Global Security Contingency Fund: Summary and Issue Overview
2014-04-04
Diplomacy and Development Review (QDDR), Washington, D.C., December 2010, p. 203; Gordon Adams and Rebecca Williams, A New Way Forward: Rebalancing ...Williams, A New Way Forward: Rebalancing Security Assistance Programs and (continued...) Global Security Contingency Fund: Summary and Issue Overview...a large security assistance portfolio . But others may point to the State Department’s creation of new programs under the Security Assistance
DOD Security Cooperation: An Overview of Authorities and Issues
2016-08-23
Cooperation: An Overview of Authorities and Issues Congressional Research Service 13 DOD funds six Regional Centers for Security Studies , which...Expenses Necessary for Theater Security Cooperation.” Another Senate proposal would revamp DOD’s five regional centers for security studies (10 U.S.C...184) by eliminating two that are located in Washington, DC (the Africa Center for Strategic Studies and the Near East South Asia Center for Strategic
Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.
School Violence: Physical Security.
ERIC Educational Resources Information Center
Utah State Office of Education, Salt Lake City.
This booklet provides an overview of security technology product areas that might be appropriate and affordable for school applications. Topics cover security concepts and operational issues; security issues when designing for new schools; the role of maintenance; video camera use; walk-through metal detectors; duress alarm devices; and a partial…
Overview of Climate Confluence Security Issues
NASA Astrophysics Data System (ADS)
Reisman, J. P.
2011-12-01
Presentation will focus on an overview of the security perspectives based on the confluence considerations including energy, economics and climate change. This will include perspectives from reports generated by the Quadrennial Defense Review, Joint Forces Command, the Center for Strategic International Studies, MIT, the Inter-agency Climate Change Adaptation Task Force, the Central Intelligence Agency, the Center for Naval Analysis, and other relevant reports. The presentation will highlight the connections between resource issues and climate change which can be interpreted into security concerns. General discussion of global issues, contextual review of AR4 WGII may be included and any other report updates as applicable. The purpose of this presentation is to give a rounded view of the general qualitative and quantitative perspectives regarding climate related security considerations.
Security Classification Reform: The Waiting Agenda.
ERIC Educational Resources Information Center
Relyea, Harold C.
1993-01-01
Provides an overview of security classification reform for consideration by the Clinton administration and the 103rd Congress. Historical background and current issues related to the security classification of information, personnel security clearances, and industrial safeguarding of classified information are discussed. A checklist of basic…
Privacy, security and access with sensitive health information.
Croll, Peter
2010-01-01
This chapter gives an educational overview of: * Confidentiality issues and the challenges faced; * The fundamental differences between privacy and security; * The different access control mechanisms; * The challenges of Internet security; * How 'safety and quality' relate to all the above.
2009-08-05
Freight Rail Security Grant Program ...............................................................................6 Intercity Passenger Rail Program...Amtrak) .....................................................................6 Intercity Bus Security Grant Program...overview- fy2009.pdf. 19 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services
Protecting the Ozone Shield: A New Public Policy
1991-04-01
Public Policy Issue; Alterna- 11 tives; Risk Management; Clean Air Act; Global Warming 16. PRICE CODE 17. SECURITY CLASSIFICATION . SECURITY...pattern of global warming , commonly known as "the greenhouse effect. 1 OVERVIEW OF THE OZONE DEPLETION PUBLIC POLICY ISSUE In 1974, two atmospheric...inhabitants from the harmful effects of increased UVb radiation and global warming . Another dilemma surrounds this public policy issue since the first
Border and Transportation Security: Possible New Directions and Policy Options
2005-03-29
Security: Overview of Issues. See also “ JFK Airport to Receive Walk-Through Explosives Detection Portal,” Homeland Security Monitor, Oct. 26, 2004. In...of integrated security design can be seen at Terminal six at the JFK airport in New York City. Since many airports were originally designed in the
2008-06-01
183 14. Ethical Issues in War: An Overview Martin L. Cook...185 15. Ethics and War in Comparative Religious Perspective...be guided by values and ethics with the intent of doing some type of good for parts of the international system, or the overall system in general
Guide to National Security Policy and Strategy
2004-07-01
13 3. Ethical Issues in War: An Overview Martin L. Cook...Right.” 12 Ibid. 19 CHAPTER 3 ETHICAL ISSUES IN WAR: AN OVERVIEW Martin L. Cook iolent conflict among human beings is, unfortunately, one of the...is equally true that, as far back as human culture and thought have left written records, humans have thought about morality and ethics . Although
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System.more » Selected papers were processed separately for inclusion in the Energy Science and Technology Database.« less
Mackenzie, Geraldine; Carter, Hugh
2010-01-01
This chapter gives an educational overview of: * An awareness of the legal issues involved in health informatics * The need for the privacy and security of the patient record * The legal consequences of a breach of the security of the patient record * The concept of privacy law and what precautions ought to be taken to minimize legal liability for a breach of privacy and/or confidentiality.
Electronic Journal Market Overview in 1997: Part 1--The Publishers.
ERIC Educational Resources Information Center
Machovec, George S.
1997-01-01
Provides an overview of the electronic journal market and focuses on publishers doing innovative projects. Discusses predominate market models; publishers and the Internet; issues surrounding electronic journals: pricing, security, electronic page layout, copyright, backfile availability, reliability, and accessibility. Highlights selected…
Border and Transportation Security: Overview of Congressional Issues
2004-12-17
railways, airways, and waterways. While in the immediate aftermath of 9/11 efforts primarily concentrated on an expanded federal role in aviation ... security (in particular on the heightened screening of passengers and baggage), increasingly attention is being turned towards other modes of transportation.
Guide to National Security Policy and Strategy
2006-06-01
15 3. Ethical Issues in War: An...21 4. Ethics and War in Comparative Religious Perspective David L. Perry...Ibid. 21 CHAPTER 3 ETHICAL ISSUES IN WAR: AN OVERVIEW Martin L. Cook Violent conflict among human beings is, unfortunately, one of the great
An Overview of Electronic Passport Security Features
NASA Astrophysics Data System (ADS)
Říha, Zdeněk
Electronic passports include contactless chip which stores personal data of the passport holder, information about the passport and the issuing institution. In its simplest form an electronic passport contains just a collection of read-only files, more advanced variants can include sophisticated cryptographic mechanisms protecting security of the document and / or privacy of the passport holder. This paper describes security features of electronic passports and discusses their efficiency.
2010-07-01
Guns, and Money”: Transnational Threats and U.S. National Security ………………………………………………………………………………………...207 Paul Rexton Kan 16. Ethical ...Issues in War: An Overview …………………………………………………………215 Martin L. Cook III. Strategic Issues and Considerations 17. Ethics and War in Comparative...values and ethics with the intent of doing some type of good for parts of the international system, or the overall system in general. This might
Wireless physical layer security
NASA Astrophysics Data System (ADS)
Poor, H. Vincent; Schaefer, Rafael F.
2017-01-01
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.
Wireless physical layer security.
Poor, H Vincent; Schaefer, Rafael F
2017-01-03
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments.
Wireless physical layer security
Schaefer, Rafael F.
2017-01-01
Security in wireless networks has traditionally been considered to be an issue to be addressed separately from the physical radio transmission aspects of wireless systems. However, with the emergence of new networking architectures that are not amenable to traditional methods of secure communication such as data encryption, there has been an increase in interest in the potential of the physical properties of the radio channel itself to provide communications security. Information theory provides a natural framework for the study of this issue, and there has been considerable recent research devoted to using this framework to develop a greater understanding of the fundamental ability of the so-called physical layer to provide security in wireless networks. Moreover, this approach is also suggestive in many cases of coding techniques that can approach fundamental limits in practice and of techniques for other security tasks such as authentication. This paper provides an overview of these developments. PMID:28028211
CD-ROM and Metering--An Overview.
ERIC Educational Resources Information Center
Shear, Victor
1992-01-01
Discusses the need for security and metering features for CD-ROM products. Topics covered include user productivity issues, pricing problems, integrated information resources, advantages of CD-ROM distribution systems, unauthorized use, content encryption, and multiple simultaneous meters. (MES)
Satellite Telemetry and Command using Big LEO Mobile Telecommunications Systems
NASA Technical Reports Server (NTRS)
Huegel, Fred
1998-01-01
Various issues associated with satellite telemetry and command using Big LEO mobile telecommunications systems are presented in viewgraph form. Specific topics include: 1) Commercial Satellite system overviews: Globalstar, ICO, and Iridium; 2) System capabilities and cost reduction; 3) Satellite constellations and contact limitations; 4) Capabilities of Globalstar, ICO and Iridium with emphasis on Globalstar; and 5) Flight transceiver issues and security.
Biomedical devices and systems security.
Arney, David; Venkatasubramanian, Krishna K; Sokolsky, Oleg; Lee, Insup
2011-01-01
Medical devices have been changing in revolutionary ways in recent years. One is in their form-factor. Increasing miniaturization of medical devices has made them wearable, light-weight, and ubiquitous; they are available for continuous care and not restricted to clinical settings. Further, devices are increasingly becoming connected to external entities through both wired and wireless channels. These two developments have tremendous potential to make healthcare accessible to everyone and reduce costs. However, they also provide increased opportunity for technology savvy criminals to exploit them for fun and profit. Consequently, it is essential to consider medical device security issues. In this paper, we focused on the challenges involved in securing networked medical devices. We provide an overview of a generic networked medical device system model, a comprehensive attack and adversary model, and describe some of the challenges present in building security solutions to manage the attacks. Finally, we provide an overview of two areas of research that we believe will be crucial for making medical device system security solutions more viable in the long run: forensic data logging, and building security assurance cases.
Safeguarding patient privacy in electronic healthcare in the USA: the legal view.
Walsh, Diana; Passerini, Katia; Varshney, Upkar; Fjermestad, Jerry
2008-01-01
The conflict between the sweeping power of technology to access and assemble personal information and the ongoing concern about our privacy and security is ever increasing. While we gradually need higher electronic access to medical information, issues relating to patient privacy and reducing vulnerability to security breaches surmount. In this paper, we take a legal perspective and examine the existing patchwork of laws and obligations governing health information in the USA. The study finds that as Electronic Medical Records (EMRs) increase in scope and dissemination, privacy protections gradually decrease due to the shortcomings in the legal system. The contributions of this paper are (1) an overview of the legal EMR issues in the USA, and (2) the identification of the unresolved legal issues and how these will escalate when health information is transmitted over wireless networks. More specifically, the paper discusses federal and state government regulations such as the Electronic Communications Privacy Act, the Health Insurance Portability and Accountability Act (HIPAA) and judicial intervention. Based on the legal overview, the unresolved challenges are identified and suggestions for future research are included.
An Overview of Cloud Computing in Distributed Systems
NASA Astrophysics Data System (ADS)
Divakarla, Usha; Kumari, Geetha
2010-11-01
Cloud computing is the emerging trend in the field of distributed computing. Cloud computing evolved from grid computing and distributed computing. Cloud plays an important role in huge organizations in maintaining huge data with limited resources. Cloud also helps in resource sharing through some specific virtual machines provided by the cloud service provider. This paper gives an overview of the cloud organization and some of the basic security issues pertaining to the cloud.
HIV/AIDS Securitization: Outcomes and Current Challenges.
Shadyab, Aladdin H; Hale, Braden R; Shaffer, Richard A
2017-01-01
The securitization (i.e., framing of a health issue as a security threat) of HIV/AIDS by the United Nations Security Council in 2000 changed the belief that HIV/AIDS is only a health issue. Although now accepted that HIV/AIDS represents a security threat, the consequences of securitization are still not widely established. The purpose of this paper was to present an evidence-based review of the outcomes and current challenges associated with HIV/AIDS securitization in the context of national security. We provided an overview of HIV/AIDS securitization, followed by a discussion of the impact of securitization on peacekeeping personnel and uniformed services. We also reviewed the United States Government's response to securitization and potential risks and benefits of securitization. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.
Research perspectives overview at DBNRRC to maintain sustainable food security
USDA-ARS?s Scientific Manuscript database
The research issues that the Dale Bumpers National Rice Research Center (DBNRRC) is addressing for the rice industry and research community are 1) changing rice production practices, 2) diminishing irrigation resources, 3) loss of export markets due to poor quality, 4) emerging high value specialty...
Global Security Sciences Home - Global Security Sciences
Us About Our Research Global Security Sciences Leadership Strategic Initiatives Research Centers Center for Strategic Security Overview Leadership Risk and Infrastructure Science Center Overview Leadership Strategic Alliance for Global Energy Solutions Overview Leadership Systems Science Center Overview
Security for Multimedia Space Data Distribution over the Internet
NASA Technical Reports Server (NTRS)
Stone, Thom; Picinich, Lou; Givens, John J. (Technical Monitor)
1995-01-01
Distribution of interactive multimedia to remote investigators will be required for high quality science on the International Space Station (ISS). The Internet with the World Wide Web (WWW) and the JAVA environment are a good match for distribution of data, video and voice to remote science centers. Utilizing the "open" Internet in a secure manner is the major hurdle in making use of this cost effective, off-the-shelf, universal resource. This paper examines the major security threats to an Internet distribution system for payload data and the mitigation of these threats. A proposed security environment for the Space Station Biological Research Facility (SSBRP) is presented with a short description of the tools that have been implemented or planned. Formulating and implementing a security policy, firewalls, host hardware and software security are also discussed in this paper. Security is a vast topic and this paper can only give an overview of important issues. This paper postulates that a structured approach is required and stresses that security must be built into a network from the start. Ignoring security issues or putting them off until late in the development cycle can be disastrous.
Information Superhighway: An Overview of Technology Challenges. Report to the Congress.
ERIC Educational Resources Information Center
General Accounting Office, Washington, DC.
This report focuses on the pivotal technical issues associated with the National Information Infrastructure program, security and privacy, interoperability, and reliability, and presents the General Accounting Office's findings on these challenges. It is reported that while the structures and services to be offered by the information superhighway…
Peterson, Christopher; Watzlaf, Valerie
2014-01-01
An overview of store and forward applications commonly used in physical and occupational therapy practice is reviewed with respect to regulation, privacy, security, and clinical applications. A privacy and security checklist provides a clear reference of pertinent regulatory issues regarding these software applications. A case study format is used to highlight clinical applications of store and forward software features. Important considerations of successful implementation of store and forward applications are also identified and discussed.
Risk in the Clouds?: Security Issues Facing Government Use of Cloud Computing
NASA Astrophysics Data System (ADS)
Wyld, David C.
Cloud computing is poised to become one of the most important and fundamental shifts in how computing is consumed and used. Forecasts show that government will play a lead role in adopting cloud computing - for data storage, applications, and processing power, as IT executives seek to maximize their returns on limited procurement budgets in these challenging economic times. After an overview of the cloud computing concept, this article explores the security issues facing public sector use of cloud computing and looks to the risk and benefits of shifting to cloud-based models. It concludes with an analysis of the challenges that lie ahead for government use of cloud resources.
Security risks associated with radio frequency identification in medical environments.
Hawrylak, Peter J; Schimke, Nakeisha; Hale, John; Papa, Mauricio
2012-12-01
Radio frequency identification (RFID) is a form of wireless communication that is used to identify assets and people. RFID has significant benefits to the medical environment. However, serious security threats are present in RFID systems that must be addressed in a medical environment. Of particular interest are threats to patient privacy and safety based on interception of messages, interruption of communication, modification of data, and fabrication of messages and devices. This paper presents an overview of these security threats present in RFID systems in a medical environment and provides guidance on potential solutions to these threats. This paper provides a roadmap for researchers and implementers to address the security issues facing RFID in the medical space.
Report on Legal Protection for Databases. A Report of the Register of Copyrights. August, 1997.
ERIC Educational Resources Information Center
Library of Congress, Washington, DC. Copyright Office.
This report gives an overview of the past and present domestic and international legal framework for database protection. It describes database industry practices in securing protection against unauthorized use and Copyright Office registration practices relating to databases. Finally, it discusses issues raised and concerns expressed in a series…
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. House Committee on Appropriations.
In this budget overview, the Secretary of the Department of Health, Education and Welfare, Caspar W. Weinberger and his assistants present testimony and exhibits on the Department's programs. A large portion of the volume pertains to Public Health Service and Social Security Administration matters. Education issues discussed include bilingual…
Draft secure medical database standard.
Pangalos, George
2002-01-01
Medical database security is a particularly important issue for all Healthcare establishments. Medical information systems are intended to support a wide range of pertinent health issues today, for example: assure the quality of care, support effective management of the health services institutions, monitor and contain the cost of care, implement technology into care without violating social values, ensure the equity and availability of care, preserve humanity despite the proliferation of technology etc.. In this context, medical database security aims primarily to support: high availability, accuracy and consistency of the stored data, the medical professional secrecy and confidentiality, and the protection of the privacy of the patient. These properties, though of technical nature, basically require that the system is actually helpful for medical care and not harmful to patients. These later properties require in turn not only that fundamental ethical principles are not violated by employing database systems, but instead, are effectively enforced by technical means. This document reviews the existing and emerging work on the security of medical database systems. It presents in detail the related problems and requirements related to medical database security. It addresses the problems of medical database security policies, secure design methodologies and implementation techniques. It also describes the current legal framework and regulatory requirements for medical database security. The issue of medical database security guidelines is also examined in detailed. The current national and international efforts in the area are studied. It also gives an overview of the research work in the area. The document also presents in detail the most complete to our knowledge set of security guidelines for the development and operation of medical database systems.
mHealth data security: the need for HIPAA-compliant standardization.
Luxton, David D; Kayl, Robert A; Mishkind, Matthew C
2012-05-01
The rise in the use of mobile devices, such as smartphones, tablet personal computers, and wireless medical devices, as well as the wireless networks that enable their use, has raised new concerns for data security and integrity. Standardized Health Insurance Portability and Accountability Act of 1996 (HIPAA)-compliant electronic data security that will allow ubiquitous use of mobile health technologies is needed. The lack of standardized data security to assure privacy, to allow interoperability, and to maximize the full capabilities of mobile devices presents a significant barrier to care. The purpose of this article is to provide an overview of the issue and to encourage discussion of this important topic. Current security needs, standards, limitations, and recommendations for how to address this barrier to care are discussed.
Overview Webinar | Transportation Secure Data Center | NREL
Overview Webinar Overview Webinar This webinar focuses on the Transportation Secure Data Center (TSDC), which serves as a secure area for archiving and accessing detailed transportation data from a
Internet: An Overview of Key Technology Policy Issues Affecting Its Use and Growth
2004-12-29
Alliance OSS Open Source Software SSA Social Security Administration SSN Social Security Number TLD Top Level Domain UCE Unsolicited Commercial E-mail... Alliance General Types of Internet Services B2B Business-to-Business B2G Business-to-Government G2B Government-to-Business G2C Government-to-Citizen G2G...response. Such software is called “adware.” Software CRS-7 programs that include spyware can be sold or provided for free, on a disk (or other media ) or
Overview of Theme Issue with Title "Securing and Supporting Good Teaching: Views from the Schools."
ERIC Educational Resources Information Center
Education and Urban Society, 1985
1985-01-01
Contains 11 articles, including first-person accounts, on the work and work environment of teachers. Discusses the factors that make teaching satisfying or frustrating and offers suggestions for change in both the policy and organizational framework of the schools and the roles, relationships, and ethos knitting together individuals in particular…
Securing Real-Time Sessions in an IMS-Based Architecture
NASA Astrophysics Data System (ADS)
Cennamo, Paolo; Fresa, Antonio; Longo, Maurizio; Postiglione, Fabio; Robustelli, Anton Luca; Toro, Francesco
The emerging all-IP mobile network infrastructures based on 3rd Generation IP Multimedia Subsystem philosophy are characterised by radio access technology independence and ubiquitous connectivity for mobile users. Currently, great focus is being devoted to security issues since most of the security threats presently affecting the public Internet domain, and the upcoming ones as well, are going to be suffered by mobile users in the years to come. While a great deal of research activity, together with standardisation efforts and experimentations, is carried out on mechanisms for signalling protection, very few integrated frameworks for real-time multimedia data protection have been proposed in a context of IP Multimedia Subsystem, and even fewer experimental results based on testbeds are available. In this paper, after a general overview of the security issues arising in an advanced IP Multimedia Subsystem scenario, a comprehensive infrastructure for real-time multimedia data protection, based on the adoption of the Secure Real-Time Protocol, is proposed; then, the development of a testbed incorporating such functionalities, including mechanisms for key management and cryptographic context transfer, and allowing the setup of Secure Real-Time Protocol sessions is presented; finally, experimental results are provided together with quantitative assessments and comparisons of system performances for audio sessions with and without the adoption of the Secure Real-Time Protocol framework.
CTC Sentinel. Volume 7, Issue 3
2014-03-01
foreign fighting, including Finland . In March 2014, the Finnish Security and Intelligence Service (FSIS) stated that over 30 individuals had...hardened jihadists returning to Finland from Syria.5 This article examines the factors that may have contributed to Finnish Muslim participation...Violent Extremism in Finland – Situation Overview 2/2013,” Finland Ministry of the Interior, August 26, 2013. The reports do not clarify whether
ERIC Educational Resources Information Center
General Accounting Office, Washington, DC. Health, Education, and Human Services Div.
Nearly 80 means-tested programs for low-income persons and families have been created by the federal government to help meet the needs of various groups. In fiscal year 1992, the federal government spent about $208 billion through these programs. Evaluation of these programs was based on reports by the General Accounting Office (GAO) and others.…
Tort Suits Against Federal Contractors: An Overview of the Legal Issues
2011-04-07
which has subsets of its own, such as negligent misrepresentation and the doctrine of “informed consent” in medical malpractice . Broadly speaking...for failure to perform). There is also a possibility that the government could assert the state secrets privilege, thereby effectively preventing the...see CRS Report R41741, The State Secrets Privilege: Preventing the Disclosure of Sensitive National Security Information During Civil Litigation
Data Mining and Homeland Security: An Overview
2008-08-27
the data were originally collected. A fourth issue is privacy. Questions that may be considered include the degree to which government agencies...should use and mix commercial data with government data, whether data sources are being used for purposes other than those for which they were originally...2 3 John Makulowich, “ Government Data Mining Systems Defy Definition,” Washington Technology, 22 February 1999, [http://www.washingtontechnology.com
Data Mining and Homeland Security: An Overview
2007-01-18
originally collected. A fourth issue is privacy. Questions that may be considered include the degree to which government agencies should use and mix...commercial data with government data, whether data sources are being used for purposes other than those for which they were originally designed, and...unique or frequently represented. For example, a hardware CRS-2 3 John Makulowich, “ Government Data Mining Systems Defy Definition,” Washington
Data Mining and Homeland Security: An Overview
2008-04-03
the data were originally collected. A fourth issue is privacy. Questions that may be considered include the degree to which government agencies...should use and mix commercial data with government data, whether data sources are being used for purposes other than those for which they were originally...3 John Makulowich, “ Government Data Mining Systems Defy Definition,” Washington Technology, 22 February 1999, [http://www.washingtontechnology.com
Old Buildings Broadband Home Networks: Technologies and Services Overview
NASA Astrophysics Data System (ADS)
Fantacci, Romano; Pecorella, Tommaso; Micciullo, Luigia; Viti, Roberto; Pasquini, Vincenzo; Calì, Marco
2014-05-01
Internet broadband access is becoming a reality in many countries. To fully exploit the benefits from high-speed connection, both suitable home network connectivity and advanced services support have to be made available to the user. In this article, issues relative to the upgrade of existing home networks, particularly in old buildings, together with networking and security requirements are addressed, and possible solutions are proposed.
Airport detectors and orthopaedic implants.
van der Wal, Bart C H; Grimm, Bernd; Heyligers, Ide C
2005-08-01
As a result of the rising threats of terrorism, airport security has become a major issue. Patients with orthopaedic implants are concerned that they may activate alarms at airport security gates. A literature overview showed that the activation rate of the alarm by hand-held detectors is higher than for arch detectors (100% versus 56%). Arch detection rate has significantly increased from 0% before 1995 up to 83.3% after 1994. Reported factors which influence detection rates are implant mass, implant combinations, implant volume, transfer speed, side of implant, detector model, sensitivity settings, material and tissue masking. Detection rate has been improved by more sensitive devices and improved filter software. Doctors should be able to objectively inform patients. A form is presented which will easily inform the airport security staff.
Secure Naming and Addressing Operations for Store, Carry and Forward Networks
NASA Technical Reports Server (NTRS)
Eddy, Wesley M.; Ivancic, William D.; Iannicca, Dennis C.; Ishac, Joseph; Hylton, Alan G.
2014-01-01
This paper describes concepts for secure naming and addressing directed at Store, Carry and Forward (SCF) distributed applications, where disconnection and intermittent connectivity between forwarding systems is the norm. The paper provides a brief overview of store, carry and forward distributed applications followed by an in depth discussion of how to securely: create a namespace; allocate names within the namespace; query for names known within a local processing system or connected subnetwork; validate ownership of a given name; authenticate data from a given name; and, encrypt data to a given name. Critical issues such as revocation of names, mobility and the ability to use various namespaces to secure operations or for Quality-of-Service are also presented. Although the concepts presented for naming and addressing have been developed for SCF, they are directly applicable to fully connected systems.
Murray, P K
1998-08-01
The unique structure, role and operations of government high-security (HS) laboratories which work on animal diseases are described, with particular reference to the laboratories of nine countries. High-security laboratories provide cost-effective insurance against catastrophic losses which could occur following exotic disease outbreaks. The importance of these laboratories is reflected in the fact that several new laboratories have recently been constructed at considerable expense and older facilities have undergone major renovations. Biosecurity is fundamental to the operation of high-security laboratories, so good facility design and microbiological security practices are very important. High-security laboratories conduct exotic disease diagnosis, certification and surveillance, and also perform research into virology, disease pathogenesis and improvements to diagnostic tests and vaccines. The mandate of these laboratories includes the training of veterinarians in the recognition of exotic diseases. One extremely important role is the provision of expert advice on exotic diseases and participation (both nationally and internationally) in policy decisions regarding animal disease issues.
Data Mining and Homeland Security: An Overview
2007-03-28
originally collected. A fourth issue is privacy. Questions that may be considered include the degree to which government agencies should use and mix...commercial data with government data, whether data sources are being used for purposes other than those for which they were originally designed, and...frequently represented. For example, a hardware CRS-2 3 John Makulowich, “ Government Data Mining Systems Defy Definition,” Washington Technology, 22 February
Data Mining and Homeland Security: An Overview
2007-12-05
for which the data were originally collected. A fourth issue is privacy. Questions that may be considered include the degree to which government ...agencies should use and mix commercial data with government data, whether data sources are being used for purposes other than those for which they were...type of CRS-2 3 John Makulowich, “ Government Data Mining Systems Defy Definition,” Washington Technology, 22 February 1999, [http
NASA Technical Reports Server (NTRS)
Tencati, Ron
1991-01-01
An overview is presented of the NASA Science Internet (NSI) security task. The task includes the following: policies and security documentation; risk analysis and management; computer emergency response team; incident handling; toolkit development; user consulting; and working groups, conferences, and committees.
