Addressing the Economic Security Issues Facing Same-Sex Couples.
ERIC Educational Resources Information Center
Dolan, Elizabeth M.; Stum, Marlene S.; Rupured, Michael
1999-01-01
Provides educators and researchers with an awareness of the financial security issues faced by same-sex couples and offers suggestions for incorporating the discussion of these ideas into existing curricula and research. (Author/JOW)
Contemporary United States Foreign Policy Towards Indonesia
2004-01-01
regard to resolving a number of longstanding territorial disputes, and it has become a cornerstone for the promotion of economic and social development...and stability and security in the region. However, Indonesia is also faced with a variety of social , economic, and internal security issues, most...faced with significant social , economic, and security issues. Thesis Question The thesis question is: Does contemporary US policy promote US national
DOT National Transportation Integrated Search
1997-03-06
This testimony discusses key resource management issues and performance challenges facing the Department of Transportation in 1998 and beyond. 1. Increased safety and security concerns prompted by accidents and maintenance issues. 2. Important manage...
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2013 CFR
2013-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2010 CFR
2010-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2011 CFR
2011-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2014 CFR
2014-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2012 CFR
2012-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S
2003-01-01
A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.
Privacy, security and access with sensitive health information.
Croll, Peter
2010-01-01
This chapter gives an educational overview of: * Confidentiality issues and the challenges faced; * The fundamental differences between privacy and security; * The different access control mechanisms; * The challenges of Internet security; * How 'safety and quality' relate to all the above.
ERIC Educational Resources Information Center
O'Day, Bonnie; Stapleton, David
2009-01-01
The transition to adulthood can be difficult for youth, particularly those who have disabilities severe enough that they receive Supplemental Security Income (SSI), Social Security Disability Insurance (DI), or other disability program benefits. Besides the issues facing all transition-age youth, young people with disabilities face a host of…
Web Server Security on Open Source Environments
NASA Astrophysics Data System (ADS)
Gkoutzelis, Dimitrios X.; Sardis, Manolis S.
Administering critical resources has never been more difficult that it is today. In a changing world of software innovation where major changes occur on a daily basis, it is crucial for the webmasters and server administrators to shield their data against an unknown arsenal of attacks in the hands of their attackers. Up until now this kind of defense was a privilege of the few, out-budgeted and low cost solutions let the defender vulnerable to the uprising of innovating attacking methods. Luckily, the digital revolution of the past decade left its mark, changing the way we face security forever: open source infrastructure today covers all the prerequisites for a secure web environment in a way we could never imagine fifteen years ago. Online security of large corporations, military and government bodies is more and more handled by open source application thus driving the technological trend of the 21st century in adopting open solutions to E-Commerce and privacy issues. This paper describes substantial security precautions in facing privacy and authentication issues in a totally open source web environment. Our goal is to state and face the most known problems in data handling and consequently propose the most appealing techniques to face these challenges through an open solution.
Security Systems Consideration: A Total Security Approach
NASA Astrophysics Data System (ADS)
Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.
2007-12-01
The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.
Iris Cryptography for Security Purpose
NASA Astrophysics Data System (ADS)
Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.
2018-04-01
In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.
17 CFR 230.460 - Distribution of preliminary prospectus.
Code of Federal Regulations, 2011 CFR
2011-04-01
... issued by a face-amount certificate company or a redeemable security issued by an open-end management... the effective date of the registration statement in the same fashion as is required in the case of...
17 CFR 230.460 - Distribution of preliminary prospectus.
Code of Federal Regulations, 2010 CFR
2010-04-01
... issued by a face-amount certificate company or a redeemable security issued by an open-end management... the effective date of the registration statement in the same fashion as is required in the case of...
Risk in the Clouds?: Security Issues Facing Government Use of Cloud Computing
NASA Astrophysics Data System (ADS)
Wyld, David C.
Cloud computing is poised to become one of the most important and fundamental shifts in how computing is consumed and used. Forecasts show that government will play a lead role in adopting cloud computing - for data storage, applications, and processing power, as IT executives seek to maximize their returns on limited procurement budgets in these challenging economic times. After an overview of the cloud computing concept, this article explores the security issues facing public sector use of cloud computing and looks to the risk and benefits of shifting to cloud-based models. It concludes with an analysis of the challenges that lie ahead for government use of cloud resources.
A secure medical data exchange protocol based on cloud environment.
Chen, Chin-Ling; Yang, Tsai-Tung; Shih, Tzay-Farn
2014-09-01
In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. In spite of many literatures discussed about medical systems, but these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a secure medical data exchange protocol based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples use medical resources on the cloud environment to seek medical advice conveniently.
ERIC Educational Resources Information Center
Florida State Dept. of Education, Tallahassee.
During summer and fall 2001, the Florida Commissioner of Education conducted eight regional meetings, open to the public, on school safety and security. The purpose of the meetings was to explore safety issues faced by districts and schools, share best safety practices, and generate local discussion on matters of school safety and security. This…
A Citizen's Guide to U.S. Foreign Policy: Election '88. Nonpartisan Briefs on 18 Key Issues.
ERIC Educational Resources Information Center
Hoepli, Nancy, Ed.; And Others
In order to make informed voting decisions citizens need background information on complex foreign policy issues facing the United States. This guide presents current issues and provides information to help citizens cast a thoughtful vote. The guide is divided into six main headings: Leadership; Security; Economic and Social Issues; Critical…
ERIC Educational Resources Information Center
Buckman, Joel; Gold, Stephanie
2012-01-01
This article outlines privacy and data security compliance issues facing postsecondary education institutions when they utilize cloud computing and concludes with a practical list of do's and dont's. Cloud computing does not change an institution's privacy and data security obligations. It does involve reliance on a third party, which requires an…
Single Logon: balancing security and healthcare productivity.
Sapp, Margaret J; Behrens, Terrence L
2004-01-01
Mayo Single Logon (MSL) has faced the traditional dilemma that is painful to all IT organizations because it forces the tradeoff between user productivity and security. Recent regulatory initiatives, such as HIPAA, have caused the issue of security to take on more importance, forcing organizations to revisit the balance of security and productivity. MSL is a security application that brokers user credentials and facilitates desktop security. The simple design, functionality and stability have allowed MSL to speed up user productivity, keep satisfaction high and help solve many security initiatives.
47 CFR 32.4200 - Long term debt and funded debt.
Code of Federal Regulations, 2010 CFR
2010-10-01
... applied to securities issued or assumed by the company, means the excess of the book or face amount of the... consideration received at their sale. (4) The face amount of debt reacquired prior to maturity that has not been... 32.4200 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES...
Preparing for War Moscow Facing an Arc of Crisis
2016-12-01
concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic
NASA Astrophysics Data System (ADS)
Balamurugan, A. M.; Sivasubramanian, A.
2014-06-01
The Optical Burst Switching (OBS) is an emergent result to the technology issue that could achieve a viable network in future. They have the ability to meet the bandwidth requisite of those applications that call for intensive bandwidth. The field of optical transmission has undergone numerous advancements and is still being researched mainly due to the fact that optical data transmission can be done at enormous speeds. The concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution and quality of service (QoS). This paper proposes a framework based on QKD based secure edge router architecture design to provide burst confidentiality. The QKD protocol offers high level of confidentiality as it is indestructible. The design architecture was implemented in FPGA using diverse models and the results were taken. The results show that the proposed model is suitable for real time secure routing applications of the Optical burst switched networks.
Issues and Challenges Facing the Minority Woman Dentist.
ERIC Educational Resources Information Center
Sinkford, Jeanne C.
1992-01-01
The status of minority women dentists is reviewed, and initiatives to improve it are noted. Issues and challenges for African-American female dentists are outlined, including negative racial/gender stereotypes, lack of advancement opportunities, difficulties in starting practices and securing professional and social support systems, lack of…
Innovation in New Mexico Los Alamos Collaboration for Explosives Detection (LACED) SensorNexus Exascale effects of tuberculosis infection on AIDS, and issues related to national security. Play video Read more
2010-11-30
legislature should help the government secure approval of its policy agenda, the political crisis left the new President with daunting challenges...The Lobo government faces significant challenges in fostering economic development in one of the hemisphere’s poorest countries; securing...indicators. The government has little room to address these issues as the country’s fiscal balance has deteriorated in recent years despite benefiting
Challenges and Security in Cloud Computing
NASA Astrophysics Data System (ADS)
Chang, Hyokyung; Choi, Euiin
People who live in this world want to solve any problems as they happen then. An IT technology called Ubiquitous computing should help the situations easier and we call a technology which makes it even better and powerful cloud computing. Cloud computing, however, is at the stage of the beginning to implement and use and it faces a lot of challenges in technical matters and security issues. This paper looks at the cloud computing security.
Security and privacy issues with health care information technology.
Meingast, Marci; Roosta, Tanya; Sastry, Shankar
2006-01-01
The face of health care is changing as new technologies are being incorporated into the existing infrastructure. Electronic patient records and sensor networks for in-home patient monitoring are at the current forefront of new technologies. Paper-based patient records are being put in electronic format enabling patients to access their records via the Internet. Remote patient monitoring is becoming more feasible as specialized sensors can be placed inside homes. The combination of these technologies will improve the quality of health care by making it more personalized and reducing costs and medical errors. While there are benefits to technologies, associated privacy and security issues need to be analyzed to make these systems socially acceptable. In this paper we explore the privacy and security implications of these next-generation health care technologies. We describe existing methods for handling issues as well as discussing which issues need further consideration.
Health and Human Services Issues. United States General Accounting Office Transition Series.
ERIC Educational Resources Information Center
General Accounting Office, Washington, DC.
Discussing major policy, management, and program issues facing Congress and the Clinton administration in the area of health and human services, this pamphlet provides recommendations for the Department of Health and Human Services (HHS) regarding the social security system, the welfare system, preventing child abuse, and safeguarding the nation's…
2001-01-01
Human Participants. National Bioethics Advisory Commission. (Forthcoming.) Research Involving Human Biological Materials: Ethical Issues and Policy...and security • Advised the president’s National Bioethics Advisory Commission on technical, ethical, and legal issues • Developed the data for the...Centers for Disease Control Department of Education Department of Housing and Urban Development NASA National Bioethics Advisory Commission Office of
Security and privacy issues of personal health.
Blobel, Bernd; Pharow, Peter
2007-01-01
While health systems in developed countries and increasingly also in developing countries are moving from organisation-centred to person-centred health service delivery, the supporting communication and information technology is faced with new risks regarding security and privacy of stakeholders involved. The comprehensively distributed environment puts special burden on guaranteeing communication security services, but even more on guaranteeing application security services dealing with privilege management, access control and audit regarding social implication and connected sensitivity of personal information recorded, processed, communicated and stored in an even internationally distributed environment.
Greenberg, Sheldon F
2007-09-01
In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.
DOT National Transportation Integrated Search
2014-11-01
Working-age veterans with disability face myriad responsibilities when they seek to rejoin civilian life. They must secure housing : and employment while coping with health care concerns and one or more disabilities. Access to transportation part...
Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium.
Somasundaram, M; Sivakumar, R
2015-01-01
Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security.
Using a Prediction Model to Manage Cyber Security Threats.
Jaganathan, Venkatesh; Cherurveettil, Priyesh; Muthu Sivashanmugam, Premapriya
2015-01-01
Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization.
Using a Prediction Model to Manage Cyber Security Threats
Muthu Sivashanmugam, Premapriya
2015-01-01
Cyber-attacks are an important issue faced by all organizations. Securing information systems is critical. Organizations should be able to understand the ecosystem and predict attacks. Predicting attacks quantitatively should be part of risk management. The cost impact due to worms, viruses, or other malicious software is significant. This paper proposes a mathematical model to predict the impact of an attack based on significant factors that influence cyber security. This model also considers the environmental information required. It is generalized and can be customized to the needs of the individual organization. PMID:26065024
47 CFR 32.7500 - Interest and related items.
Code of Federal Regulations, 2010 CFR
2010-10-01
....7500 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES UNIFORM... separately in the annual reports to this Commission. (b) These accounts shall not include charges for... provided for and included in the face amount of securities issued shall be charged at the time of issuance...
Cyberdermatoethics I: ethical, legal, technologic, and clinical aspects of patient-physician e-mail.
Luo, John; Logan, Christopher; Long, Thomas P; Bercovitch, Lionel
2009-01-01
As Internet access has become ubiquitous, electronic mail (e-mail) is becoming more widely used as a means of communication between patient and dermatologist. Dealing with the ethical, legal, and clinical consequences has lagged behind the technology. Privacy of e-mail cannot exist without security, and as a foundation for understanding e-mail security, the elements of e-mail technology are reviewed. One of the greatest risks of e-mail is compromise of privacy. Although self-documenting and convenient, e-mail lacks the emotional cues of face-to-face encounters, is asynchronous and not always read in timely fashion, and is not suitable for certain clinical concerns such as urgent matters and cancer diagnoses. Legal issues relating to federal privacy regulations, ethical issues such as autonomy and justice, and guidelines for the use of e-mail in clinical practice are reviewed. Case scenarios are used to present the pitfalls in clinical e-mail encounters, including establishment of the doctor-patient relationship, diagnosis and treatment over the Internet, and curbside consultations.
Passport Officers’ Errors in Face Matching
White, David; Kemp, Richard I.; Jenkins, Rob; Matheson, Michael; Burton, A. Mike
2014-01-01
Photo-ID is widely used in security settings, despite research showing that viewers find it very difficult to match unfamiliar faces. Here we test participants with specialist experience and training in the task: passport-issuing officers. First, we ask officers to compare photos to live ID-card bearers, and observe high error rates, including 14% false acceptance of ‘fraudulent’ photos. Second, we compare passport officers with a set of student participants, and find equally poor levels of accuracy in both groups. Finally, we observe that passport officers show no performance advantage over the general population on a standardised face-matching task. Across all tasks, we observe very large individual differences: while average performance of passport staff was poor, some officers performed very accurately – though this was not related to length of experience or training. We propose that improvements in security could be made by emphasising personnel selection. PMID:25133682
Passport officers' errors in face matching.
White, David; Kemp, Richard I; Jenkins, Rob; Matheson, Michael; Burton, A Mike
2014-01-01
Photo-ID is widely used in security settings, despite research showing that viewers find it very difficult to match unfamiliar faces. Here we test participants with specialist experience and training in the task: passport-issuing officers. First, we ask officers to compare photos to live ID-card bearers, and observe high error rates, including 14% false acceptance of 'fraudulent' photos. Second, we compare passport officers with a set of student participants, and find equally poor levels of accuracy in both groups. Finally, we observe that passport officers show no performance advantage over the general population on a standardised face-matching task. Across all tasks, we observe very large individual differences: while average performance of passport staff was poor, some officers performed very accurately--though this was not related to length of experience or training. We propose that improvements in security could be made by emphasising personnel selection.
Global Warming: Its Implications for U.S. National Security Policy
2009-03-19
The approach to this topic will be to look at the science behind anthropogenic global warming . Is man largely responsible for causing global warming due...paper will then investigate the nexus between global warming and U.S. national security policy. It will address the challenges facing U.S. leaders and...policy makers as they tackle the issue of global warming and its implications for U.S. policy. Finally it will conclude with recommendations for those
Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium
Somasundaram, M.; Sivakumar, R.
2015-01-01
Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security. PMID:26759829
Security risks associated with radio frequency identification in medical environments.
Hawrylak, Peter J; Schimke, Nakeisha; Hale, John; Papa, Mauricio
2012-12-01
Radio frequency identification (RFID) is a form of wireless communication that is used to identify assets and people. RFID has significant benefits to the medical environment. However, serious security threats are present in RFID systems that must be addressed in a medical environment. Of particular interest are threats to patient privacy and safety based on interception of messages, interruption of communication, modification of data, and fabrication of messages and devices. This paper presents an overview of these security threats present in RFID systems in a medical environment and provides guidance on potential solutions to these threats. This paper provides a roadmap for researchers and implementers to address the security issues facing RFID in the medical space.
DefenseLink.mil - Special Report - Travels With Mullen
PakistanÂs military and civilian leaders here today to discuss issues concerning PakistanÂs lack of today to discuss the situation and threats coalition and Afghan forces are facing. Story "People Information Privacy & Security External Link Disclaimer Web Policy Contact Us
Internet/Web-based administration of benefits.
Vitiello, J
2001-09-01
Most funds will face the challenge of deploying at least some Web-based functionality in the near future, if they have not already done so. Clear objectives and careful planning will help ensure success. Issues that must be considered include support requirements, security concerns, functional business objectives, and employer and member Web access.
Learning That Makes a Difference: Pedagogy and Practice for Learning Abroad
ERIC Educational Resources Information Center
Benham Rennick, Joanne
2015-01-01
Society faces significant new challenges surrounding issues in human health; global security; environmental devastation; human rights violations; economic uncertainty; population explosion and regression; recognition of diversity, difference and special populations at home and abroad. In light of these challenges, there is a great opportunity, and…
U.S., Soviets Face Common Science Problems.
ERIC Educational Resources Information Center
Lepkowski, Wil
1981-01-01
Summarizes recent findings reported in a two-volume publication, "Science Policy: USA/USSR," issued by the National Science Foundation. Volumes I and II review U.S. and Soviet science policy in research and development, respectively. Comparisons are made concerning common problems around energy, environment, and the meaning of security.…
ERIC Educational Resources Information Center
Schwartz, Edward
The purpose of this eight-unit course is to explore the values and issues of modern urban neighborhoods. It focuses on how community leaders can apply the broad principle of justice to problems of security, reciprocity, and fellowship that face most neighborhoods today. The course is intended for use by community leaders in building community…
ERIC Educational Resources Information Center
Dessoff, Alan
2009-01-01
From natural disasters to criminal violence, facilities officers are often called on to address campus safety and security issues beyond their usual responsibilities. Their experiences in coping with unanticipated events have produced a catalogue of lessons learned that can help them and their peers at other institutions who might face the same…
Safety and Security: Lessons Learned from 9/11.
ERIC Educational Resources Information Center
Schmitz, William J.
2002-01-01
Discusses issues faced by the Borough of Manhattan Community College following the September 11th terrorist attacks: the expense of recovery and budgeting for it, developing an emergency preparedness plan, the characteristics of emergency management and disaster recovery plans, technology and its role in emergency management, being prepared for…
USDA-ARS?s Scientific Manuscript database
Drought and its affects on agricultural production is a serious issue facing global efforts to increase food supplies and ensure food security for the growing world population. Understanding how plants respond to dehydration is an important prerequisite for developing strategies for crop improvement...
Reflections on Developing an Employment Mentoring Program for College Students Who Are Blind
ERIC Educational Resources Information Center
O'Mally, Jamie; Steverson, Anne
2017-01-01
In a competitive employment climate, college graduates with visual impairments (that is, those who are blind or have low vision) face challenges securing work. Employment barriers among visually impaired individuals include: limited early work experience, negative employer attitudes, transportation issues, lack of exposure to successful role…
2012-03-01
security education . According to statistical data collected and published by Indiana University for graduation years 2005–2006 through 2009–2010, between... education efforts to the already existing programs of public administration within colleges and universities in Indiana. By using survey data collected...right direction, but it is limiting in scope. According to the National Center for Education Statistics , 23,493 bachelor’s degrees were awarded to
ERIC Educational Resources Information Center
New Mexico Public Education Department, 2006
2006-01-01
Safety in New Mexico's schools is one of the most important issues facing our communities. Every school and school district in the state make it a priority to identify and implement ways to increase the safety, security and integrity of students, teachers, staff, parents and visitors at our schools on a daily basis. Safety is critical for…
ERIC Educational Resources Information Center
San Nicolas-Rocca, Tonia
2010-01-01
Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…
Young, Helen
2007-03-01
The humanitarian crisis in Darfur remains extremely serious. The optimism that followed the signing of the Abuja Peace Accord was followed by a rapid deterioration in security on the ground in part associated with increasing factionalism in various rebel movements. This paper briefly reviews the evolution of the crisis, its impact on lives and livelihoods and the response by the World Food Programme (WFP) to June 2006. The major challenges and issues facing the food aid programme in the previous 18 months included: dealing with insecurity while maintaining or even extending programme outreach; the need to link protection with assistance more explicitly; and determining the wider impact of food aid programming on the processes and institutions linked with the conflict. The paper discusses the main strategic issues facing WFP in the future such as: integrating security and protection with needs assessments and operational decisions, broadening response strategies beyond food aid and bringing livelihoods to the fore, the need to review cost-efficiency, promoting partnerships and strengthening national and regional capacities.
A privacy authentication scheme based on cloud for medical environment.
Chen, Chin-Ling; Yang, Tsai-Tung; Chiang, Mao-Lun; Shih, Tzay-Farn
2014-11-01
With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.
Zarea, Kourosh; Nikbakht-Nasrabadi, Alireza; Abbaszadeh, Abbas; Mohammadpour, Ali
2012-10-01
Psychiatric nurses play an important role in the process of caring for mentally ill patients and are continually faced with the numerous challenges and complex issues related to this field. This study aimed to understand the perspectives of psychiatric nurses regarding the issues they face while providing care and examine the possible solutions for improvement of inpatient care in clinical settings. The study adopted a qualitative approach that utilized a content analysis of audio taped, semi-structured interviews that had been conducted with 24 nurses. Two main themes emerged from the data. The first, Challenges in Providing Care within Psychiatric Wards, had the following subthemes: Politics and Rules of Organization, Safety and Security Issues, Uncertainty about the Role, Lack of Trained Staff, and Sociocultural Issues. The second theme, Solutions for Improving Psychiatric Care, had the subthemes of Empowerment across four domains: Psychiatric Nurses, Mentally Ill Patients and their Families, The Psychiatric Mental Health System, and the Cultural Context. The results indicated that if nurses are expected to provide optimal nursing care within a psychiatric ward, then there is a need for a stable and responsible organizational structure, skilled psychiatric nurses, and community-based care along with an anti-stigma program.
What is the hospital industry's exposure from the ARS collapse?
McCue, Michael J; Peterman, Julie S
2009-10-01
Auction rate securities (ARSs) were introduced 1988 as a means to allow tax-exempt/municipal issuers to enjoy the advantage of short-term interest rates on long-term debt issues. The recent collapse in the ARS market caused many hospitals and healthcare systems to be confronted with a much higher cost of debt. In the context of the larger economic crisis facing our nation and healthcare systems, the problems in the ARS market may have only exacerbated the difficulties many U.S. hospitals face in accessing cash needed to fund essential capital projects.
Face recognition using facial expression: a novel approach
NASA Astrophysics Data System (ADS)
Singh, Deepak Kumar; Gupta, Priya; Tiwary, U. S.
2008-04-01
Facial expressions are undoubtedly the most effective nonverbal communication. The face has always been the equation of a person's identity. The face draws the demarcation line between identity and extinction. Each line on the face adds an attribute to the identity. These lines become prominent when we experience an emotion and these lines do not change completely with age. In this paper we have proposed a new technique for face recognition which focuses on the facial expressions of the subject to identify his face. This is a grey area on which not much light has been thrown earlier. According to earlier researches it is difficult to alter the natural expression. So our technique will be beneficial for identifying occluded or intentionally disguised faces. The test results of the experiments conducted prove that this technique will give a new direction in the field of face recognition. This technique will provide a strong base to the area of face recognition and will be used as the core method for critical defense security related issues.
College Board Delegates Argue Controversies of the Day: Productivity and Paying for College.
ERIC Educational Resources Information Center
Evangelauf, Jean
1987-01-01
The annual meeting of the College Board focused on some of the most controversial issues facing higher education including: productivity, accountability, prepaid tuition plans, Guaranteed Student Loan (GSL) program, and one alternative to the G.S.L.--students could borrow from the government and then pay a higher Social Security tax. (MLW)
Venturing beyond the Gates: Facilitating Successful Reentry with Entrepreneurship. Summer 2007
ERIC Educational Resources Information Center
Lindahl, Nicole
2007-01-01
The rising number of individuals returning to communities from prison and jail represents one of the defining issues of time. Individuals reentering society face myriad challenges, not the least of which is securing viable employment; in addition, each individual has a unique set of experiences, needs and resources. This project stems from the…
Addressing global change challenges for Central Asian socio-ecosystems
NASA Astrophysics Data System (ADS)
Qi, Jiaguo; Bobushev, Temirbek S.; Kulmatov, Rashid; Groisman, Pavel; Gutman, Garik
2012-06-01
Central Asia is one of the most vulnerable regions on the planet earth to global climate change, depending on very fragile natural resources. The Soviet legacy has left the five countries (Kazakhstan, Tajikistan, Kyrgyzstan, Turkmenistan, and Uzbekistan) with a highly integrated system but they are facing great challenges with tensions that hinder regional coordination of food and water resources. With increasing climate variability and warming trend in the region, food and water security issues become even more crucial now and, if not addressed properly, could affect the regional stability. The long-term drivers of these two most critical elements, food and water, are climate change; the immediate and probably more drastic factors affecting the food and water security are land uses driven by institutional change and economic incentives. As a feedback, changes in land use and land cover have directly implications on water uses, food production, and lifestyles of the rural community in the region. Regional and international efforts have been made to holistically understand the cause, extent, rate and societal implications of land use changes in the region. Much of these have been understood, or under investigation by various projects, but solutions or research effort to develop solutions, to these urgent regional issues are lacking. This article, serves as an introduction to the special issue, provides a brief overview of the challenges facing the Central Asian countries and various international efforts in place that resulted in the publications of this special issue.
Lengyel, Christina O; Smith, Joan T; Whiting, Susan J; Zello, Gordon A
2004-01-01
The purpose of this study was to develop a survey tool for assessing the satisfaction of elderly long-term care (LTC) residents with the meals and food services they receive, as well as to assess quality of life issues related to eating. Food service delivery should be provided in an environment that fosters autonomy, interpersonal relations, and security. The questionnaire was administered as face-to-face interviews with 205 residents (> or = 65 years of age) of 13 LTC facilities in Saskatoon, Saskatchewan, Canada (participation rate = 67%). Residents expressed some concern with food variety, quality, taste, and appearance, and with the posting of menus. Quality of life issues were mostly positive; however, residents were less satisfied with areas related to their autonomy such as food choice and snack availability.
Measuring Human Performance within Computer Security Incident Response Teams
DOE Office of Scientific and Technical Information (OSTI.GOV)
McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel
Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. Thesemore » events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.« less
Addressing security issues related to virtual institute distributed activities
NASA Astrophysics Data System (ADS)
Stytz, Martin R.; Banks, Sheila B.
2008-03-01
One issue confounding the development and experimentation of distributed modeling and simulation environments is the inability of the project team to identify and collaborate with resources, both human and technical, from outside the United States. This limitation is especially significant within the human behavior representation area where areas such as cultural effects research and joint command team behavior modeling require the participation of various cultural and national representatives. To address this limitation, as well as other human behavior representation research issues, NATO Research and Technology Organization initiated a project to develop a NATO virtual institute that enables more effective and more collaborative research into human behavior representation. However, in building and operating a virtual institute one of the chief concerns must be the cyber security of the institute. Because the institute "exists" in cyberspace, all of its activities are susceptible to cyberattacks, subterfuge, denial of service and all of the vulnerabilities that networked computers must face. In our opinion, for the concept of virtual institutes to be successful and useful, their operations and services must be protected from the threats in the cyber environment. A key to developing the required protection is the development and promulgation of standards for cyber security. In this paper, we discuss the types of cyber standards that are required, how new internet technologies can be exploited and can benefit the promulgation, development, maintenance, and robustness of the standards. This paper is organized as follows. Section One introduces the concept of the virtual institutes, the expected benefits, and the motivation for our research and for research in this area. Section Two presents background material and a discussion of topics related to VIs, uman behavior and cultural modeling, and network-centric warfare. Section Three contains a discussion of the security challenges that face the virtual institute and the characteristics of the standards that must be employed. Section Four contains our proposal for documentation of the cybersecurity standards. Section Five contains the conclusion and suggestions for further work.
ERIC Educational Resources Information Center
Freeman, Richard B.
2006-01-01
There is widespread concern that the United States faces a problem in maintaining its position as the scientific and technological leader in the world and that loss of leadership threatens future economic well-being and national security. Business, science, and education groups have issued reports that highlight the value to the country of…
17 CFR 232.307 - Bold face type.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Bold face type. 232.307 Section 232.307 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T... face type. (a) Provisions requiring presentation of information in bold face type shall be satisfied in...
17 CFR 232.307 - Bold face type.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Bold face type. 232.307 Section 232.307 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T... face type. (a) Provisions requiring presentation of information in bold face type shall be satisfied in...
17 CFR 232.307 - Bold face type.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 17 Commodity and Securities Exchanges 3 2014-04-01 2014-04-01 false Bold face type. 232.307 Section 232.307 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T... face type. (a) Provisions requiring presentation of information in bold face type shall be satisfied in...
17 CFR 232.307 - Bold face type.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Bold face type. 232.307 Section 232.307 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T... face type. (a) Provisions requiring presentation of information in bold face type shall be satisfied in...
17 CFR 232.307 - Bold face type.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Bold face type. 232.307 Section 232.307 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION REGULATION S-T... face type. (a) Provisions requiring presentation of information in bold face type shall be satisfied in...
Medical cyber-physical systems: A survey.
Dey, Nilanjan; Ashour, Amira S; Shi, Fuqian; Fong, Simon James; Tavares, João Manuel R S
2018-03-10
Medical cyber-physical systems (MCPS) are healthcare critical integration of a network of medical devices. These systems are progressively used in hospitals to achieve a continuous high-quality healthcare. The MCPS design faces numerous challenges, including inoperability, security/privacy, and high assurance in the system software. In the current work, the infrastructure of the cyber-physical systems (CPS) are reviewed and discussed. This article enriched the researches of the networked Medical Device (MD) systems to increase the efficiency and safety of the healthcare. It also can assist the specialists of medical device to overcome crucial issues related to medical devices, and the challenges facing the design of the medical device's network. The concept of the social networking and its security along with the concept of the wireless sensor networks (WSNs) are addressed. Afterward, the CPS systems and platforms have been established, where more focus was directed toward CPS-based healthcare. The big data framework of CPSs is also included.
Ejection of a rear facing, golf cart passenger.
Schau, Kyle; Masory, Oren
2013-10-01
The following report details the findings of a series of experiments and simulations performed on a commercially available, shuttle style golf cart during several maneuvers involving rapid accelerations of the vehicle. It is determined that the current set of passive restraints on these types of golf carts are not adequate in preventing ejection of a rear facing passenger during rapid accelerations in the forward and lateral directions. Experimental data and simulations show that a hip restraint must be a minimum of 13 in. above the seat in order to secure a rear facing passenger during sharp turns, compared to the current restraint height of 5 in. Furthermore, it is determined that a restraint directly in front of the rear facing passenger is necessary to prevent ejection. In addressing these issues, golf cart manufacturers could greatly reduce the likelihood of injury due to ejection of a rear facing, golf cart passenger. Copyright © 2013 Elsevier Ltd. All rights reserved.
A National MagLev Transportation System
NASA Technical Reports Server (NTRS)
Wright, Michael R.
2003-01-01
The case for a national high-speed magnetic-levitation (MagLev) transportation system is presented. Focus is on current issues facing the country, such as national security, the economy, transportation, technology, and the environment. NASA s research into MagLev technology for launch assist is also highlighted. Further, current socio-cultural norms regarding motor-vehicle-based transportation systems are questioned in light of the problems currently facing the U.S. The multidisciplinary benefits of a long-distance MagLev system support the idea that such a system would be an important element of a truly multimodal U.S. transportation infrastructure.
Integrating legacy medical data sensors in a wireless network infrastucture.
Dembeyiotis, S; Konnis, G; Koutsouris, D
2005-01-01
In the process of developing a wireless networking solution to provide effective field-deployable communications and telemetry support for rescuers during major natural disasters, we are faced with the task of interfacing the multitude of medical and other legacy data collection sensors to the network grid. In this paper, we detail a number of solutions, with particular attention given to the issue of data security. The chosen implementation allows for sensor control and management from remote network locations, while the sensors can wirelessly transmit their data to nearby network nodes securely, utilizing the latest commercially available cryptography solutions. Initial testing validates the design choices, while the network-enabled sensors are being integrated in the overall wireless network security framework.
NASA Astrophysics Data System (ADS)
El-Saba, Aed; Alsharif, Salim; Jagapathi, Rajendarreddy
2011-04-01
Fingerprint recognition is one of the first techniques used for automatically identifying people and today it is still one of the most popular and effective biometric techniques. With this increase in fingerprint biometric uses, issues related to accuracy, security and processing time are major challenges facing the fingerprint recognition systems. Previous work has shown that polarization enhancementencoding of fingerprint patterns increase the accuracy and security of fingerprint systems without burdening the processing time. This is mainly due to the fact that polarization enhancementencoding is inherently a hardware process and does not have detrimental time delay effect on the overall process. Unpolarized images, however, posses a high visual contrast and when fused (without digital enhancement) properly with polarized ones, is shown to increase the recognition accuracy and security of the biometric system without any significant processing time delay.
Method for secure electronic voting system: face recognition based approach
NASA Astrophysics Data System (ADS)
Alim, M. Affan; Baig, Misbah M.; Mehboob, Shahzain; Naseem, Imran
2017-06-01
In this paper, we propose a framework for low cost secure electronic voting system based on face recognition. Essentially Local Binary Pattern (LBP) is used for face feature characterization in texture format followed by chi-square distribution is used for image classification. Two parallel systems are developed based on smart phone and web applications for face learning and verification modules. The proposed system has two tire security levels by using person ID followed by face verification. Essentially class specific threshold is associated for controlling the security level of face verification. Our system is evaluated three standard databases and one real home based database and achieve the satisfactory recognition accuracies. Consequently our propose system provides secure, hassle free voting system and less intrusive compare with other biometrics.
