing user...relating source IP address to destination IP address and time, Goodall remains the only known approach comparing tabular and graphical displays

  19. 75 FR 37253 - Classified National Security Information

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-28

    ..., Intelligence, National defense, National security information, Presidential documents, Security information... reveal the identity of a confidential human source or a human intelligence source or key design concepts... or a human intelligence source, the duration shall be up to 75 years and shall be designated with the...

  20. A reservoir of ethnobotanical knowledge informs resilient food security and health strategies in the Balkans.

    PubMed

    Quave, Cassandra L; Pieroni, Andrea

    2015-02-02

    While all peoples are nested in their environments, their decisions and actions are mediated by culturally constructed values, beliefs and priorities. Ethnobotanical methods can show how different ethnic groups living within the same geographic landscape interact with environmental resources. Here, we explore the impact of culture on ethnobotanical knowledge, and practice on local food security and human health. Gora, a mountainous territory of northeastern Albania, is home to two culturally and linguistically distinct peoples: Gorani and Albanians. We investigated the divergences and convergences of ethnobotanical strategies among the groups with respect to the use of 104 plant species. Local knowledge modulated by cultural history has moulded these peoples' use of their natural environment, fostering resilience during periods of food insecurity.

  1. Airport baggage handling--where do human factors fit in the challenges that airports put on a baggage system?

    PubMed

    Lenior, O N M

    2012-01-01

    The challenges put on large baggage systems by airports can be summarized as: handling a high number of bags in a short period of time, in a limited space, with all sorts of disruptions, whilst complying with stringent regulation upon security, sustainability and health and safety. The aim of this company case study is to show in the different project phases--as indicated in the system ergonomic approach--how the human factors specialist can play a major part in tackling these challenges. By describing different projects in terms of scope, organization, human factors topics covered, phases and lessons learned, the importance of Human-Computer Interaction, automation as well as manual handling and work organization in baggage is addressed.

  2. Critical Rare Earths, National Security, and U.S.-China Interactions: A Portfolio Approach to Dysprosium Policy Design

    DTIC Science & Technology

    2015-01-01

    by the graduate fellow’s faculty committee. C O R P O R A T I O N Dissertation Critical Rare Earths, National Security, and U.S.-China Interactions A...Portfolio Approach to Dysprosium Policy Design David L. An Dissertation Critical Rare Earths, National Security, and U.S.-China Interactions A...Permanent Magnet ................................................ xxiv Dysprosium, the Most Critical Rare Earth

  3. Sustainable development: challenges and opportunities for the natural sciences (Invited)

    NASA Astrophysics Data System (ADS)

    Mutter, J. C.; Fishman, R.; Anttila-Hughes, J. K.; Hsiang, S. M.

    2009-12-01

    The challenges of sustainable development -- equitably improving global human welfare while ensuring that the environment is preserved for future generations - demand research at the nexus of the social and natural sciences. Massive and inevitable changes in climate, ecosystem functions, and human interaction with the environment will perturb societies throughout the world in different ways over the coming century. The changes faced by poor societies and their ability to cope differs markedly from those that face the richest. Yet in all regions the dynamic interaction of social and natural drivers will govern the prospects for human welfare and its improvement. Developing an understanding of these phenomena will require field research together with analytical and modeling capabilities that couple physical and social phenomena, allowing feedback between the two to manifest and permit forecasting over long time scales. Heterogeneous income and population growth further complicate this need through their consequences for food security, migration, resource allocation, and conflict. In this contribution, we identify some key concepts of sustainable development, open research questions and outline how scientific research might engage this emerging discipline. Using recent examples of interaction, we discuss the opportunities and challenges facing the further development of this dialogue.

  4. 5 CFR 9701.526 - Continuation of existing laws, recognitions, agreements, and procedures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations...

  5. Application of visual cryptography for learning in optics and photonics

    NASA Astrophysics Data System (ADS)

    Mandal, Avikarsha; Wozniak, Peter; Vauderwange, Oliver; Curticapean, Dan

    2016-09-01

    In the age data digitalization, important applications of optics and photonics based sensors and technology lie in the field of biometrics and image processing. Protecting user data in a safe and secure way is an essential task in this area. However, traditional cryptographic protocols rely heavily on computer aided computation. Secure protocols which rely only on human interactions are usually simpler to understand. In many scenarios development of such protocols are also important for ease of implementation and deployment. Visual cryptography (VC) is an encryption technique on images (or text) in which decryption is done by human visual system. In this technique, an image is encrypted into number of pieces (known as shares). When the printed shares are physically superimposed together, the image can be decrypted with human vision. Modern digital watermarking technologies can be combined with VC for image copyright protection where the shares can be watermarks (small identification) embedded in the image. Similarly, VC can be used for improving security of biometric authentication. This paper presents about design and implementation of a practical laboratory experiment based on the concept of VC for a course in media engineering. Specifically, our contribution deals with integration of VC in different schemes for applications like digital watermarking and biometric authentication in the field of optics and photonics. We describe theoretical concepts and propose our infrastructure for the experiment. Finally, we will evaluate the learning outcome of the experiment, performed by the students.

  6. Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.

    PubMed

    Wang, Hao; Lau, Nathan; Gerdes, Ryan M

    2018-04-01

    The aim of this study was to apply work domain analysis for cybersecurity assessment and design of supervisory control and data acquisition (SCADA) systems. Adoption of information and communication technology in cyberphysical systems (CPSs) for critical infrastructures enables automated and distributed control but introduces cybersecurity risk. Many CPSs employ SCADA industrial control systems that have become the target of cyberattacks, which inflict physical damage without use of force. Given that absolute security is not feasible for complex systems, cyberintrusions that introduce unanticipated events will occur; a proper response will in turn require human adaptive ability. Therefore, analysis techniques that can support security assessment and human factors engineering are invaluable for defending CPSs. We conducted work domain analysis using the abstraction hierarchy (AH) to model a generic SCADA implementation to identify the functional structures and means-ends relations. We then adopted a case study approach examining the Stuxnet cyberattack by developing and integrating AHs for the uranium enrichment process, SCADA implementation, and malware to investigate the interactions between the three aspects of cybersecurity in CPSs. The AHs for modeling a generic SCADA implementation and studying the Stuxnet cyberattack are useful for mapping attack vectors, identifying deficiencies in security processes and features, and evaluating proposed security solutions with respect to system objectives. Work domain analysis is an effective analytical method for studying cybersecurity of CPSs for critical infrastructures in a psychologically relevant manner. Work domain analysis should be applied to assess cybersecurity risk and inform engineering and user interface design.

  7. 5 CFR 9701.231 - Conversion of positions and employees to the DHS classification system.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Transitional...

  8. 5 CFR 9701.334 - Setting and adjusting locality and special rate supplements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Locality and...

  9. 5 CFR 9701.512 - Conferring on procedures for the exercise of management rights.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.512...

  10. 5 CFR 9701.323 - Eligibility for pay increase associated with a rate range adjustment.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Setting and...

  11. 5 CFR 9701.335 - Eligibility for pay increase associated with a supplement adjustment.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Locality and...

  12. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    NASA Astrophysics Data System (ADS)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive literature in human security rarely applied in this context. This includes a brief review of human security and Sino-Myanmar relations, and is grounded in an empirical analysis of Chinese investment in Myanmar's hydropower and oil and gas sectors. Ultimately, this thesis argues that, while insightful, many traditional interpretations of Sino-Myanmar energy cooperation overlook the security interests of those worst affected. Furthermore, that the worst excesses of Chinese companies in Myanmar are not unique to China, but common across all investors in the regime, Western or otherwise.

  13. Task-Related Interactions between Kindergarten Children and Their Teachers: The Role of Emotional Security

    ERIC Educational Resources Information Center

    Thijs, Jochem T.; Koomen, Helma M. Y.

    2008-01-01

    This study examined the emotional security of kindergarten children in dyadic task-related interactions with their teachers. In particular, it examined the interrelations between security, task behaviours (persistence and independence), social inhibition, and teachers' support. Participants were 79 kindergartners (mean age = 69.7 months) and their…

  14. 5 CFR 9701.212 - Bands.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Structure § 9701.212 Bands. (a) For purposes of identifying...

  15. 5 CFR 9701.221 - Classification requirements.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Section 9701.221 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.221 Classification...

  16. 5 CFR 9701.221 - Classification requirements.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Section 9701.221 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.221 Classification...

  17. 5 CFR 9701.221 - Classification requirements.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Section 9701.221 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.221 Classification...

  18. 5 CFR 9701.221 - Classification requirements.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Section 9701.221 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.221 Classification...

  19. 5 CFR 9701.601 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Adverse Actions General § 9701.601 Purpose. This subpart contains regulations prescribing...

  20. 5 CFR 9701.401 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... adequate resources are allocated for the design, implementation, and administration of the performance...

  1. 5 CFR 9701.301 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... resources are allocated for the design, implementation, and administration of the performance management...

  2. 5 CFR 9701.211 - Occupational clusters.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9701.211 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Structure § 9701.211 Occupational clusters. For...

  3. Integrated Evaluation of Coupling Coordination for Land Use Change and Ecological Security: A Case Study in Wuhan City of Hubei Province, China

    PubMed Central

    Wang, Zhanqi; Zhang, Hongwei

    2017-01-01

    As land resources and ecosystems provide necessary materials and conditions for human development, land use change and ecological security play increasingly important roles in sustainable development. This study aims to reveal the mutual-influence and interaction between land use change and ecological security in Wuhan, based on the coupling coordination degree model. As such, it provides strategies for the achievement of the synchronous and coordinated development of urbanization and ecological security. The results showed that, during the period from 2006 to 2012, the size of built-up area in Wuhan increased to 26.16%, and that all the other types of land use reduced due to the urbanization process, which appeared to be the main driving force of land use change. The ecological security in Wuhan has been improving as a whole although it was somewhat held back from 2006 to 2008 due to the rapid growth of built-up area. The coupling coordination analysis revealed that the relationship between built-up area and ecological security was more coordinated after 2008. The results can provide feasible recommendations for land use management and environmental protection from the viewpoint of coordinated development. To achieve sustainable development from economic and ecological perspective, policy makers should control the rate of urban expansion and exert more effort on intensive land use, clean energy development and emission reduction. PMID:29165365

  4. Integrated Evaluation of Coupling Coordination for Land Use Change and Ecological Security: A Case Study in Wuhan City of Hubei Province, China.

    PubMed

    Chai, Ji; Wang, Zhanqi; Zhang, Hongwei

    2017-11-22

    As land resources and ecosystems provide necessary materials and conditions for human development, land use change and ecological security play increasingly important roles in sustainable development. This study aims to reveal the mutual-influence and interaction between land use change and ecological security in Wuhan, based on the coupling coordination degree model. As such, it provides strategies for the achievement of the synchronous and coordinated development of urbanization and ecological security. The results showed that, during the period from 2006 to 2012, the size of built-up area in Wuhan increased to 26.16%, and that all the other types of land use reduced due to the urbanization process, which appeared to be the main driving force of land use change. The ecological security in Wuhan has been improving as a whole although it was somewhat held back from 2006 to 2008 due to the rapid growth of built-up area. The coupling coordination analysis revealed that the relationship between built-up area and ecological security was more coordinated after 2008. The results can provide feasible recommendations for land use management and environmental protection from the viewpoint of coordinated development. To achieve sustainable development from economic and ecological perspective, policy makers should control the rate of urban expansion and exert more effort on intensive land use, clean energy development and emission reduction.

  5. Man and polar bear in Svalbard: a solvable ecological conflict?

    PubMed

    Risholt, T; Persen, E; Solem, O I

    1998-01-01

    The objective of this study is twofold. First, it is to assess the nature and magnitude of the polar bear-human conflict with respect to injuries to man and bear. Second, a major concern has been to minimize injurious interactions in order to safeguard the people who live and work in the Arctic, and, at the same time, secure the future of the polar bear in one of the last relatively unspoiled habitats on earth for big carnivores. From 1971 to 1995, approximately 80 bears were involved in serious bear-human interactions. Of these, 77 bears were killed and 3 escaped after having injured people. During the same period, 10 people were injured, 4 of them fatally, in 7 separate interactions, each involving a single bear. None of the victims carried an appropriate firearm. The circumstances leading up to the confrontations give strong reasons for supposing that the majority of the attacks were predatory in nature. Seven of the injured, including the four who were killed, sustained bites to the head and neck. Correct use of firearms could probably have prevented all the fatalities. However, the keeping and use of firearms caused two accidental deaths in the same period. We conclude that alertness, the absence of attractants (food, garbage), and appropriate bear repellents to secure field camps are important items in preventing conflicts and should always be available. However, as a last but indispensable resort, a firearm (rifle or shotgun) carried by an experienced user is the only safe precaution for avoiding injuries in polar bear country. Killing a bear on the rare occasions when humans are in danger presents no threat to the bear population. With regard to physical injury to people, the problem is a minor one. Bears have a dual impact on everyday life in the Svalbard settlements. While there is some anxiety related to the presence of bears, the polar bear is a source of breathtaking adventure highly valued by both residents and visitors.

  6. Issues of Human Security and Educational Development in the Niger Delta Region of Nigeria

    ERIC Educational Resources Information Center

    Ololube, Nwachukwu Prince; Kpolovie, Peter James; Amaele, Samuel

    2013-01-01

    Drawing from documents, observation, interview and questionnaire, we highlighted the role of issues of human security and its impact on the educational development of the Niger Delta region as well as means of enhancing human security in Nigeria. This article is a conceptual and methodological breakthrough in Nigeria's academic landscape where…

  7. Measuring infant attachment security in rhesus macaques (Macaca mulatta): adaptation of the attachment Q-set.

    PubMed

    Warfield, James J; Kondo-Ikemura, Kiyomi; Waters, Everett

    2011-02-01

    John Bowlby defined offspring-parent attachment as a relationship in which an infant or child uses one or a few preferred adults as a secure base from which to explore and as a haven of safety. He defined attachment security in terms of confidence in the adult's availability and responsiveness and the smooth organization of exploration and proximity seeking. Developmental psychologists have found this perspective productive in both observational and laboratory research. At the same time, they emphasize that such a construct cannot be operationalized in terms of one or a few behaviors. Instead, naturalistic observations of human infant attachment typically employ the Q-sort method to develop the Attachment q-set (AQS), 90 behaviorally descriptive items sorted in terms of how characteristic each item is of the infant's typical behavior. Meta-analyses of research using the AQS attest to its reliability and validity. This article reports an adaptation of the AQS to the task of assessing infant attachment security in nonhuman primates and illustrates its use. The availability of comparable measures of attachment security will contribute to an expanded understanding of patterns of attachment behavior in nonhuman primate societies and will facilitate interaction between comparative and developmental psychologists. © 2010 Wiley-Liss, Inc.

  8. 5 CFR 9701.527 - Savings provision.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ....527 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.527 Savings provision. This subpart does not...

  9. 5 CFR 9701.105 - Continuing collaboration.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Section 9701.105 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.105 Continuing collaboration. (a) In...

  10. 5 CFR 9701.105 - Continuing collaboration.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Section 9701.105 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.105 Continuing collaboration. (a) In...

  11. 5 CFR 9701.516 - Allotments to representatives.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Section 9701.516 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.516 Allotments to representatives...

  12. 5 CFR 9701.516 - Allotments to representatives.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Section 9701.516 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.516 Allotments to representatives...

  13. 5 CFR 9701.516 - Allotments to representatives.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Section 9701.516 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.516 Allotments to representatives...

  14. 5 CFR 9701.516 - Allotments to representatives.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Section 9701.516 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.516 Allotments to representatives...

  15. 5 CFR 9701.609 - Proposal notice.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....609 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Adverse Actions Requirements for Furlough of 30 Days Or Less, Suspension...

  16. 5 CFR 9701.612 - Departmental record.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9701.612 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Adverse Actions Requirements for Furlough of 30 Days Or Less, Suspension...

  17. 5 CFR 9701.523 - Official time.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.523 Official time. (a) Any employee representing an...

  18. 5 CFR 9701.527 - Savings provision.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....527 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.527 Savings provision. This subpart does not...

  19. 5 CFR 9701.301 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration General § 9701.301 Purpose. (a) This subpart contains...

  20. 5 CFR 9701.401 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Performance Management § 9701.401 Purpose. (a) This subpart provides for the establishment...

  1. 5 CFR 9701.603 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Adverse Actions General § 9701.603 Definitions. In this subpart: Adverse action means a...

  2. 5 CFR 9701.604 - Coverage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Adverse Actions General § 9701.604 Coverage. (a) Actions covered. This subpart covers...

  3. 5 CFR 9701.107 - Program evaluation.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....107 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.107 Program evaluation. (a) DHS will establish...

  4. 5 CFR 9701.410 - DHS responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9701.410 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Performance Management § 9701.410 DHS responsibilities. In carrying out its...

  5. 5 CFR 9701.507 - Employee rights.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....507 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.507 Employee rights. Each employee has the...

  6. 5 CFR 9701.501 - Purpose.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... Department's mission foremost in mind. The regulations also recognize the rights of DHS employees to organize...

  7. A study of IEEE 802.15.4 security framework for wireless body area networks.

    PubMed

    Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup

    2011-01-01

    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.

  8. A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks

    PubMed Central

    Saleem, Shahnaz; Ullah, Sana; Kwak, Kyung Sup

    2011-01-01

    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN. PMID:22319358

  9. 5 CFR 9701.204 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification General § 9701.204 Definitions. In this subpart: Band means a work level or...

  10. 5 CFR 9701.204 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification General § 9701.204 Definitions. In this subpart: Band means a work level or...

  11. 5 CFR 9701.345 - Developmental pay adjustments.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Section 9701.345 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Performance-Based Pay § 9701.345...

  12. 5 CFR 9701.204 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification General § 9701.204 Definitions. In this subpart: Band means a work level or...

  13. 5 CFR 9701.345 - Developmental pay adjustments.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... Section 9701.345 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Performance-Based Pay § 9701.345...

  14. 5 CFR 9701.204 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification General § 9701.204 Definitions. In this subpart: Band means a work level or...

  15. 5 CFR 9701.345 - Developmental pay adjustments.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Section 9701.345 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Performance-Based Pay § 9701.345...

  16. 5 CFR 9701.345 - Developmental pay adjustments.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Section 9701.345 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Performance-Based Pay § 9701.345...

  17. 5 CFR 9701.511 - Management rights.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 5 Administrative Personnel 3 2012-01-01 2012-01-01 false Management rights. 9701.511 Section 9701.511 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN...

  18. 5 CFR 9701.511 - Management rights.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Management rights. 9701.511 Section 9701.511 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN...

  19. 5 CFR 9701.511 - Management rights.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 5 Administrative Personnel 3 2014-01-01 2014-01-01 false Management rights. 9701.511 Section 9701.511 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN...

  20. 5 CFR 9701.511 - Management rights.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Management rights. 9701.511 Section 9701.511 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN...

  1. 5 CFR 9701.102 - Eligibility and coverage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Section 9701.102 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.102 Eligibility and coverage. (a) All...

  2. 5 CFR 9701.511 - Management rights.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Management rights. 9701.511 Section 9701.511 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN...

  3. 5 CFR 9701.522 - Exceptions to arbitration awards.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....522 Section 9701.522 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.522 Exceptions to arbitration...

  4. 5 CFR 9701.610 - Opportunity to reply.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9701.610 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Adverse Actions Requirements for Furlough of 30 Days Or Less, Suspension...

  5. 5 CFR 9701.504 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Definitions. 9701.504 Section 9701.504 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  6. 5 CFR 9701.325 - Treatment of employees whose rate of basic pay falls below the minimum rate of their band.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay...

  7. 5 CFR 9701.371 - General.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false General. 9701.371 Section 9701.371 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  8. 5 CFR 9701.505 - Coverage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Coverage. 9701.505 Section 9701.505 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  9. 5 CFR 9701.503 - Waivers.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Waivers. 9701.503 Section 9701.503 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  10. 5 CFR 9701.502 - Rule of construction.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9701.502 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.502 Rule of construction. In interpreting this...

  11. 5 CFR 9701.104 - Scope of authority.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....104 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.104 Scope of authority. Subject to the requirements...

  12. 5 CFR 9701.201 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Purpose. 9701.201 Section 9701.201 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  13. 5 CFR 9701.403 - Waivers.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Waivers. 9701.403 Section 9701.403 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  14. 5 CFR 9701.404 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Definitions. 9701.404 Section 9701.404 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  15. 5 CFR 9701.314 - DHS responsibilities.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9701.314 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.314 DHS...

  16. 5 CFR 9701.304 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Definitions. 9701.304 Section 9701.304 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  17. 5 CFR 9701.405 - Performance management system requirements.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... requirements. 9701.405 Section 9701.405 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Performance Management § 9701.405 Performance...

  18. 5 CFR 9701.501 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Purpose. 9701.501 Section 9701.501 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  19. 5 CFR 9701.336 - Treatment of employees whose pay does not fall below the minimum adjusted rate of their band.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay...

  20. 5 CFR 9701.517 - Unfair labor practices.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9701.517 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.517 Unfair labor practices. (a) For the...

  1. 5 CFR 9701.303 - Waivers.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Waivers. 9701.303 Section 9701.303 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  2. 5 CFR 9701.407 - Monitoring performance and providing feedback.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... feedback. 9701.407 Section 9701.407 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Performance Management § 9701.407 Monitoring...

  3. 5 CFR 9701.222 - Reconsideration of classification decisions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... decisions. 9701.222 Section 9701.222 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.222...

  4. 5 CFR 9701.361 - Special skills payments.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9701.361 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Special Payments § 9701.361 Special skills payments...

  5. 5 CFR 9701.204 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Definitions. 9701.204 Section 9701.204 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  6. 5 CFR 9701.203 - Waivers.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Waivers. 9701.203 Section 9701.203 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  7. 5 CFR 9701.212 - Bands.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Bands. 9701.212 Section 9701.212 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  8. 5 CFR 9701.331 - General.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false General. 9701.331 Section 9701.331 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  9. 5 CFR 9701.343 - Within-band reductions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 9701.343 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Performance-Based Pay § 9701.343 Within-band...

  10. 5 CFR 9701.341 - General.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false General. 9701.341 Section 9701.341 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  11. 5 CFR 9701.321 - Structure of bands.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ....321 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Setting and Adjusting Rate Ranges § 9701.321...

  12. 5 CFR 9701.357 - Miscellaneous.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Miscellaneous. 9701.357 Section 9701.357 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  13. 5 CFR 9701.202 - Coverage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Coverage. 9701.202 Section 9701.202 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  14. 5 CFR 9701.337 - Treatment of employees whose rate of pay falls below the minimum adjusted rate of their band.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay...

  15. 5 CFR 9701.402 - Coverage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Coverage. 9701.402 Section 9701.402 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  16. 5 CFR 9701.302 - Coverage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Coverage. 9701.302 Section 9701.302 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  17. Modeling Sustainable Food Systems.

    PubMed

    Allen, Thomas; Prosperi, Paolo

    2016-05-01

    The processes underlying environmental, economic, and social unsustainability derive in part from the food system. Building sustainable food systems has become a predominating endeavor aiming to redirect our food systems and policies towards better-adjusted goals and improved societal welfare. Food systems are complex social-ecological systems involving multiple interactions between human and natural components. Policy needs to encourage public perception of humanity and nature as interdependent and interacting. The systemic nature of these interdependencies and interactions calls for systems approaches and integrated assessment tools. Identifying and modeling the intrinsic properties of the food system that will ensure its essential outcomes are maintained or enhanced over time and across generations, will help organizations and governmental institutions to track progress towards sustainability, and set policies that encourage positive transformations. This paper proposes a conceptual model that articulates crucial vulnerability and resilience factors to global environmental and socio-economic changes, postulating specific food and nutrition security issues as priority outcomes of food systems. By acknowledging the systemic nature of sustainability, this approach allows consideration of causal factor dynamics. In a stepwise approach, a logical application is schematized for three Mediterranean countries, namely Spain, France, and Italy.

  18. Modeling Sustainable Food Systems

    NASA Astrophysics Data System (ADS)

    Allen, Thomas; Prosperi, Paolo

    2016-05-01

    The processes underlying environmental, economic, and social unsustainability derive in part from the food system. Building sustainable food systems has become a predominating endeavor aiming to redirect our food systems and policies towards better-adjusted goals and improved societal welfare. Food systems are complex social-ecological systems involving multiple interactions between human and natural components. Policy needs to encourage public perception of humanity and nature as interdependent and interacting. The systemic nature of these interdependencies and interactions calls for systems approaches and integrated assessment tools. Identifying and modeling the intrinsic properties of the food system that will ensure its essential outcomes are maintained or enhanced over time and across generations, will help organizations and governmental institutions to track progress towards sustainability, and set policies that encourage positive transformations. This paper proposes a conceptual model that articulates crucial vulnerability and resilience factors to global environmental and socio-economic changes, postulating specific food and nutrition security issues as priority outcomes of food systems. By acknowledging the systemic nature of sustainability, this approach allows consideration of causal factor dynamics. In a stepwise approach, a logical application is schematized for three Mediterranean countries, namely Spain, France, and Italy.

  19. Gross anatomy of network security

    NASA Technical Reports Server (NTRS)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  20. Semantically Enriched Data Access Policies in eHealth.

    PubMed

    Drozdowicz, Michał; Ganzha, Maria; Paprzycki, Marcin

    2016-11-01

    Internet of Things (IoT) requires novel solutions to facilitate autonomous, though controlled, resource access. Access policies have to facilitate interactions between heterogeneous entities (devices and humans). Here, we focus our attention on access control in eHealth. We propose an approach based on enriching policies, based on well-known and widely-used eXtensible Access Control Markup Language, with semantics. In the paper we describe an implementation of a Policy Information Point integrated with the HL7 Security and Privacy Ontology.

  1. 75 FR 65232 - Security Zones; Sabine Bank Channel, Sabine Pass Channel and Sabine-Neches Waterway, TX

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-22

    ... security zones would be part of a comprehensive port security regime designed to safeguard human life... do not individually or cumulatively have a significant effect on the human environment. This rule is...

  2. 5 CFR 9701.525 - Regulations of the HSLRB.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Section 9701.525 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.525 Regulations of the HSLRB. The...

  3. 5 CFR 9701.356 - Pay retention.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Pay retention. 9701.356 Section 9701.356 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  4. 5 CFR 9701.406 - Setting and communicating performance expectations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... expectations. 9701.406 Section 9701.406 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Performance Management § 9701.406 Setting and...

  5. 5 CFR 9701.513 - Exclusive recognition of labor organizations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... organizations. 9701.513 Section 9701.513 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.513 Exclusive...

  6. 5 CFR 9701.312 - Maximum rates.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Maximum rates. 9701.312 Section 9701.312 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  7. 5 CFR 9701.324 - Treatment of employees whose rate of basic pay does not fall below the minimum rate of their band.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and...

  8. 5 CFR 9701.311 - Major features.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Major features. 9701.311 Section 9701.311 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES...

  9. New Brunswick Laboratory. Progress report, October 1995--September 1996

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    Fiscal year (FY) 1996 was a very good year for New Brunswick Laboratory (NBL), whose major sponsor is the Office of Safeguards and Security (NN-51) in the US Department of Energy (DOE), Office of Nonproliferation and National Security, Office of Security Affairs. Several projects pertinent to the NBL mission were completed, and NBL`s interactions with partners and customers were encouraging. Among the partners with which NBL interacted in this report period were the International Atomic Energy Agency (IAEA), NN-51. Environmental Program Group of the DOE Chicago Operations Office, International Safeguards Project Office, Waste Isolation Pilot Plant (WIPP), Ukraine Working Group,more » Fissile Materials Assurance Working Group, National Institute of Standards and Technology (NIST), Nuclear Regulatory Commission (NRC), Institute for Reference Materials and Measurements (IRMM) in Belgium, Brazilian/Argentine Agency for Accounting and Control of Nuclear Materials (ABACC), Lockheed Idaho Technologies Company, and other DOE facilities and laboratories. NBL staff publications, participation in safeguards assistance and other nuclear programs, development of new reference materials, involvement in the updating and refinement of DOE documents, service in enhancing the science education of others, and other related activities enhanced NBL`s status among DOE laboratories and facilities. Noteworthy are the facts that NBL`s small inventory of nuclear materials is accurately accounted for, and, as in past years, its materials and human resources were used in peaceful nuclear activities worldwide.« less

  10. Even good bots fight: The case of Wikipedia

    PubMed Central

    Tsvetkova, Milena; García-Gavilanes, Ruth; Floridi, Luciano; Yasseri, Taha

    2017-01-01

    In recent years, there has been a huge increase in the number of bots online, varying from Web crawlers for search engines, to chatbots for online customer service, spambots on social media, and content-editing bots in online collaboration communities. The online world has turned into an ecosystem of bots. However, our knowledge of how these automated agents are interacting with each other is rather poor. Bots are predictable automatons that do not have the capacity for emotions, meaning-making, creativity, and sociality and it is hence natural to expect interactions between bots to be relatively predictable and uneventful. In this article, we analyze the interactions between bots that edit articles on Wikipedia. We track the extent to which bots undid each other’s edits over the period 2001–2010, model how pairs of bots interact over time, and identify different types of interaction trajectories. We find that, although Wikipedia bots are intended to support the encyclopedia, they often undo each other’s edits and these sterile “fights” may sometimes continue for years. Unlike humans on Wikipedia, bots’ interactions tend to occur over longer periods of time and to be more reciprocated. Yet, just like humans, bots in different cultural environments may behave differently. Our research suggests that even relatively “dumb” bots may give rise to complex interactions, and this carries important implications for Artificial Intelligence research. Understanding what affects bot-bot interactions is crucial for managing social media well, providing adequate cyber-security, and designing well functioning autonomous vehicles. PMID:28231323

  11. Even good bots fight: The case of Wikipedia.

    PubMed

    Tsvetkova, Milena; García-Gavilanes, Ruth; Floridi, Luciano; Yasseri, Taha

    2017-01-01

    In recent years, there has been a huge increase in the number of bots online, varying from Web crawlers for search engines, to chatbots for online customer service, spambots on social media, and content-editing bots in online collaboration communities. The online world has turned into an ecosystem of bots. However, our knowledge of how these automated agents are interacting with each other is rather poor. Bots are predictable automatons that do not have the capacity for emotions, meaning-making, creativity, and sociality and it is hence natural to expect interactions between bots to be relatively predictable and uneventful. In this article, we analyze the interactions between bots that edit articles on Wikipedia. We track the extent to which bots undid each other's edits over the period 2001-2010, model how pairs of bots interact over time, and identify different types of interaction trajectories. We find that, although Wikipedia bots are intended to support the encyclopedia, they often undo each other's edits and these sterile "fights" may sometimes continue for years. Unlike humans on Wikipedia, bots' interactions tend to occur over longer periods of time and to be more reciprocated. Yet, just like humans, bots in different cultural environments may behave differently. Our research suggests that even relatively "dumb" bots may give rise to complex interactions, and this carries important implications for Artificial Intelligence research. Understanding what affects bot-bot interactions is crucial for managing social media well, providing adequate cyber-security, and designing well functioning autonomous vehicles.