Secure real-time wireless video streaming in the aeronautical telecommunications network
NASA Astrophysics Data System (ADS)
Czernik, Pawel; Olszyna, Jakub
2010-09-01
As Air Traffic Control Systems move from a voice only environment to one in which clearances are issued via data link, there is a risk that an unauthorized entity may attempt to masquerade as either the pilot or controller. In order to protect against this and related attacks, air-ground communications must be secured. The challenge is to add security in an environment in which bandwidth is limited. The Aeronautical Telecommunications Network (ATN) is an enabling digital network communications technology that addresses capacity and efficiency issues associated with current aeronautical voice communication systems. Equally important, the ATN facilitates migration to free flight, where direct computer-to-computer communication will automate air traffic management, minimize controller and pilot workload, and improve overall aircraft routing efficiency. Protecting ATN communications is critical since safety-of-flight is seriously affected if an unauthorized entity, a hacker for example, is able to penetrate an otherwise reliable communications system and accidentally or maliciously introduce erroneous information that jeopardizes the overall safety and integrity of a given airspace. However, an ATN security implementation must address the challenges associated with aircraft mobility, limited bandwidth communication channels, and uninterrupted operation across organizational and geopolitical boundaries. This paper provides a brief overview of the ATN, the ATN security concept, and begins a basic introduction to the relevant security concepts of security threats, security services and security mechanisms. Security mechanisms are further examined by presenting the fundamental building blocks of symmetric encipherment, asymmetric encipherment, and hash functions. The second part of this paper presents the project of cryptographiclly secure wireless communication between Unmanned Aerial Vehicles (UAV) and the ground station in the ATM system, based on the ARM9 processor development kid and Embedded Linux operation system.
2005-03-01
conversations over data networks . Many organizations are replacing portions of their traditional phone systems to gain the benefits of cost savings and...relevant to the Coast Guard. It includes the discussion of the public switched telephone network , an overview of IPT, IPT security issues, the...transmitting voice conversations over data networks . Many organizations are replacing portions of their traditional phone systems to gain the benefits of
Cost/benefit analysis for video security systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1997-01-01
Dr. Don Hush and Scott Chapman, in conjunction with the Electrical and Computer Engineering Department of the University of New Mexico (UNM), have been contracted by Los Alamos National Laboratories to perform research in the area of high security video analysis. The first phase of this research, presented in this report, is a cost/benefit analysis of various approaches to the problem in question. This discussion begins with a description of three architectures that have been used as solutions to the problem of high security surveillance. An overview of the relative merits and weaknesses of each of the proposed systems ismore » included. These descriptions are followed directly by a discussion of the criteria chosen in evaluating the systems and the techniques used to perform the comparisons. The results are then given in graphical and tabular form, and their implications discussed. The project to this point has involved assessing hardware and software issues in image acquisition, processing and change detection. Future work is to leave these questions behind to consider the issues of change analysis - particularly the detection of human motion - and alarm decision criteria. The criteria for analysis in this report include: cost; speed; tradeoff issues in moving primative operations from software to hardware; real time operation considerations; change image resolution; and computational requirements.« less
Kramer, Gregory M; Luxton, David D
2016-04-01
The use of technology to provide telemental healthcare continues to increase; however, little has been written about the legal and regulatory issues involved in providing this form of care to children and adolescents. This article reviews existing laws and regulations to summarize the risk management issues relevant to providing telemental healthcare to children and adolescents. There are several legal and regulatory areas in which telemental health clinicians need to have awareness. These areas include: 1) Licensure, 2) malpractice liability, 3) credentialing and privileging, 4) informed consent, 5) security and privacy, and 6) emergency management. Although legal and regulatory challenges remain in providing telemental healthcare to children and adolescents, it is possible to overcome these challenges with knowledge of the issues and appropriate risk management strategies. We provide general knowledge of these key legal and regulatory issues, along with some risk management recommendations.
Security policies and trust in ubiquitous computing.
Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand
2008-10-28
Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.
Intelligent home risk assessment systems and integration with biometric identification
NASA Astrophysics Data System (ADS)
Roper, William E.
2003-08-01
An overview is given of the Home of the 21st Century Laboratory. The laboratory is operated as a joint program with America-On-Line and George Washington University. The program is described with illustrations and discussion of the systems that are part of the laboratory. The concept of application for face recognition systems in the intelligent home of the future is presented and some initial approaches in using biometrics are shown. Issues of privacy and sharing of information within and outside the home are addressed. Issues include safety and security concerns vs. inappropriate observations of activities in and outside the home. Technology options currently available for application in the home are described and assessed.
Overview of Accelerator Applications for Security and Defense
Antolak, Arlyn J.
2015-01-01
Particle accelerators play a key role in a broad set of defense and security applications including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat for developing a radiological dispersal device and be used to produce isotopes for medical, industrial, and re-search purposes. Lastly, we present an overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security.
Managing vulnerabilities and achieving compliance for Oracle databases in a modern ERP environment
NASA Astrophysics Data System (ADS)
Hölzner, Stefan; Kästle, Jan
In this paper we summarize good practices on how to achieve compliance for an Oracle database in combination with an ERP system. We use an integrated approach to cover both the management of vulnerabilities (preventive measures) and the use of logging and auditing features (detective controls). This concise overview focusses on the combination Oracle and SAP and it’s dependencies, but also outlines security issues that arise with other ERP systems. Using practical examples, we demonstrate common vulnerabilities and coutermeasures as well as guidelines for the use of auditing features.
Tejero, Antonio; de la Torre, Isabel
2012-10-01
E-Health systems are experiencing an impulse in these last years, when many medical agencies began to include digital solutions into their platforms. Electronic Health Records (EHRs) are one of the most important improvements, being in its most part a patient-oriented tool. To achieve a completely operational EHR platform, security and privacy problems have to be resolved, due to the importance of the data included within these records. But given all the different methods to address security and privacy, they still remain in most cases as an open issue. This paper studies existing and proposed solutions included in different scenarios, in order to offer an overview of the current state in EHR systems. Bibliographic material has been obtained mainly from MEDLINE and SCOPUS sources, and over 30 publications have been analyzed. Many EHR platforms are being developed, but most of them present weaknesses when they are opened to the public. These architectures gain significance when they cover all the requisites related to security and privacy.
Boulos, Maged N Kamel; Curtis, Andrew J; Abdelmalik, Philip
2009-07-20
This paper offers a state-of-the-art overview of the intertwined privacy, confidentiality, and security issues that are commonly encountered in health research involving disaggregate geographic data about individuals. Key definitions are provided, along with some examples of actual and potential security and confidentiality breaches and related incidents that captured mainstream media and public interest in recent months and years. The paper then goes on to present a brief survey of the research literature on location privacy/confidentiality concerns and on privacy-preserving solutions in conventional health research and beyond, touching on the emerging privacy issues associated with online consumer geoinformatics and location-based services. The 'missing ring' (in many treatments of the topic) of data security is also discussed. Personal information and privacy legislations in two countries, Canada and the UK, are covered, as well as some examples of recent research projects and events about the subject. Select highlights from a June 2009 URISA (Urban and Regional Information Systems Association) workshop entitled 'Protecting Privacy and Confidentiality of Geographic Data in Health Research' are then presented. The paper concludes by briefly charting the complexity of the domain and the many challenges associated with it, and proposing a novel, 'one stop shop' case-based reasoning framework to streamline the provision of clear and individualised guidance for the design and approval of new research projects (involving geographical identifiers about individuals), including crisp recommendations on which specific privacy-preserving solutions and approaches would be suitable in each case.
Boulos, Maged N Kamel; Curtis, Andrew J; AbdelMalik, Philip
2009-01-01
This paper offers a state-of-the-art overview of the intertwined privacy, confidentiality, and security issues that are commonly encountered in health research involving disaggregate geographic data about individuals. Key definitions are provided, along with some examples of actual and potential security and confidentiality breaches and related incidents that captured mainstream media and public interest in recent months and years. The paper then goes on to present a brief survey of the research literature on location privacy/confidentiality concerns and on privacy-preserving solutions in conventional health research and beyond, touching on the emerging privacy issues associated with online consumer geoinformatics and location-based services. The 'missing ring' (in many treatments of the topic) of data security is also discussed. Personal information and privacy legislations in two countries, Canada and the UK, are covered, as well as some examples of recent research projects and events about the subject. Select highlights from a June 2009 URISA (Urban and Regional Information Systems Association) workshop entitled 'Protecting Privacy and Confidentiality of Geographic Data in Health Research' are then presented. The paper concludes by briefly charting the complexity of the domain and the many challenges associated with it, and proposing a novel, 'one stop shop' case-based reasoning framework to streamline the provision of clear and individualised guidance for the design and approval of new research projects (involving geographical identifiers about individuals), including crisp recommendations on which specific privacy-preserving solutions and approaches would be suitable in each case. PMID:19619311
National ITS architecture security
DOT National Transportation Integrated Search
2003-10-01
This Security Document presents an overview of security as it is represented in the National ITS Architecture and provides guidance for using the security-related parts of the National ITS Architecture. The objective of security, in the context of th...
Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview
NASA Astrophysics Data System (ADS)
Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan
2017-08-01
The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Igure, V. M.; Williams, R. D.
2006-07-01
Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less
Improving Patient Safety in Hospitals through Usage of Cloud Supported Video Surveillance.
Dašić, Predrag; Dašić, Jovan; Crvenković, Bojan
2017-04-15
Patient safety in hospitals is of equal importance as providing treatments and urgent healthcare. With the development of Cloud technologies and Big Data analytics, it is possible to employ VSaaS technology virtually anywhere, for any given security purpose. For the listed benefits, in this paper, we give an overview of the existing cloud surveillance technologies which can be implemented for improving patient safety. Modern VSaaS systems provide higher elasticity and project scalability in dealing with real-time information processing. Modern surveillance technologies can prove to be an effective tool for prevention of patient falls, undesired movement and tempering with attached life supporting devices. Given a large number of patients who require constant supervision, a cloud-based monitoring system can dramatically reduce the occurring costs. It provides continuous real-time monitoring, increased overall security and safety, improved staff productivity, prevention of dishonest claims and long-term digital archiving. Patient safety is a growing issue which can be improved with the usage of high-end centralised surveillance systems allowing the staff to focus more on treating health issues rather that keeping a watchful eye on potential incidents.
The Privacy and Security Implications of Open Data in Healthcare.
Kobayashi, Shinji; Kane, Thomas B; Paton, Chris
2018-04-22
The International Medical Informatics Association (IMIA) Open Source Working Group (OSWG) initiated a group discussion to discuss current privacy and security issues in the open data movement in the healthcare domain from the perspective of the OSWG membership. Working group members independently reviewed the recent academic and grey literature and sampled a number of current large-scale open data projects to inform the working group discussion. This paper presents an overview of open data repositories and a series of short case reports to highlight relevant issues present in the recent literature concerning the adoption of open approaches to sharing healthcare datasets. Important themes that emerged included data standardisation, the inter-connected nature of the open source and open data movements, and how publishing open data can impact on the ethics, security, and privacy of informatics projects. The open data and open source movements in healthcare share many common philosophies and approaches including developing international collaborations across multiple organisations and domains of expertise. Both movements aim to reduce the costs of advancing scientific research and improving healthcare provision for people around the world by adopting open intellectual property licence agreements and codes of practice. Implications of the increased adoption of open data in healthcare include the need to balance the security and privacy challenges of opening data sources with the potential benefits of open data for improving research and healthcare delivery. Georg Thieme Verlag KG Stuttgart.
Implementing an electronic medication overview in Belgium.
Storms, Hannelore; Marquet, Kristel; Nelissen, Katherine; Hulshagen, Leen; Lenie, Jan; Remmen, Roy; Claes, Neree
2014-12-16
An accurate medication overview is essential to reduce medication errors. Therefore, it is essential to keep the medication overview up-to-date and to exchange healthcare information between healthcare professionals and patients. Digitally shared information yields possibilities to improve communication. However, implementing a digitally shared medication overview is challenging. This articles describes the development process of a secured, electronic platform designed for exchanging medication information as executed in a pilot study in Belgium, called "Vitalink". The goal of "Vitalink" is to improve the exchange of medication information between professionals working in healthcare and patients in order to achieve a more efficient cooperation and better quality of care. Healthcare professionals of primary and secondary health care and patients of four Belgian regions participated in the project. In each region project groups coordinated implementation and reported back to the steering committee supervising the pilot study. The electronic medication overview was developed based on consensus in the project groups. The steering committee agreed to establish secured and authorized access through the use of electronic identity documents (eID) and a secured, eHealth-platform conform prior governmental regulations regarding privacy and security of healthcare information. A successful implementation of an electronic medication overview strongly depends on the accessibility and usability of the tool for healthcare professionals. Coordinating teams of the project groups concluded, based on their own observations and on problems reported to them, that secured and quick access to medical data needed to be pursued. According to their observations, the identification process using the eHealth platform, crucial to ensure secured data, was very time consuming. Secondly, software packages should meet the needs of their users, thus be adapted to daily activities of healthcare professionals. Moreover, software should be easy to install and run properly. The project would have benefited from a cost analysis executed by the national bodies prior to implementation.
Impacts of Vehicle (In)Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chugg, J.; Rohde, K.
Nuclear and radioactive material is routinely transported worldwide every day. Since 2010, the complexity of the transport vehicle to support such activities has grown exponentially. Many core functions of a vehicle are now handled by small embedded computer modules with more being added each year to enhance the owner’s experience and convenience. With a system as complex as today’s automobile, the potential for cyber security issues is certain. Hackers have begun exploring this new domain with public information increasingly disseminated. Because vehicles are allowed into and around secure nuclear facilities, the potential for using a vehicle as a new cybermore » entry point or vector into the facility is now plausible and must be mitigated. In addition, compromising such a vehicle could aide in illicit removal of nuclear material, putting sensitive cargo at risk. Because cyber attacks can now be introduced using vehicles, cyber security, needs to be integrated into an organization’s design basis threat document. Essentially, a vehicle now extends the perimeter for which security professionals are responsible.Electronic Control Units (ECU) responsible for handling all core and ancillary vehicle functions are interconnected using the controller area network (CAN) bus. A typical CAN network in a modern automobile contains 50 or more ECUs. The CAN protocol now supports a wide variety of areas, including automotive, road transportation, rail transportation, industrial automation, power generation, maritime, military vehicles, aviation, and medical devices. In many ways, the nuclear industry is employing the CAN bus protocol or other similar broadcast serial networks. This paper will provide an overview of the current state of automobile and CAN Bus security, as well as an overview of what has been publicly disclosed by many research organizations. It will then present several hypotheses of how vehicle security issues may impact nuclear activities. An initial discussion of how a vehicle can be used as a new threat vector to penetrate secure facilities will be presented. This includes how a modern automobile can be used as the exploitation mechanism for nearby devices such as laptops, cell phones, and wireless access points. Additional discussion will highlight how vehicle security might impact transportation of nuclear material through remote exploitation of a moving vehicle. The final discussion will include what possible implications might be relative to the physical protection systems at nuclear facilities. The audience will also be given details regarding the complexity of attack, thus implying the likelihood of successful exploitation, and information on how such attacks may be mitigated. Emerging security products for automobiles will be discussed and other mitigation methods will be detailed (e.g. disabling vehicle cellular modems). As a result, the audience will have a greater understanding of how to add vehicle security as a part of a comprehensive nuclear security policy.Finally, this paper will highlight the similarities between CAN Bus and other broadcast serial bus networks such as Profibus or DeviceNet, helping educate the reader on how susceptible this type of networking is to nefarious attacks and how it might affect components connected to many different nuclear systems, including control systems, safety systems, emergency systems, and support systems.« less
Current Trends in Retirement: Implications for Career Counseling and Vocational Psychology
Lytle, Megan C.; Clancy, Megan E.; Foley, Pamela F.; Cotter, Elizabeth W.
2015-01-01
This paper provides an overview of emerging trends in retirement, examines demographic trends in the labor force, and provides practical recommendations for working with older workers across cultures (e.g., women and racial/ethnic minorities, among others). Increasingly, older workers in the United States remain in the workforce for reasons related to financial security, healthcare, and personal fulfillment. Although retirement trends have become more complex, there is limited empirical literature addressing this issue and the research available does not attend to the needs of a diverse workforce. Therefore, implications for training, practice, advocacy, and research with regards to working with older workers across cultures (e.g., women and racial/ethnic minorities, among others) are provided. Keywords: Cross-cultural/multicultural career issues, career development stages, elderly employees, career/vocational education/guidance PMID:26034345
2012-06-01
brianmccue@alum.mit.edu Letters to the Editor, John Willis, Augustine Consulting, Inc., jwillis@aciedge.com Modeling and Simulation , James N. Bexfield, FS, OSD...concepts that are now being applied to modern analytical thinking. The tuto- rials are free to MORS members and $75 for the day for nonmembers. The...Overview of Agent- based Modeling and Simulation and Complex Adaptive Systems • Visual Data Analysis • Analyzing Combat Identification • Guidelines for
Towards pervasive computing in health care - a literature review.
Orwat, Carsten; Graefe, Andreas; Faulwasser, Timm
2008-06-19
The evolving concepts of pervasive computing, ubiquitous computing and ambient intelligence are increasingly influencing health care and medicine. Summarizing published research, this literature review provides an overview of recent developments and implementations of pervasive computing systems in health care. It also highlights some of the experiences reported in deployment processes. There is no clear definition of pervasive computing in the current literature. Thus specific inclusion criteria for selecting articles about relevant systems were developed. Searches were conducted in four scientific databases alongside manual journal searches for the period of 2002 to 2006. Articles included present prototypes, case studies and pilot studies, clinical trials and systems that are already in routine use. The searches identified 69 articles describing 67 different systems. In a quantitative analysis, these systems were categorized into project status, health care settings, user groups, improvement aims, and systems features (i.e., component types, data gathering, data transmission, systems functions). The focus is on the types of systems implemented, their frequency of occurrence and their characteristics. Qualitative analyses were performed of deployment issues, such as organizational and personnel issues, privacy and security issues, and financial issues. This paper provides a comprehensive access to the literature of the emerging field by addressing specific topics of application settings, systems features, and deployment experiences. Both an overview and an analysis of the literature on a broad and heterogeneous range of systems are provided. Most systems are described in their prototype stages. Deployment issues, such as implications on organization or personnel, privacy concerns, or financial issues are mentioned rarely, though their solution is regarded as decisive in transferring promising systems to a stage of regular operation. There is a need for further research on the deployment of pervasive computing systems, including clinical studies, economic and social analyses, user studies, etc.
Energy Independence and Security Act of 2007
This page provides an overview of the Energy Independence and Security Act (EISA) of 2007, which aims to increase U.S. energy security, develop renewable energy production, and improve vehicle fuel economy.
Spanakis, Emmanouil G; Spanakis, Marios; Karantanas, Apostolos; Marias, Kostas
2016-08-01
The most commonly used method for user authentication in ICT services or systems is the application of identification tools such as passwords or personal identification numbers (PINs). The rapid development in ICT technology regarding smart devices (laptops, tablets and smartphones) has allowed also the advance of hardware components that capture several biometric traits such as fingerprints and voice. These components are aiming among others to overcome weaknesses and flaws of password usage under the prism of improved user authentication with higher level of security, privacy and usability. To this respect, the potential application of biometrics for secure user authentication regarding access in systems with sensitive data (i.e. patient's data from electronic health records) shows great potentials. SpeechXRays aims to provide a user recognition platform based on biometrics of voice acoustics analysis and audio-visual identity verification. Among others, the platform aims to be applied as an authentication tool for medical personnel in order to gain specific access to patient's electronic health records. In this work a short description of SpeechXrays implementation tool regarding eHealth is provided and analyzed. This study explores security and privacy issues, and offers a comprehensive overview of biometrics technology applications in addressing the e-Health security challenges. We present and describe the necessary requirement for an eHealth platform concerning biometric security.
Addressing global change challenges for Central Asian socio-ecosystems
NASA Astrophysics Data System (ADS)
Qi, Jiaguo; Bobushev, Temirbek S.; Kulmatov, Rashid; Groisman, Pavel; Gutman, Garik
2012-06-01
Central Asia is one of the most vulnerable regions on the planet earth to global climate change, depending on very fragile natural resources. The Soviet legacy has left the five countries (Kazakhstan, Tajikistan, Kyrgyzstan, Turkmenistan, and Uzbekistan) with a highly integrated system but they are facing great challenges with tensions that hinder regional coordination of food and water resources. With increasing climate variability and warming trend in the region, food and water security issues become even more crucial now and, if not addressed properly, could affect the regional stability. The long-term drivers of these two most critical elements, food and water, are climate change; the immediate and probably more drastic factors affecting the food and water security are land uses driven by institutional change and economic incentives. As a feedback, changes in land use and land cover have directly implications on water uses, food production, and lifestyles of the rural community in the region. Regional and international efforts have been made to holistically understand the cause, extent, rate and societal implications of land use changes in the region. Much of these have been understood, or under investigation by various projects, but solutions or research effort to develop solutions, to these urgent regional issues are lacking. This article, serves as an introduction to the special issue, provides a brief overview of the challenges facing the Central Asian countries and various international efforts in place that resulted in the publications of this special issue.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Weston, B.H.
This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview.
Improving Patient Safety in Hospitals through Usage of Cloud Supported Video Surveillance
Dašić, Predrag; Dašić, Jovan; Crvenković, Bojan
2017-01-01
BACKGROUND: Patient safety in hospitals is of equal importance as providing treatments and urgent healthcare. With the development of Cloud technologies and Big Data analytics, it is possible to employ VSaaS technology virtually anywhere, for any given security purpose. AIM: For the listed benefits, in this paper, we give an overview of the existing cloud surveillance technologies which can be implemented for improving patient safety. MATERIAL AND METHODS: Modern VSaaS systems provide higher elasticity and project scalability in dealing with real-time information processing. Modern surveillance technologies can prove to be an effective tool for prevention of patient falls, undesired movement and tempering with attached life supporting devices. Given a large number of patients who require constant supervision, a cloud-based monitoring system can dramatically reduce the occurring costs. It provides continuous real-time monitoring, increased overall security and safety, improved staff productivity, prevention of dishonest claims and long-term digital archiving. CONCLUSION: Patient safety is a growing issue which can be improved with the usage of high-end centralised surveillance systems allowing the staff to focus more on treating health issues rather that keeping a watchful eye on potential incidents. PMID:28507610
NASA Technical Reports Server (NTRS)
Goseva-Popstojanova, Katerina; Tyo, Jacob P.; Sizemore, Brian
2017-01-01
NASA develops, runs, and maintains software systems for which security is of vital importance. Therefore, it is becoming an imperative to develop secure systems and extend the current software assurance capabilities to cover information assurance and cybersecurity concerns of NASA missions. The results presented in this report are based on the information provided in the issue tracking systems of one ground mission and one flight mission. The extracted data were used to create three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified the software bugs that are security related and classified them in specific security classes. This information was then used to create the security vulnerability profiles (i.e., to determine how, why, where, and when the security vulnerabilities were introduced) and explore the existence of common trends. The main findings of our work include:- Code related security issues dominated both the Ground and Flight mission IVV security issues, with 95 and 92, respectively. Therefore, enforcing secure coding practices and verification and validation focused on coding errors would be cost effective ways to improve mission's security. (Flight mission Developers issues dataset did not contain data in the Issue Category.)- In both the Ground and Flight mission IVV issues datasets, the majority of security issues (i.e., 91 and 85, respectively) were introduced in the Implementation phase. In most cases, the phase in which the issues were found was the same as the phase in which they were introduced. The most security related issues of the Flight mission Developers issues dataset were found during Code Implementation, Build Integration, and Build Verification; the data on the phase in which these issues were introduced were not available for this dataset.- The location of security related issues, as the location of software issues in general, followed the Pareto principle. Specifically, for all three datasets, from 86 to 88 the security related issues were located in two to four subsystems.- The severity levels of most security issues were moderate, in all three datasets.- Out of 21 primary security classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, these classes contributed from around 80 to 90 of all security issues in each dataset. This again proves the Pareto principle of uneven distribution of security issues, in this case across CWE classes, and supports the fact that addressing these dominant security classes provides the most cost efficient way to improve missions' security. The findings presented in this report uncovered the security vulnerability profiles and identified the common trends and dominant classes of security issues, which in turn can be used to select the most efficient secure design and coding best practices compiled by the part of the SARP project team associated with the NASA's Johnson Space Center. In addition, these findings provide valuable input to the NASA IVV initiative aimed at identification of the two 25 CWEs of ground and flight missions.
Port Security: A National Planning Guide
DOT National Transportation Integrated Search
1997-01-01
Port Security: A National Planning Guide has been produced for the purpose of conveying the United States Department of Transportations policy perspective on port security to the maritime community. This guide provides an overview of the essential as...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Halvorson, C S
The FY09 budgets for homeland security research and development programs in the U.S. are summarized. Homeland security policy developments that can influence future efforts are discussed. Initial indications of the new administration direction on homeland security R&D are summarized. An overview of the Optics and Photonics in Global Homeland Security V conference is presented.
Security Aspects of an Enterprise-Wide Network Architecture.
ERIC Educational Resources Information Center
Loew, Robert; Stengel, Ingo; Bleimann, Udo; McDonald, Aidan
1999-01-01
Presents an overview of two projects that concern local area networks and the common point between networks as they relate to network security. Discusses security architectures based on firewall components, packet filters, application gateways, security-management components, an intranet solution, user registration by Web form, and requests for…
Information Systems, Security, and Privacy.
ERIC Educational Resources Information Center
Ware, Willis H.
1984-01-01
Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)
E-mail security. An overview of threats and safeguards.
Stine, Kevin; Scholl, Matthew
2010-04-01
Not everyone in the organization needs to know how to secure the e-mail service, but anyone who handles patient information must understand e-mail's vulnerabilities and recognize when a system is secure enough to transmit sensitive information.
5 CFR 9701.314 - DHS responsibilities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 9701.314 Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.314 DHS...
Virtual Organizations: An Overview
NASA Astrophysics Data System (ADS)
Nami, Mohammad Reza
The need to remain competitive in the open market forces companies to concentrate on their core competencies while searching for alliances when additional skills or resources are needed to fulfill business opportunities. The changing business situation of companies and customer needs have motivated researchers to introduce Virtual Organization (VO) idea. A Virtual Organization is always a form of partnership and managing partners and handling partnerships are crucial. Virtual organizations are defined as a temporary collection of enterprises that cooperate and share resources, knowledge, and competencies to better respond to business opportunities. This paper presents base concepts of virtual organizations including properties, management concepts, operational concepts, and main issues in collaboration such as security and authentication.
Information superhighway: Issues affecting development
NASA Astrophysics Data System (ADS)
1994-09-01
Technological advances in the transmission of voice, video, and data are fostering fundamental changes in the telecommunications industry. For example, large local telephone companies plan to offer video services in competition with cable and broadcast television, while cable television companies plan to offer local telephone service over their wires in competition with the local telephone companies. The administration believes that these technological changes provide the opportunity to develop an 'Information Superhighway' that could provide every element of society with ready access to data, voice, and video communications. Concurrently, the Congress is considering sweeping changes to telecommunications regulations to keep pace with this dynamic industry. GAO prepared this report to serve as an overview of three key issues that decisionmakers may face as they deliberate telecommunications legislation; it focuses on three pivotal issues they face in formulating new telecommunications legislation: (1) managing the transition to a more competitive local telecommunications marketplace; (2) ensuring that all consumers have access to affordable telecommunications as competition develops; and (3) ensuring that the Information Superhighway provides adequate security, privacy, reliability, and interoperability.
Security and health research databases: the stakeholders and questions to be addressed.
Stewart, Sara
2006-01-01
Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.
20 CFR 422.603 - Overview of the review process.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Overview of the review process. 422.603 Section 422.603 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Administrative Review Process Under the Coal Industry Retiree Health Benefit Act of 1992 § 422.603 Overview of...
20 CFR 422.603 - Overview of the review process.
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Overview of the review process. 422.603 Section 422.603 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Administrative Review Process Under the Coal Industry Retiree Health Benefit Act of 1992 § 422.603 Overview of...
20 CFR 422.603 - Overview of the review process.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Overview of the review process. 422.603 Section 422.603 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Administrative Review Process Under the Coal Industry Retiree Health Benefit Act of 1992 § 422.603 Overview of...