Information superhighway: Issues affecting development
NASA Astrophysics Data System (ADS)
1994-09-01
Technological advances in the transmission of voice, video, and data are fostering fundamental changes in the telecommunications industry. For example, large local telephone companies plan to offer video services in competition with cable and broadcast television, while cable television companies plan to offer local telephone service over their wires in competition with the local telephone companies. The administration believes that these technological changes provide the opportunity to develop an 'Information Superhighway' that could provide every element of society with ready access to data, voice, and video communications. Concurrently, the Congress is considering sweeping changes to telecommunications regulations to keep pace with this dynamic industry. GAO prepared this report to serve as an overview of three key issues that decisionmakers may face as they deliberate telecommunications legislation; it focuses on three pivotal issues they face in formulating new telecommunications legislation: (1) managing the transition to a more competitive local telecommunications marketplace; (2) ensuring that all consumers have access to affordable telecommunications as competition develops; and (3) ensuring that the Information Superhighway provides adequate security, privacy, reliability, and interoperability.
ERIC Educational Resources Information Center
Dworsky, Amy; Smithgall, Cheryl; Courtney, Mark E.
2014-01-01
Youth transitioning out of foster care and into adulthood need many supports to navigate the challenges they face. Over the past three decades, federal child welfare policy has significantly increased the availability of those supports. In 1999, the Foster Care Independence Act amended Title IV-E of the Social Security Act to create the Chafee…
A framework for the recognition of 3D faces and expressions
NASA Astrophysics Data System (ADS)
Li, Chao; Barreto, Armando
2006-04-01
Face recognition technology has been a focus both in academia and industry for the last couple of years because of its wide potential applications and its importance to meet the security needs of today's world. Most of the systems developed are based on 2D face recognition technology, which uses pictures for data processing. With the development of 3D imaging technology, 3D face recognition emerges as an alternative to overcome the difficulties inherent with 2D face recognition, i.e. sensitivity to illumination conditions and orientation positioning of the subject. But 3D face recognition still needs to tackle the problem of deformation of facial geometry that results from the expression changes of a subject. To deal with this issue, a 3D face recognition framework is proposed in this paper. It is composed of three subsystems: an expression recognition system, a system for the identification of faces with expression, and neutral face recognition system. A system for the recognition of faces with one type of expression (happiness) and neutral faces was implemented and tested on a database of 30 subjects. The results proved the feasibility of this framework.
2012-01-01
Background Revalidation for UK doctors is expected to be introduced from late 2012. For general practitioners (GPs), this entails collecting supporting information to be submitted and assessed in a revalidation portfolio every five years. The aim of this study was to explore the feasibility of GPs working in secure environments to collect supporting information for the Royal College of General Practitioners’ (RCGP) proposed revalidation portfolio. Methods We invited GPs working in secure environments in England to submit items of supporting information collected during the previous 12 months using criteria and standards required for the proposed RCGP revalidation portfolio and complete a GP issues log. Initial focus groups and initial and follow-up semi-structured face-to-face and telephone interviews were held to explore GPs’ views of this process. Quantitative and qualitative data were analysed using descriptive statistics and identifying themes respectively. Results Of the 50 GPs who consented to participate in the study, 20 submitted a portfolio. Thirty-eight GPs participated in an initial interview, nine took part in a follow-up interview and 17 completed a GP issues log. GPs reported difficulty in collecting supporting information for valid patient feedback, full-cycle clinical audits and evidence for their extended practice role(s) as sessional practitioners in the high population turnover custodial environment. Peripatetic practitioners experienced more difficulty than their institution based counterparts collating this evidence. Conclusions GPs working in secure environments may experience difficulties in collecting the newer types of supporting information for the proposed RCGP revalidation portfolio primarily due to their employment status within a non-medical environment and characteristics of the detainee population. Increased support from secure environment service commissioners and employers will be a prerequisite for these practitioners to enable them to re-license using the RCGP revalidation proposals. PMID:23253694
Redefining the U.S. Agenda for Nuclear Disarmament, Analysis and Reflections
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dunn, Lewis A.
With Lewis Dunn’s paper on nuclear disarmament diplomacy, we are inaugurating a new monograph series under the auspices of the Center for Global Security Research at Lawrence Livermore National Laboratory. The series will explore complex emerging challenges in the emerging security environment as they bear on issues of deterrence, assurance, and strategic stability. Our goal is to explore these issues deeply enough to provide significant new understanding that is technically informed and policy relevant. Our premise is that thoughtful students of international security affairs continue to value such in-depth analysis as a way to help make sense of the largemore » flow of data and opinion that reaches all of us on a daily basis. Our ambition is to generate four to six such papers per year on especially salient topics. The views expressed in these papers are those of the author and should not be attributed to the Center, the Laboratory, or the U.S. government. This inaugural paper addresses one of the key questions facing national leadership seven to eight years after President Obama’s April 2009 remarks in Prague and his commitment to take practical steps towards the long-term goal of the elimination of nuclear weapons. In the interim, some important steps have been taken. But there have also been many disappointments. The new presidential administration will face a security landscape quite different from that of eight years ago and must reassess U.S. priorities and approaches. As Lewis Dunn argues, some will be tempted to walk away entirely from the disarmament agenda, while others will advocate even more forcefully for unilateral U.S. steps to further reduce the role and number of nuclear weapons in its posture. Dr. Dunn sets out his own vision of how to adapt and carry forward the disarmament agenda, in a manner informed by developments in the security environment that point to a continuing role for nuclear deterrence. The result is both fresh and compelling.« less
NASA Astrophysics Data System (ADS)
Cui, Chen; Asari, Vijayan K.
2014-03-01
Biometric features such as fingerprints, iris patterns, and face features help to identify people and restrict access to secure areas by performing advanced pattern analysis and matching. Face recognition is one of the most promising biometric methodologies for human identification in a non-cooperative security environment. However, the recognition results obtained by face recognition systems are a affected by several variations that may happen to the patterns in an unrestricted environment. As a result, several algorithms have been developed for extracting different facial features for face recognition. Due to the various possible challenges of data captured at different lighting conditions, viewing angles, facial expressions, and partial occlusions in natural environmental conditions, automatic facial recognition still remains as a difficult issue that needs to be resolved. In this paper, we propose a novel approach to tackling some of these issues by analyzing the local textural descriptions for facial feature representation. The textural information is extracted by an enhanced local binary pattern (ELBP) description of all the local regions of the face. The relationship of each pixel with respect to its neighborhood is extracted and employed to calculate the new representation. ELBP reconstructs a much better textural feature extraction vector from an original gray level image in different lighting conditions. The dimensionality of the texture image is reduced by principal component analysis performed on each local face region. Each low dimensional vector representing a local region is now weighted based on the significance of the sub-region. The weight of each sub-region is determined by employing the local variance estimate of the respective region, which represents the significance of the region. The final facial textural feature vector is obtained by concatenating the reduced dimensional weight sets of all the modules (sub-regions) of the face image. Experiments conducted on various popular face databases show promising performance of the proposed algorithm in varying lighting, expression, and partial occlusion conditions. Four databases were used for testing the performance of the proposed system: Yale Face database, Extended Yale Face database B, Japanese Female Facial Expression database, and CMU AMP Facial Expression database. The experimental results in all four databases show the effectiveness of the proposed system. Also, the computation cost is lower because of the simplified calculation steps. Research work is progressing to investigate the effectiveness of the proposed face recognition method on pose-varying conditions as well. It is envisaged that a multilane approach of trained frameworks at different pose bins and an appropriate voting strategy would lead to a good recognition rate in such situation.
Using ESB and BPEL for Evolving Healthcare Systems Towards Pervasive, Grid-Enabled SOA
NASA Astrophysics Data System (ADS)
Koufi, V.; Malamateniou, F.; Papakonstantinou, D.; Vassilacopoulos, G.
Healthcare organizations often face the challenge of integrating diverse and geographically disparate information technology systems to respond to changing requirements and to exploit the capabilities of modern technologies. Hence, systems evolution, through modification and extension of the existing information technology infrastructure, becomes a necessity. Moreover, the availability of these systems at the point of care when needed is a vital issue for the quality of healthcare provided to patients. This chapter takes a process perspective of healthcare delivery within and across organizational boundaries and presents a disciplined approach for evolving healthcare systems towards a pervasive, grid-enabled service-oriented architecture using the enterprise system bus middleware technology for resolving integration issues, the business process execution language for supporting collaboration requirements and grid middleware technology for both addressing common SOA scalability requirements and complementing existing system functionality. In such an environment, appropriate security mechanisms must ensure authorized access to integrated healthcare services and data. To this end, a security framework addressing security aspects such as authorization and access control is also presented.
Parcher, Jean W.; Page, William R.
2013-01-01
Historically, international borders were located far from the major political and economic capitals of their countries and rarely received adequate planning or infrastructure development. Today, as a result of global economics and increased movement of goods between nations, border regions play a much greater role in commerce, tourism, and transportation. For example, Mexico is the second largest destination for United States exports (Woodrow Wilson Center Mexico Institute, 2009). The rapid population and economic growth along the United States–Mexican border, undocumented human border crossings, and the unique natural diversity of resources in the Borderlands present challenges for border security and environmental protection. Assessing risks and implementing sustainable growth policies to protect the environment and quality of life greatly increase in complexity when the issues cross an international border, where social services, environmental regulations, lifestyles, and cultural beliefs are unique for each country. Shared airsheds, water and biological resources, national security issues, and disaster management needs require an integrated binational approach to assess risks and develop binational management strategies.
Political Influence on Japanese Nuclear and Security Policy: New Forces Face Large Obstacles
2014-02-01
Fukushima incident immediately triggered a resurgence of the anti- nuclear power movement in Japan, and quickly enlarged it to national scale.80...Bottom-up Activism,” Asia-Pacific Issues 103 (January 2012). 57 time passes after the Fukushima incidents. Anti- nuclear -power sentiment in Japan...spread well beyond the areas immediately affected by either the Fukushima disasters themselves or by other nuclear plants
Quantum key based burst confidentiality in optical burst switched networks.
Balamurugan, A M; Sivasubramanian, A
2014-01-01
The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.
Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks
Balamurugan, A. M.; Sivasubramanian, A.
2014-01-01
The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks. PMID:24578663
Crops and food security--experiences and perspectives from Taiwan.
Huang, Chen-Te; Fu, Tzu-Yu Richard; Chang, Su-San
2009-01-01
Food security is an important issue that is of concern for all countries around the world. There are many factors which may cause food insecurity including increasing demand, shortage of supply, trade condition, another countries' food policy, lack of money, high food and oil prices, decelerating productivity, speculation, etc. The food self-sufficiency ratio of Taiwan is only 30.6% weighted by energy in 2007. Total agriculture imports and cereals have increased significantly due to the expansion of livestock and fishery industries and improve living standard. The agriculture sector of Taiwan is facing many challenges, such as: low level of food self-sufficiency, aging farmers, large acreage of set-aside farmlands, small scale farming, soaring price of fertilizers, natural disasters accelerated by climate change, and rapid changes in the world food economy. To cope with these challenges, the present agricultural policy is based on three guidelines: "Healthfulness, Efficiency, and Sustainability." A program entitled "Turning Small Landlords into Large Tenants" was launched to make effective use of idle lands. Facing globalization and the food crisis, Taiwan will secure stable food supply through revitalization of its set-aside farmlands and international markets, and provide technical assistance to developing countries, in particular for staple food crops.
77 FR 2293 - Federal Open Market Committee; Domestic Policy Directive of December 13, 2011
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
..., Treasury securities with remaining maturities of approximately 6 years to 30 years with a total face value... total face value of $400 billion. The Committee also directs the Desk to maintain its existing policies... mortgage-backed securities in order to maintain the total face value of domestic securities at...
Patients' willingness to pay for electronic communication with their general practitioner.
Bergmo, Trine Strand; Wangberg, Silje Camilla
2007-06-01
Despite the common use of electronic communication in other aspects of everyday life, its use between patients and health care providers has been slow to diffuse. Possible explanations are security issues and lack of payment mechanisms. This study investigated how patients value secure electronic access to their general practitioner (GP). One hundred and ninety-nine patients were asked an open-ended willingness-to-pay (WTP) question as part of a randomised controlled trial. We compared the WTP values between two groups of respondents; one group had had the opportunity to communicate electronically with their GP for a year and the other group had not. Fifty-two percent of the total sample was willing to pay for electronic GP contact. The group of patients with access revealed a significantly lower WTP than the group without such access. Possible explanations are that the system had fewer benefits than expected, a presence of hypothetical bias or simply a preference for face-to-face encounters.
Climate Change and Risks to National Security
NASA Astrophysics Data System (ADS)
Titley, D.
2017-12-01
Climate change impacts national security in three ways: through changes in the operating environments of the military; by increasing risks to security infrastructure, specifically bases and training ranges; and by exacerbating and accelerating the risks of state collapse and conflict in regions that are already fragile and unstable. Additionally there will be unique security challenges in the Arctic as sea-ice melts out and human activities increase across multiple dimensions. Military forces will also likely see increased demand for Humanitarian Assistance and Disaster Relief resulting from a combination of increased human population, rising sea-level, and potentially stronger and wetter storms. The talk will explore some of the lesser known aspects of these changes, examine selected climate-driven 'wild cards' that have the potential to disrupt regional and global security, and explore how migration in the face of a changing climate may heighten security issues. I will assess the positions U.S. executive and legislative branches with respect to climate & security, and how those positions have evolved since the November 2016 election, sometimes in counter-intuitive ways. The talk will close with some recommended courses of action the security enterprise can take to manage this climate risk.
13 CFR 107.1450 - Optional redemption of Preferred Securities.
Code of Federal Regulations, 2013 CFR
2013-01-01
... par or face value. A Section 301(d) Licensee may redeem Preferred Securities at any time, provided you..., but the par value or face value of the securities being redeemed must be at least $50,000. At the redemption date, you must pay to SBA: (1) The par value (of preferred stock) or face value (of a preferred...
13 CFR 107.1450 - Optional redemption of Preferred Securities.
Code of Federal Regulations, 2014 CFR
2014-01-01
... par or face value. A Section 301(d) Licensee may redeem Preferred Securities at any time, provided you..., but the par value or face value of the securities being redeemed must be at least $50,000. At the redemption date, you must pay to SBA: (1) The par value (of preferred stock) or face value (of a preferred...
13 CFR 107.1450 - Optional redemption of Preferred Securities.
Code of Federal Regulations, 2012 CFR
2012-01-01
... par or face value. A Section 301(d) Licensee may redeem Preferred Securities at any time, provided you..., but the par value or face value of the securities being redeemed must be at least $50,000. At the redemption date, you must pay to SBA: (1) The par value (of preferred stock) or face value (of a preferred...
13 CFR 107.1450 - Optional redemption of Preferred Securities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... par or face value. A Section 301(d) Licensee may redeem Preferred Securities at any time, provided you..., but the par value or face value of the securities being redeemed must be at least $50,000. At the redemption date, you must pay to SBA: (1) The par value (of preferred stock) or face value (of a preferred...
77 FR 31015 - Federal Open Market Committee; Domestic Policy Directive of April 24-25, 2012
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-24
..., Treasury securities with remaining maturities of approximately 6 years to 30 years with a total face value... total face value of $400 billion. The Committee also directs the Desk to maintain its existing policies... mortgage-backed securities in order to maintain the total face value of domestic securities at...
77 FR 22577 - Federal Open Market Committee; Domestic Policy Directive of March 13, 2012
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-16
... with remaining maturities of approximately 6 years to 30 years with a total face value of $400 billion, and to sell Treasury securities with remaining maturities of 3 years or less with a total face value... securities in order to maintain the total face value of domestic securities at approximately $2.6 trillion...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Haskell, Mark R.
Maine PUC and Morgan Stanley have resolved some of the key issues facing the energy industry. The Supreme Court has plainly and directly in both cases reaffirmed the central role that private contracts play in the energy industry and set terms to balance the need to secure long-term investment with the public interest that lies at the heart of the Federal Power Act. (author)
Humanitarian assistance and disaster relief: changing the face of defense.
Laraby, Patrick R; Bourdeaux, Margaret; Casscells, S Ward; Smith, David J; Lawry, Lynn
2009-01-01
The US Department of Defense (DOD) is evolving to meet new security challenges in the twenty-first century. Today's challenges result from growing political, environmental, and economic instability in important areas of the globe that threaten national and global security. Immediate outreach to foreign nations in times of violent instability or natural disaster fosters security and stability both for the affected country and for the United States. Foreign humanitarian assistance (FHA) is a rapidly evolving military mission that addresses conflict prevention, conflict, postconflict, and natural disasters. With DOD's extensive global medical resources, it is often uniquely qualified to execute a critical role in relief and/or public health efforts. When and how the American military will act in FHA and disaster relief is a still evolving doctrine with three issues deserving particular attention: aligning operations with host government leadership, preserving humanitarian space, and tailoring the US military's unique resources to the specific political and medical situation at hand. The DOD's response to a large-scale earthquake in Peru suggests useful approaches to these three issues, provides a template for future FHA mission, and points to strategic decisions and operational capabilities that need further development to establish the FHA mission firmly within DOD's repertoire of security engagement activities.
76 FR 67731 - Federal Open Market Committee; Domestic Policy Directive of September 20 and 21, 2011
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-02
..., Treasury securities with remaining maturities of approximately 6 years to 30 years with a total face value... total face value of $400 billion. The Committee also directs the Desk to maintain its existing policy of...- backed securities in order to maintain the total face value of domestic securities at approximately $2.6...
77 FR 42730 - Federal Open Market Committee; Domestic Policy Directive of June 19-20, 2012
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-20
..., Treasury securities with remaining maturities of 6 years to 30 years with a total face value of $400 billion, and to sell Treasury securities with remaining maturities of 3 years or less with a total face... purchase Treasury securities with remaining maturities of 6 years to 30 years with a total face value of...
Homeland Security. Management Challenges Facing Federal Leadership
2002-12-01
Security Management Challenges Facing Federal Leadership 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...including attention to management practices and key success factors. HOMELAND SECURITY Management Challenges Facing Federal Leadership www.gao.gov/cgi...significant management and coordination challenges if it is to provide this leadership and be successful in preventing and responding to any future
Nuclear Weapons and NATO, Analytical Survey of Literature
1975-06-01
contribution to the current debate on important issues now facing the Alliance." 3 EUROPEAN SECURITY AND THE AT- LANTIC SYSTEM, ed. by William T. R...a good long run ahead of it." (*)—CRISIS IN EUROPEAN DEFENCE: THE NEXT TEN YEARS, by Geoffrey Lee Wil- liams and Alan Lee Williams . London...with its Headquarters at Rhein- dahlen , and Fourth Allied Tactical Air Force with its headquarters at Ramstein." NATO RESHAPING TACTICAL AIR POS
2002-05-13
the identification of reason as the prime human faculty and virtue, i.e., sense of excellence and practical wisdom as the highest good. These are the...Clothes, " National Security Studies Quarterly Spring 2000, Volume VI, Issue 2, pp. 59-71. 43 Glynis Breakwell and Keith Spacie , Pressures Facing...commander to draw upon, then what is the solution to reduce the stressors highlighted by the Breakwell and Spacie study? Can there be operational
Douglas, Vasiliki; Chan, Hing Man; Wesche, Sonia; Dickson, Cindy; Kassi, Norma; Netro, Lorraine; Williams, Megan
2014-01-01
Because of a lack of transportation infrastructure, Old Crow has the highest food costs and greatest reliance on traditional food species for sustenance of any community in Canada's Yukon Territory. Environmental, cultural, and economic change are driving increased perception of food insecurity in Old Crow. To address community concerns regarding food security and supply in Old Crow and develop adaptation strategies to ameliorate their impact on the community. A community adaptation workshop was held on October 13, 2009, in which representatives of different stakeholders in the community discussed a variety of food security issues facing Old Crow and how they could be dealt with. Workshop data were analyzed using keyword, subject, and narrative analysis techniques to determine community priorities in food security and adaptation. Community concern is high and favored adaptation options include agriculture, improved food storage, and conservation through increased traditional education. These results were presented to the community for review and revision, after which the Vuntut Gwitchin Government will integrate them into its ongoing adaptation planning measures.
NASA Astrophysics Data System (ADS)
Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful
2017-09-01
Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.
DOE's Computer Incident Advisory Capability (CIAC)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schultz, E.
1990-09-01
Computer security is essential in maintaining quality in the computing environment. Computer security incidents, however, are becoming more sophisticated. The DOE Computer Incident Advisory Capability (CIAC) team was formed primarily to assist DOE sites in responding to computer security incidents. Among CIAC's other responsibilities are gathering and distributing information to DOE sites, providing training workshops, coordinating with other agencies, response teams, and vendors, creating guidelines for incident handling, and developing software tools. CIAC has already provided considerable assistance to DOE sites faced with virus infections and worm and hacker attacks, has issued over 40 information bulletins, and has developed andmore » presented a workshop on incident handling. CIAC's experience in helping sites has produced several lessons learned, including the need to follow effective procedures to avoid virus infections in small systems and the need for sound password management and system administration in networked systems. CIAC's activity and scope will expand in the future. 4 refs.« less
Ethical Guidelines for Computer Security Researchers: "Be Reasonable"
NASA Astrophysics Data System (ADS)
Sassaman, Len
For most of its existence, the field of computer science has been lucky enough to avoid ethical dilemmas by virtue of its relatively benign nature. The subdisciplines of programming methodology research, microprocessor design, and so forth have little room for the greater questions of human harm. Other, more recently developed sub-disciplines, such as data mining, social network analysis, behavioral profiling, and general computer security, however, open the door to abuse of users by practitioners and researchers. It is therefore the duty of the men and women who chart the course of these fields to set rules for themselves regarding what sorts of actions on their part are to be considered acceptable and what should be avoided or handled with caution out of ethical concerns. This paper deals solely with the issues faced by computer security researchers, be they vulnerability analysts, privacy system designers, malware experts, or reverse engineers.
Secure and Robust Iris Recognition Using Random Projections and Sparse Representations.
Pillai, Jaishanker K; Patel, Vishal M; Chellappa, Rama; Ratha, Nalini K
2011-09-01
Noncontact biometrics such as face and iris have additional benefits over contact-based biometrics such as fingerprint and hand geometry. However, three important challenges need to be addressed in a noncontact biometrics-based authentication system: ability to handle unconstrained acquisition, robust and accurate matching, and privacy enhancement without compromising security. In this paper, we propose a unified framework based on random projections and sparse representations, that can simultaneously address all three issues mentioned above in relation to iris biometrics. Our proposed quality measure can handle segmentation errors and a wide variety of possible artifacts during iris acquisition. We demonstrate how the proposed approach can be easily extended to handle alignment variations and recognition from iris videos, resulting in a robust and accurate system. The proposed approach includes enhancements to privacy and security by providing ways to create cancelable iris templates. Results on public data sets show significant benefits of the proposed approach.
Security patterns and a weighting scheme for mobile agents
NASA Astrophysics Data System (ADS)
Walker, Jessie J.
The notion of mobility has always been a prime factor in human endeavor and achievement. This need to migrate by humans has been distilled into software entities, which are their representatives on distant environments. Software agents are developed to act on behalf of a user. Mobile agents were born from the understanding that many times it was much more useful to move the code (program) to where the resources are located, instead of connecting remotely. Within the mobile agent research community, security has traditionally been the most defining issue facing the community and preventing the paradigm from gaining wide acceptance. There are still numerous difficult problems being addressed with very few practical solutions, such as the malicious host and agent problems. These problems are some of the most active areas of research within the mobile agent community. The major principles, facets, fundamental concepts, techniques and architectures of the field are well understood within the community. This is evident by the many mobile agent systems developed in the last decade that share common core components such as agent management, communication facilities, and mobility services. In other words new mobile agent systems and frameworks do not provide any new insights into agent system architecture or mobility services, agent coordination, communication that could be useful to the agent research community, although these new mobile agent systems do in many instances validate, refine, demonstrate the reuse of many previously proposed and discussed mobile agent research elements. Since mobile agent research for the last decade has been defined by security and related issues, our research into security patterns are within this narrow arena of mobile agent research. The research presented in this thesis examines the issue of mobile agent security from the standpoint of security pattern documented from the universe of mobile agent systems. In addition, we explore how these documented security patterns can be quantitatively compared based on a unique weighting scheme. The scheme is formalized into a theory that can be used improve the development of secure mobile agents and agent-based systems.
Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah
2017-03-24
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.
Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah
2017-01-01
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure. PMID:28338632
Electronic health systems: challenges faced by hospital-based providers.
Agno, Christina Farala; Guo, Kristina L
2013-01-01
The purpose of this article is to discuss specific challenges faced by hospitals adopting the use of electronic medical records and implementing electronic health record (EHR) systems. Challenges include user and information technology support; ease of technical use and software interface capabilities; compliance; and financial, legal, workforce training, and development issues. Electronic health records are essential to preventing medical errors, increasing consumer trust and use of the health system, and improving quality and overall efficiency. Government efforts are focused on ways to accelerate the adoption and use of EHRs as a means of facilitating data sharing, protecting health information privacy and security, quickly identifying emerging public health threats, and reducing medical errors and health care costs and increasing quality of care. This article will discuss physician and nonphysician staff training before, during, and after implementation; the effective use of EHR systems' technical features; the selection of a capable and secure EHR system; and the development of collaborative system implementation. Strategies that are necessary to help health care providers achieve successful implementation of EHR systems will be addressed.
China Debates the Future Security Environment
2000-01-01
ccx~perafion and avoid confrontation" (zengl~a .x4nren, jianshao mafan, fa~han he~uo, tntgao dzdk~. Quoted in Lu Zhongwei, "On China-U.S.-Japan...and south to Australia." Lu Gua0g~,e , a fellow at the Chinese National Defense Strategic Institute, claims that together with NATO, the U.S...States may not be prepared to face. First, there is the issue of homeland defense. Lu Dehong from the CIISS writes, "It is the first time since the
ERIC Educational Resources Information Center
Larence, Eileen R.
2009-01-01
State juvenile justice systems face critical problems when it comes to juvenile delinquency issues such as reentry--when offenders return home from incarceration--and substance abuse. GAO was asked to review juvenile reentry and substance abuse program research and efforts by the Department of Justice's (DOJ) Office of Juvenile Justice and…
The study on privacy preserving data mining for information security
NASA Astrophysics Data System (ADS)
Li, Xiaohui
2012-04-01
Privacy preserving data mining have a rapid development in a short year. But it still faces many challenges in the future. Firstly, the level of privacy has different definitions in different filed. Therefore, the measure of privacy preserving data mining technology protecting private information is not the same. So, it's an urgent issue to present a unified privacy definition and measure. Secondly, the most of research in privacy preserving data mining is presently confined to the theory study.
US Clean Energy Sector and the Opportunity for Modeling and Simulation
NASA Technical Reports Server (NTRS)
Inge, Carole Cameron
2011-01-01
The following paper sets forth the current understanding of the US clean energy demand and opportunity. As clean energy systems come online and technology is developed, modeling and simulation of these complex energy programs provides an untapped business opportunity. The US Department of Defense provides a great venue for developing new technology in the energy sector because it is demanding lower fuel costs, more energy efficiencies in its buildings and bases, and overall improvements in its carbon footprint. These issues coupled with the security issues faced by foreign dependence on oil will soon bring more clean energy innovations to the forefront (lighter batteries for soldiers, alternative fuel for jets, energy storage systems for ships, etc).
Intelligent home risk assessment systems and integration with biometric identification
NASA Astrophysics Data System (ADS)
Roper, William E.
2003-08-01
An overview is given of the Home of the 21st Century Laboratory. The laboratory is operated as a joint program with America-On-Line and George Washington University. The program is described with illustrations and discussion of the systems that are part of the laboratory. The concept of application for face recognition systems in the intelligent home of the future is presented and some initial approaches in using biometrics are shown. Issues of privacy and sharing of information within and outside the home are addressed. Issues include safety and security concerns vs. inappropriate observations of activities in and outside the home. Technology options currently available for application in the home are described and assessed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shin, Dongwan; Claycomb, William R.; Urias, Vincent E.
Cloud computing is a paradigm rapidly being embraced by government and industry as a solution for cost-savings, scalability, and collaboration. While a multitude of applications and services are available commercially for cloud-based solutions, research in this area has yet to fully embrace the full spectrum of potential challenges facing cloud computing. This tutorial aims to provide researchers with a fundamental understanding of cloud computing, with the goals of identifying a broad range of potential research topics, and inspiring a new surge in research to address current issues. We will also discuss real implementations of research-oriented cloud computing systems for bothmore » academia and government, including configuration options, hardware issues, challenges, and solutions.« less
MTR STACK, TRA710, CONTEXTUAL VIEW, CAMERA FACING SOUTH. PERIMETER SECURITY ...
MTR STACK, TRA-710, CONTEXTUAL VIEW, CAMERA FACING SOUTH. PERIMETER SECURITY FENCE AND SECURITY LIGHTING IN VIEW AT LEFT. INL NEGATIVE NO. HD52-1-1. Mike Crane, Photographer, 5/2005 - Idaho National Engineering Laboratory, Test Reactor Area, Materials & Engineering Test Reactors, Scoville, Butte County, ID
Household food security status in the Northeast of Iran: a cross-sectional study.
Gholami, Ali; Foroozanfar, Zohre
2015-01-01
An important issue the world faces today is ensuring that households living in different countries have access to enough food to maintain a healthy life. Food insecurity is prevalent in both developed and developing countries. The objective of this study was to assess the household food security status and related factors among different rural districts of Neyshabur (A city in northeast of Iran). Of 5000 selected rural households 4647 were studied in this cross-sectional study. A validated short questionnaire (with six questions) was used to measure food security. Chi-square test and logistic regression were used for data analysis through SPSS software. In total, 2747 households (59.1%) were identified as food secure. The highest prevalence of food security was observed in Central district (62.3%) and the lowest was in Miyanjolgeh district (52.9%). Backward multiple logistic regression revealed that car ownership, presence of chronic disease in household and household income (per month) were significantly associated with food security in all of surveyed districts (p< 0.05). According to results of this study, lower than 60% of Neyshabur rural households were food secure and economic variables were the most important factors. Therefore, a special attention should be paid to this health problem in these regions.
Food security for community-living elderly people in Beijing, China.
Cheng, Yang; Rosenberg, Mark; Yu, Jie; Zhang, Hua
2016-11-01
Food security has been identified as an important issue for elderly people's quality of life and ageing in place. A food security index composed of three indicators (food intake, food quality and food affordability) was developed to measure the food security status of community-living elderly people. Food security was then examined among community-living elderly in the central urban districts of Beijing, China. Data were collected by a questionnaire survey in the summer of 2013 and the response rate was 78.5%. Descriptive statistics and binary logistic regression were applied to analyse food security and the associations between food security and demographic and socioeconomic factors. The results showed that 54.2% of the surveyed elderly experienced food security. Participants with better education (OR = 1.68) and better health (OR = 1.47) were more likely to experience food security. The young-old were less likely to experience food security than the older old (OR = 0.94). Elderly people who lived with their children were less likely to experience food security than those who lived alone (OR = 0.43). The results of impact factors on food security highlight both similarities with studies from more developed countries and the unique challenges faced in a rapidly changing China with its unique social, cultural and political systems. The food security index we developed in this study is a simple and effective measure of food security status, which can be used in surveys for evaluating the food security status of elderly people in the future. © 2015 John Wiley & Sons Ltd.
NASA Technical Reports Server (NTRS)
Goseva-Popstojanova, Katerina; Tyo, Jacob P.; Sizemore, Brian
2017-01-01
NASA develops, runs, and maintains software systems for which security is of vital importance. Therefore, it is becoming an imperative to develop secure systems and extend the current software assurance capabilities to cover information assurance and cybersecurity concerns of NASA missions. The results presented in this report are based on the information provided in the issue tracking systems of one ground mission and one flight mission. The extracted data were used to create three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified the software bugs that are security related and classified them in specific security classes. This information was then used to create the security vulnerability profiles (i.e., to determine how, why, where, and when the security vulnerabilities were introduced) and explore the existence of common trends. The main findings of our work include:- Code related security issues dominated both the Ground and Flight mission IVV security issues, with 95 and 92, respectively. Therefore, enforcing secure coding practices and verification and validation focused on coding errors would be cost effective ways to improve mission's security. (Flight mission Developers issues dataset did not contain data in the Issue Category.)- In both the Ground and Flight mission IVV issues datasets, the majority of security issues (i.e., 91 and 85, respectively) were introduced in the Implementation phase. In most cases, the phase in which the issues were found was the same as the phase in which they were introduced. The most security related issues of the Flight mission Developers issues dataset were found during Code Implementation, Build Integration, and Build Verification; the data on the phase in which these issues were introduced were not available for this dataset.- The location of security related issues, as the location of software issues in general, followed the Pareto principle. Specifically, for all three datasets, from 86 to 88 the security related issues were located in two to four subsystems.- The severity levels of most security issues were moderate, in all three datasets.- Out of 21 primary security classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, these classes contributed from around 80 to 90 of all security issues in each dataset. This again proves the Pareto principle of uneven distribution of security issues, in this case across CWE classes, and supports the fact that addressing these dominant security classes provides the most cost efficient way to improve missions' security. The findings presented in this report uncovered the security vulnerability profiles and identified the common trends and dominant classes of security issues, which in turn can be used to select the most efficient secure design and coding best practices compiled by the part of the SARP project team associated with the NASA's Johnson Space Center. In addition, these findings provide valuable input to the NASA IVV initiative aimed at identification of the two 25 CWEs of ground and flight missions.
2012-05-04
FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Combatting Terrorism, Rebel Groups , and Armed...facing many security threats. Al-Shabaab in Somalia, armed rebel groups , and armed militia in South Sudan pose the greatest security challenges to the...these groups . 15. SUBJECT TERMS United States Africa Command, Al-Shabaab, Lamu Oil Pipeline, Security. 16. SECURITY CLASSIFICATION OF: 17
Water-Energy-Food Nexus in Asia-Pacific Ring of Fire
NASA Astrophysics Data System (ADS)
Taniguchi, M.; Endo, A.; Gurdak, J. J.; Allen, D. M.; Siringan, F.; Delinom, R.; Shoji, J.; Fujii, M.; Baba, K.