  12. 5 CFR 9701.520 - Standards of conduct for labor organizations.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... organizations. 9701.520 Section 9701.520 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.520 Standards of...

  13. 5 CFR 9701.232 - Special transition rules for Federal Air Marshal Service.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Marshal Service. 9701.232 Section 9701.232 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Transitional Provisions § 9701.232...

  14. 5 CFR 9701.373 - Conversion of employees to the DHS pay system.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... system. 9701.373 Section 9701.373 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Transitional Provisions...

  15. 5 CFR 9701.374 - Special transition rules for Federal Air Marshal Service.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Marshal Service. 9701.374 Section 9701.374 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Transitional Provisions...

  16. Maternal secure-base scripts and children's attachment security in an adopted sample.

    PubMed

    Veríssimo, Manuela; Salvaterra, Fernanda

    2006-09-01

    Studies of families with adopted children are of special interest to attachment theorists because they afford opportunities to probe assumptions of attachment theory with regard to the developmental timing of interactions necessary to form primary attachments and also with regard to effects of shared genes on child attachment quality. In Bowlby's model, attachment-relevant behaviors and interactions are observable from the moment of birth, but for adoptive families, these interactions cannot begin until the child enters the family, sometimes several months or even years post-partum. Furthermore, because adoptive parents and adopted children do not usually share genes by common descent, any correspondence between attachment representations of the parent and secure base behavior of the child must arise as a consequence of dyadic interaction histories. The objectives of this study were to evaluate whether the child's age at the time of adoption or at the time of attachment assessment predicted child attachment security in adoptive families and also whether the adoptive mother's internal attachment representation predicted the child's attachment security. The participants were 106 mother - child dyads selected from the 406 adoptions carried out through the Lisbon Department of Adoption Services over a period of 3 years. The Attachment Behavior Q-Set (AQS; Waters, 1995) was used to assess secure base behavior and an attachment script representation task was used to assess the maternal attachment representations. Neither child's age at the time of adoption, nor age of the child at assessment significantly predicted the AQS security score; however, scores reflecting the presence and quality of maternal secure base scripts did predict AQS security. These findings support the notion that the transmission of attachment security across generations involves mutual exchanges and learning by the child and that the exchanges leading to secure attachment need not begin at birth. These results complement the findings and conceptual arguments offered by Bowlby and Ainsworth concerning the critical influence of maternal representations of attachment to the quality of attachment security in children.

  17. Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory

    NASA Astrophysics Data System (ADS)

    Cranor, Lorrie Faith

    How can we make security and privacy software more usable? The first step is to study our users. Ideally, we would watch them interacting with security or privacy software in situations where they face actual risk. But everyday computer users don't sit around fiddling with security software, and subjecting users to actual security attacks raises ethical and legal concerns. Thus, it can be difficult to observe users interacting with security and privacy software in their natural habitat. At the CyLab Usable Privacy and Security Laboratory, we've conducted a wide variety of studies aimed at understanding how users think about security and privacy and how they interact with security and privacy software. In this talk I'll give a behind the scenes tour of some of the techniques we've used to study users both in the laboratory and in the wild. I'll discuss the trials and tribulations of designing and carrying out security and privacy user studies, and highlight some of our surprising observations. Find out what privacy-sensitive items you can actually get study participants to purchase, how you can observe users' responses to a man-in-the-middle attack without actually conducting such an attack, why it's hard to get people to use high tech cell phones even when you give them away, and what's actually in that box behind the couch in my office.

  18. How much land-based greenhouse gas mitigation can be achieved without compromising food security and environmental goals?

    PubMed

    Smith, Pete; Haberl, Helmut; Popp, Alexander; Erb, Karl-Heinz; Lauk, Christian; Harper, Richard; Tubiello, Francesco N; de Siqueira Pinto, Alexandre; Jafari, Mostafa; Sohi, Saran; Masera, Omar; Böttcher, Hannes; Berndes, Göran; Bustamante, Mercedes; Ahammad, Helal; Clark, Harry; Dong, Hongmin; Elsiddig, Elnour A; Mbow, Cheikh; Ravindranath, Nijavalli H; Rice, Charles W; Robledo Abad, Carmenza; Romanovskaya, Anna; Sperling, Frank; Herrero, Mario; House, Joanna I; Rose, Steven

    2013-08-01

    Feeding 9-10 billion people by 2050 and preventing dangerous climate change are two of the greatest challenges facing humanity. Both challenges must be met while reducing the impact of land management on ecosystem services that deliver vital goods and services, and support human health and well-being. Few studies to date have considered the interactions between these challenges. In this study we briefly outline the challenges, review the supply- and demand-side climate mitigation potential available in the Agriculture, Forestry and Other Land Use AFOLU sector and options for delivering food security. We briefly outline some of the synergies and trade-offs afforded by mitigation practices, before presenting an assessment of the mitigation potential possible in the AFOLU sector under possible future scenarios in which demand-side measures codeliver to aid food security. We conclude that while supply-side mitigation measures, such as changes in land management, might either enhance or negatively impact food security, demand-side mitigation measures, such as reduced waste or demand for livestock products, should benefit both food security and greenhouse gas (GHG) mitigation. Demand-side measures offer a greater potential (1.5-15.6 Gt CO2 -eq. yr(-1) ) in meeting both challenges than do supply-side measures (1.5-4.3 Gt CO2 -eq. yr(-1) at carbon prices between 20 and 100 US$ tCO2 -eq. yr(-1) ), but given the enormity of challenges, all options need to be considered. Supply-side measures should be implemented immediately, focussing on those that allow the production of more agricultural product per unit of input. For demand-side measures, given the difficulties in their implementation and lag in their effectiveness, policy should be introduced quickly, and should aim to codeliver to other policy agenda, such as improving environmental quality or improving dietary health. These problems facing humanity in the 21st Century are extremely challenging, and policy that addresses multiple objectives is required now more than ever. © 2013 John Wiley & Sons Ltd.

  19. The securitization of health in the context of the war on terror. National security and global health: the conflict of imperatives.

    PubMed

    Chung, Ryoa

    2017-03-01

    In this article, I want to show that the securitization of health issues in the name of national interests led to the militarization of health care in the context of the war against terrorism. However, the connection between health and security also gave way to the emergence of the notion of human security, thus, converging with the human right to health approach and the cosmopolitan discourse on global health. These two perspectives on the relation between health and security lead to conflicting imperatives in the current state of counter-terrorism operations. I argue that when the securitization of health concerns in the name of national security conflicts with the provision of health care in the name of universal human rights, the higher moral end must trump the prudential one. Moreover, it is a duty to promote the human right to health when liberal democracies in foreign policies directly violate this moral ideal in the name of national security.

  20. Marital conflict and the quality of young children's peer play behavior: the mediating and moderating role of parent-child emotional reciprocity and attachment security.

    PubMed

    Lindsey, Eric W; Caldera, Yvonne M; Tankersley, Laura

    2009-04-01

    Parent-child attachment security and dyadic measures of parent-child positive and negative emotional reciprocity were examined as possible mediators and moderators of the connection between marital conflict and children's peer play behavior. Eighty parents were observed in a laboratory play session with their 15- to 18-month-old child. Subsequently, at 36 months children were observed interacting with peers at their child care setting. Connections between marital conflict and children's positive peer interaction were mediated by mother-child attachment security, mother-child positive emotional reciprocity, and father-child negative emotional reciprocity. Connections between marital conflict and children's negative peer interaction were mediated by mother-child positive emotional reciprocity and father-child attachment security. Parent-child attachment security and negative emotional reciprocity emerged as important moderators of the connection between marital conflict and children's peer play behavior.

  1. 10 CFR 712.16 - DOE security review.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false DOE security review. 712.16 Section 712.16 Energy DEPARTMENT OF ENERGY HUMAN RELIABILITY PROGRAM Establishment of and Procedures for the Human Reliability... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...

  2. 5 CFR 9701.355 - Setting pay upon movement to a different occupational cluster.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... occupational cluster. 9701.355 Section 9701.355 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Pay Administration § 9701...

  3. Leap Frog Digital Sensors and Definition, Integration & Testing FY 2003 Annual Report

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Meitzler, Wayne D.; Ouderkirk, Steven J.; Shoemaker, Steven V.

    2003-12-31

    The objective of Leap Frog is to develop a comprehensive security tool that is transparent to the user community and more effective than current methods for preventing and detecting security compromises of critical physical and digital assets. Current security tools intrude on the people that interact with these critical assets by requiring them to perform additional functions or having additional visible sensors. Leap Frog takes security to the next level by being more effective and reducing the adverse impact on the people interacting with protected assets.

  4. Agricultural biodiversity, social-ecological systems and sustainable diets.

    PubMed

    Allen, Thomas; Prosperi, Paolo; Cogill, Bruce; Flichman, Guillermo

    2014-11-01

    The stark observation of the co-existence of undernourishment, nutrient deficiencies and overweight and obesity, the triple burden of malnutrition, is inviting us to reconsider health and nutrition as the primary goal and final endpoint of food systems. Agriculture and the food industry have made remarkable advances in the past decades. However, their development has not entirely fulfilled health and nutritional needs, and moreover, they have generated substantial collateral losses in agricultural biodiversity. Simultaneously, several regions are experiencing unprecedented weather events caused by climate change and habitat depletion, in turn putting at risk global food and nutrition security. This coincidence of food crises with increasing environmental degradation suggests an urgent need for novel analyses and new paradigms. The sustainable diets concept proposes a research and policy agenda that strives towards a sustainable use of human and natural resources for food and nutrition security, highlighting the preeminent role of consumers in defining sustainable options and the importance of biodiversity in nutrition. Food systems act as complex social-ecological systems, involving multiple interactions between human and natural components. Nutritional patterns and environment structure are interconnected in a mutual dynamic of changes. The systemic nature of these interactions calls for multidimensional approaches and integrated assessment and simulation tools to guide change. This paper proposes a review and conceptual modelling framework that articulate the synergies and tradeoffs between dietary diversity, widely recognised as key for healthy diets, and agricultural biodiversity and associated ecosystem functions, crucial resilience factors to climate and global changes.

  5. Vipie: web pipeline for parallel characterization of viral populations from multiple NGS samples.

    PubMed

    Lin, Jake; Kramna, Lenka; Autio, Reija; Hyöty, Heikki; Nykter, Matti; Cinek, Ondrej

    2017-05-15

    Next generation sequencing (NGS) technology allows laboratories to investigate virome composition in clinical and environmental samples in a culture-independent way. There is a need for bioinformatic tools capable of parallel processing of virome sequencing data by exactly identical methods: this is especially important in studies of multifactorial diseases, or in parallel comparison of laboratory protocols. We have developed a web-based application allowing direct upload of sequences from multiple virome samples using custom parameters. The samples are then processed in parallel using an identical protocol, and can be easily reanalyzed. The pipeline performs de-novo assembly, taxonomic classification of viruses as well as sample analyses based on user-defined grouping categories. Tables of virus abundance are produced from cross-validation by remapping the sequencing reads to a union of all observed reference viruses. In addition, read sets and reports are created after processing unmapped reads against known human and bacterial ribosome references. Secured interactive results are dynamically plotted with population and diversity charts, clustered heatmaps and a sortable and searchable abundance table. The Vipie web application is a unique tool for multi-sample metagenomic analysis of viral data, producing searchable hits tables, interactive population maps, alpha diversity measures and clustered heatmaps that are grouped in applicable custom sample categories. Known references such as human genome and bacterial ribosomal genes are optionally removed from unmapped ('dark matter') reads. Secured results are accessible and shareable on modern browsers. Vipie is a freely available web-based tool whose code is open source.

  6. Climate change and human health: a One Health approach.

    PubMed

    Patz, Jonathan A; Hahn, Micah B

    2013-01-01

    Climate change adds complexity and uncertainty to human health issues such as emerging infectious diseases, food security, and national sustainability planning that intensify the importance of interdisciplinary and collaborative research. Collaboration between veterinary, medical, and public health professionals to understand the ecological interactions and reactions to flux in a system can facilitate clearer understanding of climate change impacts on environmental, animal, and human health. Here we present a brief introduction to climate science and projections for the next century and a review of current knowledge on the impacts of climate-driven environmental change on human health. We then turn to the links between ecological and evolutionary responses to climate change and health. The literature on climate impacts on biological systems is rich in both content and historical data, but the connections between these changes and human health is less understood. We discuss five mechanisms by which climate changes impacts on biological systems will be felt by the human population: Modifications in Vector, Reservoir, and Pathogen Lifecycles; Diseases of Domestic and Wild Animals and Plants; Disruption of Synchrony Between Interacting Species; Trophic Cascades; and Alteration or Destruction of Habitat. Each species responds to environmental changes differently, and in order to predict the movement of disease through ecosystems, we have to rely on expertise from the fields of veterinary, medical, and public health, and these health professionals must take into account the dynamic nature of ecosystems in a changing climate.

  7. Visualizing Alternative Phosphorus Scenarios for Future Food Security

    PubMed Central

    Neset, Tina-Simone; Cordell, Dana; Mohr, Steve; VanRiper, Froggi; White, Stuart

    2016-01-01

    The impact of global phosphorus scarcity on food security has increasingly been the focus of scientific studies over the past decade. However, systematic analyses of alternative futures for phosphorus supply and demand throughout the food system are still rare and provide limited inclusion of key stakeholders. Addressing global phosphorus scarcity requires an integrated approach exploring potential demand reduction as well as recycling opportunities. This implies recovering phosphorus from multiple sources, such as food waste, manure, and excreta, as well as exploring novel opportunities to reduce the long-term demand for phosphorus in food production such as changing diets. Presently, there is a lack of stakeholder and scientific consensus around priority measures. To therefore enable exploration of multiple pathways and facilitate a stakeholder dialog on the technical, behavioral, and institutional changes required to meet long-term future phosphorus demand, this paper introduces an interactive web-based tool, designed for visualizing global phosphorus scenarios in real time. The interactive global phosphorus scenario tool builds on several demand and supply side measures that can be selected and manipulated interactively by the user. It provides a platform to facilitate stakeholder dialog to plan for a soft landing and identify a suite of concrete priority options, such as investing in agricultural phosphorus use efficiency, or renewable fertilizers derived from phosphorus recovered from wastewater and food waste, to determine how phosphorus demand to meet future food security could be attained on a global scale in 2040 and 2070. This paper presents four example scenarios, including (1) the potential of full recovery of human excreta, (2) the challenge of a potential increase in non-food phosphorus demand, (3) the potential of decreased animal product consumption, and (4) the potential decrease in phosphorus demand from increased efficiency and yield gains in crop and livestock systems. PMID:27840814

  8. Visualizing Alternative Phosphorus Scenarios for Future Food Security.

    PubMed

    Neset, Tina-Simone; Cordell, Dana; Mohr, Steve; VanRiper, Froggi; White, Stuart

    2016-01-01

    The impact of global phosphorus scarcity on food security has increasingly been the focus of scientific studies over the past decade. However, systematic analyses of alternative futures for phosphorus supply and demand throughout the food system are still rare and provide limited inclusion of key stakeholders. Addressing global phosphorus scarcity requires an integrated approach exploring potential demand reduction as well as recycling opportunities. This implies recovering phosphorus from multiple sources, such as food waste, manure, and excreta, as well as exploring novel opportunities to reduce the long-term demand for phosphorus in food production such as changing diets. Presently, there is a lack of stakeholder and scientific consensus around priority measures. To therefore enable exploration of multiple pathways and facilitate a stakeholder dialog on the technical, behavioral, and institutional changes required to meet long-term future phosphorus demand, this paper introduces an interactive web-based tool, designed for visualizing global phosphorus scenarios in real time. The interactive global phosphorus scenario tool builds on several demand and supply side measures that can be selected and manipulated interactively by the user. It provides a platform to facilitate stakeholder dialog to plan for a soft landing and identify a suite of concrete priority options, such as investing in agricultural phosphorus use efficiency, or renewable fertilizers derived from phosphorus recovered from wastewater and food waste, to determine how phosphorus demand to meet future food security could be attained on a global scale in 2040 and 2070. This paper presents four example scenarios, including (1) the potential of full recovery of human excreta, (2) the challenge of a potential increase in non-food phosphorus demand, (3) the potential of decreased animal product consumption, and (4) the potential decrease in phosphorus demand from increased efficiency and yield gains in crop and livestock systems.

  9. Conversational sensing

    NASA Astrophysics Data System (ADS)

    Preece, Alun; Gwilliams, Chris; Parizas, Christos; Pizzocaro, Diego; Bakdash, Jonathan Z.; Braines, Dave

    2014-05-01

    Recent developments in sensing technologies, mobile devices and context-aware user interfaces have made it pos- sible to represent information fusion and situational awareness for Intelligence, Surveillance and Reconnaissance (ISR) activities as a conversational process among actors at or near the tactical edges of a network. Motivated by use cases in the domain of Company Intelligence Support Team (CoIST) tasks, this paper presents an approach to information collection, fusion and sense-making based on the use of natural language (NL) and controlled nat- ural language (CNL) to support richer forms of human-machine interaction. The approach uses a conversational protocol to facilitate a ow of collaborative messages from NL to CNL and back again in support of interactions such as: turning eyewitness reports from human observers into actionable information (from both soldier and civilian sources); fusing information from humans and physical sensors (with associated quality metadata); and assisting human analysts to make the best use of available sensing assets in an area of interest (governed by man- agement and security policies). CNL is used as a common formal knowledge representation for both machine and human agents to support reasoning, semantic information fusion and generation of rationale for inferences, in ways that remain transparent to human users. Examples are provided of various alternative styles for user feedback, including NL, CNL and graphical feedback. A pilot experiment with human subjects shows that a prototype conversational agent is able to gather usable CNL information from untrained human subjects.

  10. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users.

    PubMed

    Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.

  11. 77 FR 64943 - Security Zone, Potomac and Anacostia Rivers; Washington, DC

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-24

    ... the ability to implement comprehensive port security regimes designed to safeguard human life, vessels... communities would have. The proposed security zone is necessary to safeguard life and property on the... cumulatively have a significant effect on the human environment. This proposed rule involves establishing a...

  12. 75 FR 43528 - Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-26

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of the Secretary Seeking Public Comment on Draft National Health Security Strategy Biennial Implementation Plan AGENCY: Department of Health and Human... Interim Implementation Guide for the National Health Security Strategy of the United States of America...

  13. Computer Security Systems Enable Access.

    ERIC Educational Resources Information Center

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  14. Collaborative real-time motion video analysis by human observer and image exploitation algorithms

    NASA Astrophysics Data System (ADS)

    Hild, Jutta; Krüger, Wolfgang; Brüstle, Stefan; Trantelle, Patrick; Unmüßig, Gabriel; Heinze, Norbert; Peinsipp-Byma, Elisabeth; Beyerer, Jürgen

    2015-05-01

    Motion video analysis is a challenging task, especially in real-time applications. In most safety and security critical applications, a human observer is an obligatory part of the overall analysis system. Over the last years, substantial progress has been made in the development of automated image exploitation algorithms. Hence, we investigate how the benefits of automated video analysis can be integrated suitably into the current video exploitation systems. In this paper, a system design is introduced which strives to combine both the qualities of the human observer's perception and the automated algorithms, thus aiming to improve the overall performance of a real-time video analysis system. The system design builds on prior work where we showed the benefits for the human observer by means of a user interface which utilizes the human visual focus of attention revealed by the eye gaze direction for interaction with the image exploitation system; eye tracker-based interaction allows much faster, more convenient, and equally precise moving target acquisition in video images than traditional computer mouse selection. The system design also builds on prior work we did on automated target detection, segmentation, and tracking algorithms. Beside the system design, a first pilot study is presented, where we investigated how the participants (all non-experts in video analysis) performed in initializing an object tracking subsystem by selecting a target for tracking. Preliminary results show that the gaze + key press technique is an effective, efficient, and easy to use interaction technique when performing selection operations on moving targets in videos in order to initialize an object tracking function.

  15. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rogers,E.; deBoer,G.; Crawford, C.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the riskmore » of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.« less

  16. Measuring Human Performance within Computer Security Incident Response Teams

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel

    Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. Thesemore » events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.« less

  17. Privacy preserving interactive record linkage (PPIRL).

    PubMed

    Kum, Hye-Chung; Krishnamurthy, Ashok; Machanavajjhala, Ashwin; Reiter, Michael K; Ahalt, Stanley

    2014-01-01

    Record linkage to integrate uncoordinated databases is critical in biomedical research using Big Data. Balancing privacy protection against the need for high quality record linkage requires a human-machine hybrid system to safely manage uncertainty in the ever changing streams of chaotic Big Data. In the computer science literature, private record linkage is the most published area. It investigates how to apply a known linkage function safely when linking two tables. However, in practice, the linkage function is rarely known. Thus, there are many data linkage centers whose main role is to be the trusted third party to determine the linkage function manually and link data for research via a master population list for a designated region. Recently, a more flexible computerized third-party linkage platform, Secure Decoupled Linkage (SDLink), has been proposed based on: (1) decoupling data via encryption, (2) obfuscation via chaffing (adding fake data) and universe manipulation; and (3) minimum information disclosure via recoding. We synthesize this literature to formalize a new framework for privacy preserving interactive record linkage (PPIRL) with tractable privacy and utility properties and then analyze the literature using this framework. Human-based third-party linkage centers for privacy preserving record linkage are the accepted norm internationally. We find that a computer-based third-party platform that can precisely control the information disclosed at the micro level and allow frequent human interaction during the linkage process, is an effective human-machine hybrid system that significantly improves on the linkage center model both in terms of privacy and utility.

  18. Secure telemonitoring system for delivering telerehabilitation therapy to enhance children's communication function to home.

    PubMed

    Parmanto, Bambang; Saptono, Andi; Murthi, Raymond; Safos, Charlotte; Lathan, Corinna E

    2008-11-01

    A secure telemonitoring system was developed to transform CosmoBot system, a stand-alone speech-language therapy software, into a telerehabilitation system. The CosmoBot system is a motivating, computer-based play character designed to enhance children's communication skills and stimulate verbal interaction during the remediation of speech and language disorders. The CosmoBot system consists of the Mission Control human interface device and Cosmo's Play and Learn software featuring a robot character named Cosmo that targets educational goals for children aged 3-5 years. The secure telemonitoring infrastructure links a distant speech-language therapist and child/parents at home or school settings. The result is a telerehabilitation system that allows a speech-language therapist to monitor children's activities at home while providing feedback and therapy materials remotely. We have developed the means for telerehabilitation of communication skills that can be implemented in children's home settings. The architecture allows the therapist to remotely monitor the children after completion of the therapy session and to provide feedback for the following session.

  19. A Human Endeavor: Lessons from Shakespeare and Beyond

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bishop, Matt; Frincke, Deb A.

    This article discusses human-oriented educational activities that support the study of computer security. It poses the point that technology is perhaps the least important aspect of security solutions, and that because of this, the fields of psychology, literature, business, and political science have significant value for any serious student of the science of security.

  20. Temporal and Spatial Distribution of Ecological Security in Arid Region Based on GIS: A Case Study in Xinjiang

    NASA Astrophysics Data System (ADS)

    Zhang, Q.; Song, W.; Yang, J.

    2017-12-01

    Ecological security is close related to the people's survival and development. In the context of the global warming, with the increasingly frequent human activities, ecological and environmental problems have become increasingly prominent. Ecological security has aroused widespread concern, especially in the arid region. It has an important role in national security as well as political security, military security, economic security, social security. Taken Xinjiang as the research area, which is a typical arid region in China, this study establishes an ecological safety assessment indicator system from perspective of the generic process and the formation mechanism of the ecosystem. The framework is based on natural resources dimensions, natural environment dimensions and human disturbance dimensions. Water is the restrictive factor for the development of arid region, so the water resources carrying capacity is the main natural resource of the study area. The natural environment includes SPI(standardized precipitation index), dryness index, landscape vulnerability, NDVI. Human disturbance includes urbanization rate, population density, afforestation area, per capita GDP, water-saving irrigation area, fertilizer and pesticide application, agriculture Mechanical power, energy consumption. The expert scoring method and the coefficient of variation method are used to determine the weight of each indicator, and finally a comprehensive index is constructed to evaluate the ecological security of Xinjiang, that is, the ecological security index. The results indicate that the ecological security of Xinjiang is 0.43, which is in the critical area. The ecological security of Hami, Turpan and Karamay is the lowest, and the ecological security of the Arabian and Yili is the highest. The ecological security of the south in the Xinjiang is higher than that in the north. In short, ecological environment of Xinjiang is in a sensitive period. Effective ecological protection policy will ameliorate the ecological environment, on the contrary, high-intensity human activities will make it tends to deteriorate. This research would provide scientific guidance and suggestions for the ecological environment protection and sustainable development of Xinjiang.

  1. Countries at Risk: Heightened Human Security Risk to States With Transboundary Water Resources and Instability

    NASA Astrophysics Data System (ADS)

    Veilleux, J. C.; Sullivan, G. S.; Paola, C.; Starget, A.; Watson, J. E.; Hwang, Y. J.; Picucci, J. A.; Choi, C. S.

    2014-12-01

    The Countries at Risk project is a global assessment of countries with transboundary water resources that are at risk for conflict because of high human security instability. Building upon Basins at Risk (BAR) research, our team used updated Transboundary Freshwater Dispute Database georeferenced social and environmental data, quantitative data from global indices, and qualitative data from news media sources. Our assessment considered a combination of analyzing 15 global indices related to water or human security to identify which countries scored as highest risk in each index. From this information, we were able to assess the highest risk countries' human security risk by using a new human security measurement tool, as well as comparing this analysis to the World Bank's Fragile States Index and the experimental Human Security Index. In addition, we identified which countries have the highest number of shared basins, the highest percentage of territory covered by a transboundary basin, and the highest dependency of withdrawal from transboundary waters from outside their country boundaries. By synthesizing these social and environmental data assessments, we identified five countries to analyze as case studies. These five countries are Afghanistan, China, Iraq, Moldova, and Sudan. We created a series of 30 maps to spatial analyze the relationship between the transboundary basins and social and environmental parameters to include population, institutional capacity, and physical geography by country. Finally, we synthesized our spatial analysis, Human Security Key scores, and current events scored by using the BAR scale to determine what aspects and which basins are most at risk with each country in our case studies and how this concerns future global water resources.

  2. Usability Assessment of Secure Messaging for Clinical Document Sharing between Health Care Providers and Patients.

    PubMed

    Jahn, Michelle A; Porter, Brian W; Patel, Himalaya; Zillich, Alan J; Simon, Steven R; Russ, Alissa L

    2018-04-01

     Web-based patient portals feature secure messaging systems that enable health care providers and patients to communicate information. However, little is known about the usability of these systems for clinical document sharing.  This article evaluates the usability of a secure messaging system for providers and patients in terms of its ability to support sharing of electronic clinical documents.  We conducted usability testing with providers and patients in a human-computer interaction laboratory at a Midwestern U.S. hospital. Providers sent a medication list document to a fictitious patient via secure messaging. Separately, patients retrieved the clinical document from a secure message and returned it to a fictitious provider. We collected use errors, task completion, task time, and satisfaction.  Twenty-nine individuals participated: 19 providers (6 physicians, 6 registered nurses, and 7 pharmacists) and 10 patients. Among providers, 11 (58%) attached and sent the clinical document via secure messaging without requiring assistance, in a median (range) of 4.5 (1.8-12.7) minutes. No patients completed tasks without moderator assistance. Patients accessed the secure messaging system within 3.6 (1.2-15.0) minutes; retrieved the clinical document within 0.8 (0.5-5.7) minutes; and sent the attached clinical document in 6.3 (1.5-18.1) minutes. Although median satisfaction ratings were high, with 5.8 for providers and 6.0 for patients (scale, 0-7), we identified 36 different use errors. Physicians and pharmacists requested additional features to support care coordination via health information technology, while nurses requested features to support efficiency for their tasks.  This study examined the usability of clinical document sharing, a key feature of many secure messaging systems. Our results highlight similarities and differences between provider and patient end-user groups, which can inform secure messaging design to improve learnability and efficiency. The observations suggest recommendations for improving the technical aspects of secure messaging for clinical document sharing. Schattauer GmbH Stuttgart.

  3. 5 CFR 9701.408 - Developing performance and addressing poor performance.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Performance Management § 9701.408...

  4. Evaluation of water security in Jordan using a multi-agent, hydroeconomic model: Initial model results from the Jordan Water Project

    NASA Astrophysics Data System (ADS)

    Yoon, J.; Klassert, C. J. A.; Lachaut, T.; Selby, P. D.; Knox, S.; Gorelick, S.; Rajsekhar, D.; Tilmant, A.; Avisse, N.; Harou, J. J.; Medellin-Azuara, J.; Gawel, E.; Klauer, B.; Mustafa, D.; Talozi, S.; Sigel, K.; Zhang, H.

    2016-12-01

    Our work focuses on development of a multi-agent, hydroeconomic model for water policy evaluation in Jordan. Jordan ranks among the most water-scarce countries in the world, a situation exacerbated due to a recent influx of refugees escaping the ongoing civil war in neighboring Syria. The modular, multi-agent model is used to evaluate interventions for enhancing Jordan's water security, integrating biophysical modules that simulate natural and engineered phenomena with human modules that represent behavior at multiple levels of decision making. The hydrologic modules are developed using spatially-distributed groundwater and surface water models, which are translated into compact simulators for efficient integration into the multi-agent model. For the multi-agent model, we explicitly account for human agency at multiple levels of decision making, with agents representing riparian, management, supplier, and water user groups. Human agents are implemented as autonomous entities in the model that make decisions in relation to one another and in response to hydrologic and socioeconomic conditions. The integrated model is programmed in Python using Pynsim, a generalizable, open-source object-oriented software framework for modeling network-based water resource systems. The modeling time periods include historical (2006-2014) and future (present-2050) time spans. For the historical runs, the model performance is validated against historical data for several observations that reflect the interacting dynamics of both the hydrologic and human components of the system. A historical counterfactual scenario is also constructed to isolate and identify the impacts of the recent Syrian civil war and refugee crisis on Jordan's water system. For the future period, model runs are conducted to evaluate potential supply, demand, and institutional interventions over a wide range of plausible climate and socioeconomic scenarios. In addition, model sensitivity analysis is conducted revealing the hydrologic and human aspects of the system that most strongly influence water security outcomes, providing insight into coupled human-water system dynamics as well as priority areas of focus for continued model improvement.