20 CFR 422.603 - Overview of the review process.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Overview of the review process. 422.603 Section 422.603 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ORGANIZATION AND PROCEDURES Administrative Review Process Under the Coal Industry Retiree Health Benefit Act of 1992 § 422.603 Overview of...
15 CFR 710.4 - Overview of scheduled chemicals and examples of affected industries.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS GENERAL INFORMATION AND OVERVIEW OF THE CHEMICAL WEAPONS CONVENTION... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Overview of scheduled chemicals and...
15 CFR 732.1 - Steps overview.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Steps overview. 732.1 Section 732.1... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS STEPS FOR USING THE EAR § 732.1 Steps overview. (a)(1) Introduction. In this part, references to the EAR are references to 15...
Security for IP Multimedia Services in the 3GPP Third Generation Mobile System.
ERIC Educational Resources Information Center
Horn, G.; Kroselberg, D.; Muller, K.
2003-01-01
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
OverView of Space Applications for Environment (SAFE) initiative
NASA Astrophysics Data System (ADS)
Hamamoto, Ko; Fukuda, Toru; Tajima, Yoshimitsu; Takeuchi, Wataru; Sobue, Shinichi; Nukui, Tomoyuki
2014-06-01
Climate change and human activities have a direc or indirect influence on the acceleration of environmental problems and natural hazards such as forest fires, draughts and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these disasters and related phenomenon. However, there are still gaps between science and application of satellite technology in real-world usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of satellite technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of satellite technology. This paper describes the overview of SAFE initiative and outcomes of two selected prototypes; agricultural drought monitoring in Indonesia and coastal management in Sri Lanka, as well as the current status of on-going prototypes.
Utilization of Space: Today and Tomorrow
NASA Astrophysics Data System (ADS)
Feuerbacher, Berndt; Stoewer, Heinz
2006-01-01
Almost 50 years after the launch of Sputnik, the diversity and criticality of the technology and applications already in place to exploit the 'high-frontier' is impressive. And it is no exaggeration to state that a precondition for meeting human needs, coping with environmental problems, and maintaining security is the successful exploitation of space. Yet no one overview exists to document what we have so far done, and soon plan to accomplish, to utilize the near-Earth space environment. Utilization of Space aims to serve as an authoritative overview for professionals and interested laymen by explaining scientific space utilisation, commercial and entrepreneurial issues, and technological applications. The chapters are written by leading specialists in the respective fields and on a level comprehensible to an educated, but not necessarily technically-trained, reader. Enhanced by informative color illustrations, it is intended not only to transmit useful and timely information to readers, but also to share with them the fascination attached to space activities experienced by those actively engaged in them.
Olsson, I Anna S; Silva, Sandra Pinto da; Townend, David; Sandøe, Peter
2016-05-01
In 1986, European Directive 86/609/EEC, regulating the use of animals in research, was one of the first examples of common legislation to set standards for animal protection across the Member States of the former European Economic Community, now the European Union, with the aim of securing a level European playing field. Starting in 2002, a process of revising European animal experimentation legislation was undertaken, with one of its key aims being to ensure high standards of welfare for laboratory animals across Europe. This resulted in Directive 2010/63/EU, which has regulated this activity in Europe since 2013. Since this is a European Union Directive, transposition into national legislation is a necessary and important part of the implementation of the new legislation. This paper gives an overview of the transposition process followed by an analysis of the potential to reach the different objectives of the directive, particularly with a focus on securing the same high standards of animal protection across member countries. The analysis focuses on three separate issues: (1) minimum standards for laboratory animal housing and care, (2) restrictions on the use of certain animal species, and (3) project review and authorization. © The Author 2016. Published by Oxford University Press on behalf of the Institute for Laboratory Animal Research. All rights reserved. For permissions, please email: journals.permissions@oup.com.
Overview of Computer Security Certification and Accreditation. Final Report.
ERIC Educational Resources Information Center
Ruthberg, Zella G.; Neugent, William
Primarily intended to familiarize ADP (automatic data processing) policy and information resource managers with the approach to computer security certification and accreditation found in "Guideline to Computer Security Certification and Accreditation," Federal Information Processing Standards Publications (FIPS-PUB) 102, this overview…
5 CFR 9701.313 - Homeland Security Compensation Committee.
Code of Federal Regulations, 2010 CFR
2010-01-01
... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... Undersecretary for Management. The Compensation Committee has 14 members, including 4 officials of labor...
Assessing the Security of Connected Diabetes Devices.
Out, Dirk-Jan; Tettero, Olaf
2017-03-01
This article discusses the assessment of the (cyber)security of wirelessly connected diabetes devices under the DTSEC standard. We discuss the relation between diabetes devices and hackers, provide an overview of the DTSEC standard, and describe the process of security assessment of diabetes devices.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McKinnon, Archibald D.; Thompson, Seth R.; Doroshchuk, Ruslan A.
mart grid technologies are transforming the electric power grid into a grid with bi-directional flows of both power and information. Operating millions of new smart meters and smart appliances will significantly impact electric distribution systems resulting in greater efficiency. However, the scale of the grid and the new types of information transmitted will potentially introduce several security risks that cannot be addressed by traditional, centralized security techniques. We propose a new bio-inspired cyber security approach. Social insects, such as ants and bees, have developed complex-adaptive systems that emerge from the collective application of simple, light-weight behaviors. The Digital Ants frameworkmore » is a bio-inspired framework that uses mobile light-weight agents. Sensors within the framework use digital pheromones to communicate with each other and to alert each other of possible cyber security issues. All communication and coordination is both localized and decentralized thereby allowing the framework to scale across the large numbers of devices that will exist in the smart grid. Furthermore, the sensors are light-weight and therefore suitable for implementation on devices with limited computational resources. This paper will provide a brief overview of the Digital Ants framework and then present results from test bed-based demonstrations that show that Digital Ants can identify a cyber attack scenario against smart meter deployments.« less
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE... the screening threshold quantity by security issue. (a) General. In calculating whether a facility...
Minimum Requirements for the CUS (Common User Subsystem) Workstation
1987-04-20
PAGE -2- / ’ " I& REPORT SECURITY CLASSIFICATION lb RESTRICTIVE MARKINGS Unclassified 2a SECURITY CLASSIFICATION AUTHORITY 3 DISTRMBUTION...CLASSIFICATION UNCLASSIID/UNLIMITED r" SAME AS RPT. [ 3 DTIC USERS Unclassified tNM F RESPONSIBLE INDIVIDUAL 22b TELEPHONE (Include area codi) 22c OFFICE...Summary 1 1. Introduction 3 1.1 Purpose 3 1.2 Scope 3 1.3 Reference 4 2. Background 5 3 . Minimal WIS Workstation Requirements 8 3.1 Overview 8 4. Overview
5 CFR 9701.313 - Homeland Security Compensation Committee.
Code of Federal Regulations, 2011 CFR
2011-01-01
... MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Pay and Pay Administration Overview of Pay System § 9701.313... to provide options and/or recommendations for consideration by the Secretary or designee on strategic...
Assessing the Security of Connected Diabetes Devices
Out, Dirk-Jan; Tettero, Olaf
2017-01-01
This article discusses the assessment of the (cyber)security of wirelessly connected diabetes devices under the DTSEC standard. We discuss the relation between diabetes devices and hackers, provide an overview of the DTSEC standard, and describe the process of security assessment of diabetes devices. PMID:28264190
Sources of Conflict in the 21st Century; Regional Futures and U.S. Strategy
1998-01-01
with an overview of global trends in the strategic environment. Each of the regional assessments-covering Asia, the greater Middle East, and Europe and...5 Chapter Two OVERVIEW OF THE FUTURE SECURITY ENVIRONMENT ........................... 7 Introduction .................................. 7...43 Overview ..................................... 45 Explaining the Rise of Asia ...................... 46 Surveying
DOT National Transportation Integrated Search
1996-09-01
While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...
Towards pervasive computing in health care – A literature review
Orwat, Carsten; Graefe, Andreas; Faulwasser, Timm
2008-01-01
Background The evolving concepts of pervasive computing, ubiquitous computing and ambient intelligence are increasingly influencing health care and medicine. Summarizing published research, this literature review provides an overview of recent developments and implementations of pervasive computing systems in health care. It also highlights some of the experiences reported in deployment processes. Methods There is no clear definition of pervasive computing in the current literature. Thus specific inclusion criteria for selecting articles about relevant systems were developed. Searches were conducted in four scientific databases alongside manual journal searches for the period of 2002 to 2006. Articles included present prototypes, case studies and pilot studies, clinical trials and systems that are already in routine use. Results The searches identified 69 articles describing 67 different systems. In a quantitative analysis, these systems were categorized into project status, health care settings, user groups, improvement aims, and systems features (i.e., component types, data gathering, data transmission, systems functions). The focus is on the types of systems implemented, their frequency of occurrence and their characteristics. Qualitative analyses were performed of deployment issues, such as organizational and personnel issues, privacy and security issues, and financial issues. This paper provides a comprehensive access to the literature of the emerging field by addressing specific topics of application settings, systems features, and deployment experiences. Conclusion Both an overview and an analysis of the literature on a broad and heterogeneous range of systems are provided. Most systems are described in their prototype stages. Deployment issues, such as implications on organization or personnel, privacy concerns, or financial issues are mentioned rarely, though their solution is regarded as decisive in transferring promising systems to a stage of regular operation. There is a need for further research on the deployment of pervasive computing systems, including clinical studies, economic and social analyses, user studies, etc. PMID:18565221
Incentive Issues in Information Security Management
ERIC Educational Resources Information Center
Lee, Chul Ho
2012-01-01
This dissertation studies three incentive issues in information security management. The first essay studies contract issues between a firm that outsources security functions and a managed security service provider (MSSP) that provides security functions to the firm. Since MSSP and firms cannot observe each other's actions, both can suffer…
Sun, Xiaodong; Keim, Mark; Dong, Chen; Mahany, Mollie; Guo, Xiang
2014-01-01
Reports of health issues related to mass gatherings around the world have indicated a potential for public health and medical emergencies to occur on a scale that could place a significant impact on business continuity for national and international organisations. This paper describes a risk assessment process for business continuity management that was performed as part of the planning efforts related to the World Expo 2010 Shanghai China (Expo), the world's largest mass gathering to date. Altogether, 73 million visitors attended the Expo, generating over US$2bn of revenue. During 2008 to 2010, the Shanghai Municipal Center for Disease Control and Prevention performed a dynamic series of four disaster risk assessments before and during the Expo. The purpose of this assessment process was to identify, analyse and evaluate risks for public health security during different stages of the Expo. This paper describes an overview of the novel approach for this multiple and dynamic process of assessment of health security risk for ensuring business continuity.
Cyber security risk assessment for SCADA and DCS networks.
Ralston, P A S; Graham, J H; Hieb, J L
2007-10-01
The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure.
The School Office: An Overview.
ERIC Educational Resources Information Center
Hudson, Randy
2000-01-01
Presents an overview of the fundamental principles of school office design that remain constant despite changes in building technologies, and technological and spatial flexibility. Principles discussed include the school office and traffic patterns, security, and visitor reception requirements. (GR)
Is Seeing Believing? Training Users on Information Security: Evidence from Java Applets
ERIC Educational Resources Information Center
Ayyagari, Ramakrishna; Figueroa, Norilyz
2017-01-01
Information Security issues are one of the top concerns of CEOs. Accordingly, information systems education and research have addressed security issues. One of the main areas of research is the behavioral issues in Information Security, primarily focusing on users' compliance to information security policies. We contribute to this literature by…
Individual social security accounts: issues in assessing administrative feasibility and costs.
Olsen, K A; Salisbury, D L
1998-11-01
Whether to add individual accounts (IAs) to the Social Security system is a highly political issue. But almost lost in the debate so far have been any practical considerations about how to administer such accounts. Any discussion of whether to create individual accounts must also address the basic but critical questions of how they would work: Who would run them? What would they cost? Logistically, are they even possible? This EBRI Issue Brief provides an overview of the most salient administrative issues facing the current Social Security reform debate--issues that challenge proponents to carefully think through how their proposals could be implemented so as to achieve their policy goals. The options and difficulties in administering IAs raise concerns that cut across ideology. The object of this report is neither to dissuade the advocates nor support the critics of individual accounts. Rather, it is to bring practical considerations to a political debate that has largely ignored the pragmatic challenges of whether IAs would be too complex for participants to understand or too difficult for record keepers to administer. The major findings in this analysis include: Adding individual accounts to Social Security could be the largest undertaking in the history of the U.S. financial market, and no system to date has the capacity to administer such a system. The number of workers currently covered by Social Security--the largest single entitlement program in the nation--is at least four times higher than the combined number of all tax-favored employment-based retirement accounts in the United States, which are administered by hundreds of entities. Direct comparisons between employment-based retirement savings plans and Social Security reform are tenuous at best. Social Security covers workers and businesses that are disproportionately excluded from employment-based plans. Because of these differences, a system of individual Social Security accounts would be more difficult to administer than employment-based plans, and total administrative expenses would be larger relative to benefits. Credit-based systems such as the current Social Security program are less difficult to administer than cash-based systems, which must account for every dollar. Inherent in the "privatization" debate is generally the presumption that IA benefits would be based on cash contributions and investment returns. The current credit-based system tolerates small errors in wage reporting, because they rarely affect benefits. But every dollar counts in a cash-based IA system. To ensure that benefits are properly provided, an IA system would require more regulation, oversight, and error reconciliation than the current Social Security program. Social Security individual accounts cannot be administered like 401(k) plans without adding significant employer burdens--especially on small businesses. Under the current wage reporting and tax collection process, it would take at least 7-19 months for every dollar contributed to an individual's account to be sorted out from aggregate payments and credited to his or her IA. This 7-19 month "float period" could result in substantial benefit losses over time. Options for preventing such losses involve difficult trade-offs, such as increased government responsibility, increased complexity, greater employer burdens, and/or investment restrictions for beneficiaries. If legally considered personal property, the IAs of married participants could pose significant administrative challenges. Social Security today must obtain proof of marriage only at the time spousal benefits are claimed. But some IA proposals would require contributions to be split between spouses' individual accounts, requiring records on participants' marital status to be continuously update to ensure that contributions are correctly directed. Also, dealing with claims on individual account contributions in divorce cases could place IA record keepers in the middle o
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
... Document issued under 46 U.S.C., chapter 73, or a transportation security card issued under section 70105.... Merchant Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued... Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued under...
Disruptive Ideas for Power Grid Security and Resilience With DER
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ibrahim, Erfan
This presentation by Erfan Ibrahim was prepared for NREL's 2017 Cybersecurity and Reslience Workshop on distributed energy resource (DER) best practices. The presentation provides an overview of NREL's Cyber-Physical Systems Security and Resilience R&D Center, the Center's approach to cybersecurity, and disruptive ideas for power grid security and resilience with DER.
17 CFR 240.3a12-10 - Exemption of certain securities issued by the Resolution Funding Corporation.
Code of Federal Regulations, 2010 CFR
2010-04-01
... securities issued by the Resolution Funding Corporation. 240.3a12-10 Section 240.3a12-10 Commodity and... Exemptions § 240.3a12-10 Exemption of certain securities issued by the Resolution Funding Corporation. Securities that are issued by the Resolution Funding Corporation pursuant to section 21B(f) of the Federal...
Security: The Fourth Pillar of the Caribbean Community. Does the Region Need a Security Organ
2016-06-10
activities disrupt stability, undermine democratic institutions and hinder the economic activity so vital to the region. Geostrategic Significance...of the Caribbean region and CARICOM, as well as an overview of its organization and role as a major regional institution . The chapter also...various national security institutions mandated to address the needs of the specific countries. Among their national security architecture, CARICOM
Aircraft Survivability: Reclaiming the Low Altitude Battlespace. Fall 2003
2003-01-01
tt p: //j as .jc s. m il n by Charles Pedriani to Improve Commercial Aviation Security JASPO/NASA Cooperate The National Aeronautics and Space...Administration (NASA) Aviation Safety and Security Program Office announced its Aviation Security Project at a rollout work- shop in March 2003. The...and development efforts involving technology of interest. Overview of the NASA Aviation Security Initiative A systems approach will be used as
49 CFR 1554.103 - Security Directives.
Code of Federal Regulations, 2014 CFR
2014-10-01
... necessary to respond to a threat assessment or to a specific threat against civil aviation, TSA issues a..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT REPAIR STATION SECURITY Security Measures... each Security Directive TSA issues to the repair station within the time prescribed. Each repair...
Security applications of magnetic sensors
NASA Astrophysics Data System (ADS)
Ripka, Pavel
2013-06-01
Magnetic sensors are often used for security and military applications such as detection, discrimination and localization of ferromagnetic and conducting objects, navigation, position tracking and antitheft systems. We give only general overview, few remarks and some interesting references on these applications.
Teaching Case: Security Breach at Target
ERIC Educational Resources Information Center
Plachkinova, Miloslava; Maurer, Chris
2018-01-01
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S
2003-01-01
A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.
Code of Federal Regulations, 2010 CFR
2010-04-01
... statements relating to securities to be issued in certain business combination transactions. 230.488 Section... REGULATIONS, SECURITIES ACT OF 1933 Investment Companies; Business Development Companies § 230.488 Effective date of registration statements relating to securities to be issued in certain business combination...
6 CFR 27.204 - Minimum concentration by security issue.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Minimum concentration by security issue. 27.204 Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by...
6 CFR 13.6 - Prerequisites for issuing a Complaint.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Prerequisites for issuing a Complaint. 13.6 Section 13.6 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.6 Prerequisites for issuing a Complaint. (a) The Reviewing Official may issue a...
Homeland security in the USA: past, present, and future.
Kemp, Roger L
2012-01-01
This paper examines the evolving and dynamic field of homeland security in the USA. Included in this analysis is the evolution of the creation of the Department of Homeland Security, an overview of the National Warning System, a summary of citizen support groups, and how the field of homeland security has had an impact on the location and architecture of public buildings and facilities. Also included are website directories of citizen support groups and federal agencies related to the field of homeland security.
Space Congress, 27th, Cocoa Beach, FL, Apr. 24-27, 1990, Proceedings
NASA Technical Reports Server (NTRS)
1990-01-01
The present symposium on aeronautics and space encompasses DOD research and development, science payloads, small microgravity carriers, the Space Station, technology payloads and robotics, commercial initiatives, STS derivatives, space exploration, and DOD space operations. Specific issues addressed include the use of AI to meet space requirements, the Astronauts Laboratory Smart Structures/Skins Program, the Advanced Liquid Feed Experiment, an overview of the Spacelab program, the Autonomous Microgravity Industrial Carrier Initiative, and the Space Station requirements and transportation options for a lunar outpost. Also addressed are a sensor-data display for telerobotic systems, the Pegasus and Taurus launch vehicles, evolutionary transportation concepts, the upgrade of the Space Shuttle avionics, space education, orbiting security sentinels, and technologies for improving launch-vehicle responsiveness.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anderson, E.; Antkowiak, M.; Butt, R.
The Strategic Environmental Research and Developmental Program (SERDP)/Environmental Security Technology Certification Program (ESTCP) is the Department of Defense?s (DOD) environmental science and technology program focusing on issues related to environment and energy for the military services. The SERDP/ESTCP Office requested that the National Renewable Energy Laboratory (NREL) provide technical assistance with strategic planning by evaluating the potential for several types of renewable energy technologies at DOD installations. NREL was tasked to provide technical expertise and strategic advice for the feasibility of geothermal resources, waste-to-energy technology, photovoltaics (PV), wind, microgrids, and building system technologies on military installations. This technical report ismore » the deliverable for these tasks.« less
Virtual Organizations: Trends and Models
NASA Astrophysics Data System (ADS)
Nami, Mohammad Reza; Malekpour, Abbaas
The Use of ICT in business has changed views about traditional business. With VO, organizations with out physical, geographical, or structural constraint can collaborate with together in order to fulfill customer requests in a networked environment. This idea improves resource utilization, reduces development process and costs, and saves time. Virtual Organization (VO) is always a form of partnership and managing partners and handling partnerships are crucial. Virtual organizations are defined as a temporary collection of enterprises that cooperate and share resources, knowledge, and competencies to better respond to business opportunities. This paper presents an overview of virtual organizations and main issues in collaboration such as security and management. It also presents a number of different model approaches according to their purpose and applications.
Fostering a new dialogue to improve access to finance for European biopharma SMEs.
Chantelot, Emmanuel; Suojanen, Christian
2010-12-31
This article reviews the current economic crisis as it impacts upon European biopharma SMEs and their ability to secure investment and funding. In particular it presents an analysis of a broader, pre-crisis structural problem in Europe related to the lack of institutional investors for Europe's life sciences venture capital funds and the impact this has both on the funds available for investment by VCs into Europe's biotech companies, and the effect on the type and stage of biopharma companies able to raise money. This article also presents an overview of an on-going stakeholder dialogue to address these issues and the proposals raised so far for possible solutions. Copyright © 2010 Elsevier B.V. All rights reserved.
Changing Homeland Security: The Year in Review - 2008
2009-01-01
new opportunities for terrorist safe havens. The specter of homegrown terrorism has not abated. Naturalized citizens of Somali descent traveled to...34 • The Nature of Homeland Security: Now a Second Tier Policy Issue? • Organizing for Homeland Security: Possible Futures, Emerging Issues • The...emerging definitions of the homeland security mission space in 2009. The Nature of Homeland Security: Now a Second Tier Policy Issue? Has the bar
31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued?
Code of Federal Regulations, 2010 CFR
2010-07-01
... in which auctioned Treasury securities may be issued? There are three book-entry securities systems... marketable Treasury securities. We maintain and transfer securities in these three book-entry systems at... inflation. Securities may be transferred from one system to the other, unless the securities are not...
77 FR 72278 - Sale and Issue of Marketable Book-Entry Treasury Bills, Notes, and Bonds
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-05
... whether it would be more important to issue a new floating rate security each month. Maturities: We intend.... SUMMARY: The Department of the Treasury (``Treasury'') intends to issue a new type of marketable security... security. We also invite other comments relevant to the issuance of this new security. DATES: Submit...
Indian space transportation programme: Near term outlook and issues for commercialisation
NASA Astrophysics Data System (ADS)
Nagendra, Narayan Prasad
2015-05-01
The Indian space transportation programme has grown from strength to strength with the launching of sounding rockets in the 60's to the development of heavy lift vehicles for telecommunication satellites in the present decade. With the growing market confidence in Indian Space Research Organisation's ability to reliably deliver payloads to low Earth orbit with its Polar Satellite Launch Vehicle, there is an inherent opportunity for India to cater to the commercial market. The present work assesses the current launch capacity of India in retrospect of international launches and provides India's outlook for the space transportation in the current decade. Launch capacity correlation with the requirements within the Indian space programme as well as the current space transportation infrastructure have been considered to identify bottlenecks in catering to the current national requirements alongside securing a greater market share in the international launch market. The state of commercialisation of launch vehicle development has been presented to provide an overview of policy and organisational issues for commercialisation of space transportation in India.
Kang'ethe, E K; Grace, D; Randolph, T F
2007-11-01
To collate and synthesize current knowledge of components of urban agriculture (UA) with a thematic emphasis on human health impact and a geographic emphasis on East Africa. Data management followed a structured approach in which key issues were first identified and then studies selected through literature search and personal communication. Evidence-based principles. Urban agriculture is an important source of food security for urban dwellers in East Africa. Descriptors of UA are location, areas, activities, scale, products, destinations, stakeholders and motivation. Many zoonotic and food-borne diseases have been associated with UA but evidence on human health impact and management is lacking. Major constraints to UA are illegality and lack of access to input and market; policy options have been developed for overcoming these. Urban agriculture is an important activity and likely to remain so. Both positive and negative human health impacts are potentially important but more research is needed to understand these and set appropriate policy and support levels.
Cooperative measures to mitigate Asia-Pacific maritime conflicts.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chai, Wen-Chung
2003-05-01
The economies of East Asia are predominantly export based and, therefore, place special emphasis on the security of the sea lines of communication (SLOCs). Due to economic globalization, the United States shares these concerns. Cooperative measures by the concerned parties could reduce the potential for disruption by maritime conflicts. Primary threats against the SLOCs are disputes over the resources under the seas, disputes over some small island groups, disputes between particular parties (China-Taiwan and North-South Korea), or illegal activities like smuggling, piracy, or terrorism. This paper provides an overview on these threats, issue by issue, to identify common elements andmore » needed cooperation. Cooperation on other topics such as search and rescue, fisheries protection, and oil spill response may help support improved relations to prevent maritime conflicts. Many technologies can help support maritime cooperation, including improved communications links, tracking and emergency beacon devices, and satellite imaging. Appropriate technical and political means are suggested for each threat to the SLOCs.« less
Steele, Ric G.; Connelly, Mark A.; Palermo, Tonya M.; Ritterband, Lee M.
2014-01-01
Objective To provide an overview of common challenges that pediatric eHealth researchers may encounter when planning, developing, testing, and disseminating eHealth interventions along with proposed solutions for addressing these challenges. Methods The article draws on the existing eHealth literature and the authors’ collective experience in pediatric eHealth research. Results and conclusions The challenges associated with eHealth interventions and their proposed solutions are multifaceted and cut across a number of areas from eHealth program development through dissemination. Collaboration with a range of individuals (e.g., multidisciplinary colleagues, commercial entities, primary stakeholders) is the key to eHealth intervention success. To ensure adequate resources for design, development, and planning for sustainability, a number of public and private sources of funding are available. A study design that addresses ethical concerns and security issues is critical to ensure scientific integrity and intervention dissemination. Table I summarizes key issues to consider during eHealth intervention development, testing, and dissemination. PMID:24816766
Issues in biosecurity and biosafety.
Nordmann, Brian D
2010-11-01
The role of non-governmental organisations and other interested observers - civil society - has long been neglected by governments in the quest for a world secure from the threat of biological weapons or bioterrorism. New trends illustrate a greater appreciation of a strong need for a cooperative partnership. Governments need to accept and embrace some of these new trends and new technologies. At least since 2001 and the Amerithrax anthrax letters, the USA has had a significant focus on biosecurity and the related subject of biosafety. Biosecurity has also been raised to a place of prominence in security discussions throughout much of the rest of the globe, largely through the mechanisms of the Biological and Toxin Weapons Convention and related groups, but also through the World Health Organization and the implementation of the International Health Regulations, which is scheduled for 2012. Despite this attention, a clear understanding of the meanings of biosecurity and biosafety has yet to be achieved. Partly because of this lack of definition, and largely because of a broader understanding of the capabilities of the life sciences, many topics have begun to fall under the heading of biosecurity. This paper will not be able to explore all of these new topics but will instead attempt to present an overview of some of the issues at play today in the biosecurity dialogue. Published by Elsevier B.V.
Overview of Accelerators with Potential Use in Homeland Security
NASA Astrophysics Data System (ADS)
Garnett, Robert W.
Quite a broad range of accelerators have been applied to solving many of the challenging problems related to homeland security and defense. These accelerator systems range from relatively small, simple, and compact, to large and complex, based on the specific application requirements. They have been used or proposed as sources of primary and secondary probe beams for applications such as radiography and to induce specific reactions that are key signatures for detecting conventional explosives or fissile material. A brief overview and description of these accelerator systems, their specifications, and application will be presented. Some recent technology trends will also be discussed.
17 CFR 250.52 - Exemption of issue and sale of certain securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... business of the subsidiary company; and (2) The interest rates and maturity dates of any debt security... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of issue and sale of certain securities. 250.52 Section 250.52 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...
Overview: Human Factors Issues in Space Station Architecture
NASA Technical Reports Server (NTRS)
Cohen, M. M.
1985-01-01
An overview is presented of human factors issues in space station architecture. The status of the space station program is given. Habitability concerns such as vibroacoustics, lighting systems, privacy and work stations are discussed in detail.