2013-12-01
Climate change and economic development are causing increased pressure on water, energy and food resources, presenting communities with increased levels of tradeoffs and potential conflicts among these resources. Therefore, the water-energy-food nexus is one of the most important and fundamental global environmental issues facing the world. For the purposes of this research project, we define human-environmental security as the joint optimization between human and environmental security as well as the water-energy-food nexus. To optimize the governance and management within these inter-connected needs, it is desirable to increase human-environmental security by improving social managements for the water-energy-food nexus. In this research project, we intend to establish a method to manage and optimize the human-environmental security of the water-energy-food nexus by using integrated models, indices, and maps as well as social and natural investigations with stakeholder analyses. We base our approach on the viewpoint that it is important for a sustainable society to increase human-environmental security with decreasing risk and increasing resilience by optimizing the connections within the critical water-energy and water-food clusters. We will take a regional perspective to address these global environmental problems. The geological and geomorphological conditions in our proposed study area are heavily influenced by the so-called 'Ring of Fire,' around the Pacific Ocean. Within these areas including Japan and Southeast Asia, the hydro-meteorological conditions are dominated by the Asia monsoon. The populations that live under these natural conditions face elevated risk and potential disaster as negative impacts, while also benefitting from positive ecological goods and services. There are therefore tradeoffs and conflicts within the water-energy-food nexus, as well as among various stakeholders in the region. The objective of this project is to maximize human-environmental security (minimize the risk) by choosing management structures and policies that optimize both the water-food-energy nexus in Asia-Pacific coastal regions. We define joint security approach as optimized policy. Optimal policies will develop joint security approaches for human-environmental security in the coastal region of the Ring of Fire, including stakeholders and decision-makers.
Door Security using Face Detection and Raspberry Pi
NASA Astrophysics Data System (ADS)
Bhutra, Venkatesh; Kumar, Harshav; Jangid, Santosh; Solanki, L.
2018-03-01
With the world moving towards advanced technologies, security forms a crucial part in daily life. Among the many techniques used for this purpose, Face Recognition stands as effective means of authentication and security. This paper deals with the user of principal component and security. PCA is a statistical approach used to simplify a data set. The minimum Euclidean distance found from the PCA technique is used to recognize the face. Raspberry Pi a low cost ARM based computer on a small circuit board, controls the servo motor and other sensors. The servo-motor is in turn attached to the doors of home and opens up when the face is recognized. The proposed work has been done using a self-made training database of students from B.K. Birla Institute of Engineering and Technology, Pilani, Rajasthan, India.
Information Systems, Security, and Privacy.
ERIC Educational Resources Information Center
Ware, Willis H.
1984-01-01
Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Igure, V. M.; Williams, R. D.
2006-07-01
Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less
Schneider, Daniele; Signorelli, Marcos Claudio; Pereira, Pedro Paulo Gomes
2017-09-01
This study aimed to promote visibility of women working in public security along the Parana coast, articulating issues of gender, violence(s), and the health-disease process. The methodology was qualitative, through an ethnographic research which included 50 women (civilians, military policewomen, and prison officers) from municipalities along the Parana coast, between March 2014 and March 2015. Results revealed: 1) the dilemmas that these women are subjected to, facing the seasonal dynamics in the field of public security in the region; 2) exposure to violence (mainly institutional and gender-based) and its impact on these women's health; 3) power relations, marked by corporations' hierarchies and gender asymmetries between men and women in professional settings. In summary, this research highlighted the need to promote visibility of women working in public security institutions, considering the impact of violence and gender inequalities in their personal and professional lives, including the resistance and rearrangements promoted by these women in the institutions in response to their presence in a hegemonic and traditionally male environment.
78 FR 20960 - Face Up Entertainment Group, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-08
... Suspension of Trading April 4, 2013. It appears to the Securities and Exchange Commission that there is a... business operations, and trading in its securities. Face Up is a Florida corporation based in Valley Stream... interest and the protection of investors require a suspension of trading in the securities of the above...
Sunglass detection method for automation of video surveillance system
NASA Astrophysics Data System (ADS)
Sikandar, Tasriva; Samsudin, Wan Nur Azhani W.; Hawari Ghazali, Kamarul; Mohd, Izzeldin I.; Fazle Rabbi, Mohammad
2018-04-01
Wearing sunglass to hide face from surveillance camera is a common activity in criminal incidences. Therefore, sunglass detection from surveillance video has become a demanding issue in automation of security systems. In this paper we propose an image processing method to detect sunglass from surveillance images. Specifically, a unique feature using facial height and width has been employed to identify the covered region of the face. The presence of covered area by sunglass is evaluated using facial height-width ratio. Threshold value of covered area percentage is used to classify the glass wearing face. Two different types of glasses have been considered i.e. eye glass and sunglass. The results of this study demonstrate that the proposed method is able to detect sunglasses in two different illumination conditions such as, room illumination as well as in the presence of sunlight. In addition, due to the multi-level checking in facial region, this method has 100% accuracy of detecting sunglass. However, in an exceptional case where fabric surrounding the face has similar color as skin, the correct detection rate was found 93.33% for eye glass.
Security and health research databases: the stakeholders and questions to be addressed.
Stewart, Sara
2006-01-01
Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.
New challenges for palliative nursing.
Aranda, Sanchia
1997-05-02
Editorials by Jeanette Webber and Libby White (IJPN 2(3)) explored threats to both the nursing profession and palliative nursing as the health system faces the reality of limited resources and expanding client needs. I wish to pick up on these issues in the light of changes proposed for palliative care in one Australian state, Victoria. My central argument is that to secure the future of palliative nursing, efforts must focus on demonstrating clearly the value and contribution of nurses to client and family outcomes. Why do I think we are challenged to do this?
Weird Project: E-Health Service Improvement Using WiMAX
NASA Astrophysics Data System (ADS)
Cimmino, Antonio; Casali, Fulvio; Mambretti, Cinzia
Today the major obstacle to massive deployment of telemedicine applications are the security issues related to the exchange of real time information between different elements that are not at fixed locations. WiMAX, the new standard for wireless communications, is one of the most promising technologies for broadband access in a fixed and mobile environment and it is expected to overcome the above mentioned obstacle. The FP6-WEIRD [1] (WiMax Extension to Isolated Remote Data networks) project has: analysed how this technology can guarantee secure real time data transmission between mobile elements, built some successful demonstrations and paved the way to future commercial applications. This paper in particular describes: main promising e-health applications that WiMax would enable; the technological highlights and the main challenges that WiMax has to face in e-health applications such as accounting, privacy, security, data integrity; the way in which the WEIRD project 0 has studied the wireless access to medical communities and equipment in remote or impervious areas. 0 0; some envisaged implementations.
Laser speckle decorrelation for fingerprint acquisition
NASA Astrophysics Data System (ADS)
Schirripa Spagnolo, Giuseppe; Cozzella, Lorenzo
2012-09-01
Biometry is gaining popularity as a physical security approach in situations where a high level of security is necessary. Currently, biometric solutions are embedded in a very large and heterogeneous group of applications. One of the most sensible is for airport security access to boarding gates. More airports are introducing biometric solutions based on face, fingerprint or iris recognition for passenger identification. In particular, fingerprints are the most widely used biometric, and they are mandatorily included in electronic identification documents. One important issue, which is difficult to address in traditional fingerprint acquisition systems, is preventing contact between subsequent users; sebum, which can be a potential vector for contagious diseases. Currently, non-contact devices are used to overcome this problem. In this paper, a new contact device based on laser speckle decorrelation is presented. Our system has the advantage of being compact and low-cost compared with an actual contactless system, allowing enhancement of the sebum pattern imaging contrast in a simple and low-cost way. Furthermore, it avoids the spreading of contagious diseases.
77 FR 53201 - Federal Open Market Committee; Domestic Policy Directive of July 31-August 1, 2012
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-31
... Treasury securities with remaining maturities of 6 years to 30 years with a total face value of about $267... of approximately 3 years or less with a total face value of about $267 billion. For the duration of... Market Account in agency mortgage-backed securities. These actions should maintain the total face value...
76 FR 76162 - Federal Open Market Committee; Domestic Policy Directive of November 1-2, 2011
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-06
... approximately 6 years to 30 years with a total face value of $400 billion, and to sell Treasury securities with remaining maturities of 3 years or less with a total face value of $400 billion. The Committee also directs... face value of domestic securities at approximately $2.6 trillion. The Committee directs the Desk to...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE... the screening threshold quantity by security issue. (a) General. In calculating whether a facility...
Seven layers of security to help protect biomedical research facilities.
Mortell, Norman
2010-04-01
In addition to risks such as theft and fire that can confront any type of business, the biomedical research community often faces additional concerns over animal rights extremists, infiltrations, data security and intellectual property rights. Given these concerns, it is not surprising that the industry gives a high priority to security. This article identifies security threats faced by biomedical research companies and shows how these threats are ranked in importance by industry stakeholders. The author then goes on to discuss seven key 'layers' of security, from the external environment to the research facility itself, and how these layers all contribute to the creation of a successfully secured facility.
Bioinformatics and Microarray Data Analysis on the Cloud.
Calabrese, Barbara; Cannataro, Mario
2016-01-01
High-throughput platforms such as microarray, mass spectrometry, and next-generation sequencing are producing an increasing volume of omics data that needs large data storage and computing power. Cloud computing offers massive scalable computing and storage, data sharing, on-demand anytime and anywhere access to resources and applications, and thus, it may represent the key technology for facing those issues. In fact, in the recent years it has been adopted for the deployment of different bioinformatics solutions and services both in academia and in the industry. Although this, cloud computing presents several issues regarding the security and privacy of data, that are particularly important when analyzing patients data, such as in personalized medicine. This chapter reviews main academic and industrial cloud-based bioinformatics solutions; with a special focus on microarray data analysis solutions and underlines main issues and problems related to the use of such platforms for the storage and analysis of patients data.
Enhancing Māori food security using traditional kai.
McKerchar, Christina; Bowers, Sharron; Heta, Craig; Signal, Louise; Matoe, Leonie
2015-09-01
Lack of food security is one of the major nutrition issues facing Māori today. Loss of traditional kai (food) gathering places and practices following colonisation and urbanisation has impacted negatively on food security for Māori. This paper explores the role of Māori in enhancing Māori food security through revitalising traditional kai. A narrative literature review of peer reviewed and grey literature on revitalising traditional kai for Māori was conducted. The focus was on two areas: increasing the availability of traditional kai to Māori households (such as through replenishing fish stocks, and gardening projects) and increasing the financial means available to Māori households to purchase food (by economic development of traditional kai industries and employment creation). A range of activities to improve food security for Māori by revitalising traditional kai was identified in the literature. Māori are now significant players in New Zealand's fishing industry, and are developing their horticultural resources. Gardening initiatives have also grown considerably in Māori communities. Enabling factors included: the return of traditional kai resources by the Crown, and successful pursuit by Māori of the legal rights to develop them; development of Māori models of governance; government policy around Māori economic development and healthy eating; and Māori leadership on the issue. Barriers to revitalising traditional kai that remain to be addressed include: tensions between Government and Māori goals and models of resource management; economic pressures resulting in severely depleted fishing stocks; and pollution of marine and freshwater fish. Revitalising traditional kai has considerable potential to improve food security for Māori, both directly in terms of food supply and by providing income, and warrants policy and practical support. These findings have implications for other indigenous cultures who are struggling to be food secure. © The Author(s) 2014.
13 CFR 107.1240 - Funding of Licensee's draw request through sale to short-term investor.
Code of Federal Regulations, 2010 CFR
2010-01-01
... which will be established at the time of the pooling of your security; (2) The purchase of your security... SBA sells your Debenture to a short-term investor: (1) The sale price will be the face amount. (2) At... Participating Security to a short-term investor, the sale price will be the face amount. (d) Licensee's right to...
A&M. Radioactive parts security storage area. camera facing northwest. Outdoor ...
A&M. Radioactive parts security storage area. camera facing northwest. Outdoor storage of concrete storage casks. Photographer: M. Holmes. Date: November 21, 1959. INEEL negative no. 59-6081 - Idaho National Engineering Laboratory, Test Area North, Scoville, Butte County, ID
The Future of ECHO: Evaluating Open Source Possibilities
NASA Astrophysics Data System (ADS)
Pilone, D.; Gilman, J.; Baynes, K.; Mitchell, A. E.
2012-12-01
NASA's Earth Observing System ClearingHOuse (ECHO) is a format agnostic metadata repository supporting over 3000 collections and 100M science granules. ECHO exposes FTP and RESTful Data Ingest APIs in addition to both SOAP and RESTful search and order capabilities. Built on top of ECHO is a human facing search and order web application named Reverb. ECHO processes hundreds of orders, tens of thousands of searches, and 1-2M ingest actions each week. As ECHO's holdings, metadata format support, and visibility have increased, the ECHO team has received requests by non-NASA entities for copies of ECHO that can be run locally against their data holdings. ESDIS and the ECHO Team have begun investigations into various deployment and Open Sourcing models that can balance the real constraints faced by the ECHO project with the benefits of providing ECHO capabilities to a broader set of users and providers. This talk will discuss several release and Open Source models being investigated by the ECHO team along with the impacts those models are expected to have on the project. We discuss: - Addressing complex deployment or setup issues for potential users - Models of vetting code contributions - Balancing external (public) user requests versus our primary partners - Preparing project code for public release, including navigating licensing issues related to leveraged libraries - Dealing with non-free project dependencies such as commercial databases - Dealing with sensitive aspects of project code such as database passwords, authentication approaches, security through obscurity, etc. - Ongoing support for the released code including increased testing demands, bug fixes, security fixes, and new features.
Ma, Yuanxiao; Ran, Guangming; Chen, Xu; Ma, Haijing; Hu, Na
2017-01-01
Adult attachment style is a key for understanding emotion regulation and feelings of security in human interactions as well as for the construction of the caregiving system. The caregiving system is a group of representations about affiliative behaviors, which is guided by the caregiver's sensitivity and empathy, and is mature in young adulthood. Appropriate perception and interpretation of infant emotions is a crucial component of the formation of a secure attachment relationship between infant and caregiver. As attachment styles influence the ways in which people perceive emotional information, we examined how different attachment styles associated with brain response to the perception of infant facial expressions in nulliparous females with secure, anxious, and avoidant attachment styles. The event-related potentials of 65 nulliparous females were assessed during a facial recognition task with joy, neutral, and crying infant faces. The results showed that anxiously attached females exhibited larger N170 amplitudes than those with avoidant attachment in response to all infant faces. Regarding the P300 component, securely attached females showed larger amplitudes to all infant faces in comparison with avoidantly attached females. Moreover, anxiously attached females exhibited greater amplitudes than avoidantly attached females to only crying infant faces. In conclusion, the current results provide evidence that attachment style differences are associated with brain responses to the perception of infant faces. Furthermore, these findings further separate the psychological mechanisms underlying the caregiving behavior of those with anxious and avoidant attachment from secure attachment.
DOT National Transportation Integrated Search
1996-09-01
While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...
Biometrics: Facing Up to Terrorism
2001-10-01
ment committee appointed by Secretary of Trans- portation Norman Y. Mineta to review airport security measures will recommend that facial recogni- tion...on the Role Facial Recognition Technology Can Play in Enhancing Airport Security .” Joseph Atick, the CEO of Visionics, testified before the government...system at a U.S. air- port. This deployment is believed to be the first-in-the-nation use of face-recognition technology for airport security . The sys
Incentive Issues in Information Security Management
ERIC Educational Resources Information Center
Lee, Chul Ho
2012-01-01
This dissertation studies three incentive issues in information security management. The first essay studies contract issues between a firm that outsources security functions and a managed security service provider (MSSP) that provides security functions to the firm. Since MSSP and firms cannot observe each other's actions, both can suffer…
Kaiser, Michelle L; Cafer, Anne
2018-01-01
The United States is facing two interconnected social and public health crises of severe obesity and food insecurity within the social-ecological environment. Marginalized groups experience the highest rates and the greatest impacts in terms of morbidity, mortality, and financial burdens. Consequences include experiencing multimorbidities, mental health issues, and decreased quality of life. Food pantries have served as spaces to obtain food to meet household needs, but for some, food pantries have become long-term solutions. We surveyed 2,634 people who accessed pantries in 2005, 2010, and 2013 across 32 counties in a Midwest state. The authors sought to understand to what extent does length of time using a food pantry, food security status, income sources, use of federal food benefits, visiting a doctor, and demographic variables increase odds of severe obesity. More than 14% were severely obese; those who were long-term food pantry users and very low food secure were 1.732 times more likely to be severely obese. Receiving Disability/Supplemental Security Income, seeing a doctor in the last year, being female, and older age reduced the odds of severe obesity. Discussion includes implications for social workers who interact with groups likely to experience very low food security and severe obesity at different systems levels.
NASA Astrophysics Data System (ADS)
Thoma, Klaus; Hiller, Daniel
Security research as a practical discipline has a long-standing history. Faced with myriad hazards throughout its past, mankind has developed sophisticated means to counter such threats. The latter include natural disasters such as earthquakes, floods and fires, but also encompass man-made hazards such as military aggression, terrorist attacks or threats resulting from the malicious application of technological developments. Since the end of the Cold War major armed conflicts between nations of the Western hemisphere have become highly unlikely and genuinely different security issues have become the focus of concern. The terrorist attacks of 2001 against the United States, the train bombings of Madrid in 2004 and the bombings of London in 2005 were horrific embodiments of a new security environment that has evolved on a global scale. One could list numerous other examples of both executed attacks and successfully deterred attempts from around the world. Our modern industrial societies are interlinked with infrastructure networks, providing citizens with mobility, energy and information flows, which also open the door to a whole new dimension of vulnerabilities. Security research, once anything but a practical discipline with a capacity for reacting to short-term demands, has in the span of only a few years evolved into an entirely new scientific discipline uniting various fields of research. Today, security research (in Europe) encompasses a broad community of natural/engineering and social sciences.
Surveillance systems for intermodal transportation
NASA Astrophysics Data System (ADS)
Jakovlev, Sergej; Voznak, Miroslav; Andziulis, Arunas
2015-05-01
Intermodal container monitoring is considered a major security issue in many major logistic companies and countries worldwide. Current representation of the problem, we face today, originated in 2002, right after the 9/11 attacks. Then, a new worldwide Container Security Initiative (CSI, 2002) was considered that shaped the perception of the transportation operations. Now more than 80 larger ports all over the world contribute to its further development and integration into everyday transportation operations and improve the regulations for the developing regions. Although, these new improvements allow us to feel safer and secure, constant management of transportation operations has become a very difficult problem for conventional data analysis methods and information systems. The paper deals with a proposal of a whole new concept for the improvement of the Containers Security Initiative (CSI) by virtually connecting safety, security processes and systems. A conceptual middleware approach with deployable intelligent agent modules is proposed to be used with possible scenarios and a testbed is used to test the solution. Middleware examples are visually programmed using National Instruments LabView software packages and Wireless sensor network hardware modules. An experimental software is used to evaluate he solution. This research is a contribution to the intermodal transportation and is intended to be used as a means or the development of intelligent transport systems.
Is Seeing Believing? Training Users on Information Security: Evidence from Java Applets
ERIC Educational Resources Information Center
Ayyagari, Ramakrishna; Figueroa, Norilyz
2017-01-01
Information Security issues are one of the top concerns of CEOs. Accordingly, information systems education and research have addressed security issues. One of the main areas of research is the behavioral issues in Information Security, primarily focusing on users' compliance to information security policies. We contribute to this literature by…
ReTrust: attack-resistant and lightweight trust management for medical sensor networks.
He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Vasilakos, Athanasios V
2012-07-01
Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks. However, most existing trust systems are not well suited for MSNs due to the unique operational and security requirements of MSNs. Moreover, similar to most security schemes, trust management methods themselves can be vulnerable to attacks. Unfortunately, this issue is often ignored in existing trust systems. In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture. Based on such an architecture, we develop an attack-resistant and lightweight trust management scheme named ReTrust. This paper also reports the experimental results of the Collection Tree Protocol using our proposed system in a network of TelosB motes, which show that ReTrust not only can efficiently detect malicious/faulty behaviors, but can also significantly improve the network performance in practice.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
... Document issued under 46 U.S.C., chapter 73, or a transportation security card issued under section 70105.... Merchant Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued... Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued under...
Ma, Yuanxiao; Ran, Guangming; Chen, Xu; Ma, Haijing; Hu, Na
2017-01-01
Adult attachment style is a key for understanding emotion regulation and feelings of security in human interactions as well as for the construction of the caregiving system. The caregiving system is a group of representations about affiliative behaviors, which is guided by the caregiver’s sensitivity and empathy, and is mature in young adulthood. Appropriate perception and interpretation of infant emotions is a crucial component of the formation of a secure attachment relationship between infant and caregiver. As attachment styles influence the ways in which people perceive emotional information, we examined how different attachment styles associated with brain response to the perception of infant facial expressions in nulliparous females with secure, anxious, and avoidant attachment styles. The event-related potentials of 65 nulliparous females were assessed during a facial recognition task with joy, neutral, and crying infant faces. The results showed that anxiously attached females exhibited larger N170 amplitudes than those with avoidant attachment in response to all infant faces. Regarding the P300 component, securely attached females showed larger amplitudes to all infant faces in comparison with avoidantly attached females. Moreover, anxiously attached females exhibited greater amplitudes than avoidantly attached females to only crying infant faces. In conclusion, the current results provide evidence that attachment style differences are associated with brain responses to the perception of infant faces. Furthermore, these findings further separate the psychological mechanisms underlying the caregiving behavior of those with anxious and avoidant attachment from secure attachment. PMID:28484415
Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel
2016-12-01
Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.
17 CFR 240.3a12-10 - Exemption of certain securities issued by the Resolution Funding Corporation.
Code of Federal Regulations, 2010 CFR
2010-04-01
... securities issued by the Resolution Funding Corporation. 240.3a12-10 Section 240.3a12-10 Commodity and... Exemptions § 240.3a12-10 Exemption of certain securities issued by the Resolution Funding Corporation. Securities that are issued by the Resolution Funding Corporation pursuant to section 21B(f) of the Federal...
Online ethics: where will the interface of mental health and the internet lead us?
Cosgrove, Victoria; Gliddon, Emma; Berk, Lesley; Grimm, David; Lauder, Sue; Dodd, Seetal; Berk, Michael; Suppes, Trisha
2017-12-01
While e-health initiatives are poised to revolutionize delivery and access to mental health care, conducting clinical research online involves specific contextual and ethical considerations. Face-to-face psychosocial interventions can at times entail risk and have adverse psychoactive effects, something true for online mental health programs too. Risks associated with and specific to internet psychosocial interventions include potential breaches of confidentiality related to online communications (such as unencrypted email), data privacy and security, risks of self-selection and self-diagnosis as well as the shortcomings of receiving psychoeducation and treatment at distance from an impersonal website. Such ethical issues need to be recognized and proactively managed in website and study design as well as treatment implementation. In order for online interventions to succeed, risks and expectations of all involved need to be carefully considered with a focus on ethical integrity.
Key challenges in the development and implementation of telehealth projects.
Joseph, Victor; West, Robert M; Shickle, Darren; Keen, Justin; Clamp, Susan
2011-01-01
A literature review was carried out to identify the key challenges in the implementation of telehealth. This was followed by a survey of organisations in England involved in telehealth projects in order to understand the challenges they faced. Ten of the 13 health or local authority organisations surveyed had telehealth projects and three were at the planning stage. The analysis revealed seven key challenges facing implementers of telehealth in England. Based on the findings from the literature review and the survey, a model was constructed and a checklist drawn up. The model contained the following elements: identifying issues, needs and partners; producing a strategy; securing funding; implementing changes; and monitoring and evaluating a telehealth project. The checklist was validated by using key informants from the organisations originally surveyed. The checklist may be useful to guide telehealth development and implementation in the future.
Lam, Steven; Cunsolo, Ashlee; Sawatzky, Alexandra; Ford, James; Harper, Sherilee L
2017-03-27
Drinking water insecurity and related health outcomes often disproportionately impact Indigenous communities internationally. Understanding media coverage of these water-related issues can provide insight into the ways in which public perceptions are shaped, with potential implications for decision-making and action. This study aimed to examine the extent, range, and nature of newspaper coverage of drinking water security in Canadian Indigenous communities. Using ProQuest database, we systematically searched for and screened newspaper articles published from 2000 to 2015 from Canadian newspapers: Windspeaker, Toronto Star, The Globe and Mail, and National Post. We conducted descriptive quantitative analysis and thematic qualitative analysis on relevant articles to characterize framing and trends in coverage. A total of 1382 articles were returned in the search, of which 256 articles were identified as relevant. There was limited coverage of water challenges for Canadian Indigenous communities, especially for Métis (5%) and Inuit (3%) communities. Most stories focused on government responses to water-related issues, and less often covered preventative measures such as source water protection. Overall, Indigenous peoples were quoted the most often. Double-standards of water quality between Indigenous and non-Indigenous communities, along with conflict and cooperation efforts between stakeholders were emphasized in many articles. Limited media coverage could undermine public and stakeholder interest in addressing water-related issues faced by many Canadian Indigenous communities.
Deatsch-Kratochvil, Amanda N; Pascual, Thomas Neil; Kesner, Adam; Rosenblatt, Eduardo; Chhem, Rethy K
2013-02-01
Global health has been an issue of seemingly low political importance in comparison with issues that have direct bearing on countries' national security. Recently, health has experienced a "political revolution" or a rise in political importance. Today, we face substantial global health challenges, from the spread of infectious disease, gaps in basic maternal and child health care, to the globalization of cancer. A recent estimate states that the "overall lifetime risk of developing cancer (both sexes) is expected to rise from more than one in three to one in two by 2015." These issues pose significant threats to international health security. To successfully combat these grave challenges, the international community must embrace and engage in global health diplomacy, defined by scholars Thomas Novotny and Vicanne Adams as a political activity aimed at improving global health, while at the same time maintaining and strengthening international relations. The IAEA (International Atomic Energy Agency) is an international organization with a unique mandate to "accelerate and enlarge the contribution of atomic energy to peace, health, and prosperity throughout the world." This article discusses global health diplomacy, reviews the IAEA's program activities in human health by focusing on radiation medicine and cancer, and the peaceful applications of atomic energy within the context of global health diplomacy. Copyright © 2013 Canadian Association of Radiologists. Published by Elsevier Inc. All rights reserved.
Personal privacy, information assurance, and the threat posed by malware techology
NASA Astrophysics Data System (ADS)
Stytz, Martin R.; Banks, Sheila B.
2006-04-01
In spite of our best efforts to secure the cyber world, the threats posed to personal privacy by attacks upon networks and software continue unabated. While there are many reasons for this state of affairs, clearly one of the reasons for continued vulnerabilities in software is the inability to assess their security properties and test their security systems while they are in development. A second reason for this growing threat to personal privacy is the growing sophistication and maliciousness of malware coupled with the increasing difficulty of detecting malware. The pervasive threat posed by malware coupled with the difficulties faced when trying to detect its presence or an attempted intrusion make addressing the malware threat one of the most pressing issues that must be solved in order to insure personal privacy to users of the internet. In this paper, we will discuss the threat posed by malware, the types of malware found in the wild (outside of computer laboratories), and current techniques that are available for from a successful malware penetration. The paper includes a discussion of anti-malware tools and suggestions for future anti-malware efforts.
2004-05-03
A special thanks to all of these folks (Glenn Starnes, Lee Gutierrez, Bill Rapp, Joel Hillison, Carlos Gomez, Steve Fraunfelter, Janie Hopkins, Dave ...DiClemente, Joe Nunez, John Bonin , and Steve Nerheim). viii INFORMATION TECHNOLOGY CHALLENGES FACING THE STRATEGIC LEADERS OF HOMELAND SECURITY IN THE 21ST
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-27
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Tornado Gold International Corp., Twin Faces East Entertainment Corp., Universal Ice Blast, Inc., US Farms, Inc., US Microbics... concerning the securities of Tornado Gold International Corp. because it has not filed any periodic reports...
49 CFR 1554.103 - Security Directives.
Code of Federal Regulations, 2014 CFR
2014-10-01
... necessary to respond to a threat assessment or to a specific threat against civil aviation, TSA issues a..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT REPAIR STATION SECURITY Security Measures... each Security Directive TSA issues to the repair station within the time prescribed. Each repair...
3D Face Generation Tool Candide for Better Face Matching in Surveillance Video
2014-07-01
Safety and Security Program (CSSP) which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public ...by the Minister of National Defence, 2014 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale... public safety and security practitioners to achieve specific objectives; 4. Threats/Hazards F – Major trans-border criminal activity – e.g. smuggling
Code of Federal Regulations, 2010 CFR
2010-04-01
... statements relating to securities to be issued in certain business combination transactions. 230.488 Section... REGULATIONS, SECURITIES ACT OF 1933 Investment Companies; Business Development Companies § 230.488 Effective date of registration statements relating to securities to be issued in certain business combination...
6 CFR 27.204 - Minimum concentration by security issue.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Minimum concentration by security issue. 27.204 Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by...
6 CFR 13.6 - Prerequisites for issuing a Complaint.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Prerequisites for issuing a Complaint. 13.6 Section 13.6 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.6 Prerequisites for issuing a Complaint. (a) The Reviewing Official may issue a...
Changing Homeland Security: The Year in Review - 2008
2009-01-01
new opportunities for terrorist safe havens. The specter of homegrown terrorism has not abated. Naturalized citizens of Somali descent traveled to...34 • The Nature of Homeland Security: Now a Second Tier Policy Issue? • Organizing for Homeland Security: Possible Futures, Emerging Issues • The...emerging definitions of the homeland security mission space in 2009. The Nature of Homeland Security: Now a Second Tier Policy Issue? Has the bar
Footer, Katherine H A; Meyer, Sarah; Sherman, Susan G; Rubenstein, Leonard
2014-11-01
Globally, attacks on and interferences with health workers and healthcare delivery, including targeted violence towards providers, attacks on hospitals and delays and denial of health care, represent a serious humanitarian and human rights issue. However, gaps in research about these events persist, limiting the evidence base from which to understand and address the problem. This paper focuses on experiences of local health workers in eastern Burma's chronic conflict, including their strategies for addressing security and ensuring access to vulnerable ethnic communities in the region. Face-to-face in-depth interviews were conducted in June and August 2012 with 27 health workers from three health organizations that operate throughout eastern Burma, with their operational head quarters located in Mae Sot, Tak Province, Thailand. Qualitative analysis found that health workers in this setting experience violent and non-violent interferences with their work, and that the Burmese government's military activities in the region have severely impacted access to care, which remains restricted. Data show that innovative security strategies have emerged, including the important role of the community in ensuring securer access to health care. This study underscores health workers' concern for improved data collection to support the rights of health workers to provide health care, and the rights of community members to receive health care in conflict-affected settings. Findings will inform the development of an incident reporting form to improve systematic data collection and documentation of attacks on health in this setting. Copyright © 2014 Elsevier Ltd. All rights reserved.
31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued?
Code of Federal Regulations, 2010 CFR
2010-07-01
... in which auctioned Treasury securities may be issued? There are three book-entry securities systems... marketable Treasury securities. We maintain and transfer securities in these three book-entry systems at... inflation. Securities may be transferred from one system to the other, unless the securities are not...
Reforming a Breadwinner Welfare State: Gender, Race, Class, and Social Security Reform
ERIC Educational Resources Information Center
Herd, Pamela
2005-01-01
A key challenge facing western welfare states is that they offset income risks faced by those in breadwinner families. Social Security is an excellent example. It best protects individuals with lengthy work histories or individuals who get married, stay married, and are never employed. Most women fit neither model. Thus, I analyze…
77 FR 72278 - Sale and Issue of Marketable Book-Entry Treasury Bills, Notes, and Bonds
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-05
... whether it would be more important to issue a new floating rate security each month. Maturities: We intend.... SUMMARY: The Department of the Treasury (``Treasury'') intends to issue a new type of marketable security... security. We also invite other comments relevant to the issuance of this new security. DATES: Submit...
Enabling SDN in VANETs: What is the Impact on Security?
Di Maio, Antonio; Palattella, Maria Rita; Soua, Ridha; Lamorte, Luca; Vilajosana, Xavier; Alonso-Zarate, Jesus; Engel, Thomas
2016-01-01
The demand for safe and secure journeys over roads and highways has been growing at a tremendous pace over recent decades. At the same time, the smart city paradigm has emerged to improve citizens’ quality of life by developing the smart mobility concept. Vehicular Ad hoc NETworks (VANETs) are widely recognized to be instrumental in realizing such concept, by enabling appealing safety and infotainment services. Such networks come with their own set of challenges, which range from managing high node mobility to securing data and user privacy. The Software Defined Networking (SDN) paradigm has been identified as a suitable solution for dealing with the dynamic network environment, the increased number of connected devices, and the heterogeneity of applications. While some preliminary investigations have been already conducted to check the applicability of the SDN paradigm to VANETs, and its presumed benefits for managing resources and mobility, it is still unclear what impact SDN will have on security and privacy. Security is a relevant issue in VANETs, because of the impact that threats can have on drivers’ behavior and quality of life. This paper opens a discussion on the security threats that future SDN-enabled VANETs will have to face, and investigates how SDN could be beneficial in building new countermeasures. The analysis is conducted in real use cases (smart parking, smart grid of electric vehicles, platooning, and emergency services), which are expected to be among the vehicular applications that will most benefit from introducing an SDN architecture. PMID:27929443
Enabling SDN in VANETs: What is the Impact on Security?