  5. Secure Genomic Computation through Site-Wise Encryption

    PubMed Central

    Zhao, Yongan; Wang, XiaoFeng; Tang, Haixu

    2015-01-01

    Commercial clouds provide on-demand IT services for big-data analysis, which have become an attractive option for users who have no access to comparable infrastructure. However, utilizing these services for human genome analysis is highly risky, as human genomic data contains identifiable information of human individuals and their disease susceptibility. Therefore, currently, no computation on personal human genomic data is conducted on public clouds. To address this issue, here we present a site-wise encryption approach to encrypt whole human genome sequences, which can be subject to secure searching of genomic signatures on public clouds. We implemented this method within the Hadoop framework, and tested it on the case of searching disease markers retrieved from the ClinVar database against patients’ genomic sequences. The secure search runs only one order of magnitude slower than the simple search without encryption, indicating our method is ready to be used for secure genomic computation on public clouds. PMID:26306278

  6. Secure Genomic Computation through Site-Wise Encryption.

    PubMed

    Zhao, Yongan; Wang, XiaoFeng; Tang, Haixu

    2015-01-01

    Commercial clouds provide on-demand IT services for big-data analysis, which have become an attractive option for users who have no access to comparable infrastructure. However, utilizing these services for human genome analysis is highly risky, as human genomic data contains identifiable information of human individuals and their disease susceptibility. Therefore, currently, no computation on personal human genomic data is conducted on public clouds. To address this issue, here we present a site-wise encryption approach to encrypt whole human genome sequences, which can be subject to secure searching of genomic signatures on public clouds. We implemented this method within the Hadoop framework, and tested it on the case of searching disease markers retrieved from the ClinVar database against patients' genomic sequences. The secure search runs only one order of magnitude slower than the simple search without encryption, indicating our method is ready to be used for secure genomic computation on public clouds.

  7. Attachment in integrative neuroscientific perspective.

    PubMed

    Hruby, Radovan; Hasto, Jozef; Minarik, Peter

    2011-01-01

    Attachment theory is a very influential general concept of human social and emotional development, which emphasizes the role of early mother-infant interactions for infant's adaptive behavioural and stress copying strategies, personality organization and mental health. Individuals with disrupted development of secure attachment to mother/primary caregiver are at higher risk of developing mental disorders. This theory consists of the complex developmental psycho-neurobiological model of attachment and emerges from principles of psychoanalysis, evolutionary biology, cognitive-developmental psychology, ethology, physiology and control systems theory. The progress of modern neuroscience enables interpretation of neurobiological aspects of the theory as multi-level neural interactions and functional development of important neural structures, effects of neuromediattors, hormones and essential neurobiological processes including emotional, cognitive, social interactions and the special key role of mentalizing. It has multiple neurobiological, neuroendocrine, neurophysiological, ethological, genetic, developmental, psychological, psychotherapeutic and neuropsychiatric consequences and is a prototype of complex neuroscientific concept as interpretation of modern integrated neuroscience.

  8. Supporting secure programming in web applications through interactive static analysis.

    PubMed

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2014-07-01

    Many security incidents are caused by software developers' failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases.

  9. Supporting secure programming in web applications through interactive static analysis

    PubMed Central

    Zhu, Jun; Xie, Jing; Lipford, Heather Richter; Chu, Bill

    2013-01-01

    Many security incidents are caused by software developers’ failure to adhere to secure programming practices. Static analysis tools have been used to detect software vulnerabilities. However, their wide usage by developers is limited by the special training required to write rules customized to application-specific logic. Our approach is interactive static analysis, to integrate static analysis into Integrated Development Environment (IDE) and provide in-situ secure programming support to help developers prevent vulnerabilities during code construction. No additional training is required nor are there any assumptions on ways programs are built. Our work is motivated in part by the observation that many vulnerabilities are introduced due to failure to practice secure programming by knowledgeable developers. We implemented a prototype interactive static analysis tool as a plug-in for Java in Eclipse. Our technical evaluation of our prototype detected multiple zero-day vulnerabilities in a large open source project. Our evaluations also suggest that false positives may be limited to a very small class of use cases. PMID:25685513

  10. Deafblindness, ontological security, and social recognition.

    PubMed

    Danermark, Berth D; Möller, Kerstin

    2008-11-01

    Trust, ontological security, and social recognition are discussed in relation to self-identity among people with acquired deafblindness. To date the phenomenon has not been elaborated in the context of deafblindness. When a person with deafblindness interacts with the social and material environment, the reliability, constancy, and predictability of his or her relations is crucial for maintaining or achieving ontological security or a general and fairly persistent feeling of well-being. When these relations fundamentally change, the impact on ontological security will be very negative. The construction of social recognition through the interaction between the self and others is embodied across three dimensions: at the individual level, at the legal systems level, and at the normative or value level. The relationship between trust and ontological security on the one hand and social recognition on the other hand is discussed. It is argued that these basic processes affecting personality development have to be identified and acknowledged in the interactions people with deafblindness experience. Some implications for the rehabilitation of people with acquired deafblindness are presented and illustrated.

  11. Simulations in Cyber-Security: A Review of Cognitive Modeling of Network Attackers, Defenders, and Users

    PubMed Central

    Veksler, Vladislav D.; Buchler, Norbou; Hoffman, Blaine E.; Cassenti, Daniel N.; Sample, Char; Sugrim, Shridat

    2018-01-01

    Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting. PMID:29867661

  12. Water-Energy-Food Nexus in Asia-Pacific Ring of Fire

    NASA Astrophysics Data System (ADS)

    Taniguchi, M.; Endo, A.; Gurdak, J. J.; Allen, D. M.; Siringan, F.; Delinom, R.; Shoji, J.; Fujii, M.; Baba, K.

    2013-12-01

    Climate change and economic development are causing increased pressure on water, energy and food resources, presenting communities with increased levels of tradeoffs and potential conflicts among these resources. Therefore, the water-energy-food nexus is one of the most important and fundamental global environmental issues facing the world. For the purposes of this research project, we define human-environmental security as the joint optimization between human and environmental security as well as the water-energy-food nexus. To optimize the governance and management within these inter-connected needs, it is desirable to increase human-environmental security by improving social managements for the water-energy-food nexus. In this research project, we intend to establish a method to manage and optimize the human-environmental security of the water-energy-food nexus by using integrated models, indices, and maps as well as social and natural investigations with stakeholder analyses. We base our approach on the viewpoint that it is important for a sustainable society to increase human-environmental security with decreasing risk and increasing resilience by optimizing the connections within the critical water-energy and water-food clusters. We will take a regional perspective to address these global environmental problems. The geological and geomorphological conditions in our proposed study area are heavily influenced by the so-called 'Ring of Fire,' around the Pacific Ocean. Within these areas including Japan and Southeast Asia, the hydro-meteorological conditions are dominated by the Asia monsoon. The populations that live under these natural conditions face elevated risk and potential disaster as negative impacts, while also benefitting from positive ecological goods and services. There are therefore tradeoffs and conflicts within the water-energy-food nexus, as well as among various stakeholders in the region. The objective of this project is to maximize human-environmental security (minimize the risk) by choosing management structures and policies that optimize both the water-food-energy nexus in Asia-Pacific coastal regions. We define joint security approach as optimized policy. Optimal policies will develop joint security approaches for human-environmental security in the coastal region of the Ring of Fire, including stakeholders and decision-makers.

  13. Validity Evidence for the Security Scale as a Measure of Perceived Attachment Security in Adolescence

    ERIC Educational Resources Information Center

    Van Ryzin, Mark J.; Leve, Leslie D.

    2012-01-01

    In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social…

  14. 5 CFR 9701.510 - Powers and duties of the Federal Labor Relations Authority.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.510...

  15. A vital link: water and vegetation in the Anthropocene

    NASA Astrophysics Data System (ADS)

    Gerten, D.

    2013-04-01

    This paper argues that the interplay of water, carbon and vegetation dynamics is fundamental to some global trends in the current and conceivable future Anthropocene. Supported by simulations with a process-based biosphere model and a literature review, it demonstrates that the connectivity of freshwater and vegetation dynamics is vital for water security, food security and (terrestrial) ecosystem integrity alike. The water limitation of net primary production of both natural and agricultural plants - already pronounced in many regions - is shown to increase in many places under projected climate change, though this development is partially offset by water-saving direct CO2 effects. Natural vegetation can to some degree adapt dynamically to higher water limitation, but agricultural crops require some form of active management to overcome it - among them irrigation, soil conservation and expansion into still uncultivated areas. While crucial to secure food production for a growing world population, such human interventions in water-vegetation systems have, as also shown, repercussions to the water cycle. Indeed, land use changes have been shown to be the second-most important influence on the terrestrial water balance in recent times. Furthermore, climate change regionally increases irrigation demand and decreases freshwater availability, impeding on rainfed and irrigated food production (if not CO2 effects counterbalance this impact - which is unlikely at least in poorly managed systems). Drawing from these exemplary investigations, some research perspectives on how to further improve our quantitative knowledge of human-water-vegetation interactions in the Anthropocene are outlined.

  16. Study on the Progress of Ecological Fragility Assessment in China

    NASA Astrophysics Data System (ADS)

    Chen, Pei; Hou, Kang; Chang, Yue; Li, Xuxiang; Zhang, Yunwei

    2018-02-01

    The basic elements of human survival are based on the ecological environment. The development of social economic and the security of the ecological environment are closely linked and interact with each other. The fragility of the environment directly affects the stability of the regional ecosystem and the sustainable development of the ecological environment. As part of the division of the national ecological security, the assessment of ecological fragility has become a hot and difficult issue in environmental research, and researchers at home and abroad have systematically studied the causes and states of ecological fragility. The assessment of regional ecological fragility is a qualitative and quantitative analysis of the unbalanced distribution of ecological environment factors caused by human socio-economic activities or changes in ecosystems. At present, researches on ecological fragility has not formed a complete and unified index assessment system, and the unity of the assessment model has a direct impact on the accuracy of the index weights. Therefore, the discussion on selection of ecological fragility indexes and the improvement of ecological fragility assessment model is necessary, which is good for the improvement of ecological fragility assessment system in China.

  17. Gray Wave of the Great Transformation: A Satellite View of Urbanization, Climate Change, and Food Security

    NASA Technical Reports Server (NTRS)

    Imhoff, Marc Lee; Kamiell, Arnon Menahem

    2010-01-01

    Land cover change driven by human activity is profoundly affecting Earth's natural systems with impacts ranging from a loss of biological diversity to changes in regional and global climate. This change has been so pervasive and progressed so rapidly, compared to natural processes, scientists refer to it as "the great transformation". Urbanization or the 'gray wave' of land transformation is being increasingly recognized as an important process in global climate change. A hallmark of our success as a species, large urban conglomerates do in fact alter the land surface so profoundly that both local climate and the basic ecology of the landscape are affected in ways that have consequences to human health and economic well-being. Fortunately we have incredible new tools for planning and developing urban places that are both enjoyable and sustainable. A suite of Earth observing satellites is making it possible to study the interactions between urbanization, biological processes, and weather and climate. Using these Earth Observatories we are learning how urban heat islands form and potentially ameliorate them, how urbanization can affect rainfall, pollution, and surface water recharge at the local level and climate and food security globally.

  18. OAS - Organization of American States: Democracy for peace, security, and

    Science.gov Websites

    Elections Environment Equity G General Assembly Governance H Human Development Human Rights I Indigenous Security R Racism and Intolerance Refugees S Scholarships School of Governance Science and Technology cooperation among states and advance a common regional agenda on democratic governance, human rights

  19. United States Agency for International Development

    MedlinePlus

    ... We Do Areas of Focus What We Do Agriculture and Food Security Democracy, Human Rights and Governance ... Resource Portal What We Do What We Do Agriculture and Food Security Democracy, Human Rights and Governance ...

  20. A Dynamic Framework for Water Security

    NASA Astrophysics Data System (ADS)

    Srinivasan, Veena; Konar, Megan; Sivapalan, Murugesu

    2017-04-01

    Water security is a multi-faceted problem, going beyond mere balancing of supply and demand. Conventional attempts to quantify water security starting rely on static indices at a particular place and point in time. While these are simple and scalable, they lack predictive or explanatory power. 1) Most static indices focus on specific spatial scales and largely ignore cross-scale feedbacks between human and water systems. 2) They fail to account for the increasing spatial specialization in the modern world - some regions are cities others are agricultural breadbaskets; so water security means different things in different places. Human adaptation to environmental change necessitates a dynamic view of water security. We present a framework that defines water security as an emergent outcome of a coupled socio-hydrologic system. Over the medium term (5-25 years), water security models might hold governance, culture and infrastructure constant, but allow humans to respond to changes and thus predict how water security would evolve. But over very long time-frames (25-100 years), a society's values, norms and beliefs themselves may themselves evolve; these in turn may prompt changes in policy, governance and infrastructure. Predictions of water security in the long term involve accounting for such regime shifts in the cultural and political context of a watershed by allowing the governing equations of the models to change.

  1. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    ERIC Educational Resources Information Center

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  2. An integrated water-energy-food-livelihoods approach for assessing environmental livelihood security

    NASA Astrophysics Data System (ADS)

    Biggs, E. M.; Duncan, J.; Boruff, B.; Bruce, E.; Neef, A.; McNeill, K.; van Ogtrop, F. F.; Haworth, B.; Duce, S.; Horsley, J.; Pauli, N.; Curnow, J.; Imanari, Y.

    2015-12-01

    Environmental livelihood security refers to the challenges of maintaining global food security and universal access to freshwater and energy to sustain livelihoods and promote inclusive economic growth, whilst sustaining key environmental systems' functionality, particularly under variable climatic regimes. Environmental security is a concept complementary to sustainable development, and considers the increased vulnerability people have to certain environmental stresses, such as climatic change. Bridging links between the core component concepts of environmental security is integral to future human security, and in an attempt to create this bridge, the nexus approach to human protection has been created, where water resource availability underpins food, water and energy security. The water-energy-food nexus has an influential role in attaining human security, yet little research has made the link between the nexus and livelihoods. In this research we provide a critical appraisal of the synergies between water-energy-food nexus framings and sustainable livelihoods approaches, both of which aim to promote sustainable development. In regions where livelihoods are dependent on environmental conditions, the concept of sustainable development is critical for ensuring future environmental and human security. Given our appraisal we go on to develop an integrated framework for assessing environmental livelihood security of multiscale and multi-level systems. This framework provides a tangible approach for assessing changes in the water-energy-food-livelihood indicators of a system. Examples of where system applications may occur are discussed for the Southeast Asia and Oceania region. Our approach will be particularly useful for policy-makers to inform evidence-based decision-making, especially in localities where climate change increases the vulnerability of impoverished communities and extenuates environmental livelihood insecurity.

  3. Information Systems, Security, and Privacy.

    ERIC Educational Resources Information Center

    Ware, Willis H.

    1984-01-01

    Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)

  4. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crawford, Cary E.; de Boer, Gloria; De Castro, Kara

    2010-10-01

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the “human factor.” Gen. Eugene Habiger, a former “Assistant Secretary for Safeguards and Security” at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that “good security is 20% equipment and 80% people.”1 Although eliminating the “human factor” is not possible, accounting for and mitigating the riskmore » of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.« less

  5. Adult Attachment Styles Associated with Brain Activity in Response to Infant Faces in Nulliparous Women: An Event-Related Potentials Study.

    PubMed

    Ma, Yuanxiao; Ran, Guangming; Chen, Xu; Ma, Haijing; Hu, Na

    2017-01-01

    Adult attachment style is a key for understanding emotion regulation and feelings of security in human interactions as well as for the construction of the caregiving system. The caregiving system is a group of representations about affiliative behaviors, which is guided by the caregiver's sensitivity and empathy, and is mature in young adulthood. Appropriate perception and interpretation of infant emotions is a crucial component of the formation of a secure attachment relationship between infant and caregiver. As attachment styles influence the ways in which people perceive emotional information, we examined how different attachment styles associated with brain response to the perception of infant facial expressions in nulliparous females with secure, anxious, and avoidant attachment styles. The event-related potentials of 65 nulliparous females were assessed during a facial recognition task with joy, neutral, and crying infant faces. The results showed that anxiously attached females exhibited larger N170 amplitudes than those with avoidant attachment in response to all infant faces. Regarding the P300 component, securely attached females showed larger amplitudes to all infant faces in comparison with avoidantly attached females. Moreover, anxiously attached females exhibited greater amplitudes than avoidantly attached females to only crying infant faces. In conclusion, the current results provide evidence that attachment style differences are associated with brain responses to the perception of infant faces. Furthermore, these findings further separate the psychological mechanisms underlying the caregiving behavior of those with anxious and avoidant attachment from secure attachment.

  6. The relevance of security: A latent domain of attachment relationships.

    PubMed

    Mannarini, Stefania; Boffo, Marilisa

    2014-02-01

    In the present study an adult attachment dimension, latent to the constructs of security, anxiety, and avoidance, was hypothesized, wherein security was expected to occupy the most relevant position. Furthermore, the reciprocal functioning of attachment constructs and their interactions with self-esteem were explored. Four hundreds and thirty-four Italian university students responded to two adult attachment questionnaires (Attachment Style Questionnaire and Adult Attachment Questionnaire) and to the Rosenberg Self-esteem scale. A Many-Facet Rasch Measurement modeling approach was adopted. The main results can be summarized as follows: (a) security, anxiety, and avoidance are nested under one latent attachment dimension; (b) security occupies the most prominent position on the dimension; (c) security is positively associated with a moderate level of attachment anxiety and negatively related to avoidance; and (d) a positive interaction between self-esteem and security, and a negative relation between self-esteem and anxiety, were detected. Theoretical, clinical, and empirical implications of the results are further discussed. © 2013 Scandinavian Psychological Associations and John Wiley & Sons Ltd.

  7. Guidelines for Working with Law Enforcement Agencies

    ERIC Educational Resources Information Center

    Corn, Michael

    2007-01-01

    Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…

  8. Maternal Resolution of Grief After Preterm Birth: Implications for Infant Attachment Security

    PubMed Central

    Clements, Melissa; Poehlmann, Julie

    2011-01-01

    OBJECTIVE: This study explored the association between mothers' unresolved grief regarding their infant's preterm birth and infant-mother attachment security. We hypothesized that mothers with unresolved grief would be more likely to have insecurely attached infants at 16 months and that this association would be partially mediated by maternal interaction quality. METHODS: This longitudinal study focused on 74 preterm infants (age of <36 weeks) and their mothers who were part of a larger study of high-risk infants. The present analysis included assessment of neonatal and socioeconomic risks at NICU discharge; maternal depression, Reaction to Preterm Birth Interview findings, and quality of parenting at a postterm age of 9 months; and infant-mother attachment at postterm age of 16 months. Associations among findings of grief resolution with the Reaction to Preterm Birth Interview, quality of parenting interactions, and attachment security were explored by using relative risk ratios and logistic and multivariate regression models. RESULTS: The relative risk of developing insecure attachment when mothers had unresolved grief was 1.59 (95% confidence interval: 1.03–2.44). Controlling for covariates (adjusted odds ratio: 2.94), maternal feelings of resolved grief regarding the preterm birth experience were associated with secure infant-mother attachment at 16 months. Maternal grief resolution and interaction quality were independent predictors of attachment security. CONCLUSION: Maternal grief resolution regarding the experience of preterm birth and the quality of maternal interactions have important implications for emerging attachment security for infants born prematurely. PMID:21242223

  9. Maternal resolution of grief after preterm birth: implications for infant attachment security.

    PubMed

    Shah, Prachi E; Clements, Melissa; Poehlmann, Julie

    2011-02-01

    This study explored the association between mothers' unresolved grief regarding their infant's preterm birth and infant-mother attachment security. We hypothesized that mothers with unresolved grief would be more likely to have insecurely attached infants at 16 months and that this association would be partially mediated by maternal interaction quality. This longitudinal study focused on 74 preterm infants (age of <36 weeks) and their mothers who were part of a larger study of high-risk infants. The present analysis included assessment of neonatal and socioeconomic risks at NICU discharge; maternal depression, Reaction to Preterm Birth Interview findings, and quality of parenting at a postterm age of 9 months; and infant-mother attachment at postterm age of 16 months. Associations among findings of grief resolution with the Reaction to Preterm Birth Interview, quality of parenting interactions, and attachment security were explored by using relative risk ratios and logistic and multivariate regression models. The relative risk of developing insecure attachment when mothers had unresolved grief was 1.59 (95% confidence interval: 1.03-2.44). Controlling for covariates (adjusted odds ratio: 2.94), maternal feelings of resolved grief regarding the preterm birth experience were associated with secure infant-mother attachment at 16 months. Maternal grief resolution and interaction quality were independent predictors of attachment security. Maternal grief resolution regarding the experience of preterm birth and the quality of maternal interactions have important implications for emerging attachment security for infants born prematurely.

  10. Parental attachment style: examination of links with parent secure base provision and adolescent secure base use.

    PubMed

    Jones, Jason D; Cassidy, Jude

    2014-01-01

    The secure base construct represents one of attachment theory's most important contributions to our understanding of parent-child relationships and child development. The present study represents the first examination of how parents' self-reported attachment styles relate to parental secure base provision and adolescent (mean age = 16.6 years, SE = .59) secure base use during an observed parent-adolescent interaction. Further, the present study is the first to examine how fathers', as well as mothers', attachment styles relate to observed behavior in a parent-child interaction. At the bivariate level, maternal avoidance, but not anxiety, was negatively associated with observed adolescent secure base use. In addition, path analysis revealed that maternal avoidance was indirectly related to less adolescent secure base use through mothers' self-reported hostile behavior toward their adolescents and through adolescents' less positive perceptions of their mothers. Further, paternal anxiety, but not avoidance, was indirectly related to less adolescent secure base use through fathers' self-reported hostile behavior toward their adolescents. No significant findings emerged in relation to parental secure base provision. We discuss these results in the context of attachment theory and suggest directions for future research.

  11. 32 CFR 322.4 - Responsibilities.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... physical security requirements for the protection of personal information and ensure that such requirements... NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.4 Responsibilities. (a) The... Associate Director for Human Resources Services or designee shall: (1) Establish the physical security...

  12. 76 FR 1519 - Security Zones; Sabine Bank Channel, Sabine Pass Channel and Sabine-Neches Waterway, TX

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-11

    ... comprehensive port security regime designed to safeguard human life, vessels, and waterfront facilities against... do not individually or cumulatively have a significant effect on the human environment. This rule is...

  13. Decision Model for U.S.- Mexico Border Security Measures

    DTIC Science & Technology

    2017-09-01

    and money assigned to border security investments. 14. SUBJECT TERMS Department of Homeland Security (DHS), border security, U.S.–Mexico border...and money assigned to border security investments. vi THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. INTRODUCTION...FAA Federal Aviation Administration FAMS Federal Air Marshals Service FAST Free and Secure Trade GSA General Services Administration HIR Human

  14. Security: Individuals and Leviathans

    DTIC Science & Technology

    2013-05-20

    What is human security and how does it fit in the current world order? The United Nations (UN) proposed human security in 1994 at the end of the Cold... world orders established by Western nations, from the Treaty of Westphalia to the UN, suggesting these have been inadequate leviathans. The argument...the globe, when and where they can. However, as the world becomes more multipolar, these Western liberal nations are likely to be restrained from

  15. IRBs and Security Research: Myths, Facts and Mission Creep

    DTIC Science & Technology

    2008-04-07

    discovering the US Government’s regula- tions that govern human subject research. This paper dis- cusses those regulations, their application to research on...ity and other human factors issues, many are surprised to discover that they must comply with regulations govern- ing the use of human beings as...security researchers are discovering the US Government?s regulations that govern human subject research. This paper discusses those regulations, their

  16. Securing the Human: The Journey Toward World Law and Justice. The Whole Earth Papers, No. 14.

    ERIC Educational Resources Information Center

    Mische, Patricia; And Others

    The document contains a variety of papers that examine the linkages between local concerns and global concerns and explore alternative world futures. An introductory article, "Securing the Human," discusses how the world community needs to develop adequate means to deal with crimes against humans. These means include sound analysis, spiritual…

  17. Trust Building in Virtual Communities

    NASA Astrophysics Data System (ADS)

    Mezgár, István

    By using different types of communication networks various groups of people can come together according to their private or business interest forming a Virtual Community. In these communities cooperation and collaboration plays an important role. As trust is the base of all human interactions this fact is even more valid in case of virtual communities. According to different experiments the level of trust in virtual communities is highly influenced by the way/mode of communication and by the duration of contact. The paper discusses the ways of trust building focusing on communication technologies and security aspects in virtual communities.

  18. VMSoar: a cognitive agent for network security

    NASA Astrophysics Data System (ADS)

    Benjamin, David P.; Shankar-Iyer, Ranjita; Perumal, Archana

    2005-03-01

    VMSoar is a cognitive network security agent designed for both network configuration and long-term security management. It performs automatic vulnerability assessments by exploring a configuration"s weaknesses and also performs network intrusion detection. VMSoar is built on the Soar cognitive architecture, and benefits from the general cognitive abilities of Soar, including learning from experience, the ability to solve a wide range of complex problems, and use of natural language to interact with humans. The approach used by VMSoar is very different from that taken by other vulnerability assessment or intrusion detection systems. VMSoar performs vulnerability assessments by using VMWare to create a virtual copy of the target machine then attacking the simulated machine with a wide assortment of exploits. VMSoar uses this same ability to perform intrusion detection. When trying to understand a sequence of network packets, VMSoar uses VMWare to make a virtual copy of the local portion of the network and then attempts to generate the observed packets on the simulated network by performing various exploits. This approach is initially slow, but VMSoar"s learning ability significantly speeds up both vulnerability assessment and intrusion detection. This paper describes the design and implementation of VMSoar, and initial experiments with Windows NT and XP.

  19. 45 CFR 164.318 - Compliance dates for the initial implementation of the security standards.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... the security standards. 164.318 Section 164.318 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection... of the security standards. (a) Health plan. (1) A health plan that is not a small health plan must...

  20. Public Health Crisis in War and Conflict - Health Security in Aggregate.

    PubMed

    Quinn, John; Zelený, Tomáš; Subramaniam, Rammika; Bencko, Vladimír

    2017-03-01

    Public health status of populations is multifactorial and besides other factors it is linked to war and conflict. Public health crisis can erupt when states go to war or are invaded; health security may be reduced for affected populations. This study reviews in aggregate multiple indices of human security, human development and legitimacy of the state in order to describe a predictable global health portrait. Paradigm shift of large global powers to that non-state actors and proxies impact regional influence through scaled conflict and present major global health challenges for policy makers. Small scale conflict with large scale violence threatens health security for at-risk populations. The paper concludes that health security is directly proportional to state security. Copyright© by the National Institute of Public Health, Prague 2017

  1. Climate Induced Spillover and Implications for U.S. Security.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tidwell, Vincent C.; Naugle, Asmeret Bier; Backus, George A.

    Developing nations incur a greater risk to climate change than the developed world due to poorly managed human/natural resources, unreliable infrastructure and brittle governing/economic institutions. These vulnerabilities often give rise to a climate induced “domino effect” of reduced natural resource production-leading to economic hardship, social unrest, and humanitarian crises. Integral to this cascading set of events is increased human migration, leading to the “spillover” of impacts to adjoining areas with even broader impact on global markets and security. Given the complexity of factors influencing human migration and the resultant spill-over effect, quantitative tools are needed to aid policy analysis. Towardmore » this need, a series of migration models were developed along with a system dynamics model of the spillover effect. The migration decision models were structured according to two interacting paths, one that captured long-term “chronic” impacts related to protracted deteriorating quality of life and a second focused on short-term “acute” impacts of disaster and/or conflict. Chronic migration dynamics were modeled for two different cases; one that looked only at emigration but at a national level for the entire world; and a second that looked at both emigration and immigration but focused on a single nation. Model parameterization for each of the migration models was accomplished through regression analysis using decadal data spanning the period 1960-2010. A similar approach was taken with acute migration dynamics except regression analysis utilized annual data sets limited to a shorter time horizon (2001-2013). The system dynamics spillover model was organized around two broad modules, one simulating the decision dynamics of migration and a second module that treats the changing environmental conditions that influence the migration decision. The environmental module informs the migration decision, endogenously simulating interactions/changes in the economy, labor, population, conflict, water, and food. A regional model focused on Mali in western Africa was used as a test case to demonstrate the efficacy of the model.« less

  2. 5 CFR 9701.409 - Rating and rewarding performance.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Rating and rewarding performance. 9701.409 Section 9701.409 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Performance Management § 9701.409 Rating and rewarding...

  3. An agent-based hydroeconomic model to evaluate water policies in Jordan

    NASA Astrophysics Data System (ADS)

    Yoon, J.; Gorelick, S.

    2014-12-01

    Modern water systems can be characterized by a complex network of institutional and private actors that represent competing sectors and interests. Identifying solutions to enhance water security in such systems calls for analysis that can adequately account for this level of complexity and interaction. Our work focuses on the development of a hierarchical, multi-agent, hydroeconomic model that attempts to realistically represent complex interactions between hydrologic and multi-faceted human systems. The model is applied to Jordan, one of the most water-poor countries in the world. In recent years, the water crisis in Jordan has escalated due to an ongoing drought and influx of refugees from regional conflicts. We adopt a modular approach in which biophysical modules simulate natural and engineering phenomena, and human modules represent behavior at multiple scales of decision making. The human modules employ agent-based modeling, in which agents act as autonomous decision makers at the transboundary, state, organizational, and user levels. A systematic nomenclature and conceptual framework is used to characterize model agents and modules. Concepts from the Unified Modeling Language (UML) are adopted to promote clear conceptualization of model classes and process sequencing, establishing a foundation for full deployment of the integrated model in a scalable object-oriented programming environment. Although the framework is applied to the Jordanian water context, it is generalizable to other regional human-natural freshwater supply systems.

  4. The effect of soil on human health: an overview.

    PubMed

    Steffan, J J; Brevik, E C; Burgess, L C; Cerdà, A

    2018-01-01

    Soil has a considerable effect on human health, whether those effects are positive or negative, direct or indirect. Soil is an important source of nutrients in our food supply and medicines such as antibiotics. However, nutrient imbalances and the presence of human pathogens in the soil biological community can cause negative effects on health. There are also many locations where various elements or chemical compounds are found in soil at toxic levels, because of either natural conditions or anthropogenic activities. The soil of urban environments has received increased attention in the last few years, and they too pose a number of human health questions and challenges. Concepts such as soil security may provide a framework within which issues on soil and human health can be investigated using interdisciplinary and transdisciplinary approaches. It will take the contributions of experts in several different scientific, medical and social science fields to address fully soil and human health issues. Although much progress was made in understanding links between soil and human health over the last century, there is still much that we do not know about the complex interactions between them. Therefore, there is still a considerable need for research in this important area.

  5. The Pathogen-Host Interactions database (PHI-base): additions and future developments

    PubMed Central

    Urban, Martin; Pant, Rashmi; Raghunath, Arathi; Irvine, Alistair G.; Pedro, Helder; Hammond-Kosack, Kim E.

    2015-01-01

    Rapidly evolving pathogens cause a diverse array of diseases and epidemics that threaten crop yield, food security as well as human, animal and ecosystem health. To combat infection greater comparative knowledge is required on the pathogenic process in multiple species. The Pathogen-Host Interactions database (PHI-base) catalogues experimentally verified pathogenicity, virulence and effector genes from bacterial, fungal and protist pathogens. Mutant phenotypes are associated with gene information. The included pathogens infect a wide range of hosts including humans, animals, plants, insects, fish and other fungi. The current version, PHI-base 3.6, available at http://www.phi-base.org, stores information on 2875 genes, 4102 interactions, 110 host species, 160 pathogenic species (103 plant, 3 fungal and 54 animal infecting species) and 181 diseases drawn from 1243 references. Phenotypic and gene function information has been obtained by manual curation of the peer-reviewed literature. A controlled vocabulary consisting of nine high-level phenotype terms permits comparisons and data analysis across the taxonomic space. PHI-base phenotypes were mapped via their associated gene information to reference genomes available in Ensembl Genomes. Virulence genes and hotspots can be visualized directly in genome browsers. Future plans for PHI-base include development of tools facilitating community-led curation and inclusion of the corresponding host target(s). PMID:25414340

  6. 45 CFR 164.306 - Security standards: General rules.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Security standards: General rules. 164.306 Section 164.306 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected...