6 CFR 27.204 - Minimum concentration by security issue.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by security issue. (a) Release Chemicals—(1) Release-Toxic Chemicals. If a release-toxic chemical of interest...
The Evolving Risk of Climate Change and National Security: People not Polar Bears
NASA Astrophysics Data System (ADS)
Titley, D.
2014-12-01
This talk will provide a general overview of climate change and discuss why this is a national security issue. Climate change is about people, about water, and about change itself. Understanding the rate of climate change, relative to the abilities of both humans and ecosystems to adapt is critical. I will briefly describe the multiple, independent lines of evidence that the climate is changing, and that the primary cause of this change is a change in atmospheric composition caused by the burning of fossil fuels. I will cover the history of climate change as seen within the U.S. Department of Defense and U.S. Navy, how this challenge is being addressed from budgetary, policy, and political angles, and what are the greatest challenges to national security that arise from climate change and in particular, the associated changes in the Arctic. I will conclude with an assessment of future challenges and opportunities regarding climate change, from science, policy, and political perspectives, and why we know enough to take significant action now, even if we don't know every detail about the future. In addition, this talk will address how to effectively talk about climate change through the use of analogies, plain, non-jargon English, and even a little humor.
ERIC Educational Resources Information Center
Ragothaman, Srinivasan; Lavin, Angeline; Davies, Thomas
2007-01-01
This research examines, through survey administration, the perceptions of accounting practitioners and educators with respect to the multi-faceted security issues of e-commerce payment systems as well as e-business curriculum issues. Specific security issues explored include misuse/theft of personal and credit card information, spam e-mails,…
15 CFR 782.1 - Overview of reporting requirements under the APR.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Overview of reporting requirements under the APR. 782.1 Section 782.1 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL...
Risk and Infrastructure Science Center - Global Security Sciences
delivers scientific tools and methodologies to inform decision making regarding the most challenging Sciences ASD Accelerator Systems AES APS Engineering Support XSD X-ray Science Physical Sciences and Leadership Strategic Alliance for Global Energy Solutions Overview Leadership Systems Science Center Overview
15 CFR 711.1 - Overviews of declaration, reporting, and advance notification requirements.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false Overviews of declaration, reporting, and advance notification requirements. 711.1 Section 711.1 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE...
15 CFR 710.4 - Overview of scheduled chemicals and examples of affected industries.
Code of Federal Regulations, 2014 CFR
2014-01-01
... examples of affected industries. 710.4 Section 710.4 Commerce and Foreign Trade Regulations Relating to Commerce and Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL... REGULATIONS (CWCR) § 710.4 Overview of scheduled chemicals and examples of affected industries. The following...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
Protecting public surface transportation against terrorism and serious crime : an executive overview
DOT National Transportation Integrated Search
2001-10-01
Because terrorist threats are not easily quantifiable, it is difficult to determine the "right" level of security. Using cost-benefit analysis as the sole criterion to determine the level of security is inadequate. The risk of death to any individual...
78 FR 15731 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0011] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy Act of 1974; Computer Matching Program...
78 FR 15732 - Privacy Act of 1974; Computer Matching Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-12
... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2013-0007] Privacy Act of 1974; Computer Matching Program AGENCY: Department of Homeland Security/U.S. Citizenship and Immigration Services. ACTION: Notice. Overview Information: Privacy Act of 1974; Computer Matching Program...
17 CFR 270.2a-7 - Money market funds.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...
17 CFR 270.2a-7 - Money market funds.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...
17 CFR 270.2a-7 - Money market funds.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit Security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal Issuer means...
17 CFR 270.2a-7 - Money market funds.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...
17 CFR 450.4 - Custodial holdings of government securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... appropriate regulatory agency that expressly govern securities lending practices. (b)(1) Except as otherwise... security (or the amount of each issue of a government security issued in book-entry form) held for the.... (d) Counts of government securities held for customers in both definitive and book-entry form shall...
Secure Sensor Semantic Web and Information Fusion
2014-06-25
data acquired and transmitted by wireless sensor networks (WSNs). In a WSN, due to a need for robustness of monitoring and low cost of the nodes...3 S. Ozdemir and Y. Xiao, “Secure data aggregation in wireless sensor networks : A comprehensive overview...Elisa Bertino, and Somesh Jha: Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. To appear in
International challenges and public policy issues.
Morris, N
1999-01-01
The paper presents an overview of current public policy issues relating to biological standardisation and control, drawing on the extensive background material assembled for two recent international reviews, and previously published work. It identifies a number of factors which are destabilising the current system and promoting a climate for change. These include the squeeze on public sector resources, the growth in volume and complexity of biologicals, developing world needs, concerns about harmonisation and new social and ethical issues. It is argued that this situation presents important opportunities for reviewing the existing boundaries between regulatory scientists, industry, and the public, for international agreement on priorities and for harmonisation and mutual recognition. While considerable progress has already been made on these issues at national, regional and global level, there is a need for fuller international participation and the additional impetus that would come from a higher-profile commitment by governments. Such commitment will also be important for the vital questions of sustaining the scientific base and securing the resource for an effective, truly worldwide programme of standardisation and control. An international approach will also be essential in steering biologicals control through the difficult social and ethical questions of the future. WHO, in collaboration with national authorities, has a key role to play in these developments.
Code of Federal Regulations, 2010 CFR
2010-04-01
... securities issued by persons engaged in securities related businesses. 270.12d3-1 Section 270.12d3-1... in securities related businesses. (a) Notwithstanding section 12(d)(3) of the Act, a registered... securities related business, the determination required by paragraph (b) of this section shall be made as...
Security issues in healthcare applications using wireless medical sensor networks: a survey.
Kumar, Pardeep; Lee, Hoon-Jae
2012-01-01
Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.
Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey
Kumar, Pardeep; Lee, Hoon-Jae
2012-01-01
Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs. PMID:22368458
Overview of the Common Core State Standards Initiatives for ELLs. TESOL Issue Brief
ERIC Educational Resources Information Center
TESOL International Association, 2013
2013-01-01
The purpose of this issue brief is to provide a comprehensive overview of the policies behind the Common Core State Standards (CCSS) and to outline some of the initiatives now in place to address the needs of English language learners (ELLs) in relation to the CCSS. This issue brief contains the appendices: (1) Assessment Consortia Time Lines; and…
ERIC Educational Resources Information Center
McEvoy, Alan, Ed.
1996-01-01
This document contains two issues of a journal on reducing youth gun violence, reprinted from a report by the U.S. Department of Justice. The first issue, part one, provides an overview of programs and initiatives. The second issue, part two, describes prevention and intervention programs. To reduce violence and build healthy communities requires…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-09
... Receiving Social Security Disability Insurance (SSDI) Served by State Vocational Rehabilitation (VR...) Served by State Vocational Rehabilitation (VR) Agencies. Program Authority: 29 U.S.C. 773(b). Applicable... Security Disability Insurance (SSDI) Served by State Vocational Rehabilitation (VR) Agencies--CFDA Number...
The 2015 National Security Strategy: Authorities, Changes, Issues for Congress
2016-04-05
Strategy: Authorities, Changes, Issues for Congress Congressional Research Service 3 reverse the spread of nuclear and biological weapons and...secure nuclear materials; advance peace, security, and opportunity in the greater Middle East; invest in the capacity of strong and capable...and norms on issues ranging from maritime security to trade and human rights.” 6 On Russia, the document says, “... we will continue to impose
Overview of accelerators with potential use in homeland security
Garnett, Robert W.
2015-06-18
Quite a broad range of accelerators have been applied to solving many of the challenging problems related to homeland security and defense. These accelerator systems range from relatively small, simple, and compact, to large and complex, based on the specific application requirements. They have been used or proposed as sources of primary and secondary probe beams for applications such as radiography and to induce specific reactions that are key signatures for detecting conventional explosives or fissile material. A brief overview and description of these accelerator systems, their specifications, and application will be presented. Some recent technology trends will also bemore » discussed.« less
Materials @ LANL: Solutions for National Security Challenges
NASA Astrophysics Data System (ADS)
Teter, David
2012-10-01
Materials science activities impact many programmatic missions at LANL including nuclear weapons, nuclear energy, renewable energy, global security and nonproliferation. An overview of the LANL materials science strategy and examples of materials science programs will be presented. Major materials leadership areas are in materials dynamics, actinides and correlated electron materials, materials in radiation extremes, energetic materials, integrated nanomaterials and complex functional materials. Los Alamos is also planning a large-scale, signature science facility called MaRIE (Matter Radiation Interactions in Extremes) to address in-situ characterization of materials in dynamic and radiation environments using multiple high energy probes. An overview of this facility will also be presented.
An Overview of Public Access Computer Software Management Tools for Libraries
ERIC Educational Resources Information Center
Wayne, Richard
2004-01-01
An IT decision maker gives an overview of public access PC software that's useful in controlling session length and scheduling, Internet access, print output, security, and the latest headaches: spyware and adware. In this article, the author describes a representative sample of software tools in several important categories such as setup…
NASA Technical Reports Server (NTRS)
Reinhart, L. E.
2001-01-01
This paper provides an overview of the U.S. space nuclear power system launch approval process as defined by the two separate requirements of the National Environmental Policy Act (NEPA) and Presidential Directive/National Security Council Memorandum No. 25 (PD/NSC-25).
Cyber security issues in online games
NASA Astrophysics Data System (ADS)
Zhao, Chen
2018-04-01
With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.
From Secure Memories to Smart Card Security
NASA Astrophysics Data System (ADS)
Handschuh, Helena; Trichina, Elena
Non-volatile memory is essential in most embedded security applications. It will store the key and other sensitive materials for cryptographic and security applications. In this chapter, first an overview is given of current flash memory architectures. Next the standard security features which form the basis of so-called secure memories are described in more detail. Smart cards are a typical embedded application that is very vulnerable to attacks and that at the same time has a high need for secure non-volatile memory. In the next part of this chapter, the secure memories of so-called flash-based high-density smart cards are described. It is followed by a detailed analysis of what the new security challenges for such objects are.
Shared Solar. Current Landscape, Market Potential, and the Impact of Federal Securities Regulation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feldman, David; Brockway, Anna M.; Ulrich, Elaine
2015-04-07
This report provides a high-level overview of the current U.S. shared solar landscape, the impact that a given shared solar program’s structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.
Shared Solar. Current Landscape, Market Potential, and the Impact of Federal Securities Regulation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Feldman, David; Brockway, Anna M.; Ulrich, Elaine
2015-04-01
This report provides a high-level overview of the current U.S. shared solar landscape and the impact that a given shared solar program’s structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.
Annual Report and Crime Summary, 1992.
ERIC Educational Resources Information Center
Johnson County Community Coll., Overland Park, KS. Dept. of Safety and Security.
In accordance with the Student Right-to-Know and Campus Security Act of 1990, the Safety and Security Department of Johnson County Community College (JCCC), in Kansas, prepared this report providing information on crime statistics and departmental policies. Introductory sections of the annual report feature an overview of the department's mission,…
Computer Security Products Technology Overview
1988-10-01
13 3. DATABASE MANAGEMENT SYSTEMS ................................... 15 Definition...this paper addresses fall into the areas of multi-user hosts, database management systems (DBMS), workstations, networks, guards and gateways, and...provide a portion of that protection, for example, a password scheme, a file protection mechanism, a secure database management system, or even a
Mitigating risks by integrating business continuity and security.
Shaw, Scott; Smith, Nicholas
2010-11-01
There has been much discussion regarding the topic of business continuity and security convergence. This paper provides a realistic overview of the union of the two disciplines and offers no/low-cost programme elements that may be used for organisations considering or in the midst of convergence efforts.
Sea Piracy in Southeast Asia: Implications for Countering Maritime Terrorism in the United States
2006-06-01
least ten agencies that have some involvement in maritime security management with nine authorized to conduct law enforcement operations at sea...exercises, cooperating on consequence management , and sustaining capacity building operations .173 The United States has important bilateral security...Overview and Evaluation,” Journal of Homeland Security and Emergency Management 2, no. 4 (2005). 221 Frittelli, “Terminal Operators ,” 2006, 3
1999-07-01
Environmental Security . . . . . . . . . . . . . . . . . . . . 17 Robert E. Ebel Caspian Basin Oil and Gas: An Overview . . . . . . . . . . . 21 Brian R ...choke point near Baku, posing a threat to security of supply. 32 ENVIRONMENTAL BASELINE ANALYSIS OF THE CASPIAN SEA REGION BRIAN R . SHAW TERRY...up to 70% of the seasonal Caspian Sea level. Sources of water include runoff ( R ), precipitation (P), and groundwater flow (G); sink include
Code of Federal Regulations, 2014 CFR
2014-04-01
... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...
Code of Federal Regulations, 2011 CFR
2011-04-01
... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...
Code of Federal Regulations, 2013 CFR
2013-04-01
... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...
Code of Federal Regulations, 2012 CFR
2012-04-01
... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...
Code of Federal Regulations, 2010 CFR
2010-04-01
... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-4, for registration of securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239.34 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-16
... purchase fixed income securities issued by U.S. or foreign corporations \\6\\ or financial institutions... also may purchase securities issued or guaranteed by the U.S. Government or foreign governments... (``CMOs'').\\8\\ The Fund may purchase or sell securities on a when issued, delayed delivery or forward...
Defining Information Security.
Lundgren, Björn; Möller, Niklas
2017-11-15
This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.
Science and Technology Resources on the Internet: Computer Security.
ERIC Educational Resources Information Center
Kinkus, Jane F.
2002-01-01
Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…
Computer Network Security- The Challenges of Securing a Computer Network
NASA Technical Reports Server (NTRS)
Scotti, Vincent, Jr.
2011-01-01
This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.
Green Secure Processors: Towards Power-Efficient Secure Processor Design
NASA Astrophysics Data System (ADS)
Chhabra, Siddhartha; Solihin, Yan
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.
Survey of cyber security issues in smart grids
NASA Astrophysics Data System (ADS)
Chen, Thomas M.
2010-04-01
The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.
Transportation Security: Issues for the 111th Congress
2009-05-15
results of covert testing of airport security checkpoints demonstrating deficiencies in detecting improvised explosives and incendiary devices...34 A key issue in the debate over aviation security immediately following September 11, 2001, was whether airport security screeners should be...intentional wrongdoing on the part of airport security screeners, whether they be federal or private. Nonetheless, while the pilot program airports
Technology Program Management Model (TPMM) Overview
2006-05-10
1 1 “Secure the High Ground” Jeff Craver Project Manager Space and Missile Defense Technical Center Jeff.Craver@US.Army.Mil ff r r r j t r i il...f i l t r ff. r r . r . il UNCLASSIFIED UNCLASSIFIED Technology Program Management Model (TPMM) Overview 05-10-2006 Report Documentation Page Form...DATES COVERED 00-00-2006 to 00-00-2006 4. TITLE AND SUBTITLE Technology Program Management Model (TPMM) Overview 5a. CONTRACT NUMBER 5b. GRANT
Code of Federal Regulations, 2012 CFR
2012-07-01
... government and international agencies and foreign central banks. In their accounts, depository institutions... BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS... Direct®—into which we issue marketable Treasury securities. We maintain and transfer securities in these...
NASA Technical Reports Server (NTRS)
Lytle, John
2001-01-01
This report provides an overview presentation of the 2000 NPSS (Numerical Propulsion System Simulation) Review and Planning Meeting. Topics include: 1) a background of the program; 2) 1999 Industry Feedback; 3) FY00 Status, including resource distribution and major accomplishments; 4) FY01 Major Milestones; and 5) Future direction for the program. Specifically, simulation environment/production software and NPSS CORBA Security Development are discussed.
Methodological Issues in Measuring the Development of Character
ERIC Educational Resources Information Center
Card, Noel A.
2017-01-01
In this article I provide an overview of the methodological issues involved in measuring constructs relevant to character development and education. I begin with a nontechnical overview of the 3 fundamental psychometric properties of measurement: reliability, validity, and equivalence. Developing and evaluating measures to ensure evidence of all 3…
July: "Soils are living: Overview of soil biodiversity, global issues, and new resources"
USDA-ARS?s Scientific Manuscript database
The July poster will provide an overview of soil biology and the many ecosystem functions that soil organisms drive including their impact on global biodiversity, climate regulation, soil health/stability, and plant growth. Five main global issues related to soil biodiversity will be presented such ...
DOT National Transportation Integrated Search
1988-10-01
This second volume of the study entitled, Optimizing Wartime Materiel Delivery: An Overview of DOD Containerization Efforts, -outlines a framework for action to address containerization issues identified in Volume I. The objectives of the study inclu...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Antolak, Arlyn J.
Particle accelerators play a key role in a broad set of defense and security applications including war-fighter and asset protection, cargo inspection, nonproliferation, materials characterization and stockpile stewardship. Accelerators can replace the high activity radioactive sources that pose a security threat for developing a radiological dispersal device and be used to produce isotopes for medical, industrial, and re-search purposes. Lastly, we present an overview of current and emerging accelerator technologies relevant to addressing the needs of defense and security.
Web Services Security - Implementation and Evaluation Issues
NASA Astrophysics Data System (ADS)
Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis
Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.
DOT National Transportation Integrated Search
2012-06-08
This report provides a summary and overview of the Public Workshop entitled, Enabling a Secure Environment for Vehicle-to-Vehicle and Vehicle-to-Infrastructure Transactions, presented by USDOT. The workshop took place on April 19-20, 2012 at th...
Code of Federal Regulations, 2010 CFR
2010-04-01
... registration of securities issued in business combination transactions by investment companies and business development companies. 239.23 Section 239.23 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... companies and business development companies. This form shall be used by a registered investment company or...
76 FR 34920 - Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-15
... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 230, 240 and 260 [Release Nos. 33-9222; 34-64639; 39-2474; File No. S7-22-11] RIN 3235-AL16 Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies AGENCY: Securities and Exchange Commission. ACTION: Proposed rules. SUMMARY: We are...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-18
... Important Notice of the availability of the comparison service for when-issued corporate securities.\\5\\ \\5... scheduled to be implemented for corporate when-issued securities and NSCC would submit a rule filing to the... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69980; File No. SR-NSCC-2013-09] Self...
Robust Agent Control of an Autonomous Robot with Many Sensors and Actuators
1993-05-01
Overview 22 3.1 Issues of Controller Design ........................ 22 3.2 Robot Behavior Control Philosophy .................. 23 3.3 Overview of the... designed and built by our lab as an 9 Figure 1.1- Hannibal. 10 experimental platform to explore planetary micro-rover control issues (Angle 1991). When... designing the robot, careful consideration was given to mobility, sensing, and robustness issues. Much has been said concerning the advan- tages of
Characterization of lignocellulolytic enzymes from white-rot fungi.
Manavalan, Tamilvendan; Manavalan, Arulmani; Heese, Klaus
2015-04-01
The development of alternative energy sources by applying lignocellulose-based biofuel technology is critically important because of the depletion of fossil fuel resources, rising fossil fuel prices, security issues regarding the fossil fuel supply, and environmental issues. White-rot fungi have received much attention in recent years for their valuable enzyme systems that effectively degrade lignocellulosic biomasses. These fungi have powerful extracellular oxidative and hydrolytic enzymes that degrade lignin and cellulose biopolymers, respectively. Lignocellulosic biomasses from either agricultural or forestry wastes are abundant, low-cost feedstock alternatives in nature but require hydrolysis into simple sugars for biofuel production. This review provides a complete overview of the different lignocellulose biomasses and their chemical compositions. In addition, a complete list of the white-rot fungi-derived lignocellulolytic enzymes that have been identified and their molecular structures, mechanism of action in lignocellulose hydrolysis, and biochemical properties is summarized in detail. These enzymes include ligninolytic enzymes (laccase, manganese peroxidase, lignin peroxidase, and versatile peroxidase) and cellulolytic enzymes (endo-glucanase, cellobiohydrolase, and beta-glucosidase). The use of these fungi for low-cost lignocellulolytic enzyme production might be attractive for biofuel production.
Phillips, Andelka M
2016-03-01
I provide an overview of the current state of the direct-to-consumer (DTC) genetic testing industry and the challenges that different types of testing pose for regulation. I consider the variety of services currently available. These range from health and ancestry tests to those for child talent, paternity, and infidelity. In light of the increasingly blurred lines among different categories of testing, I call for a broader discussion of DTC governance. I stress the importance of shifting our attention from the activities of the most prominent companies to viewing DTC genetics as an industry with a wide spectrum of services and raising a wide variety of issues. These issues go beyond questions of clinical utility and validity to those of data security, personal identity, race, and the nature of the family. Robust DTC testing has the power to provide meaningful clinical, genealogical and even forensic information to those who want it; in unscrupulous hands, however, it also has the power to deceive and exploit. I consider approaches to help ensure the former and minimize the latter.
Wu, Yelena P; Steele, Ric G; Connelly, Mark A; Palermo, Tonya M; Ritterband, Lee M
2014-07-01
To provide an overview of common challenges that pediatric eHealth researchers may encounter when planning, developing, testing, and disseminating eHealth interventions along with proposed solutions for addressing these challenges. The article draws on the existing eHealth literature and the authors' collective experience in pediatric eHealth research. The challenges associated with eHealth interventions and their proposed solutions are multifaceted and cut across a number of areas from eHealth program development through dissemination. Collaboration with a range of individuals (e.g., multidisciplinary colleagues, commercial entities, primary stakeholders) is the key to eHealth intervention success. To ensure adequate resources for design, development, and planning for sustainability, a number of public and private sources of funding are available. A study design that addresses ethical concerns and security issues is critical to ensure scientific integrity and intervention dissemination. Table I summarizes key issues to consider during eHealth intervention development, testing, and dissemination. © The Author 2014. Published by Oxford University Press on behalf of the Society of Pediatric Psychology. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
An Educator's Introduction to Energy Concepts: Overview Packets.
ERIC Educational Resources Information Center
Maine Audubon Society, Falmouth.
This publication provides a broad overview of energy and related issues for teachers and others who want to improve their understanding of these issues. Included in this publication are discussions of: (1) elementary physics related to energy; (2) energy sources, including topics such as renewable and non-renewable resources and fossil fuels; (3)…
ERIC Educational Resources Information Center
Allen, Jo
1991-01-01
Presents an overview of research and unanswered questions related to gender issues in technical communication. Addresses the consequences of the feminization of technical communication, research on gender differences in technical communication, and the means for encouraging a more gender-balanced view of business and industry. (SR)
Computer network security for the radiology enterprise.
Eng, J
2001-08-01
As computer networks become an integral part of the radiology practice, it is appropriate to raise concerns regarding their security. The purpose of this article is to present an overview of computer network security risks and preventive strategies as they pertain to the radiology enterprise. A number of technologies are available that provide strong deterrence against attacks on networks and networked computer systems in the radiology enterprise. While effective, these technologies must be supplemented with vigilant user and system management.
Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library
ERIC Educational Resources Information Center
McMullen, Karen D.; Kane, Laura Townsend
2008-01-01
In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form S-4, for the registration of securities issued in business combination transactions. 239.25 Section 239.25 Commodity and... business combination transactions. This form may be used for registration under the Securities Act of 1933...
Close the Gate, Lock the Windows, Bolt the Doors: Securing Library Computers. Online Treasures
ERIC Educational Resources Information Center
Balas, Janet
2005-01-01
This article, written by a systems librarian at the Monroeville Public Library, discusses a major issue affecting all computer users, security. It indicates that while, staying up-to-date on the latest security issues has become essential for all computer users, it's more critical for network managers who are responsible for securing computer…
Theft of Virtual Property — Towards Security Requirements for Virtual Worlds
NASA Astrophysics Data System (ADS)
Beyer, Anja
The article is focused to introduce the topic of information technology security for Virtual Worlds to a security experts’ audience. Virtual Worlds are Web 2.0 applications where the users cruise through the world with their individually shaped avatars to find either amusement, challenges or the next best business deal. People do invest a lot of time but beyond they invest in buying virtual assets like fantasy witcheries, wepaons, armour, houses, clothes,...etc with the power of real world money. Although it is called “virtual” (which is often put on the same level as “not existent”) there is a real value behind it. In November 2007 dutch police arrested a seventeen years old teenager who was suspicted to have stolen virtual items in a Virtual World called Habbo Hotel [Reuters07]. In order to successfully provide security mechanisms into Virtual Worlds it is necessarry to fully understand the domain for which the security mechansims are defined. As Virtual Worlds must be clasified into the domain of Social Software the article starts with an overview of how to understand Web 2.0 and gives a short introduction to Virtual Worlds. The article then provides a consideration of assets of Virtual Worlds participants, describes how these assets can be threatened and gives an overview of appopriate security requirements and completes with an outlook of possible countermeasures.
CADDIS Volume 2. Sources, Stressors and Responses: Urbanization - Water and Sediment Quality
Introduction to water and sediment quality issues associated with urbanization, overview of conductivity as an indicator or urbanization, overview of how urbanization affects nitrogen loading, overview of pavement sealants and their effects on stream biota
McConnell, Laura L; Racke, Kenneth D; Hapeman, Cathleen J; Seiber, James N
2016-01-13
This introductory paper provides an overview of Perspectives papers written by plenary speakers from the 13th IUPAC International Congress of Pesticide Chemistry held in San Francisco, CA, USA, in August 2014. This group of papers emphasizes some of the emerging issues and challenges at the forefront of agricultural research: sustainability; agriculture's response to climate change and population growth; pollinator health and risk assessment; and global food production and food security. In addition, as part of the Congress, a workshop on "Developing Global Leaders for Research, Regulation, and Stewardship of Crop Protection Chemistry in the 21st Century" identified specific recommendations to attract the best scientists to agricultural science, to provide opportunities to study and conduct research on crop protection chemistry topics, and to improve science communication skills.
Overview of RFID technology and its applications in the food industry.
Kumar, P; Reinitz, H W; Simunovic, J; Sandeep, K P; Franzon, P D
2009-10-01
Radio frequency identification (RFID) is an alternative technology with a potential to replace traditional universal product code (UPC) barcodes. RFID enables identification of an object from a distance without requiring a line of sight. RFID tags can also incorporate additional data such as details of product and manufacturer and can transmit measured environmental factors such as temperature and relative humidity. This article presents key concepts and terminology related to RFID technology and its applications in the food industry. Components and working principles of an RFID system are described. Numerous applications of RFID technology in the food industry (supply chain management, temperature monitoring of foods, and ensuring food safety) are discussed. Challenges in implementation of RFID technology are also discussed in terms of read range, read accuracy, nonuniform standards, cost, recycling issues, privacy, and security concerns.
Current frontiers and future directions of telecoupling research
NASA Astrophysics Data System (ADS)
Liu, J.
2016-12-01
The world has been increasingly interconnected over long distances though processes such as international trade, migration, telecommunication, and disease spread. However, previous studies often focused on socioeconomic or environmental issues of distant processes. While these studies have generated useful information for individual disciplines, integrating socioeconomic and environmental information is essential for holistic understanding of complex global challenges and unbiased decision making to address the challenges. To advance integrated research, the framework of telecoupling (socioeconomic and environmental interactions over distances) has been developed to explicitly address both socioeconomic and environmental issues simultaneously. Although the framework is relatively new, it has already been applied to tackle a variety of globally important issues, such as food security, water resources, energy sustainability, land use, international trade (e.g., food, forest products, energy, wildlife, industrial products), species invasion, investment, ecosystem services, conservation, information dissemination, and tourism. These applications have identified many important research gaps (e.g. spillover systems) and hidden linkages (e.g. feedbacks) among distant areas of the world with profound implications for sustainable development, ecosystem health, and human well-being. While working with telecoupling presents more challenges than focusing only on disciplinary issues, support from funding agencies has helped accelerate research on telecoupling and more efforts are being aimed at framework quantification and operationalization. The presenter will provide an overview of the current frontiers, discuss future research directions, and highlight emerging opportunities and challenges in telecoupling research and governance.