Di Maio, Antonio; Palattella, Maria Rita; Soua, Ridha; Lamorte, Luca; Vilajosana, Xavier; Alonso-Zarate, Jesus; Engel, Thomas
2016-12-06
The demand for safe and secure journeys over roads and highways has been growing at a tremendous pace over recent decades. At the same time, the smart city paradigm has emerged to improve citizens' quality of life by developing the smart mobility concept. Vehicular Ad hoc NETworks (VANETs) are widely recognized to be instrumental in realizing such concept, by enabling appealing safety and infotainment services. Such networks come with their own set of challenges, which range from managing high node mobility to securing data and user privacy. The Software Defined Networking (SDN) paradigm has been identified as a suitable solution for dealing with the dynamic network environment, the increased number of connected devices, and the heterogeneity of applications. While some preliminary investigations have been already conducted to check the applicability of the SDN paradigm to VANETs, and its presumed benefits for managing resources and mobility, it is still unclear what impact SDN will have on security and privacy. Security is a relevant issue in VANETs, because of the impact that threats can have on drivers' behavior and quality of life. This paper opens a discussion on the security threats that future SDN-enabled VANETs will have to face, and investigates how SDN could be beneficial in building new countermeasures. The analysis is conducted in real use cases (smart parking, smart grid of electric vehicles, platooning, and emergency services), which are expected to be among the vehicular applications that will most benefit from introducing an SDN architecture.
Efficient live face detection to counter spoof attack in face recognition systems
NASA Astrophysics Data System (ADS)
Biswas, Bikram Kumar; Alam, Mohammad S.
2015-03-01
Face recognition is a critical tool used in almost all major biometrics based security systems. But recognition, authentication and liveness detection of the face of an actual user is a major challenge because an imposter or a non-live face of the actual user can be used to spoof the security system. In this research, a robust technique is proposed which detects liveness of faces in order to counter spoof attacks. The proposed technique uses a three-dimensional (3D) fast Fourier transform to compare spectral energies of a live face and a fake face in a mathematically selective manner. The mathematical model involves evaluation of energies of selective high frequency bands of average power spectra of both live and non-live faces. It also carries out proper recognition and authentication of the face of the actual user using the fringe-adjusted joint transform correlation technique, which has been found to yield the highest correlation output for a match. Experimental tests show that the proposed technique yields excellent results for identifying live faces.
17 CFR 250.52 - Exemption of issue and sale of certain securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... business of the subsidiary company; and (2) The interest rates and maturity dates of any debt security... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of issue and sale of certain securities. 250.52 Section 250.52 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...
6 CFR 27.204 - Minimum concentration by security issue.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by security issue. (a) Release Chemicals—(1) Release-Toxic Chemicals. If a release-toxic chemical of interest...
AVIATION SECURITY: Transportation Security Administration Faces Immediate and Long-Term Challenges
2002-07-25
circumvent airport security , and provide whistleblower protection for air carrier and airport security workers. (See app. III for a summary of pending...GAO-01-1171T. Washington, D.C.: September 25, 2001. Aviation Security: Weaknesses in Airport Security and Options for Assigning Screening...125. Washington, D.C.: March 16, 2000. Aviation Security: FAA’s Actions to Study Responsibilities and Funding for Airport Security and to Certify
ERIC Educational Resources Information Center
Okolo, Nkiru Benjamin
2016-01-01
Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…
Individual social security accounts: issues in assessing administrative feasibility and costs.
Olsen, K A; Salisbury, D L
1998-11-01
Whether to add individual accounts (IAs) to the Social Security system is a highly political issue. But almost lost in the debate so far have been any practical considerations about how to administer such accounts. Any discussion of whether to create individual accounts must also address the basic but critical questions of how they would work: Who would run them? What would they cost? Logistically, are they even possible? This EBRI Issue Brief provides an overview of the most salient administrative issues facing the current Social Security reform debate--issues that challenge proponents to carefully think through how their proposals could be implemented so as to achieve their policy goals. The options and difficulties in administering IAs raise concerns that cut across ideology. The object of this report is neither to dissuade the advocates nor support the critics of individual accounts. Rather, it is to bring practical considerations to a political debate that has largely ignored the pragmatic challenges of whether IAs would be too complex for participants to understand or too difficult for record keepers to administer. The major findings in this analysis include: Adding individual accounts to Social Security could be the largest undertaking in the history of the U.S. financial market, and no system to date has the capacity to administer such a system. The number of workers currently covered by Social Security--the largest single entitlement program in the nation--is at least four times higher than the combined number of all tax-favored employment-based retirement accounts in the United States, which are administered by hundreds of entities. Direct comparisons between employment-based retirement savings plans and Social Security reform are tenuous at best. Social Security covers workers and businesses that are disproportionately excluded from employment-based plans. Because of these differences, a system of individual Social Security accounts would be more difficult to administer than employment-based plans, and total administrative expenses would be larger relative to benefits. Credit-based systems such as the current Social Security program are less difficult to administer than cash-based systems, which must account for every dollar. Inherent in the "privatization" debate is generally the presumption that IA benefits would be based on cash contributions and investment returns. The current credit-based system tolerates small errors in wage reporting, because they rarely affect benefits. But every dollar counts in a cash-based IA system. To ensure that benefits are properly provided, an IA system would require more regulation, oversight, and error reconciliation than the current Social Security program. Social Security individual accounts cannot be administered like 401(k) plans without adding significant employer burdens--especially on small businesses. Under the current wage reporting and tax collection process, it would take at least 7-19 months for every dollar contributed to an individual's account to be sorted out from aggregate payments and credited to his or her IA. This 7-19 month "float period" could result in substantial benefit losses over time. Options for preventing such losses involve difficult trade-offs, such as increased government responsibility, increased complexity, greater employer burdens, and/or investment restrictions for beneficiaries. If legally considered personal property, the IAs of married participants could pose significant administrative challenges. Social Security today must obtain proof of marriage only at the time spousal benefits are claimed. But some IA proposals would require contributions to be split between spouses' individual accounts, requiring records on participants' marital status to be continuously update to ensure that contributions are correctly directed. Also, dealing with claims on individual account contributions in divorce cases could place IA record keepers in the middle o
ERIC Educational Resources Information Center
Ragothaman, Srinivasan; Lavin, Angeline; Davies, Thomas
2007-01-01
This research examines, through survey administration, the perceptions of accounting practitioners and educators with respect to the multi-faceted security issues of e-commerce payment systems as well as e-business curriculum issues. Specific security issues explored include misuse/theft of personal and credit card information, spam e-mails,…
A History of Sandia’s Water Decision Modeling and Analysis Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lowry, Thomas Stephen; Pate, Ronald C.
This document provides a brief narrative, and selected project descriptions, that represent Sandia’s history involving data, modeling, and analysis related to water, energy-water nexus, and energy-water-agriculture nexus within the context of climate change. Sandia National Laboratories has been engaged since the early-1990s with program development involving data, modeling, and analysis projects that address the interdependent issues, risks, and technology-based mitigations associated with increasing demands and stresses being placed on energy, water, and agricultural/food resources, and the related impacts on their security and sustainability in the face of both domestic and global population growth, expanding economic development, and climate change.
Hearn,, Paul P.
2009-01-01
Federal, State, and local government agencies in the United States face a broad range of issues on a daily basis. Among these are natural hazard mitigation, homeland security, emergency response, economic and community development, water supply, and health and safety services. The U.S. Geological Survey (USGS) helps decision makers address these issues by providing natural hazard assessments, information on energy, mineral, water and biological resources, maps, and other geospatial information. Increasingly, decision makers at all levels are challenged not by the lack of information, but by the absence of effective tools to synthesize the large volume of data available, and to utilize the data to frame policy options in a straightforward and understandable manner. While geographic information system (GIS) technology has been widely applied to this end, systems with the necessary analytical power have been usable only by trained operators. The USGS is addressing the need for more accessible, manageable data tools by developing a suite of Web-based geospatial applications that will incorporate USGS and cooperating partner data into the decision making process for a variety of critical issues. Examples of Web-based geospatial tools being used to address societal issues follow.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-18
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Eco Global Corporation, Execute Sports, Inc., FacePrint Global Solutions, Inc., FinancialContent, Inc., and Firstgold Corp.; Order of Suspension of Trading January 16, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
33 CFR 150.609 - When is eye and face protection required?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false When is eye and face protection... SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Workplace Safety and Health Eyes and Face § 150.609 When is eye and face protection required? The operator must provide eye and face protectors...
33 CFR 150.609 - When is eye and face protection required?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 33 Navigation and Navigable Waters 2 2011-07-01 2011-07-01 false When is eye and face protection... SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Workplace Safety and Health Eyes and Face § 150.609 When is eye and face protection required? The operator must provide eye and face protectors...
33 CFR 150.609 - When is eye and face protection required?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false When is eye and face protection... SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Workplace Safety and Health Eyes and Face § 150.609 When is eye and face protection required? The operator must provide eye and face protectors...
33 CFR 150.609 - When is eye and face protection required?
Code of Federal Regulations, 2013 CFR
2013-07-01
... 33 Navigation and Navigable Waters 2 2013-07-01 2013-07-01 false When is eye and face protection... SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Workplace Safety and Health Eyes and Face § 150.609 When is eye and face protection required? The operator must provide eye and face protectors...
33 CFR 150.609 - When is eye and face protection required?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false When is eye and face protection... SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: OPERATIONS Workplace Safety and Health Eyes and Face § 150.609 When is eye and face protection required? The operator must provide eye and face protectors...
17 CFR 270.2a-7 - Money market funds.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...
17 CFR 270.2a-7 - Money market funds.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...
17 CFR 270.2a-7 - Money market funds.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit Security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal Issuer means...
17 CFR 270.2a-7 - Money market funds.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...
17 CFR 450.4 - Custodial holdings of government securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... appropriate regulatory agency that expressly govern securities lending practices. (b)(1) Except as otherwise... security (or the amount of each issue of a government security issued in book-entry form) held for the.... (d) Counts of government securities held for customers in both definitive and book-entry form shall...
NASA Astrophysics Data System (ADS)
Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko
We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.
49 CFR 236.780 - Plunger, facing point lock.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.780 Plunger, facing point lock. That part of a facing point lock which secures the lock rod to the...
49 CFR 236.780 - Plunger, facing point lock.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.780 Plunger, facing point lock. That part of a facing point lock which secures the lock rod to the...
49 CFR 236.780 - Plunger, facing point lock.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.780 Plunger, facing point lock. That part of a facing point lock which secures the lock rod to the...
49 CFR 236.780 - Plunger, facing point lock.
Code of Federal Regulations, 2010 CFR
2010-10-01
..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.780 Plunger, facing point lock. That part of a facing point lock which secures the lock rod to the...
49 CFR 236.780 - Plunger, facing point lock.
Code of Federal Regulations, 2011 CFR
2011-10-01
..., INSPECTION, MAINTENANCE, AND REPAIR OF SIGNAL AND TRAIN CONTROL SYSTEMS, DEVICES, AND APPLIANCES Definitions § 236.780 Plunger, facing point lock. That part of a facing point lock which secures the lock rod to the...
Code of Federal Regulations, 2010 CFR
2010-04-01
... securities issued by persons engaged in securities related businesses. 270.12d3-1 Section 270.12d3-1... in securities related businesses. (a) Notwithstanding section 12(d)(3) of the Act, a registered... securities related business, the determination required by paragraph (b) of this section shall be made as...
Security issues in healthcare applications using wireless medical sensor networks: a survey.
Kumar, Pardeep; Lee, Hoon-Jae
2012-01-01
Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.
Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey
Kumar, Pardeep; Lee, Hoon-Jae
2012-01-01
Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs. PMID:22368458
[Provision System of Medical Narcotics].
Kushida, Kazuki; Toshima, Chiaki; Fujimaki, Yoko; Watanabe, Mutsuko; Hirohara, Masayoshi
2015-12-01
Patients with cancer are increasingly opting for home health care, resulting in a rapid increase in the number of prescriptions for narcotics aimed at pain control. As these narcotics are issued by pharmacies only upon presentation of valid prescriptions, the quantity stored in the pharmacies is of importance. Although many pharmaceutical outlets are certified for retail sale of narcotic drugs, the available stock is often extremely limited in variety and quantity. Affiliated stores of wholesale(or central wholesale)dealers do not always have the necessary certifications to provide medical narcotics. Invariably, the quantity stored by individual branches or sales offices is also limited. Hence, it may prove difficult to urgently secure the necessary and appropriate drugs according to prescription in certain areas of the community. This report discusses the problems faced by wholesalers and pharmacies during acquisition, storage, supply, and issue of prescription opioids from a stockpiling perspective.
Simmonds, John
2010-10-01
The mental health of children in public care has received considerable attention in recent years. There are significant differences in the prevalence rates compared to children living at home and not in public care and these are added to by other adverse lifestyle issues. Considerable attention has been focused on the importance of stable and secure placements supported by access to a range of services including education, health and mental health. Identifying and classifying mental health needs proves to be challenging as the child's genetic inheritance, pre- and post-birth experiences, including maltreatment, interact with the uncertainty and delays commonly associated with child protection processes, action in the legal system and the difficulty in establishing secure and permanent placements. Clinical need is also related to the age of the child and the reasons they came into care and the length of time they remain. A case illustrating many of these issues, publicly reported in the court's judgement, is used as the basis for exploring the complexity for the identified child in understanding and making sense of their experiences as placement plans are made for them. These are used to explore the difficulties in establishing clinical protocols such as those recently published in the USA. Particular emphasis is given to the issues faced by children and their carers in establishing new family relationships which address the child's inheritance from their family of origin especially where these are traumatic and conflicted in origin.
Illicit Drug Trade-Impact on United States National Health Care
2013-03-01
pobreza en Mexico sube a 52 milliones,” CNN Expansion, July 29, 2011, http://www.cnnexpansion.com/ economia /2011/07/29/pobreza- mexico -2010 (accessed...Unlimited. 13. SUPPLEMENTARY NOTES Word Count: 5,569 14. ABSTRACT The United States and Mexico face a myriad of threats to national security...Policy Classification: Unclassified The United States and Mexico face a myriad of threats to national security
The 2015 National Security Strategy: Authorities, Changes, Issues for Congress
2016-04-05
Strategy: Authorities, Changes, Issues for Congress Congressional Research Service 3 reverse the spread of nuclear and biological weapons and...secure nuclear materials; advance peace, security, and opportunity in the greater Middle East; invest in the capacity of strong and capable...and norms on issues ranging from maritime security to trade and human rights.” 6 On Russia, the document says, “... we will continue to impose
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals
NASA Astrophysics Data System (ADS)
Fleischmann, Kenneth R.
The biggest challenge facing computer security researchers and professionals is not learning how to make ethical decisions; rather it is learning how to recognize ethical decisions. All too often, technology development suffers from what Langdon Winner terms technological somnambulism - we sleepwalk through our technology design, following past precedents without a second thought, and fail to consider the perspectives of other stakeholders [1]. Computer security research and practice involves a number of opportunities for ethical decisions. For example, decisions about whether or not to automatically provide security updates involve tradeoffs related to caring versus user autonomy. Decisions about online voting include tradeoffs between convenience and security. Finally, decisions about routinely screening e-mails for spam involve tradeoffs of efficiency and privacy. It is critical that these and other decisions facing computer security researchers and professionals are confronted head on as value-laden design decisions, and that computer security researchers and professionals consider the perspectives of various stakeholders in making these decisions.
Issues and special features of animal health research
2011-01-01
In the rapidly changing context of research on animal health, INRA launched a collective discussion on the challenges facing the field, its distinguishing features, and synergies with biomedical research. As has been declared forcibly by the heads of WHO, FAO and OIE, the challenges facing animal health, beyond diseases transmissible to humans, are critically important and involve food security, agriculture economics, and the ensemble of economic activities associated with agriculture. There are in addition issues related to public health (zoonoses, xenobiotics, antimicrobial resistance), the environment, and animal welfare. Animal health research is distinguished by particular methodologies and scientific questions that stem from the specific biological features of domestic species and from animal husbandry practices. It generally does not explore the same scientific questions as research on human biology, even when the same pathogens are being studied, and the discipline is rooted in a very specific agricultural and economic context. Generic and methodological synergies nevertheless exist with biomedical research, particularly with regard to tools and biological models. Certain domestic species furthermore present more functional similarities with humans than laboratory rodents. The singularity of animal health research in relation to biomedical research should be taken into account in the organization, evaluation, and funding of the field through a policy that clearly recognizes the specific issues at stake. At the same time, the One Health approach should facilitate closer collaboration between biomedical and animal health research at the level of research teams and programmes. PMID:21864344
Issues and special features of animal health research.
Ducrot, Christian; Bed'hom, Bertrand; Béringue, Vincent; Coulon, Jean-Baptiste; Fourichon, Christine; Guérin, Jean-Luc; Krebs, Stéphane; Rainard, Pascal; Schwartz-Cornil, Isabelle; Torny, Didier; Vayssier-Taussat, Muriel; Zientara, Stephan; Zundel, Etienne; Pineau, Thierry
2011-08-24
In the rapidly changing context of research on animal health, INRA launched a collective discussion on the challenges facing the field, its distinguishing features, and synergies with biomedical research. As has been declared forcibly by the heads of WHO, FAO and OIE, the challenges facing animal health, beyond diseases transmissible to humans, are critically important and involve food security, agriculture economics, and the ensemble of economic activities associated with agriculture. There are in addition issues related to public health (zoonoses, xenobiotics, antimicrobial resistance), the environment, and animal welfare.Animal health research is distinguished by particular methodologies and scientific questions that stem from the specific biological features of domestic species and from animal husbandry practices. It generally does not explore the same scientific questions as research on human biology, even when the same pathogens are being studied, and the discipline is rooted in a very specific agricultural and economic context.Generic and methodological synergies nevertheless exist with biomedical research, particularly with regard to tools and biological models. Certain domestic species furthermore present more functional similarities with humans than laboratory rodents.The singularity of animal health research in relation to biomedical research should be taken into account in the organization, evaluation, and funding of the field through a policy that clearly recognizes the specific issues at stake. At the same time, the One Health approach should facilitate closer collaboration between biomedical and animal health research at the level of research teams and programmes.
Cyber security issues in online games
NASA Astrophysics Data System (ADS)
Zhao, Chen
2018-04-01
With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.
Security in Distributed Collaborative Environments: Limitations and Solutions
NASA Astrophysics Data System (ADS)
Saadi, Rachid; Pierson, Jean-Marc; Brunie, Lionel
The main goal of establishing collaboration between heterogeneous environment is to create such as Pervasive context which provide nomadic users with ubiquitous access to digital information and surrounding resources. However, the constraints of mobility and heterogeneity arise a number of crucial issues related to security, especially authentication access control and privacy. First of all, in this chapter we explore the trust paradigm, specially the transitive capability to enable a trust peer to peer collaboration. In this manner, when each organization sets its own security policy to recognize (authenticate) users members of a trusted community and provide them a local access (access control), the trust transitivity between peers will allows users to gain a broad, larger and controlled access inside the pervasive environment. Next, we study the problem of user's privacy. In fact in pervasive and ubiquitous environments, nomadic users gather and exchange certificates or credential which providing them rights to access by transitivity unknown and trusted environments. These signed documents embeds increasing number of attribute that require to be filtered according to such contextual situation. In this chapter, we propose a new morph signature enabling each certificate owner to preserve his privacy by discloses or blinds some sensitive attributes according to faced situation.
Food security: contributions from science to a new and greener revolution
Beddington, John
2010-01-01
There is an intrinsic link between the challenge we face to ensure food security through the twenty-first century and other global issues, most notably climate change, population growth and the need to sustainably manage the world's rapidly growing demand for energy and water. Our progress in reducing global poverty and achieving the Millennium Development Goals will be determined to a great extent by how coherently these long-term challenges are tackled. A key question is whether we can feed a future nine billion people equitably, healthily and sustainably. Science and technology can make a major contribution, by providing practical solutions. Securing this contribution requires that high priority be attached both to research and to facilitating the real world deployment of existing and emergent technologies. Put simply, we need a new, ‘greener revolution’. Important areas for focus include: crop improvement; smarter use of water and fertilizers; new pesticides and their effective management to avoid resistance problems; introduction of novel non-chemical approaches to crop protection; reduction of post-harvest losses; and more sustainable livestock and marine production. Techniques and technologies from many disciplines, ranging from biotechnology and engineering to newer fields such as nanotechnology, will be needed. PMID:20008386
ERIC Educational Resources Information Center
Whitney, Michael; Lipford, Heather Richter; Chu, Bill; Thomas, Tyler
2018-01-01
Many of the software security vulnerabilities that people face today can be remediated through secure coding practices. A critical step toward the practice of secure coding is ensuring that our computing students are educated on these practices. We argue that secure coding education needs to be included across a computing curriculum. We are…
Code of Federal Regulations, 2014 CFR
2014-04-01
... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...
Code of Federal Regulations, 2011 CFR
2011-04-01
... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...
Code of Federal Regulations, 2013 CFR
2013-04-01
... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...
Code of Federal Regulations, 2012 CFR
2012-04-01
... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...
Code of Federal Regulations, 2010 CFR
2010-04-01
... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-4, for registration of securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239.34 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-16
... purchase fixed income securities issued by U.S. or foreign corporations \\6\\ or financial institutions... also may purchase securities issued or guaranteed by the U.S. Government or foreign governments... (``CMOs'').\\8\\ The Fund may purchase or sell securities on a when issued, delayed delivery or forward...
Defining Information Security.
Lundgren, Björn; Möller, Niklas
2017-11-15
This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.
Oslo Ministerial Declaration--global health: a pressing foreign policy issue of our time.
2007-04-21
Under their initiative on Global Health and Foreign Policy, launched in September, 2006, in New York, the Ministers of Foreign Affairs of Brazil, France, Indonesia, Norway, Senegal, South Africa, and Thailand issued the following statement in Oslo on March 20, 2007-In today's era of globalisation and interdependence there is an urgent need to broaden the scope of foreign policy. Together, we face a number of pressing challenges that require concerted responses and collaborative efforts. We must encourage new ideas, seek and develop new partnerships and mechanisms, and create new paradigms of cooperation. We believe that health is one of the most important, yet still broadly neglected, long-term foreign policy issues of our time. Life and health are our most precious assets. There is a growing awareness that investment in health is fundamental to economic growth and development. It is generally acknowledged that threats to health may compromise a country's stability and security. We believe that health as a foreign policy issue needs a stronger strategic focus on the international agenda. We have therefore agreed to make impact on health a point of departure and a defining lens that each of our countries will use to examine key elements of foreign policy and development strategies, and to engage in a dialogue on how to deal with policy options from this perspective. As Ministers of Foreign Affairs, we will work to: increase awareness of our common vulnerability in the face of health threats by bringing health issues more strongly into the arenas of foreign policy discussions and decisions, in order to strengthen our commitment to concerted action at the global level; build bilateral, regional and multilateral cooperation for global health security by strengthening the case for collaboration and brokering broad agreement, accountability, and action; reinforce health as a key element in strategies for development and for fighting poverty, in order to reach the Millennium Development Goals; ensure that a higher priority is given to health in dealing with trade issues and in conforming to the Doha principles, affirming the right of each country to make full use of TRIPS flexibilities in order to ensure universal access to medicines; strengthen the place of health measures in conflict and crisis management and in reconstruction efforts. For this purpose, we have prepared a first set of actionable steps for raising the priority of health in foreign policy in an Agenda for Action. We pledge to pursue these issues in our respective regional settings and in relevant international bodies. We invite Ministers of Foreign Affairs from all regions to join us in further exploring ways and means to achieve our objectives.
Water-energy-food security nexus: the road map
NASA Astrophysics Data System (ADS)
Hamdy, Atef
2015-04-01
The world's growing population and increased prosperity will increase global demand for energy, as well as food and water supplies in the coming decades. In the arid and semi arid regions as in most of the world water and energy have historically been managed separately, with little consideration of cross sectoral interactions, yet in reality, water and energy are closely interconnected. By addressing water and energy together planners can identify crucial interactions, conflicting demands and potential synergies. For many countries around the world it is needed to establish a road map on: (i) how to implement nexus policies to increase efficiency of natural resources management? (ii) how to bridge science with policy and business? (iii) how governments be inspired by business? (iv) how can be business be inspired by science? (v) how can we learn from each other and how collaborate to address the challenges ahead? Such road map should seek to bring together stakeholders involved in the nexus implementation approach over the coming years to develop nexus tools for decision making to quantify water energy food resources on both national and regional level. However, experiences gained and learned lessons indicate clearly that numerous countries are facing several barriers in putting in action their nexus road map due to the lack of integrated resource management, lack of capacity for research development, lack of knowledge sharing across sectors, and not enough interaction between policy makers and scientists. Those are major challenges to be faced to achieve the water, energy and food security nexus. Furthermore, such goal cannot be reached without building and strengthening the synergy between education, research and innovation for sustainable resource management. Those issues beside others will be fully discussed in this paper. Keywords: water-energy-food security; nexus
Access to health care and social protection.
Martin, Philippe
2012-06-01
In France, the access to healthcare has been conceived as a social right and is mainly managed through the coverage of the population by the National Health Insurance, which is a part of the whole French social security scheme. This system was based on the so-called Bismarckian model, which implies that it requires full employment and solid family links, as the insured persons are the workers and their dependents. This paper examines the typical problems that this system has to face as far as the right to healthcare is concerned. First, it addresses the need to introduce some universal coverage programs, in order to integrate the excluded population. Then, it addresses the issue of financial sustainability as the structural weakness of the French system--in which healthcare is still mainly provided by private practice physicians and governed by the principle of freedom--leads to conceive and implement complex forms of regulations between the State, the Social security institutions and the healthcare providers.
Schweizer RU-38A Twin-Condor: covert surveillance aircraft
NASA Astrophysics Data System (ADS)
O'Toole, Michael J.; Schweizer, Paul H.
1997-11-01
The world order has changed and with it, governments are now faced with waging a new type of `ware.' Regional instability, drug trafficking, environmental issues, international terrorism, and illegal immigration are examples of escalating problems that cross international boundaries and threaten the security of nations. The first and most important element in coping with these illegal activities is the ability to detect and monitor events in a timely and secure fashion. Conventional means of gathering intelligence such as large airborne collection systems and satellites lack the flexibility, dwell times, and cost effectiveness to meet many of today's needs. There is a growing requirement for airborne platforms that can covertly perform surveillance missions during either day or night and in a cost effective manner. To meet this need, Schweizer Aircraft has recently developed the RU-38A twin-engine surveillance aircraft. This paper discusses the evolution and principle design concepts of this aircraft and how its unique performance enables the RU-38A to achieve new levels of surveillance capability.
Science and Technology Resources on the Internet: Computer Security.
ERIC Educational Resources Information Center
Kinkus, Jane F.
2002-01-01
Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…
School Violence: Physical Security.
ERIC Educational Resources Information Center
Utah State Office of Education, Salt Lake City.
This booklet provides an overview of security technology product areas that might be appropriate and affordable for school applications. Topics cover security concepts and operational issues; security issues when designing for new schools; the role of maintenance; video camera use; walk-through metal detectors; duress alarm devices; and a partial…
2017-06-09
full ability to inhibit ANS and limbic response are prone to be impulsive, 25 unintentional, or hesitant when faced with high -threat decisions...graduate degrees in Criminal Justice, a Graduate Certificate in Organizational Leadership, and a current American Society for Industrial Security...experience and full ability to inhibit ANS and limbic response are prone to be impulsive, unintentional, or hesitant when faced with high -threat
Secure data exchange between intelligent devices and computing centers
NASA Astrophysics Data System (ADS)
Naqvi, Syed; Riguidel, Michel
2005-03-01
The advent of reliable spontaneous networking technologies (commonly known as wireless ad-hoc networks) has ostensibly raised stakes for the conception of computing intensive environments using intelligent devices as their interface with the external world. These smart devices are used as data gateways for the computing units. These devices are employed in highly volatile environments where the secure exchange of data between these devices and their computing centers is of paramount importance. Moreover, their mission critical applications require dependable measures against the attacks like denial of service (DoS), eavesdropping, masquerading, etc. In this paper, we propose a mechanism to assure reliable data exchange between an intelligent environment composed of smart devices and distributed computing units collectively called 'computational grid'. The notion of infosphere is used to define a digital space made up of a persistent and a volatile asset in an often indefinite geographical space. We study different infospheres and present general evolutions and issues in the security of such technology-rich and intelligent environments. It is beyond any doubt that these environments will likely face a proliferation of users, applications, networked devices, and their interactions on a scale never experienced before. It would be better to build in the ability to uniformly deal with these systems. As a solution, we propose a concept of virtualization of security services. We try to solve the difficult problems of implementation and maintenance of trust on the one hand, and those of security management in heterogeneous infrastructure on the other hand.
Perception of security by health workforce at workplace in Nepal.
Prajapati, R; Baral, B; Karki, K B; Neupane, M
2013-05-01
In Nepal, the relationship of health worker and patient or community people is now deteriorating and the security and safety of health worker is becoming emerging issues. The poor relationship between community people and health worker is hampering the health service especially in rural setting. This study was aimed at finding the security perception and situation of health workforce in Nepal. A cross-sectional descriptive study was conducted using both quantitative and qualitative methods. Out of 404 sample health institutions, 747 health workforce from 375 health institutions were interviewed (<10% non-response rate) using the probability proportionate to size method as per World Health Organization (WHO) guidelines. Nearly 168 (23%) of health workers felt some level of insecurity at their workplace. Mostly, doctors felt insecure at their workplace 24 (30%) and argued with service users , 26 (32.50%). Feeling of security was highest in central region 160 (83.30%). Nationwide, 121 (16%) of health workers faced some level of arguments with service users, which was highest in Tarai 64 (18.08%). Of the total harassment, both gender based and sexual harassment was higher among female health workers [20 (62.5%) and 13 (56.5%) respectively]. Only, 230 (30.7%) of health workers who suffered from workplace accidents got compensation and treatment. Higher proportions of health workers feel insecurity at workplace whereas provision of compensation was minimal. There is a need of strict implementation of Security of the Health Workers and Health Organizations Act, 2066 (2009) for effective health service delivery.
Legal issues affecting children with preexisting conditions during public health emergencies.
Rutkow, Lainie; Vernick, Jon S; Wissow, Lawrence S; Tung, Gregory J; Marum, Felicity; Barnett, Daniel J
2013-06-01
Among the millions of children in the United States exposed to public health emergencies in recent years, those with preexisting health conditions face particular challenges. A public health emergency may, for example, disrupt treatment regimens or cause children to be separated from caregivers. Ongoing shortages of pediatricians and pediatric subspecialists may further exacerbate the risks that children with preexisting conditions face in disaster circumstances. The US Department of Homeland Security recently called for better integration of children's needs into all preparedness activities. To aid in this process, multiple legal concerns relevant to pediatricians and pediatric policymakers must be identified and addressed. Obtaining informed consent from children and parents may be particularly challenging during certain public health emergencies. States may need to invoke legal protections for children who are separated from caregivers during emergencies. Maintaining access to prescription medications may also require pediatricians to use specific legal mechanisms. In addition to practitioners, recommendations are given for policymakers to promote effective pediatric response to public health emergencies.
Defense.gov Special Report: 2016 Fiscal Budget
: America's Army Facing Sequestration 'Enemy' at Home Not only does the U.S. Army face rapid, unpredictable told Congress. Story Navy Secretary Explains Significance of Sea Power National security interests face America today, while positioning the U.S. military to face the threats of tomorrow, said Mike McCord
17 CFR 274.14 - Form N-8B-4, registration statements of face-amount certificate companies.
Code of Federal Regulations, 2011 CFR
2011-04-01
... statements of face-amount certificate companies. 274.14 Section 274.14 Commodity and Securities Exchanges... Registration Statements § 274.14 Form N-8B-4, registration statements of face-amount certificate companies. This form shall be used for registration statements of face-amount certificate companies registered...
17 CFR 274.14 - Form N-8B-4, registration statements of face-amount certificate companies.
Code of Federal Regulations, 2012 CFR
2012-04-01
... statements of face-amount certificate companies. 274.14 Section 274.14 Commodity and Securities Exchanges... Registration Statements § 274.14 Form N-8B-4, registration statements of face-amount certificate companies. This form shall be used for registration statements of face-amount certificate companies registered...
17 CFR 274.14 - Form N-8B-4, registration statements of face-amount certificate companies.
Code of Federal Regulations, 2013 CFR
2013-04-01
... statements of face-amount certificate companies. 274.14 Section 274.14 Commodity and Securities Exchanges... Registration Statements § 274.14 Form N-8B-4, registration statements of face-amount certificate companies. This form shall be used for registration statements of face-amount certificate companies registered...
17 CFR 274.14 - Form N-8B-4, registration statements of face-amount certificate companies.
Code of Federal Regulations, 2014 CFR
2014-04-01
... statements of face-amount certificate companies. 274.14 Section 274.14 Commodity and Securities Exchanges... Registration Statements § 274.14 Form N-8B-4, registration statements of face-amount certificate companies. This form shall be used for registration statements of face-amount certificate companies registered...
17 CFR 274.14 - Form N-8B-4, registration statements of face-amount certificate companies.
Code of Federal Regulations, 2010 CFR
2010-04-01
... statements of face-amount certificate companies. 274.14 Section 274.14 Commodity and Securities Exchanges... Registration Statements § 274.14 Form N-8B-4, registration statements of face-amount certificate companies. This form shall be used for registration statements of face-amount certificate companies registered...
Green Secure Processors: Towards Power-Efficient Secure Processor Design
NASA Astrophysics Data System (ADS)
Chhabra, Siddhartha; Solihin, Yan
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.
Survey of cyber security issues in smart grids
NASA Astrophysics Data System (ADS)
Chen, Thomas M.
2010-04-01
The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.
Transportation Security: Issues for the 111th Congress
2009-05-15
results of covert testing of airport security checkpoints demonstrating deficiencies in detecting improvised explosives and incendiary devices...34 A key issue in the debate over aviation security immediately following September 11, 2001, was whether airport security screeners should be...intentional wrongdoing on the part of airport security screeners, whether they be federal or private. Nonetheless, while the pilot program airports
Global Security Contingency Fund: Summary and Issue Overview
2014-04-04
Diplomacy and Development Review (QDDR), Washington, D.C., December 2010, p. 203; Gordon Adams and Rebecca Williams, A New Way Forward: Rebalancing ...Williams, A New Way Forward: Rebalancing Security Assistance Programs and (continued...) Global Security Contingency Fund: Summary and Issue Overview...a large security assistance portfolio . But others may point to the State Department’s creation of new programs under the Security Assistance
Code of Federal Regulations, 2012 CFR
2012-07-01
... government and international agencies and foreign central banks. In their accounts, depository institutions... BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS... Direct®—into which we issue marketable Treasury securities. We maintain and transfer securities in these...