  7. 45 CFR 164.306 - Security standards: General rules.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Security standards: General rules. 164.306 Section 164.306 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected...

  8. 45 CFR 164.306 - Security standards: General rules.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Security standards: General rules. 164.306 Section 164.306 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected...

  9. Making US Soil Taxonomy more scientifically applicable to environmental and food security issues.

    NASA Astrophysics Data System (ADS)

    Monger, Curtis; Lindbo, David L.; Wysocki, Doug; Schoeneberger, Phil; Libohova, Zamir

    2017-04-01

    US Department of Agriculture began mapping soils in the 1890s on a county-by-county basis until most of the conterminous United States was mapped by the late 1930s. This first-generation mapping was followed by a second-generation that re-mapped the US beginning in the 1940s. Soil classification during these periods evolved into the current system of Soil Taxonomy which is based on (1) soil features as natural phenomena and on (2) soil properties important for agriculture and other land uses. While this system has enabled communication among soil surveyors, the scientific applicability of Soil Taxonomy to address environmental and food security issues has been under-utilized. In particular, little effort has been exerted to understand how soil taxa interact and function together as larger units—as soil systems. Thus, much soil-geomorphic understanding that could be applied to process-based modeling remains unexploited. The challenge for soil taxonomists in the United States and elsewhere is to expand their expertise and work with modelers to explore how soil taxa are linked to each other, how they influence water, nutrient, and pollutant flow through the landscape, how they interact with ecology, and how they change with human land use.

  10. Why robots should not be delegated with the decision to kill

    NASA Astrophysics Data System (ADS)

    Sharkey, Noel

    2017-04-01

    The EPSRC first principle of robotics, "robots should not be designed solely or primarily to kill or harm humans, except in the interests of national security", is challenged in detail here. Focusing on security and armed conflict, arguments are marshalled against the principle on ethical, legal, technical and security grounds. A new principle is proposed that robots should never be delegated with the decision to apply violent force to humans.

  11. Universal health coverage from multiple perspectives: a synthesis of conceptual literature and global debates.

    PubMed

    Abiiro, Gilbert Abotisem; De Allegri, Manuela

    2015-07-04

    There is an emerging global consensus on the importance of universal health coverage (UHC), but no unanimity on the conceptual definition and scope of UHC, whether UHC is achievable or not, how to move towards it, common indicators for measuring its progress, and its long-term sustainability. This has resulted in various interpretations of the concept, emanating from different disciplinary perspectives. This paper discusses the various dimensions of UHC emerging from these interpretations and argues for the need to pay attention to the complex interactions across the various components of a health system in the pursuit of UHC as a legal human rights issue. The literature presents UHC as a multi-dimensional concept, operationalized in terms of universal population coverage, universal financial protection, and universal access to quality health care, anchored on the basis of health care as an international legal obligation grounded in international human rights laws. As a legal concept, UHC implies the existence of a legal framework that mandates national governments to provide health care to all residents while compelling the international community to support poor nations in implementing this right. As a humanitarian social concept, UHC aims at achieving universal population coverage by enrolling all residents into health-related social security systems and securing equitable entitlements to the benefits from the health system for all. As a health economics concept, UHC guarantees financial protection by providing a shield against the catastrophic and impoverishing consequences of out-of-pocket expenditure, through the implementation of pooled prepaid financing systems. As a public health concept, UHC has attracted several controversies regarding which services should be covered: comprehensive services vs. minimum basic package, and priority disease-specific interventions vs. primary health care. As a multi-dimensional concept, grounded in international human rights laws, the move towards UHC in LMICs requires all states to effectively recognize the right to health in their national constitutions. It also requires a human rights-focused integrated approach to health service delivery that recognizes the health system as a complex phenomenon with interlinked functional units whose effective interaction are essential to reach the equilibrium called UHC.

  12. Interactive Programming Support for Secure Software Development

    ERIC Educational Resources Information Center

    Xie, Jing

    2012-01-01

    Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…

  13. 77 FR 69443 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-19

    ... ``Human Capital Office'' and replace with ``Human Resources.'' Notification procedure: Delete entry and... requests should contain the individual's full name and Social Security Number (SSN).'' Record access.... Written requests should contain the individual's full name and Social Security Number (SSN).'' Contesting...

  14. 5 CFR 9701.106 - Relationship to other provisions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 5 Administrative Personnel 3 2011-01-01 2011-01-01 false Relationship to other provisions. 9701.106 Section 9701.106 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.106 Relationship to other provisions...

  15. 5 CFR 9701.106 - Relationship to other provisions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Relationship to other provisions. 9701.106 Section 9701.106 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM General Provisions § 9701.106 Relationship to other provisions...

  16. Working alone or in the presence of others: exploring social facilitation in baggage X-ray security screening tasks.

    PubMed

    Yu, Rui-feng; Wu, Xin

    2015-01-01

    This study investigated whether the mere presence of a human audience would evoke a social facilitation effect in baggage X-ray security screening tasks. A 2 (target presence: present vs. absent) ×  2 (task complexity: simple vs. complex) ×  2 (social presence: alone vs. human audience) within-subject experiment simulating a real baggage screening task was conducted. This experiment included 20 male participants. The participants' search performance in this task was recorded. The results showed that the presence of a human audience speeded up responses in simple tasks and slowed down responses in complex tasks. However, the social facilitation effect produced by the presence of a human audience had no effect on response accuracy. These findings suggested that the complexity of screening tasks should be considered when designing work organisation modes for security screening tasks. Practitioner summary: This study investigated whether the presence of a human audience could evoke a social facilitation effect in baggage X-ray security screening tasks. An experimental simulation was conducted. The results showed that the presence of a human audience facilitated the search performance of simple tasks and inhibited the performance of complex tasks.

  17. Infant Emotion Regulation: Relations to Bedtime Emotional Availability, Attachment Security, and Temperament

    PubMed Central

    Kim, Bo-Ram; Stifter, Cynthia A.; Philbrook, Lauren E.; Teti, Douglas M.

    2014-01-01

    The present study examines the influences of mothers’ emotional availability towards their infants during bedtime, infant attachment security, and interactions between bedtime parenting and attachment with infant temperamental negative affectivity, on infants’ emotion regulation strategy use at 12 and 18 months. Infants’ emotion regulation strategies were assessed during a frustration task that required infants to regulate their emotions in the absence of parental support. Whereas emotional availability was not directly related to infants’ emotion regulation strategies, infant attachment security had direct relations with infants’ orienting towards the environment and tension reduction behaviors. Both maternal emotional availability and security of the mother-infant attachment relationship interacted with infant temperamental negative affectivity to predict two strategies that were less adaptive in regulating frustration. PMID:24995668

  18. 76 FR 13438 - AccessTel, Inc., American Asset Management Corp., DME Interactive Holdings, Inc., DocuPort, Inc...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-11

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] AccessTel, Inc., American Asset Management Corp., DME Interactive Holdings, Inc., DocuPort, Inc., and iCarbon Corp., Order of Suspension of Trading March 8, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the...

  19. 75 FR 6423 - Self-Regulatory Organizations; National Stock Exchange, Inc.; Notice of Filing and Immediate...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-09

    ... Orders of Securities Priced Under One Dollar in the Auto Execution Mode of Order Interaction to 0.25% of... for liquidity adding displayed orders of securities priced under one dollar in the Auto Execution mode of order interaction (``AutoEx'') \\3\\ to 0.25% of trade value. \\3\\ The Exchange's two modes of order...

  20. The association between paternal sensitivity and infant-father attachment security: a meta-analysis of three decades of research.

    PubMed

    Lucassen, Nicole; Tharner, Anne; Van Ijzendoorn, Marinus H; Bakermans-Kranenburg, Marian J; Volling, Brenda L; Verhulst, Frank C; Lambregtse-Van den Berg, Mijke P; Tiemeier, Henning

    2011-12-01

    For almost three decades, the association between paternal sensitivity and infant-father attachment security has been studied. The first wave of studies on the correlates of infant-father attachment showed a weak association between paternal sensitivity and infant-father attachment security (r = .13, p < .001, k = 8, N = 546). In the current paper, a meta-analysis of the association between paternal sensitivity and infant-father attachment based on all studies currently available is presented, and the change over time of the association between paternal sensitivity and infant-father attachment is investigated. Studies using an observational measure of paternal interactive behavior with the infant, and the Strange Situation Procedure to observe the attachment relationship were included. Paternal sensitivity is differentiated from paternal sensitivity combined with stimulation in the interaction with the infant. Higher levels of paternal sensitivity were associated with more infant-father attachment security (r = .12, p < .001, k = 16, N = 1,355). Fathers' sensitive play combined with stimulation was not more strongly associated with attachment security than sensitive interactions without stimulation of play. Despite possible changes in paternal role patterns, we did not find stronger associations between paternal sensitivity and infant attachment in more recent years.

  1. Parental Attachment Style: Examination of Links with Parent Secure Base Provision and Adolescent Secure Base Use

    PubMed Central

    Jones, Jason D.; Cassidy, Jude

    2014-01-01

    The secure base construct is a core aspect of attachment theory and, according to Bowlby (1988), represents one of attachment theory’s most important contributions to our understanding of parent-child relationships and child development. The present study represents the first examination of how parents’ self-reported attachment styles relate to parental secure base provision and adolescent (Mage = 16.6 years, SE = .59) secure base use during an observed parent-adolescent interaction. Further, the present study is the first to examine how fathers’, as well as mothers’, attachment styles relate to observed behavior in a parent-child interaction. At the bivariate level, maternal avoidance, but not anxiety, was negatively associated with observed adolescent secure base use. In addition, path analysis revealed that maternal avoidance was indirectly related to less adolescent secure base use through mothers’ self-reported hostile behavior toward their adolescents and through adolescents’ less positive perceptions of their mothers. Further, paternal anxiety, but not avoidance, was indirectly related to less adolescent secure base use through fathers’ self-reported hostile behavior toward their adolescents. No significant findings emerged in relation to parental secure base provision. We discuss these results in the context of attachment theory and suggest directions for future research. PMID:24897927

  2. 5 CFR 9701.351 - Setting an employee's starting pay.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Setting an employee's starting pay. 9701.351 Section 9701.351 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Pay Administration § 9701.351 Setting...

  3. Human detection in sensitive security areas through recognition of omega shapes using MACH filters

    NASA Astrophysics Data System (ADS)

    Rehman, Saad; Riaz, Farhan; Hassan, Ali; Liaquat, Muwahida; Young, Rupert

    2015-03-01

    Human detection has gained considerable importance in aggravated security scenarios over recent times. An effective security application relies strongly on detailed information regarding the scene under consideration. A larger accumulation of humans than the number of personal authorized to visit a security controlled area must be effectively detected, amicably alarmed and immediately monitored. A framework involving a novel combination of some existing techniques allows an immediate detection of an undesirable crowd in a region under observation. Frame differencing provides a clear visibility of moving objects while highlighting those objects in each frame acquired by a real time camera. Training of a correlation pattern recognition based filter on desired shapes such as elliptical representations of human faces (variants of an Omega Shape) yields correct detections. The inherent ability of correlation pattern recognition filters caters for angular rotations in the target object and renders decision regarding the existence of the number of persons exceeding an allowed figure in the monitored area.

  4. Risk analysis of information security in a mobile instant messaging and presence system for healthcare.

    PubMed

    Bønes, Erlend; Hasvold, Per; Henriksen, Eva; Strandenaes, Thomas

    2007-09-01

    Instant messaging (IM) is suited for immediate communication because messages are delivered almost in real time. Results from studies of IM use in enterprise work settings make us believe that IM based services may prove useful also within the healthcare sector. However, today's public instant messaging services do not have the level of information security required for adoption of IM in healthcare. We proposed MedIMob, our own architecture for a secure enterprise IM service for use in healthcare. MedIMob supports IM clients on mobile devices in addition to desktop based clients. Security threats were identified in a risk analysis of the MedIMob architecture. The risk analysis process consists of context identification, threat identification, analysis of consequences and likelihood, risk evaluation, and proposals for risk treatment. The risk analysis revealed a number of potential threats to the information security of a service like this. Many of the identified threats are general when dealing with mobile devices and sensitive data; others are threats which are more specific to our service and architecture. Individual threats identified in the risks analysis are discussed and possible counter measures presented. The risk analysis showed that most of the proposed risk treatment measures must be implemented to obtain an acceptable risk level; among others blocking much of the additional functionality of the smartphone. To conclude on the usefulness of this IM service, it will be evaluated in a trial study of the human-computer interaction. Further work also includes an improved design of the proposed MedIMob architecture. 2006 Elsevier Ireland Ltd

  5. Adult Attachment Styles Associated with Brain Activity in Response to Infant Faces in Nulliparous Women: An Event-Related Potentials Study

    PubMed Central

    Ma, Yuanxiao; Ran, Guangming; Chen, Xu; Ma, Haijing; Hu, Na

    2017-01-01

    Adult attachment style is a key for understanding emotion regulation and feelings of security in human interactions as well as for the construction of the caregiving system. The caregiving system is a group of representations about affiliative behaviors, which is guided by the caregiver’s sensitivity and empathy, and is mature in young adulthood. Appropriate perception and interpretation of infant emotions is a crucial component of the formation of a secure attachment relationship between infant and caregiver. As attachment styles influence the ways in which people perceive emotional information, we examined how different attachment styles associated with brain response to the perception of infant facial expressions in nulliparous females with secure, anxious, and avoidant attachment styles. The event-related potentials of 65 nulliparous females were assessed during a facial recognition task with joy, neutral, and crying infant faces. The results showed that anxiously attached females exhibited larger N170 amplitudes than those with avoidant attachment in response to all infant faces. Regarding the P300 component, securely attached females showed larger amplitudes to all infant faces in comparison with avoidantly attached females. Moreover, anxiously attached females exhibited greater amplitudes than avoidantly attached females to only crying infant faces. In conclusion, the current results provide evidence that attachment style differences are associated with brain responses to the perception of infant faces. Furthermore, these findings further separate the psychological mechanisms underlying the caregiving behavior of those with anxious and avoidant attachment from secure attachment. PMID:28484415

  6. One health security: an important component of the global health security agenda.

    PubMed

    Gronvall, Gigi; Boddie, Crystal; Knutsson, Rickard; Colby, Michelle

    2014-01-01

    The objectives of the Global Health Security Agenda (GHSA) will require not only a "One Health" approach to counter natural disease threats against humans, animals, and the environment, but also a security focus to counter deliberate threats to human, animal, and agricultural health and to nations' economies. We have termed this merged approach "One Health Security." It will require the integration of professionals with expertise in security, law enforcement, and intelligence to join the veterinary, agricultural, environmental, and human health experts essential to One Health and the GHSA. Working across such different professions, which occasionally have conflicting aims and different professional cultures, poses multiple challenges, but a multidisciplinary and multisectoral approach is necessary to prevent disease threats; detect them as early as possible (when responses are likely to be most effective); and, in the case of deliberate threats, find who may be responsible. This article describes 2 project areas that exemplify One Health Security that were presented at a workshop in January 2014: the US government and private industry efforts to reduce vulnerabilities to foreign animal diseases, especially foot-and-mouth disease; and AniBioThreat, an EU project to counter deliberate threats to agriculture by raising awareness and implementing prevention and response policies and practices.

  7. Baseline Measurements of Shoulder Surfing Analysis and Comparability for Smartphone Unlock Authentication

    DTIC Science & Technology

    2017-05-22

    Proceedings of the International Conference on Security and Management (SAM 󈧇) In Proceedings of the 2014 ACM SIGSAC Conference on Computer and...Communications Security (CCS ’14) In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’10) In Proceedings of the 3rd Symposium...on Usable Privacy and Security (SOUPS ’07) In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’12) In Proceedings of

  8. 77 FR 31186 - Security Zone; USS MISSISSIPPI Commissioning; Pascagoula Harbor & Pascagoula River; Pascagoula, MS

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-25

    ... significant effect on the human environment. This rule involves security during the arrival, commissioning... DEPARTMENT OF HOMELAND SECURITY Coast Guard 33 CFR Part 165 [Docket No. USCG-2012-0333] RIN 1625-AA87 Security Zone; USS MISSISSIPPI Commissioning; Pascagoula Harbor & Pascagoula River; Pascagoula, MS...

  9. Security, Extremism and Education: Safeguarding or Surveillance?

    ERIC Educational Resources Information Center

    Davies, Lynn

    2016-01-01

    This article analyses how education is positioned in the current concerns about security and extremism. This means firstly examining the different meanings of security (national, human and societal) and who provides security for whom. Initially, a central dilemma is acknowledged: that schooling appears to be simultaneously irrelevant to the huge…

  10. Gray Wave of the Great Transformation: A Satellite View of Urbanization, Climate, and Food Security

    NASA Technical Reports Server (NTRS)

    Imhoff, Marc L.

    2007-01-01

    Land cover change driven by human activity is profoundly affecting Earth's natural systems with impacts ranging from a loss of biological productivity to changes in atmospheric chemistry and regional and global climate. This change has been so pervasive and progressed so rapidly, compared to natural processes, scientists refer to it as 'the great transformation'. Urbanization or the 'gray wave' of this transformation is being increasingly recognized as an important process in global climate change. A hallmark of our success as a species, large urban conglomerates do in fact alter their environments so profoundly that the local climate, atmospheric composition, and the basic ecology of the landscape are affected in ways that have consequences to human health and economic well-being. Fortunately we have incredible new tools to observe and understand these processes in ways that can be used to plan and develop enjoyable and sustainable urban places. A suite of Earth observing satellites is making it possible to study the interactions between urbanization, biological processes, and the atmosphere including weather and climate. Using these Earth Observatories we are learning how urban heat islands form and potentially ameliorate them, how urbanization can affect rainfall, pollution, surface water recharge at the local level, and climate and food security globally.

  11. Promoting mother-infant interaction and infant mental health in low-income Korean families: attachment-based cognitive behavioral approach.

    PubMed

    Lee, Gyungjoo; McCreary, Linda; Breitmayer, Bonnie; Kim, Mi Ja; Yang, Soo

    2013-10-01

    This study evaluated the attachment-based cognitive behavioral approach (ACBA) to enhance mother-infant interaction and infant mental health. This quasi-experimental study used a pre-posttest control group design. Participants were 40 low-income, mother-infant (infant ages 12-36 months) dyads, 20 dyads per group. The ACBA group received 10 weekly 90-min sessions. Dependent variables were changes in mother-infant interaction and infant mental health. Additionally, we explored changes in mothers' attachment security. The groups differed significantly in changes in mother-infant interaction, infant mental health problems, and mothers' attachment security. ACBA may enhance mother-infant interaction and infants' mental health. © 2013, Wiley Periodicals, Inc.

  12. Computer science security research and human subjects: emerging considerations for research ethics boards.

    PubMed

    Buchanan, Elizabeth; Aycock, John; Dexter, Scott; Dittrich, David; Hvizdak, Erin

    2011-06-01

    This paper explores the growing concerns with computer science research, and in particular, computer security research and its relationship with the committees that review human subjects research. It offers cases that review boards are likely to confront, and provides a context for appropriate consideration of such research, as issues of bots, clouds, and worms enter the discourse of human subjects review.

  13. Changing Homeland Security: Shape, Patterns, Not Programs

    DTIC Science & Technology

    2006-10-01

    Nietzsche wrote about this process: To make plans and project designs brings with it many good sensations; and whoever had the strength to be...Friedrich Wilhelm Nietzsche , Human, All Too Human (Stanford University Press, 2000). 3 The phrase “homeland security community” and the pronoun “we

  14. 5 CFR 9701.518 - Duty to bargain, confer, and consult.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Duty to bargain, confer, and consult. 9701.518 Section 9701.518 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Labor-Management Relations § 9701.518 Duty to bargain, confer...

  15. 5 CFR 9701.346 - Pay progression for new supervisors.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Pay progression for new supervisors. 9701.346 Section 9701.346 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES... SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Performance-Based Pay § 9701.346 Pay...

  16. Examining Trust, Forgiveness and Regret as Computational Concepts

    NASA Astrophysics Data System (ADS)

    Marsh, Stephen; Briggs, Pamela

    The study of trust has advanced tremendously in recent years, to the extent that the goal of a more unified formalisation of the concept is becoming feasible. To that end, we have begun to examine the closely related concepts of regret and forgiveness and their relationship to trust and its siblings. The resultant formalisation allows computational tractability in, for instance, artificial agents. Moreover, regret and forgiveness, when allied to trust, are very powerful tools in the Ambient Intelligence (AmI) security area, especially where Human Computer Interaction and concrete human understanding are key. This paper introduces the concepts of regret and forgiveness, exploring them from social psychological as well as a computational viewpoint, and presents an extension to Marsh's original trust formalisation that takes them into account. It discusses and explores work in the AmI environment, and further potential applications.

  17. IMIRSEL: a secure music retrieval testing environment

    NASA Astrophysics Data System (ADS)

    Downie, John S.

    2004-10-01

    The Music Information Retrieval (MIR) and Music Digital Library (MDL) research communities have long noted the need for formal evaluation mechanisms. Issues concerning the unavailability of freely-available music materials have greatly hindered the creation of standardized test collections with which these communities could scientifically assess the strengths and weaknesses of their various music retrieval techniques. The International Music Information Retrieval Systems Evaluation Laboratory (IMIRSEL) is being developed at the University of Illinois at Urbana-Champaign (UIUC) specifically to overcome this hindrance to the scientific evaluation of MIR/MDL systems. Together with its subsidiary Human Use of Music Information Retrieval Systems (HUMIRS) project, IMIRSEL will allow MIR/MDL researchers access to the standardized large-scale collection of copyright-sensitive music materials and standardized test queries being housed at UIUC's National Center for Supercomputing Applications (NCSA). Virtual Research Labs (VRL), based upon NCSA's Data-to-Knowledge (D2K) tool set, are being developed through which MIR/MDL researchers will interact with the music materials under a "trusted code" security model.

  18. Human rights of persons with mental disabilities. The European Convention of Human Rights.

    PubMed

    Gostin, L O

    2000-01-01

    It is not necessary to recount the numerous charters and declarations ... to understand human rights.... All persons are born free and equal in dignity and rights. Everyone ... is entitled to all the rights and freedoms set forth in the international human rights instruments without discrimination, such as the rights to life, liberty, security of the person, privacy, health, education, work, social security, and to marry and found a family. Yet, violations of human rights are a reality to be found in every corner of the globe.

  19. Perception of Human-Derived Risk Influences Choice at Top of the Food Chain

    PubMed Central

    Cristescu, Bogdan; Stenhouse, Gordon B.; Boyce, Mark S.

    2013-01-01

    On human-used landscapes, animal behavior is a trade-off between maximizing fitness and minimizing human-derived risk. Understanding risk perception in wildlife can allow mitigation of anthropogenic risk, with benefits to long-term animal fitness. Areas where animals choose to rest should minimize risk from predators, which for large carnivores typically equate to humans. We hypothesize that high human activity leads to selection for habitat security, whereas low activity enables trading security for forage. We investigated selection of resting (bedding) sites by GPS radiocollared adult grizzly bears (n = 10) in a low density population on a multiple-use landscape in Canada. We compared security and foods at resting and random locations while accounting for land use, season, and time of day. On reclaimed mines with low human access, bears selected high horizontal cover far from trails, but did not avoid open (herbaceous) areas, resting primarily at night. In protected areas bears also bedded at night, in areas with berry shrubs and Hedysarum spp., with horizontal cover selected in the summer, during high human access. On public lands with substantial human recreation, bears bedded at day, selected resting sites with high horizontal cover in the summer and habitat edges, with bedding associated with herbaceous foods. These spatial and temporal patterns of selection suggest that bears perceive human-related risk differentially in relation to human activity level, season and time of day, and employ a security-food trade-off strategy. Although grizzly bears are presently not hunted in Alberta, their perceived risks associated with humans influence resting-site selection. PMID:24367549

  20. Signatures of human skin in the millimetre wave band (80-100) GHz

    NASA Astrophysics Data System (ADS)

    Owda, Amani Y.; Rezgui, Nacer-Ddine; Salmon, Neil A.

    2017-10-01

    With the performance of millimeter wave security screening imagers improving (reduced speckle, greater sensitivity, and better spatial resolution) attention is turning to identification of anomalies which appear on the human body. Key to this identification is the understanding of how the emissive and reflective properties vary over the human body and between different categories of people, defined by age and gender for example. As the interaction of millimetre waves with the human body is only a fraction of a millimetre into the skin, precise measurement of the emission and reflection of this radiation will allow comparisons with the norm for that region of the body and person category. On an automated basis at security screening portals, this will increase detection probabilities and reduce false alarm rates, ensuring high throughputs at entrances to future airport departure lounges and transport networks. A technique to measure the human skin emissivity in vivo over the frequency band 80 GHz to 100 GHz is described. The emissivities of the skin of a sample of 60 healthy participants (36 males and 24 females) measured using a 90 GHz calibrated radiometer was found to range from 0.17+/-0.002 to 0.68+/-0.002. The radiometric measurements were made at four locations on the arm, namely: palm of hand, back of hand, dorsal surface of the forearm, and volar side of the forearm, where the water content and the skin thickness are known to be different. These measurements show significant variation in emissivity from person to person and, more importantly, significant variation at different locations on the arms of individuals. Males were found to have an emissivity 0.03 higher than those of females. The emissivity of the back of the hand, where the skin is thinner and the blood vessels are closer to the skin surface, was found to be lower by 0.0681 than the emissivity of the palm of the hand, where the skin is thicker. The measurements also show that the emissivity of the volar side location where the blood vessels are closer to the skin surface is lower by 0.0677 than the emissivity of the dorsal surface location. The measured differences agree with those differences estimated by a half space electromagnetic model of the interaction and can be interpreted in terms of the differing water contents and skin thickness of those regions of the body.

  1. Usable SPACE: Security, Privacy, and Context for the Mobile User

    NASA Astrophysics Data System (ADS)

    Jutla, Dawn

    Users breach the security of data within many financial applications daily as human and/or business expediency to access and use information wins over corporate security policy guidelines. Recognizing that changing user context often requires different security mechanisms, we discuss end-to-end solutions combining several security and context mechanisms for relevant security control and information presentation in various mobile user situations. We illustrate key concepts using Dimitri Kanevskys (IBM Research) early 2000s patented inventions for voice security and classification.

  2. Relational Security Moderates the Effect of Serotonin Transporter Gene Polymorphism (5-HTTLPR) on Stress Generation and Depression among Adolescents

    PubMed Central

    Starr, Lisa R.; Hammen, Constance; Brennan, Patricia A.; Najman, Jake

    2012-01-01

    Previous research demonstrates that carriers of the short allele of the serotonin transporter gene (5-HTTLPR) show both greater susceptibility to depression in response to stressful life events and higher rates of generation of stressful events in response to depression. The current study examines relational security (i.e., self-reported beliefs about attachment security) as a moderator of these effects, building on emerging research suggesting that the short allele acts as a marker of sensitivity to the social environment. Participants were 354 Caucasian adolescents oversampled for maternal depression (137 male, 217 female), assessed at ages 15 and 20. Results indicated that the short allele predicted increased stress generation at age 20 among those with low age 15 security but decreased stress generation among those with high security, and revealed a three-way interaction between age 15 depression, age 15 security, and genotype, where depression predicted stress generation only among short allele carriers with low security. Further, among boys only, security interacted with genotype to predict longitudinal changes in depression diagnosis, with the s-allele predicting relative increases in probability of depression among boys with low security but decreases among boys with high security. Results support the notion of the short allele as a marker of social reactivity, and suggest that attachment security may buffer against the genetic vulnerability introduced by the short allele, in line with predictions of the differential susceptibility theory. PMID:23080078

  3. Dopaminergic, Serotonergic, and Oxytonergic Candidate Genes Associated with Infant Attachment Security and Disorganization? In Search of Main and Interaction Effects

    ERIC Educational Resources Information Center

    Luijk, Maartje P. C. M.; Roisman, Glenn I.; Haltigan, John D.; Tiemeier, Henning; Booth-LaForce, Cathryn; van IJzendoorn, Marinus H.; Belsky, Jay; Uitterlinden, Andre G.; Jaddoe, Vincent W. V.; Hofman, Albert; Verhulst, Frank C.; Tharner, Anne; Bakermans-Kranenburg, Marian J.

    2011-01-01

    Background and methods: In two birth cohort studies with genetic, sensitive parenting, and attachment data of more than 1,000 infants in total, we tested main and interaction effects of candidate genes involved in the dopamine, serotonin, and oxytocin systems ("DRD4", "DRD2", "COMT", "5-HTT", "OXTR") on attachment security and disorganization.…

  4. 48 CFR 339.7102 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Section 339.7102 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7102 Applicability... Federal Information Security Management Act (FISMA), the HHS-OCIO Information Systems Security and Privacy...

  5. 48 CFR 339.7102 - Applicability.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Section 339.7102 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7102 Applicability... Federal Information Security Management Act (FISMA), the HHS-OCIO Information Systems Security and Privacy...

  6. 48 CFR 339.7102 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Section 339.7102 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7102 Applicability... Federal Information Security Management Act (FISMA), the HHS-OCIO Information Systems Security and Privacy...

  7. 48 CFR 339.7102 - Applicability.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Section 339.7102 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7102 Applicability... Federal Information Security Management Act (FISMA), the HHS-OCIO Information Systems Security and Privacy...

  8. Insecure Behaviors on Mobile Devices Under Stress

    DTIC Science & Technology

    2014-04-08

    a text or in an email . The most secure network is only as secure as its most careless user. Thus, in the current project we sought to discover the...challenges in mobile security is human behavior. The most secure password may be useless if it is sent as a text or in an email . The most secure network...The most secure password may be useless if it is sent as a text or in an email . The most secure network is only as secure as its most careless user

  9. Securitizing the Arctic indigenous peoples: A community security perspective with special reference to the Sámi of the European high north

    NASA Astrophysics Data System (ADS)

    Hossain, Kamrul

    2016-09-01

    The theory of securitization-the so-called Copenhagen school-centers the concept of security on various identified threats. Security based on the collective identity by which a society preserves its essential characteristics has been defined as community security, or societal security. The underlying principle of the Copenhagen school is that state-based, sovereignty-oriented security is ineffective unless the other components of security threats are addressed. The concept of human security, developed nearly simultaneously to that of securitization, identifies threat components at the sub-state level which are not traditionally understood as security concerns. Both schools of security thought are similar as they offer nontraditional approaches to understanding the concept of security. In this article, I explore securitization theory and the concept of human security to elaborate community perspectives in the understanding of security. In a case study, I investigate the security concerns of the indigenous peoples of the Arctic. The transformation of the Arctic by climate change and its impacts has resulted in new challenges and opportunities, so I explore how indigenous peoples in general and the Sámi in particular understand security which promotes their societal security. Although I show that this group of people deserves recognition and the ability to exercise greater authority, I conclude that diverse concepts of security do not by any means undermine the core traditional concept of security. These aspects of security remain subject to scrutiny by states and exist in a vertical structure. The Sámi, therefore, rely on affirmative actions by states to enjoy greater rights to maintain their community security.