NASA Technical Reports Server (NTRS)
Skeberdis, Daniel
2016-01-01
This is a presentation at the MOWG fall meeting that will discuss CCS purpose, future status, security enhancements, arbitrary ephemeris mission features, overview of CCS 7.3, approach for the use of NORAD TLEs, account and data security, CCS System virtualization, control box visualization modification and other enhancements.
Nuclear Security Futures Scenarios.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keller, Elizabeth James Kistin; Warren, Drake Edward; Hayden, Nancy Kay
This report provides an overview of the scenarios used in strategic futures workshops conducted at Sandia on September 21 and 29, 2016. The workshops, designed and facilitated by analysts in Center 100, used scenarios to enable thought leaders to think collectively about the changing aspects of global nuclear security and the potential implications for the US Government and Sandia National Laboratories.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-17
... advise the public of the eighteenth meeting of RTCA Special Committee 216: Aeronautical Systems Security... Agenda Overview and Approval Split Plenary Session (9:15 a.m.--12 p.m.) SC 216 Review of the Summary of....--12 p.m.) WG-72 Introduction, Report about publications and relations EUROCAE Document Discussions, e...
Food Insecurity And Health Outcomes.
Gundersen, Craig; Ziliak, James P
2015-11-01
Almost fifty million people are food insecure in the United States, which makes food insecurity one of the nation's leading health and nutrition issues. We examine recent research evidence of the health consequences of food insecurity for children, nonsenior adults, and seniors in the United States. For context, we first provide an overview of how food insecurity is measured in the country, followed by a presentation of recent trends in the prevalence of food insecurity. Then we present a survey of selected recent research that examined the association between food insecurity and health outcomes. We show that the literature has consistently found food insecurity to be negatively associated with health. For example, after confounding risk factors were controlled for, studies found that food-insecure children are at least twice as likely to report being in fair or poor health and at least 1.4 times more likely to have asthma, compared to food-secure children; and food-insecure seniors have limitations in activities of daily living comparable to those of food-secure seniors fourteen years older. The Supplemental Nutrition Assistance Program (SNAP) substantially reduces the prevalence of food insecurity and thus is critical to reducing negative health outcomes. Project HOPE—The People-to-People Health Foundation, Inc.
Y-12 Integrated Materials Management System
DOE Office of Scientific and Technical Information (OSTI.GOV)
Alspaugh, D. H.; Hickerson, T. W.
2002-06-03
The Integrated Materials Management System, when fully implemented, will provide the Y-12 National Security Complex with advanced inventory information and analysis capabilities and enable effective assessment, forecasting and management of nuclear materials, critical non-nuclear materials, and certified supplies. These capabilities will facilitate future Y-12 stockpile management work, enhance interfaces to existing National Nuclear Security Administration (NNSA) corporate-level information systems, and enable interfaces to planned NNSA systems. In the current national nuclear defense environment where, for example, weapons testing is not permitted, material managers need better, faster, more complete information about material properties and characteristics. They now must manage non-special nuclearmore » material at the same high-level they have managed SNM, and information capabilities about both must be improved. The full automation and integration of business activities related to nuclear and non-nuclear materials that will be put into effect by the Integrated Materials Management System (IMMS) will significantly improve and streamline the process of providing vital information to Y-12 and NNSA managers. This overview looks at the kinds of information improvements targeted by the IMMS project, related issues, the proposed information architecture, and the progress to date in implementing the system.« less
Design and Development of Layered Security: Future Enhancements and Directions in Transmission
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-01
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443
Design and Development of Layered Security: Future Enhancements and Directions in Transmission.
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-06
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.
Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security
NASA Astrophysics Data System (ADS)
Mahmadi, FN; Zaaba, ZF; Osman, A.
2016-11-01
Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.
1987-04-01
security deposit action is described in the regulation as follows: h. Security Deposits (DACF and DACA ). (1) Issue. PCS moves create financial hardships...General Wickham, The Army Chief of Staff, specified a philosophy toward the family in the Army Family White Paper. General Wickham’s action was in...security deposits arose. 1 The Army’s action to the issue of security deposits will be thoroughly discussed in this paper. The Army’s action comes now
Inter-organizational future proof EHR systems. A review of the security and privacy related issues.
van der Linden, Helma; Kalra, Dipak; Hasman, Arie; Talmon, Jan
2009-03-01
Identification and analysis of privacy and security related issues that occur when health information is exchanged between health care organizations. Based on a generic scenario questions were formulated to reveal the occurring issues. Possible answers were verified in literature. Ensuring secure health information exchange across organizations requires a standardization of security measures that goes beyond organizational boundaries, such as global definitions of professional roles, global standards for patient consent and semantic interoperable audit logs. As to be able to fully address the privacy and security issues in interoperable EHRs and the long-life virtual EHR it is necessary to realize a paradigm shift from storing all incoming information in a local system to retrieving information from external systems whenever that information is deemed necessary for the care of the patient.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... aggregate principal amount, par value, or book value of the securities as carried by the registrant, or the...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... aggregate principal amount, par value, or book value of the securities as carried by the registrant, or the...
Local Area Network (LAN) Compatibility Issues
1991-09-01
September, 1991 Thesis Advisor: Dr. Norman Schneidewind Approved for public release; distribution is unlimited 92 303s246 Unclassified SECURITY ...CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE Ia. REPORT SECURITY CLASSIFICATION 1 b. RESTRICTIVE MARKINGS unclassified 2a. SECURITY CLASSIFICATION...Work UiNt ACCeLUOn Number 11. TITLE (Include Security Classification) LOCAL AREA NETWORK (LAN) COMPATIBILITY ISSUES 12. PERSONAL AUTHOR(S) Rita V
Iris Cryptography for Security Purpose
NASA Astrophysics Data System (ADS)
Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.
2018-04-01
In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.
The nature of international health security.
Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N
2009-01-01
Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.
Hospital security and patient elopement: protecting patients and your healthcare facility.
Smith, Thomas A
2012-01-01
Regulatory and financial consequences of adverse events associated with patient elopements are bringing new challenges to healthcare security to develop policies and procedures to prevent and respond to such incidents. This article provides an overview of the problem of elopement in healthcare and what it means to the security function; gives a working knowledge of healthcare related standards and guidelines aimed at reducing patient elopement; and reviews the elements of an elopement prevention and response plan for your organization.
The European cooperative approach to securing critical information infrastructure.
Purser, Steve
2011-10-01
This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.
NASA Astrophysics Data System (ADS)
Meyerstein, Mike; Cha, Inhyok; Shah, Yogendra
The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.
75 FR 881 - Meeting of Advisory Committee on International Communications and Information Policy
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-06
... development issues, international spectrum requirements and harmonization, cyber-security, and data protection... will discuss key issues of importance to U.S. communications policy interests including future... Bureau of Diplomatic Security to enhance the Department's security by tracking visitor traffic and to...
The 2015 National Security Strategy: Authorities, Changes, Issues for Congress
2016-02-26
climate change ; ensure access to shared spaces (expanding cyberspace and including outer space and air and maritime security); and increase global...hand, one could conclude that these, along with confronting climate change , convey both a wider range of national security challenges in terms of...The 2015 National Security Strategy: Authorities, Changes , Issues for Congress Nathan J. Lucas, Coordinator Section Research Manager Kathleen
Operating in the Gray Zone: An Alternative Paradigm for U.S. Military Strategy
2016-04-01
labeling, or re-labeling, may have been to draw the attention of busy policymakers to rapidly emerging security issues , it has evolved into something... issues affecting the national security community. The Peacekeeping and Stability Operations Institute provides subject matter expertise, technical...SSI) is part of the U.S. Army War College and is the strategic-level study agent for issues related to national security and military strategy with
2011-10-01
Fortunately, some products offer centralized management and deployment tools for local desktop implementation . Figure 5 illustrates the... implementation of a secure desktop infrastructure based on virtualization. It includes an overview of desktop virtualization, including an in-depth...environment in the data centre, whereas LHVD places it on the endpoint itself. Desktop virtualization implementation considerations and potential
Caspian Sea Environmental Security Game: 16-17 November 1998
1999-07-01
17 Robert E. Ebel Caspian Basin Oil and Gas: An Overview . . . . . . . . . . . 21 Brian R . Shaw Environmental Baseline...threat to security of supply. 32 ENVIRONMENTAL BASELINE ANALYSIS OF THE CASPIAN SEA REGION BRIAN R . SHAW TERRY PALUSZKIEWICZ SUSAN A. THOMAS...Caspian Sea level. Sources of water include runoff ( R ), precipitation (P), and groundwater flow (G); sink include evaporation (E), and discharge of water
The Campus Executive's Role in Security and Liability Issues.
ERIC Educational Resources Information Center
Bromley, Max; Territo, Leonard
1986-01-01
Executives at institutions of higher education have become increasingly concerned about serious crimes being committed on their campuses. The liability issue, criminal activity information, physical security and design issues, student patrol escorts, crime prevention training, and task force development are discussed. (MLW)
Managing Campus Security: Issues for Police Officers at Public Institutions.
ERIC Educational Resources Information Center
Dwyer, William O.; And Others
1994-01-01
To maximize the effectiveness of their campus security systems while minimizing the institution's exposure to liability, campus administrators must understand the legal context in which their police or security personnel are operating as agents of authority. Some of these policy and behavior issues are explained. (MSE)
The Superpowers: Nuclear Weapons and National Security. National Issues Forums.
ERIC Educational Resources Information Center
Mitchell, Greg; Melville, Keith
Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…
ERIC Educational Resources Information Center
Bete, Tim, Ed.
1998-01-01
Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…
HIV vaccines in Canada: legal and ethical issues--an overview.
Garmaise, David
2002-07-01
In July 2002 the Legal Network released an overview paper on legal and ethical issues related to an HIV vaccine in Canada. The paper, which is based on a more detailed report prepared in collaboration with the Centre for Bioethics of the Clinical Research Institute of Montréal, calls for the establishment of a Canadian HIV Vaccine Plan.
Quality and security - They work together
NASA Technical Reports Server (NTRS)
Carr, Richard; Tynan, Marie; Davis, Russell
1991-01-01
This paper describes the importance of considering computer security as part of software quality assurance practice. The intended audience is primarily those professionals involved in the design, development, and quality assurance of software. Many issues are raised which point to the need ultimately for integration of quality assurance and computer security disciplines. To address some of the issues raised, the NASA Automated Information Security program is presented as a model which may be used for improving interactions between the quality assurance and computer security community of professionals.
Code of Federal Regulations, 2014 CFR
2014-01-01
...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...
Code of Federal Regulations, 2011 CFR
2011-01-01
...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...
Code of Federal Regulations, 2012 CFR
2012-01-01
...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...
Code of Federal Regulations, 2013 CFR
2013-01-01
...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...
NASA Astrophysics Data System (ADS)
Liu, Shu-Fan; Chueh, Hao-En; Liao, Kuo-Hsiung
According to surveys, 80 % of security related events threatening information in medical organizations is due to improper management. Most research on information security has focused on information and security technology, such as network security and access control; rarely addressing issues at the management issues. The main purpose of this study is to construct a BS7799 based mechanism for the management of information with regard to security as it applies to medical organizations. This study analyzes and identifies the most common events related to information security in medical organizations and categorizes these events as high-risk, transferable-risk, and controlled-risk to facilitate the management of such risk.
Overview of Privacy in Social Networking Sites (SNS)
NASA Astrophysics Data System (ADS)
Powale, Pallavi I.; Bhutkar, Ganesh D.
2013-07-01
Social Networking Sites (SNS) have become an integral part of communication and life style of people in today's world. Because of the wide range of services offered by SNSs mostly for free of cost, these sites are attracting the attention of all possible Internet users. Most importantly, users from all age groups have become members of SNSs. Since many of the users are not aware of the data thefts associated with information sharing, they freely share their personal information with SNSs. Therefore, SNSs may be used for investigating users' character and social habits by familiar or even unknown persons and agencies. Such commercial and social scenario, has led to number of privacy and security threats. Though, all major issues in SNSs need to be addressed, by SNS providers, privacy of SNS users is the most crucial. And therefore, in this paper, we have focused our discussion on "privacy in SNSs". We have discussed different ways of Personally Identifiable Information (PII) leakages from SNSs, information revelation to third-party domains without user consent and privacy related threats associated with such information sharing. We expect that this comprehensive overview on privacy in SNSs will definitely help in raising user awareness about sharing data and managing their privacy with SNSs. It will also help SNS providers to rethink about their privacy policies.
Overview of AMS (CCSDS Asynchronous Message Service)
NASA Technical Reports Server (NTRS)
Burleigh, Scott
2006-01-01
This viewgraph presentation gives an overview of the Consultative Committee for Space Data Systems (CCSDS) Asynchronous Message Service (AMS). The topics include: 1) Key Features; 2) A single AMS continuum; 3) The AMS Protocol Suite; 4) A multi-continuum venture; 5) Constraining transmissions; 6) Security; 7) Fault Tolerance; 8) Performance of Reference Implementation; 9) AMS vs Multicast (1); 10) AMS vs Multicast (2); 11) RAMS testing exercise; and 12) Results.
Economic and Security Reasons Why the U.S. Should Normalize Relations with Cuba
2008-06-01
45 “Overview of Cuban Business Environment.” 27 Table 2. Active International Economic...reveals the depth and variety of Cuba’s FDI. By the end of 2000, the approximately 400 joint ventures in business in Cuba by the end of 2000...47 “Cuba Facts.” 48 “Overview of Cuban Business Environment.” 0 500 1000 1500 2000 2500 1993 1994 1995
1986-01-01
995AB.081 IDA303502 11. TITLE (Indclude Security Classafication) Developments in Neuropsychological and Neurophysiological Assessment: An overview of...progress and products of the JWGD3 Level I Neuropsychology Task Area Group 12. PERSONAL AU1TOR(S) Reeves, D.L.; Taube, S.L. 13a. TYPE OF REPORT I13b...Phone: (301) 588-0058 7 Developments in Neuropsychological and Neurophysiological Assessment An Overview of Progress and Products of the JWGD3 Level I
Code of Federal Regulations, 2010 CFR
2010-04-01
... positions in the specific security issue: (1) Cash/immediate net settled positions; (2) Net when-issued... appropriate for monitoring the impact of concentrations of positions in Treasury securities. (h) “Reportable...
A Semantic Based Policy Management Framework for Cloud Computing Environments
ERIC Educational Resources Information Center
Takabi, Hassan
2013-01-01
Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…
Code of Federal Regulations, 2010 CFR
2010-01-01
... is important to note that a mutual fund or employee benefit plan that is diversified for purposes of... 3(3) of the Employee Retirement Income Security Act of 1974, 29 U.S.C. 1002(3), and that has more... means a person who issues or proposes to issue any security, or has any outstanding security which it...
Reviews on Security Issues and Challenges in Cloud Computing
NASA Astrophysics Data System (ADS)
An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.
2016-11-01
Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.
Quality of working life issues of employees with a chronic physical disease: a systematic review.
de Jong, Merel; de Boer, Angela G E M; Tamminga, Sietske J; Frings-Dresen, Monique H W
2015-03-01
To assess issues that contribute to the Quality of Working Life (QWL) of employees with a chronic physical disease. A systematic literature search was conducted using the databases PubMed, PsycINFO and EMBASE. Experiences and perceptions during the working life of employees with a chronic physical disease were extracted and synthesized into issues that contributed to their QWL. We organized these synthesized QWL issues into higher order themes and categories with qualitative data analysis software. From a total of 4,044 articles identified by the search, 61 articles were included. Data extraction and data synthesis resulted in an overview of 73 QWL issues that were classified into 30 themes. The following five categories of themes were identified: (1) job characteristics with issues such as job flexibility and work-site access; (2) the social structure and environment containing issues about disclosure, discrimination, misunderstanding, and awareness by employers or colleagues; (3) organizational characteristics with issues such as requesting work accommodations; (4) individual work perceptions including issues about enjoyment and evaluating work or life priorities; and (5) effect of the disease and treatment including issues about cognitive and physical health and work ability. This systematic review offers an extensive overview of issues that might contribute to the QWL of employees with a chronic physical disease. This overview may function as a starting point for occupational support, such as monitoring and evaluating the QWL of employees with a chronic physical disease during return-to-work and work continuation processes.
17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.
Code of Federal Regulations, 2010 CFR
2010-04-01
... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...
17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.
Code of Federal Regulations, 2014 CFR
2014-04-01
... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...
17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.
Code of Federal Regulations, 2011 CFR
2011-04-01
... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...
17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.
Code of Federal Regulations, 2012 CFR
2012-04-01
... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...
17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.
Code of Federal Regulations, 2013 CFR
2013-04-01
... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...
NASA Technical Reports Server (NTRS)
Hernon, Peter; Pinelli, Thomas E.
1992-01-01
With its contribution to trade, its coupling with national security, and its symbolism of U.S. technological strength, the U.S. aerospace industry holds a unique position in the Nation's industrial structure. Federal science and technology policy and Federal scientific and technical information (STI) policy loom important as strategic contributions to the U.S. aerospace industry's leading competitive position. However, three fundamental policy problems exist. First, the United States lacks a coherent STI policy and a unified approach to the development of such a policy. Second, policymakers fail to understand the relationship of STI to science and technology policy. Third, STI is treated as a part of general information policy, without any recognition of its uniqueness. This paper provides an overview of the Federal information policy structure as it relates to STI and frames the policy issues that require resolution.
NASA Technical Reports Server (NTRS)
Hernon, Peter; Pinelli, Thomas E.
1992-01-01
With its contribution to trade, its coupling with national security, and its symbolism of U.S. technological strength, the U.S. aerospace industry holds a unique position in the Nation's industrial structure. Federal science and technology policy and Federal scientific and technical information (STI) policy loom important as strategic contributions to the U.S. aerospace industry's leading competitive position. However, three fundamental policy problems exist. First, the United States lacks a coherent STI policy and a unified approach to the development of such a policy. Second, policymakers fail to understand the relationship of STI to science and technology policy. Third, STI is treated as a part of general information policy, without any recognition of its uniqueness. This paper provides an overview of the Federal information policy structure as it relates to STI and frames the policy issues that require resolution.
Mallinder, Jason; Drabwell, Peter
Cyber threats are growing and evolving at an unprecedented rate.Consequently, it is becoming vitally important that organisations share information internally and externally before, during and after incidents they encounter so that lessons can be learned, good practice identified and new cyber resilience capabilities developed. Many organisations are reluctant to share such information for fear of divulging sensitive information or because it may be vague or incomplete. This provides organisations with a complex dilemma: how to share information as openly as possibly about cyber incidents, while protecting their confidentiality and focusing on service recovery from such incidents. This paper explores the dilemma of information sharing versus sensitivity and provides a practical overview of considerations every business continuity plan should address to plan effectively for information sharing in the event of a cyber incident.
Andreu-Perez, Javier; Poon, Carmen C Y; Merrifield, Robert D; Wong, Stephen T C; Yang, Guang-Zhong
2015-07-01
This paper provides an overview of recent developments in big data in the context of biomedical and health informatics. It outlines the key characteristics of big data and how medical and health informatics, translational bioinformatics, sensor informatics, and imaging informatics will benefit from an integrated approach of piecing together different aspects of personalized information from a diverse range of data sources, both structured and unstructured, covering genomics, proteomics, metabolomics, as well as imaging, clinical diagnosis, and long-term continuous physiological sensing of an individual. It is expected that recent advances in big data will expand our knowledge for testing new hypotheses about disease management from diagnosis to prevention to personalized treatment. The rise of big data, however, also raises challenges in terms of privacy, security, data ownership, data stewardship, and governance. This paper discusses some of the existing activities and future opportunities related to big data for health, outlining some of the key underlying issues that need to be tackled.
1992-06-01
Boards) Security, Privacy, and Freedom of Speech Issues 4.1.2 Understand the relationships between information processing and collection and...to-many (Mailing and discussion Lists) ... Many-to-Many (Bulletin Boards) Security, Privacy, and Freedom of Speech Issues 69 4.1.3 Understand the...Communication one-to-one (e-mail) °o° one-to-many (Mailing and discussion Lists) ... Many-to-Many (Bulletin Boards) oo Security, Privacy, and Freedom of Speech Issues
Multiuser Transmit Beamforming for Maximum Sum Capacity in Tactical Wireless Multicast Networks
2006-08-01
commonly used extended Kalman filter . See [2, 5, 6] for recent tutorial overviews. In particle filtering , continuous distributions are approximated by...signals (using and developing associated particle filtering tools). Our work on these topics has been reported in seven (IEEE, SIAM) journal papers and...multidimensional scaling, tracking, intercept, particle filters . 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT 18. SECURITY CLASSIFICATION OF
A Proven Methodology for Developing Secure Software and Applying It to Ground Systems
NASA Technical Reports Server (NTRS)
Bailey, Brandon
2016-01-01
Part Two expands upon Part One in an attempt to translate the methodology for ground system personnel. The goal is to build upon the methodology presented in Part One by showing examples and details on how to implement the methodology. Section 1: Ground Systems Overview; Section 2: Secure Software Development; Section 3: Defense in Depth for Ground Systems; Section 4: What Now?
2009-05-27
technology network architecture to connect various DHS elements and promote information sharing.17 • Establish a DHS State, Local, and Regional...A Strategic Plan; training, and the implementation of a comprehensive information systems architecture .65 As part of its integration...information technology network architecture was submitted to Congress last year. See DHS I&A, Homeland Security Information Technology Network
Keuleers, Emmanuel; Balota, David A
2015-01-01
This paper introduces and summarizes the special issue on megastudies, crowdsourcing, and large datasets in psycholinguistics. We provide a brief historical overview and show how the papers in this issue have extended the field by compiling new databases and making important theoretical contributions. In addition, we discuss several studies that use text corpora to build distributional semantic models to tackle various interesting problems in psycholinguistics. Finally, as is the case across the papers, we highlight some methodological issues that are brought forth via the analyses of such datasets.
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2014 CFR
2014-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
MyHealtheVet (VA's personal health record)
... Overview Site Map Help & User Guides FAQ Privacy & Security Terms and Conditions Policies Privacy Policy Web Policies FOIA Accessibility System Use Important Links VA Home White House USA.gov Inspector ...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... constitute a substantial portion of collateral if the aggregate principal amount, par value, or book value of...
Code of Federal Regulations, 2010 CFR
2010-04-01
... Electrification Administration. (a) Exemption. Any public utility company which is a subsidiary company of a... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of public utility subsidiaries as to certain securities issued to the Rural Electrification Administration. 250.47 Section 250.47...
ERIC Educational Resources Information Center
Schultz, Christopher
2012-01-01
Empirical research on information security trends and practices in e-learning is scarce. Many articles that have been published apply basic information security concepts to e-learning and list potential threats or propose frameworks for classifying threats. The purpose of this research is to identify, categorize and understand trends and issues in…
Issues of Human Security and Educational Development in the Niger Delta Region of Nigeria
ERIC Educational Resources Information Center
Ololube, Nwachukwu Prince; Kpolovie, Peter James; Amaele, Samuel
2013-01-01
Drawing from documents, observation, interview and questionnaire, we highlighted the role of issues of human security and its impact on the educational development of the Niger Delta region as well as means of enhancing human security in Nigeria. This article is a conceptual and methodological breakthrough in Nigeria's academic landscape where…
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2013 CFR
2013-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2010 CFR
2010-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2011 CFR
2011-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2014 CFR
2014-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2012 CFR
2012-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
Code of Federal Regulations, 2010 CFR
2010-04-01
... to certain employee benefit plans. 230.416 Section 230.416 Commodity and Securities Exchanges... provisions and interests to be issued pursuant to certain employee benefit plans. (a) If a registration... pursuant to an employee benefit plan, including interests in such plan that constitute separate securities...
20 CFR 404.1287 - Exceptions to the time limitations on assessments-for wages paid prior to 1987.
Code of Federal Regulations, 2010 CFR
2010-04-01
... determination; or (iv) The Social Security Administration has not issued to the State a final audit statement on... assessments-for wages paid prior to 1987. 404.1287 Section 404.1287 Employees' Benefits SOCIAL SECURITY... complete; or (iii) The Social Security Administration is developing a coverage or wage issue which was...
20 CFR 404.1287 - Exceptions to the time limitations on assessments-for wages paid prior to 1987.
Code of Federal Regulations, 2011 CFR
2011-04-01
... determination; or (iv) The Social Security Administration has not issued to the State a final audit statement on... assessments-for wages paid prior to 1987. 404.1287 Section 404.1287 Employees' Benefits SOCIAL SECURITY... complete; or (iii) The Social Security Administration is developing a coverage or wage issue which was...
Making Our Buildings Safer: Security Management and Equipment Issues.
ERIC Educational Resources Information Center
Clark, James H.
1997-01-01
Discusses three major components of library security: physical security of the environment; operating procedures for library staff, the public, and security personnel; and a contract security force (or campus security in academic institutions.) Topics include risk management; maintenance; appropriate technology, including security systems and…
Technical Data Exchange Software Tools Adapted to Distributed Microsatellite Design
NASA Astrophysics Data System (ADS)
Pache, Charly
2002-01-01
One critical issue concerning distributed design of satellites, is the collaborative work it requires. In particular, the exchange of data between each group responsible for each subsystem can be complex and very time-consuming. The goal of this paper is to present a design collaborative tool, the SSETI Design Model (SDM), specifically developed for enabling satellite distributed design. SDM is actually used in the ongoing Student Space Exploration &Technology (SSETI) initiative (www.sseti.net). SSETI is lead by European Space Agency (ESA) outreach office (http://www.estec.esa.nl/outreach), involving student groups from all over Europe for design, construction and launch of a microsatellite. The first part of this paper presents the current version of the SDM tool, a collection of Microsoft Excel linked worksheets, one for each subsystem. An overview of the project framework/structure is given, explaining the different actors, the flows between them, as well as the different types of data and the links - formulas - between data sets. Unified Modeling Language (UML) diagrams give an overview of the different parts . Then the SDM's functionalities, developed in VBA scripts (Visual Basic for Application), are introduced, as well as the interactive features, user interfaces and administration tools. The second part discusses the capabilities and limitations of SDM current version. Taking into account these capabilities and limitations, the third part outlines the next version of SDM, a web-oriented, database-driven evolution of the current version. This new approach will enable real-time data exchange and processing between the different actors of the mission. Comprehensive UML diagrams will guide the audience through the entire modeling process of such a system. Tradeoffs simulation capabilities, security, reliability, hardware and software issues will also be thoroughly discussed.
Thermal Design Overview of the Mars Exploration Rover Project
NASA Technical Reports Server (NTRS)
Tsuyuki, Glenn
2002-01-01
Contents include the following: Mission Overview. Thermal Environments. Driving Thermal Requirements. Thermal Design Approach. Thermal Control Block Diagram. Thermal Design Description. Thermal Analysis Results Summary. Testing Plans. Issues & Concerns.
Ethical issues in public health surveillance: a systematic qualitative review.
Klingler, Corinna; Silva, Diego Steven; Schuermann, Christopher; Reis, Andreas Alois; Saxena, Abha; Strech, Daniel
2017-04-04
Public health surveillance is not ethically neutral and yet, ethics guidance and training for surveillance programmes is sparse. Development of ethics guidance should be based on comprehensive and transparently derived overviews of ethical issues and arguments. However, existing overviews on surveillance ethics are limited in scope and in how transparently they derived their results. Our objective was accordingly to provide an overview of ethical issues in public health surveillance; in addition, to list the arguments put forward with regards to arguably the most contested issue in surveillance, that is whether to obtain informed consent. Ethical issues were defined based on principlism. We assumed an ethical issue to arise in surveillance when a relevant normative principle is not adequately considered or two principles come into conflict. We searched Pubmed and Google Books for relevant publications. We analysed and synthesized the data using qualitative content analysis. Our search strategy retrieved 525 references of which 83 were included in the analysis. We identified 86 distinct ethical issues arising in the different phases of the surveillance life-cycle. We further identified 20 distinct conditions that make it more or less justifiable to forego informed consent procedures. This is the first systematic qualitative review of ethical issues in public health surveillance resulting in a comprehensive ethics matrix that can inform guidelines, reports, strategy papers, and educational material and raise awareness among practitioners.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-02
... Collection Surrounding the Sale and Issue of Marketable Book-Entry Securities ACTION: Notice and request for... Department of the Treasury is soliciting comments concerning the Sale and Issue of Marketable Book-Entry... Marketable Book-Entry Securities. OMB Number: 1535-0112. Abstract: The information is requested to ensure...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...