Web Services Security - Implementation and Evaluation Issues
NASA Astrophysics Data System (ADS)
Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis
Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.
ERIC Educational Resources Information Center
Hungerford, Thomas L.
2006-01-01
The Social Security Trustees project that the Social Security program faces longterm financing difficulties. Several proposals that have been offered to shore-up the finances of the Social Security program would create individual retirement accounts funded with part of the payroll tax. The authors of many of these proposals claim that future…
Interactive Programming Support for Secure Software Development
ERIC Educational Resources Information Center
Xie, Jing
2012-01-01
Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming…
Minimum Requirements for Taxicab Security Cameras.
Zeng, Shengke; Amandus, Harlan E; Amendola, Alfred A; Newbraugh, Bradley H; Cantis, Douglas M; Weaver, Darlene
2014-07-01
The homicide rate of taxicab-industry is 20 times greater than that of all workers. A NIOSH study showed that cities with taxicab-security cameras experienced significant reduction in taxicab driver homicides. Minimum technical requirements and a standard test protocol for taxicab-security cameras for effective taxicab-facial identification were determined. The study took more than 10,000 photographs of human-face charts in a simulated-taxicab with various photographic resolutions, dynamic ranges, lens-distortions, and motion-blurs in various light and cab-seat conditions. Thirteen volunteer photograph-evaluators evaluated these face photographs and voted for the minimum technical requirements for taxicab-security cameras. Five worst-case scenario photographic image quality thresholds were suggested: the resolution of XGA-format, highlight-dynamic-range of 1 EV, twilight-dynamic-range of 3.3 EV, lens-distortion of 30%, and shutter-speed of 1/30 second. These minimum requirements will help taxicab regulators and fleets to identify effective taxicab-security cameras, and help taxicab-security camera manufacturers to improve the camera facial identification capability.
Code of Federal Regulations, 2010 CFR
2010-04-01
... registration of securities issued in business combination transactions by investment companies and business development companies. 239.23 Section 239.23 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... companies and business development companies. This form shall be used by a registered investment company or...
76 FR 34920 - Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-15
... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 230, 240 and 260 [Release Nos. 33-9222; 34-64639; 39-2474; File No. S7-22-11] RIN 3235-AL16 Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies AGENCY: Securities and Exchange Commission. ACTION: Proposed rules. SUMMARY: We are...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-18
... Important Notice of the availability of the comparison service for when-issued corporate securities.\\5\\ \\5... scheduled to be implemented for corporate when-issued securities and NSCC would submit a rule filing to the... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69980; File No. SR-NSCC-2013-09] Self...
ERIC Educational Resources Information Center
Ali, Mohd Sofi; Othman, Abdul Jalil; Karim, Abdul Faruk Abdul
2014-01-01
This study examined specific issues and concerns faced by Bachelor of Education student teachers majoring in Language and Literature during their 12-week teaching practicum experience. Specifically, three main areas of concerns were examined. They were: (1) specific issues and concerns related to the implementation of teaching practicum faced by…
Degaspari, John
2011-08-01
As more provider organizations look to the cloud computing model, they face a host of security-related questions. What are the appropriate applications for the cloud, what is the best cloud model, and what do they need to know to choose the best vendor? Hospital CIOs and security experts weigh in.
The Climate Disruption Challenge for Water Security in a Growing World
NASA Astrophysics Data System (ADS)
Paxton, L. J.; Nix, M.; Ihde, A.; MacDonald, L. H.; Parker, C.; Schaefer, R. K.; Weiss, M.; Babin, S. M.; Swartz, W. H.; Schloman, J.
2012-12-01
Climate disruption, the increasingly large and erratic departures of weather and climate from the benign conditions of the last one hundred years, is the greatest challenge to the long-term stability of world governments. Population growth, food and water security, energy supplies, and economic factors are, to some degree, within the control of governance and policy and all of these are impacted by climate disruption. Climate disruption, on the other hand, is not amenable to direct modification on the short timescales that commonly dictate governmental policy and human response. Global average temperatures will continue to increase even if there were immediate, profound changes in emission scenarios. Policy makers are faced with the very practical and immediate problem of determining what can one reasonably do to ameliorate the impact of climate disruption. The issue from a policy viewpoint is: how does one make effective policy when faced with a situation in which there are varied viewpoints in competition. How does one establish a consensus for action? What information "speaks" to policy makers? Water security is one such issue and provides an important, immediate, and tangible device to use when we examine how one can determine what policies can be effectively pursued. The Global Assimilation of Information for Action (GAIA) project creates a support environment to address the impact of climate disruption on global, national, regional, and/or local interests. The basic research community is concerned with the scientific aspects of predicting climate change in terms of environmental parameters such as rainfall, temperature and humidity while decision makers must deal with planning for a world that may be very different from the one we have grown accustomed to. Decision makers must deal with the long-term impacts on public health, agriculture, economic productivity, security, extreme weather, etc in an environment that has come to focus on short-term issues. To complicate matters, the information available from the climate studies community is couched in terms of model projections with "uncertainties" and a choice of emission scenarios that are often expressed in terms of the results of computer simulations and model output. GAIA develops actionable information and explores the interactions of policy and practice. Part of this framework is the development of "games". These realistic games include the elements of both agent-based and role simulation games in which subject matter experts interact in a realistic scenario to explore courses of action and their outcomes based on realistic, projected environments. We will present examples of some of the past work done at APL and examples of collaborative or competitive games that could be used to explore climate disruption in terms of social, political, and economic impacts. These games provide immediate, "tactile" experience of the implications of a choice of policy. In this talk we will suggest how this tool can be applied to problems like the Colorado River Basin or the Brahmaputra.
Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library
ERIC Educational Resources Information Center
McMullen, Karen D.; Kane, Laura Townsend
2008-01-01
In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form S-4, for the registration of securities issued in business combination transactions. 239.25 Section 239.25 Commodity and... business combination transactions. This form may be used for registration under the Securities Act of 1933...
Close the Gate, Lock the Windows, Bolt the Doors: Securing Library Computers. Online Treasures
ERIC Educational Resources Information Center
Balas, Janet
2005-01-01
This article, written by a systems librarian at the Monroeville Public Library, discusses a major issue affecting all computer users, security. It indicates that while, staying up-to-date on the latest security issues has become essential for all computer users, it's more critical for network managers who are responsible for securing computer…
31 CFR 535.221 - Compliance with directive provisions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... paragraph. (2) Definitive securities which are in bearer or registered form shall be hand delivered or... prior written notice of such delivery, specifically identifying the sending person, the face or par amount and type of security, and whether the security is in bearer, registered or book-entry form. (Secs...
Patients with mental problems - the most defenseless travellers.
Felkai, Peter; Kurimay, Tamas
2017-09-01
Severe mental illness occurring abroad is a difficult situation for patients, their families, and for the local medical community. Patients with mental problem are doublely stigmatized due to their mental illness and because they are foreigners in an unfamiliar country. The appropriate treatment is often delayed, while patients are often dealt with in a manner that violates their human rights. Moreover, repatriation - which is vital in this case - is often delayed due to the lack of international protocols for the transportation and treatment of mentally ill travelers. Authors analyzed several factors related to acute mental health problems during travel: the etiology of symptoms, the appropriate treatment possibilities abroad, and medical evacuation and repatriation of the psychotic patient. The article presents a brief review of travel-related mental disorders, the epidemiology of mental health issues faced by travelers, and the significance of pre-travel advice for these patients. The first problem is to recognize (and redress) the particular challenges faced by a psychotic patient in a strange country. The second challenge is to prepare the patients, often in a poor psychiatric state, for medical evacuation by commercial aircraft. Another important question is the best way to take the patient through customs and security control. All of these, as yet unresolved, issues can make the mental patient virtually defenseless. Although timely repatriation of a mentally ill patient is vital and urgent, most travel insurance policies exclude treatment and repatriation costs incurred due to acute mental illness. The high cost of treatment and repatriation must be paid by the patient or their family, which could lead to severe financial strain or insolvency. Changing the approaches taken by the local mental health care community, police, airport security, and insurance companies remain a challenge for psychiatrists. © International Society of Travel Medicine, 2017. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com
Design and Development of Layered Security: Future Enhancements and Directions in Transmission
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-01
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443
Design and Development of Layered Security: Future Enhancements and Directions in Transmission.
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-06
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.
Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security
NASA Astrophysics Data System (ADS)
Mahmadi, FN; Zaaba, ZF; Osman, A.
2016-11-01
Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System.more » Selected papers were processed separately for inclusion in the Energy Science and Technology Database.« less
1987-04-01
security deposit action is described in the regulation as follows: h. Security Deposits (DACF and DACA ). (1) Issue. PCS moves create financial hardships...General Wickham, The Army Chief of Staff, specified a philosophy toward the family in the Army Family White Paper. General Wickham’s action was in...security deposits arose. 1 The Army’s action to the issue of security deposits will be thoroughly discussed in this paper. The Army’s action comes now
Inter-organizational future proof EHR systems. A review of the security and privacy related issues.
van der Linden, Helma; Kalra, Dipak; Hasman, Arie; Talmon, Jan
2009-03-01
Identification and analysis of privacy and security related issues that occur when health information is exchanged between health care organizations. Based on a generic scenario questions were formulated to reveal the occurring issues. Possible answers were verified in literature. Ensuring secure health information exchange across organizations requires a standardization of security measures that goes beyond organizational boundaries, such as global definitions of professional roles, global standards for patient consent and semantic interoperable audit logs. As to be able to fully address the privacy and security issues in interoperable EHRs and the long-life virtual EHR it is necessary to realize a paradigm shift from storing all incoming information in a local system to retrieving information from external systems whenever that information is deemed necessary for the care of the patient.
2011-10-01
said that security of the LOCs was a constant challenge facing the Soviet forces in Afghanistan. Security of the LOCs determined the amount of forces...resistance forces. The Afghan terrain was not ideal for a mechanized force dependent on fire power, secure LOCs and high-technology. Although the popular...Secure logistics and secure LOCs are essential for the both the guerrilla and non-guerrilla force. Security missions, however, can tie up most
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... aggregate principal amount, par value, or book value of the securities as carried by the registrant, or the...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... aggregate principal amount, par value, or book value of the securities as carried by the registrant, or the...
Local Area Network (LAN) Compatibility Issues
1991-09-01
September, 1991 Thesis Advisor: Dr. Norman Schneidewind Approved for public release; distribution is unlimited 92 303s246 Unclassified SECURITY ...CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE Ia. REPORT SECURITY CLASSIFICATION 1 b. RESTRICTIVE MARKINGS unclassified 2a. SECURITY CLASSIFICATION...Work UiNt ACCeLUOn Number 11. TITLE (Include Security Classification) LOCAL AREA NETWORK (LAN) COMPATIBILITY ISSUES 12. PERSONAL AUTHOR(S) Rita V
Interior view of addition pharmacy showing dutch door and security ...
Interior view of addition pharmacy showing dutch door and security ceiling grate, facing north. - Albrook Air Force Station, Dispensary, East side of Canfield Avenue, Balboa, Former Panama Canal Zone, CZ
Interior view of servant's room showing ornamental iron security grille, ...
Interior view of servant's room showing ornamental iron security grille, facing south. - Albrook Air Force Station, Company Officer's Quarters, East side of Canfield Avenue, Balboa, Former Panama Canal Zone, CZ
Developing a Regional Recovery Framework
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lesperance, Ann M.; Olson, Jarrod; Stein, Steven L.
2011-09-01
Abstract A biological attack would present an unprecedented challenge for local, state, and federal agencies; the military; the private sector; and individuals on many fronts ranging from vaccination and treatment to prioritization of cleanup actions to waste disposal. To prepare the Seattle region to recover from a biological attack, the Seattle Urban Area Security Initiative (UASI) partners collaborated with military and federal agencies to develop a Regional Recovery Framework for a Biological Attack in the Seattle Urban Area. The goal was to reduce the time and resources required to recover and restore wide urban areas, military installations, and other criticalmore » infrastructure following a biological incident by providing a coordinated systems approach. Based on discussions in small workshops, tabletop exercises, and interviews with emergency response agency staff, the partners identified concepts of operation for various areas to address critical issues the region will face as recovery progresses. Key to this recovery is the recovery of the economy. Although the Framework is specific to a catastrophic, wide-area biological attack using anthrax, it was designed to be flexible and scalable so it could also serve as the recovery framework for an all-hazards approach. The Framework also served to coalesce policy questions that must be addressed for long-term recovery. These questions cover such areas as safety and health, security, financial management, waste management, legal issues, and economic development.« less
Swindale, Anne; Bilinsky, Paula
2006-05-01
The United States Public Law 480 Title II food aid program is the largest U.S. government program directed at reducing hunger, malnutrition, and food insecurity in the developing world. USAID and Title II implementing partners face challenges in measuring the success of Title II programs in reducing household food insecurity because of the technical difficulty and cost of collecting and analyzing data on traditional food security indicators, such as per capita income and caloric adequacy. The Household Food Insecurity Access Scale (HFIAS) holds promise as an easier and more user-friendly approach for measuring the access component of household food security. To support the consistent and comparable collection of the HFIAS, efforts are under way to develop a guide with a standardized questionnaire and data collection and analysis instructions. A set of domains have been identified that is deemed to capture the universal experience of the access component of household food insecurity across countries and cultures. Based on these domains, a set of questions has been developed with wording that is deemed to be universally appropriate, with minor adaptation to local contexts. These underlying suppositions, based on research in multiple countries, are being verified by potential users of the guide. The key remaining issue relates to the process for creating a categorical indicator of food insecurity status from the HFIAS.
Code of Federal Regulations, 2010 CFR
2010-01-01
... face, in bold type: “This security is not a savings account or deposit and it is not insured by the... the same priority as savings accounts or a higher priority; (C) State that the security is not secured...) Except as provided in paragraph (c)(4)(ii) of this section, a savings association must use an indenture...
The nature of international health security.
Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N
2009-01-01
Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.
77 FR 62592 - Agency Information Collection Activities: Proposed Request
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-15
... application process, we conduct a personal interview, either face-to- face or via telephone, and document the interview using Form SSA-7165. The respondents are applicants for Social Security benefits, whose...
NASA Astrophysics Data System (ADS)
Shuja Syed, Ahmed
2013-12-01
The 1st International Conference on Sensing for Industry, Control, Communication & Security Technologies (ICSICCST-2013), took place in Karachi, Pakistan, from 24-26 June 2013. It was organized by Indus University, Karachi, in collaboration with HEJ Research Institute of Chemistry, University of Karachi, Karachi. More than 80 abstracts were submitted to the conference and were double blind-reviewed by an international scientific committee. The topics of the Conference were: Video, Image & Voice Sensing Sensing for Industry, Environment, and Health Automation and Controls Laser Sensors and Systems Displays for Innovative Applications Emerging Technologies Unmanned, Robotic, and Layered Systems Sensing for Defense, Homeland Security, and Law Enforcement The title of the conference, 'Sensing for Industry, Control, Communication & Security Technologies' is very apt in capturing the main issues facing the industry of Pakistan and the world. We believe the sensing industry, particularly in Pakistan, is currently at a critical juncture of its development. The future of the industry will depend on how the industry players choose to respond to the challenge of global competition and opportunities arising from strong growth in the Asian region for which we are pleased to note that the conference covered a comprehensive spectrum of issues with an international perspective. This will certainly assist industry players to make informed decisions in shaping the future of the industry. The conference gathered qualified researchers from developed countries like USA, UK, Sweden, Saudi Arabia, China, South Korea and Malaysia etc whose expertise resulting from the research can be drawn upon to build an exploitable area of new technology that has potential Defense, Homeland Security, and Military applicability. More than 250 researchers/students attended the event and made the event great success as the turnout was 100%. An exceptional line-up of speakers spoke at the occasion. We want to thank the Organizing Committee, the Institutions and Sponsors supporting the Conference, especially 'Centre for Emerging Sciences, Engineering & Technology (CESET), Islamabad', the IOP Publishers and everyone who contributed to the organization of this meeting, for their invaluable efforts to make this event a great success. Professor Dr Ahmed Shuja Syed Chief Editor The PDF also contains lists of the boards, committees and sponsors.
NASA Astrophysics Data System (ADS)
Meyerstein, Mike; Cha, Inhyok; Shah, Yogendra
The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.
Video face recognition against a watch list
NASA Astrophysics Data System (ADS)
Abbas, Jehanzeb; Dagli, Charlie K.; Huang, Thomas S.
2007-10-01
Due to a large increase in the video surveillance data recently in an effort to maintain high security at public places, we need more robust systems to analyze this data and make tasks like face recognition a realistic possibility in challenging environments. In this paper we explore a watch-list scenario where we use an appearance based model to classify query faces from low resolution videos into either a watch-list or a non-watch-list face. We then use our simple yet a powerful face recognition system to recognize the faces classified as watch-list faces. Where the watch-list includes those people that we are interested in recognizing. Our system uses simple feature machine algorithms from our previous work to match video faces against still images. To test our approach, we match video faces against a large database of still images obtained from a previous work in the field from Yahoo News over a period of time. We do this matching in an efficient manner to come up with a faster and nearly real-time system. This system can be incorporated into a larger surveillance system equipped with advanced algorithms involving anomalous event detection and activity recognition. This is a step towards more secure and robust surveillance systems and efficient video data analysis.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greenwald, P.T.
In the post Cold War era, the East-West conflict may be succeeded by a new confrontation which pits an industrialized North against a developing South. In June 1992, world attention was fixed on the Earth Summit in Rio de Janeiro. This event marked a milestone in global environmental awareness; but just as the end of the Cold War has provided new opportunities for the US, the world is now faced with new sources of conflict which have advanced to the forefront of the national security debate. Among the new sources of conflict, environmental problems are rapidly becoming preeminent. Within nationalmore » security debates, those environmental problems which respect no international boundary are of particular concern. Worldwide deforestation, and the related issues of global warming and the loss of biodiversity, represent a clear threat to national security. Two percent of the Earth's rainforests are lost each year; one 'football field' is lost each second. Deforestation has already led to conflict and instability within several regions of the world including Southeast Asia. The United States must recognize the character and dynamics of these new sources of conflict in order to successfully realize its policy aims in national security. The US should preempt conflict through cooperation and develop a shared concern for the environment throughout the world. The US military may play a key role in this effort. Rainforest, Deforestation, Tropical timber, Logging, Southeast Asia, Philippines, Malaysia, Indonesia, Thailand, Burma, Laos, Japan Cambodia, Vietnam, Human rights, Plywood, Pulp, Paper, World Bank, U.S. Agency for International Development.« less
75 FR 881 - Meeting of Advisory Committee on International Communications and Information Policy
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-06
... development issues, international spectrum requirements and harmonization, cyber-security, and data protection... will discuss key issues of importance to U.S. communications policy interests including future... Bureau of Diplomatic Security to enhance the Department's security by tracking visitor traffic and to...
NASA Astrophysics Data System (ADS)
Lovett, Kian
Since the dawn of time, humans have engaged in war. In the last 5,600 years of recorded history 14,600 wars have been waged1. The United Nations has sought to save succeeding generations from the scourge of war and to foster peace. Wars have recently taken place in Afghanistan and Iraq. Both countries are now faced with a range of complex problems. In-depth country assessments reveal significant shortcomings in the areas of water, sanitation, health, security and natural resource management. These are key factors when examining environmental security, sustainable development and trans-boundary problems, all of which are issues relevant to the Middle East and Central Asian states. Space technology can be applied to support the reconstruction and development plans for Afghanistan and Iraq; however, there needs to be an investigation and open discussion of how these resources can best be used. Already, agencies within the United Nations possess considerable expertise in the use of space technologies in the area of disaster management. If this capability is to be used, there will need to be inter-agency coordination, not to mention a further expansion and development of the United Nations role in both Afghanistan and Iraq.
Recognizing and reducing risks: HIPAA privacy and security enforcement.
Wachler, Andrew B; Fehn, Amy K
2003-01-01
With the passing of the Health Insurance Portability and Accountability Act (HIPAA) privacy rule deadline and the security rule deadline looming, many covered entities are left wondering if they are doing enough to prevent privacy and security breaches and what type of exposure their organization could face in the event of a breach.
Enhancing National Security in Jamaica Through the Development and Employment of Special Forces
2005-06-01
face Jamaica. This study examines the value, utility, and possible roles of such a unit in the Jamaican security landscape, and makes recommendations...and possible roles of such a unit in the Jamaican security landscape, and makes recommendations for the establishment and employment of such a unit...
Minimum Requirements for Taxicab Security Cameras*
Zeng, Shengke; Amandus, Harlan E.; Amendola, Alfred A.; Newbraugh, Bradley H.; Cantis, Douglas M.; Weaver, Darlene
2015-01-01
Problem The homicide rate of taxicab-industry is 20 times greater than that of all workers. A NIOSH study showed that cities with taxicab-security cameras experienced significant reduction in taxicab driver homicides. Methods Minimum technical requirements and a standard test protocol for taxicab-security cameras for effective taxicab-facial identification were determined. The study took more than 10,000 photographs of human-face charts in a simulated-taxicab with various photographic resolutions, dynamic ranges, lens-distortions, and motion-blurs in various light and cab-seat conditions. Thirteen volunteer photograph-evaluators evaluated these face photographs and voted for the minimum technical requirements for taxicab-security cameras. Results Five worst-case scenario photographic image quality thresholds were suggested: the resolution of XGA-format, highlight-dynamic-range of 1 EV, twilight-dynamic-range of 3.3 EV, lens-distortion of 30%, and shutter-speed of 1/30 second. Practical Applications These minimum requirements will help taxicab regulators and fleets to identify effective taxicab-security cameras, and help taxicab-security camera manufacturers to improve the camera facial identification capability. PMID:26823992
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nelson, Cynthia Lee
There is a need in security systems to rapidly and accurately grant access of authorized personnel to a secure facility while denying access to unauthorized personnel. In many cases this role is filled by security personnel, which can be very costly. Systems that can perform this role autonomously without sacrificing accuracy or speed of throughput are very appealing. To address the issue of autonomous facility access through the use of technology, the idea of a ''secure portal'' is introduced. A secure portal is a defined zone where state-of-the-art technology can be implemented to grant secure area access or to allowmore » special privileges for an individual. Biometric technologies are of interest because they are generally more difficult to defeat than technologies such as badge swipe and keypad entry. The biometric technologies selected for this concept were facial and gait recognition. They were chosen since they require less user cooperation than other biometrics such as fingerprint, iris, and hand geometry and because they have the most potential for flexibility in deployment. The secure portal concept could be implemented within the boundaries of an entry area to a facility. As a person is approaching a badge and/or PIN portal, face and gait information can be gathered and processed. The biometric information could be fused for verification against the information that is gathered from the badge. This paper discusses a facial recognition technology that was developed for the purposes of providing high verification probabilities with low false alarm rates, which would be required of an autonomous entry control system. In particular, a 3-D facial recognition approach using Fisher Linear Discriminant Analysis is described. Gait recognition technology, based on Hidden Markov Models has been explored, but those results are not included in this paper. Fusion approaches for combining the results of the biometrics would be the next step in realizing the secure portal concept.« less
SPACE: Vision and Reality: Face to Face. Proceedings Report
NASA Technical Reports Server (NTRS)
1995-01-01
The proceedings of the 11th National Space Symposium entitled 'Vision and Reality: Face to Face' is presented. Technological areas discussed include the following sections: Vision for the future; Positioning for the future; Remote sensing, the emerging era; space opportunities, Competitive vision with acquisition reality; National security requirements in space; The world is into space; and The outlook for space. An appendice is also attached.
The 2015 National Security Strategy: Authorities, Changes, Issues for Congress
2016-02-26
climate change ; ensure access to shared spaces (expanding cyberspace and including outer space and air and maritime security); and increase global...hand, one could conclude that these, along with confronting climate change , convey both a wider range of national security challenges in terms of...The 2015 National Security Strategy: Authorities, Changes , Issues for Congress Nathan J. Lucas, Coordinator Section Research Manager Kathleen
Preface: photosynthesis and hydrogen energy research for sustainability.
Tomo, Tatsuya; Allakhverdiev, Suleyman I
2017-09-01
Energy supply, climate change, and global food security are among the main chalenges facing humanity in the twenty-first century. Despite global energy demand is continuing to increase, the availability of low cost energy is decreasing. Together with the urgent problem of climate change due to CO 2 release from the combustion of fossil fuels, there is a strong requirement of developing the clean and renewable energy system for the hydrogen production. Solar fuel, biofuel, and hydrogen energy production gained unlimited possibility and feasibility due to understanding of the detailed photosynthetic system structures. This special issue contains selected papers on photosynthetic and biomimetic hydrogen production presented at the International Conference "Photosynthesis Research for Sustainability-2016", that was held in Pushchino (Russia), during June 19-25, 2016, with the sponsorship of the International Society of Photosynthesis Research (ISPR) and of the International Association for Hydrogen Energy (IAHE). This issue is intended to provide recent information on the photosynthetic and biohydrogen production to our readers.
What governs governance, and how does it evolve? The sociology of governance-in-action.
Fox, Nick J; Ward, Katie J
2008-09-01
Governance addresses a wide range of issues including social, economic and political continuity, security and integrity, individual and collective safety and the liberty and rights to self-actualization of citizens. Questions to be answered include how governance can be achieved and sustained within a social context imbued with cultural values and in which power is distributed unevenly and dynamically, and how governance impacts on individuals and institutions. Drawing on Gramscian notions of hegemony and consent, and recent political science literatures on regulation and meta-regulation, this paper develops a sociological model of governance that emphasizes a dynamic and responsive governance in action. Empirical data from a study of pharmaceutical governance is used to show how multiple institutions and actors are involved in sustaining effective governance. The model addresses issues of how governance is sustained in the face of change, why governance of practices varies from setting to setting, and how governance is achieved without legislation.
Operating in the Gray Zone: An Alternative Paradigm for U.S. Military Strategy
2016-04-01
labeling, or re-labeling, may have been to draw the attention of busy policymakers to rapidly emerging security issues , it has evolved into something... issues affecting the national security community. The Peacekeeping and Stability Operations Institute provides subject matter expertise, technical...SSI) is part of the U.S. Army War College and is the strategic-level study agent for issues related to national security and military strategy with
NASA Astrophysics Data System (ADS)
Foster, I.; Elliott, J. W.; Jones, J.; Montella, R.
2013-12-01
Issues relating to climate change and food security require an understanding of the interaction between the natural world and human society over long time scales. Understanding climate change, its impacts on the natural world and society, and the tradeoffs inherent in societal responses demands an unprecedented degree of cooperation across academic fields. New data sources on expected future climate, soil characteristics, economic activity, historical weather, population, and land cover, provide a potential basis for this cooperation. New methods are needed for sharing within and across communities not only data but the software used to generate, synthesize, and analyze it. Progress on these research challenges is hindered by the extreme difficulties that researchers, collaborators, and the community experiences when they collaborate around data. Multiplicity of data formats; inadequate computational tools; difficulty in sharing data and programs, lack of incentives for pro-social behavior and large data volumes are among the technology barriers. The FACE-IT project at the University of Chicago, NASA, and University of Florida employs an integrated approach to cyberinfrastructure to advance the characterization of vulnerabilities, impacts, mitigation, and adaptation to climate change in human and environmental systems. Leveraging existing research cyberinfrastructure the project is creating a full-featured FACE-IT Platform prototype with new capabilities for ingesting, organizing, managing, analyzing and using large quantities of diverse data. The project team collaborates with two distinct interdisciplinary communities to create community specific FACE-IT Instances to both advance their research and enable at-scale evaluation of the utility of the FACE-IT approach. In this talk I will introduce the FACE-IT system and discuss early applications.
[A literature review on epidemiologic research on sleep disturbances in the elderly].
Doi, Yuriko
2015-06-01
One of the issues facing our super-aging society of Japan is to secure the elderly's safety and health. According to the latest 10-year statistics of the National Police Agency, the number of elderly driving deaths 75 years of age and over has risen 1.3 times from 2003 to 2013, whereas driving deaths decreased by less than half among the people under age 75 during the same period of time. This paper reviews the current literature on epidemiologic studies investigating the associations of sleep disturbances with adverse driving events and driving practice among elderly drivers. The results suggest a cognitive behavioral therapy for insomnia as a promising method for improving their driving capacity. Key words: elderly driving, epidemiology, sleep disturbances
Innovations in Wind and Solar PV Financing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cory, K.; Coughlin, J.; Jenkin, T.
2008-02-01
There is growing national interest in renewable energy development based on the economic, environmental, and security benefits that these resources provide. Historically, greater development of our domestic renewable energy resources has faced a number of hurdles, primarily related to cost, regulation, and financing. With the recent sustained increase in the costs and associated volatility of fossil fuels, the economics of renewable energy technologies have become increasingly attractive to investors, both large and small. As a result, new entrants are investing in renewable energy and new business models are emerging. This study surveys some of the current issues related to windmore » and solar photovoltaic (PV) energy project financing in the electric power industry, and identifies both barriers to and opportunities for increased investment.« less
The Campus Executive's Role in Security and Liability Issues.
ERIC Educational Resources Information Center
Bromley, Max; Territo, Leonard
1986-01-01
Executives at institutions of higher education have become increasingly concerned about serious crimes being committed on their campuses. The liability issue, criminal activity information, physical security and design issues, student patrol escorts, crime prevention training, and task force development are discussed. (MLW)
2013-01-01
Background Many of India’s estimated 40 million migrant workers in the construction industry migrate with their children. Though India is undergoing rapid economic growth, numerous child protection issues remain. Migrant workers and their children face serious threats to their health, safety, and well-being. We examined risk and protective factors influencing the basic rights and protections of children and families living and working at a construction site outside Delhi. Methods Using case study methods and a rights-based model of child protection, the SAFE model, we triangulated data from in-depth interviews with stakeholders on and near the site (including employees, middlemen, and managers); 14 participants, interviews with child protection and corporate policy experts in greater Delhi (8 participants), and focus group discussions (FGD) with workers (4 FGDs, 25 members) and their children (2 FGDs, 9 members). Results Analyses illuminated complex and interrelated stressors characterizing the health and well-being of migrant workers and their children in urban settings. These included limited access to healthcare, few educational opportunities, piecemeal wages, and unsafe or unsanitary living and working conditions. Analyses also identified both protective and potentially dangerous survival strategies, such as child labor, undertaken by migrant families in the face of these challenges. Conclusions By exploring the risks faced by migrant workers and their children in the urban construction industry in India, we illustrate the alarming implications for their health, safety, livelihoods, and development. Our findings, illuminated through the SAFE model, call attention to the need for enhanced systems of corporate and government accountability as well as the implementation of holistic child-focused and child-friendly policies and programs in order to ensure the rights and protection of this hyper-mobile, and often invisible, population. PMID:24044788
Betancourt, Theresa S; Shaahinfar, Ashkon; Kellner, Sarah E; Dhavan, Nayana; Williams, Timothy P
2013-09-17
Many of India's estimated 40 million migrant workers in the construction industry migrate with their children. Though India is undergoing rapid economic growth, numerous child protection issues remain. Migrant workers and their children face serious threats to their health, safety, and well-being. We examined risk and protective factors influencing the basic rights and protections of children and families living and working at a construction site outside Delhi. Using case study methods and a rights-based model of child protection, the SAFE model, we triangulated data from in-depth interviews with stakeholders on and near the site (including employees, middlemen, and managers); 14 participants, interviews with child protection and corporate policy experts in greater Delhi (8 participants), and focus group discussions (FGD) with workers (4 FGDs, 25 members) and their children (2 FGDs, 9 members). Analyses illuminated complex and interrelated stressors characterizing the health and well-being of migrant workers and their children in urban settings. These included limited access to healthcare, few educational opportunities, piecemeal wages, and unsafe or unsanitary living and working conditions. Analyses also identified both protective and potentially dangerous survival strategies, such as child labor, undertaken by migrant families in the face of these challenges. By exploring the risks faced by migrant workers and their children in the urban construction industry in India, we illustrate the alarming implications for their health, safety, livelihoods, and development. Our findings, illuminated through the SAFE model, call attention to the need for enhanced systems of corporate and government accountability as well as the implementation of holistic child-focused and child-friendly policies and programs in order to ensure the rights and protection of this hyper-mobile, and often invisible, population.
Managing Campus Security: Issues for Police Officers at Public Institutions.
ERIC Educational Resources Information Center
Dwyer, William O.; And Others
1994-01-01
To maximize the effectiveness of their campus security systems while minimizing the institution's exposure to liability, campus administrators must understand the legal context in which their police or security personnel are operating as agents of authority. Some of these policy and behavior issues are explained. (MSE)
The Superpowers: Nuclear Weapons and National Security. National Issues Forums.
ERIC Educational Resources Information Center
Mitchell, Greg; Melville, Keith
Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…
ERIC Educational Resources Information Center
Bete, Tim, Ed.
1998-01-01
Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…
A Sort of Homecoming: Incarceration and the housing security of urban men
Curtis, Marah A.
2011-01-01
While individuals returning from prison face many barriers to successful re-entry, among the most serious are the challenges they face in securing housing. Housing has long been recognized as a prerequisite for stable employment, access to social services, and other aspects of individual and family functioning. The formerly incarcerated face several administrative and de facto restrictions on their housing options; however, little is known about the unique instabilities that they face. We use a longitudinal survey of urban families to examine housing insecurity among nearly 3,000 urban men, including over 1,000 with incarceration histories. We find that men recently incarcerated face greater housing insecurity, including both serious hardships such as homelessness, and precursors to homelessness such as residential turnover and relying on others for housing expenses. Their increased risk is tied both to diminished annual earnings and other factors, including, potentially, evictions from public housing supported by Federal “one-strike” policies. PMID:21927519
Special Issues in Working with Gifted Minority Adolescents.