  10. Infant emotion regulation: relations to bedtime emotional availability, attachment security, and temperament.

    PubMed

    Kim, Bo-Ram; Stifter, Cynthia A; Philbrook, Lauren E; Teti, Douglas M

    2014-11-01

    The present study examines the influences of mothers' emotional availability toward their infants during bedtime, infant attachment security, and interactions between bedtime parenting and attachment with infant temperamental negative affectivity, on infants' emotion regulation strategy use at 12 and 18 months. Infants' emotion regulation strategies were assessed during a frustration task that required infants to regulate their emotions in the absence of parental support. Whereas emotional availability was not directly related to infants' emotion regulation strategies, infant attachment security had direct relations with infants' orienting toward the environment and tension reduction behaviors. Both maternal emotional availability and security of the mother-infant attachment relationship interacted with infant temperamental negative affectivity to predict two strategies that were less adaptive in regulating frustration. Copyright © 2014 Elsevier Inc. All rights reserved.

  11. The Contribution of the Spanish Guardia Civil to the Peace and Stability Operations Within the Human Security Framework

    DTIC Science & Technology

    2010-03-08

    1999.- U.N. Civilian Police component in Kosovo (UNMIK.) 2000.- Oficina del Programa de Irak (no es especificamente una misi6n de paz) 2000.- Special...community security, and political security. Nevertheless, it is worth pointing out that the establishment and the inclusion of an agenda based on the human...model the pattern set in France by the Gendarmerie and in Catalonia by the existing Mossos de Escuadra. The Dulce of Ahumada personally shaped this new

  12. OAS - Organization of American States: Democracy for peace, security, and

    Science.gov Websites

    Elections Environment Equity G General Assembly Governance H Human Development Human Rights I Indigenous Security R Racism and Intolerance Refugees S Scholarships School of Governance Science and Technology Social Development Summits of the Americas Sustainable Development T Telecommunications Terrorism Tourism

  13. 45 CFR 5b.8 - Appeals of refusals to correct or amend records.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Statistics, National Institute of Education, and Office of Education. (iv) Assistant Secretary for Human Development for records of the Office of Human Development. (v) Commissioner of Social Security for records of the Social Security Administration. (vi) Administrator, Social and Rehabilitation Service for the...

  14. 45 CFR 5b.8 - Appeals of refusals to correct or amend records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Statistics, National Institute of Education, and Office of Education. (iv) Assistant Secretary for Human Development for records of the Office of Human Development. (v) Commissioner of Social Security for records of the Social Security Administration. (vi) Administrator, Social and Rehabilitation Service for the...

  15. Securing Resources in Collaborative Environments: A Peer-to-peerApproach

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Berket, Karlo; Essiari, Abdelilah; Thompson, Mary R.

    2005-09-19

    We have developed a security model that facilitates control of resources by autonomous peers who act on behalf of collaborating users. This model allows a gradual build-up of trust. It enables secure interactions among users that do not necessarily know each other and allows them to build trust over the course of their collaboration. This paper describes various aspects of our security model and describes an architecture that implements this model to provide security in pure peer-to-peer environments.

  16. Quality and security - They work together

    NASA Technical Reports Server (NTRS)

    Carr, Richard; Tynan, Marie; Davis, Russell

    1991-01-01

    This paper describes the importance of considering computer security as part of software quality assurance practice. The intended audience is primarily those professionals involved in the design, development, and quality assurance of software. Many issues are raised which point to the need ultimately for integration of quality assurance and computer security disciplines. To address some of the issues raised, the NASA Automated Information Security program is presented as a model which may be used for improving interactions between the quality assurance and computer security community of professionals.

  17. Predictors of mother-child interaction quality and child attachment security in at-risk families.

    PubMed

    De Falco, Simona; Emer, Alessandra; Martini, Laura; Rigo, Paola; Pruner, Sonia; Venuti, Paola

    2014-01-01

    Child healthy development is largely influenced by parent-child interaction and a secure parent-child attachment is predictively associated with positive outcomes in numerous domains of child development. However, the parent-child relationship can be affected by several psychosocial and socio-demographic risk factors that undermine its quality and in turn play a negative role in short and long term child psychological health. Prevention and intervention programs that support parenting skills in at-risk families can efficiently reduce the impact of risk factors on mother and child psychological health. This study examines predictors of mother-child interaction quality and child attachment security in a sample of first-time mothers with psychosocial and/or socio-demographic risk factors. Forty primiparous women satisfying specific risk criteria participated in a longitudinal study with their children from pregnancy until 18 month of child age. A multiple psychological and socioeconomic assessment was performed. The Emotional Availability Scales were used to measure the quality of emotional exchanges between mother and child at 12 months and the Attachment Q-Sort served as a measure of child attachment security at 18 months. Results highlight both the effect of specific single factors, considered at a continuous level, and the cumulative risk effect of different co-occurring factors, considered at binary level, on mother-child interaction quality and child attachment security. Implication for the selection of inclusion criteria of intervention programs that support parenting skills in at-risk families are discussed.

  18. 45 CFR 164.318 - Compliance dates for the initial implementation of the security standards.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 1 2011-10-01 2011-10-01 false Compliance dates for the initial implementation of the security standards. 164.318 Section 164.318 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection...

  19. 45 CFR 164.318 - Compliance dates for the initial implementation of the security standards.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 1 2014-10-01 2014-10-01 false Compliance dates for the initial implementation of the security standards. 164.318 Section 164.318 Public Welfare Department of Health and Human Services ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection...

  20. An Overview of Soils and Human Health - Research Trends and Future Needs

    NASA Astrophysics Data System (ADS)

    Brevik, Eric C.; Burgess, Lynn C.; Steffan, Joshua J.; Cerdà, Artemi

    2017-04-01

    Soils have significant impact on human health, whether those influences are positive or negative, direct or indirect. Soils are a significant source of nutrients in our food supply and medications such as antibiotics. However, nutrient imbalances and the presence of human pathogens in the soil biological community can cause negative impacts on health. There are also many locations where various elements or chemical compounds are found in soils at toxic levels, due to either natural conditions or anthropogenic activities. The soils of urban environments have received increased attention in the last few years, and they too pose a number of human health questions and challenges. Concepts such as soil security may provide a framework within which soils and human health issues can be investigated using interdisciplinary and transdisciplinary approaches, as it will take the contributions of experts in a number of different scientific, medical, and social science fields to fully address soils and human health issues. While much progress was made in understanding links between soils and human health over the last century, there is still much we do not know and the interactions between soils and human health are extremely complex. Therefore, there is still significant need for research in this important area.

  1. Indicators of State Failure: Phase 2

    DTIC Science & Technology

    2010-08-01

    List - Security & Crime ................................................................................ 75  Table 19: Cluster List - Human... crime , environment, human development, and population and demography lines as shown in Figure 21. DRDC Toronto: Adversarial Intent Section CR 2010...Security & Crime Human Develop ment Demogra phy Environ ment Sudan 7.02 7.35 6.88 6.75 7.86 6.62 8.03 7.85 6.51 5.27 Afghanistan 6.93 7.40 7.09 6.24

  2. Analysis of Human Disturbance and Ecological Security Evolution in Oasis in Arid Area Based on LUCC: A Case Study of Oasis in the Northern Tianshan Mountain Slope Economic Zone

    NASA Astrophysics Data System (ADS)

    Song, W. J.; Chen, M. H.; Zhang, Q.; Liu, S. S.; Yang, J. N.

    2017-07-01

    Oases in arid areas are environmentally and economically vulnerable regions. Study on ecological security of oases in arid areas is of great significance to the stability and the economic development of oases. Based on Land Use/Land Cover data in 1965, 1980, 1995, 2005 and 2015, the study analyze the temporal and spatial changes in human disturbance and ecological security of oases in the Northern Tianshan Mountain Slope Economic Zone (NTMSEZ) in recent 50 years by establishing the ecological security index (ESI) through human disturbance index and landscape vulnerability index. The results showed that: in recent 50 years, the human disturbance of the NTMSEZ has been increased to current moderate human impacts. Urban construction, oasis expansion and farmland reclamation are the main factors of the increment. The human disturbance in Urumchi, Shihezi, Kuitun, Miquan and Changji is higher than that in other oases and that in core areas of oasis is higher than other areas. The ESI of the NTMSEZ increases firstly and then decreases. In most areas, the ESI is “relatively unsafe” and “critical”. However, there are increasingly more vulnerable areas, moving northwestwards and expanding southwards. The ESI gradually presents a “NW-SE” trend of zonal distribution pattern.

  3. Why the poor pay with their lives: oil pipeline vandalisation, fires and human security in Nigeria.

    PubMed

    Onuoha, Freedom C

    2009-07-01

    Since its discovery in Nigeria in 1956 crude oil has been a source of mixed blessing to the country. It is believed to have generated enormous wealth, but it has also claimed a great many lives. Scholarly attention on the impact of oil on security in Nigeria has largely focused on internal conflicts rather than on how disasters associated with oil pipeline vandalisation have impacted on human security in terms of causing bodily injuries and death, destroying livelihoods and fracturing families. This paper examines how pipeline vandalisation affects human security in these ways. It identifies women and children as those who are hardest hit and questions why the poor are the most vulnerable in oil pipeline disasters in this country. It recommends the adoption of a comprehensive and integrated framework of disaster management that will ensure prompt response to key early warning signs, risk-reduction and appropriate mitigation and management strategies.

  4. Parent-Adolescent Relationship Qualities, Internal Working Models, and Styles as Predictors of Adolescents’ Observed Interactions with Friends

    PubMed Central

    Shomaker, Lauren B.; Furman, Wyndol

    2010-01-01

    This study examined how current parent-adolescent relationship qualities and adolescents’ representations of relationships with parents were related to friendship interactions in 200 adolescent-close friend dyads. Adolescents and friends were observed discussing problems during a series of structured tasks. Negative interactions with mothers were significantly related to adolescents’ greater conflict with friends, poorer focus on tasks, and poorer communication skills. Security of working models (as assessed by interview) was significantly associated with qualities of friendship interactions, whereas security of attachment styles (as assessed by questionnaire) was not. More dismissing (vs. secure) working models were associated with poorer focus on problem discussions and weaker communication skills with friends, even after accounting for gender differences and current parent-adolescent relationship qualities. We discuss possible mechanisms for the observed links between dimensions of parent-adolescent relationships and friendships. We also consider methodological and conceptual differences between working model and style measures of attachment representations. PMID:20174459

  5. Attachment, attractiveness, and social interaction: a diary study.

    PubMed

    Tidwell, M C; Reis, H T; Shaver, P R

    1996-10-01

    To what extent are attachment styles manifested in natural social activity? A total of 125 participants categorized as possessing secure, avoidant, or anxious-ambivalent attachment styles kept structured social interaction diaries for 1 week. Several theoretically important findings emerged. First, compared with secure and anxious-ambivalent persons, avoidant persons reported lower levels of intimacy, enjoyment, promotive interaction, and positive emotions, and higher levels of negative emotions, primarily in opposite-sex interactions. Analyses indicated that avoidant persons may structure social activities in ways that minimize closeness. Second, secure people differentiated more clearly than either insecure group between romantic and other opposite-sex partners. Third, the subjective experiences of anxious-ambivalent persons were more variable than those of the other groups. Finally, the authors examined and rejected the possibility that attachment effects might be confounded with physical attractiveness. These findings suggest that feeling and behaviors that arise during spontaneous, everyday social activity may contribute to the maintenance of attachment styles in adulthood.

  6. 31 CFR 132.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...

  7. 12 CFR 233.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...

  8. 12 CFR 233.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...

  9. 31 CFR 132.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...

  10. 12 CFR 233.2 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...

  11. 12 CFR 233.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... transaction provider, or any interactive computer service or telecommunications service); and (5) Does not include— (i) Any activity governed by the securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as...

  12. 77 FR 22835 - Notice of Passenger Facility Charge (PFC) Approvals and Disapprovals

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-17

    ... Description of Projects Approved for Collection and Use: Install primary crash network. Security enhancements--access control 1. Acquire computer based interactive training system. Security enhancements--access...

  13. The quadruple squeeze: defining the safe operating space for freshwater use to achieve a triply green revolution in the anthropocene.

    PubMed

    Rockström, Johan; Karlberg, Louise

    2010-05-01

    Humanity has entered a new phase of sustainability challenges, the Anthropocene, in which human development has reached a scale where it affects vital planetary processes. Under the pressure from a quadruple squeeze-from population and development pressures, the anthropogenic climate crisis, the anthropogenic ecosystem crisis, and the risk of deleterious tipping points in the Earth system-the degrees of freedom for sustainable human exploitation of planet Earth are severely restrained. It is in this reality that a new green revolution in world food production needs to occur, to attain food security and human development over the coming decades. Global freshwater resources are, and will increasingly be, a fundamental limiting factor in feeding the world. Current water vulnerabilities in the regions in most need of large agricultural productivity improvements are projected to increase under the pressure from global environmental change. The sustainability challenge for world agriculture has to be set within the new global sustainability context. We present new proposed sustainability criteria for world agriculture, where world food production systems are transformed in order to allow humanity to stay within the safe operating space of planetary boundaries. In order to secure global resilience and thereby raise the chances of planet Earth to remain in the current desired state, conducive for human development on the long-term, these planetary boundaries need to be respected. This calls for a triply green revolution, which not only more than doubles food production in many regions of the world, but which also is environmentally sustainable, and invests in the untapped opportunities to use green water in rainfed agriculture as a key source of future productivity enhancement. To achieve such a global transformation of agriculture, there is a need for more innovative options for water interventions at the landscape scale, accounting for both green and blue water, as well as a new focus on cross-scale interactions, feed-backs and risks for unwanted regime shifts in the agro-ecological landscape.

  14. The science of human security: a response from political science.

    PubMed

    Roberts, David

    2008-01-01

    The concept of human security has developed in significance in the last decade to the point that its meaning and validity is hotly contested in the field of international relations, security, and development studies. A key consideration relates to its ambiguity at best and its amorphousness at worst. Medical scholarship proposes approaches that may render more meaningful the concept. However, collaboration and co-operation between political scientists and medical practitioners offers even greater potential to this vital programme. The latter offer the technical and methodological skills and approaches lacking in political science, whilst the former develop political frameworks to shift the causal focus towards human, institutional and structural agency in mass avoidable global civilian mortality.

  15. International migration: security concerns and human rights standards.

    PubMed

    Crépeau, François; Nakache, Delphine; Atak, Idil

    2007-09-01

    Over the last two decades, the reinforcement of security-related migration policies has resulted in the perception of the foreigner, and especially the irregular migrant, as a category outside the circle of legality. The rights of foreigners in host countries have deteriorated due to the connection made between immigration and criminality. Restrictions imposed upon irregular migrants' basic political and civil rights have been accompanied by major obstacles to their access to economic and social rights, including the right to health. The events of 9/11 further contributed to this trend, which contradicts the basic premises of the human rights paradigm. Recent policy developments and ongoing international cooperation implementing systematic interception and interdiction mechanisms have led to the securitization of migration. The preventive and deterrent measures reinforce the security paradigm. By contrast, various national and international actors have been successful in defending irregular migrants' rights. At the domestic level, the involvement of the judiciary and civil society enhances the rights-based approach to foreigners. The role of judges is vital in holding policy-makers accountable for respecting the high national standards of human rights protection. This article elaborates on the dichotomy between the state's legitimate interest to ensure national security, and its domestic and international obligations to protect human rights for all, including irregular migrants. It focuses on the changing relationship between migration and security, on the one hand, and between state and individual, on the other hand. It affirms the necessity to recognize the pre-eminence of fundamental rights upon security concerns.

  16. Interactive Electronic Circuit Simulation on Small Computer Systems

    DTIC Science & Technology

    1979-11-01

    longer needed. Do not return it to the originator. UNCLASSIFIED SECURITY CLASSIFICATION OF THIS PAGE (Whan Dots Entered) REPORT DOCUMENTATION PAGE... CLASSIFICATION OF THIS PAGE(H7i»n Data Entend) Interactive-mode circuit simulation and batch-mode circuit simulation on minicomputers are compared...on the circuit Q. For circuits with Q less than 1, this ratio is typically 10:1. UNCLASSIFIED 2 SECURITY CLASSIFICATION OF THIS PAGEflWiim Data

  17. Analysis Of Using Firewall And Single Honeypot In Training Attack On Wireless Network

    NASA Astrophysics Data System (ADS)

    Mohd. Diansyah, Tengku.; Faisal, Ilham; Perdana, Adidtya; Octaviani Sembiring, Boni; Hidayati Sinaga, Tantri

    2017-12-01

    Security issues become one of the important aspects of a network, especially a network security on the server. These problems underlie the need to build a system that can detect threats from parties who do not have access rights (hackers) that are by building a security system honeypot. A Honeypot is a diversion of intruders' attention, in order for intruders to think that it has managed to break down and retrieve data from a network, when in fact the data is not important and the location is isolated. A way to trap or deny unauthorized use of effort in an information system. One type of honeypot is honeyd. Honeyd is a low interaction honeypot that has a smaller risk compared to high interaction types because the interaction with the honeypot does not directly involve the real system. The purpose of the implementation of honeypot and firewall, firewall is used on Mikrotik. Can be used as an administrative tool to view reports of Honeyd generated activity and administrators can also view reports that are stored in the logs in order to assist in determining network security policies.

  18. Assessing uncertainties in surface water security: An empirical multimodel approach

    NASA Astrophysics Data System (ADS)

    Rodrigues, Dulce B. B.; Gupta, Hoshin V.; Mendiondo, Eduardo M.; Oliveira, Paulo Tarso S.

    2015-11-01

    Various uncertainties are involved in the representation of processes that characterize interactions among societal needs, ecosystem functioning, and hydrological conditions. Here we develop an empirical uncertainty assessment of water security indicators that characterize scarcity and vulnerability, based on a multimodel and resampling framework. We consider several uncertainty sources including those related to (i) observed streamflow data; (ii) hydrological model structure; (iii) residual analysis; (iv) the method for defining Environmental Flow Requirement; (v) the definition of critical conditions for water provision; and (vi) the critical demand imposed by human activities. We estimate the overall hydrological model uncertainty by means of a residual bootstrap resampling approach, and by uncertainty propagation through different methodological arrangements applied to a 291 km2 agricultural basin within the Cantareira water supply system in Brazil. Together, the two-component hydrograph residual analysis and the block bootstrap resampling approach result in a more accurate and precise estimate of the uncertainty (95% confidence intervals) in the simulated time series. We then compare the uncertainty estimates associated with water security indicators using a multimodel framework and the uncertainty estimates provided by each model uncertainty estimation approach. The range of values obtained for the water security indicators suggests that the models/methods are robust and performs well in a range of plausible situations. The method is general and can be easily extended, thereby forming the basis for meaningful support to end-users facing water resource challenges by enabling them to incorporate a viable uncertainty analysis into a robust decision-making process.

  19. Online trust, trustworthiness, or assurance?

    PubMed

    Cheshire, Coye

    2011-01-01

    Every day, individuals around the world retrieve, share, and exchange information on the Internet. We interact online to share personal information, find answers to questions, make financial transactions, play social games, and maintain professional and personal relationships. Sometimes our online interactions take place between two or more humans. In other cases, we rely on computers to manage information on our behalf. In each scenario, risk and uncertainty are essential for determining possible actions and outcomes. This essay highlights common deficiencies in our understanding of key concepts such as trust, trustworthiness, cooperation, and assurance in online environments. Empirical evidence from experimental work in computer-mediated environments underscores the promises and perils of overreliance on security and assurance structures as replacements for interpersonal trust. These conceptual distinctions are critical because the future shape of the Internet will depend on whether we build assurance structures to limit and control ambiguity or allow trust to emerge in the presence of risk and uncertainty.

  20. 32 CFR 651.11 - Environmental review categories.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... of human life or property in order to comply with this part or the CEQ regulations. However, the Army..., consistent with protecting human life, property, and national security. State call-ups of ARNG during a... impacts, such as those to promote national defense or security or to protect life or property, without the...

  1. Service Oriented Architecture Security Risks and their Mitigation

    DTIC Science & Technology

    2012-10-01

    this section can be mitigated by making use of suitable authentication , confidentiality, integrity, and authorisation standards such as Security...for authorisation . Machines/non-human users should be clearly identified and authenticated by the identity provision and authentication services... authentication , any security related attributes for the subject, and the authorisation decisions given based on the security and privilege attributes

  2. How Attitude toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention

    ERIC Educational Resources Information Center

    Johnson, David P.

    2017-01-01

    The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human…

  3. Explore with Us

    NASA Technical Reports Server (NTRS)

    Morales, Lester

    2012-01-01

    The fundamental goal of this vision is to advance U.S. scientific, security and economic interest through a robust space exploration program. Implement a sustained and affordable human and robotic program to explore the solar system and beyond. Extend human presence across the solar system, starting with a human return to the Moon by the year 2020, in preparation for human exploration of Mars and other destinations. Develop the innovative technologies, knowledge, and infrastructures both to explore and to support decisions about the destinations for human exploration. Promote international and commercial participation in exploration to further U.S. scientific, security, and economic interests.

  4. Interacting forms of expertise in security governance: the example of CCTV surveillance at Geneva International Airport.

    PubMed

    Klauser, Francisco

    2009-06-01

    The paper investigates the multiple public-private exchanges and cooperation involved in the installation and development of CCTV surveillance at Geneva International Airport. Emphasis is placed on the interacting forms of authority and expertise of five parties: the user(s), owner and supplier of the camera system, as well as the technical managers of the airport and the Swiss regulatory bodies in airport security. While placing the issues of airport surveillance in the particular context of a specific range of projects and transformations relating to the developments of CCTV at Geneva Airport, the paper not only provides important insights into the micro-politics of surveillance at Geneva Airport, but aims to re-institute these as part of a broader 'problematic': the mediating role of expertise and the growing functional fragmentation of authority in contemporary security governance. On this basis, the paper also exemplifies the growing mutual interdependences between security and business interests in the ever growing 'surveillant assemblage' in contemporary security governance.

  5. Interactive telemedicine solution based on a secure mHealth application.

    PubMed

    Eldeib, Ayman M

    2014-01-01

    In dynamic healthcare environments, caregivers and patients are constantly moving. To increase the healthcare quality when it is necessary, caregivers need the ability to reach each other and securely access medical information and services from wherever they happened to be. This paper presents an Interactive Telemedicine Solution (ITS) to facilitate and automate the communication within a healthcare facility via Voice over Internet Protocol (VOIP), regular mobile phones, and Wi-Fi connectivity. Our system has the capability to exchange/provide securely healthcare information/services across geographic barriers through 3G/4G wireless communication network. Our system assumes the availability of an Electronic Health Record (EHR) system locally in the healthcare organization and/or on the cloud network such as a nation-wide EHR system. This paper demonstrate the potential of our system to provide effectively and securely remote healthcare solution.

  6. Social Security and divorce or death benefits storyboard (S(2)D(2)BS): an interactive participant learning exercise.

    PubMed

    Brown, Pamela Pitman

    2014-01-01

    Using the concept of an interactive or living storyboard, the author discusses the use of seven case narratives constructed for the sole purpose of teaching introductory gerontology or geriatric students about the distribution of Social Security benefits after spousal death. Additional information is included pertaining to Social Security benefits payable to divorced persons after the death of the former spouse, including the status of married same-sex couples. Narratives include representations of a male breadwinner model couple, a two-earner couple who have similar/dissimilar earnings prior to retirement, a divorced couple with a remarriage after a death, a gay couple with and without children, and a female primary breadwinner couple. Updated information from the Social Security Administration, as well as information on game preparation, scripts, and debriefing questions are included.

  7. A vital link: water and vegetation in the Anthropocene

    NASA Astrophysics Data System (ADS)

    Gerten, D.

    2013-10-01

    This paper argues that the interplay of water, carbon and vegetation dynamics fundamentally links some global trends in the current and conceivable future Anthropocene, such as cropland expansion, freshwater use, and climate change and its impacts. Based on a review of recent literature including geographically explicit simulation studies with the process-based LPJmL global biosphere model, it demonstrates that the connectivity of water and vegetation dynamics is vital for water security, food security and (terrestrial) ecosystem dynamics alike. The water limitation of net primary production of both natural and agricultural plants - already pronounced in many regions - is shown to increase in many places under projected climate change, though this development is partially offset by water-saving direct CO2 effects. Natural vegetation can to some degree adapt dynamically to higher water limitation, but agricultural crops usually require some form of active management to overcome it - among them irrigation, soil conservation and eventually shifts of cropland to areas that are less water-limited due to more favourable climatic conditions. While crucial to secure food production for a growing world population, such human interventions in water-vegetation systems have, as also shown, repercussions on the water cycle. Indeed, land use changes are shown to be the second-most important influence on the terrestrial water balance in recent times. Furthermore, climate change (warming and precipitation changes) will in many regions increase irrigation demand and decrease water availability, impeding rainfed and irrigated food production (if not CO2 effects counterbalance this impact - which is unlikely at least in poorly managed systems). Drawing from these exemplary investigations, some research perspectives on how to further improve our knowledge of human-water-vegetation interactions in the Anthropocene are outlined.

  8. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... Undersecretary for Management. The Compensation Committee has 14 members, including 4 officials of labor...

  9. The interaction between electromagnetic fields at megahertz, gigahertz and terahertz frequencies with cells, tissues and organisms: risks and potential

    PubMed Central

    Begley, Ryan; Harvey, Alan R.; Hool, Livia; Wallace, Vincent P.

    2017-01-01

    Since regular radio broadcasts started in the 1920s, the exposure to human-made electromagnetic fields has steadily increased. These days we are not only exposed to radio waves but also other frequencies from a variety of sources, mainly from communication and security devices. Considering that nearly all biological systems interact with electromagnetic fields, understanding the affects is essential for safety and technological progress. This paper systematically reviews the role and effects of static and pulsed radio frequencies (100–109 Hz), millimetre waves (MMWs) or gigahertz (109–1011 Hz), and terahertz (1011–1013 Hz) on various biomolecules, cells and tissues. Electromagnetic fields have been shown to affect the activity in cell membranes (sodium versus potassium ion conductivities) and non-selective channels, transmembrane potentials and even the cell cycle. Particular attention is given to millimetre and terahertz radiation due to their increasing utilization and, hence, increasing human exposure. MMWs are known to alter active transport across cell membranes, and it has been reported that terahertz radiation may interfere with DNA and cause genomic instabilities. These and other phenomena are discussed along with the discrepancies and controversies from published studies. PMID:29212756

  10. The Pathogen-Host Interactions database (PHI-base): additions and future developments.

    PubMed

    Urban, Martin; Pant, Rashmi; Raghunath, Arathi; Irvine, Alistair G; Pedro, Helder; Hammond-Kosack, Kim E

    2015-01-01

    Rapidly evolving pathogens cause a diverse array of diseases and epidemics that threaten crop yield, food security as well as human, animal and ecosystem health. To combat infection greater comparative knowledge is required on the pathogenic process in multiple species. The Pathogen-Host Interactions database (PHI-base) catalogues experimentally verified pathogenicity, virulence and effector genes from bacterial, fungal and protist pathogens. Mutant phenotypes are associated with gene information. The included pathogens infect a wide range of hosts including humans, animals, plants, insects, fish and other fungi. The current version, PHI-base 3.6, available at http://www.phi-base.org, stores information on 2875 genes, 4102 interactions, 110 host species, 160 pathogenic species (103 plant, 3 fungal and 54 animal infecting species) and 181 diseases drawn from 1243 references. Phenotypic and gene function information has been obtained by manual curation of the peer-reviewed literature. A controlled vocabulary consisting of nine high-level phenotype terms permits comparisons and data analysis across the taxonomic space. PHI-base phenotypes were mapped via their associated gene information to reference genomes available in Ensembl Genomes. Virulence genes and hotspots can be visualized directly in genome browsers. Future plans for PHI-base include development of tools facilitating community-led curation and inclusion of the corresponding host target(s). © The Author(s) 2014. Published by Oxford University Press on behalf of Nucleic Acids Research.

  11. 31 CFR 132.2 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... (which does not include the activities of a financial transaction provider, or any interactive computer... securities laws (as that term is defined in section 3(a)(47) of the Securities Exchange Act of 1934 (15 U.S.C. 78c(a)(47)) for the purchase or sale of securities (as that term is defined in section 3(a)(10) of...

  12. Energetic Passivity of the Human Ankle Joint.

    PubMed

    Lee, Hyunglae; Hogan, Neville

    2016-12-01

    Understanding the passive or nonpassive behavior of the neuromuscular system is important to design and control robots that physically interact with humans, since it provides quantitative information to secure coupled stability while maximizing performance. This has become more important than ever apace with the increasing demand for robotic technologies in neurorehabilitation. This paper presents a quantitative characterization of passive and nonpassive behavior of the ankle of young healthy subjects, which provides a baseline for future studies in persons with neurological impairments and information for future developments of rehabilitation robots, such as exoskeletal devices and powered prostheses. Measurements using a wearable ankle robot actuating 2 degrees-of-freedom of the ankle combined with curl analysis and passivity analysis enabled characterization of both quasi-static and steady-state dynamic behavior of the ankle, unavailable from single DOF studies. Despite active neuromuscular control over a wide range of muscle activation, in young healthy subjects passive or dissipative ankle behavior predominated.

  13. Climate Change and Risks to National Security

    NASA Astrophysics Data System (ADS)

    Titley, D.

    2017-12-01

    Climate change impacts national security in three ways: through changes in the operating environments of the military; by increasing risks to security infrastructure, specifically bases and training ranges; and by exacerbating and accelerating the risks of state collapse and conflict in regions that are already fragile and unstable. Additionally there will be unique security challenges in the Arctic as sea-ice melts out and human activities increase across multiple dimensions. Military forces will also likely see increased demand for Humanitarian Assistance and Disaster Relief resulting from a combination of increased human population, rising sea-level, and potentially stronger and wetter storms. The talk will explore some of the lesser known aspects of these changes, examine selected climate-driven 'wild cards' that have the potential to disrupt regional and global security, and explore how migration in the face of a changing climate may heighten security issues. I will assess the positions U.S. executive and legislative branches with respect to climate & security, and how those positions have evolved since the November 2016 election, sometimes in counter-intuitive ways. The talk will close with some recommended courses of action the security enterprise can take to manage this climate risk.

  14. 32 CFR 154.60 - Evaluating continued security eligibility.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ....60 Section 154.60 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY... assess the future trustworthiness of an individual in terms of the likelihood of the individual... that any human being will remain trustworthy. Accordingly the issuance of a personnel security...

  15. 32 CFR 154.60 - Evaluating continued security eligibility.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ....60 Section 154.60 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY... assess the future trustworthiness of an individual in terms of the likelihood of the individual... that any human being will remain trustworthy. Accordingly the issuance of a personnel security...

  16. 32 CFR 154.60 - Evaluating continued security eligibility.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ....60 Section 154.60 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY... assess the future trustworthiness of an individual in terms of the likelihood of the individual... that any human being will remain trustworthy. Accordingly the issuance of a personnel security...