Phillips, Andelka M.
2016-01-01
I provide an overview of the current state of the direct-to-consumer (DTC) genetic testing industry and the challenges that different types of testing pose for regulation. I consider the variety of services currently available. These range from health and ancestry tests to those for child talent, paternity, and infidelity. In light of the increasingly blurred lines among different categories of testing, I call for a broader discussion of DTC governance. I stress the importance of shifting our attention from the activities of the most prominent companies to viewing DTC genetics as an industry with a wide spectrum of services and raising a wide variety of issues. These issues go beyond questions of clinical utility and validity to those of data security, personal identity, race, and the nature of the family. Robust DTC testing has the power to provide meaningful clinical, genealogical and even forensic information to those who want it; in unscrupulous hands, however, it also has the power to deceive and exploit. I consider approaches to help ensure the former and minimize the latter. PMID:27047755
The effect of soil on human health: an overview.
Steffan, J J; Brevik, E C; Burgess, L C; Cerdà, A
2018-01-01
Soil has a considerable effect on human health, whether those effects are positive or negative, direct or indirect. Soil is an important source of nutrients in our food supply and medicines such as antibiotics. However, nutrient imbalances and the presence of human pathogens in the soil biological community can cause negative effects on health. There are also many locations where various elements or chemical compounds are found in soil at toxic levels, because of either natural conditions or anthropogenic activities. The soil of urban environments has received increased attention in the last few years, and they too pose a number of human health questions and challenges. Concepts such as soil security may provide a framework within which issues on soil and human health can be investigated using interdisciplinary and transdisciplinary approaches. It will take the contributions of experts in several different scientific, medical and social science fields to address fully soil and human health issues. Although much progress was made in understanding links between soil and human health over the last century, there is still much that we do not know about the complex interactions between them. Therefore, there is still a considerable need for research in this important area.
NASA Technical Reports Server (NTRS)
Goseva-Popstojanova, Katerina; Tyo, Jacob
2017-01-01
While some prior research work exists on characteristics of software faults (i.e., bugs) and failures, very little work has been published on analysis of software applications vulnerabilities. This paper aims to contribute towards filling that gap by presenting an empirical investigation of application vulnerabilities. The results are based on data extracted from issue tracking systems of two NASA missions. These data were organized in three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified security related software bugs and classified them in specific vulnerability classes. Then, we created the security vulnerability profiles, i.e., determined where and when the security vulnerabilities were introduced and what were the dominating vulnerabilities classes. Our main findings include: (1) In IVV issues datasets the majority of vulnerabilities were code related and were introduced in the Implementation phase. (2) For all datasets, around 90 of the vulnerabilities were located in two to four subsystems. (3) Out of 21 primary classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, they contributed from 80 to 90 of vulnerabilities in each dataset.
15 CFR Supplement No. 2 to Part 710 - Definitions of Production
Code of Federal Regulations, 2012 CFR
2012-01-01
... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS GENERAL INFORMATION AND OVERVIEW OF THE CHEMICAL WEAPONS CONVENTION REGULATIONS (CWCR) Pt. 710, Supp. 2...
15 CFR Supplement No. 2 to Part 710 - Definitions of Production
Code of Federal Regulations, 2013 CFR
2013-01-01
... (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS GENERAL INFORMATION AND OVERVIEW OF THE CHEMICAL WEAPONS CONVENTION REGULATIONS (CWCR) Pt. 710, Supp. 2...
Expanding the Role of Emergency Medical Services in Homeland Security
2013-03-01
1 A. BACKGROUND AND OVERVIEW .............................................................2 B ... B . DATA ANALYSIS .........................................................................................20 III. ANALYSIS AND EVALUATION—EMS AS...INTELLIGENCE SENSORS ......21 A. ACTING AS INTELLIGENCE SENSORS ................................................21 B . PREVENTION MODELS
Addressing the Economic Security Issues Facing Same-Sex Couples.
ERIC Educational Resources Information Center
Dolan, Elizabeth M.; Stum, Marlene S.; Rupured, Michael
1999-01-01
Provides educators and researchers with an awareness of the financial security issues faced by same-sex couples and offers suggestions for incorporating the discussion of these ideas into existing curricula and research. (Author/JOW)
2006-09-01
Lavoie, D. Kurts, SYNTHETIC ENVIRONMENTS AT THE ENTREPRISE LEVEL: OVERVIEW OF A GOVERNMENT OF CANADA (GOC), ACADEMIA and INDUSTRY DISTRIBUTED...vehicle (UAV) focused to locate the radiological source, and by comparing the performance of these assets in terms of various capability based...framework to analyze homeland security capabilities • Illustrate how a rapidly configured distributed simulation involving academia, industry and
Littoral Combat Ship Manpower, an Overview of Officer Characteristics and Placement
2013-03-01
15. NUMBER OF PAGES 103 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified 18. SECURITY CLASSIFICATION OF THIS PAGE...maritime force: 1.) Networks should be the central organizing principle of the fleet, and its sensing and fighting power should be distributed across...assured access” force; and 4.) Numbers of hulls count (quantity had its own quality) and consequently the fleet’s combat power should be
Secret Key Crypto Implementations
NASA Astrophysics Data System (ADS)
Bertoni, Guido Marco; Melzani, Filippo
This chapter presents the algorithm selected in 2001 as the Advanced Encryption Standard. This algorithm is the base for implementing security and privacy based on symmetric key solutions in almost all new applications. Secret key algorithms are used in combination with modes of operation to provide different security properties. The most used modes of operation are presented in this chapter. Finally an overview of the different techniques of software and hardware implementations is given.
Does Homeland Security Constitute an Emerging Academic Discipline?
2013-03-01
Postgraduate School NSA National Security Agency OED Oxford English Dictionary U.S. United States xiv THIS PAGE INTENTIONALLY LEFT BLANK xv...Curriculum Design: A Case Study in Neuroscience ,” The Journal of Undergraduate Neuroscience Education 10, no. 1 (2011): A71–A79. 37 physical reaction...article entitled, “A Conceptual Framework for Interdisciplinary Curriculum Design: A Case Study in Neuroscience :”140 Table 2. An Overview of
2010-03-19
network architecture to connect various DHS elements and promote information sharing.17 • Establish a DHS State, Local, and Regional Fusion Center...of reports; the I&A Strategic Plan; training, and the implementation of a comprehensive information systems architecture .73 As part of its...comprehensive information technology network architecture was submitted to Congress last year. See DHS I&A, Homeland Security Information Technology Network
Introduction: The SERENITY vision
NASA Astrophysics Data System (ADS)
Maña, Antonio; Spanoudakis, George; Kokolakis, Spyros
In this chapter we present an overview of the SERENITY approach. We describe the SERENITY model of secure and dependable applications and show how it addresses the challenge of developing, integrating and dynamically maintaining security and dependability mechanisms in open, dynamic, distributed and heterogeneous computing systems and in particular Ambient Intelligence scenarios. The chapter describes the basic concepts used in the approach and introduces the different processes supported by SERENITY, along with the tools provided.
Security Encryption Scheme for Communication of Web Based Control Systems
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
A layered trust information security architecture.
de Oliveira Albuquerque, Robson; Villalba, Luis Javier García; Orozco, Ana Lucila Sandoval; Buiati, Fábio; Kim, Tai-Hoon
2014-12-01
Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed.
Hemrich, Günter
2005-06-01
This case study reviews the experience of the Somalia Food Security Assessment Unit (FSAU) of operating a food security information system in the context of a complex emergency. In particular, it explores the linkages between selected features of the protracted crisis environment in Somalia and conceptual and operational aspects of food security information work. The paper specifically examines the implications of context characteristics for the establishment and operations of the FSAU field monitoring component and for the interface with information users and their diverse information needs. It also analyses the scope for linking food security and nutrition analysis and looks at the role of conflict and gender analysis in food security assessment work. Background data on the food security situation in Somalia and an overview of some key features of the FSAU set the scene for the case study. The paper is targeted at those involved in designing, operating and funding food security information activities.
Choices in International Conflict: With a Focus on Security Issues in Asia.
ERIC Educational Resources Information Center
Francis, Gregory; Mukai, Gary; Kim, Pearl; Leininger, James
Many world leaders and scholars feel that the U.S.-Japan Security Alliance is essential for long-term peace, prosperity, and stability in Asia. The purpose of this curriculum unit is to examine this alliance by introducing students to case studies of international conflict, with a focus on security issues in Asia. Through each of the lessons…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-18
... Policy, Department of Homeland Security, Washington, DC 20528. For privacy issues please contact: Mary...;Prices of new books are listed in the first FEDERAL REGISTER issue of each #0;week. #0; #0; #0; #0;#0...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--027 The History of...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...
An Overview of Legal Issues in Recreational Sports.
ERIC Educational Resources Information Center
Schultz, John H.
1989-01-01
Legal issues which intramural and recreational sports professionals should understand are discussed. These professionals need continuing education, and legal issues should be part of professional development programs in recreational sports, emphasizing programing (civil liberties, civil rights, and criminal issues) and administration…
Computerized Adaptive Testing: Overview and Introduction.
ERIC Educational Resources Information Center
Meijer, Rob R.; Nering, Michael L.
1999-01-01
Provides an overview of computerized adaptive testing (CAT) and introduces contributions to this special issue. CAT elements discussed include item selection, estimation of the latent trait, item exposure, measurement precision, and item-bank development. (SLD)
Strategic Challenges during Changing Times: A Prioritized Research Program, 1994
1994-04-01
and planning. 14, SUBJECT T[RMS 15 NUMBER OF PAGES strategic assessments; domestic and global issues and 5 trends; peace operations; political...1994 or which, for a variety of reasons, will riot be published. 3 SECTION I TRANSREGIONAL SECURITY CONCERNS Regional Challenges, Global Issues . When...but global issues . Global security issues derive from three forms of connectivity. The first is economic. Today, there is truly a world economy. Markets
Treatment Option Overview (Childhood Rhabdomyosarcoma)
... to boost, direct, or restore the body’s natural defenses against cancer. This type of cancer treatment is ... Security Reuse & Copyright Syndication Services Website Linking U.S. Department of Health and Human Services National Institutes of ...
Treatment Option Overview (Kaposi Sarcoma)
... to boost, direct, or restore the body's natural defenses against cancer. This type of cancer treatment is ... Security Reuse & Copyright Syndication Services Website Linking U.S. Department of Health and Human Services National Institutes of ...
Treatment Option Overview (Vulvar Cancer)
... to boost, direct, or restore the body’s natural defenses against cancer. This type of cancer treatment is ... Security Reuse & Copyright Syndication Services Website Linking U.S. Department of Health and Human Services National Institutes of ...
Treatment Option Overview (Bladder Cancer)
... to boost, direct, or restore the body’s natural defenses against cancer. This type of cancer treatment is ... Security Reuse & Copyright Syndication Services Website Linking U.S. Department of Health and Human Services National Institutes of ...
SSBRP User Operations Facility (UOF) Overview and Development Strategy
NASA Technical Reports Server (NTRS)
Picinich, Lou; Stone, Thom; Sun, Charles; Windrem, May; Givens, John J. (Technical Monitor)
1995-01-01
This paper will present the Space Station Biological Research Project (SSBRP) User Operations Facility (UOF) architecture and development strategy. A major element of the UOF at NASA Ames Research Center, the Communication and Data System (CDS) will be the primary focus of the discussions. CDS operational, telescience, security, and development objectives will be discussed along with CDS implementation strategy. The implementation strategy discussions will include: Object Oriented Analysis & Design, System & Software Prototyping, and Technology Utilization. A CDS design overview that includes: CDS Context Diagram, CDS Architecture, Object Models, Use Cases, and User Interfaces will also be presented. CDS development brings together "cutting edge" technologies and techniques such as: object oriented development, network security, multimedia networking, web-based data distribution, JAVA, and graphical user interfaces. Use of these "cutting edge" technologies and techniques translates directly to lower development and operations costs.
Medical coverage of winter Nordic sports: an overview from the field.
Gaul, Lawrence W
2010-01-01
Traveling with sports teams requires flexibility and a wide range of knowledge, as well as problem-solving abilities. Dominating the medical types of problems in the Nordic sports are the respiratory illnesses, especially asthma and upper respiratory infections (URI). Additionally, the team physician must have an awareness of antidoping issues. This overview highlights many of the issues encountered traveling domestically as well as internationally with high-level Nordic teams. Helpful links are included to facilitate the care of all levels of athletes. Additionally, a few side issues such as altitude illness and minor trauma are mentioned.
Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference
... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...
Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna
2017-04-10
This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.
Material efficiency: providing material services with less material production
Allwood, Julian M.; Ashby, Michael F.; Gutowski, Timothy G.; Worrell, Ernst
2013-01-01
Material efficiency, as discussed in this Meeting Issue, entails the pursuit of the technical strategies, business models, consumer preferences and policy instruments that would lead to a substantial reduction in the production of high-volume energy-intensive materials required to deliver human well-being. This paper, which introduces a Discussion Meeting Issue on the topic of material efficiency, aims to give an overview of current thinking on the topic, spanning environmental, engineering, economics, sociology and policy issues. The motivations for material efficiency include reducing energy demand, reducing the emissions and other environmental impacts of industry, and increasing national resource security. There are many technical strategies that might bring it about, and these could mainly be implemented today if preferred by customers or producers. However, current economic structures favour the substitution of material for labour, and consumer preferences for material consumption appear to continue even beyond the point at which increased consumption provides any increase in well-being. Therefore, policy will be required to stimulate material efficiency. A theoretically ideal policy measure, such as a carbon price, would internalize the externality of emissions associated with material production, and thus motivate change directly. However, implementation of such a measure has proved elusive, and instead the adjustment of existing government purchasing policies or existing regulations— for instance to do with building design, planning or vehicle standards—is likely to have a more immediate effect. PMID:23359746
Material efficiency: providing material services with less material production.
Allwood, Julian M; Ashby, Michael F; Gutowski, Timothy G; Worrell, Ernst
2013-03-13
Material efficiency, as discussed in this Meeting Issue, entails the pursuit of the technical strategies, business models, consumer preferences and policy instruments that would lead to a substantial reduction in the production of high-volume energy-intensive materials required to deliver human well-being. This paper, which introduces a Discussion Meeting Issue on the topic of material efficiency, aims to give an overview of current thinking on the topic, spanning environmental, engineering, economics, sociology and policy issues. The motivations for material efficiency include reducing energy demand, reducing the emissions and other environmental impacts of industry, and increasing national resource security. There are many technical strategies that might bring it about, and these could mainly be implemented today if preferred by customers or producers. However, current economic structures favour the substitution of material for labour, and consumer preferences for material consumption appear to continue even beyond the point at which increased consumption provides any increase in well-being. Therefore, policy will be required to stimulate material efficiency. A theoretically ideal policy measure, such as a carbon price, would internalize the externality of emissions associated with material production, and thus motivate change directly. However, implementation of such a measure has proved elusive, and instead the adjustment of existing government purchasing policies or existing regulations-- for instance to do with building design, planning or vehicle standards--is likely to have a more immediate effect.
ERIC Educational Resources Information Center
Education Law Association, Dayton, OH.
This booklet contains five chapters relating to issues in school safety and security, and fair dismissals: (1) "Ohio Legislation and Federal and State Decisions" (Richard J. Dickinson). Items of deliberation include financial matters, school safety issues, administrator and teacher contract matters, Title IX liability, school prayer, drug testing…
NASA Astrophysics Data System (ADS)
Straub, Jeremy
2017-06-01
A wide variety of characteristics of 3D printed objects have been linked to impaired structural integrity and use-efficacy. The printing material can also have a significant impact on the quality, utility and safety characteristics of a 3D printed object. Material issues can be created by vendor issues, physical security issues and human error. This paper presents and evaluates a system that can be used to detect incorrect material use in a 3D printer, using visible light imaging. Specifically, it assesses the ability to ascertain the difference between materials of different color and different types of material with similar coloration.
ERIC Educational Resources Information Center
Johnston, C. Conrad; Slemenda, Charles
1987-01-01
An overview of osteoporosis, its types, causes, diagnosis, and treatment is presented. Risk factors and bone mass measurement are also discussed. This article serves as an introduction to a symposium on osteoporosis containing five other articles in this issue. (MT)
Medical image security in a HIPAA mandated PACS environment.
Cao, F; Huang, H K; Zhou, X Q
2003-01-01
Medical image security is an important issue when digital images and their pertinent patient information are transmitted across public networks. Mandates for ensuring health data security have been issued by the federal government such as Health Insurance Portability and Accountability Act (HIPAA), where healthcare institutions are obliged to take appropriate measures to ensure that patient information is only provided to people who have a professional need. Guidelines, such as digital imaging and communication in medicine (DICOM) standards that deal with security issues, continue to be published by organizing bodies in healthcare. However, there are many differences in implementation especially for an integrated system like picture archiving and communication system (PACS), and the infrastructure to deploy these security standards is often lacking. Over the past 6 years, members in the Image Processing and Informatics Laboratory, Childrens Hospital, Los Angeles/University of Southern California, have actively researched image security issues related to PACS and teleradiology. The paper summarizes our previous work and presents an approach to further research on the digital envelope (DE) concept that provides image integrity and security assurance in addition to conventional network security protection. The DE, including the digital signature (DS) of the image as well as encrypted patient information from the DICOM image header, can be embedded in the background area of the image as an invisible permanent watermark. The paper outlines the systematic development, evaluation and deployment of the DE method in a PACS environment. We have also proposed a dedicated PACS security server that will act as an image authority to check and certify the image origin and integrity upon request by a user, and meanwhile act also as a secure DICOM gateway to the outside connections and a PACS operation monitor for HIPAA supporting information. Copyright 2002 Elsevier Science Ltd.
Contemporary United States Foreign Policy Towards Indonesia
2004-01-01
regard to resolving a number of longstanding territorial disputes, and it has become a cornerstone for the promotion of economic and social development...and stability and security in the region. However, Indonesia is also faced with a variety of social , economic, and internal security issues, most...faced with significant social , economic, and security issues. Thesis Question The thesis question is: Does contemporary US policy promote US national
On the Brink: Instability and the Prospect of State Failure in Pakistan
2010-04-12
unpredictable posture. Most importantly, these historical events, coupled with current political , economic, and security related issues, have created a...current political , economic, and security related issues, have created a fragile state with the propensity to fail. Therefore, this monograph highlights...hardships that have affected the state’s political stability, economic performance, and security. These unrelenting problems lie at the foundation
Is the biggest security threat to medical information simply a lack of understanding?
Williams, Patricia A H
2011-01-01
Connecting Australian health services and the e-health initiative is a major focus in the current health environment. Many issues are presented as key to its success including solving issues with confidentiality and privacy. However, the main problem may not be these issues in sharing information but the fact that the point of origin of such records is still relatively insecure. This paper highlights why this may be the case. Research into the security of medical information has shown that many primary healthcare providers are unable to create an environment with effective information security. Numerous factors contribute to this complex situation including a trustful environment, the resultant security culture and the capability of individual healthcare organisations. Further, the growing importance of new directions in the use of patient information is considered. This paper discusses these issues and positions them within the complex environment that is healthcare. In our current health system infrastructure, the points of origin of patient information are our most vulnerable. This entwined with progressively new uses of this information expose additional security concerns, such as re-identification of information, that require attention.
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Contingency Measures § 1542.303 Security Directives and Information Circulars. (a) TSA may issue an... Security Directive by submitting data, views, or arguments in writing to TSA. TSA may amend the Security...
Whither the RMA: Two Perspectives on Tomorrow’s Army
1994-07-22
HENRI (ROY) ALCALA heads a consulting firm, Alcala Enterprises, which specializes in national security and foreign policy issues . He retired from the...thinking about national security was too constrained by immediate issues . Downsizing of force structure, budget reductions, Bosnia, and other issues were all...these immediate issues as signposts of the future, even though little evidence existed to support such aI :use. From many years of experience in long
Safe and Secure Partitioning with Pikeos: Towards Integrated Modular Avionics in Space
NASA Astrophysics Data System (ADS)
Almeida, J.; Prochazka, M.
2009-05-01
This paper presents our approach to logical partitioning of spacecraft onboard software. We present PikeOS, a separation micro-kernel which applies the state-of-the- art techniques and widely recognised standards such as ARINC 653 and MILS in order to guarantee safety and security properties of partitions executing software with different criticality and confidentiality. We provide an overview of our approach, also used in the Securely Partitioning Spacecraft Computing Resources project, an ESA TRP contract, which shifts spacecraft onboard software development towards the Integrated Modular Avionics concept with relevance for dual-use military and civil missions.
Database security and encryption technology research and application
NASA Astrophysics Data System (ADS)
Zhu, Li-juan
2013-03-01
The main purpose of this paper is to discuss the current database information leakage problem, and discuss the important role played by the message encryption techniques in database security, As well as MD5 encryption technology principle and the use in the field of website or application. This article is divided into introduction, the overview of the MD5 encryption technology, the use of MD5 encryption technology and the final summary. In the field of requirements and application, this paper makes readers more detailed and clearly understood the principle, the importance in database security, and the use of MD5 encryption technology.
Physical layer security in fiber-optic MIMO-SDM systems: An overview
NASA Astrophysics Data System (ADS)
Guan, Kyle; Cho, Junho; Winzer, Peter J.
2018-02-01
Fiber-optic transmission systems provide large capacities over enormous distances but are vulnerable to simple eavesdropping attacks at the physical layer. We classify key-based and keyless encryption and physical layer security techniques and discuss them in the context of optical multiple-input-multiple-output space-division multiplexed (MIMO-SDM) fiber-optic communication systems. We show that MIMO-SDM not only increases system capacity, but also ensures the confidentiality of information transmission. Based on recent numerical and experimental results, we review how the unique channel characteristics of MIMO-SDM can be exploited to provide various levels of physical layer security.
Modeling Security Aspects of Network
NASA Astrophysics Data System (ADS)
Schoch, Elmar
With more and more widespread usage of computer systems and networks, dependability becomes a paramount requirement. Dependability typically denotes tolerance or protection against all kinds of failures, errors and faults. Sources of failures can basically be accidental, e.g., in case of hardware errors or software bugs, or intentional due to some kind of malicious behavior. These intentional, malicious actions are subject of security. A more complete overview on the relations between dependability and security can be found in [31]. In parallel to the increased use of technology, misuse also has grown significantly, requiring measures to deal with it.
Legal issues of the electronic dental record: security and confidentiality.
Szekely, D G; Milam, S; Khademi, J A
1996-01-01
Computer-based, electronic dental record keeping involves complex issues of patient privacy and the dental practitioner's ethical duty of confidentiality. Federal and state law is responding to the new legal issues presented by computer technology. Authenticating the electronic record in terms of ensuring its reliability and accuracy is essential in order to protect its admissibility as evidence in legal actions. Security systems must be carefully planned to limit access and provide for back-up and storage of dental records. Carefully planned security systems protect the patient from disclosure without the patient's consent and also protect the practitioner from the liability that would arise from such disclosure. Human errors account for the majority of data security problems. Personnel security is assured through pre-employment screening, employment contracts, policies, and staff education. Contracts for health information systems should include provisions for indemnification and ensure the confidentiality of the system by the vendor.
ERIC Educational Resources Information Center
Dunford, Christopher; Denman, Vicki
This paper introduces the reader to microfinance integrated with health and nutrition education as a promising strategy for Title II practitioners. The paper provides an overview of how microfinance, particularly village banking, can contribute to the food-security objectives of Title II. It describes a variant of village banking, called…
The stem canker (blackleg) fungus, Leptosphaeria maculans, enters the genomic era.
Rouxel, T; Balesdent, M H
2005-05-01
SUMMARY Leptosphaeria maculans is the most ubiquitous pathogen of Brassica crops, and mainly oilseed brassicas (oilseed rape, canola), causing the devastating 'stem canker' or 'blackleg'. This review summarizes our current knowledge on the pathogen, from taxonomic issues to specific life traits. It mainly illustrates the importance of formal genetics approaches on the pathogen side to dissect the interaction with the host plants. In addition, this review presents the main current research topics on L. maculans and focuses on the L. maculans genome initiative recently begun, including its main research issues. Leptosphaeria maculans (Desm.) Ces. & de Not. (anamorph Phoma lingam Tode ex Fr.). Kingdom Fungi, Phylum Ascomycota, Class Dothideomycetes (Loculoascomycetes), Order Pleosporales, Genus Leptosphaeria, Species maculans. cultivated Brassicas such as Brassica napus (oilseed rape, canola), B. rapa, B. juncea, B. oleracea, etc., along with numerous wild crucifers species. Arabidopsis thaliana was recently reported to be a potential host for L. maculans. Primary disease symptoms are greyish-green collapse of cotyledon or leaf tissue, without a visible margin, bearing tiny black spots (pycnidia). The fungus then develops an endophytic symptomless growth for many months. Secondary symptoms, at the end of the growing season, are dry necroses of the crown tissues with occasional blackening (stem canker or blackleg) causing lodging of the plants. Pseudothecia differentiate on leftover residues. Seedling damping-off and premature ripening are also reported under certain environmental conditions. Leptosphaeria maculans sequencing project at Genoscope: http://www.genoscope.cns.fr/externe/English/Projets/Projet_DM/organisme_DM.html; the SECURE site: http://www.secure.rothamsted.ac.uk/ the 'Blackleg' group at the University of Melbourne: http://www.botany.unimelb.edu.au/blackleg/overview.htm.
Functional-Based Assessment of Social Behavior: Introduction and Overview.
ERIC Educational Resources Information Center
Lewis, Timothy J.; Sugai, George
1994-01-01
This introduction to and overview of a special issue on social behavior assessment within schools discusses the impact of function-based methodologies on assessment and intervention practices in identification and remediation of challenging social behaviors. (JDD)
2015-09-01
riots, Ferguson riots, AIDS, National Security Agency (NSA) leaks, childhood obesity , and social security. Thirteen issues make up this cluster...civil issues with low numbers of fatalities and economic impacts. Issues of this kind include childhood obesity (2.25 hearings per year); riots due...up the 25th to 50th percentile include those having only tangential impact to the public, including among others, global warming, childhood obesity
Secrecy vs. the need for ecological information: challenges to environmental activism in Russia.
Jandl, T
1998-01-01
This article identifies the lessons learned from the Nikitin case study in Russia. The Nikitin case involves the analysis of sources of radioactive contamination in several Russian counties and in the Russian Northern Fleet. Norway was interested in the issue due to proximity to the storage sites. The issue involved national security and environmental protection. It was learned that mixing national security issues with environmental issues offers dangerous and multiple challenges. Environmental groups must build relationships with a wide audience. International security policy must include the issues of globalization of trade and the spread of environmental problems into the global commons (oceans and atmosphere). The risk of an environmentally dangerous accident as a consequence of Cold War activities is greater than the risk of nuclear war. Secrecy in military affairs is not justified when there is inadequate storage of nuclear weapons and contaminated materials. In Russia, the concern is great due to their economic transition and shortages of funds for even the most basic needs, which excludes nuclear waste clean up. The Bellona Foundation studied the extent of nuclear pollution from military nuclear reactors in the Kola peninsula of northwest Russia, in 1994 and 1996. Russian security police arrested one of the report authors for alleged national security violations. A valuable lesson learned was that local Russian environmental groups needed international support. The military nuclear complex poses an enormous hazard. Limiting inspections is an unacceptable national security risk. The new Russian law on state secrets is too broad.