ERIC Educational Resources Information Center
Lindstrom, Rena R.; Van Sant, Sondra
1986-01-01
Gifted adolescents from minority groups face the same issues all gifted young people face, but the addition of racial and cultural factors increases the complexity of these issues. Discusses individual versus cultural pressures that affect identity, issues related to assisting students with long-range planning, and two models for programming.…
Issues Validation: A New Environmental Scanning Technique for Family Life Educators.
ERIC Educational Resources Information Center
Weigel, Randy R.; And Others
1992-01-01
Three-state study used Issues Validation, environmental scanning process for family life educators that combines literature reviews, professional and public opinion, and survey research to identify issues facing families and youth. Samples of residents, local advisory committees, and community professionals ranked 30 issues facing families and…
Quality and security - They work together
NASA Technical Reports Server (NTRS)
Carr, Richard; Tynan, Marie; Davis, Russell
1991-01-01
This paper describes the importance of considering computer security as part of software quality assurance practice. The intended audience is primarily those professionals involved in the design, development, and quality assurance of software. Many issues are raised which point to the need ultimately for integration of quality assurance and computer security disciplines. To address some of the issues raised, the NASA Automated Information Security program is presented as a model which may be used for improving interactions between the quality assurance and computer security community of professionals.
Code of Federal Regulations, 2014 CFR
2014-01-01
...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...
Code of Federal Regulations, 2011 CFR
2011-01-01
...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...
Code of Federal Regulations, 2012 CFR
2012-01-01
...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...
Code of Federal Regulations, 2013 CFR
2013-01-01
...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...
Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.
NASA Astrophysics Data System (ADS)
Liu, Shu-Fan; Chueh, Hao-En; Liao, Kuo-Hsiung
According to surveys, 80 % of security related events threatening information in medical organizations is due to improper management. Most research on information security has focused on information and security technology, such as network security and access control; rarely addressing issues at the management issues. The main purpose of this study is to construct a BS7799 based mechanism for the management of information with regard to security as it applies to medical organizations. This study analyzes and identifies the most common events related to information security in medical organizations and categorizes these events as high-risk, transferable-risk, and controlled-risk to facilitate the management of such risk.
ADA members weigh in on critical issues.
Burgess, Karen; Ruesch, Jon D; Mikkelsen, Matthew C; Wagner, Karen Schaid
2003-01-01
Science, new technology, patient care, dental reimbursement and government regulations all affect today's dental practitioners. To find out more about how such challenges may affect current private practitioners, the American Dental Association conducted the 2000 Membership Needs and Opinions Survey. A questionnaire was sent to 6,310 ADA members in January 2000 with follow-up mailings in February, March and April 2000. Data collection was completed in July 2000. The survey included questions on critical professional issues, and on perceptions of the ADA and ADA priorities. A total of 3,558 completed surveys were received for an adjusted response rate of 59.5 percent. Members rated the identified issues' level of importance to them. The top three issues included "maintaining my ability to recommend the treatment option I feel is most appropriate for my patients," "receiving fair reimbursement for the dental services I provide," and "protecting myself, my staff and my patients from communicable diseases." New dentists found other items to be more significant to them compared with members overall. Although ADA members as a whole had similar views on critical issues facing dentistry and ADA priorities, there were significant differences regarding some issues. New dentists were far more concerned about securing funds for their practice and paying off debt than were all ADA members. Minority dentists expressed greater levels of concern about certain issues than did all ADA members. When planning and implementing ADA activities, the Association should continue to take into account members' relative rankings of professional issues and note issues of special interest to selected membership subgroups.
DOD Security Cooperation: An Overview of Authorities and Issues
2016-08-23
Cooperation: An Overview of Authorities and Issues Congressional Research Service 13 DOD funds six Regional Centers for Security Studies , which...Expenses Necessary for Theater Security Cooperation.” Another Senate proposal would revamp DOD’s five regional centers for security studies (10 U.S.C...184) by eliminating two that are located in Washington, DC (the Africa Center for Strategic Studies and the Near East South Asia Center for Strategic
Robust allocation of a defensive budget considering an attacker's private information.
Nikoofal, Mohammad E; Zhuang, Jun
2012-05-01
Attackers' private information is one of the main issues in defensive resource allocation games in homeland security. The outcome of a defense resource allocation decision critically depends on the accuracy of estimations about the attacker's attributes. However, terrorists' goals may be unknown to the defender, necessitating robust decisions by the defender. This article develops a robust-optimization game-theoretical model for identifying optimal defense resource allocation strategies for a rational defender facing a strategic attacker while the attacker's valuation of targets, being the most critical attribute of the attacker, is unknown but belongs to bounded distribution-free intervals. To our best knowledge, no previous research has applied robust optimization in homeland security resource allocation when uncertainty is defined in bounded distribution-free intervals. The key features of our model include (1) modeling uncertainty in attackers' attributes, where uncertainty is characterized by bounded intervals; (2) finding the robust-optimization equilibrium for the defender using concepts dealing with budget of uncertainty and price of robustness; and (3) applying the proposed model to real data. © 2011 Society for Risk Analysis.
NASA Astrophysics Data System (ADS)
Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli
In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.
The Water-Energy-Food Nexus in Kazakhstan: Trends and Analyses
NASA Astrophysics Data System (ADS)
Karatayev, Marat; Rivotti, Pedro; Sobral Mourão, Zenaida; Konadu, D. Dennis; Clarke, Michèle
2017-04-01
The concept of the water, energy and food nexus is extremely relevant to Kazakhstan as the country faces population growth, economic progress and environmental challenges such as water scarcity, desertification, and climate change. Furthermore, poor sectoral coordination and institutional fragmentation have caused an unsustainable resource use and threaten the long-term sustainability of water, energy and food security in Kazakhstan. Specifically, low tariffs in the water and electricity sectors have led to under-investment in water and energy efficiency measures, leading to extensive water losses, soil salinity, as well as degradation of agricultural land. Using the nexus approach, this study aims to investigate and map the linkages between water resources, energy production and food security in Kazakhstan, with an emphasis on the current coordination framework. This will enable the identification of critical interdependency issues in the management of these resources. The results will provide a better understanding of the current interconnectedness of the sectors, and support the coordination of decision-making at various levels of governance and research of land, water and energy to meet sustainable development goals.
Pedestrian Detection by Laser Scanning and Depth Imagery
NASA Astrophysics Data System (ADS)
Barsi, A.; Lovas, T.; Molnar, B.; Somogyi, A.; Igazvolgyi, Z.
2016-06-01
Pedestrian flow is much less regulated and controlled compared to vehicle traffic. Estimating flow parameters would support many safety, security or commercial applications. Current paper discusses a method that enables acquiring information on pedestrian movements without disturbing and changing their motion. Profile laser scanner and depth camera have been applied to capture the geometry of the moving people as time series. Procedures have been developed to derive complex flow parameters, such as count, volume, walking direction and velocity from laser scanned point clouds. Since no images are captured from the faces of pedestrians, no privacy issues raised. The paper includes accuracy analysis of the estimated parameters based on video footage as reference. Due to the dense point clouds, detailed geometry analysis has been conducted to obtain the height and shoulder width of pedestrians and to detect whether luggage has been carried or not. The derived parameters support safety (e.g. detecting critical pedestrian density in mass events), security (e.g. detecting prohibited baggage in endangered areas) and commercial applications (e.g. counting pedestrians at all entrances/exits of a shopping mall).
NASA Astrophysics Data System (ADS)
Watanabe, Eriko; Ishikawa, Mami; Ohta, Maiko; Murakami, Yasuo; Kodate, Kashiko
2006-01-01
Medical errors and patient safety have always received a great deal of attention, as they can be critically life-threatening and significant matters. Hospitals and medical personnel are trying their utmost to avoid these errors. Currently in the medical field, patients' record is identified through their PIN numbers and ID cards. However, for patients who cannot speak or move, or who suffer from memory disturbances, alternative methods would be more desirable, and necessary in some cases. The authors previously proposed and fabricated a specially-designed correlator called FARCO (Fast Face Recognition Optical Correlator) based on the Vanderlugt Correlator1, which operates at the speed of 1000 faces/s 2,3,4. Combined with high-speed display devices, the four-channel processing could achieve such high operational speed as 4000 faces/s. Running trial experiments on a 1-to-N identification basis using the optical parallel correlator, we succeeded in acquiring low error rates of 1 % FMR and 2.3 % FNMR. In this paper, we propose a robust face recognition system using the FARCO for focusing on the safety and security of the medical field. We apply our face recognition system to registration of inpatients, in particular children and infants, before and after medical treatments or operations. The proposed system has recorded a higher recognition rate by multiplexing both input and database facial images from moving images. The system was also tested and evaluated for further practical use, leaving excellent results. Hence, our face recognition system could function effectively as an integral part of medical system, meeting these essential requirements of safety, security and privacy.
Enhanced Facial Symmetry Assessment in Orthodontists
Jackson, Tate H.; Clark, Kait; Mitroff, Stephen R.
2013-01-01
Assessing facial symmetry is an evolutionarily important process, which suggests that individual differences in this ability should exist. As existing data are inconclusive, the current study explored whether a group trained in facial symmetry assessment, orthodontists, possessed enhanced abilities. Symmetry assessment was measured using face and non-face stimuli among orthodontic residents and two control groups: university participants with no symmetry training and airport security luggage screeners, a group previously shown to possess expert visual search skills unrelated to facial symmetry. Orthodontic residents were more accurate at assessing symmetry in both upright and inverted faces compared to both control groups, but not for non-face stimuli. These differences are not likely due to motivational biases or a speed-accuracy tradeoff—orthodontic residents were slower than the university participants but not the security screeners. Understanding such individual differences in facial symmetry assessment may inform the perception of facial attractiveness. PMID:24319342
A Seasoned Instructor's New Look at Fixed-Income Securities: An Exercise Using Discounted Bonds
ERIC Educational Resources Information Center
Secrest, Thomas W.
2012-01-01
Having returned to teaching the basics of pricing fixed-income securities after several years, the author recalls the difficulty students have in understanding the total return provided by fixed-income securities that are purchased at either a discount or premium from face value. This teaching note attempts to clarify the concept by suggesting…
ERIC Educational Resources Information Center
Thompson, Eleanor Elizabeth
2014-01-01
That organizations face threats to the security of their computer systems from external hackers is well documented. Intentional or unintentional behaviors by organizational insiders can severely compromise computer security as well. Less is known, however, about the nature of this threat from insiders. The purpose of this study was to bridge this…
Ebert, Todd A [West Palm Beach, FL; Carella, John A [Jupiter, FL
2012-03-13
A triple acting radial seal used as an interstage seal assembly in a gas turbine engine, where the seal assembly includes an interstage seal support extending from a stationary inner shroud of a vane ring, the interstage seal support includes a larger annular radial inward facing groove in which an outer annular floating seal assembly is secured for radial displacement, and the outer annular floating seal assembly includes a smaller annular radial inward facing groove in which an inner annular floating seal assembly is secured also for radial displacement. A compliant seal is secured to the inner annular floating seal assembly. The outer annular floating seal assembly encapsulates the inner annular floating seal assembly which is made from a very low alpha material in order to reduce thermal stress.
Ekeoduru, Rhashedah A; Greives, Matthew R; Nesrsta, Eric A
2017-02-15
A former 25-week-old neonate presented at 34 weeks postconceptual age with necrotizing fasciitis and purpura fulminans because of Group B Streptococcus infection. He was septic and coagulopathic when he was intubated, and the endotracheal tube was secured with adhesives. When he subsequently developed large purpuric, bullous lesions on the face and neck, he presented to the operating room for excision and debridement of his facial lesions. No change was made in how the endotracheal tube was secured. Midprocedure, an unintentional extubation occurred. We describe how we subsequently secured the airway and make recommendations on how to avoid this problem in the future and for rescue preparation before the procedure.
Ying, Liu; Bashir, Muhammad Khalid; Abid, Muhammad; Zulfiqar, Farhad
2017-01-01
In most of the developing countries, lack of resources and little market accessibility are among the major factors that affect small farming household food security. This study aims to investigate the status of small farming households’ food security, and its determinants including the role of market accessibility factors in enhancing food security at household level. In addition, this study also determines the households’ perception about different kinds of livelihoods risks. This study is based on a household survey of 576 households conducted through face-to-face interviews using structured interviews in Punjab, Pakistan. Food security status is calculated using dietary intake method. The study findings show that one-fourth of the households are food insecure. The study findings reveal that farm households perceive increase in food prices, crop diseases, lack of irrigation water and increase in health expenses as major livelihood risks. Further, the results of logistic regression show that family size, monthly income, food prices, health expenses and debt are main factors influencing the food security status of rural households. Furthermore, the market accessibility factors (road distance and transportation cost) do significantly affect the small farming household food security. The results suggest that local food security can be enhanced by creating off-farm employment opportunities, improved transportation facilities and road infrastructure. PMID:29077719
Ahmed, Umar Ijaz; Ying, Liu; Bashir, Muhammad Khalid; Abid, Muhammad; Zulfiqar, Farhad
2017-01-01
In most of the developing countries, lack of resources and little market accessibility are among the major factors that affect small farming household food security. This study aims to investigate the status of small farming households' food security, and its determinants including the role of market accessibility factors in enhancing food security at household level. In addition, this study also determines the households' perception about different kinds of livelihoods risks. This study is based on a household survey of 576 households conducted through face-to-face interviews using structured interviews in Punjab, Pakistan. Food security status is calculated using dietary intake method. The study findings show that one-fourth of the households are food insecure. The study findings reveal that farm households perceive increase in food prices, crop diseases, lack of irrigation water and increase in health expenses as major livelihood risks. Further, the results of logistic regression show that family size, monthly income, food prices, health expenses and debt are main factors influencing the food security status of rural households. Furthermore, the market accessibility factors (road distance and transportation cost) do significantly affect the small farming household food security. The results suggest that local food security can be enhanced by creating off-farm employment opportunities, improved transportation facilities and road infrastructure.
Ethical and social issues facing obstetricians in low-income countries.
Ogwuegbu, Chigbu Chibuike; Eze, Onah Hyacinth
2009-06-01
A review of publications on ethical and social issues from low-income countries was done with the aim of highlighting the major ethical and social issues facing obstetricians in these countries. Low-income countries were identified using the World Health Organization income group classification of member nations. Obstetricians in low-income countries face a wide range of special social and ethical issues that reflect the peculiarities of their practice environment characterized by poverty, low education, deep attachment to tradition and culture, low social status of women, and high levels of physician's paternalism.
Code of Federal Regulations, 2010 CFR
2010-04-01
... positions in the specific security issue: (1) Cash/immediate net settled positions; (2) Net when-issued... appropriate for monitoring the impact of concentrations of positions in Treasury securities. (h) “Reportable...
A Semantic Based Policy Management Framework for Cloud Computing Environments
ERIC Educational Resources Information Center
Takabi, Hassan
2013-01-01
Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…
Code of Federal Regulations, 2010 CFR
2010-01-01
... is important to note that a mutual fund or employee benefit plan that is diversified for purposes of... 3(3) of the Employee Retirement Income Security Act of 1974, 29 U.S.C. 1002(3), and that has more... means a person who issues or proposes to issue any security, or has any outstanding security which it...
Housing preferences of young adults in Indonesia: housing attributes and consequences
NASA Astrophysics Data System (ADS)
Farasa, N.; Kusuma, H. E.
2018-03-01
Nowadays, the housing demand of young adults in Indonesia is important issues for the sustainable development of the market. Facing differences of life phases, such as marriage, leaving home after graduation, and new job positioning, young adults become the main segment facing constant housing choice decisions in the housing market. In their particular phase of life, young adults have distinct preferences for housing attributes which bring a great influence on their lives in the future. Data was gathered from a survey questionnaire that was answered by 180 young adults in Indonesia, ranging from age 22-33 years. The findings suggest that the green area and view, location, simplicity, home design, and accessibility are the significant parts as housing attributes for young adults’ housing preferences in Indonesia. The effect of these attributes has many consequences such as security, personalization, mood/ambiance, maintenance, interaction, image, flexibility, environmental, economy, durability, convenience, comfort, and circulation. The biggest group of young adults who prefer comfort as their wanted consequences tend to have high preferences on housing attributes of the green area and view, and simplicity.
Movie Piracy Networks at Alaba International Market, Lagos, Nigeria.
Tade, Oludayo; Mmahi, Okoro Paul
2018-01-01
This study examined the veiled chain of film piracy, a major crime in the Nigeria entertainment industry. Studies on film piracy in Nigeria have focused on its economic implications, both on the copyright owners and on the Nigerian economy. The organization of the activities of the film pirates has, however, been neglected. Narratives were extracted through in-depth interviews with pirates, "marketers," and "producers." Data indicated that pirates were insiders in the film marketing industry and included importers of foreign movies, registered and nonregistered retailers of Nigerian films, as well as marketers appointed by copyright owners to distribute their films. With the connivance of sales girls working with the copyright owners and dubbing companies, original copies of films (white face) are "procured." Pirates distributed pirated copies, also secretly known as "green face," without issuing receipts or putting the logo of the company on it. For security reasons, pirated films are sold only to buyers introduced by a member in the piracy network. Efforts aimed at fighting piracy must take into account this veiled network to effectively combat intellectual theft via aggressive ban on the public sale of such products.
Reviews on Security Issues and Challenges in Cloud Computing
NASA Astrophysics Data System (ADS)
An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.
2016-11-01
Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.
Rogers, Anissa; Rebbe, Rebecca; Gardella, Chanel; Worlein, Mary; Chamberlin, Mya
2013-01-01
Older lesbian, gay, bisexual, and transgender (LGBT) adults face unique issues that can impede their well-being. Although many advances have helped address these issues, there is a need for education efforts that raise awareness of service providers about these issues. This study explores evaluation data of training panels provided by older LGBT adults and the views of training participants on issues faced by the older LGBT community after attending the panels. Participants were 605 students and professionals from over 34 education and communication settings. Implications for trainings on participants and older LGBT trainers are discussed.
3. VIEW OF WEST AND SOUTH FACES OF VEHICLE SUPPORT ...
3. VIEW OF WEST AND SOUTH FACES OF VEHICLE SUPPORT BUILDING. NOTE BLAST-PROTECTION WALL SURROUNDING DOOR TO ROOM 106 (PYROTECHNIC STORAGE ROOM) NEAR SOUTHWEST CORNER. East face not accesible for photography due to proximity of security fence. - Vandenberg Air Force Base, Space Launch Complex 3, Vehicle Support Building, Napa & Alden Roads, Lompoc, Santa Barbara County, CA
17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.
Code of Federal Regulations, 2010 CFR
2010-04-01
... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...
17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.
Code of Federal Regulations, 2014 CFR
2014-04-01
... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...
17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.
Code of Federal Regulations, 2011 CFR
2011-04-01
... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...
17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.
Code of Federal Regulations, 2012 CFR
2012-04-01
... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...
17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.
Code of Federal Regulations, 2013 CFR
2013-04-01
... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...
1992-06-01
Boards) Security, Privacy, and Freedom of Speech Issues 4.1.2 Understand the relationships between information processing and collection and...to-many (Mailing and discussion Lists) ... Many-to-Many (Bulletin Boards) Security, Privacy, and Freedom of Speech Issues 69 4.1.3 Understand the...Communication one-to-one (e-mail) °o° one-to-many (Mailing and discussion Lists) ... Many-to-Many (Bulletin Boards) oo Security, Privacy, and Freedom of Speech Issues
Secure Fingerprint Identification of High Accuracy
2014-01-01
secure ) solution of complexity O(n3) based on Gaussian elimination. When it is applied to biometrics X and Y with mX and mY minutiae, respectively...collections of biometric data in use today include, for example, fingerprint, face, and iris images collected by the US Department of Homeland Security ...work we focus on fingerprint data due to popularity and good accuracy of this type of biometry. We formulate the problem of private, or secure , finger
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2014 CFR
2014-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
Implementing programs for chronic illness management: the case of hypertension services.
Christianson, J B; Pietz, L; Taylor, R; Woolley, A; Knutson, D J
1997-11-01
This article describes the process by which HealthSystem Minnesota (a vertically integrated health care organization), functioning in a competitive managed care environment, has been implementing a hypertension services program. The program involves a team approach to care, with emphasis on patient participation in treatment; decentralized care delivery by nurse coordinators at primary care practice sites; ongoing training and education for patients and providers; and the continuous monitoring and evaluation of patient outcomes and satisfaction. JOB-LEVEL ISSUES: A variety of issues, such as the role and responsibilities of the nurse coordinator, became evident as the program moved towards operational status at four primary care practice sites, which prolonged the implementation period. PROCESS-LEVEL ISSUES: Issues relating to work process changes were more complicated to resolve and required, in some cases, changes in the proposed model. The most significant process-level issues related to educating physicians about the program to secure their participation and support. ORGANIZATION-LEVEL ISSUES: Such issues, which were the most difficult for program implementors to anticipate and resolve, included an organizational culture that emphasized decision making autonomy at primary practice sites. In part, the difficulty encountered in resolving organization-level issues reflected the implementors' lack of awareness of the strength or complexity of the environmental pressures facing the organization, as well as a lack of sensitivity to nuances relating to organizational culture. Two groups of hypertensive patients--at the implementation and comparison sites--will be compared with respect to satisfaction with care, clinical outcomes, and costs. Expansion of the model to patients with other chronic conditions is under consideration.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... constitute a substantial portion of collateral if the aggregate principal amount, par value, or book value of...
Code of Federal Regulations, 2010 CFR
2010-04-01
... Electrification Administration. (a) Exemption. Any public utility company which is a subsidiary company of a... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of public utility subsidiaries as to certain securities issued to the Rural Electrification Administration. 250.47 Section 250.47...
ERIC Educational Resources Information Center
Schultz, Christopher
2012-01-01
Empirical research on information security trends and practices in e-learning is scarce. Many articles that have been published apply basic information security concepts to e-learning and list potential threats or propose frameworks for classifying threats. The purpose of this research is to identify, categorize and understand trends and issues in…
Issues of Human Security and Educational Development in the Niger Delta Region of Nigeria
ERIC Educational Resources Information Center
Ololube, Nwachukwu Prince; Kpolovie, Peter James; Amaele, Samuel
2013-01-01
Drawing from documents, observation, interview and questionnaire, we highlighted the role of issues of human security and its impact on the educational development of the Niger Delta region as well as means of enhancing human security in Nigeria. This article is a conceptual and methodological breakthrough in Nigeria's academic landscape where…
Code of Federal Regulations, 2010 CFR
2010-04-01
... to certain employee benefit plans. 230.416 Section 230.416 Commodity and Securities Exchanges... provisions and interests to be issued pursuant to certain employee benefit plans. (a) If a registration... pursuant to an employee benefit plan, including interests in such plan that constitute separate securities...
20 CFR 404.1287 - Exceptions to the time limitations on assessments-for wages paid prior to 1987.
Code of Federal Regulations, 2010 CFR
2010-04-01
... determination; or (iv) The Social Security Administration has not issued to the State a final audit statement on... assessments-for wages paid prior to 1987. 404.1287 Section 404.1287 Employees' Benefits SOCIAL SECURITY... complete; or (iii) The Social Security Administration is developing a coverage or wage issue which was...
20 CFR 404.1287 - Exceptions to the time limitations on assessments-for wages paid prior to 1987.
Code of Federal Regulations, 2011 CFR
2011-04-01
... determination; or (iv) The Social Security Administration has not issued to the State a final audit statement on... assessments-for wages paid prior to 1987. 404.1287 Section 404.1287 Employees' Benefits SOCIAL SECURITY... complete; or (iii) The Social Security Administration is developing a coverage or wage issue which was...
Making Our Buildings Safer: Security Management and Equipment Issues.
ERIC Educational Resources Information Center
Clark, James H.
1997-01-01
Discusses three major components of library security: physical security of the environment; operating procedures for library staff, the public, and security personnel; and a contract security force (or campus security in academic institutions.) Topics include risk management; maintenance; appropriate technology, including security systems and…
2016-07-13
adequate security testing , and segment their networks and systems into separate defended enclaves. Finally, cyber defenders should posi- tion themselves...explicitly tied to following security practices, and there should be consequences for security failures that are regularly tested via a continuing testing ...program. Users should be routinely tested and probed, and those who do not perform well should face escalating consequences. For example, cyber
National Security and Global Climate Change
2008-01-01
The uncertainty, confusion, and speculation about the causes, effects, and implications of global climate change (GCC) often paralyze serious...against scientific indications of global climate change , but to consider how it would pose challenges to national security, explore options for facing...generals and admirals, released a report concluding that projected climate change poses a serious threat to America’s national security. This article
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network.
Li, Shancang; Tryfonas, Theo; Russell, Gordon; Andriotis, Panagiotis
2016-08-01
Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate systems with devastating impact. When assessing the overall security of a mobile system, it is important to assess the security risks posed by each mobile applications (apps), thus gaining a stronger understanding of any vulnerabilities present. This paper aims at developing a three-layer framework that assesses the potential risks which apps introduce within the Android mobile systems. A Bayesian risk graphical model is proposed to evaluate risk propagation in a layered risk architecture. By integrating static analysis, dynamic analysis, and behavior analysis in a hierarchical framework, the risks and their propagation through each layer are well modeled by the Bayesian risk graph, which can quantitatively analyze risks faced to both apps and mobile systems. The proposed hierarchical Bayesian risk graph model offers a novel way to investigate the security risks in mobile environment and enables users and administrators to evaluate the potential risks. This strategy allows to strengthen both app security as well as the security of the entire system.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-02
... Collection Surrounding the Sale and Issue of Marketable Book-Entry Securities ACTION: Notice and request for... Department of the Treasury is soliciting comments concerning the Sale and Issue of Marketable Book-Entry... Marketable Book-Entry Securities. OMB Number: 1535-0112. Abstract: The information is requested to ensure...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...
2015-05-21
bandwagon , that is, ally with the state that poses the major threat in order to protect their own security. If balancing, then states are more secure...because aggressors face combined opposition. If bandwagoning , then security is scarce because aggression is rewarded.4 Balance of power theorists...Transformed: Complexity Theory and European Security (Lanham, MD: Rowman and Littlefield Publishers, 2001), 6. 10 establish an effective Baltic
Fires. A Joint Publication for U.S. Artillery Professionals. September - October 2011
2011-01-01
the LOCs was a constant challenge facing the Soviet forces in Afghanistan. Security of the LOCs determined the amount of forces which the Soviet...Afghan terrain was not ideal for a mechanized force dependent on fire power, secure LOCs and high-technology. Although the popular image of a...and secure LOCs are essential for the both the guerrilla and non-guerrilla force. Security missions, however, can tie up most of a conventional
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-18
... as ``remaining principal balance'' or ``RPB'') to (2) the original face value of the ABS. Such... to report the original face value of the security; in (B)(ii), for a transaction in an amortizing ABS, other than a TBA transaction, a member would be required to report the original face value of the...
Water security and its challenges for Malaysia
NASA Astrophysics Data System (ADS)
Malek, M. A.; Nor, M. A. M.; P, Leong Y.
2013-06-01
Water Security in Malaysia is a national issue. The Malaysian water services industry faces issues which need to be tackled immediately for it to be viable and sustainable. Among them are the decentralized water services sector, ineffective governance structure, unsustainable tariffs, huge investments required to develop the water supply and sewerage infrastructure, inefficient operation by the operators and high non-revenue water (NRW) losses. In Malaysia, the "Sectorial" approach embedded in the present water management system and its transformation towards "Integrated Water Resources Management" (IWRM), is still in a state of inertia. This paper presents the need to transform, from a "Supply" Management mode (a characteristic of a developing country) to a "Water Demand" Management mode (a characteristic of a developed country). Issues on "Water Demand" Management for the Environment which can be a threat to the need for sustainable development for biodiversity are highlighted here. Reliable water accounting systems are found still lacking in this country, especially in the Agriculture and Environmental Sectors, where figures are still highly based on "traditional" assumptions. Water Quality deterioration remains an issue especially for the Water Supply and Environment Sectors. Available surface water resource is depleting in many regions and states in the Peninsular. Apart from the Reduce, Reuse and Recycle (3R) option for surface water, another option would be to begin a concerted effort for groundwater exploitation. However there are still grey areas of knowledge in the groundwater resources in this country for affirmative decisions and development of appropriate policies. It is also found that, there are no concerted plans to prepare the public for the change from "Supply" Management to "Demand" Management. In a developed nation, this change is through stakeholder platforms and supported by appropriate policies, rules and regulations that are based on validated Sciences, Technologies and Innovations (STI). Transforming from "Supply" Management to "Demand" Management is a formidable task. This requires the wisdom and knowledge of all experts in the Water Resources Sector.
Let's talk conflict: using mediation in healthcare security disputes.
Armstrong, Brad
2013-01-01
Healthcare security administrators face weekly, if not daily challenges and conflict. This article considers that security leaders must anticipate disputes in highly complex healthcare systems. When disputes cannot be resolved by organizational efforts, security administrators may be in a position to recommend or participate in mediation. Here the concept of mediation is introduced to healthcare security leaders as a viable means to resolve disputes with patients, visitors, and the community. This includes a description of the facilitative versus evaluative mediation processes, as well as pragmatic guidance when preparing for mediation.
2009-01-01
The United States needs a new model of “globalized” national security for this changing world: we must realign longstanding policies away from go...at the center of our approach to ensuring our future security. … Now, when we most need to re-examine our Transatlantic security model, this new two...address the globalized threats we face, our gov- ernment is already reorienting the capabilities of our national security forces to a new bal- ance
NASA Technical Reports Server (NTRS)
Goseva-Popstojanova, Katerina; Tyo, Jacob
2017-01-01
While some prior research work exists on characteristics of software faults (i.e., bugs) and failures, very little work has been published on analysis of software applications vulnerabilities. This paper aims to contribute towards filling that gap by presenting an empirical investigation of application vulnerabilities. The results are based on data extracted from issue tracking systems of two NASA missions. These data were organized in three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified security related software bugs and classified them in specific vulnerability classes. Then, we created the security vulnerability profiles, i.e., determined where and when the security vulnerabilities were introduced and what were the dominating vulnerabilities classes. Our main findings include: (1) In IVV issues datasets the majority of vulnerabilities were code related and were introduced in the Implementation phase. (2) For all datasets, around 90 of the vulnerabilities were located in two to four subsystems. (3) Out of 21 primary classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, they contributed from 80 to 90 of vulnerabilities in each dataset.
National Security Policy and Security Challenges of Maldives
2014-06-13
creates the true problems the Maldivians are currently facing. Hidden agendas, unprofessionalism, and low ethical standards of politicians and...based on sharia law. The theories of cultural relativism and democracy strongly advocate the freedoms of societies, thus the Maldivian decision as a
76 FR 69301 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-08
... management companies (``mutual funds''), unit investment trusts (``UITs'') or face-amount certificate companies (collectively, ``funds'') deemed to have registered an indefinite amount of securities to file... sold by funds that accompanies the payment of registration fees with respect to the securities sold...
Bangladesh Midlife Women's Health Study (BMWHS): methods, challenges and experiences.
Islam, Rakibul M; Bell, Robin J; Hossain, Mohammad B; Davis, Susan R
2015-01-01
To understand the challenges and experiences encountered during data collection for Bangladesh Midlife Women's Health Study (BMWHS) that investigated the low uptake of cervical cancer (CCa) screening barriers, understanding of breast cancer (BCa) knowledge and practices, the prevalence of urinary and fecal incontinence and menopausal symptoms. A multistage cluster sampling technique was used to recruit women from the 32 districts of Bangladesh that had offered CCa screening. Female interviewers were trained to undertake structured face-to-face interviews that incorporated both non-validated and several validated questionnaires, such as Question for Urinary Incontinence Diagnosis, Pelvic Organ Prolapse Distress Inventory, Colorectal-Anal Distress Inventory and Menopause-Specific Quality of Life. We completed surveys of 1590 women, estimated age 30-59 years, between September 2013 and March 2014. We implemented several strategies to deal with low literacy and used the temporal relationship between marriage and childbirth, and the average age of onset of menarche, to estimate age. Cultural and religious sensitivities and personal security were managed by engaging community leaders, limiting activities to daylight hours, adopting local codes of dress, such as the wearing of head scarves. Our major challenges and experiences included difficulties in age determination, selection of and access to households, interview privacy, lack of basic and health literacy, transportation, political unrest and security of the interviewers. By anticipating challenges, we have been able to comprehensively survey a representative sample of Bangladeshi women. Disseminating information about the field challenges and experiences from the BMWHS should assist other researchers planning to conduct surveys about women's health issues in similar context. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
The changing face of crises and aid in the Asia-Pacific.
Gursky, Elin A; Burkle, Frederick M; Hamon, David W; Walker, Peter; Benjamin, Georges C
2014-01-01
Both US foreign policy and global attention attest to the strategic, economic, and political importance of Asia. Yet, the region faces urgent challenges that must be addressed if it is to remain stable and prosperous. The densely populated countries of the Asia-Pacific are beleaguered by poverty, population displacement, decreasing access to potable water and adequate sanitation, and high rates of disease morbidity and mortality. New and reemerging diseases known to have originated in Asia over the past decades have spread globally by international trade, tourism, worker migration, and agricultural exportation. Unremitting naturally occurring and man-made disasters have strained Southeast Asia's already fragile disaster and public health response infrastructures and the essential services they provide (eg, surveillance, vaccination, maternal and child health, and mental health programs). Following disasters, governments often contract with the broader humanitarian community (eg, indigenous and international NGOs) and seek the assistance of militaries to provide essential services. Yet, their roles and capabilities in addressing acute and chronic health issues in the wake of complex disasters remain unclear. Current mechanisms of nation-state and outside organization interaction, including dissimilar operational platforms, may limit true partnership on behalf of the health security mission. Additionally, concerns regarding skill sets and the lack of standards-based training raise questions about the balance between developing internal response capabilities and professionalizing external, deployable resources. Both the mega-disasters that are forecast for the region and the global health security threats that are expected to emanate from them require an increased focus on improving the Asia-Pacific's emergency preparedness and response posture.