  17. 5 CFR 9701.313 - Homeland Security Compensation Committee.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... to provide options and/or recommendations for consideration by the Secretary or designee on strategic...

  18. 45 CFR 303.30 - Securing medical support information.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 45 Public Welfare 2 2013-10-01 2012-10-01 true Securing medical support information. 303.30... (CHILD SUPPORT ENFORCEMENT PROGRAM), ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES STANDARDS FOR PROGRAM OPERATIONS § 303.30 Securing medical support information. (a) If...

  19. 45 CFR 303.30 - Securing medical support information.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 45 Public Welfare 2 2011-10-01 2011-10-01 false Securing medical support information. 303.30... (CHILD SUPPORT ENFORCEMENT PROGRAM), ADMINISTRATION FOR CHILDREN AND FAMILIES, DEPARTMENT OF HEALTH AND HUMAN SERVICES STANDARDS FOR PROGRAM OPERATIONS § 303.30 Securing medical support information. (a) If...

  20. 42 CFR 3.106 - Security requirements.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ...) Security management. A PSO must address: (i) Maintenance and effective implementation of written policies... 42 Public Health 1 2010-10-01 2010-10-01 false Security requirements. 3.106 Section 3.106 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS PATIENT SAFETY...

  1. 42 CFR 3.106 - Security requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...) Security management. A PSO must address: (i) Maintenance and effective implementation of written policies... 42 Public Health 1 2011-10-01 2011-10-01 false Security requirements. 3.106 Section 3.106 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS PATIENT SAFETY...

  2. The Potential of Human Rights Education for Conflict Prevention and Security

    ERIC Educational Resources Information Center

    Davies, Lynn

    2010-01-01

    This paper examines the contribution of human rights education (HRE) to conflict prevention and to the promotion of security. It outlines the difficulties in evaluating the long-term impact of HRE, but then proposes five benefits of a rights-based approach to education--rights as secular, man-made, requiring transparency, enabling freedom from…

  3. Graphs for information security control in software defined networks

    NASA Astrophysics Data System (ADS)

    Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.

    2017-07-01

    Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.

  4. Cox report and the US-China arms control technical exchange program

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Di Capua, M S

    The ACE program furthered the national security interests of the US by promoting technical approaches to the implementation and verification of arms control treaties that the international community embraces. The Cox Committee report suggests that uncontrolled interactions were taking place between US and Chinese nuclear weapons scientists in the course of the ACE program. On the contrary, elaborate controls were in place at the very beginning and remained in place to control the interactions and protect US national security information. The ACE program payoff to national security was just beginning and its suspension, resulting from the Cox reports allegations, ismore » a setback to US-China progress on arms control.« less

  5. Decisional Information System for Safety (D.I.S.S.) Dedicated to the Human Space Exploration Mission

    NASA Astrophysics Data System (ADS)

    Grès, Stéphane; Guyonnet, Jean-François

    2006-06-01

    At the heart of the issue of reliable and dependable systems and networks, this paper presents the conception of a Decisional Information System for Security (D.I.S.S.) dedicated to the Human Space Exploration Mission. The objective is to conceive a decisional information system for human long duration space flight (> 1000 days) which is realised in entire autonomy in the solar system. This article describes the importance of the epistemological and ontological context for designing an open, self-learning and reliable system able for self-adapt in dangerous and unforeseen situations. We present in link with our research, the limits of the empirical analytical paradigm and several paths of research lead by the nascent paradigm of enaction. The strong presumption is that the centralised models of security could not be sufficient today to respond and challenge the security of a technical system, which will support human exploration missions.

  6. Neglecting legumes has compromised human health and sustainable food production.

    PubMed

    Foyer, Christine H; Lam, Hon-Ming; Nguyen, Henry T; Siddique, Kadambot H M; Varshney, Rajeev K; Colmer, Timothy D; Cowling, Wallace; Bramley, Helen; Mori, Trevor A; Hodgson, Jonathan M; Cooper, James W; Miller, Anthony J; Kunert, Karl; Vorster, Juan; Cullis, Christopher; Ozga, Jocelyn A; Wahlqvist, Mark L; Liang, Yan; Shou, Huixia; Shi, Kai; Yu, Jingquan; Fodor, Nandor; Kaiser, Brent N; Wong, Fuk-Ling; Valliyodan, Babu; Considine, Michael J

    2016-08-02

    The United Nations declared 2016 as the International Year of Pulses (grain legumes) under the banner 'nutritious seeds for a sustainable future'. A second green revolution is required to ensure food and nutritional security in the face of global climate change. Grain legumes provide an unparalleled solution to this problem because of their inherent capacity for symbiotic atmospheric nitrogen fixation, which provides economically sustainable advantages for farming. In addition, a legume-rich diet has health benefits for humans and livestock alike. However, grain legumes form only a minor part of most current human diets, and legume crops are greatly under-used. Food security and soil fertility could be significantly improved by greater grain legume usage and increased improvement of a range of grain legumes. The current lack of coordinated focus on grain legumes has compromised human health, nutritional security and sustainable food production.

  7. Exploring the Public Health Impacts of Private Security Guards on People Who Use Drugs: a Qualitative Study.

    PubMed

    Markwick, Nicole; McNeil, Ryan; Small, Will; Kerr, Thomas

    2015-12-01

    Private security guards occupy an increasingly prominent role in the policing of private and public spaces. There are growing concerns regarding security guards' potential to shape violence, discrimination, and adverse health outcomes among vulnerable populations, including people who use drugs (PWUD). This is relevant in Vancouver, Canada, where private security guards have increasingly been employed by private organizations to manage public and private spaces, including those within urban drug scenes. This qualitative study sought to understand interactions between PWUD and private security guards and explore their impacts on health care access, risks, and harms among PWUD. Semi-structured interviews were conducted with 30 PWUD recruited from two ongoing prospective cohort studies. Interviews were transcribed and analyzed using a coding framework comprised of a priori and emergent categories. Study data indicate that participants experience pervasive, discriminatory profiling and surveillance by security guards, which exacerbates existing social marginalization and structural vulnerability, particularly among PWUD of Aboriginal ancestry. Participants reported that security guards restrict PWUD's access to public and private spaces, including pharmacies and hospitals. PWUD also reported that their interactions with security guards often involved interpersonal violence and aggression, experiences that served to increase their vulnerability to subsequent risks and harms. Our findings highlight that private security forces contribute significantly to the everyday violence experienced by PWUD within drug scenes and elsewhere and do so in a manner very similar to that of traditional police forces. These findings point to the urgent need for greater oversight and training of private security guards in order to protect the health and safety of PWUD.

  8. Education, Underdevelopment, Unnecessary War and Human Security in Kosovo/Kosova

    ERIC Educational Resources Information Center

    Nelles, W.

    2005-01-01

    This paper examines educational linkages to persistent conflicts and contemporary security challenges in Kosovo. It reviews some historic foundations, debates and socioeconomic contexts concerning education as a security issue. It argues that poverty and underdevelopment coupled with failed diplomacy (particularly surrounding a 1996 ''Education…

  9. 45 CFR 303.30 - Securing medical support information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 45 Public Welfare 2 2014-10-01 2012-10-01 true Securing medical support information. 303.30 Section 303.30 Public Welfare Regulations Relating to Public Welfare OFFICE OF CHILD SUPPORT ENFORCEMENT... HUMAN SERVICES STANDARDS FOR PROGRAM OPERATIONS § 303.30 Securing medical support information. (a) If...

  10. 77 FR 2450 - Security Zone; Potomac and Anacostia Rivers, Washington, DC

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-18

    ... implement comprehensive port security regimes designed to safeguard human life, vessels, and waterfront... protect life, property and the environment, therefore, a 30-day notice period is impracticable. Delaying... enhance public and maritime safety and security in order to safeguard life, property, and the environment...

  11. Education and human survival: The relevance of the global security framework to international education

    NASA Astrophysics Data System (ADS)

    Williams, Christopher

    2000-07-01

    The nature of international education as a field of studies has been affected by global changes over the past decade. At the same time, the concept of global security has emerged, bringing together studies related to development, the environment and the understanding of violence. Although much of the education literature reflects the global security approach, it is not a field that has been subjected to much analysis as a whole. This paper provides an assessment of international education as a discipline, and outlines the global security framework. It examines how this framework is reflected in the forms of analysis used by international educationists. Finally it suggests how the central purpose of global security, namely ensuring human survival, could be adopted within international education to provide a clear sense of direction. This has specific implications for such areas as curriculum, assessment, educational provision and planning.

  12. Audited credential delegation: a usable security solution for the virtual physiological human toolkit.

    PubMed

    Haidar, Ali N; Zasada, Stefan J; Coveney, Peter V; Abdallah, Ali E; Beckles, Bruce; Jones, Mike A S

    2011-06-06

    We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username-password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale.

  13. Audited credential delegation: a usable security solution for the virtual physiological human toolkit

    PubMed Central

    Haidar, Ali N.; Zasada, Stefan J.; Coveney, Peter V.; Abdallah, Ali E.; Beckles, Bruce; Jones, Mike A. S.

    2011-01-01

    We present applications of audited credential delegation (ACD), a usable security solution for authentication, authorization and auditing in distributed virtual physiological human (VPH) project environments that removes the use of digital certificates from end-users' experience. Current security solutions are based on public key infrastructure (PKI). While PKI offers strong security for VPH projects, it suffers from serious usability shortcomings in terms of end-user acquisition and management of credentials which deter scientists from exploiting distributed VPH environments. By contrast, ACD supports the use of local credentials. Currently, a local ACD username–password combination can be used to access grid-based resources while Shibboleth support is underway. Moreover, ACD provides seamless and secure access to shared patient data, tools and infrastructure, thus supporting the provision of personalized medicine for patients, scientists and clinicians participating in e-health projects from a local to the widest international scale. PMID:22670214

  14. Atypical dimensions of caregiver–adolescent interaction in an economically disadvantaged sample

    PubMed Central

    Kobak, Roger; Zajac, Kristyn; Abbott, Caroline; Zisk, Abby; Bounoua, Nadia

    2018-01-01

    The Goal-corrected Partnership Adolescent Coding System (GPACS) has shown promise in assessing a secure as well as three atypical patterns of parent-adolescent interaction during a conflict discussion. The current study of 186 economically disadvantaged families examines the degree to which four GPACS patterns: Secure/Collaborative, Punitive, Role Confused and Disoriented—account for residual change in adolescents’ social competence and maladaptive behavior (internalizing, externalizing, and risk behaviors) between ages 13 to 15. Adolescents from Secure/Collaborative dyads at age 13 were more likely to have a secure state of mind in the AAI at age 15 and showed increases in teachers’ ratings of empathy and decreases in teachers’ ratings of externalizing behaviors between ages 13 and 15. Adolescents in Disoriented dyads showed a dramatic increase in teacher-rated internalizing problems, while male adolescents in Role Confused dyads reported increased involvement in risk behaviors including unprotected sexual activity and substance use problems. PMID:28401833

  15. Ecosystem Functions Connecting Contributions from Ecosystem Services to Human Wellbeing in a Mangrove System in Northern Taiwan.

    PubMed

    Hsieh, Hwey-Lian; Lin, Hsing-Juh; Shih, Shang-Shu; Chen, Chang-Po

    2015-06-09

    The present study examined a mangrove ecosystem in northern Taiwan to determine how the various components of ecosystem function, ecosystem services and human wellbeing are connected. The overall contributions of mangrove services to specific components of human wellbeing were also assessed. A network was developed and evaluated by an expert panel consisting of hydrologists, ecologists, and experts in the field of culture, landscape or architecture. The results showed that supporting habitats was the most important function to human wellbeing, while water quality, habitable climate, air quality, recreational opportunities, and knowledge systems were services that were strongly linked to human welfare. Security of continuous supply of services appeared to be the key to a comfortable life. From a bottom-up and top-down perspective, knowledge systems (a service) were most supported by ecosystem functions, while the security of continuous supply of services (wellbeing) had affected the most services. In addition, the overall benefits of mangrove services to human prosperity concentrated on mental health, security of continuous supply of services, and physical health.

  16. Ecosystem Functions Connecting Contributions from Ecosystem Services to Human Wellbeing in a Mangrove System in Northern Taiwan

    PubMed Central

    Hsieh, Hwey-Lian; Lin, Hsing-Juh; Shih, Shang-Shu; Chen, Chang-Po

    2015-01-01

    The present study examined a mangrove ecosystem in northern Taiwan to determine how the various components of ecosystem function, ecosystem services and human wellbeing are connected. The overall contributions of mangrove services to specific components of human wellbeing were also assessed. A network was developed and evaluated by an expert panel consisting of hydrologists, ecologists, and experts in the field of culture, landscape or architecture. The results showed that supporting habitats was the most important function to human wellbeing, while water quality, habitable climate, air quality, recreational opportunities, and knowledge systems were services that were strongly linked to human welfare. Security of continuous supply of services appeared to be the key to a comfortable life. From a bottom-up and top-down perspective, knowledge systems (a service) were most supported by ecosystem functions, while the security of continuous supply of services (wellbeing) had affected the most services. In addition, the overall benefits of mangrove services to human prosperity concentrated on mental health, security of continuous supply of services, and physical health. PMID:26067989

  17. 5 CFR 9701.222 - Reconsideration of classification decisions.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.222...

  18. 5 CFR 9701.222 - Reconsideration of classification decisions.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.222...

  19. 5 CFR 9701.222 - Reconsideration of classification decisions.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.222...

  20. 5 CFR 9701.222 - Reconsideration of classification decisions.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification Classification Process § 9701.222...

  1. SecurePhone: a mobile phone with biometric authentication and e-signature support for dealing secure transactions on the fly

    NASA Astrophysics Data System (ADS)

    Ricci, R.; Chollet, G.; Crispino, M. V.; Jassim, S.; Koreman, J.; Olivar-Dimas, M.; Garcia-Salicetti, S.; Soria-Rodriguez, P.

    2006-05-01

    This article presents an overview of the SecurePhone project, with an account of the first results obtained. SecurePhone's primary aim is to realise a mobile phone prototype - the 'SecurePhone' - in which biometrical authentication enables users to deal secure, dependable transactions over a mobile network. The SecurePhone is based on a commercial PDA-phone, supplemented with specific software modules and a customised SIM card. It integrates in a single environment a number of advanced features: access to cryptographic keys through strong multimodal biometric authentication; appending and verification of digital signatures; real-time exchange and interactive modification of (esigned) documents and voice recordings. SecurePhone's 'biometric recogniser' is based on original research. A fused combination of three different biometric methods - speaker, face and handwritten signature verification - is exploited, with no need for dedicated hardware components. The adoption of non-intrusive, psychologically neutral biometric techniques is expected to mitigate rejection problems that often inhibit the social use of biometrics, and speed up the spread of e-signature technology. Successful biometric authentication grants access to SecurePhone's built-in esignature services through a user-friendly interface. Special emphasis is accorded to the definition of a trustworthy security chain model covering all aspects of system operation. The SecurePhone is expected to boost m-commerce and open new scenarios for m-business and m-work, by changing the way people interact and by improving trust and confidence in information technologies, often considered intimidating and difficult to use. Exploitation plans will also explore other application domains (physical and logical access control, securised mobile communications).

  2. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography

    PubMed Central

    2018-01-01

    Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one. PMID:29695066

  3. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.

    PubMed

    Coutinho, Murilo; de Oliveira Albuquerque, Robson; Borges, Fábio; García Villalba, Luis Javier; Kim, Tai-Hoon

    2018-04-24

    Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one.

  4. Interactional synchrony and the origins of infant-mother attachment: a replication study.

    PubMed

    Isabella, R A; Belsky, J

    1991-04-01

    This study sought to replicate previous work in testing the hypothesis that interactions of dyads developing secure attachment relationships would be characterized by disproportionately synchronous and those of dyads developing insecure relationships by disproportionately asynchronous exchanges. Additionally, a priori hypotheses were tested regarding expected differences in the interactional histories of dyads developing insecure-avoidant and insecure-resistant attachments. Results supported the study's predictions in all cases. Dyads developing secure attachments were observed at 3 and 9 months to interact in a disproportionately well-timed, reciprocal, and mutually rewarding manner; dyads developing insecure relationships were disproportionately characterized by interactions in which mothers were minimally involved, unresponsive to infant signals, or intrusive. Within the insecure group, as predicted, 3- and 9-month interactions of avoidant dyads were characterized by maternal intrusiveness and overstimulation; resistant dyads were characterized at both ages by poorly coordinated interactions in which mothers were underinvolved and inconsistent. These findings are discussed as they lend to a growing body of evidence concerning associations between differential interactional histories and attachment quality.

  5. Stonework or Sandcastle? Asia’s Regional Security Forum.

    DTIC Science & Technology

    1995-07-01

    security without equal security for all," and "with the growing interdependence of states, the differences in economic and social systems, ideologies... social integration, and historical background . . . [W]e cannot directly apply a European model to the different security environment of the Asia...contentious issue of human rights, a prominent theme in CSCE, along with pressures from Western countries on social , political and environmental

  6. Scientific Openness and National Security at the National Laboratories

    NASA Astrophysics Data System (ADS)

    McTague, John

    2000-04-01

    The possible loss to the People's Republic of China of important U.S. nuclear-weapons-related information has aroused concern about interactions of scientists employed by the national laboratories with foreign nationals. As a result, the National Academies assembled a committee to examine the roles of the national laboratories, the contribution of foreign interactions to the fulfillment of those roles, the risks and benefits of scientific openness in this context, and the merits and liabilities of the specific policies being implemented or proposed with respect to contacts with foreign nationals. The committee concluded that there are many aspects of the work at the laboratories that benefit from or even demand the opportunity for foreign interactions. The committee recommended five principles for guiding policy: (1) Maintain balance. Policy governing international dialogue by laboratory staff should seek to encourage international engagement in some areas, while tightly controlling it in others. (2) Educate staff. Security procedures should be clear, easy to follow, and serve an understandable purpose. (3) Streamline procedures. Good science is compatible with good security if there is intelligent line management both at the labs and in Washington, which applies effective tools for security in a sensible fashion. (4) Focus efforts. DOE should focus its efforts governing tightened security for information. The greatest attention should obviously be provided to the protection of classified information by appropriate physical and cybersecurity measures, and by personnel procedures and training. (5) Beware of prejudice against foreigners. Over the past half-century foreign-born individuals have contributed broadly and profoundly to national security through their work at the national laboratories.

  7. The Land Component Role in Maritime Security

    DTIC Science & Technology

    2016-12-31

    U.S. Army Pacific (USARPAC) is designated as the Theater Joint Force Land Component Command (TJFLCC) and endeavors to support the PACOM Theater ...security. 1 Mike Wall , “What 11 Billion People Mean for Space Travel,” November 27, 2013...human outcomes that are a prerequisite for achieving national objectives”18. These are land-based operations designed to create stability in human

  8. The Impact of the World Bank and IMF on Education Rights

    ERIC Educational Resources Information Center

    Archer, David

    2006-01-01

    Education is a fundamental human right. As such it is clearly the responsibility of the state and a core element of any development policy committed to social justice. Securing the right to education is key to enabling people to secure other human rights, yet, according to this author, the right to education is violated by governments around the…

  9. Data Privacy and Security in Higher Education

    ERIC Educational Resources Information Center

    Williams, Tracy

    2003-01-01

    As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…

  10. Redefining National Security. Worldwatch Paper 14.

    ERIC Educational Resources Information Center

    Brown, Lester R.

    This paper, an adaption from the author's forthcoming book "The Twenty-Ninth Day: Accomodating Human Needs and Numbers to the Earth's Resources," deals with non-military threats to national security. Since World War II the concept of national security has acquired an overwhelmingly military character. The policy of continual preparedness has led…

  11. 42 CFR 2.16 - Security for written records.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Security for written records. 2.16 Section 2.16 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS General Provisions § 2.16 Security for written records...

  12. 42 CFR 2.16 - Security for written records.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 1 2014-10-01 2014-10-01 false Security for written records. 2.16 Section 2.16 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS General Provisions § 2.16 Security for written records...

  13. 42 CFR 2.16 - Security for written records.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 42 Public Health 1 2011-10-01 2011-10-01 false Security for written records. 2.16 Section 2.16 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS General Provisions § 2.16 Security for written records...

  14. 42 CFR 2.16 - Security for written records.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 42 Public Health 1 2012-10-01 2012-10-01 false Security for written records. 2.16 Section 2.16 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS General Provisions § 2.16 Security for written records...

  15. 42 CFR 2.16 - Security for written records.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 42 Public Health 1 2013-10-01 2013-10-01 false Security for written records. 2.16 Section 2.16 Public Health PUBLIC HEALTH SERVICE, DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL PROVISIONS CONFIDENTIALITY OF ALCOHOL AND DRUG ABUSE PATIENT RECORDS General Provisions § 2.16 Security for written records...

  16. 76 FR 51255 - Security Zone; Potomac River, Georgetown Channel, Washington, DC

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-18

    ... security regimes designed to safeguard human life, vessels, and waterfront facilities while still... restriction of vessel traffic is necessary to protect life, property and the environment, therefore, a 30-day... maritime safety and security in order to safeguard life, property, and the environment on or near the...

  17. 77 FR 3118 - Security Zone; Choptank River and Cambridge Channel, Cambridge, MD

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-23

    ... security regimes designed to safeguard human life, vessels, and waterfront facilities while still... restriction of vessel traffic is necessary to protect life, property and the environment, therefore, a 30-day... maritime safety and security in order to safeguard life, property, and the environment on or near the...

  18. 10 CFR 37.29 - Relief from fingerprinting, identification, and criminal history records checks and other...

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... under 27 CFR part 555; (4) Health and Human Services security risk assessments for possession and use of...; (6) State Radiation Control Program Directors and State Homeland Security Advisors or their designated State employee representatives; (7) Agreement State employees conducting security inspections on...

  19. Computer Security: The Human Element.

    ERIC Educational Resources Information Center

    Guynes, Carl S.; Vanacek, Michael T.

    1981-01-01

    The security and effectiveness of a computer system are dependent on the personnel involved. Improved personnel and organizational procedures can significantly reduce the potential for computer fraud. (Author/MLF)

  20. Risk management and security services interaction--a must in today's health care environment.

    PubMed

    Stultz, M S

    1990-01-01

    The author shows why risk managers and security directors are natural partners in the effort of a hospital to reduce risks from such occurrences as baby kidnappings, serial killers, thefts, and rapes/sexual assaults.

  1. Food security and sustainable intensification.

    PubMed

    Godfray, H Charles J; Garnett, Tara

    2014-04-05

    The coming decades are likely to see increasing pressures on the global food system, both on the demand side from increasing population and per capita consumption, and on the supply side from greater competition for inputs and from climate change. This paper argues that the magnitude of the challenge is such that action is needed throughout the food system, on moderating demand, reducing waste, improving governance and producing more food. It discusses in detail the last component, arguing that more food should be produced using sustainable intensification (SI) strategies, and explores the rationale behind, and meaning of, this term. It also investigates how SI may interact with other food policy agendas, in particular, land use and biodiversity, animal welfare and human nutrition.

  2. Security under Uncertainty: Adaptive Attackers Are More Challenging to Human Defenders than Random Attackers

    PubMed Central

    Moisan, Frédéric; Gonzalez, Cleotilde

    2017-01-01

    Game Theory is a common approach used to understand attacker and defender motives, strategies, and allocation of limited security resources. For example, many defense algorithms are based on game-theoretic solutions that conclude that randomization of defense actions assures unpredictability, creating difficulties for a human attacker. However, many game-theoretic solutions often rely on idealized assumptions of decision making that underplay the role of human cognition and information uncertainty. The consequence is that we know little about how effective these algorithms are against human players. Using a simplified security game, we study the type of attack strategy and the uncertainty about an attacker's strategy in a laboratory experiment where participants play the role of defenders against a simulated attacker. Our goal is to compare a human defender's behavior in three levels of uncertainty (Information Level: Certain, Risky, Uncertain) and three types of attacker's strategy (Attacker's strategy: Minimax, Random, Adaptive) in a between-subjects experimental design. Best defense performance is achieved when defenders play against a minimax and a random attack strategy compared to an adaptive strategy. Furthermore, when payoffs are certain, defenders are as efficient against random attack strategy as they are against an adaptive strategy, but when payoffs are uncertain, defenders have most difficulties defending against an adaptive attacker compared to a random attacker. We conclude that given conditions of uncertainty in many security problems, defense algorithms would be more efficient if they are adaptive to the attacker actions, taking advantage of the attacker's human inefficiencies. PMID:28690557

  3. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    NASA Astrophysics Data System (ADS)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  4. The Next Wave. Volume 19, Number 2

    DTIC Science & Technology

    2012-01-01

    Afghanistan and other war zones/These are but two examples of what have become almost routine reports of failures in system security. Increasingly...and to describe what it might look like. Academic and industry experts from a broad set of disciplines including security, economics, human factors...Dusko Pavlovic from Oxford University provides a unique and unexpected model for security to reason about what a security science might be. Anupam

  5. The 2015 National Security Strategy: Authorities, Changes, Issues for Congress

    DTIC Science & Technology

    2016-04-05

    Strategy: Authorities, Changes, Issues for Congress Congressional Research Service 3  reverse the spread of nuclear and biological weapons and...secure nuclear materials;  advance peace, security, and opportunity in the greater Middle East;  invest in the capacity of strong and capable...and norms on issues ranging from maritime security to trade and human rights.” 6 On Russia, the document says, “... we will continue to impose

  6. A Unified Approach to Intra-Domain Security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Shue, Craig A; Kalafut, Andrew J.; Gupta, Prof. Minaxi

    2009-01-01

    While a variety of mechanisms have been developed for securing individual intra-domain protocols, none address the issue in a holistic manner. We develop a unified framework to secure prominent networking protocols within a single domain. We begin with a secure version of the DHCP protocol, which has the additional feature of providing each host with a certificate. We then leverage these certificates to secure ARP, prevent spoofing within the domain, and secure SSH and VPN connections between the domain and hosts which have previously interacted with it locally. In doing so, we also develop an incrementally deployable public key infrastructuremore » which can later be leveraged to support inter-domain authentication.« less

  7. 23 CFR 1327.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ..., denials, cancellations, accidents and interactions with the driver control and driver improvement... the State transmitting such information; and (3) The social security account number, if used by the... license number of such individual (if that number is different from the operator's social security account...

  8. Digital Dimension Disruption: A National Security Enterprise Response

    DTIC Science & Technology

    2017-12-21

    societal institutions, methods of business, and fundamental ideas about national security. This realignment will, of necessity, change the frameworks...humans did calculations and searched for information. In the past quarter century, human use of computers has changed fundamentally , but com- mon...the nature of data is, itself, undergoing a fundamental change. The terms “bespoke data” (from the British term for cus- tom-tailored) and “by

  9. Organizing to Understand: How to Operate Effectively in the Human Domain

    DTIC Science & Technology

    2015-05-21

    study of ethno- cultural dynamics. Instead of culture-specific training, intercultural learning seeks to develop the skills at bridging communication ...national security community and military practitioners. To deal with the increasingly important human aspects, the US military has proposed the...studies of the early years of Operation Iraqi Freedom provide sufficient material with which to analyze how the security community has approached issues

  10. 45 CFR 164.318 - Compliance dates for the initial implementation of the security standards.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... of Electronic Protected Health Information § 164.318 Compliance dates for the initial implementation of the security standards. (a) Health plan. (1) A health plan that is not a small health plan must... the security standards. 164.318 Section 164.318 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES...

  11. 45 CFR 164.318 - Compliance dates for the initial implementation of the security standards.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... of Electronic Protected Health Information § 164.318 Compliance dates for the initial implementation of the security standards. (a) Health plan. (1) A health plan that is not a small health plan must... the security standards. 164.318 Section 164.318 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES...

  12. 21 CFR 880.5210 - Intravascular catheter securement device.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 8 2010-04-01 2010-04-01 false Intravascular catheter securement device. 880.5210 Section 880.5210 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES... and is used to keep the hub of the needle or the catheter flat and securely anchored to the skin. (b...

  13. The Globalization of Higher Education as a Societal and Cultural Security Problem

    ERIC Educational Resources Information Center

    Samier, Eugenie A.

    2015-01-01

    In this article, I propose a theory of the globalization of higher education as societal and cultural security problems for many regions of the world. The first section examines the field of security studies for theoretical frameworks appropriate to critiquing globalized higher education, including critical human, societal and cultural security…

  14. 21 CFR 880.5210 - Intravascular catheter securement device.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 21 Food and Drugs 8 2011-04-01 2011-04-01 false Intravascular catheter securement device. 880.5210 Section 880.5210 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES... and is used to keep the hub of the needle or the catheter flat and securely anchored to the skin. (b...

  15. A Framework for the Governance of Information Security

    ERIC Educational Resources Information Center

    Edwards, Charles K.

    2013-01-01

    Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant…

  16. 42 CFR 600.350 - Privacy and security of information.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 42 Public Health 5 2014-10-01 2014-10-01 false Privacy and security of information. 600.350 Section 600.350 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN... (Eff. 1-1-15) Eligibility and Enrollment § 600.350 Privacy and security of information. The State must...

  17. The role of optics in secure credentials

    NASA Astrophysics Data System (ADS)

    Lichtenstein, Terri L.

    2006-02-01

    The global need for secure ID credentials has grown rapidly over the last few years. This is evident both in government and commercial sectors. Governmental programs include national ID card programs, permanent resident cards for noncitizens, biometric visas or border crossing cards, foreign worker ID programs and secure vehicle registration programs. The commercial need for secure credentials includes secure banking and financial services, security and access control systems and digital healthcare record cards. All of these programs necessitate the use of multiple tamper and counterfeit resistant features for credential authentication and cardholder verification. It is generally accepted that a secure credential should include a combination of overt, covert and forensic security features. The LaserCard optical memory card is a proven example of a secure credential that uses a variety of optical features to enhance its counterfeit resistance and reliability. This paper will review those features and how they interact to create a better credential.

  18. Big data, little security: Addressing security issues in your platform

    NASA Astrophysics Data System (ADS)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  19. Performance Analysis of Cyber Security Awareness Delivery Methods

    NASA Astrophysics Data System (ADS)

    Abawajy, Jemal; Kim, Tai-Hoon

    In order to decrease information security threats caused by human-related vulnerabilities, an increased concentration on information security awareness and training is necessary. There are numerous information security awareness training delivery methods. The purpose of this study was to determine what delivery method is most successful in providing security awareness training. We conducted security awareness training using various delivery methods such as text based, game based and a short video presentation with the aim of determining user preference delivery methods. Our study suggests that a combined delvery methods are better than individual secrity awareness delivery method.