50 CFR 600.240 - Security assurances.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 50 Wildlife and Fisheries 12 2013-10-01 2013-10-01 false Security assurances. 600.240 Section 600... ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Council Membership § 600.240 Security assurances. (a) DOC Office of Security will issue security assurances to Council members following completion...
50 CFR 600.240 - Security assurances.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 50 Wildlife and Fisheries 12 2012-10-01 2012-10-01 false Security assurances. 600.240 Section 600... ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Council Membership § 600.240 Security assurances. (a) DOC Office of Security will issue security assurances to Council members following completion...
5 CFR 1312.31 - Security violations.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 5 Administrative Personnel 3 2013-01-01 2013-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified Information § 1312.31 Security violations. (a) A security violation notice is issued by the United...
50 CFR 600.240 - Security assurances.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 50 Wildlife and Fisheries 10 2011-10-01 2011-10-01 false Security assurances. 600.240 Section 600... ADMINISTRATION, DEPARTMENT OF COMMERCE MAGNUSON-STEVENS ACT PROVISIONS Council Membership § 600.240 Security assurances. (a) DOC Office of Security will issue security assurances to Council members following completion...
Retail video analytics: an overview and survey
NASA Astrophysics Data System (ADS)
Connell, Jonathan; Fan, Quanfu; Gabbur, Prasad; Haas, Norman; Pankanti, Sharath; Trinh, Hoang
2013-03-01
Today retail video analytics has gone beyond the traditional domain of security and loss prevention by providing retailers insightful business intelligence such as store traffic statistics and queue data. Such information allows for enhanced customer experience, optimized store performance, reduced operational costs, and ultimately higher profitability. This paper gives an overview of various camera-based applications in retail as well as the state-ofthe- art computer vision techniques behind them. It also presents some of the promising technical directions for exploration in retail video analytics.
A Survey on Cyber Security awareness among college students in Tamil Nadu
NASA Astrophysics Data System (ADS)
Senthilkumar, K.; Easwaramoorthy, Sathishkumar
2017-11-01
The aim of the study is to analyse the awareness of cyber security on college students in Tamil Nadu by focusing various security threats in the internet. In recent years cybercrime is an enormous challenge in all areas including national security, public safety and personal privacy. To prevent from a victim of cybercrime everyone must know about their own security and safety measures to protect by themselves. A well-structured questionnaire survey method will be applied to analyse the college student’s awareness in the area of cyber security. This survey will be going to conducted in major cities of Tamil Nadu by focusing various security threats like email, virus, phishing, fake advertisement, popup windows and other attacks in the internet. This survey examines the college students’ awareness and the level of awareness about the security issues and some suggestions are set forth to overcome these issues.
14 CFR 415.23 - Policy review.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... license application to determine whether it presents any issues affecting U.S. national security or... presents any issues affecting U.S. national security. (2) The FAA consults with the Department of State to...
14 CFR 431.55 - Payload reentry review.
Code of Federal Regulations, 2012 CFR
2012-01-01
....55 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT... any issues that would adversely affect U.S. national security or foreign policy interests, would... reentry of a proposed payload presents any issues adversely affecting U.S. national security. (c) The FAA...
14 CFR 431.55 - Payload reentry review.
Code of Federal Regulations, 2013 CFR
2013-01-01
....55 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT... any issues that would adversely affect U.S. national security or foreign policy interests, would... reentry of a proposed payload presents any issues adversely affecting U.S. national security. (c) The FAA...
14 CFR 431.55 - Payload reentry review.
Code of Federal Regulations, 2010 CFR
2010-01-01
....55 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT... any issues that would adversely affect U.S. national security or foreign policy interests, would... reentry of a proposed payload presents any issues adversely affecting U.S. national security. (c) The FAA...
14 CFR 431.55 - Payload reentry review.
Code of Federal Regulations, 2011 CFR
2011-01-01
....55 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT... any issues that would adversely affect U.S. national security or foreign policy interests, would... reentry of a proposed payload presents any issues adversely affecting U.S. national security. (c) The FAA...
14 CFR 415.23 - Policy review.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... license application to determine whether it presents any issues affecting U.S. national security or... presents any issues affecting U.S. national security. (2) The FAA consults with the Department of State to...
14 CFR 415.23 - Policy review.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... license application to determine whether it presents any issues affecting U.S. national security or... presents any issues affecting U.S. national security. (2) The FAA consults with the Department of State to...
Internet-Mediated Learning in Public Affairs Programs: Issues and Implications.
ERIC Educational Resources Information Center
Rahm, Dianne; Reed, B. J.; Rydl, Teri L.
1999-01-01
An overview of Internet-mediated learning in public affairs programs identifies issues for faculty, students, and administrators, including intellectual property rights, instructional issues, learning approaches, student expectations, logistics and support, complexity of coordination, and organizational control. (DB)
Personal health record systems and their security protection.
Win, Khin Than; Susilo, Willy; Mu, Yi
2006-08-01
The objective of this study is to analyze the security protection of personal health record systems. To achieve this we have investigated different personal health record systems, their security functions, and security issues. We have noted that current security mechanisms are not adequate and we have proposed some security mechanisms to tackle these problems.
Enhancing security and improving interoperability in healthcare information systems.
Gritzalis, D A
1998-01-01
Security is a key issue in healthcare information systems, since most aspects of security become of considerable or even critical importance when handling healthcare information. In addition, the intense need for information exchange has revealed interoperability of systems and applications as another key issue. Standardization can play an important role towards both these issues. In this paper, relevant standardization activities are briefly presented, and existing and emerging healthcare information security standards are identified and critically analysed. The analysis is based on a framework which has been developed for this reason. Therefore, the identification of gaps and inconsistencies in current standardization, the description of the conflicts of standards with legislation, and the analysis of implications of these standards to user organizations, are the main results of this paper.
The SENTINEL-3 Mission: Overview and Status
NASA Astrophysics Data System (ADS)
Benveniste, J.; Mecklenburg, S.
2015-12-01
The Copernicus Programme, being Europe's Earth Observation and Monitoring Programme led by the European Union, aims to provide, on a sustainable basis, reliable and timely services related to environmental and security issues. The Sentinel-3 mission forms part of the Copernicus Space Component. Its main objectives, building on the heritage and experience of the European Space Agency's (ESA) ERS and ENVISAT missions, are to measure sea-surface topography, sea- and land-surface temperature and ocean- and land-surface colour in support of ocean forecasting systems, and for environmental and climate monitoring. The series of Sentinel-3 satellites will ensure global, frequent and near-real time ocean, ice and land monitoring, with the provision of observation data in routine, long term (up to 20 years of operations) and continuous fashion, with a consistent quality and a high level of reliability and availability. The Sentinel-3 missions will be jointly operated by ESA and EUMETSAT. ESA will be responsible for the operations, maintenance and evolution of the Sentinel-3 ground segment on land related products and EUMETSAT for the marine products. The Sentinel-3 ground segment systematically acquires, processes and distributes a set of pre-defined core data products. Sentinel-3A is foreseen to be launched at the beginning of November 2015. The paper will give an overview on the mission, its instruments and objectives, the data products provided, the mechanisms to access the mission's data, and if available first results.
Cancer Genetics Overview (PDQ®)—Health Professional Version
Cancer Genetics Overview discusses hereditary cancers and the role of genetic variants (mutations). Get information about genetic counseling, familial cancer syndromes, genomic sequencing, germline and somatic testing, ethical and legal issues and more in this summary for clinicians.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This presentation provides a high-level overview of the current U.S. shared solar landscape, the impact that a given shared solar program's structure has on requiring federal securities oversight, as well as an estimate of market potential for U.S. shared solar deployment.
15 CFR 782.1 - Overview of reporting requirements under the APR.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL... (see § 782.5 of the APR). In addition, forms may be downloaded from the Internet at http://www.ap.gov. ...
15 CFR 782.1 - Overview of reporting requirements under the APR.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL... (see § 782.5 of the APR). In addition, forms may be downloaded from the Internet at http://www.ap.gov. ...
15 CFR 782.1 - Overview of reporting requirements under the APR.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL... (see § 782.5 of the APR). In addition, forms may be downloaded from the Internet at http://www.ap.gov. ...
15 CFR 782.1 - Overview of reporting requirements under the APR.
Code of Federal Regulations, 2014 CFR
2014-01-01
... Foreign Trade (Continued) BUREAU OF INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE ADDITIONAL PROTOCOL... (see § 782.5 of the APR). In addition, forms may be downloaded from the Internet at http://www.ap.gov. ...
The Struggle against Sex Discrimination.
ERIC Educational Resources Information Center
Williamson, Jane
1982-01-01
Provides overview of laws, policies, and regulations available to women to secure their job rights when faced with sex discrimination. Equal pay, sexual harassment, pregnancy discrimination, and affirmative action are discussed, noting procedures involved in filing a complaint. (EJS)
Real Time Conference 2014 Overview
NASA Astrophysics Data System (ADS)
Nomachi, Masaharu
2015-06-01
This article presents an overview of the 19th Real Time Conference held last May 26-30, 2014, at the Nara Prefectural New Public Hall, Nara, Japan, organized by the Research Center for Nuclear Physics of the Osaka University. The program included many invited talks and oral sessions offering an extensive overview on the following topics: real-time system architectures, intelligent signal processing, fast data transfer links and networks, trigger systems, data acquisition, processing-farms, control, monitoring and test systems, emerging real-time technologies, new standards, real-time safety and security, and some feedback on experiences. In parallel to the oral and poster presentations, industrial exhibits by companies, workshops and short courses also ran through the week.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...
A new method of enhancing telecommand security: the application of GCM in TC protocol
NASA Astrophysics Data System (ADS)
Zhang, Lei; Tang, Chaojing; Zhang, Quan
2007-11-01
In recent times, security has grown to a topic of major importance for the space missions. Many space agencies have been engaged in research on the selection of proper algorithms for ensuring Telecommand security according to the space communication environment, especially in regard to the privacy and authentication. Since space missions with high security levels need to ensure both privacy and authentication, Authenticated Encryption with Associated Data schemes (AEAD) be integrated into normal Telecommand protocols. This paper provides an overview of the Galois Counter Mode (GCM) of operation, which is one of the available two-pass AEAD schemes, and some preliminary considerations and analyses about its possible application to Telecommand frames specified by CCSDS.
Code of Federal Regulations, 2011 CFR
2011-04-01
... under the Securities Act of 1933 of securities of certain real estate companies. 239.18 Section 239.18... Securities Act of 1933 of securities of certain real estate companies. This form shall be used for registration under the Securities Act of 1933 of (a) securities issued by real estate investment trusts, as...
Code of Federal Regulations, 2010 CFR
2010-04-01
... under the Securities Act of 1933 of securities of certain real estate companies. 239.18 Section 239.18... Securities Act of 1933 of securities of certain real estate companies. This form shall be used for registration under the Securities Act of 1933 of (a) securities issued by real estate investment trusts, as...
17 CFR 240.11d1-1 - Exemption of certain securities from section 11(d)(1).
Code of Federal Regulations, 2010 CFR
2010-04-01
... issued to the customer as a stockholder of the corporation issuing the security upon which credit is to... issued to the customer as a stockholder if he actually owned the stock giving rise to the right when such right accrued, even though such stock was not registered in his name; and in determining such fact the...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What are the book-entry systems in... BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS... book-entry systems in which auctioned Treasury securities may be issued or maintained? There are three...
Greenberg, Sheldon F
2007-09-01
In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.
Peer Educators Responding to Students with Mental Health Issues
ERIC Educational Resources Information Center
Daddona, Mark F.
2011-01-01
As more college students face severe mental health issues, peer educators need effective communication skills and knowledge of campus counseling services to properly make referrals while continuing the peer relationship. This chapter presents an overview of current mental health issues in college students. These issues must be understood and…
The (in)adequacy of applicative use of quantum cryptography in wireless sensor networks
NASA Astrophysics Data System (ADS)
Turkanović, Muhamed; Hölbl, Marko
2014-10-01
Recently quantum computation and cryptography principles are exploited in the design of security systems for wireless sensor networks (WSNs), which are consequently named as quantum WSN. Quantum cryptography is presumably secure against any eavesdropper and thus labeled as providing unconditional security. This paper tries to analyze the aspect of the applicative use of quantum principles in WSN. The outcome of the analysis elaborates a summary about the inadequacy of applicative use of quantum cryptography in WSN and presents an overview of all possible applicative challenges and problems while designing quantum-based security systems for WSN. Since WSNs are highly complex frameworks, with many restrictions and constraints, every security system has to be fully compatible and worthwhile. The aim of the paper was to contribute a verdict about this topic, backed up by equitable facts.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-15
... to certain issues of securities in DTC's Fast Automated Securities Transfer program (``FAST''). For securities that are part of the FAST program, the transfer agents hold the securities registered in the name...
A Layered Trust Information Security Architecture
de Oliveira Albuquerque, Robson; García Villalba, Luis Javier; Sandoval Orozco, Ana Lucila; Buiati, Fábio; Kim, Tai-Hoon
2014-01-01
Information can be considered the most important asset of any modern organization. Securing this information involves preserving confidentially, integrity and availability, the well-known CIA triad. In addition, information security is a risk management job; the task is to manage the inherent risks of information disclosure. Current information security platforms do not deal with the different facets of information technology. This paper presents a layered trust information security architecture (TISA) and its creation was motivated by the need to consider information and security from different points of view in order to protect it. This paper also extends and discusses security information extensions as a way of helping the CIA triad. Furthermore, this paper suggests information representation and treatment elements, operations and support components that can be integrated to show the various risk sources when dealing with both information and security. An overview of how information is represented and treated nowadays in the technological environment is shown, and the reason why it is so difficult to guarantee security in all aspects of the information pathway is discussed. PMID:25470490
Review of Congressional Issues. News from Capitol Hill.
ERIC Educational Resources Information Center
Heinz, Ann Simeo
2002-01-01
Focuses on U.S. congressional issues in two categories: (1) enacted legislation, and (2) proposed legislation. Addresses topics such as the resolution related to Iraq, the Department of Homeland Security, Pledge of Allegiance, social security protection, elder justice, and women's rights. Includes learning activities. (CMK)
13 CFR 107.1505 - Liquidity requirements for Licensees issuing Participating Securities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Liquidity requirements for Licensees issuing Participating Securities. 107.1505 Section 107.1505 Business Credit and Assistance SMALL BUSINESS ADMINISTRATION SMALL BUSINESS INVESTMENT COMPANIES SBA Financial Assistance for Licensees...
Cloud Security: Issues and Research Directions
2014-11-18
4. Cloud Computing Security: What Changes with Software - Defined Networking ? Maur´ıcio Tsugawa, Andr´ea Matsunaga, and Jos´e A. B. Fortes 5...machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software - Defined ... Networking ( SDN ) is deployed within and across clouds. Chapters 5-9 are focused on the protection of data stored in the cloud. In Chapter 5, Wang et
The Evolution of the Automated Continuous Evaluation System (ACES) for Personnel Security
2013-11-12
information. It applies business rules to the data, produces a report that flags issues of potential security concern, and electronically transmits...Form 86 (SF- 86) to check these data sources, verify what has been submitted, and collect more information. It applies business rules to the data...subject information. It applies business rules to analyze the data returned, produces a report that flags issues of potential security concern, and
Strategic Response to Energy-Related Security Threats in the US Department of Defense
2014-10-15
generation in the United States are fossil fuels . These include coal, natural gas, and oil . In some cases solar, wind, geothermal, and hydroelectric...and findings. The research addressed engagement on climate change and energy security issues by DoD across various tiers and sectors of the...on climate change and energy security issues by DoD across various tiers and sectors of the organization. Specifically, a tripartite analysis
Issues in Distance Education: A Primer for Higher Education Decision Makers
ERIC Educational Resources Information Center
Beaudoin, Michael
2016-01-01
This chapter presents an overview of current issues related to distance learning in higher education. It identifies central questions, issues, challenges, and opportunities that must be addressed by decision makers, as well as key attributes of effective leaders.
Gharaveis, Arsalan; Hamilton, D Kirk; Pati, Debajyoti; Shepley, Mardelle
2017-01-01
The aim of this study was to examine the influence of visibility on teamwork, collaborative communication, and security issues in emergency departments (EDs). This research explored whether with high visibility in EDs, teamwork and collaborative communication can be improved while the security issues will be reduced. Visibility has been regarded as a critical design consideration and can be directly and considerably impacted by ED's physical design. Teamwork is one of the major related operational outcomes of visibility and involves nurses, support staff, and physicians. The collaborative communication in an ED is another important factor in the process of care delivery and affects efficiency and safety. Furthermore, security is a behavioral factor in ED designs, which includes all types of safety including staff safety, patient safety, and the safety of visitors and family members. This qualitative study investigated the impact of visibility on teamwork, collaborative communication, and security issues in the ED. One-on-one interviews and on-site observation sessions were conducted in a community hospital. Corresponding data analysis was implemented by using computer plan analysis, observation and interview content, and theme analyses. The findings of this exploratory study provided a framework to identify visibility as an influential factor in ED design. High levels of visibility impact productivity and efficiency of teamwork and communication and improve the chance of lowering security issues. The findings of this study also contribute to the general body of knowledge about the effect of physical design on teamwork, collaborative communication, and security.
2009-04-21
6 Intercity Passenger Rail Program (Amtrak) .....................................................................6... Intercity Bus Security Grant Program..............................................................................7 Trucking Security Program...continue security enhancements for its intercity rail services between high-risk urban areas. 20 U.S. Department of Homeland Security, Federal Emergency
Computer Network Security: Best Practices for Alberta School Jurisdictions.
ERIC Educational Resources Information Center
Alberta Dept. of Education, Edmonton.
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
75 FR 64643 - Reporting of Security-Based Swap Transaction Data
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-20
... information relating to pre-enactment security-based swaps to a registered security-based swap data repository... within 60 days after a registered security- based swap data repository commences operations to receive... repository,\\8\\ and security- based swap execution facility.\\9\\ The Commission has issued an advance notice of...
49 CFR 1548.19 - Security Directives and Information Circulars.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... CARRIER SECURITY § 1548.19 Security Directives and Information Circulars. (a) TSA may issue an Information... security measures are necessary to respond to a threat assessment, or to a specific threat against civil...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
...; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343-1717), Acting... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...
A Security Checklist for ERP Implementations
ERIC Educational Resources Information Center
Hughes, Joy R.; Beer, Robert
2007-01-01
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
The security concern on internet banking adoption among Malaysian banking customers.
Sudha, Raju; Thiagarajan, A S; Seetharaman, A
2007-01-01
The existing literatures highlights that the security is the primary factor which determines the adoption of Internet banking technology. The secondary information on Internet banking development in Malaysia shows a very slow growth rate. Hence, this study aims to study the banking customers perception towards security concern and Internet banking adoption through the information collected from 150 sample respondents. The data analysis reveals that the customers have much concern about security and privacy issue in adoption of Internet banking, whether the customers are adopted Internet banking or not. Hence, it infers that to popularize Internet banking system there is a need for improvement in security and privacy issue among the banking customers.
12 CFR 1.3 - Limitations on dealing in, underwriting, and purchase and sale of securities.
Code of Federal Regulations, 2013 CFR
2013-01-01
... security. (2) The aggregate par value of securities treated as investment securities under paragraph (i)(1... its own account, provided the aggregate par value of Type II securities issued by any one obligor held... may purchase and sell Type III securities for its own account, provided the aggregate par value of...
12 CFR 1.3 - Limitations on dealing in, underwriting, and purchase and sale of securities.
Code of Federal Regulations, 2014 CFR
2014-01-01
... security. (2) The aggregate par value of securities treated as investment securities under paragraph (i)(1... its own account, provided the aggregate par value of Type II securities issued by any one obligor held... may purchase and sell Type III securities for its own account, provided the aggregate par value of...
DOT National Transportation Integrated Search
2003-09-09
After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...
31 CFR 306.23 - Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System.
Code of Federal Regulations, 2010 CFR
2010-07-01
... TREASURY DIRECT Book-entry Securities System. 306.23 Section 306.23 Money and Finance: Treasury Regulations... Securities eligible to be held in the TREASURY DIRECT Book-entry Securities System. (a) Eligible issues. The... conversion to the TREASURY DIRECT Book-entry Securities System. The notice shall specify the period during...
Analyzing the threat of unmanned aerial vehicles (UAV) to nuclear facilities
Solodov, Alexander; Williams, Adam; Al Hanaei, Sara; ...
2017-04-18
Unmanned aerial vehicles (UAV) are among the major growing technologies that have many beneficial applications, yet they can also pose a significant threat. Recently, several incidents occurred with UAVs violating privacy of the public and security of sensitive facilities, including several nuclear power plants in France. The threat of UAVs to the security of nuclear facilities is of great importance and is the focus of this work. This paper presents an overview of UAV technology and classification, as well as its applications and potential threats. We show several examples of recent security incidents involving UAVs in France, USA, and Unitedmore » Arab Emirates. Further, the potential threats to nuclear facilities and measures to prevent them are evaluated. The importance of measures for detection, delay, and response (neutralization) of UAVs at nuclear facilities are discussed. An overview of existing technologies along with their strength and weaknesses are shown. Finally, the results of a gap analysis in existing approaches and technologies is presented in the form of potential technological and procedural areas for research and development. Furthermore based on this analysis, directions for future work in the field can be devised and prioritized.« less
Nuclear Terrorism - Dimensions, Options, and Perspectives in Moldova
NASA Astrophysics Data System (ADS)
Vaseashta, Ashok; Susmann, P.; Braman, Eric W.; Enaki, Nicolae A.
Securing nuclear materials, controlling contraband and preventing proliferation is an international priority to resolve using technology, diplomacy, strategic alliances, and if necessary, targeted military exercises. Nuclear security consists of complementary programs involving international legal and regulatory structure, intelligence and law enforcement agencies, border and customs forces, point and stand-off radiation detectors, personal protection equipment, preparedness for emergency and disaster, and consequence management teams. The strategic goal of UNSCR 1540 and the GICNT is to prevent nuclear materials from finding their way into the hands of our adversaries. This multi-jurisdictional and multi-agency effort demands tremendous coordination, technology assessment, policy development and guidance from several sectors. The overall goal envisions creating a secured environment that controls and protects nuclear materials while maintaining the free flow of commerce and individual liberty on international basis. Integral to such efforts are technologies to sense/detect nuclear material, provide advance information of nuclear smuggling routes, and other advanced means to control nuclear contraband and prevent proliferation. We provide an overview of GICNT and several initiatives supporting such efforts. An overview is provided of technological advances in support of point and stand-off detection and receiving advance information of nuclear material movement from perspectives of the Republic of Moldova.
FORWARD: DESERTIFICATION IN THE MEDITERRANEAN REGION: A SECURITY ISSUE
The Workshop focused on two basic concepts: security and desertification and their linkages. Since the end of the Cold War, traditional security concepts based on national sovereignty and territorial security have increasingly been brought under review. Currently, a broader defin...
Nuclear Fuel Cycle Introductory Concepts
DOE Office of Scientific and Technical Information (OSTI.GOV)
Karpius, Peter Joseph
2017-02-02
The nuclear fuel cycle is a complex entity, with many stages and possibilities, encompassing natural resources, energy, science, commerce, and security, involving a host of nations around the world. This overview describes the process for generating nuclear power using fissionable nuclei.
Code of Federal Regulations, 2012 CFR
2012-01-01
... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS GENERAL INFORMATION AND OVERVIEW OF THE CHEMICAL WEAPONS CONVENTION REGULATIONS (CWCR) § 710.5 Authority. The CWCR (parts 710 through 729 of this subchapter) implement certain provisions of the Chemical Weapons Convention...
Code of Federal Regulations, 2013 CFR
2013-01-01
... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS GENERAL INFORMATION AND OVERVIEW OF THE CHEMICAL WEAPONS CONVENTION REGULATIONS (CWCR) § 710.5 Authority. The CWCR (parts 710 through 729 of this subchapter) implement certain provisions of the Chemical Weapons Convention...
Code of Federal Regulations, 2010 CFR
2010-01-01
... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS GENERAL INFORMATION AND OVERVIEW OF THE CHEMICAL WEAPONS CONVENTION REGULATIONS (CWCR) § 710.5 Authority. The CWCR (parts 710 through 729 of this subchapter) implement certain provisions of the Chemical Weapons Convention...
OVERVIEW OF USEPA'S WATER SUPPLY & WATER RESOURCES DIVISION PROGRAM
The United States Environmental Protection Agency's (USEPA) Water Supply and Water Resources Division (WSWRD) conducts a wide range of research on regulated and unregulated contaminants in drinking water, water distribution systems, homeland security, source water protection, and...
Overview of Infrastructure Science and Analysis for Homeland Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Backhaus, Scott N.
This presentation offers an analysis of infrastructure science with goals to provide third-party independent science based input into complex problems of national concern and to use scientific analysis to "turn down the noise" around complex problems.
Code of Federal Regulations, 2011 CFR
2011-01-01
... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE CHEMICAL WEAPONS CONVENTION REGULATIONS GENERAL INFORMATION AND OVERVIEW OF THE CHEMICAL WEAPONS CONVENTION REGULATIONS (CWCR) § 710.5 Authority. The CWCR (parts 710 through 729 of this subchapter) implement certain provisions of the Chemical Weapons Convention...
Treatment Option Overview (Childhood Acute Myeloid Leukemia/Other Myeloid Malignancies)
... to boost, direct, or restore the body’s natural defenses against cancer. This type of cancer treatment is ... Security Reuse & Copyright Syndication Services Website Linking U.S. Department of Health and Human Services National Institutes of ...
On chaos synchronization and secure communication.
Kinzel, W; Englert, A; Kanter, I
2010-01-28
Chaos synchronization, in particular isochronal synchronization of two chaotic trajectories to each other, may be used to build a means of secure communication over a public channel. In this paper, we give an overview of coupling schemes of Bernoulli units deduced from chaotic laser systems, different ways to transmit information by chaos synchronization and the advantage of bidirectional over unidirectional coupling with respect to secure communication. We present the protocol for using dynamical private commutative filters for tap-proof transmission of information that maps the task of a passive attacker to the class of non-deterministic polynomial time-complete problems. This journal is © 2010 The Royal Society
Overview of Variable Renewable Energy Regulatory Issues: A Clean Energy Regulators Initiative Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miller, M.; Cox, S.
This CERI report aims to provide an introductory overview of key regulatory issues associated with the deployment of renewable energy -- particularly variable renewable energy (VRE) sources such wind and solar power. The report draws upon the research and experiences from various international contexts, and identifies key ideas that have emerged from the growing body of VRE deployment experience and regulatory knowledge. The report assumes basic familiarity with regulatory concepts, and although it is not written for a technical audience, directs the reader to further reading when available. VRE deployment generates various regulatory issues: substantive, procedural, and public interest issues,more » and the report aims to provide an empirical and technical grounding for all three types of questions as appropriate.« less
Security Systems Consideration: A Total Security Approach
NASA Astrophysics Data System (ADS)
Margariti, S. V.; Meletiou, G.; Stergiou, E.; Vasiliadis, D. C.; Rizos, G. E.
2007-12-01
The "safety" problem for protection systems is to determine in a given situation whether a subject can acquire a particular right to an object. Security and audit operation face the process of securing the application on computing and network environment; however, storage security has been somewhat overlooked due to other security solutions. This paper identifies issues for data security, threats and attacks, summarizes security concepts and relationships, and also describes storage security strategies. It concludes with recommended storage security plan for a total security solution.