The Changing Face of Crises and Aid in the Asia-Pacific
Burkle, Frederick M.; Hamon, David W.; Walker, Peter; Benjamin, Georges C.
2014-01-01
Both US foreign policy and global attention attest to the strategic, economic, and political importance of Asia. Yet, the region faces urgent challenges that must be addressed if it is to remain stable and prosperous. The densely populated countries of the Asia-Pacific are beleaguered by poverty, population displacement, decreasing access to potable water and adequate sanitation, and high rates of disease morbidity and mortality. New and reemerging diseases known to have originated in Asia over the past decades have spread globally by international trade, tourism, worker migration, and agricultural exportation. Unremitting naturally occurring and man-made disasters have strained Southeast Asia's already fragile disaster and public health response infrastructures and the essential services they provide (eg, surveillance, vaccination, maternal and child health, and mental health programs). Following disasters, governments often contract with the broader humanitarian community (eg, indigenous and international NGOs) and seek the assistance of militaries to provide essential services. Yet, their roles and capabilities in addressing acute and chronic health issues in the wake of complex disasters remain unclear. Current mechanisms of nation-state and outside organization interaction, including dissimilar operational platforms, may limit true partnership on behalf of the health security mission. Additionally, concerns regarding skill sets and the lack of standards-based training raise questions about the balance between developing internal response capabilities and professionalizing external, deployable resources. Both the mega-disasters that are forecast for the region and the global health security threats that are expected to emanate from them require an increased focus on improving the Asia-Pacific's emergency preparedness and response posture. PMID:25268048
Security Encryption Scheme for Communication of Web Based Control Systems
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
Choices in International Conflict: With a Focus on Security Issues in Asia.
ERIC Educational Resources Information Center
Francis, Gregory; Mukai, Gary; Kim, Pearl; Leininger, James
Many world leaders and scholars feel that the U.S.-Japan Security Alliance is essential for long-term peace, prosperity, and stability in Asia. The purpose of this curriculum unit is to examine this alliance by introducing students to case studies of international conflict, with a focus on security issues in Asia. Through each of the lessons…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-18
... Policy, Department of Homeland Security, Washington, DC 20528. For privacy issues please contact: Mary...;Prices of new books are listed in the first FEDERAL REGISTER issue of each #0;week. #0; #0; #0; #0;#0...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--027 The History of...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...
Policy issues facing the Comprehensive Test Ban Treaty and prospects for the future
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sweeney, J.
1999-04-01
This report is divided into the following 5 sections: (1) Background; (2) Major Issues Facing Ratification of CTBT; (3) Current Status on CTBT Ratification; (4) Status of CTBT Signatories and Ratifiers; and (5) CTBT Activities Not Prohibited. The major issues facing ratification of CTBT discussed here are: impact on CTBT of START II and ABM ratification; impact of India and Pakistan nuclear tests; CTBT entry into force; and establishment of the Comprehensive Nuclear Test-Ban Treaty Organization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lawton, Craig R.; Welch, Kimberly M.; Kerper, Jessica
2010-06-01
The Department of Defense's (DoD) Energy Posture identified dependence of the US Military on fossil fuel energy as a key issue facing the military. Inefficient energy consumption leads to increased costs, effects operational performance and warfighter protection through large and vulnerable logistics support infrastructures. Military's use of energy is a critical national security problem. DoD's proposed metrics Fully Burdened Cost of Fuel and Energy Efficiency Key Performance Parameter (FBCF and Energy KPP) are a positive step to force energy use accountability onto Military programs. The ability to measure impacts of sustainment are required to fully measure Energy KPP. Sandia's workmore » with Army demonstrates the capability to measure performance which includes energy constraint.« less
ARPA-E: Accelerating U.S. Energy Innovation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Manser, Joseph S.; Rollin, Joseph A.; Brown, Kristen E.
ARPA-E is charged with addressing the most pressing issues facing the U.S. energy sector today, as well as those projected to impact national energy security in the future. The agency’s mission is clearly elucidated in its authorizing statute:2 “To overcome long-term and high-risk technological barriers in the development of energy technologies.” The three principal thrusts of the agency’s mission are (i) reducing energy imports, (ii) reducing energy-related emissions and greenhouse gases, and (iii) improving energy efficiency in all sectors of the U.S. economy. Meeting these ambitious challenges requires focused, interdisciplinary effort on a national scale that will help ensure themore » United States maintains a competitive lead in developing and deploying advanced energy technologies.« less
Critical Social Theory: Core Tenets, Inherent Issues
ERIC Educational Resources Information Center
Freeman, Melissa; Vasconcelos, Erika Franca S.
2010-01-01
This chapter outlines the core tenets of critical social theory and describes inherent issues facing evaluators conducting critical theory evaluation. Using critical pedagogy as an example, the authors describe the issues facing evaluators by developing four of the subtheories that comprise a critical social theory: (a) a theory of false…
Strategic Challenges during Changing Times: A Prioritized Research Program, 1994
1994-04-01
and planning. 14, SUBJECT T[RMS 15 NUMBER OF PAGES strategic assessments; domestic and global issues and 5 trends; peace operations; political...1994 or which, for a variety of reasons, will riot be published. 3 SECTION I TRANSREGIONAL SECURITY CONCERNS Regional Challenges, Global Issues . When...but global issues . Global security issues derive from three forms of connectivity. The first is economic. Today, there is truly a world economy. Markets
Facial detection using deep learning
NASA Astrophysics Data System (ADS)
Sharma, Manik; Anuradha, J.; Manne, H. K.; Kashyap, G. S. C.
2017-11-01
In the recent past, we have observed that Facebook has developed an uncanny ability to recognize people in photographs. Previously, we had to tag people in photos by clicking on them and typing their name. Now as soon as we upload a photo, Facebook tags everyone on its own. Facebook can recognize faces with 98% accuracy which is pretty much as good as humans can do. This technology is called Face Detection. Face detection is a popular topic in biometrics. We have surveillance cameras in public places for video capture as well as security purposes. The main advantages of this algorithm over other are uniqueness and approval. We need speed and accuracy to identify. But face detection is really a series of several related problems: First, look at a picture and find all the faces in it. Second, focus on each face and understand that even if a face is turned in a weird direction or in bad lighting, it is still the same person. Third select features which can be used to identify each face uniquely like size of the eyes, face etc. Finally, compare these features to data we have to find the person name. As a human, your brain is wired to do all of this automatically and instantly. In fact, humans are too good at recognizing faces. Computers are not capable of this kind of high-level generalization, so we must teach them how to do each step in this process separately. The growth of face detection is largely driven by growing applications such as credit card verification, surveillance video images, authentication for banking and security system access.
Comparison of commercial and noncommercial endotracheal tube-securing devices.
Fisher, Daniel F; Chenelle, Christopher T; Marchese, Andrew D; Kratohvil, Joseph P; Kacmarek, Robert M
2014-09-01
Tracheal intubation is used to establish a secure airway in patients who require mechanical ventilation. Unexpected extubation can have serious complications, including airway trauma and death. Various methods and devices have been developed to maintain endotracheal tube (ETT) security. Associated complications include pressure ulcers due to decreased tissue perfusion. Device consideration includes ease of use, rapid application, and low exerted pressure around the airway. Sixteen ETT holders were evaluated under a series of simulated clinical conditions. ETT security was tested by measuring distance displaced after a tug. Nine of the 16 methods could be evaluated for speed of moving the ETT to the opposite side of the mouth. Sensors located on a mannequin measured applied forces when the head was rotated vertically or horizontally. Data were analyzed using multivariate analysis of variance, with P < .05. Median displacement of the ETT by the tug test was 0 cm (interquartile range of 0.0-0.10 cm, P < .001). The mean time to move the ETT from one side of the mouth to the other ranged from 1.25 ± 0.2 s to 34.4 ± 3.4 s (P < .001). Forces applied to the face with a vertical head lift ranged from < 0.2 newtons (N) to a maximum of 3.52 N (P < .001). Forces applied to the face with a horizontal rotation ranged from < 0.2 N to 3.52 N (P < .001). Commercial devices produced greater force than noncommercial devices. Noncommercial airway holders exert less force on a patient's face than commercial devices. Airway stability is affected by the type of securing method. Many commercial holders allow for rapid but secure movement of the artificial airway from one side of the mouth to the other. Copyright © 2014 by Daedalus Enterprises.
Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference
... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...
Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna
2017-04-10
This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.
ERIC Educational Resources Information Center
Education Law Association, Dayton, OH.
This booklet contains five chapters relating to issues in school safety and security, and fair dismissals: (1) "Ohio Legislation and Federal and State Decisions" (Richard J. Dickinson). Items of deliberation include financial matters, school safety issues, administrator and teacher contract matters, Title IX liability, school prayer, drug testing…
NASA Astrophysics Data System (ADS)
Straub, Jeremy
2017-06-01
A wide variety of characteristics of 3D printed objects have been linked to impaired structural integrity and use-efficacy. The printing material can also have a significant impact on the quality, utility and safety characteristics of a 3D printed object. Material issues can be created by vendor issues, physical security issues and human error. This paper presents and evaluates a system that can be used to detect incorrect material use in a 3D printer, using visible light imaging. Specifically, it assesses the ability to ascertain the difference between materials of different color and different types of material with similar coloration.
ERIC Educational Resources Information Center
Crichton, Hazel; Templeton, Brian; Valdera, Francisco
2017-01-01
Anxiety about "performing" in a foreign language in front of classmates may inhibit learners' contributions in the modern languages class through fear of embarrassment over possible error production. The issue of "face", perceived social standing in the eyes of others, presents a sensitive matter for young adolescents…
Critical Problems Facing Technology Education: Perceptions of Indiana Teachers
ERIC Educational Resources Information Center
Lazaros, Edward J.; Rogers, George E.
2006-01-01
In 1993 Wicklein conducted a study to determine the present and the future critical issues and problems facing the technology education (TE) profession. The Wicklein study questioned 25 panelists from 15 states and the District of Columbia to ascertain the issues and problems facing TE. However, in the Wicklein study, only seven of the panelists…
Kungl, Melanie T; Bovenschen, Ina; Spangler, Gottfried
2017-01-01
When being placed into more benign environments like foster care, children from adverse rearing backgrounds are capable of forming attachment relationships to new caregivers within the first year of placement, while certain problematic social behaviors appear to be more persistent. Assuming that early averse experiences shape neural circuits underlying social behavior, neurophysiological studies on individual differences in early social-information processing have great informative value. More precisely, ERP studies have repeatedly shown face processing to be sensitive to experience especially regarding the caregiving background. However, studies on effects of early adverse caregiving experiences are restricted to children with a history of institutionalization. Also, no study has investigated effects of attachment security as a marker of the quality of the caregiver-child relationship. Thus, the current study asks how adverse caregiving experiences and attachment security to (new) caregivers affect early- and mid-latency ERPs sensitive to facial familiarity processing. Therefore, pre-school aged foster children during their second year within the foster home were compared to an age matched control group. Attachment was assessed using the AQS and neurophysiological data was collected during a passive viewing task presenting (foster) mother and stranger faces. Foster children were comparable to the control group with regard to attachment security. On a neurophysiological level, however, the foster group showed dampened N170 amplitudes for both face types. In both foster and control children, dampened N170 amplitudes were also found for stranger as compared to (foster) mother faces, and, for insecurely attached children as compared to securely attached children. This neural pattern may be viewed as a result of poorer social interactions earlier in life. Still, there was no effect on P1 amplitudes. Indicating heightened attentional processing, Nc amplitude responses to stranger faces were found to be enhanced in foster as compared to control children. Also, insecurely attached children allocated more attentional resources for the neural processing of mother faces. The study further confirms that early brain development is highly sensitive to the quality of caregiving. The findings are also relevant from a developmental perspective as miswiring of neural circuits may possibly play a critical role in children's psycho-social adjustment.
Protecting food security when facing uncertain climate: Opportunities for Afghan communities
NASA Astrophysics Data System (ADS)
Salman, Dina; Amer, Saud A.; Ward, Frank A.
2017-11-01
Climate change, population growth, and weakly developed water management institutions in many of the world's dry communities have raised the importance of designing innovative water allocation methods that adapt to water supply fluctuations while respecting cultural sensitivities. For example, Afghanistan faces an ancient history of water supply fluctuations that have contributed to periodic food shortage and famine. Poorly designed and weakly enforced water allocation methods continue to result in agriculture sector underperformance and periodic food shortages when water shortfalls occur. To date, little research has examined alternative water sharing rules on a multi-basin scale to protect food security for a subsistence irrigation society when the community faces water shortage. This paper's contribution examines the economic performance of three water-sharing mechanisms for three basins in Afghanistan with the goal of protecting food security for crop irrigation under ongoing threats of drought, while meeting growing demands for food in the face of anticipated population growth. We achieved this by formulating an integrated empirical optimization model to identify water-sharing measures that minimize economic losses while protecting food security when water shortages occur. Findings show that implementation of either a water trading policy or a proportional shortage policy that respects cultural sensitivities has the potential to raise economic welfare in each basin. Such a policy can reduce food insecurity risks for all trading provinces within each basin, thus being a productive institution for adapting to water shortage when it occurs. Total economic welfare gains are highest when drought is the most severe for which suffering would otherwise be greatest. Gains would be considerably higher if water storage reservoirs were built to store wet year flows for use in dry years. Our results light a path for policy makers, donors, water administrators, and farm managers, who shoulder the burden of protecting food security and rural livelihoods in the world's poor dry communities.
Medical image security in a HIPAA mandated PACS environment.
Cao, F; Huang, H K; Zhou, X Q
2003-01-01
Medical image security is an important issue when digital images and their pertinent patient information are transmitted across public networks. Mandates for ensuring health data security have been issued by the federal government such as Health Insurance Portability and Accountability Act (HIPAA), where healthcare institutions are obliged to take appropriate measures to ensure that patient information is only provided to people who have a professional need. Guidelines, such as digital imaging and communication in medicine (DICOM) standards that deal with security issues, continue to be published by organizing bodies in healthcare. However, there are many differences in implementation especially for an integrated system like picture archiving and communication system (PACS), and the infrastructure to deploy these security standards is often lacking. Over the past 6 years, members in the Image Processing and Informatics Laboratory, Childrens Hospital, Los Angeles/University of Southern California, have actively researched image security issues related to PACS and teleradiology. The paper summarizes our previous work and presents an approach to further research on the digital envelope (DE) concept that provides image integrity and security assurance in addition to conventional network security protection. The DE, including the digital signature (DS) of the image as well as encrypted patient information from the DICOM image header, can be embedded in the background area of the image as an invisible permanent watermark. The paper outlines the systematic development, evaluation and deployment of the DE method in a PACS environment. We have also proposed a dedicated PACS security server that will act as an image authority to check and certify the image origin and integrity upon request by a user, and meanwhile act also as a secure DICOM gateway to the outside connections and a PACS operation monitor for HIPAA supporting information. Copyright 2002 Elsevier Science Ltd.
Overview of Climate Confluence Security Issues
NASA Astrophysics Data System (ADS)
Reisman, J. P.
2011-12-01
Presentation will focus on an overview of the security perspectives based on the confluence considerations including energy, economics and climate change. This will include perspectives from reports generated by the Quadrennial Defense Review, Joint Forces Command, the Center for Strategic International Studies, MIT, the Inter-agency Climate Change Adaptation Task Force, the Central Intelligence Agency, the Center for Naval Analysis, and other relevant reports. The presentation will highlight the connections between resource issues and climate change which can be interpreted into security concerns. General discussion of global issues, contextual review of AR4 WGII may be included and any other report updates as applicable. The purpose of this presentation is to give a rounded view of the general qualitative and quantitative perspectives regarding climate related security considerations.
On the Brink: Instability and the Prospect of State Failure in Pakistan
2010-04-12
unpredictable posture. Most importantly, these historical events, coupled with current political , economic, and security related issues, have created a...current political , economic, and security related issues, have created a fragile state with the propensity to fail. Therefore, this monograph highlights...hardships that have affected the state’s political stability, economic performance, and security. These unrelenting problems lie at the foundation
Is the biggest security threat to medical information simply a lack of understanding?
Williams, Patricia A H
2011-01-01
Connecting Australian health services and the e-health initiative is a major focus in the current health environment. Many issues are presented as key to its success including solving issues with confidentiality and privacy. However, the main problem may not be these issues in sharing information but the fact that the point of origin of such records is still relatively insecure. This paper highlights why this may be the case. Research into the security of medical information has shown that many primary healthcare providers are unable to create an environment with effective information security. Numerous factors contribute to this complex situation including a trustful environment, the resultant security culture and the capability of individual healthcare organisations. Further, the growing importance of new directions in the use of patient information is considered. This paper discusses these issues and positions them within the complex environment that is healthcare. In our current health system infrastructure, the points of origin of patient information are our most vulnerable. This entwined with progressively new uses of this information expose additional security concerns, such as re-identification of information, that require attention.
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Contingency Measures § 1542.303 Security Directives and Information Circulars. (a) TSA may issue an... Security Directive by submitting data, views, or arguments in writing to TSA. TSA may amend the Security...
Whither the RMA: Two Perspectives on Tomorrow’s Army
1994-07-22
HENRI (ROY) ALCALA heads a consulting firm, Alcala Enterprises, which specializes in national security and foreign policy issues . He retired from the...thinking about national security was too constrained by immediate issues . Downsizing of force structure, budget reductions, Bosnia, and other issues were all...these immediate issues as signposts of the future, even though little evidence existed to support such aI :use. From many years of experience in long
NASA Technical Reports Server (NTRS)
Chow, Edward T.; Stewart, Helen; Korsmeyer, David (Technical Monitor)
2003-01-01
The biggest users of GRID technologies came from the science and technology communities. These consist of government, industry and academia (national and international). The NASA GRID is moving into a higher technology readiness level (TRL) today; and as a joint effort among these leaders within government, academia, and industry, the NASA GRID plans to extend availability to enable scientists and engineers across these geographical boundaries collaborate to solve important problems facing the world in the 21 st century. In order to enable NASA programs and missions to use IPG resources for program and mission design, the IPG capabilities needs to be accessible from inside the NASA center networks. However, because different NASA centers maintain different security domains, the GRID penetration across different firewalls is a concern for center security people. This is the reason why some IPG resources are been separated from the NASA center network. Also, because of the center network security and ITAR concerns, the NASA IPG resource owner may not have full control over who can access remotely from outside the NASA center. In order to obtain organizational approval for secured remote access, the IPG infrastructure needs to be adapted to work with the NASA business process. Improvements need to be made before the IPG can be used for NASA program and mission development. The Secured Advanced Federated Environment (SAFE) technology is designed to provide federated security across NASA center and NASA partner's security domains. Instead of one giant center firewall which can be difficult to modify for different GRID applications, the SAFE "micro security domain" provide large number of professionally managed "micro firewalls" that can allow NASA centers to accept remote IPG access without the worry of damaging other center resources. The SAFE policy-driven capability-based federated security mechanism can enable joint organizational and resource owner approved remote access from outside of NASA centers. A SAFE enabled IPG can enable IPG capabilities to be available to NASA mission design teams across different NASA center and partner company firewalls. This paper will first discuss some of the potential security issues for IPG to work across NASA center firewalls. We will then present the SAFE federated security model. Finally we will present the concept of the architecture of a SAFE enabled IPG and how it can benefit NASA mission development.
State of Science: ergonomics and global issues.
Thatcher, Andrew; Waterson, Patrick; Todd, Andrew; Moray, Neville
2018-02-01
In his 1993 IEA keynote address, Neville Moray urged the ergonomics discipline to face up to the global problems facing humanity and consider how ergonomics might help find some of the solutions. In this State of Science article we critically evaluate what the ergonomics discipline has achieved in the last two and a half decades to help create a secure future for humanity. Moray's challenges for ergonomics included deriving a value structure that moves us beyond a Westernised view of worker-organisation-technology fit, taking a multidisciplinary approach which engages with other social and biological sciences, considering the gross cross-cultural factors that determine how different societies function, paying more attention to mindful consumption, and embracing the complexity of our interconnected world. This article takes a socio-historical approach by considering the factors that influence what has been achieved since Moray's keynote address. We conclude with our own set of predictions for the future and priorities for addressing the challenges that we are likely to face. Practitioner Summary: We critically reflect on what has been achieved by the ergonomics profession in addressing the global challenges raised by Moray's 1993 keynote address to the International Ergonomics Association. Apart from healthcare, the response has largely been weak and disorganised. We make suggestions for priority research and practice that is required to facilitate a sustainable future for humanity.
Legal issues of the electronic dental record: security and confidentiality.
Szekely, D G; Milam, S; Khademi, J A
1996-01-01
Computer-based, electronic dental record keeping involves complex issues of patient privacy and the dental practitioner's ethical duty of confidentiality. Federal and state law is responding to the new legal issues presented by computer technology. Authenticating the electronic record in terms of ensuring its reliability and accuracy is essential in order to protect its admissibility as evidence in legal actions. Security systems must be carefully planned to limit access and provide for back-up and storage of dental records. Carefully planned security systems protect the patient from disclosure without the patient's consent and also protect the practitioner from the liability that would arise from such disclosure. Human errors account for the majority of data security problems. Personnel security is assured through pre-employment screening, employment contracts, policies, and staff education. Contracts for health information systems should include provisions for indemnification and ensure the confidentiality of the system by the vendor.
Recreating America's Community Colleges: Critical Policy Issues Facing America's Community Colleges
ERIC Educational Resources Information Center
Honeyman, David S.; Sullivan, Michael D.
2006-01-01
During the conduct of the 2004 Community Colleges Futures Assembly, sponsored by the University of Florida, delegates to the meeting identified three critical policy issues facing America's community colleges and challenged the delegates attending the 2005 Assembly to debate these issues and make recommendations. A total of 252 higher-education…
Critical Issues Children Face in the 2000s
ERIC Educational Resources Information Center
Crockett, Deborah
2003-01-01
Children will face many critical issues in the 21st century. Unfortunately, most of these issues are not new and have remained the same from previous years. Millions of children lack safe, affordable, quality child care and early childhood education while their parents work. Seven and one-half million children are at home alone without…
ERIC Educational Resources Information Center
Bossér, Ulrika; Lundin, Mattias; Lindahl, Mats; Linder, Cedric
2015-01-01
Teachers may face considerable challenges when implementing socio-scientific issues (SSI) in their classroom practices, such as incorporating student-centred teaching practices and exploring knowledge and values in the context of socioscientific issues. This year-long study explores teachers' reflections on the process of developing their…
A security/safety survey of long term care facilities.
Acorn, Jonathan R
2010-01-01
What are the major security/safety problems of long term care facilities? What steps are being taken by some facilities to mitigate such problems? Answers to these questions can be found in a survey of IAHSS members involved in long term care security conducted for the IAHSS Long Term Care Security Task Force. The survey, the author points out, focuses primarily on long term care facilities operated by hospitals and health systems. However, he believes, it does accurately reflect the security problems most long term facilities face, and presents valuable information on security systems and practices which should be also considered by independent and chain operated facilities.
Glogowska, Margaret; Young, Pat; Lockyer, Lesley; Moule, Pam
2011-11-01
This paper explores students' perceptions of blended learning modules delivered in a Continuing Professional Development (CPD) health care context in the UK. 'Blended learning' is the term used to describe a hybrid model of learning where traditional face-to-face teaching approaches and newer electronic learning activities and resources are utilised together. A new model of CPD for health care practitioners based on a blended learning approach was developed at a university in the south west of England. As part of the evaluation of the new modules, a qualitative study was conducted, in which 17 students who had experienced the modules were interviewed by telephone. Three main themes emerged from the interviews relating to the 'blended' nature of the blended learning modules. These were i) issues around the opportunities for discussion of online materials face-to-face; ii) issues of what material should be online versus face-to-face and iii) balancing online and face-to-face components. Teaching staff engaged in the development of blended learning courses need to pay particular attention to the ways in which they develop and integrate online and face-to-face materials. More attention needs to be paid to allowing opportunity for students to come together to create a 'community of inquiry'. Copyright © 2011 Elsevier Ltd. All rights reserved.
76 FR 54819 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-02
... (``mutual funds''), unit investment trusts (``UITs'') or face-amount certificate companies (collectively, ``funds'') deemed to have registered an indefinite amount of securities to file, not later than 90 days... 274.24) with the Commission. Form 24F-2 is the annual notice of securities sold by funds that...
Report of the DHS Small Vessel Security Institute
2007-10-19
sector interests are integral parts of the nation’s strategy of “layered security” in the face of hostile intent. Since the earliest days of the ...and secure as possible while simultaneously protecting our citizen’s enjoyment of their maritime heritage. Today, the Department of Homeland Security...of the discussions (in a neutral, non- attribution format) to serve as the starting point of an ongoing, unprecedented partnership by DHS and the
Fingerprinting Reverse Proxies Using Timing Analysis of TCP Flows
2013-09-01
bayes classifier,” in Cloud Computing Security , ser. CCSW ’09. New York City, NY: ACM, 2009, pp. 31–42. [30] J. Zhang, R. Perdisci, W. Lee, U. Sarfraz...FSM Finite State Machine HTML Hypertext Markup Language HTTP Hypertext Transfer Protocol HTTPS Hypertext Transfer Protocol Secure ICMP Internet Control...This hidden traffic concept supports network access control, security protection through obfuscation, and performance boosts at the Internet facing
Computer Network Security- The Challenges of Securing a Computer Network
NASA Technical Reports Server (NTRS)
Scotti, Vincent, Jr.
2011-01-01
This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.
ERIC Educational Resources Information Center
Achinewhu-Nworgu, Elizabeth; Azaiki, Steve; Nworgu, Queen Chioma
2016-01-01
This paper aims to present the role, values, and legal policy issues facing public Library resources in supporting students to achieve academic success. Research indicates that majority of people that own or work in the Library tend to ignore some of the vital roles, values and legal policy issues paramount to libraries. Some of these issues are…
The Answer Van in Rural New Jersey
ERIC Educational Resources Information Center
Milich, Patricia S.
1978-01-01
Description of a mobile information center that provides public information on local events, municipal ordinances, employment, taxes, social security, planned parenthood, welfare, adoption laws, and other topics. The project has been deemed successful because it offers the public an opportunity to communicate face to face in a nonthreatening…
Economic performance of water storage capacity expansion for food security
NASA Astrophysics Data System (ADS)
Gohar, Abdelaziz A.; Ward, Frank A.; Amer, Saud A.
2013-03-01
SummaryContinued climate variability, population growth, and rising food prices present ongoing challenges for achieving food and water security in poor countries that lack adequate water infrastructure. Undeveloped storage infrastructure presents a special challenge in northern Afghanistan, where food security is undermined by highly variable water supplies, inefficient water allocation rules, and a damaged irrigation system due three decades of war and conflict. Little peer-reviewed research to date has analyzed the economic benefits of water storage capacity expansions as a mechanism to sustain food security over long periods of variable climate and growing food demands needed to feed growing populations. This paper develops and applies an integrated water resources management framework that analyzes impacts of storage capacity expansions for sustaining farm income and food security in the face of highly fluctuating water supplies. Findings illustrate that in Afghanistan's Balkh Basin, total farm income and food security from crop irrigation increase, but at a declining rate as water storage capacity increases from zero to an amount equal to six times the basin's long term water supply. Total farm income increases by 21%, 41%, and 42% for small, medium, and large reservoir capacity, respectively, compared to the existing irrigation system unassisted by reservoir storage capacity. Results provide a framework to target water infrastructure investments that improve food security for river basins in the world's dry regions with low existing storage capacity that face ongoing climate variability and increased demands for food security for growing populations.
Performance and Challenges of Service-Oriented Architecture for Wireless Sensor Networks.
Alshinina, Remah; Elleithy, Khaled
2017-03-08
Wireless Sensor Networks (WSNs) have become essential components for a variety of environmental, surveillance, military, traffic control, and healthcare applications. These applications face critical challenges such as communication, security, power consumption, data aggregation, heterogeneities of sensor hardware, and Quality of Service (QoS) issues. Service-Oriented Architecture (SOA) is a software architecture that can be integrated with WSN applications to address those challenges. The SOA middleware bridges the gap between the high-level requirements of different applications and the hardware constraints of WSNs. This survey explores state-of-the-art approaches based on SOA and Service-Oriented Middleware (SOM) architecture that provide solutions for WSN challenges. The categories of this paper are based on approaches of SOA with and without middleware for WSNs. Additionally, features of SOA and middleware architectures for WSNs are compared to achieve more robust and efficient network performance. Design issues of SOA middleware for WSNs and its characteristics are also highlighted. The paper concludes with future research directions in SOM architecture to meet all requirements of emerging application of WSNs.
Legal Support for Palliative Care Patients.
Ezer, Tamar; Burke-Shyne, Naomi; Hepford, Kiera
2018-02-01
Palliative care patients face legal issues that impact their quality of life. Legal support, embedded in holistic palliative care services, has developed globally over the last decade to address this. This article aims to trace the origins of legal support for palliative care patients, detail models of legal support, and describe achievements and challenges. The article draws on years of work in this area and the available literature. Common legal issues include disposing of property and drafting wills, planning for children, dealing with debt and securing social benefits, and addressing discrimination. Diverse approaches to integrating legal support include developing paralegal skills, accessing skilled legal advice, empowering patients and families, and building awareness of rights among health care workers. There is robust and growing acceptance of legal support as a key component of holistic palliative care, and many palliative care professionals are identifying and addressing the legal needs they encounter through mediation, guidance on basic rights, or referrals to a lawyer. Addressing legal problems can contribute to peace of mind, well-being, and the health of patients. Copyright © 2017 American Academy of Hospice and Palliative Medicine. Published by Elsevier Inc. All rights reserved.
Incentivizing Verifiable Privacy-Protection Mechanisms for Offline Crowdsensing Applications
Sun, Jiajun; Liu, Ningzhong
2017-01-01
Incentive mechanisms of crowdsensing have recently been intensively explored. Most of these mechanisms mainly focus on the standard economical goals like truthfulness and utility maximization. However, enormous privacy and security challenges need to be faced directly in real-life environments, such as cost privacies. In this paper, we investigate offline verifiable privacy-protection crowdsensing issues. We firstly present a general verifiable privacy-protection incentive mechanism for the offline homogeneous and heterogeneous sensing job model. In addition, we also propose a more complex verifiable privacy-protection incentive mechanism for the offline submodular sensing job model. The two mechanisms not only explore the private protection issues of users and platform, but also ensure the verifiable correctness of payments between platform and users. Finally, we demonstrate that the two mechanisms satisfy privacy-protection, verifiable correctness of payments and the same revenue as the generic one without privacy protection. Our experiments also validate that the two mechanisms are both scalable and efficient, and applicable for mobile devices in crowdsensing applications based on auctions, where the main incentive for the user is the remuneration. PMID:28869574
Incentivizing Verifiable Privacy-Protection Mechanisms for Offline Crowdsensing Applications.
Sun, Jiajun; Liu, Ningzhong
2017-09-04
Incentive mechanisms of crowdsensing have recently been intensively explored. Most of these mechanisms mainly focus on the standard economical goals like truthfulness and utility maximization. However, enormous privacy and security challenges need to be faced directly in real-life environments, such as cost privacies. In this paper, we investigate offline verifiable privacy-protection crowdsensing issues. We firstly present a general verifiable privacy-protection incentive mechanism for the offline homogeneous and heterogeneous sensing job model. In addition, we also propose a more complex verifiable privacy-protection incentive mechanism for the offline submodular sensing job model. The two mechanisms not only explore the private protection issues of users and platform, but also ensure the verifiable correctness of payments between platform and users. Finally, we demonstrate that the two mechanisms satisfy privacy-protection, verifiable correctness of payments and the same revenue as the generic one without privacy protection. Our experiments also validate that the two mechanisms are both scalable and efficient, and applicable for mobile devices in crowdsensing applications based on auctions, where the main incentive for the user is the remuneration.
Performance and Challenges of Service-Oriented Architecture for Wireless Sensor Networks
Alshinina, Remah; Elleithy, Khaled
2017-01-01
Wireless Sensor Networks (WSNs) have become essential components for a variety of environmental, surveillance, military, traffic control, and healthcare applications. These applications face critical challenges such as communication, security, power consumption, data aggregation, heterogeneities of sensor hardware, and Quality of Service (QoS) issues. Service-Oriented Architecture (SOA) is a software architecture that can be integrated with WSN applications to address those challenges. The SOA middleware bridges the gap between the high-level requirements of different applications and the hardware constraints of WSNs. This survey explores state-of-the-art approaches based on SOA and Service-Oriented Middleware (SOM) architecture that provide solutions for WSN challenges. The categories of this paper are based on approaches of SOA with and without middleware for WSNs. Additionally, features of SOA and middleware architectures for WSNs are compared to achieve more robust and efficient network performance. Design issues of SOA middleware for WSNs and its characteristics are also highlighted. The paper concludes with future research directions in SOM architecture to meet all requirements of emerging application of WSNs. PMID:28282896
Newman, Karen; Fisher, Sarah; Mayhew, Susannah; Stephenson, Judith
2014-05-01
This article suggests that sexual and reproductive health and rights activists seeking to influence the post-2015 international development paradigm must work with sustainable development advocates concerned with a range of issues, including climate change, environmental issues, and food and water security, and that a way of building bridges with these communities is to demonstrate how sexual and reproductive health and rights are relevant for these issues. An understanding of population dynamics, including urbanization and migration, as well as population growth, can help to clarify these links. This article therefore suggests that whether or not sexual and reproductive health and rights activists can overcome resistance to discussing "population", become more knowledgeable about other sustainable development issues, and work with others in those fields to advance the global sustainable development agenda are crucial questions for the coming months. The article also contends that it is possible to care about population dynamics (including ageing and problems faced by countries with a high proportion of young people) and care about human rights at the same time. It expresses concern that, if sexual and reproductive health and rights advocates do not participate in the population dynamics discourse, the field will be left free for those for whom respecting and protecting rights may be less of a priority. Copyright © 2014 Reproductive Health Matters. Published by Elsevier Ltd. All rights reserved.