  20. Scalable, Secure Analysis of Social Sciences Data on the Azure Platform

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Simmhan, Yogesh; Deng, Litao; Kumbhare, Alok

    2012-05-07

    Human activity and interaction data is beginning to be collected at population scales through the pervasiveness of social media and willingness of people to volunteer information. This can allow social science researchers to understand and model human behavior with better accuracy and prediction power. Political and social scientists are starting to correlate such large scale social media datasets with events that impact society as evidence abound of the virtual and physical public spaces intersecting and influencing each other [1,2]. Managers of Cyber Physical Systems such as Smart Power Grid utilities are investigating the impact of consumer behavior on power consumption,more » and the possibility of influencing the usage profile [3]. Data collection is also made easier through technology such as mobile apps, social media sites and search engines that directly collect data, and sensors such smart meters and room occupancy sensors that indirectly measure human activity. These technology platforms also provide a convenient framework for “human sensors” to record and broadcast data for behavioral studies, as a form of crowd sourced citizen science. This has the added advantage of engaging the broader public in STEM activities and help influence public policy.« less

  1. A cross-case comparative analysis of international security forces' impacts on health systems in conflict-affected and fragile states.

    PubMed

    Bourdeaux, Margaret; Kerry, Vanessa; Haggenmiller, Christian; Nickel, Karlheinz

    2015-01-01

    Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. Using case studies we published on international security forces' impacts on health systems in Haiti, Kosovo, Afghanistan and Libya, we conducted a comparative analysis that examined three questions: What aspects, or building blocks, of health systems did security forces impact across the cases and what was the nature of these impacts? What forums or mechanisms did international security forces use to interact with health system actors? What policies facilitated or hindered security forces from supporting health systems? We found international security forces impacted health system governance, information systems and indigenous health delivery organizations. Positive impacts included bolstering the authority, transparency and capability of health system leadership. Negative impacts included undermining the impartial nature of indigenous health institutions by using health projects to achieve security objectives. Interactions between security and health actors were primarily ad hoc, often to the detriment of health system support efforts. When international security forces were engaged in health system support activities, the most helpful communication and consultative mechanisms to manage their involvement were ones that could address a wide array of problems, were nimble enough to accommodate rapidly changing circumstances, leveraged the power of personal relationships, and were able to address the tensions that arose between security and health system supporting strategies. Policy barriers to international security organizations participating in health system support included lack of mandate, conflicts between security strategies and health system preservation, and lack of interoperability between security and indigenous health organizations with respect to logistics and sharing information. The cases demonstrate both the opportunities and risks of international security organizations involvement in health sector protection, recovery and reconstruction. We discuss two potential approaches to engaging these organizations in health system support that may increase the chances of realizing these opportunities while mitigating risks.

  2. Assessing Uncertainties in Surface Water Security: A Probabilistic Multi-model Resampling approach

    NASA Astrophysics Data System (ADS)

    Rodrigues, D. B. B.

    2015-12-01

    Various uncertainties are involved in the representation of processes that characterize interactions between societal needs, ecosystem functioning, and hydrological conditions. Here, we develop an empirical uncertainty assessment of water security indicators that characterize scarcity and vulnerability, based on a multi-model and resampling framework. We consider several uncertainty sources including those related to: i) observed streamflow data; ii) hydrological model structure; iii) residual analysis; iv) the definition of Environmental Flow Requirement method; v) the definition of critical conditions for water provision; and vi) the critical demand imposed by human activities. We estimate the overall uncertainty coming from the hydrological model by means of a residual bootstrap resampling approach, and by uncertainty propagation through different methodological arrangements applied to a 291 km² agricultural basin within the Cantareira water supply system in Brazil. Together, the two-component hydrograph residual analysis and the block bootstrap resampling approach result in a more accurate and precise estimate of the uncertainty (95% confidence intervals) in the simulated time series. We then compare the uncertainty estimates associated with water security indicators using a multi-model framework and provided by each model uncertainty estimation approach. The method is general and can be easily extended forming the basis for meaningful support to end-users facing water resource challenges by enabling them to incorporate a viable uncertainty analysis into a robust decision making process.

  3. Night-time lights as a proxy of human pressure on freshwater resources

    NASA Astrophysics Data System (ADS)

    Ceola, Serena; Montanari, Alberto; Laio, Francesco

    2017-04-01

    The presence and availability of freshwater resources at the global scale control the dynamics and the biodiversity of river ecosystems, as well as the human development and the security of people and economies. The increasing human pressure on freshwater is known to potentially drive significant alterations on both ecohydrological and social dynamics. To date, a spatially-detailed snapshot (i.e. single in time) analysis of human water security and river biodiversity threats revealed that the majority of the world's population and river ecosystems are exposed to high levels of endangerment. However, the temporal evolution of these effects at the global scale is still unexplored. To this aim, moving from the recent progress on remote sensing techniques, we employed yearly averaged night-time light images available from 1992 to 2013 as a proxy of anthropogenic presence and activity and we investigated how threats to human water security and river biodiversity evolved in time in 405 major river basins. Our results show a consistent correlation between nightlights and ecohydrological and threats, providing innovative support for freshwater resources management.

  4. Maternal Sensitivity, Child Functional Level, and Attachment in Down Syndrome.

    ERIC Educational Resources Information Center

    Atkinson, Leslie; Chrisholm, Vivienne C.; Scott, Brian; Goldberg, Susan; Vaughn, Brian E.; Blackwell, Janis; Dickens, Susan; Tam, Frances

    1999-01-01

    Investigated the influence of child intellectual/adaptive functioning and maternal sensitivity on attachment security, using a sample of children with Down syndrome. Found a relationship between attachment security in DS related to the interaction of maternal sensitivity and cognitive competence. (JPB)

  5. Taking the "waste" out of "wastewater" for human water security and ecosystem sustainability.

    PubMed

    Grant, Stanley B; Saphores, Jean-Daniel; Feldman, David L; Hamilton, Andrew J; Fletcher, Tim D; Cook, Perran L M; Stewardson, Michael; Sanders, Brett F; Levin, Lisa A; Ambrose, Richard F; Deletic, Ana; Brown, Rebekah; Jiang, Sunny C; Rosso, Diego; Cooper, William J; Marusic, Ivan

    2012-08-10

    Humans create vast quantities of wastewater through inefficiencies and poor management of water systems. The wasting of water poses sustainability challenges, depletes energy reserves, and undermines human water security and ecosystem health. Here we review emerging approaches for reusing wastewater and minimizing its generation. These complementary options make the most of scarce freshwater resources, serve the varying water needs of both developed and developing countries, and confer a variety of environmental benefits. Their widespread adoption will require changing how freshwater is sourced, used, managed, and priced.

  6. A Dynamic Security Framework for Ambient Intelligent Systems: A Smart-Home Based eHealth Application

    NASA Astrophysics Data System (ADS)

    Compagna, Luca; El Khoury, Paul; Massacci, Fabio; Saidane, Ayda

    Providing context-dependent security services is an important challenge for ambient intelligent systems. The complexity and the unbounded nature of such systems make it difficult even for the most experienced and knowledgeable security engineers, to foresee all possible situations and interactions when developing the system. In order to solve this problem context based self- diagnosis and reconfiguration at runtime should be provided.

  7. Impacts of psychological science on national security agencies post-9/11.

    PubMed

    Brandon, Susan E

    2011-09-01

    Psychologists have been an integral part of national security agencies since World War I, when psychological science helped in personnel selection. A robust infrastructure supporting wider applications of psychology to military and intelligence problems developed further during World War II and the years following, primarily in the areas of testing, human factors, perception, and the decision sciences. Although the nature of the attacks on 9/11 raised the level of perceived need for increased human-based intelligence, the impacts of psychologists on the policies and practices of national security agencies in the decade since have not increased significantly. © 2011 American Psychological Association

  8. Portfolio analysis of layered security measures.

    PubMed

    Chatterjee, Samrat; Hora, Stephen C; Rosoff, Heather

    2015-03-01

    Layered defenses are necessary for protecting the public from terrorist attacks. Designing a system of such defensive measures requires consideration of the interaction of these countermeasures. In this article, we present an analysis of a layered security system within the lower Manhattan area. It shows how portfolios of security measures can be evaluated through portfolio decision analysis. Consideration is given to the total benefits and costs of the system. Portfolio diagrams are created that help communicate alternatives among stakeholders who have differing views on the tradeoffs between security and economic activity. © 2014 Society for Risk Analysis.

  9. Food security assessment in the coastal area of Demak Regency

    NASA Astrophysics Data System (ADS)

    Harini, R.; Handayani, H. N.; Ramdani, F. R.

    2018-04-01

    Food security is an issue of national and global level. Food is a basic human need to live. Without food will threaten human life. This research was conducted in coastal area of Demak Regency. This research is to understand the potential of human resources, natural resources and assess the level of food security of coastal communities. The data used are primary data through interviews with the local community. Also used Secondary data from government agencies. Data analysis used qualitative and quantitative descriptive methods through graphs, tables and maps. The results showed that potential of human resources in Demak coastal area (Wedung, Purworejo, and Sidogemah villages) is low. It can be indicated from education level of respondents in Demak are elementary school and junior high school. Beside, total households income are about 2-4 million. This study found that the households sampled are 90% is food insecured households. The most of households in Demak coastal area are about 90% households include on insecurity food category.

  10. Meeting the challenges of installing a mobile robotic system

    NASA Technical Reports Server (NTRS)

    Decorte, Celeste

    1994-01-01

    The challenges of integrating a mobile robotic system into an application environment are many. Most problems inherent to installing the mobile robotic system fall into one of three categories: (1) the physical environment - location(s) where, and conditions under which, the mobile robotic system will work; (2) the technological environment - external equipment with which the mobile robotic system will interact; and (3) the human environment - personnel who will operate and interact with the mobile robotic system. The successful integration of a mobile robotic system into these three types of application environment requires more than a good pair of pliers. The tools for this job include: careful planning, accurate measurement data (as-built drawings), complete technical data of systems to be interfaced, sufficient time and attention of key personnel for training on how to operate and program the robot, on-site access during installation, and a thorough understanding and appreciation - by all concerned - of the mobile robotic system's role in the security mission at the site, as well as the machine's capabilities and limitations. Patience, luck, and a sense of humor are also useful tools to keep handy during a mobile robotic system installation. This paper will discuss some specific examples of problems in each of three categories, and explore approaches to solving these problems. The discussion will draw from the author's experience with on-site installations of mobile robotic systems in various applications. Most of the information discussed in this paper has come directly from knowledge learned during installations of Cybermotion's SR2 security robots. A large part of the discussion will apply to any vehicle with a drive system, collision avoidance, and navigation sensors, which is, of course, what makes a vehicle autonomous. And it is with these sensors and a drive system that the installer must become familiar in order to foresee potential trouble areas in the physical, technical, and human environment.

  11. Participatory telerobotics

    NASA Astrophysics Data System (ADS)

    Wissner-Gross, Alexander D.; Sullivan, Timothy M.

    2013-05-01

    We present a novel "participatory telerobotics" system that generalizes the existing concept of participatory sensing to include real-time teleoperation and telepresence by treating humans with mobile devices as ad-hoc telerobots. In our approach, operators or analysts first choose a desired location for remote surveillance or activity from a live geographic map and are then automatically connected via a coordination server to the nearest available trusted human. That human's device is then activated and begins recording and streaming back to the operator a live audiovisual feed for telepresence, while allowing the operator in turn to request complex teleoperative motions or actions from the human. Supported action requests currently include walking, running, leaning, and turning, all with controllable magnitudes and directions. Compliance with requests is automatically measured and scored in real time by fusing information received from the device's onboard sensors, including its accelerometers, gyroscope, magnetometer, GPS receiver, and cameras. Streams of action requests are visually presented by each device to its human in the form of an augmented reality game that rewards prompt physical compliance while remaining tolerant of network latency. Because of its ability to interactively elicit physical knowledge and operations through ad-hoc collaboration, we anticipate that our participatory telerobotics system will have immediate applications in the intelligence, retail, healthcare, security, and travel industries.

  12. Specifying Skill-Based Training Strategies and Devices: A Model Description

    DTIC Science & Technology

    1990-06-01

    Technical Report 897 Specifying Skill-Based Training N Strategies and Devices: A Model Description I Paui J. Sticha and Mark Schlager Human Resources...unlimied 90 ’ Technical Report 897 Specifying Skill-Based Training Strategies and Devices: A Model Description Paul J. Sticha and Mark Schlager Human...SECURITY CLASSIFICATION OF THIS PAGE Form Approved REPORT DOCUMENTATION PAGE FMNo o7 ote la. REPORT SECURITY CLASSIFICATION lb. RESTRICTWE MARKINGS

  13. The National Guard State Partnership Program and Regional Security in the Western Balkans

    DTIC Science & Technology

    2014-12-12

    expand at the expense of its neighbors, or threaten regional peace and security. Today’s threats in the Western Balkans conceptually resemble the...general threats to the majority of governments in the EU, such as terrorism, arms and human trafficking, international criminal activities, and other...arms and human trafficking, international criminal activities, and other transnational threats . For stakeholders within the region as well as for

  14. 17 CFR 232.405 - Interactive Data File submissions and postings.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Interactive Data File....405 Interactive Data File submissions and postings. Preliminary Note 1. Sections 405 and 406T of Regulation S-T (§§ 232.405 and 232.406T) apply to electronic filers that submit or post Interactive Data...

  15. 17 CFR 232.405 - Interactive Data File submissions and postings.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Interactive Data File....405 Interactive Data File submissions and postings. Preliminary Note 1. Sections 405 and 406T of Regulation S-T (§§ 232.405 and 232.406T) apply to electronic filers that submit or post Interactive Data...

  16. 17 CFR 232.405 - Interactive Data File submissions and postings.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Interactive Data File....405 Interactive Data File submissions and postings. Preliminary Note 1. Sections 405 and 406T of Regulation S-T (§§ 232.405 and 232.406T) apply to electronic filers that submit or post Interactive Data...

  17. Considering land-sea interactions and trade-offs for food and biodiversity.

    PubMed

    Cottrell, Richard S; Fleming, Aysha; Fulton, Elizabeth A; Nash, Kirsty L; Watson, Reg A; Blanchard, Julia L

    2018-02-01

    With the human population expected to near 10 billion by 2050, and diets shifting towards greater per-capita consumption of animal protein, meeting future food demands will place ever-growing burdens on natural resources and those dependent on them. Solutions proposed to increase the sustainability of agriculture, aquaculture, and capture fisheries have typically approached development from single sector perspectives. Recent work highlights the importance of recognising links among food sectors, and the challenge cross-sector dependencies create for sustainable food production. Yet without understanding the full suite of interactions between food systems on land and sea, development in one sector may result in unanticipated trade-offs in another. We review the interactions between terrestrial and aquatic food systems. We show that most of the studied land-sea interactions fall into at least one of four categories: ecosystem connectivity, feed interdependencies, livelihood interactions, and climate feedback. Critically, these interactions modify nutrient flows, and the partitioning of natural resource use between land and sea, amid a backdrop of climate variability and change that reaches across all sectors. Addressing counter-productive trade-offs resulting from land-sea links will require simultaneous improvements in food production and consumption efficiency, while creating more sustainable feed products for fish and livestock. Food security research and policy also needs to better integrate aquatic and terrestrial production to anticipate how cross-sector interactions could transmit change across ecosystem and governance boundaries into the future. © 2017 John Wiley & Sons Ltd.

  18. Environmental security as related to scale mismatches of disturbance patterns in a panarchy of social-ecological landscapes

    Treesearch

    Giovanni Zurlini; Irene Petrosillo; Nicola Zaccarelli; Kurt Riitters

    2008-01-01

    Environmental security, as the opposite of environmental fragility (vulnerability), is multilayered, multi-scale and complex, existing in both the objective realm of biophysics and society, and the subjective realm of individual human perception. For ecological risk assessments (ERAs), the relevant objects of environmental security are social-ecological landscapes (...

  19. Measuring the Effectiveness of Visual Analytics and Data Fusion Techniques on Situation Awareness in Cyber-Security

    ERIC Educational Resources Information Center

    Giacobe, Nicklaus A.

    2013-01-01

    Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…

  20. Information Technology Security and Human Risk: Exploring Factors of Unintended Insider Threat and Organizational Resilience

    ERIC Educational Resources Information Center

    Thompson, Eleanor Elizabeth

    2014-01-01

    That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…

  1. 75 FR 23196 - Exchange Visitor Program-Secondary School Students

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-03

    .... diplomatic and foreign policy goals by encouraging this positive academic and social interaction. Experience... currently requires a private vendor name and social security number check of all potential host family... check or the name and social security number criminal background check. NCMEC would interpret...

  2. Trust Management and Accountability for Internet Security

    ERIC Educational Resources Information Center

    Liu, Wayne W.

    2011-01-01

    Adversarial yet interacting interdependent relationships in information sharing and service provisioning have been a pressing issue of the Internet. Such relationships exist among autonomous software agents, in networking system peers, as well as between "service users and providers." Traditional "ad hoc" security approaches effective in…

  3. Novel online security system based on rare-earth-doped glass microbeads

    NASA Astrophysics Data System (ADS)

    Officer, Simon; Prabhu, G. R.; Pollard, Pat; Hunter, Catherine; Ross, Gary A.

    2004-06-01

    A novel fluorescent security label has been produced that could replace numerous conventional fluorescent dyes in document security. This label utilizes rare earth ions doped in a borosilicate glass matrix to produce sharp spectral fluorescence peaks with characteristic long lifetimes due to the rare earth ions. These are subsequently detected by an online detection system based on fluorescence and the long lifetimes to avoid any interference from other fluorophores present in the background. Security is further enhanced by the interaction of the rare earth ions with each other and the effect of the host on the emission spectra and therefore the number of permutations that could be produced. This creates a very secure label with various applications for the security market.

  4. A Secure Base in Adolescence: Markers of Attachment Security in the Mother–Adolescent Relationship

    PubMed Central

    Allen, Joseph P.; McElhaney, Kathleen Boykin; Land, Deborah J.; Kuperminc, Gabriel P.; Moore, Cynthia W.; O’Beirne-Kelly, Heather; Kilmer, Sarah Liebman

    2017-01-01

    This study sought to identify ways in which adolescent attachment security, as assessed via the Adult Attachment Interview, is manifest in qualities of the secure base provided by the mother–adolescent relationship. Assessments included data coded from mother–adolescent interactions, test-based data, and adolescent self-reports obtained from an ethnically and socioeconomically diverse sample of moderately at-risk 9th and 10th graders. This study found several robust markers of adolescent attachment security in the mother–adolescent relationship. Each of these markers was found to contribute unique variance to explaining adolescent security, and in combination, they accounted for as much as 40% of the raw variance in adolescent security. These findings suggest that security is closely connected to the workings of the mother–adolescent relationship via a secure-base phenomenon, in which the teen can explore independence in thought and speech from the secure base of a maternal relationship characterized by maternal attunement to the adolescent and maternal supportiveness. PMID:12625451

  5. Security training with interactive laser-video-disk technology

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wilson, D.

    1988-01-01

    DOE, through its contractor EG and G Energy Measurements, Inc., has developed a state-of-the-art interactive-video system for use at the Department of Energy's Central Training Academy. Called the Security Training and Evaluation Shooting System (STRESS), the computer-driven decision shooting system employs the latest is laservideo-disk technology. STRESS is designed to provide realistic and stressful training for security inspectors employed by the DOE and its contractors. The system uses wide-screen video projection, sophisticated scenario-branching technology, and customized video scenarios especially designed for the DOE. Firing a weapon that has been modified to shoot ''laser bullets,'' and wearing a special vest thatmore » detects ''hits'': the security inspector encounters adversaries on the wide screen who can shoot or be shot by the inspector in scenarios that demand fast decisions. Based on those decisions, the computer provides instantaneous branching to different scenes, giving the inspector confrontational training with the realism and variability of real life.« less

  6. The interaction between electromagnetic fields at megahertz, gigahertz and terahertz frequencies with cells, tissues and organisms: risks and potential.

    PubMed

    Romanenko, Sergii; Begley, Ryan; Harvey, Alan R; Hool, Livia; Wallace, Vincent P

    2017-12-01

    Since regular radio broadcasts started in the 1920s, the exposure to human-made electromagnetic fields has steadily increased. These days we are not only exposed to radio waves but also other frequencies from a variety of sources, mainly from communication and security devices. Considering that nearly all biological systems interact with electromagnetic fields, understanding the affects is essential for safety and technological progress. This paper systematically reviews the role and effects of static and pulsed radio frequencies (10 0 -10 9 Hz), millimetre waves (MMWs) or gigahertz (10 9 -10 11 Hz), and terahertz (10 11 -10 13 Hz) on various biomolecules, cells and tissues. Electromagnetic fields have been shown to affect the activity in cell membranes (sodium versus potassium ion conductivities) and non-selective channels, transmembrane potentials and even the cell cycle. Particular attention is given to millimetre and terahertz radiation due to their increasing utilization and, hence, increasing human exposure. MMWs are known to alter active transport across cell membranes, and it has been reported that terahertz radiation may interfere with DNA and cause genomic instabilities. These and other phenomena are discussed along with the discrepancies and controversies from published studies. © 2017 The Author(s).

  7. Linking Hydro-Meteorological Hazards, Climate and Food Security: an Initiative of International Scientific Community

    NASA Astrophysics Data System (ADS)

    Ismail-Zadeh, A.; Beer, T.

    2013-05-01

    Humans face climatic and hydro-meteorological hazards on different scales in time and space. In particular natural hazards can have disastrous impact in the short term (flood) and in the long term (drought) as they affect human life and health as well as impacting dramatically on the sustainable development of society. They represent a pending danger for vulnerable lifelines, infrastructure and the agricultural systems that depend on the water supply, reservoirs, pipelines, and power plants. Developed countries are affected, but the impact is disproportionate within the developing world. Extreme natural events such as extreme floods or prolonged drought can change the life and economic development of developing nations and stifle their development for decades. The beginning of the XX1st century has been marked by a significant number of natural disasters, such as floods, severe storms, wildfires, hurricanes, and tsunamis. Extreme natural events cause devastation resulting in loss of human life, large environmental damage, and partial or total loss of infrastructure that, in the longer time, will affect the potential for agricultural recovery. Recent catastrophic events of the early 21st century (e.g. floods in Pakistan and Thailand, the 2011 Tohoku earthquake and tsunami) remind us once again that there is a strong coupling between complex solid Earth, oceanic, and atmospheric processes and that even developed countries such as Japan are subject to agricultural declines as a result of disastrous hydro-meteorological events. Scientific community recognizes that communication between the groups of experts of various international organizations dealing with natural hazards and their activity in disaster risk reduction and food security needs to be strengthened. Several international scientific unions and intergovernmental institutions set up a consortium of experts to promote studies of weather, climate and their interaction with agriculture, food and their socio-economic consequence.

  8. Physical and property victimization behind bars: a multilevel examination.

    PubMed

    Lahm, Karen F

    2009-06-01

    The majority of the extant literature on inmate victimization considers only one level of analysis, thus ignoring the interaction effects between inmate- and prison-level variables. To extend this literature, multilevel modeling techniques were used to analyze self-report data from more than 1,000 inmates and 30 prisons in Kentucky, Tennessee, and Ohio. Results revealed that demographic variables were strong predictors of physical victimization (i.e., race and assaultive behavior). Also, security level had a contextual direct effect on physical victimization. Property victimization was best explained with an integrated model including inmate (i.e., race, assaultive behavior, prior education, prior employment, and time served), contextual (i.e., security level and proportion non-White), and micro-macro interaction variables (i.e., Race x Security Level). Policy implications and suggestions for future research are discussed.

  9. reCAPTCHA: human-based character recognition via Web security measures.

    PubMed

    von Ahn, Luis; Maurer, Benjamin; McMillen, Colin; Abraham, David; Blum, Manuel

    2008-09-12

    CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) are widespread security measures on the World Wide Web that prevent automated programs from abusing online services. They do so by asking humans to perform a task that computers cannot yet perform, such as deciphering distorted characters. Our research explored whether such human effort can be channeled into a useful purpose: helping to digitize old printed material by asking users to decipher scanned words from books that computerized optical character recognition failed to recognize. We showed that this method can transcribe text with a word accuracy exceeding 99%, matching the guarantee of professional human transcribers. Our apparatus is deployed in more than 40,000 Web sites and has transcribed over 440 million words.

  10. Emotional security in the family system and psychological distress in female survivors of child sexual abuse.

    PubMed

    Cantón-Cortés, David; Cantón, José; Cortés, María Rosario

    2016-01-01

    The Emotional Security Theory (EST) was originally developed to investigate the association between high levels of interparental conflict and child maladaptative outcome. The objective of the present study was to analyze the effects of emotional security in the family system on psychological distress among a sample of young female adult survivors of child sexual abuse (CSA). The role of emotional security was investigated through the interactive effects of a number of factors including the type of abuse, the continuity of abuse, the relationship with the perpetrator and the existence of disclosure for the abuse. Participants were 167 female survivors of CSA. Information about the abuse was obtained from a self-reported questionnaire. Emotional security was assessed with the Security in the Family System (SIFS) Scale, and the Symptom Checklist-90-Revised (SCL-90-R) was used to assess psychological distress. In the total sample, insecurity (preoccupation and disengagement) was correlated with high psychological distress scores, whereas no relationship was found between security and psychological distress. The relationship between emotional insecurity and psychological distress was stronger in cases of continued abuse and non-disclosure, while the relationship between emotional security and distress was stronger in cases of extrafamilial abuse and especially isolated or several incidents and when a disclosure had been made. No interactive effect was found between any of the three emotional variables and the type of abuse committed. The results of the current study suggest that characteristics of CSA such as relationship with the perpetrator and, especially, continuity of abuse and whether or not disclosure had been made, can affect the impact of emotional security on psychological distress of CSA survivors. Copyright © 2015 Elsevier Ltd. All rights reserved.

  11. Patients' sense of security during palliative care-what are the influencing factors?

    PubMed

    Milberg, Anna; Friedrichsen, Maria; Jakobsson, Maria; Nilsson, Eva-Carin; Niskala, Birgitta; Olsson, Maria; Wåhlberg, Rakel; Krevers, Barbro

    2014-07-01

    Having a sense of security is vitally important to patients who have a limited life expectancy. We sought to identify the factors associated with patients' sense of security during the palliative care period. We recruited 174 adult patients (65% of those eligible) from six palliative home care units. The relationship between the patients' sense of security during palliative care and individual factors was evaluated in a stepwise procedure using the generalized linear model (ordinal multinomial distribution and logit link). Respondents' ratings of their sense of security ranged from 1 (never) to 6 (always), with a mean value of 4.6 (SD 1.19). Patients with lower feelings of security experienced higher stress; more worry about personal finances; lower feelings of self-efficacy; a lower sense of security with the palliative care provided (lower ratings on subscales of care interaction); mastery; prevailed own identity; higher symptom intensity (especially depression, anxiety, and lack of well-being); lower health-related quality of life; lower attachment anxiety and avoidance; less support from family, relatives, and friends; lower comfort for those closest to them; and more often had gynecological cancer. Six variables (mastery, nervousness and stress, gynecological cancer, self-efficacy, worrying about personal finances, and avoidance) were selected in building the stepwise model. These findings stress the importance of palliative care services in supporting dying patients' sense of security through symptom management with a wide scope and through supporting the patients' sense of mastery, identity, and perception of a secure care interaction and also through attention to the family members' situation. Copyright © 2014 U.S. Cancer Pain Relief Committee. Published by Elsevier Inc. All rights reserved.

  12. Nonlinear Interactions between Laser Radiation and Spin-Aligned Carriers in Semiconductors.

    DTIC Science & Technology

    1980-11-25

    Massachusetts 02154 AIR FORCE OFFICEK OF SCIWMTIFIC RESWACHi (AISC) NOTICE OF TRJAZSMITTAL TO DDC This techniical raouti has been reviewed an I approved...f’or PuAli release JAN A.FR 190-12 (7b). Distribution is wilimited. &. D. BLOSA Technical Inorwatiom Oftlee UNCLASSIFIED SECURITY CLASSIFICATION OF...well. The material of choice D I 1473 UNCLASSIFIED.6- SECURITY CLASSIFICATION OF THIS PAGE (mien Deta Entered) UNCLASSIFIED SECURITY CLASSIFICATION OF

  13. [Calculation on ecological security baseline based on the ecosystem services value and the food security].

    PubMed

    He, Ling; Jia, Qi-jian; Li, Chao; Xu, Hao

    2016-01-01

    The rapid development of coastal economy in Hebei Province caused rapid transition of coastal land use structure, which has threatened land ecological security. Therefore, calculating ecosystem service value of land use and exploring ecological security baseline can provide the basis for regional ecological protection and rehabilitation. Taking Huanghua, a city in the southeast of Hebei Province, as an example, this study explored the joint point, joint path and joint method between ecological security and food security, and then calculated the ecological security baseline of Huanghua City based on the ecosystem service value and the food safety standard. The results showed that ecosystem service value of per unit area from maximum to minimum were in this order: wetland, water, garden, cultivated land, meadow, other land, salt pans, saline and alkaline land, constructive land. The order of contribution rates of each ecological function value from high to low was nutrient recycling, water conservation, entertainment and culture, material production, biodiversity maintenance, gas regulation, climate regulation and environmental purification. The security baseline of grain production was 0.21 kg · m⁻², the security baseline of grain output value was 0.41 yuan · m⁻², the baseline of ecosystem service value was 21.58 yuan · m⁻², and the total of ecosystem service value in the research area was 4.244 billion yuan. In 2081 the ecological security will reach the bottom line and the ecological system, in which human is the subject, will be on the verge of collapse. According to the ecological security status, Huanghua can be divided into 4 zones, i.e., ecological core protection zone, ecological buffer zone, ecological restoration zone and human activity core zone.

  14. Defining Information Security.

    PubMed

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  15. Simple & Secure: Attitude and behaviour towards security and usability in internet products and services at home

    NASA Astrophysics Data System (ADS)

    Wolthuis, Reinder; Broenink, Gerben; Fransen, Frank; Schultz, Sven; de Vries, Arnout

    This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more devices are (inter)connected to form a complex end-to-end chain in using online services. In our research, we constructed a model to determine the delta between the perceived overall security and the real security in home networks. To achieve an understanding of perception and how to identify the delta between perceived and real security, our work forms the basis for examining how perception relates to behaviour. Since humans are referred to as the weakest link in security, there are also differences in behaviour and desired behaviour from a security perspective.

  16. An Axiology of Information Security for Futuristic Neuroprostheses: Upholding Human Values in the Context of Technological Posthumanization

    PubMed Central

    Gladden, Matthew E.

    2017-01-01

    Previous works exploring the challenges of ensuring information security for neuroprosthetic devices and their users have typically built on the traditional InfoSec concept of the “CIA Triad” of confidentiality, integrity, and availability. However, we argue that the CIA Triad provides an increasingly inadequate foundation for envisioning information security for neuroprostheses, insofar as it presumes that (1) any computational systems to be secured are merely instruments for expressing their human users' agency, and (2) computing devices are conceptually and practically separable from their users. Drawing on contemporary philosophy of technology and philosophical and critical posthumanist analysis, we contend that futuristic neuroprostheses could conceivably violate these basic InfoSec presumptions, insofar as (1) they may alter or supplant their users' biological agency rather than simply supporting it, and (2) they may structurally and functionally fuse with their users to create qualitatively novel “posthumanized” human-machine systems that cannot be secured as though they were conventional computing devices. Simultaneously, it is noted that many of the goals that have been proposed for future neuroprostheses by InfoSec researchers (e.g., relating to aesthetics, human dignity, authenticity, free will, and cultural sensitivity) fall outside the scope of InfoSec as it has historically been understood and touch on a wide range of ethical, aesthetic, physical, metaphysical, psychological, economic, and social values. We suggest that the field of axiology can provide useful frameworks for more effectively identifying, analyzing, and prioritizing such diverse types of values and goods that can (and should) be pursued through InfoSec practices for futuristic neuroprostheses. PMID:29163010

  17. An Axiology of Information Security for Futuristic Neuroprostheses: Upholding Human Values in the Context of Technological Posthumanization.