Hackmann, Ann; Holmes, Emily A
2004-07-01
The authors provide an overview of the papers in the special issue of Memory on mental imagery and memory in psychopathology. The papers address emotional, intrusive mental imagery across a range of psychological disorders including post-traumatic stress disorder (PTSD), agoraphobia, body dysmorphic disorder, mood disorders, and psychosis. They include work on information processing issues including modelling cravings, conditioning, and aversions, as well as imagery qualities such as vividness and emotionality. The overview aims to place the articles in a broader context and draw out some exciting implications of this novel work. It provides a clinical context to the recent growth in this area from a cognitive behavioural therapy (CBT) perspective. We begin with PTSD, and consider links to imagery in other disorders. The clinical implications stemming from this empirical work and from autobiographical memory theory are discussed. These include consideration of a variety of techniques for eliminating troublesome imagery, and creating healthy, realistic alternatives.
Planning Considerations for Secure Network Protocols
1999-03-01
distribution / management ) requirements needed to support network security services are examined. The thesis concludes by identifying tactical user network requirements and suggests security issues to be considered in concert with network
Code of Federal Regulations, 2010 CFR
2010-01-01
... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Overview. 2635.601 Section 2635.601 Administrative Personnel OFFICE OF GOVERNMENT ETHICS GOVERNMENT ETHICS STANDARDS OF ETHICAL CONDUCT FOR EMPLOYEES... statutory requirement, it also addresses the issues of lack of impartiality that require disqualification...
Online Learning: Research Readings.
ERIC Educational Resources Information Center
Guthrie, Hugh, Ed.
This book comprises an overview and 11 chapters that address issues related to flexible approaches to delivery and online learning in particular. "Overview" (Guthrie) highlights key points drawn from the chapters. "Does Digital Literacy Mean More Than Clicking Your Fingers?" (Candy) discusses the importance of information and…
McMahon, Brian T; Hurley, Jessica E
2008-06-01
This article is intended to provide an overview of the National EEOC ADA Research Project. It also previews four subsequent articles pertaining to the issue of hiring discrimination involving Americans with disabilities.
A threat intelligence framework for access control security in the oil industry
NASA Astrophysics Data System (ADS)
Alaskandrani, Faisal T.
The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.
... child with TS Managing TS in a classroom Bullying Issues Accommodations & Education Rights CDC Partnership An Overview ... Syndrome Parent & Family Resources Advocating for your Child Bullying Issues Accommodations and Ed Rights Individual Education Plans & ...
10 CFR 712.16 - DOE security review.
Code of Federal Regulations, 2010 CFR
2010-01-01
... of the HRP process, the HRP certifying official must be notified and the security concern evaluated... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...
Gender-Based Violence Prevention. Issues in Prevention
ERIC Educational Resources Information Center
Higher Education Center for Alcohol, Drug Abuse, and Violence Prevention, 2012
2012-01-01
This issue of "Issues in Prevention" focuses on gender-based violence prevention. This issue contains the following articles: (1) Preventing Gender-Based Violence: An Overview (Linda Langford); (2) Q&A With Amelia Cobb; (3) Denim Day at HBCUs; (4) Dear Colleague Letter; (5) ED Grants for Violence Prevention; and (6) Higher Education Center…
ERCMExpress. Volume 2, Issue 4
ERIC Educational Resources Information Center
US Department of Education, 2006
2006-01-01
This issue of ERCMExpress alerts readers of the All-Hazard NOAA weather radio (NWR) network upgrade. In 2004, The National Oceanic and Atmospheric Administration NOAA and the U.S. Department of Homeland Security (DHS) collaborated to enable DHS to disseminate homeland security-related information over the NWR network. DHS's goal was to produce an…
Accounting Issues: An Essay Series Part VI--Investments in Securities
ERIC Educational Resources Information Center
Laux, Judy
2008-01-01
The sixth in a series of theory-based essays, this article presents accounting for investments in debt and equity securities along with some related conceptual and measurement issues. Additional coverage is devoted to potential ethical dilemmas and both theoretical and empirical literature related to this asset. (Contains 1 footnote.)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-19
... Indirect Stock Transfers and Coordination Rule Exceptions; Transfers of Stock or Securities in Outbound... issue of the Federal Register, the IRS and the Treasury Department are issuing temporary regulations... stock transfers for certain outbound asset reorganizations. The temporary regulations also modify the...
ERIC Educational Resources Information Center
Imam, Abbas H.
2013-01-01
Complexity of information security has become a major issue for organizations due to incessant threats to information assets. Healthcare organizations are particularly concerned with security owing to the inherent vulnerability of sensitive information assets in health informatics. While the non-technical security management elements have been at…
12 CFR 151.40 - What definitions apply to this part?
Code of Federal Regulations, 2013 CFR
2013-01-01
... in these debt securities. Debt security does not include securities issued by an investment company registered under the Investment Company Act of 1940, 15 U.S.C. 80a-1, et seq. Government security means: (1... traded on one or more national securities exchanges; or (ii) For which quotations are disseminated...
12 CFR 151.40 - What definitions apply to this part?
Code of Federal Regulations, 2014 CFR
2014-01-01
... in these debt securities. Debt security does not include securities issued by an investment company registered under the Investment Company Act of 1940, 15 U.S.C. 80a-1, et seq. Government security means: (1... traded on one or more national securities exchanges; or (ii) For which quotations are disseminated...
12 CFR 551.40 - What definitions apply to this part?
Code of Federal Regulations, 2013 CFR
2013-01-01
... in these debt securities. Debt security does not include securities issued by an investment company registered under the Investment Company Act of 1940, 15 U.S.C. 80a-1, et seq. Government security means: (1... traded on one or more national securities exchanges; or (ii) For which quotations are disseminated...
28 CFR 700.24 - Security of systems of records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Security of systems of records. 700.24... Records Under the Privacy Act of 1974 § 700.24 Security of systems of records. (a) The Office Administrator or Security Officer shall be responsible for issuing regulations governing the security of systems...
49 CFR 1520.15 - SSI disclosed by TSA or the Coast Guard.
Code of Federal Regulations, 2010 CFR
2010-10-01
... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY SECURITY RULES FOR ALL MODES OF TRANSPORTATION PROTECTION OF SENSITIVE SECURITY INFORMATION § 1520.15 SSI disclosed by TSA or the Coast Guard. (a) In... allegations contained in a legal enforcement action document issued by TSA or the Coast Guard. (2) Security...
Information Security Awareness On-Line Materials Design with Knowledge Maps
ERIC Educational Resources Information Center
Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan
2011-01-01
Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…
31 CFR 344.4 - What are Time Deposit securities?
Code of Federal Regulations, 2010 CFR
2010-07-01
... LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.4 What are Time Deposit securities? Time Deposit... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false What are Time Deposit securities? 344...? The issuer must fix the maturity periods for Time Deposit securities, which are issued as follows: (1...
31 CFR 344.4 - What are Time Deposit securities?
Code of Federal Regulations, 2011 CFR
2011-07-01
... LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.4 What are Time Deposit securities? Time Deposit... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What are Time Deposit securities? 344...? The issuer must fix the maturity periods for Time Deposit securities, which are issued as follows: (1...
31 CFR 344.4 - What are Time Deposit securities?
Code of Federal Regulations, 2013 CFR
2013-07-01
... LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.4 What are Time Deposit securities? Time Deposit... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false What are Time Deposit securities? 344...? The issuer must fix the maturity periods for Time Deposit securities, which are issued as follows: (1...
31 CFR 344.4 - What are Time Deposit securities?
Code of Federal Regulations, 2014 CFR
2014-07-01
... AND LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.4 What are Time Deposit securities? Time... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false What are Time Deposit securities? 344... periods? The issuer must fix the maturity periods for Time Deposit securities, which are issued as follows...
31 CFR 344.4 - What are Time Deposit securities?
Code of Federal Regulations, 2012 CFR
2012-07-01
... LOCAL GOVERNMENT SERIES Time Deposit Securities § 344.4 What are Time Deposit securities? Time Deposit... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false What are Time Deposit securities? 344...? The issuer must fix the maturity periods for Time Deposit securities, which are issued as follows: (1...
Müthing, Jannis; Jäschke, Thomas
2017-01-01
Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. Objective The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Methods Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Results Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. Conclusions The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. PMID:29046271
Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M
2017-10-18
Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. ©Jannis Müthing, Thomas Jäschke, Christoph M Friedrich. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 18.10.2017.
Space station human productivity study. Volume 5: Management plans
NASA Technical Reports Server (NTRS)
1985-01-01
The 67 Management Plans represent recommended study approaches for resolving 108 of the 305 Issues which were identified. Each study Management Plan is prepared in three formats: Management Plan Overview (lists the subsumed Issues, study background, and related overview information); Study Plan (details the study approach by tasks, lists special needs, and describes expected study products); Schedule-Task Flow (provides a time-lined schedule for the study tasks and resource requirements). The Management Relationships Matrix, included in this volume, shows the data input-output relationships among all recommended studies. A listing is also included which cross-references the unresolved requirements to Issues to management plans. A glossary of all abbreviations utilized is provided.
2016-04-24
the Cybersecurity in the United States – Brief Overview 13 2.1. Data Breaches in the United States 14 2.2. Security and...Capacity to Defend 15 2.2.1. Cybersecurity Capabilities in the United States 18 2.3. Internationalization of Cybersecurity ...The Department of Homeland Security (DHS) Org Chart 43 2.2.1.2 National Cybersecurity and Communications Integration Center (NCCIC) Org
2003-06-01
security faculty. This program offers great teaching along with the ability to master the material needed for the two most popular certifications in...then move on to an overview of some popular networks. The Open Systems Interconnect model (OSI) will be introduced to trainees to make them understand...several different network types, this part explains the two most popular types of networks: LANs and WANs. 2.1.4. Time: 30 Minutes 32 2.2. Network
2015-06-01
Katherine Herbig, Espionage by the Numbers: A Statistical Overview, accessed April 14, 2015, http://www.wright.edu/rsp/Security/Treason/Numbers.htm 5...submitted for top-secret clearances with “derogatory financial information.”43 The debt amount reviewed was $500 in delinquency for at least 120 days, which...Investigative Service’s (DIS) “ delinquent debt criteria with amount of delinquent debt” and Defense Central Index of Investigation’s (DCII) final
From a Proven Correct Microkernel to Trustworthy Large Systems
NASA Astrophysics Data System (ADS)
Andronick, June
The seL4 microkernel was the world's first general-purpose operating system kernel with a formal, machine-checked proof of correctness. The next big step in the challenge of building truly trustworthy systems is to provide a framework for developing secure systems on top of seL4. This paper first gives an overview of seL4's correctness proof, together with its main implications and assumptions, and then describes our approach to provide formal security guarantees for large, complex systems.
Impact of avian influenza on village poultry production globally.
Alders, Robyn; Awuni, Joseph Adongo; Bagnol, Brigitte; Farrell, Penny; de Haan, Nicolene
2014-01-01
Village poultry and their owners were frequently implicated in disease transmission in the early days of the highly pathogenic avian influenza (HPAI) H5N1 pandemic. With improved understanding of the epidemiology of the disease, it was recognized that village poultry raised under extensive conditions pose less of a threat than intensively raised poultry of homogeneous genetic stock with poor biosecurity. This paper provides an overview of village poultry production and the multiple ways that the HPAI H5N1 pandemic has impacted on village poultry, their owners, and the traders whose livelihoods are intimately linked to these birds. It reviews impact in terms of gender and cultural issues; food security; village poultry value chains; approaches to biosecurity; marketing; poultry disease prevention and control; compensation; genetic diversity; poultry as part of livelihood strategies; and effective communication. It concludes on a positive note that there is growing awareness amongst animal health providers of the importance of facilitating culturally sensitive dialogue to develop HPAI prevention and control options.
Overview of chytrid emergence and impacts on amphibians
2016-01-01
Chytridiomycosis is an emerging infectious disease of amphibians that affects over 700 species on all continents where amphibians occur. The amphibian–chytridiomycosis system is complex, and the response of any amphibian species to chytrid depends on many aspects of the ecology and evolutionary history of the amphibian, the genotype and phenotype of the fungus, and how the biological and physical environment can mediate that interaction. Impacts of chytridiomycosis on amphibians are varied; some species have been driven extinct, populations of others have declined severely, whereas still others have not obviously declined. Understanding patterns and mechanisms of amphibian responses to chytrids is critical for conservation and management. Robust estimates of population numbers are needed to identify species at risk, prioritize taxa for conservation actions, design management strategies for managing populations and species, and to develop effective measures to reduce impacts of chytrids on amphibians. This article is part of the themed issue ‘Tackling emerging fungal threats to animal health, food security and ecosystem resilience’. PMID:28080989
Real Time Conference 2016 Overview
NASA Astrophysics Data System (ADS)
Luchetta, Adriano
2017-06-01
This is a special issue of the IEEE Transactions on Nuclear Science containing papers from the invited, oral, and poster presentation of the 20th Real Time Conference (RT2016). The conference was held June 6-10, 2016, at Centro Congressi Padova “A. Luciani,” Padova, Italy, and was organized by Consorzio RFX (CNR, ENEA, INFN, Università di Padova, Acciaierie Venete SpA) and the Istituto Nazionale di Fisica Nucleare. The Real Time Conference is multidisciplinary and focuses on the latest developments in real-time techniques in high-energy physics, nuclear physics, astrophysics and astroparticle physics, nuclear fusion, medical physics, space instrumentation, nuclear power instrumentation, general radiation instrumentation, and real-time security and safety. Taking place every second year, it is sponsored by the Computer Application in Nuclear and Plasma Sciences technical committee of the IEEE Nuclear and Plasma Sciences Society. RT2016 attracted more than 240 registrants, with a large proportion of young researchers and engineers. It had an attendance of 67 students from many countries.
[Ecological carrying capacity and Chongming Island's ecological construction].
Wang, Kaiyun; Zou, Chunjing; Kong, Zhenghong; Wang, Tianhou; Chen, Xiaoyong
2005-12-01
This paper overviewed the goals of Chongming Island's ecological construction and its background, analyzed the current eco-economic status and constraints of the Island, and put forward some scientific issues on its ecological construction. It was suggested that for the resources-saving and sustainable development of the Island, the researches on its ecological construction should be based on its ecological carrying capacity, fully take the regional characteristics into consideration, and refer the successful development modes at home and abroad. The carrying capacity study should ground on systemic and dynamic views, give a thorough evaluation of the Island's present carrying capacity, simulate its possible changes, and forecast its demands and risks. Operable countermeasures to promote the Island's carrying capacity should be worked out, new industry structure, population scale, and optimized distribution projects conforming to regional carrying capacity should be formulated, and effective ecological security alarming and control system should be built, with the aim of providing suggestions and strategic evidences for the decision-making of economic development and sustainable environmental resources use of the region.
Hussain, Shoaib Fahad; Boyle, Peter; Patel, Preeti; Sullivan, Richard
2016-10-12
Since the launch of the Global Polio Eradication Initiative (GPEI) in 1988 the global incidence of poliomyelitis has fallen by nearly 99 %. From a situation where wild type poliovirus was endemic in 125 countries across five continents, transmission is now limited to regions of just three countries - Pakistan, Afghanistan and Nigeria. A sharp increase in Pakistan's poliomyelitis cases in 2014 prompted the International Health Regulations Emergency Committee to declare the situation a 'public health emergency of international concern'. Global polio eradication hinges on Pakistan's ability to address the religious, political and socioeconomic barriers to immunisation; including discrepancies in vaccine coverage, a poor health infrastructure, and conflict in polio-endemic regions of the country. This analysis provides an overview of the GPEI, focusing on the historical and contemporary challenges facing Pakistan's polio eradication programme and the impact of conflict and insecurity, and sheds light on strategies to combat vaccine hesitancy, engage local communities and build on recent progress towards polio eradication in Pakistan.
Kawahara, Norie; Roh, Jae Kyung; Akaza, Hideyuki; Inoue, Hajime; Shibuya, Kenji; Iwasaki, Masaru; Tsuji, Tetsuo; Nishiyama, Masanori; Nakagawara, Akira; Watanabe, Kenji; Nozaki, Shinjiro; Inoue, Manami; Sugimura, Haruhiko; Miyake, Jun; Li, Fu
2011-06-01
This forum has continued to discuss the inclusion of cancer on the global health agenda, and specifically the Millennium Development Goals. The seventh forum presented an overview of activities to date, supplemented by reports from Korea, local governments in Japan and representatives from the pharmaceutical industry. Discussion focused on how to engage in measures to tackle cancer prevention and achieve early detection and effective treatment, using limited resources. It was recognized that with non-communicable diseases gaining increasing attention in international dialogue, it is now of the utmost importance to share an accurate recognition of cancer research and treatment throughout Asia and the wider world. Participants concurred that cancer issues are decoupled from the development aid agenda and that cooperation should be advanced on the basis of international cooperation without recourse to governmental development aid.
Regional Security Application and Checkmate!
2000-04-01
steps being taken, a sense of “justice” can be lost, only to resurface in the next generation with a new outbreak of conflict. The vicious cycle...Overview......................................................................................................... 5 B. First Generation S.E.N.S.E...6 2. Assessment................................................................................................ 8 C. Second Generation
Biofuel crops - ecological perspectives
The Energy Independence and Security Act of 2007 and the USEPA Renewable Fuel Standards 2010 Final Rule have highlighted national strategic goals to reduce our dependence on fossil fuels and to increase the amount of ethanol in gasoline. An overview is presented of ecological con...
Code of Federal Regulations, 2010 CFR
2010-01-01
...) Have loan security being liquidated voluntarily or involuntarily. (b) The Agency services direct FLP... SPECIAL PROGRAMS DIRECT LOAN SERVICING-SPECIAL Overview § 766.1 Introduction. (a) This part describes the Agency's servicing policies for direct loan borrowers who: (1) Are financially distressed; (2) Are...
An Overview of Soils and Human Health - Research Trends and Future Needs
NASA Astrophysics Data System (ADS)
Brevik, Eric C.; Burgess, Lynn C.; Steffan, Joshua J.; Cerdà, Artemi
2017-04-01
Soils have significant impact on human health, whether those influences are positive or negative, direct or indirect. Soils are a significant source of nutrients in our food supply and medications such as antibiotics. However, nutrient imbalances and the presence of human pathogens in the soil biological community can cause negative impacts on health. There are also many locations where various elements or chemical compounds are found in soils at toxic levels, due to either natural conditions or anthropogenic activities. The soils of urban environments have received increased attention in the last few years, and they too pose a number of human health questions and challenges. Concepts such as soil security may provide a framework within which soils and human health issues can be investigated using interdisciplinary and transdisciplinary approaches, as it will take the contributions of experts in a number of different scientific, medical, and social science fields to fully address soils and human health issues. While much progress was made in understanding links between soils and human health over the last century, there is still much we do not know and the interactions between soils and human health are extremely complex. Therefore, there is still significant need for research in this important area.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-19
... Chemical Facility Safety and Security Listening Sessions AGENCY: National Protection and Programs... from stakeholders on issues pertaining to Improving Chemical Facility Safety and Security (Executive... regulations, guidance, and policies; and identifying best practices in chemical facility safety and security...
14 CFR 61.18 - Security disqualification.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 14 Aeronautics and Space 2 2014-01-01 2014-01-01 false Security disqualification. 61.18 Section 61...) AIRMEN CERTIFICATION: PILOTS, FLIGHT INSTRUCTORS, AND GROUND INSTRUCTORS General § 61.18 Security... issued under this part when the Transportation Security Administration (TSA) has notified the FAA in...
14 CFR 61.18 - Security disqualification.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 14 Aeronautics and Space 2 2012-01-01 2012-01-01 false Security disqualification. 61.18 Section 61...) AIRMEN CERTIFICATION: PILOTS, FLIGHT INSTRUCTORS, AND GROUND INSTRUCTORS General § 61.18 Security... issued under this part when the Transportation Security Administration (TSA) has notified the FAA in...
14 CFR 61.18 - Security disqualification.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Security disqualification. 61.18 Section 61...) AIRMEN CERTIFICATION: PILOTS, FLIGHT INSTRUCTORS, AND GROUND INSTRUCTORS General § 61.18 Security... issued under this part when the Transportation Security Administration (TSA) has notified the FAA in...
ERIC Educational Resources Information Center
Hart, Kevin
2010-01-01
According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…
DOT National Transportation Integrated Search
2003-09-09
Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...
Internet Gambling in the Workplace
ERIC Educational Resources Information Center
Griffiths, Mark
2009-01-01
Purpose: This paper seeks to overview the issues, concerns and challenges relating to gambling--and more specifically internet gambling--in the workplace. Design/methodology/approach: Using psychological literature, this paper outlines a number of important and inter-related areas including brief overviews of gambling and problem gambling,…
Overview of DOE space nuclear propulsion programs
NASA Technical Reports Server (NTRS)
Newhouse, Alan R.
1993-01-01
An overview of Department of Energy space nuclear propulsion programs is presented in outline and graphic form. DOE's role in the development and safety assurance of space nuclear propulsion is addressed. Testing issues and facilities are discussed along with development needs and recent research activities.
Combating terrorism : linking threats to strategies and resources testimony
DOT National Transportation Integrated Search
2000-07-26
This is the statement of Norman J. Rabkin, Director, National Security Preparedness Issues, National Security and International Affairs division before the Subcommittee on National Security, Veterans Affairs, and International Relations, Committee on...
Overview of innovative next generation materials for security and defense applications
NASA Astrophysics Data System (ADS)
Taylor, Edward W.; Taylor, Linda R.
2008-10-01
A short technology Overview of recently reported research and development focusing on recent advances in polymer/organic and hybrid-nanotechnology based materials that offer resistance to ionizing and displacement radiations and perhaps which are suitable for transition to next-generation systems is presented. The Overview will focus on new and emerging material technology for the military, first responders, and space systems. Recent material research results and data as well as the potential for diverse applications of these materials to new component developments such as high speed EO polymer modulators and radiation shielding for protection of military and space assets will be discussed. In particular, the ability of several organic/polymer hybrids to self-heal when irradiated by gamma-rays is discussed.
Doyle, K A
1995-12-01
The increasing range and complexity of biologicals, and the greater demand for these products, have resulted in a greater volume of trade in animal-based biological material. This has given rise, in turn, to many approaches to the regulation of importation of these materials, as countries seek protection against the introduction of disease. Harmonization of these regulatory approaches would contribute significantly to the availability of veterinary biologicals, to their manufacture and trade, and to disease security. Australia has developed systems for the categorisation and evaluation of biologicals, control by import permits, and specific procedures at point-of-entry and in institutions where these products are used. Computerised records and precedents assist in evaluation and in the issuing of permits. Recognition that some materials must be subject to further control has led to a system of registration of institutions based on levels of biosecurity, and approved use and disposal programmes. Institutions vary from high-security animal health laboratories to human in vitro fertilisation clinics, which use animal-derived media and materials. Such institutions are regulated through quality assurance contracts. Quarantine authorities have linkages with other agencies which have an interest in these products. These linkages reflect the administrative structures of government in Australia, and provide for management of all forms of risk. The author describes these systems and overviews their biological basis.
Active Rack Isolation System Program and Technical Status
NASA Technical Reports Server (NTRS)
Bushnell, Glenn; Fialho, Ian; Allen, James; Quraishi, Naveed
2000-01-01
The Boeing Active Rack Isolation System (ARIS) is one of the means used to isolate acceleration-sensitive scientific experiments from structurally transmitted disturbances aboard the International Space Station. The presentation provides an overview of ARIS and technical issues associated with the development of the active control system. An overview of ARIS analytical models is presented along with recent isolation performance predictions made using these models. Issues associated with commanding and capturing ARIS data are discussed and possible future options based on the ARIS ISS Characterization Experiment (ICE) Payload On-orbit Processor (POP) are outlined. An overview of the ARIS-ICE experiment scheduled to fly on ISS Flight 6A is presented. The presentation concludes with a discussion of recent- developmental work that includes passive rack damping, umbilical redesigns and advanced multivariable control design methods.
Privacy and security issues in teleradiology.
White, Peter
2004-10-01
Teleradiology is now well established within healthcare in the USA, but ethico-legal concepts surrounding this innovation remain unclear. New legislation, the Health Insurance Portability and Accountability Act, as well as ethical guidelines and common law demonstrate the importance being placed on security of electronic data and the protection of patients' personal data. Radiologists need to be aware of the security, privacy, and confidentiality issues which relate to teleradiology, so that they can safeguard not only their own interests but also the best interests of their patients.
Bioinspired principles for large-scale networked sensor systems: an overview.
Jacobsen, Rune Hylsberg; Zhang, Qi; Toftegaard, Thomas Skjødeberg
2011-01-01
Biology has often been used as a source of inspiration in computer science and engineering. Bioinspired principles have found their way into network node design and research due to the appealing analogies between biological systems and large networks of small sensors. This paper provides an overview of bioinspired principles and methods such as swarm intelligence, natural time synchronization, artificial immune system and intercellular information exchange applicable for sensor network design. Bioinspired principles and methods are discussed in the context of routing, clustering, time synchronization, optimal node deployment, localization and security and privacy.
Water Security - National and Global Issues
NASA Astrophysics Data System (ADS)
Tindall, J. A.; Campbell, A. A.; Moran, E. H.
2010-12-01
Water is fundamental to human life. Disruption of water supplies by the Water Threats and Hazards Triad (WTHT) — man-made, natural, and technological hazards — could threaten the delivery of vital human services, endanger public health and the environment, potentially cause mass casualties, and threaten population sustainability, social stability, and homeland security. Water distribution systems extend over vast areas and are therefore vulnerable to a wide spectrum of threats — from natural hazards such as large forest fires that result in runoff and debris flow that clog reservoirs, and reduce, disrupt, or contaminate water supply and quality to threats from natural, man-made, or political extremist attacks. Our research demonstrates how devising concepts and counter measures to protect water supplies will assist the public, policy makers, and planners at local, Tribal, State, and Federal levels to develop solutions for national and international water-security and sustainability issues. Water security is an issue in which the entire global community is stakeholders.
An Encryption Scheme for Communication Internet SCADA Components
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network. SCADA is considered a critical infrastructure, and connecting to the internet is putting the society on jeopardy, some operators hold back on connecting it to the internet. But since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Supervisory Control and Data Acquisition Systems (SCADA) through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
DOT National Transportation Integrated Search
2013-07-29
The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...
49 CFR 1549.109 - Security Directives and Information Circulars.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... SCREENING PROGRAM Operations § 1549.109 Security Directives and Information Circulars. (a) TSA may issue an Information Circular to notify certified cargo screening facilities of security concerns. (b) When TSA...
49 CFR 1544.305 - Security Directives and Information Circulars.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... SECURITY: AIR CARRIERS AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.305 Security Directives and Information Circulars. (a) TSA may issue an Information Circular to notify aircraft operators of...
17 CFR 230.259 - Withdrawal or abandonment of offering statements.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Withdrawal or abandonment of offering statements. 230.259 Section 230.259 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION GENERAL RULES AND REGULATIONS, SECURITIES ACT OF 1933 Regulation A-Conditional Small Issues...
12 CFR 615.5450 - Definitions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... AND OPERATIONS, AND FUNDING OPERATIONS Book-Entry Procedures for Farm Credit Securities § 615.5450... the claimant for another person to hold, transfer, or deal with the security. (b) Book-entry security means a Farm Credit security issued or maintained in the Book-entry System. (c) Book-entry System means...
Park, Chang-Seop
2014-01-01
After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.
2014-01-01
After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797
ERIC Educational Resources Information Center
Stock, Susan R.; Levine, Heidi
2016-01-01
This chapter provides an overview of common student mental health issues and approaches for student affairs practitioners who are working with students with mental illness, and ways to support the overall mental health of students on campus.