2015-09-01
riots, Ferguson riots, AIDS, National Security Agency (NSA) leaks, childhood obesity , and social security. Thirteen issues make up this cluster...civil issues with low numbers of fatalities and economic impacts. Issues of this kind include childhood obesity (2.25 hearings per year); riots due...up the 25th to 50th percentile include those having only tangential impact to the public, including among others, global warming, childhood obesity
Secrecy vs. the need for ecological information: challenges to environmental activism in Russia.
Jandl, T
1998-01-01
This article identifies the lessons learned from the Nikitin case study in Russia. The Nikitin case involves the analysis of sources of radioactive contamination in several Russian counties and in the Russian Northern Fleet. Norway was interested in the issue due to proximity to the storage sites. The issue involved national security and environmental protection. It was learned that mixing national security issues with environmental issues offers dangerous and multiple challenges. Environmental groups must build relationships with a wide audience. International security policy must include the issues of globalization of trade and the spread of environmental problems into the global commons (oceans and atmosphere). The risk of an environmentally dangerous accident as a consequence of Cold War activities is greater than the risk of nuclear war. Secrecy in military affairs is not justified when there is inadequate storage of nuclear weapons and contaminated materials. In Russia, the concern is great due to their economic transition and shortages of funds for even the most basic needs, which excludes nuclear waste clean up. The Bellona Foundation studied the extent of nuclear pollution from military nuclear reactors in the Kola peninsula of northwest Russia, in 1994 and 1996. Russian security police arrested one of the report authors for alleged national security violations. A valuable lesson learned was that local Russian environmental groups needed international support. The military nuclear complex poses an enormous hazard. Limiting inspections is an unacceptable national security risk. The new Russian law on state secrets is too broad.
50 CFR 600.240 - Security assurances.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false Security assurances. 600.240 Section 600... ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Council Membership § 600.240 Security assurances. (a) DOC Office of Security will issue security assurances to Council members following completion...
50 CFR 600.240 - Security assurances.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false Security assurances. 600.240 Section 600... ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Council Membership § 600.240 Security assurances. (a) DOC Office of Security will issue security assurances to Council members following completion...
5 CFR 1312.31 - Security violations.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified Information § 1312.31 Security violations. (a) A security violation notice is issued by the United...
50 CFR 600.240 - Security assurances.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false Security assurances. 600.240 Section 600... ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Council Membership § 600.240 Security assurances. (a) DOC Office of Security will issue security assurances to Council members following completion...
Issues and Impediments Faced by Canadian Teachers While Integrating ICT in Pedagogical Practice
ERIC Educational Resources Information Center
Saxena, Anoop
2017-01-01
Teachers in many schools struggle to integrate Information and Communications Technology (ICT) as part of their teaching practice. Among the issues faced by teachers when attempting to integrate ICT into their classrooms are gaps in ICT knowledge and skills, lack of training and inadequate support and scaffolding. Other issues include inability to…
Issues Facing Urban Agriscience Teachers: A Delphi Study
ERIC Educational Resources Information Center
Warner, Wendy J.; Washburn, Shannon G.
2009-01-01
This national study used the Delphi technique to identify the issues facing urban agriscience teachers. The first round of the study used a questionnaire with one open-ended question to generate responses from the expert panel. In the second round, respondents were asked to rate their level of agreement with 72 issues identified in round one using…
31 CFR 315.39 - Surrender for payment.
Code of Federal Regulations, 2010 CFR
2010-07-01
... establish his or her identity in accordance with Treasury instructions and identification guidelines. The... presenter must record his or her social security number on the face of the security, provided it does not... appear before an officer authorized to certify requests for payment, establish his or her identity, sign...
A Survey on Cyber Security awareness among college students in Tamil Nadu
NASA Astrophysics Data System (ADS)
Senthilkumar, K.; Easwaramoorthy, Sathishkumar
2017-11-01
The aim of the study is to analyse the awareness of cyber security on college students in Tamil Nadu by focusing various security threats in the internet. In recent years cybercrime is an enormous challenge in all areas including national security, public safety and personal privacy. To prevent from a victim of cybercrime everyone must know about their own security and safety measures to protect by themselves. A well-structured questionnaire survey method will be applied to analyse the college student’s awareness in the area of cyber security. This survey will be going to conducted in major cities of Tamil Nadu by focusing various security threats like email, virus, phishing, fake advertisement, popup windows and other attacks in the internet. This survey examines the college students’ awareness and the level of awareness about the security issues and some suggestions are set forth to overcome these issues.
The many faces of research on face perception.
Little, Anthony C; Jones, Benedict C; DeBruine, Lisa M
2011-06-12
Face perception is fundamental to human social interaction. Many different types of important information are visible in faces and the processes and mechanisms involved in extracting this information are complex and can be highly specialized. The importance of faces has long been recognized by a wide range of scientists. Importantly, the range of perspectives and techniques that this breadth has brought to face perception research has, in recent years, led to many important advances in our understanding of face processing. The articles in this issue on face perception each review a particular arena of interest in face perception, variously focusing on (i) the social aspects of face perception (attraction, recognition and emotion), (ii) the neural mechanisms underlying face perception (using brain scanning, patient data, direct stimulation of the brain, visual adaptation and single-cell recording), and (iii) comparative aspects of face perception (comparing adult human abilities with those of chimpanzees and children). Here, we introduce the central themes of the issue and present an overview of the articles.
14 CFR 415.23 - Policy review.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... license application to determine whether it presents any issues affecting U.S. national security or... presents any issues affecting U.S. national security. (2) The FAA consults with the Department of State to...
14 CFR 431.55 - Payload reentry review.
Code of Federal Regulations, 2012 CFR
2012-01-01
....55 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT... any issues that would adversely affect U.S. national security or foreign policy interests, would... reentry of a proposed payload presents any issues adversely affecting U.S. national security. (c) The FAA...
14 CFR 431.55 - Payload reentry review.
Code of Federal Regulations, 2013 CFR
2013-01-01
....55 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT... any issues that would adversely affect U.S. national security or foreign policy interests, would... reentry of a proposed payload presents any issues adversely affecting U.S. national security. (c) The FAA...
14 CFR 431.55 - Payload reentry review.
Code of Federal Regulations, 2010 CFR
2010-01-01
....55 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT... any issues that would adversely affect U.S. national security or foreign policy interests, would... reentry of a proposed payload presents any issues adversely affecting U.S. national security. (c) The FAA...
14 CFR 431.55 - Payload reentry review.
Code of Federal Regulations, 2011 CFR
2011-01-01
....55 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT... any issues that would adversely affect U.S. national security or foreign policy interests, would... reentry of a proposed payload presents any issues adversely affecting U.S. national security. (c) The FAA...
14 CFR 415.23 - Policy review.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... license application to determine whether it presents any issues affecting U.S. national security or... presents any issues affecting U.S. national security. (2) The FAA consults with the Department of State to...
14 CFR 415.23 - Policy review.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... license application to determine whether it presents any issues affecting U.S. national security or... presents any issues affecting U.S. national security. (2) The FAA consults with the Department of State to...
Personal health record systems and their security protection.
Win, Khin Than; Susilo, Willy; Mu, Yi
2006-08-01
The objective of this study is to analyze the security protection of personal health record systems. To achieve this we have investigated different personal health record systems, their security functions, and security issues. We have noted that current security mechanisms are not adequate and we have proposed some security mechanisms to tackle these problems.
Enhancing security and improving interoperability in healthcare information systems.
Gritzalis, D A
1998-01-01
Security is a key issue in healthcare information systems, since most aspects of security become of considerable or even critical importance when handling healthcare information. In addition, the intense need for information exchange has revealed interoperability of systems and applications as another key issue. Standardization can play an important role towards both these issues. In this paper, relevant standardization activities are briefly presented, and existing and emerging healthcare information security standards are identified and critically analysed. The analysis is based on a framework which has been developed for this reason. Therefore, the identification of gaps and inconsistencies in current standardization, the description of the conflicts of standards with legislation, and the analysis of implications of these standards to user organizations, are the main results of this paper.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...
Code of Federal Regulations, 2011 CFR
2011-04-01
... under the Securities Act of 1933 of securities of certain real estate companies. 239.18 Section 239.18... Securities Act of 1933 of securities of certain real estate companies. This form shall be used for registration under the Securities Act of 1933 of (a) securities issued by real estate investment trusts, as...
Code of Federal Regulations, 2010 CFR
2010-04-01
... under the Securities Act of 1933 of securities of certain real estate companies. 239.18 Section 239.18... Securities Act of 1933 of securities of certain real estate companies. This form shall be used for registration under the Securities Act of 1933 of (a) securities issued by real estate investment trusts, as...
Protecting the Ozone Shield: A New Public Policy
1991-04-01
Public Policy Issue; Alterna- 11 tives; Risk Management; Clean Air Act; Global Warming 16. PRICE CODE 17. SECURITY CLASSIFICATION . SECURITY...pattern of global warming , commonly known as "the greenhouse effect. 1 OVERVIEW OF THE OZONE DEPLETION PUBLIC POLICY ISSUE In 1974, two atmospheric...inhabitants from the harmful effects of increased UVb radiation and global warming . Another dilemma surrounds this public policy issue since the first
17 CFR 240.11d1-1 - Exemption of certain securities from section 11(d)(1).
Code of Federal Regulations, 2010 CFR
2010-04-01
... issued to the customer as a stockholder of the corporation issuing the security upon which credit is to... issued to the customer as a stockholder if he actually owned the stock giving rise to the right when such right accrued, even though such stock was not registered in his name; and in determining such fact the...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What are the book-entry systems in... BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS... book-entry systems in which auctioned Treasury securities may be issued or maintained? There are three...
Vameghi, R; Mohammad, K; Karimloo, M; Soleimani, F; Sajedi, F
2010-01-01
The aim of the study was to compare the effects of 'face-to-face education' and 'educational movies' on 'knowledge' and 'practice' of women of child-bearing-age, in terms of health-care during pregnancy and during infancy in a suburban region near Tehran City, Iran. In this quasi-experimental study, the sample included 873 married women. Questionnaires for knowledge and practice assessment were designed. The women were assigned to three groups: control (group I), face-to-face education (group II), and educational movie (group III). Knowledge questionnaires were completed before and immediately after intervention. Practice questionnaires were completed before and three months after intervention. Both questionnaires consisted of two types of questions: type A (concerning infant care issues) and type B (concerning prenatal health care). There was a significant difference in post-test knowledge between groups I and II and between groups I and III, but not between groups II and III. In terms of post-test practice, the changes were determined for every individual question, and significantly, better results were seen in group II, especially concerning type B questions. Face to face education lead to better practice than educational movies. In addition, significantly better practice occurred regarding child health care issues rather than prenatal issues in both groups. Realistic and tangible issues, those easy to practice, and with little or no economical burden imposed on the family, progressed from the knowledge state to the practice state more successfully in both groups.
Rural roads and bridges : management issues facing local highway officials
DOT National Transportation Integrated Search
1996-09-01
The report documents management practices used by, and issues facing, local transportation administrators. Data are drawn from a national survey of county and town highway officials, in Fall 1994 and Spring 1995, which provided usable information fro...
Assessment and management of water resources in Egypt to face drought and water scarcity
NASA Astrophysics Data System (ADS)
Wolters, Wouter; El Guindy, Samia; Salah El Deen, Magdy; Roest, Koen; Smit, Robert; Froebrich, Jochen
2013-04-01
Egypt is one of the countries hardest hit by global and climate change. Challenges include population growth; increased demands for food, water, and energy; as well as changing land use patterns and urbanization. Egypt's part of the Mediterranean is characterized by a very complex hydrological system, as it lacks rainfall (Cairo average 30 mm/year) and it is completely dependent on the Nile river flow. The growth of the Egyptian population and its economy in the near future leads to an increase in the demand for water and the overall water allocation priority basically is: first drinking water, then industry, and whatever is remaining will be available for agriculture and nature. Because the agricultural sector uses more than 80 per cent of available water, the main option available to reduce water scarcity in the priority sectors of the economy is to allocate less to the agriculture sector. Scientifically based advances in facing future drought and water scarcity through innovations increasing yields and food security by measures leading to "more crop per drop" are required. New and modern large- and medium-scale agriculture is being developed in desert areas with participation of the private sector for investments. To prepare the farming community and others elsewhere, for the future situation of water shortages, a paradigm shift is needed. New farming systems under tight water supply conditions are in development to prepare for a future with less water. Egyptian farming systems need a major transition to prevent further marginalization of agriculture, which would also have a major impact on food security. Central to this transition should be the increase of value generated per volume available water, also referred to as "more crop per drop" or "more cash per splash". There is room for the urgently required improvement: the present return on water in agriculture in Egypt is about US 0.25 /m3, where values of over US 1 /m3 are "easily" reached elsewhere. Moreover, innovations on resource efficiency enabling use of rest and by-products of one agricultural activity as an input for another one will be profitable for the food producers and will also be better for the environment. The creative design process to reach the required technological and policy innovations contributes to the developed adaptation strategy to face drought and water scarcity. Results will incorporate some previously un-thought of options. The issues of water scarcity and drought have consequences and implications that can no longer be adequately addressed by any one of the Ministries alone. Many other government departments and agencies must be involved and decisions will have to be made at the highest political level. All policies in Egypt must be conscious of the limitations in water availability, and water policies need to address technological developments as well as the full range of other issues, including: macro-economic factors, economic issues that influence farm-level decisions, development of human capital, governance, and financial risk management.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-15
... to certain issues of securities in DTC's Fast Automated Securities Transfer program (``FAST''). For securities that are part of the FAST program, the transfer agents hold the securities registered in the name...
Patient and health care professional views and experiences of computer agent-supported health care.
Neville, Ron G; Greene, Alexandra C; Lewis, Sue
2006-01-01
To explore patient and health care professional (HCP) views towards the use of multi-agent computer systems in their GP practice. Qualitative analysis of in-depth interviews and analysis of transcriptions. Urban health centre in Dundee, Scotland. Five representative healthcare professionals and 11 patients. Emergent themes from interviews revealed participants' attitudes and beliefs, which were coded and indexed. Patients and HCPs had similar beliefs, attitudes and views towards the implementation of multi-agent systems (MAS). Both felt modern communication methods were useful to supplement, not supplant, face-to-face consultations between doctors and patients. This was based on the immense trust these patients placed in their doctors in this practice, which extended to trust in their choice of communication technology and security. Rapid access to medical information increased patients' sense of shared partnership and self-efficacy. Patients and HCPs expressed respect for each other's time and were keen to embrace technology that made interactions more efficient, including for the altruistic benefit of others less technically competent. Patients and HCPs welcomed the introduction of agent technology to the delivery of health care. Widespread use will depend more on the trust patients place in their own GP than on technological issues.
Shankar, Janki; Ip, Eugene; Khalema, Ernest; Couture, Jennifer; Tan, Shawn; Zulla, Rosslynn T; Lam, Gavin
2013-08-28
The level of educational attainment is increasingly being recognized as an important social determinant of health. While higher educational attainment can play a significant role in shaping employment opportunities, it can also increase the capacity for better decision making regarding one's health, and provide scope for increasing social and personal resources that are vital for physical and mental health. In today's highly globalized knowledge based society postsecondary education (PSE) is fast becoming a minimum requirement for securing employment that can afford young adults the economic, social and personal resources needed for better health. Canada ranks high among OECD countries in terms of advanced education, with 66% of Canadians having completed some form of postsecondary education. Yet youth from low income indigenous and visible minority (LIIVM) backgrounds continue to be poorly represented at PSE levels. The current study aimed to understand the reasons for this poor representation by examining the experiences of LIIVM students enrolled in a postsecondary program. Findings show that the challenges they faced during the course of their study had an adverse impact on their health and that improving representation of these students in PSE will require changes at many levels.
Review of Congressional Issues. News from Capitol Hill.
ERIC Educational Resources Information Center
Heinz, Ann Simeo
2002-01-01
Focuses on U.S. congressional issues in two categories: (1) enacted legislation, and (2) proposed legislation. Addresses topics such as the resolution related to Iraq, the Department of Homeland Security, Pledge of Allegiance, social security protection, elder justice, and women's rights. Includes learning activities. (CMK)
13 CFR 107.1505 - Liquidity requirements for Licensees issuing Participating Securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Liquidity requirements for Licensees issuing Participating Securities. 107.1505 Section 107.1505 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees...
Nuclear reactor downcomer flow deflector
Gilmore, Charles B [Greensburg, PA; Altman, David A [Pittsburgh, PA; Singleton, Norman R [Murrysville, PA
2011-02-15
A nuclear reactor having a coolant flow deflector secured to a reactor core barrel in line with a coolant inlet nozzle. The flow deflector redirects incoming coolant down an annulus between the core barrel and the reactor vessel. The deflector has a main body with a front side facing the fluid inlet nozzle and a rear side facing the core barrel. The rear side of the main body has at least one protrusion secured to the core barrel so that a gap exists between the rear side of the main body adjacent the protrusion and the core barrel. Preferably, the protrusion is a relief that circumscribes the rear side of the main body.
Sclera-directed knot technique for securing an encircling band in retinal surgery.
Bartov, E; Ginsburg, L H; Ashkenazi, I; Treister, G
1991-10-01
The protruding ends of sutures used to secure the ends of the silicone rubber band placed during many retinal surgical procedures may cause postsurgical irritation, since with presently used suturing techniques, the knot of the suture remains on top of the band, facing the conjunctiva. We describe a suturing technique which, by inverting the band when suturing its ends and then allowing the band to return to its original position, places the knot on the undersurface of the band, against the sclera. Thus, no protruding suture ends are left facing the conjunctiva and the irritation resulting from such a protrusion is averted.
Cloud Security: Issues and Research Directions
2014-11-18
4. Cloud Computing Security: What Changes with Software - Defined Networking ? Maur´ıcio Tsugawa, Andr´ea Matsunaga, and Jos´e A. B. Fortes 5...machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software - Defined ... Networking ( SDN ) is deployed within and across clouds. Chapters 5-9 are focused on the protection of data stored in the cloud. In Chapter 5, Wang et
The Evolution of the Automated Continuous Evaluation System (ACES) for Personnel Security
2013-11-12
information. It applies business rules to the data, produces a report that flags issues of potential security concern, and electronically transmits...Form 86 (SF- 86) to check these data sources, verify what has been submitted, and collect more information. It applies business rules to the data...subject information. It applies business rules to analyze the data returned, produces a report that flags issues of potential security concern, and
Strategic Response to Energy-Related Security Threats in the US Department of Defense
2014-10-15
generation in the United States are fossil fuels . These include coal, natural gas, and oil . In some cases solar, wind, geothermal, and hydroelectric...and findings. The research addressed engagement on climate change and energy security issues by DoD across various tiers and sectors of the...on climate change and energy security issues by DoD across various tiers and sectors of the organization. Specifically, a tripartite analysis
Research on information security system of waste terminal disposal process
NASA Astrophysics Data System (ADS)
Zhou, Chao; Wang, Ziying; Guo, Jing; Guo, Yajuan; Huang, Wei
2017-05-01
Informatization has penetrated the whole process of production and operation of electric power enterprises. It not only improves the level of lean management and quality service, but also faces severe security risks. The internal network terminal is the outermost layer and the most vulnerable node of the inner network boundary. It has the characteristics of wide distribution, long depth and large quantity. The user and operation and maintenance personnel technical level and security awareness is uneven, which led to the internal network terminal is the weakest link in information security. Through the implementation of security of management, technology and physics, we should establish an internal network terminal security protection system, so as to fully protect the internal network terminal information security.
Mitigating amphibian chytridiomycoses in nature.
Garner, Trenton W J; Schmidt, Benedikt R; Martel, An; Pasmans, Frank; Muths, Erin; Cunningham, Andrew A; Weldon, Che; Fisher, Matthew C; Bosch, Jaime
2016-12-05
Amphibians across the planet face the threat of population decline and extirpation caused by the disease chytridiomycosis. Despite consensus that the fungal pathogens responsible for the disease are conservation issues, strategies to mitigate their impacts in the natural world are, at best, nascent. Reducing risk associated with the movement of amphibians, non-amphibian vectors and other sources of infection remains the first line of defence and a primary objective when mitigating the threat of disease in wildlife. Amphibian-associated chytridiomycete fungi and chytridiomycosis are already widespread, though, and we therefore focus on discussing options for mitigating the threats once disease emergence has occurred in wild amphibian populations. All strategies have shortcomings that need to be overcome before implementation, including stronger efforts towards understanding and addressing ethical and legal considerations. Even if these issues can be dealt with, all currently available approaches, or those under discussion, are unlikely to yield the desired conservation outcome of disease mitigation. The decision process for establishing mitigation strategies requires integrated thinking that assesses disease mitigation options critically and embeds them within more comprehensive strategies for the conservation of amphibian populations, communities and ecosystems.This article is part of the themed issue 'Tackling emerging fungal threats to animal health, food security and ecosystem resilience'. © 2016 The Author(s).
Mitigating amphibian chytridiomycoses in nature
Martel, An; Pasmans, Frank; Muths, Erin; Cunningham, Andrew A.; Weldon, Che; Bosch, Jaime
2016-01-01
Amphibians across the planet face the threat of population decline and extirpation caused by the disease chytridiomycosis. Despite consensus that the fungal pathogens responsible for the disease are conservation issues, strategies to mitigate their impacts in the natural world are, at best, nascent. Reducing risk associated with the movement of amphibians, non-amphibian vectors and other sources of infection remains the first line of defence and a primary objective when mitigating the threat of disease in wildlife. Amphibian-associated chytridiomycete fungi and chytridiomycosis are already widespread, though, and we therefore focus on discussing options for mitigating the threats once disease emergence has occurred in wild amphibian populations. All strategies have shortcomings that need to be overcome before implementation, including stronger efforts towards understanding and addressing ethical and legal considerations. Even if these issues can be dealt with, all currently available approaches, or those under discussion, are unlikely to yield the desired conservation outcome of disease mitigation. The decision process for establishing mitigation strategies requires integrated thinking that assesses disease mitigation options critically and embeds them within more comprehensive strategies for the conservation of amphibian populations, communities and ecosystems. This article is part of the themed issue ‘Tackling emerging fungal threats to animal health, food security and ecosystem resilience’. PMID:28080996
Gharaveis, Arsalan; Hamilton, D Kirk; Pati, Debajyoti; Shepley, Mardelle
2017-01-01
The aim of this study was to examine the influence of visibility on teamwork, collaborative communication, and security issues in emergency departments (EDs). This research explored whether with high visibility in EDs, teamwork and collaborative communication can be improved while the security issues will be reduced. Visibility has been regarded as a critical design consideration and can be directly and considerably impacted by ED's physical design. Teamwork is one of the major related operational outcomes of visibility and involves nurses, support staff, and physicians. The collaborative communication in an ED is another important factor in the process of care delivery and affects efficiency and safety. Furthermore, security is a behavioral factor in ED designs, which includes all types of safety including staff safety, patient safety, and the safety of visitors and family members. This qualitative study investigated the impact of visibility on teamwork, collaborative communication, and security issues in the ED. One-on-one interviews and on-site observation sessions were conducted in a community hospital. Corresponding data analysis was implemented by using computer plan analysis, observation and interview content, and theme analyses. The findings of this exploratory study provided a framework to identify visibility as an influential factor in ED design. High levels of visibility impact productivity and efficiency of teamwork and communication and improve the chance of lowering security issues. The findings of this study also contribute to the general body of knowledge about the effect of physical design on teamwork, collaborative communication, and security.
2009-04-21
6 Intercity Passenger Rail Program (Amtrak) .....................................................................6... Intercity Bus Security Grant Program..............................................................................7 Trucking Security Program...continue security enhancements for its intercity rail services between high-risk urban areas. 20 U.S. Department of Homeland Security, Federal Emergency
Computer Network Security: Best Practices for Alberta School Jurisdictions.
ERIC Educational Resources Information Center
Alberta Dept. of Education, Edmonton.
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
75 FR 64643 - Reporting of Security-Based Swap Transaction Data
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-20
... information relating to pre-enactment security-based swaps to a registered security-based swap data repository... within 60 days after a registered security- based swap data repository commences operations to receive... repository,\\8\\ and security- based swap execution facility.\\9\\ The Commission has issued an advance notice of...
49 CFR 1548.19 - Security Directives and Information Circulars.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... CARRIER SECURITY § 1548.19 Security Directives and Information Circulars. (a) TSA may issue an Information... security measures are necessary to respond to a threat assessment, or to a specific threat against civil...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
...; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343-1717), Acting... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...
A Security Checklist for ERP Implementations
ERIC Educational Resources Information Center
Hughes, Joy R.; Beer, Robert
2007-01-01
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
The security concern on internet banking adoption among Malaysian banking customers.
Sudha, Raju; Thiagarajan, A S; Seetharaman, A
2007-01-01
The existing literatures highlights that the security is the primary factor which determines the adoption of Internet banking technology. The secondary information on Internet banking development in Malaysia shows a very slow growth rate. Hence, this study aims to study the banking customers perception towards security concern and Internet banking adoption through the information collected from 150 sample respondents. The data analysis reveals that the customers have much concern about security and privacy issue in adoption of Internet banking, whether the customers are adopted Internet banking or not. Hence, it infers that to popularize Internet banking system there is a need for improvement in security and privacy issue among the banking customers.
Community health politics: transition of the Seattle USPHS Hospital.
Hughes, R G; Tompkins, R K
1984-01-01
To achieve transition of the Seattle US Public Health Service Hospital from federal to local control, the community overcame large obstacles; the most difficult was federal preference for closing the hospital rather than incurring additional costs essential for transition. The Washington State Congressional Delegation, local officials, hospital staff, patients and numerous community volunteers--individuals and private organizations--worked together to save the hospital and secure federal resources for its transition. Going through the transition influenced the hospital as it developed a new corporate structure, designed new administrative systems, and prepared to operate in a new environment while facing an uncertain future. The hospital has continued to cope with issues arising from transition, such as operating in a competitive context while reaffirming its community service heritage. Despite the difficulties of transition, Seattle preserved a valuable community health resource. PMID:6547029
Community health politics: transition of the Seattle USPHS Hospital.
Hughes, R G; Tompkins, R K
1984-06-01
To achieve transition of the Seattle US Public Health Service Hospital from federal to local control, the community overcame large obstacles; the most difficult was federal preference for closing the hospital rather than incurring additional costs essential for transition. The Washington State Congressional Delegation, local officials, hospital staff, patients and numerous community volunteers--individuals and private organizations--worked together to save the hospital and secure federal resources for its transition. Going through the transition influenced the hospital as it developed a new corporate structure, designed new administrative systems, and prepared to operate in a new environment while facing an uncertain future. The hospital has continued to cope with issues arising from transition, such as operating in a competitive context while reaffirming its community service heritage. Despite the difficulties of transition, Seattle preserved a valuable community health resource.
12 CFR 1.3 - Limitations on dealing in, underwriting, and purchase and sale of securities.
Code of Federal Regulations, 2013 CFR
2013-01-01
... security. (2) The aggregate par value of securities treated as investment securities under paragraph (i)(1... its own account, provided the aggregate par value of Type II securities issued by any one obligor held... may purchase and sell Type III securities for its own account, provided the aggregate par value of...
12 CFR 1.3 - Limitations on dealing in, underwriting, and purchase and sale of securities.
Code of Federal Regulations, 2014 CFR
2014-01-01
... security. (2) The aggregate par value of securities treated as investment securities under paragraph (i)(1... its own account, provided the aggregate par value of Type II securities issued by any one obligor held... may purchase and sell Type III securities for its own account, provided the aggregate par value of...
DOT National Transportation Integrated Search
2003-09-09
After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...
31 CFR 306.23 - Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System.
Code of Federal Regulations, 2010 CFR
2010-07-01
... TREASURY DIRECT Book-entry Securities System. 306.23 Section 306.23 Money and Finance: Treasury Regulations... Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System. (a) Eligible issues. The... conversion to the TREASURY DIRECT Book-entry Securities System. The notice shall specify the period during...
The Psychology of Working Theory.
Duffy, Ryan D; Blustein, David L; Diemer, Matthew A; Autin, Kelsey L
2016-03-01
In the current article, we build on research from vocational psychology, multicultural psychology, intersectionality, and the sociology of work to construct an empirically testable Psychology of Working Theory (PWT). Our central aim is to explain the work experiences of all individuals, but particularly people near or in poverty, people who face discrimination and marginalization in their lives, and people facing challenging work-based transitions for which contextual factors are often the primary drivers of the ability to secure decent work. The concept of decent work is defined and positioned as the central variable within the theory. A series of propositions is offered concerning (a) contextual predictors of securing decent work, (b) psychological and economic mediators and moderators of these relations, and (c) outcomes of securing decent work. Recommendations are suggested for researchers seeking to use the theory and practical implications are offered concerning counseling, advocacy, and public policy. (c) 2016 APA, all rights reserved).
King, Laura; Rukh-Kamaa, Aneer
2013-01-01
Youths with disabilities face numerous challenges when they transition to adulthood. Those who are aging out of foster care face the additional challenge of losing their foster care benefits, although some will be eligible for Supplemental Security Income (SSI) payments after foster care ceases. However, the time needed to process SSI applications exposes those youths to a potential gap in the receipt of benefits as they move between foster care and SSI. We evaluate the effects of a 2010 Social Security Administration policy change that allows such youths to apply for SSI payments 60 days earlier than the previous policy allowed. The change provides additional time for processing claims before the applicant ages out of the foster care system. We examine administrative records on SSI applications from before and after the policy change to determine if the change has decreased the gap between benefits for the target population.
DOT's budget : management and performance issues facing the department in fiscal year 1999
DOT National Transportation Integrated Search
1998-02-12
This testimony discusses key resource management issues and performance challenges facing the Department of Transportation in 1999 and beyond. 1. There is a need for increased management attention to highway, transit, and rail programs - which accoun...
Future Issues Facing Administrators in Pharmaceutical Education.
ERIC Educational Resources Information Center
Fink, Joseph L., III
1986-01-01
Issues facing pharmaceutical education include the need to keep up with advancing technology, the need to keep faculty from overemphasizing technology to the detriment of other responsibilities, motivating and rewarding faculty, dealing with loss of faculty productivity, and part-time faculty. (MSE)
FORWARD: DESERTIFICATION IN THE MEDITERRANEAN REGION: A SECURITY ISSUE
The Workshop focused on two basic concepts: security and desertification and their linkages. Since the end of the Cold War, traditional security concepts based on national sovereignty and territorial security have increasingly been brought under review. Currently, a broader defin...
Securing recruitment and obtaining informed consent in minority ethnic groups in the UK.
Lloyd, Cathy E; Johnson, Mark R D; Mughal, Shanaz; Sturt, Jackie A; Collins, Gary S; Roy, Tapash; Bibi, Rukhsana; Barnett, Anthony H
2008-03-30
Previous health research has often explicitly excluded individuals from minority ethnic backgrounds due to perceived cultural and communication difficulties, including studies where there might be language/literacy problems in obtaining informed consent. This study addressed these difficulties by developing audio-recorded methods of obtaining informed consent and recording data. This report outlines 1) our experiences with securing recruitment to a qualitative study investigating alternative methods of data collection, and 2) the development of a standardised process for obtaining informed consent from individuals from minority ethnic backgrounds whose main language does not have an agreed written form. Two researchers from South Asian backgrounds recruited adults with Type 2 diabetes whose main language was spoken and not written, to attend a series of focus groups. A screening tool was used at recruitment in order to assess literacy skills in potential participants. Informed consent was obtained using audio-recordings of the patient information and recording patients' verbal consent. Participants' perceptions of this method of obtaining consent were recorded. Recruitment rates were improved by using telephone compared to face-to-face methods. The screening tool was found to be acceptable by all potential participants. Audio-recorded methods of obtaining informed consent were easy to implement and accepted by all participants. Attrition rates differed according to ethnic group. Snowballing techniques only partly improved participation rates. Audio-recorded methods of obtaining informed consent are an acceptable alternative to written consent in study populations where literacy skills are variable. Further exploration of issues relating to attrition is required, and a range of methods may be necessary in order to maximise response and participation rates.
Planning Considerations for Secure Network Protocols
1999-03-01
distribution / management ) requirements needed to support network security services are examined. The thesis concludes by identifying tactical user network requirements and suggests security issues to be considered in concert with network
Face liveness detection for face recognition based on cardiac features of skin color image
NASA Astrophysics Data System (ADS)
Suh, Kun Ha; Lee, Eui Chul
2016-07-01
With the growth of biometric technology, spoofing attacks have been emerged a threat to the security of the system. Main spoofing scenarios in the face recognition system include the printing attack, replay attack, and 3D mask attack. To prevent such attacks, techniques that evaluating liveness of the biometric data can be considered as a solution. In this paper, a novel face liveness detection method based on cardiac signal extracted from face is presented. The key point of proposed method is that the cardiac characteristic is detected in live faces but not detected in non-live faces. Experimental results showed that the proposed method can be effective way for determining printing attack or 3D mask attack.
2011-05-13
running amok and armed Americans 45 Paul Richter , “Audit: U.S. Funds Went to Taliban, Subcontractors on... Anna Mulrine and Keith Whitelaw, “Private Security Contractors Face Incoming Political Fire,” U.S. News & World Report, October 15, 2007. 51 Charlie
The Retirement Security of the Baby Boom Generation.
ERIC Educational Resources Information Center
Shoven, John B.
1995-01-01
The baby boom generation faces added uncertainty on their investments and perhaps lower realized rates of return on all components of their retirement savings, primarily because of their large number. Effects will be felt in the Social Security system and by pension plans and private investors. Individuals, employers, pension fund managers, and…
Joint Schemes for Physical Layer Security and Error Correction
ERIC Educational Resources Information Center
Adamo, Oluwayomi
2011-01-01
The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A…