    PubMed

    Gladden, Matthew E

    2017-01-01

    Previous works exploring the challenges of ensuring information security for neuroprosthetic devices and their users have typically built on the traditional InfoSec concept of the "CIA Triad" of confidentiality, integrity, and availability. However, we argue that the CIA Triad provides an increasingly inadequate foundation for envisioning information security for neuroprostheses, insofar as it presumes that (1) any computational systems to be secured are merely instruments for expressing their human users' agency, and (2) computing devices are conceptually and practically separable from their users. Drawing on contemporary philosophy of technology and philosophical and critical posthumanist analysis, we contend that futuristic neuroprostheses could conceivably violate these basic InfoSec presumptions, insofar as (1) they may alter or supplant their users' biological agency rather than simply supporting it, and (2) they may structurally and functionally fuse with their users to create qualitatively novel "posthumanized" human-machine systems that cannot be secured as though they were conventional computing devices. Simultaneously, it is noted that many of the goals that have been proposed for future neuroprostheses by InfoSec researchers (e.g., relating to aesthetics, human dignity, authenticity, free will, and cultural sensitivity) fall outside the scope of InfoSec as it has historically been understood and touch on a wide range of ethical, aesthetic, physical, metaphysical, psychological, economic, and social values. We suggest that the field of axiology can provide useful frameworks for more effectively identifying, analyzing, and prioritizing such diverse types of values and goods that can (and should) be pursued through InfoSec practices for futuristic neuroprostheses.

  18. Protecting genomic data analytics in the cloud: state of the art and opportunities.

    PubMed

    Tang, Haixu; Jiang, Xiaoqian; Wang, Xiaofeng; Wang, Shuang; Sofia, Heidi; Fox, Dov; Lauter, Kristin; Malin, Bradley; Telenti, Amalio; Xiong, Li; Ohno-Machado, Lucila

    2016-10-13

    The outsourcing of genomic data into public cloud computing settings raises concerns over privacy and security. Significant advancements in secure computation methods have emerged over the past several years, but such techniques need to be rigorously evaluated for their ability to support the analysis of human genomic data in an efficient and cost-effective manner. With respect to public cloud environments, there are concerns about the inadvertent exposure of human genomic data to unauthorized users. In analyses involving multiple institutions, there is additional concern about data being used beyond agreed research scope and being prcoessed in untrused computational environments, which may not satisfy institutional policies. To systematically investigate these issues, the NIH-funded National Center for Biomedical Computing iDASH (integrating Data for Analysis, 'anonymization' and SHaring) hosted the second Critical Assessment of Data Privacy and Protection competition to assess the capacity of cryptographic technologies for protecting computation over human genomes in the cloud and promoting cross-institutional collaboration. Data scientists were challenged to design and engineer practical algorithms for secure outsourcing of genome computation tasks in working software, whereby analyses are performed only on encrypted data. They were also challenged to develop approaches to enable secure collaboration on data from genomic studies generated by multiple organizations (e.g., medical centers) to jointly compute aggregate statistics without sharing individual-level records. The results of the competition indicated that secure computation techniques can enable comparative analysis of human genomes, but greater efficiency (in terms of compute time and memory utilization) are needed before they are sufficiently practical for real world environments.

  19. Securitization, alterity, and the state Human (in)security on an Amazonian frontier

    PubMed Central

    Brightman, Marc; Grotti, Vanessa

    2016-01-01

    Focusing on the region surrounding the Maroni River, which forms the border between Suriname and French Guiana, we examine how relations between different state and non-state social groups are articulated in terms of security. The region is characterised by multiple “borders” and frontiers of various kinds, the state boundary having the features of an interface or contact zone. Several key collectivities meet in this border zone: native Amazonians, tribal Maroon peoples, migrant Brazilian gold prospectors, and metropolitan French state functionaries. We explore the relationships between these different sets of actors and describe how their mutual encounters center on discourses of human and state security, thus challenging the commonly held view of the region as a stateless zone and showing that the “human security” of citizens from the perspective of the state may compete with locally salient ideas or experiences of well-being. PMID:27996063

  20. Complex interactions among climate change, sanitation, and groundwater quality: A case study from Ramotswa, Botswana

    NASA Astrophysics Data System (ADS)

    McGill, B. M.; Altchenko, Y.; Kenabatho, P. K.; Sylvester, S. R.; Villholth, K. G.

    2017-12-01

    With population growth, rapid urbanization, and climate change, groundwater is becoming an increasingly important source of drinking water around the world, including southern Africa. This is an investigation into the coupled human and natural system linking climate change, droughts, sanitation, and groundwater quality in Ramotswa, a town in the semi-arid southeastern Botswana. During the recent drought from 2013-2016, water shortages from reservoirs that supply the larger city of Gaborone resulted in curtailed water supply to Ramotswa, forcing people with flush toilets to use pit latrines. Pit latrines have been suspected as the cause of elevated nitrate in the Ramotswa groundwater, which also contributes to the town's drinking water supply. The groundwater pollution paradoxically makes Ramotswa dependent on Gaborone's water, supplied in large part by surface reservoirs, which are vulnerable to drought. Analysis of long-term rainfall records indicates that droughts like the one in 2013-2016 are increasing in likelihood due to climate change. Because of the drought, many more people used pit latrines than under normal conditions. Analysis of the groundwater for nitrate and using caffeine as an indicator, human waste leaching from pit latrines is implicated as the major culprit for the nitrate pollution. The results indicate a critical indirect linkage between climate change, sanitation, groundwater quality and water security in this area of rapid urbanization and population growth. Recommendations are offered for how Ramotswa's water security could be made less vulnerable to climate change.

  1. Understanding Transgender and Medically Assisted Gender Transition: Feminism as a Critical Resource.

    PubMed

    Nelson, Jamie Lindemann

    2016-11-01

    Feminism has fought the trivialization of women's experiences, championed women's security, and insisted on respect for women's choices. In so doing, feminism has developed important perspectives on the complicated connections between what gender means as it plays itself in people's lives, and the inequalities of power and authority that structure much of human experience. Here, I put a few of these perspectives into contact with an issue where the interactions of gender and power are squarely in play: medicine's role in assisting gender transitioning generally and, specifically, the enduring controversy between medicine and many transgender people about the pathologization of transgender and the role of clinicians as gatekeepers to gender-transition interventions. © 2016 American Medical Association. All Rights Reserved.

  2. Food security and sustainable intensification

    PubMed Central

    Godfray, H. Charles J.; Garnett, Tara

    2014-01-01

    The coming decades are likely to see increasing pressures on the global food system, both on the demand side from increasing population and per capita consumption, and on the supply side from greater competition for inputs and from climate change. This paper argues that the magnitude of the challenge is such that action is needed throughout the food system, on moderating demand, reducing waste, improving governance and producing more food. It discusses in detail the last component, arguing that more food should be produced using sustainable intensification (SI) strategies, and explores the rationale behind, and meaning of, this term. It also investigates how SI may interact with other food policy agendas, in particular, land use and biodiversity, animal welfare and human nutrition. PMID:24535385

  3. Physical security and cyber security issues and human error prevention for 3D printed objects: detecting the use of an incorrect printing material

    NASA Astrophysics Data System (ADS)

    Straub, Jeremy

    2017-06-01

    A wide variety of characteristics of 3D printed objects have been linked to impaired structural integrity and use-efficacy. The printing material can also have a significant impact on the quality, utility and safety characteristics of a 3D printed object. Material issues can be created by vendor issues, physical security issues and human error. This paper presents and evaluates a system that can be used to detect incorrect material use in a 3D printer, using visible light imaging. Specifically, it assesses the ability to ascertain the difference between materials of different color and different types of material with similar coloration.

  4. Attachment and Family Processes in Children's Psychological Adjustment in Middle Childhood.

    PubMed

    Demby, Kimberly P; Riggs, Shelley A; Kaminski, Patricia L

    2017-03-01

    This study examined the links between parent-child attachment, whole family interaction patterns, and child emotional adjustment and adaptability in a sample of 86 community families with children between the ages of 8 and 11 years. Family interactions were observed and coded with the System for Coding Interactions and Family Functioning (SCIFF; Lindahl, 2001). Both parents and each target child completed the appropriate form of the Behavior Assessment System for Children-2nd Edition (BASC-2; Reynolds & Kamphaus, 2004). Target children also completed the Children's Coping Strategies Questionnaire (CCSQ; Yunger, Corby, & Perry, 2005). Hierarchical multiple regressions indicated that Secure mother-child attachment was a robust predictor of children's emotional symptoms, but father-child attachment strategies were not significant independent predictors. Positive Affect in family interactions significantly increased the amount of variance accounted for in children's emotional symptoms. In addition, Family Cohesion and Positive Affect moderated the relationship between father-child attachment and children's emotional symptoms. When data from all BASC-2 informants (mother, father, child) were considered simultaneously and multidimensional constructs were modeled, mother-child security directly predicted children's adjustment and adaptive skills, but the influence of father-child security was fully mediated through positive family functioning. Results of the current study support the utility of considering dyadic attachment and family interaction patterns conjointly when conceptualizing and fostering positive emotional and behavioral outcomes in children. © 2015 Family Process Institute.

  5. Putting the Human Back in the Protocol

    NASA Astrophysics Data System (ADS)

    Christianson, Bruce

    Hello, everyone, and welcome to the 14th International Security Protocols Workshop. I’m going to start with a quotation from someone who, at least in principle, is in charge of a very different security community than ours:

  6. 48 CFR 339.7103 - Solicitation and contract clause.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... clause. 339.7103 Section 339.7103 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management...-72, Security Requirements for Federal Information Technology Resources, in solicitations and...

  7. 48 CFR 339.7101 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 339.7101 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7101 Policy. HHS is responsible for implementing an information security program to ensure that its information systems and...

  8. 48 CFR 339.7101 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 339.7101 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7101 Policy. HHS is responsible for implementing an information security program to ensure that its information systems and...

  9. 48 CFR 339.7103 - Solicitation and contract clause.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... clause. 339.7103 Section 339.7103 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management...-72, Security Requirements for Federal Information Technology Resources, in solicitations and...

  10. 48 CFR 339.7103 - Solicitation and contract clause.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... clause. 339.7103 Section 339.7103 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management...-72, Security Requirements for Federal Information Technology Resources, in solicitations and...

  11. 48 CFR 339.7101 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 339.7101 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7101 Policy. HHS is responsible for implementing an information security program to ensure that its information systems and...

  12. 48 CFR 339.7103 - Solicitation and contract clause.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... clause. 339.7103 Section 339.7103 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management...-72, Security Requirements for Federal Information Technology Resources, in solicitations and...

  13. 48 CFR 339.7101 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 339.7101 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7101 Policy. HHS is responsible for implementing an information security program to ensure that its information systems and...

  14. Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication

    DTIC Science & Technology

    2004-11-01

    the context of, e.g., a smart home (Section 7). Our implementation is detailed in Section 8, with a security analysis is Section 9. Section 10...establishment of security parame- ters [17]. This work considers a smart home , where a user may want to establish a security context for controlling...appliances or other devices in a smart - home . We refer to the security property discussed in this work as presence, where it is desirable that only users or

  15. Humans Are Still the Critical Factor in Aviation Security.

    PubMed

    Krüger, Jenny Kathinka; Suchan, Boris

    2015-10-01

    In Germany, the German Federal Police assess the performance of aviation security screeners on a regular basis. These so-called "reality tests" are unannounced examinations which aim to investigate whether airport screeners can detect forbidden items in hand luggage or attached to the body. Recent alarming results of such inspections showed clearly that the overall detection rate is in need of improvement. To achieve this, it is important to identify specific factors that influence general screening performance. This especially includes basic cognitive functions like visual screening, alertness, and divided attention, which have come more and more into focus in current fundamental research projects. This brief commentary points out critical factors, contributes background conditions in aviation security screening, and shows possible approaches for enhancement and optimization. Finally, the human aspect is discussed as not only being the weakest factor in security screening, but also one of major importance.

  16. Human Reliability Program Workshop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Landers, John; Rogers, Erin; Gerke, Gretchen

    A Human Reliability Program (HRP) is designed to protect national security as well as worker and public safety by continuously evaluating the reliability of those who have access to sensitive materials, facilities, and programs. Some elements of a site HRP include systematic (1) supervisory reviews, (2) medical and psychological assessments, (3) management evaluations, (4) personnel security reviews, and (4) training of HRP staff and critical positions. Over the years of implementing an HRP, the Department of Energy (DOE) has faced various challenges and overcome obstacles. During this 4-day activity, participants will examine programs that mitigate threats to nuclear security andmore » the insider threat to include HRP, Nuclear Security Culture (NSC) Enhancement, and Employee Assistance Programs. The focus will be to develop an understanding of the need for a systematic HRP and to discuss challenges and best practices associated with mitigating the insider threat.« less

  17. Water Security - National and Global Issues

    NASA Astrophysics Data System (ADS)

    Tindall, J. A.; Campbell, A. A.; Moran, E. H.

    2010-12-01

    Water is fundamental to human life. Disruption of water supplies by the Water Threats and Hazards Triad (WTHT) — man-made, natural, and technological hazards — could threaten the delivery of vital human services, endanger public health and the environment, potentially cause mass casualties, and threaten population sustainability, social stability, and homeland security. Water distribution systems extend over vast areas and are therefore vulnerable to a wide spectrum of threats — from natural hazards such as large forest fires that result in runoff and debris flow that clog reservoirs, and reduce, disrupt, or contaminate water supply and quality to threats from natural, man-made, or political extremist attacks. Our research demonstrates how devising concepts and counter measures to protect water supplies will assist the public, policy makers, and planners at local, Tribal, State, and Federal levels to develop solutions for national and international water-security and sustainability issues. Water security is an issue in which the entire global community is stakeholders.

  18. Computer Network Security- The Challenges of Securing a Computer Network

    NASA Technical Reports Server (NTRS)

    Scotti, Vincent, Jr.

    2011-01-01

    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

  19. 17 CFR 240.14a-17 - Electronic shareholder forums.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Electronic shareholder forums... Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-17 Electronic shareholder... establish, maintain, or operate an electronic shareholder forum to facilitate interaction among the...

  20. 17 CFR 240.14a-17 - Electronic shareholder forums.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 17 Commodity and Securities Exchanges 3 2012-04-01 2012-04-01 false Electronic shareholder forums... Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-17 Electronic shareholder... establish, maintain, or operate an electronic shareholder forum to facilitate interaction among the...

  1. 17 CFR 240.14a-17 - Electronic shareholder forums.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 17 Commodity and Securities Exchanges 3 2013-04-01 2013-04-01 false Electronic shareholder forums... Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-17 Electronic shareholder... establish, maintain, or operate an electronic shareholder forum to facilitate interaction among the...

  2. 17 CFR 240.14a-17 - Electronic shareholder forums.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 17 Commodity and Securities Exchanges 4 2014-04-01 2014-04-01 false Electronic shareholder forums... Securities Exchange Act of 1934 Regulation 14a: Solicitation of Proxies § 240.14a-17 Electronic shareholder... establish, maintain, or operate an electronic shareholder forum to facilitate interaction among the...

  3. 78 FR 25723 - National Assessment Governing Board; Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-02

    ..., assistive listening devices, materials in alternative format) should notify Munira Mwalimu at 202- 357-6938.... to review secure NAEP test materials for Science Interactive Computer Tasks (ICTs) at grades 4, 8... provided with secure items and materials which are not yet available for release to the general public...

  4. Caregiver Sensitivity, Contingent Social Responsiveness, and Secure Infant Attachment

    ERIC Educational Resources Information Center

    Dunst, Carl J.; Kassow, Danielle Z.

    2008-01-01

    Findings from two research syntheses of the relationship between caregiver sensitivity and secure infant attachment and one research synthesis of factors associated with increased caregiver use of a sensitive interactional style are presented. The main focus of analysis was the extent to which different measures of caregiver contingent social…

  5. Stability and Change in Attachment Security Across Adolescence

    PubMed Central

    Allen, Joseph P.; McElhaney, Kathleen Boykin; Kuperminc, Gabriel P.; Jodl, Kathleen M.

    2006-01-01

    This study examined both continuity and familial, intrapsychic, and environmental predictors of change in adolescent attachment security across a two-year period from mid- to late-adolescence. Assessments included the Adult Attachment Interview, observed mother-adolescent interactions, test-based data, and adolescent self-reports obtained from an ethnically and socio-economically diverse sample of moderately at-risk adolescents interviewed at ages 16 and 18. Substantial stability in security was identified. Beyond this stability, however, relative declines in attachment security were predicted by adolescents’ enmeshed, overpersonalizing behavior with their mothers, depressive symptoms, and poverty status. Results suggest that while security may trend upward for non-stressed adolescents, stressors that overwhelm the capacity for affect regulation and that are not easily assuaged by parents predict relative declines in security. over time. PMID:15566380

  6. Maintaining Situation Awareness with Autonomous Airborne Observation Platforms

    NASA Technical Reports Server (NTRS)

    Freed, Michael; Fitzgerald, Will

    2005-01-01

    Unmanned Aerial Vehicles (UAVs) offer tremendous potential as intelligence, surveillance and reconnaissance (ISR) platforms for early detection of security threats and for acquisition and maintenance of situation awareness in crisis conditions. However, using their capabilities effectively requires addressing a range of practical and theoretical problems. The paper will describe progress by the "Autonomous Rotorcraft Project," a collaborative effort between NASA and the U.S. Army to develop a practical, flexible capability for UAV-based ISR. Important facets of the project include optimization methods for allocating scarce aircraft resources to observe numerous, distinct sites of interest; intelligent flight automation software than integrates high-level plan generation capabilities with executive control, failure response and flight control functions; a system architecture supporting reconfiguration of onboard sensors to address different kinds of threats; and an advanced prototype vehicle designed to allow large-scale production at low cost. The paper will also address human interaction issues including an empirical method for determining how to allocate roles and responsibilities between flight automation and human operations.

  7. Utilization of Integrated Assessment Modeling for determining geologic CO2 storage security

    NASA Astrophysics Data System (ADS)

    Pawar, R.

    2017-12-01

    Geologic storage of carbon dioxide (CO2) has been extensively studied as a potential technology to mitigate atmospheric concentration of CO2. Multiple international research & development efforts, large-scale demonstration and commercial projects are helping advance the technology. One of the critical areas of active investigation is prediction of long-term CO2 storage security and risks. A quantitative methodology for predicting a storage site's long-term performance is critical for making key decisions necessary for successful deployment of commercial scale projects where projects will require quantitative assessments of potential long-term liabilities. These predictions are challenging given that they require simulating CO2 and in-situ fluid movements as well as interactions through the primary storage reservoir, potential leakage pathways (such as wellbores, faults, etc.) and shallow resources such as groundwater aquifers. They need to take into account the inherent variability and uncertainties at geologic sites. This talk will provide an overview of an approach based on integrated assessment modeling (IAM) to predict long-term performance of a geologic storage site including, storage reservoir, potential leakage pathways and shallow groundwater aquifers. The approach utilizes reduced order models (ROMs) to capture the complex physical/chemical interactions resulting due to CO2 movement and interactions but are computationally extremely efficient. Applicability of the approach will be demonstrated through examples that are focused on key storage security questions such as what is the probability of leakage of CO2 from a storage reservoir? how does storage security vary for different geologic environments and operational conditions? how site parameter variability and uncertainties affect storage security, etc.

  8. Shape-based human detection for threat assessment

    NASA Astrophysics Data System (ADS)

    Lee, Dah-Jye; Zhan, Pengcheng; Thomas, Aaron; Schoenberger, Robert B.

    2004-07-01

    Detection of intrusions for early threat assessment requires the capability of distinguishing whether the intrusion is a human, an animal, or other objects. Most low-cost security systems use simple electronic motion detection sensors to monitor motion or the location of objects within the perimeter. Although cost effective, these systems suffer from high rates of false alarm, especially when monitoring open environments. Any moving objects including animals can falsely trigger the security system. Other security systems that utilize video equipment require human interpretation of the scene in order to make real-time threat assessment. Shape-based human detection technique has been developed for accurate early threat assessments for open and remote environment. Potential threats are isolated from the static background scene using differential motion analysis and contours of the intruding objects are extracted for shape analysis. Contour points are simplified by removing redundant points connecting short and straight line segments and preserving only those with shape significance. Contours are represented in tangent space for comparison with shapes stored in database. Power cepstrum technique has been developed to search for the best matched contour in database and to distinguish a human from other objects from different viewing angles and distances.

  9. Indirect effect of management support on users' compliance behaviour towards information security policies.

    PubMed

    Humaidi, Norshima; Balakrishnan, Vimala

    2018-01-01

    Health information systems are innovative products designed to improve the delivery of effective healthcare, but they are also vulnerable to breaches of information security, including unauthorised access, use, disclosure, disruption, modification or destruction, and duplication of passwords. Greater openness and multi-connectedness between heterogeneous stakeholders within health networks increase the security risk. The focus of this research was on the indirect effects of management support (MS) on user compliance behaviour (UCB) towards information security policies (ISPs) among health professionals in selected Malaysian public hospitals. The aim was to identify significant factors and provide a clearer understanding of the nature of compliance behaviour in the health sector environment. Using a survey design and stratified random sampling method, self-administered questionnaires were distributed to 454 healthcare professionals in three hospitals. Drawing on theories of planned behaviour, perceived behavioural control (self-efficacy (SE) and MS components) and the trust factor, an information system security policies compliance model was developed to test three related constructs (MS, SE and perceived trust (PT)) and their relationship to UCB towards ISPs. Results showed a 52.8% variation in UCB through significant factors. Partial least squares structural equation modelling demonstrated that all factors were significant and that MS had an indirect effect on UCB through both PT and SE among respondents to this study. The research model based on the theory of planned behaviour in combination with other human and organisational factors has made a useful contribution towards explaining compliance behaviour in relation to organisational ISPs, with trust being the most significant factor. In adopting a multidimensional approach to management-user interactions via multidisciplinary concepts and theories to evaluate the association between the integrated management-user values and the nature of compliance towards ISPs among selected health professionals, this study has made a unique contribution to the literature.

  10. [Simulation of urban ecological security pattern based on cellular automata: a case of Dongguan City, Guangdong Province of South China].

    PubMed

    Yang, Qing-Sheng; Qiao, Ji-Gang; Ai, Bin

    2013-09-01

    Taking the Dongguan City with rapid urbanization as a case, and selecting landscape ecological security level as evaluation criterion, the urbanization cellular number of 1 km x 1 km ecological security cells was obtained, and imbedded into the transition rules of cellular automata (CA) as the restraint term to control urban development, establish ecological security urban CA, and simulate ecological security urban development pattern. The results showed the integrated landscape ecological security index of the City decreased from 0.497 in 1998 to 0.395 in 2005, indicating that the ecological security at landscape scale was decreased. The CA-simulated integrated ecological security index of the City in 2005 was increased from the measured 0.395 to 0.479, showing that the simulated urban landscape ecological pressure from human became lesser, ecological security became better, and integrated landscape ecological security became higher. CA could be used as an effective tool in researching urban ecological security.

  11. 45 CFR 164.302 - Applicability.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164..., implementation specifications, and requirements of this subpart with respect to electronic protected health...

  12. 45 CFR 164.302 - Applicability.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES ADMINISTRATIVE DATA STANDARDS AND RELATED REQUIREMENTS SECURITY AND PRIVACY Security Standards for the Protection of Electronic Protected Health Information § 164... specifications, and requirements of this subpart with respect to electronic protected health information. ...

  13. A Food in Health Security (FIHS) platform in the Asia-Pacific Region: the way forward.

    PubMed

    Wahlqvist, Mark L; Keatinge, John Donough H; Butler, Colin D; Friel, Sharon; McKay, John; Easdown, Warwick; Kuo, Ken N; Huang, Ching-jang; Pan, Wen-Harn; Yang, Ray-Yu; Lee, Meei-Shyuan; Chang, Hsing-Yi; Chiu, Ya-Wen; Jaron, Dov; Krawinkel, Michael; Barlow, Snow; Walsh, Greg; Chiang, Tung-liang; Huang, Po-Chao; Li, Duo

    2009-01-01

    The advent of multiple global crises, especially those of climate change, economics, energy, water, food and health evident in 2008, is of considerable moment to those who are suffering their consequences and for those with responsibility and interest in the systems affected. A coalition of parties in the Asia Pacific Region who work in the food and health systems met in August, 2009 in Taiwan and instigated a Food in Health Security (FIHS) Network which might join with other like-minded networks in and beyond the region. Sustainable health has many dimensions, among which food and nutrition is often neglected; there is a wide spectrum of nutritionally-related disorders. Malnutrition remains the global concern for agricultural research and development scientists and linkage with the health sector is key to progress. The disconnect between agricultural and health sectors negatively impacts consumer nutrition and health. Ethical and equity affect food and health systems. Food and health security is attainable only when the underlying social inequities are addressed; it is an ethical issue as reflected in the UN Universal declaration of Human Rights which includes the right to food for health and well-being. Food and health security are part of the larger security agenda and merit corresponding attention. Policy recommendations with immediacy are greater investment in combined food and health research; an Asia Pacific security agenda which emphasizes planetary, human, health and food security as relevant to traditional defence security; and community and household security measures which include maternal literacy, communication technology and entrepreneurial opportunity.

  14. Safety and Security of Older Persons in Tehran, Iran: A Sociological Appraisal of Elder Abuse

    ERIC Educational Resources Information Center

    Sheykhi, Mohammad Taghi

    2010-01-01

    The article explores and evaluates the quality of life, safety, and security of elderly people in Tehran City in Iran. In that, different dimensions of material and social well-being, and abuse of people of the age 65 and above, are assessed. Besides the human rights, the dignity, and the gradual decline of the elderly's social security are…

  15. Attachment style and oxytocin receptor gene variation interact in influencing social anxiety.

    PubMed

    Notzon, S; Domschke, K; Holitschke, K; Ziegler, C; Arolt, V; Pauli, P; Reif, A; Deckert, J; Zwanzger, P

    2016-01-01

    Social anxiety has been suggested to be promoted by an insecure attachment style. Oxytocin is discussed as a mediator of trust and social bonding as well as a modulator of social anxiety. Applying a gene-environment (G × E) interaction approach, in the present pilot study the main and interactive effects of attachment styles and oxytocin receptor (OXTR) gene variation were probed in a combined risk factor model of social anxiety in healthy probands. Participants (N = 388; 219 females, 169 males; age 24.7 ± 4.7 years) were assessed for anxiety in social situations (Social Phobia and Anxiety Inventory) depending on attachment style (Adult Attachment Scale, AAS) and OXTR rs53576 A/G genotype. A less secure attachment style was significantly associated with higher social anxiety. This association was partly modulated by OXTR genotype, with a stronger negative influence of a less secure attachment style on social anxiety in A allele carriers as compared to GG homozygotes. The present pilot data point to a strong association of less secure attachment and social anxiety as well as to a gene-environment interaction effect of OXTR rs53576 genotype and attachment style on social anxiety possibly constituting a targetable combined risk marker of social anxiety disorder.

  16. Global water risks and national security: Building resilience (Invited)

    NASA Astrophysics Data System (ADS)

    Pulwarty, R. S.

    2013-12-01

    The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere, and (3) Identify preventable risks, public leadership and private innovation needed for developing adaptive water resource management institutions that take advantage of climate and hydrologic information and changes. The presentation will conclude with a preliminary framework for assessing and implementing water security measures given insecure conditions introduced by a changing climate and in the context of national security.

  17. Climate change and nutrition: creating a climate for nutrition security.

    PubMed

    Tirado, M C; Crahay, P; Mahy, L; Zanev, C; Neira, M; Msangi, S; Brown, R; Scaramella, C; Costa Coitinho, D; Müller, A

    2013-12-01

    Climate change further exacerbates the enormous existing burden of undernutrition. It affects food and nutrition security and undermines current efforts to reduce hunger and promote nutrition. Undernutrition in turn undermines climate resilience and the coping strategies of vulnerable populations. The objectives of this paper are to identify and undertake a cross-sectoral analysis of the impacts of climate change on nutrition security and the existing mechanisms, strategies, and policies to address them. A cross-sectoral analysis of the impacts of climate change on nutrition security and the mechanisms and policies to address them was guided by an analytical framework focused on the three 'underlying causes' of undernutrition: 1) household food access, 2) maternal and child care and feeding practices, 3) environmental health and health access. The analytical framework includes the interactions of the three underlying causes of undernutrition with climate change,vulnerability, adaptation and mitigation. Within broad efforts on climate change mitigation and adaptation and climate-resilient development, a combination of nutrition-sensitive adaptation and mitigation measures, climate-resilient and nutrition-sensitive agricultural development, social protection, improved maternal and child care and health, nutrition-sensitive risk reduction and management, community development measures, nutrition-smart investments, increased policy coherence, and institutional and cross-sectoral collaboration are proposed as a means to address the impacts of climate change to food and nutrition security. This paper proposes policy directions to address nutrition in the climate change agenda and recommendations for consideration by the UN Framework Convention on Climate Change (UNFCCC). Nutrition and health stakeholders need to be engaged in key climate change adaptation and mitigation initiatives, including science-based assessment by the Intergovernmental Panel on Climate Change (IPCC), and policies and actions formulated by the UN Framework Convention on Climate Change (UNFCCC). Improved multi-sectoral coordination and political will is required to integrate nutrition-sensitive actions into climate-resilient sustainable development efforts in the UNFCCC work and in the post 2015 development agenda. Placing human rights at the center of strategies to mitigate and adapt to the impacts of climate change and international solidarity is essential to advance sustainable development and to create a climate for nutrition security.

  18. Comparisons of Attacks on Honeypots With Those on Real Networks

    DTIC Science & Technology

    2006-03-01

    Oracle , MySQL , or PostgreSQL. Figure 2 shows an incoming packet and the process involved before and after the Snort engine detects the suspicious...stored on a separate, secured system.”[2]. Honeypots have several other uses besides monitoring attackers. They serve to protect real networks and...interaction vs . high-interaction. Although, both low-interaction and high-interaction honeypots are effective in soliciting attacks, high-interaction

  19. Intelligence, Information Technology, and Information Warfare.

    ERIC Educational Resources Information Center

    Davies, Philip H. J.

    2002-01-01

    Addresses the use of information technology for intelligence and information warfare in the context of national security and reviews the status of clandestine collection. Discusses hacking, human agent collection, signal interception, covert action, counterintelligence and security, and communications between intelligence producers and consumers…

  20. 77 FR 49029 - Excepted Service

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-15

    ... the Special DD120075 6/1/2012 Assistant Assistant(Cyber Secretary of Policy). Defense, Global... for Legislation. Department of Homeland Security. Office of the Chief Special Assistant.. DM120131 6/1... Security, Issues. Democracy and Human Rights. Department of Transportation.... Secretary Special Assistant...

Top